Cookies
O website necessita de alguns cookies e outros recursos semelhantes para funcionar. Caso o permita, o INESC TEC irá utilizar cookies para recolher dados sobre as suas visitas, contribuindo, assim, para estatísticas agregadas que permitem melhorar o nosso serviço. Ver mais
Aceitar Rejeitar
  • Menu
Publicações

Publicações por CRACS

2025

An Automated Repository for the Efficient Management of Complex Documentation

Autores
Frade, J; Antunes, M;

Publicação
INFORMATION

Abstract
The accelerating digitalization of the public and private sectors has made information technologies (IT) indispensable in modern life. As services shift to digital platforms and technologies expand across industries, the complexity of legal, regulatory, and technical requirement documentation is growing rapidly. This increase presents significant challenges in managing, gathering, and analyzing documents, as their dispersion across various repositories and formats hinders accessibility and efficient processing. This paper presents the development of an automated repository designed to streamline the collection, classification, and analysis of cybersecurity-related documents. By harnessing the capabilities of natural language processing (NLP) models-specifically Generative Pre-Trained Transformer (GPT) technologies-the system automates text ingestion, extraction, and summarization, providing users with visual tools and organized insights into large volumes of data. The repository facilitates the efficient management of evolving cybersecurity documentation, addressing issues of accessibility, complexity, and time constraints. This paper explores the potential applications of NLP in cybersecurity documentation management and highlights the advantages of integrating automated repositories equipped with visualization and search tools. By focusing on legal documents and technical guidelines from Portugal and the European Union (EU), this applied research seeks to enhance cybersecurity governance, streamline document retrieval, and deliver actionable insights to professionals. Ultimately, the goal is to develop a scalable, adaptable platform capable of extending beyond cybersecurity to serve other industries that rely on the effective management of complex documentation.

2025

EVSOAR: Security Orchestration, Automation and Response via EV Charging Stations

Autores
Freitas, T; Silva, E; Yasmin, R; Shoker, A; Correia, ME; Martins, R; Esteves Veríssimo, PJ;

Publicação
CoRR

Abstract

2025

Next Higher Point: Two Novel Approaches for Computing Natural Visibility Graphs

Autores
Daniel, P; Silva, VF; Ribeiro, P;

Publicação
Studies in Computational Intelligence

Abstract
With the huge amount of data that has been collected over time, many methods are being developed to allow better understanding and forecasting in several domains. Time series analysis is a powerful tool to achieve this goal. Despite being a well-established area, there are some gaps, and new methods are emerging to overcome these limitations, such as visibility graphs. Visibility graphs allow the analyses of times series as complex networks and make possible the use of more advanced techniques from another well-established area, network science. In this paper, we present two new efficient approaches for computing natural visibility graphs from times series, one for online scenarios in O(nlogn) and the other for offline scenarios in O(nm), the latter taking advantage of the number of different values in the time series (m). © The Author(s), under exclusive license to Springer Nature Switzerland AG 2025.

2025

On Exploring Safe Memory Reclamation Methods with a Simplified Lock-Free Hash Map Design

Autores
Moreno, P; Areias, M; Rocha, R;

Publicação
Lecture Notes in Computer Science - Euro-Par 2024: Parallel Processing Workshops

Abstract

2025

Extending the Quantitative Pattern-Matching Paradigm

Autores
Alves, S; Kesner, D; Ramos, M;

Publicação
PROGRAMMING LANGUAGES AND SYSTEMS, APLAS 2024

Abstract
We show how (well-established) type systems based on non-idempotent intersection types can be extended to characterize termination properties of functional programming languages with pattern matching features. To model such programming languages, we use a (weak and closed) lambda-calculus integrating a pattern matching mechanism on algebraic data types (ADTs). Remarkably, we also show that this language not only encodes Plotkin's CBV and CBN lambda-calculus as well as other subsuming frameworks, such as the bang-calculus, but can also be used to interpret the semantics of effectful languages with exceptions. After a thorough study of the untyped language, we introduce a type system based on intersection types, and we show through purely logical methods that the set of terminating terms of the language corresponds exactly to that of well-typed terms. Moreover, by considering non-idempotent intersection types, this characterization turns out to be quantitative, i.e. the size of the type derivation of a term t gives an upper bound for the number of evaluation steps from t to its normal form.

2025

Geo-Indistinguishability

Autores
Mendes, R; Vilela, P;

Publicação
Encyclopedia of Cryptography, Security and Privacy, Third Edition

Abstract
[No abstract available]

  • 2
  • 201