Cookies Policy
The website need some cookies and similar means to function. If you permit us, we will use those means to collect data on your visits for aggregated statistics to improve our service. Find out More
Accept Reject
  • Menu
About

About

Pedro Pinto received a Licenciatura degree in Electrotecnical and Computer Engineering and a MSc degree in Communication Networks and Services both from University of Porto, Portugal. Also, he holds a joint PhD degree in Telecommunications from Universities of Minho, Aveiro and Porto, Portugal. He has 15+ years of experience lecturing in telecommunications and computer networks areas. Currently, he is an Assistant Professor at Polytechnic Institute of Viana do Castelo (IPVC) and also a senior researcher at INESC TEC. His research interests include wireless networks, routing, QoS and security.

Interest
Topics
Details

Details

  • Name

    Pedro Filipe Pinto
  • Role

    External Research Collaborator
  • Since

    04th September 2009
001
Publications

2025

Optimizing 5G network slicing with DRL: Balancing eMBB, URLLC, and mMTC with OMA, NOMA, and RSMA

Authors
Malta, S; Pinto, P; Fernández-Veiga, M;

Publication
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS

Abstract
The advent of 5th Generation (5G) networks has introduced the strategy of network slicing as a paradigm shift, enabling the provision of services with distinct Quality of Service (QoS) requirements. The 5th Generation New Radio (5G NR) standard complies with the use cases Enhanced Mobile Broadband (eMBB), Ultra-Reliable Low Latency Communications (URLLC), and Massive Machine Type Communications (mMTC), which demand a dynamic adaptation of network slicing to meet the diverse traffic needs. This dynamic adaptation presents both a critical challenge and a significant opportunity to improve 5G network efficiency. This paper proposes a Deep Reinforcement Learning (DRL) agent that performs dynamic resource allocation in 5G wireless network slicing according to traffic requirements of the 5G use cases within two scenarios: eMBB with URLLC and eMBB with mMTC. The DRL agent evaluates the performance of different decoding schemes such as Orthogonal Multiple Access (OMA), Non-Orthogonal Multiple Access (NOMA), and Rate Splitting Multiple Access (RSMA) and applies the best decoding scheme in these scenarios under different network conditions. The DRL agent has been tested to maximize the sum rate in scenario eMBB with URLLC and to maximize the number of successfully decoded devices in scenario eMBB with mMTC, both with different combinations of number of devices, power gains and number of allocated frequencies. The results show that the DRL agent dynamically chooses the best decoding scheme and presents an efficiency in maximizing the sum rate and the decoded devices between 84% and 100% for both scenarios evaluated.

2025

A blockchain architecture with smart contracts for an additive symbiotic network - a case study

Authors
Ferreira, IA; Palazzo, G; Pinto, A; Pinto, P; Sousa, P; Godina, R; Carvalho, H;

Publication
OPERATIONS MANAGEMENT RESEARCH

Abstract
Adopting innovative technologies such as blockchain and additive manufacturing can help organisations promote the development of additive symbiotic networks, thus pursuing higher sustainable goals and implementing circular economy strategies. These symbiotic networks correspond to industrial symbiosis networks in which wastes and by-products from other industries are incorporated into additive manufacturing processes. The adoption of blockchain technology in such a context is still in a nascent stage. Using the case study method, this research demonstrates the adoption of blockchain technology in an additive symbiotic network of a real-life context. The requirements to use a blockchain network are identified, and an architecture based on smart contracts is proposed as an enabler of the additive symbiotic network under study. The proposed solution uses the Hyperledger Fabric Attribute-Based Access Control as the distributed ledger technology. Even though this solution is still in the proof-of-concept stage, the results show that adopting it would allow the elimination of intermediary entities, keep available tracking records of the resources exchanged, and improve trust among the symbiotic stakeholders (that do not have any trust or cooperation mechanisms established before the symbiotic relationship). This study highlights that the complexity associated with introducing a novel technology and the technology's immaturity compared to other data storage technologies are some of the main challenges related to using blockchain technology in additive symbiotic networks.

2024

An Overview of Threats Exploring the Confusion Between Top-Level Domains and File Type Extensions

Authors
Sales, A; Torres, N; Pinto, P;

Publication
PROCEEDINGS OF THE FOURTEENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, CODASPY 2024

Abstract
Cyberattacks exploit deceptions involving the Domain Name Service (DNS) to direct users to fake websites, such as typosquatting attacks, which exploit natural typographical errors, and homograph attacks, where different Unicode characters resemble the legitimate ones. The deception attacks may also exploit the confusion between DNS domain names, specifically Top-Level Domains (TLDs), and file extensions. Recently, two new TLDs were added, zip and mov, sharing names with certain file types. This overlapping can be explored by malicious actors in a range of threat scenarios to compromise user security. This paper provides an overview of threats originating from the confusion between specific TLDs and file extensions, such as the recent zip and mov. The threats are grouped into 6 threat scenarios that are described and discussed. This research can be part of a more comprehensive strategy that includes addressing the risks associated with these threats and designing future strategies to address the threats associated with exploiting this ambiguity.

2024

ORAT - An Open Redirect Analysis Tool

Authors
Martinho, J; Mendes, D; Pinto, P;

Publication
12th International Symposium on Digital Forensics and Security, ISDFS 2024

Abstract
Securing web applications against open redirect vulnerabilities is important for protecting users from malicious redirection and phishing attacks. Open Redirect attacks occur when a malicious actor manipulates a link on a vulnerable web-site to redirect users to a malicious destination, often disguised as legitimate. This paper proposes a Google Chrome extension named Open Redirect Analysis Tool (ORAT), a tool that analyses a website for potential open redirect attacks. ORAT enables the detection of such vulnerabilities directly within the browser. It uses a straightforward interface and it simplifies the process of scanning web applications for unsafe redirects by applying a curated set of test payloads to uncover vulnerabilities, from the obvious to the subtle ones. The tests show that ORAT can identify and present open redirect vulnerabilities. Also, a discussion is provided about the limitations encountered, such as the scope of testing payloads and browser specificity, and a roadmap for future iterations of the proposed tool is proposed. By advancing the capabilities for early detection of redirect vulnerabilities, ORAT contributes to the set of tools available to cybersecurity practitioners and web developers, aiming to foster a secure online environment. © 2024 IEEE.

2024

Utility Function for Assessing the Cost of Recovering from Ransomware Attacks

Authors
Pinto, L; Pinto, P; Pinto, A;

Publication
OPTIMIZATION, LEARNING ALGORITHMS AND APPLICATIONS, OL2A 2024, PT II

Abstract
Nowadays ransomware attacks have become one of the main problems organizations face. The threat of ransomware attacks, with their capacity to paralyze entire organizations, creates the need to develop a ransomware recovery utility function to help further prepare for the impact of such attacks and enhance the organization's knowledge and perception of risk. This work proposes a ransomware recovery utility function that aims to estimate the impact of a ransomware attack measured in manpower hours till recovery and taking into account different devices and different scenarios.