2024
Autores
Lopes, J; Partida, A; Pinto, P; Pinto, A;
Publicação
OPTIMIZATION, LEARNING ALGORITHMS AND APPLICATIONS, PT I, OL2A 2023
Abstract
Information systems depend on security mechanisms to detect and respond to cyber-attacks. One of the most frequent attacks is the Distributed Denial of Service (DDoS): it impairs the performance of systems and, in the worst case, leads to prolonged periods of downtime that prevent business processes from running normally. To detect this attack, several supervised Machine Learning (ML) algorithms have been developed and companies use them to protect their servers. A key stage in these algorithms is feature pre-processing, in which, input data features are assessed and selected to obtain the best results in the subsequent stages that are required to implement supervised ML algorithms. In this article, an innovative approach for feature selection is proposed: the use of Visibility Graphs (VGs) to select features for supervised machine learning algorithms used to detect distributed DoS attacks. The results show that VG can be quickly implemented and can compete with other methods to select ML features, as they require low computational resources and they offer satisfactory results, at least in our example based on the early detection of distributed DoS. The size of the processed data appears as the main implementation constraint for this novel feature selection method.
2016
Autores
Pereira, C; Rodrigues, J; Pinto, A; Rocha, P; Santiago, F; Sousa, J; Aguiar, A;
Publicação
2016 23RD INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT)
Abstract
Smart Cities are a key application domain for the Internet of Things (IoT), and it is coming nearer everyday through pilot trials and deployments in various cities around the world. In Porto, Portugal, a city-wide IoT Living Lab emerged after we deployed several testbeds, e.g. harbour and a city-scale vehicular networks, and carried out various experiments with the SenseMyCity crowdsensor. In this paper, we discuss how a standard Machine-to-Machine (M2M) middleware is a key enabler of our e-health platform and SenseMyCity crowdsensor, powered by the use of smartphones as M2M gateways. M2M standards provided by ETSI/oneM2M are essential for a paradigm shift, aiming at making the IoT truly interoperable without the need for human intervention. In this work, we map two applications that rely on the role of a smartphone as a gateway, which acts as a proxy to connect legacy devices to the IoT using a standard middleware. We illustrate the advantages of using M2M, and, as a proof-of-concept, we measure and quantify the energy savings obtained, showing improvements of smartphones' battery life.
2023
Autores
Masouros, D; Soudris, D; Gardikis, G; Katsarou, V; Christopoulou, M; Xilouris, G; Ramón, H; Pastor, A; Scaglione, F; Petrollini, C; Pinto, A; Vilela, JP; Karamatskou, A; Papadakis, N; Angelogianni, A; Giannetsos, T; García Villalba, LJ; Alonso López, JA; Strand, M; Grov, G; Bikos, AN; Ramantas, K; Santos, R; Silva, F; Tsampieris, N;
Publicação
SAMOS
Abstract
The advent of 6G networks is anticipated to introduce a myriad of new technology enablers, including heterogeneous radio, RAN softwarization, multi-vendor deployments, and AI-driven network management, which is expected to broaden the existing threat landscape, demanding for more sophisticated security controls. At the same time, privacy forms a fundamental pillar in the EU development activities for 6G. This decentralized and globally connected environment necessitates robust privacy provisions that encompass all layers of the network stack. In this paper, we present PRIVATEER’s approach for enabling “privacy-first” security enablers for 6G networks. PRIVATEER aims to tackle four major privacy challenges associated with 6G security enablers, i.e., i) processing of infrastructure and network usage data, ii) security-aware orchestration, iii) infrastructure and service attestation and iv) cyber threat intelligence sharing. PRIVATEER addresses the above by introducing several innovations, including decentralised robust security analytics, privacy-aware techniques for network slicing and service orchestration and distributed infrastructure and service attestation mechanisms.
2021
Autores
Pinto, A; Correia, A; Alves, R; Matos, P; Ascensão, J; Camelo, D;
Publicação
MobiHealth
Abstract
For the regularly medicated population, the management of the posology is of utmost importance. With increasing average life expectancy, people tend to become older and more likely to have chronic medical disorders, consequently taking more medicines. This is predominant in the older population, but it’s not exclusive to this generation. It’s a common problem for all those suffering from chronic diseases, regardless of age group. Performing a correct management of the medicines stock, as well as, taking them at the ideal time, is not always easy and, in some cases, the diversity of medicines needed to treat a particular medical disorder is a proof of that. Knowing what to take, how much to take, and ensuring compliance with the medication intervals, for each medication in use, becomes a serious problem for those who experience this reality. The situation is aggravated when the posology admits variable amounts, intervals, and combinations depending on the patient’s health condition. This paper presents a solution that optimizes the management of medication of users who use the services of institutions that provide health care to the elderly (e.g., day care centers or nursing homes). Making use of the NB-IoT network, artificial intelligence algorithms, a set of sensors and an Arduino MKR NB 1500, this solution, in addition to the functionalities already described, eHealthCare also has mechanisms that allow identifying the non-adherence to medication by the elderly.
2023
Autores
Melo, R; Pinto, P; Pinto, A;
Publicação
BLOCKCHAIN
Abstract
2023
Autores
Silva, T; Paiva, S; Pinto, P; Pinto, A;
Publicação
IWSSIP
Abstract
Nowadays, Virtual Reality (VR) and Augmented Reality (AR) systems are not exclusively associated with the gaming industry. Their potential is also useful for other business areas such as healthcare, automotive, and educational domains. Companies need to accompany technological advances and enhance their business processes and thus, the adoption of VR or AR technologies could be advantageous in reducing resource usage or improving the overall efficiency of processes. However, before implementing these technologies, companies must be aware of potential cyberattacks and security risks to which these systems are subject. This study presents a survey of attacks related to VR and AR scenarios and their risk assessment when considering healthcare, automation, education, and gaming industries. The main goal is to make companies aware of the possible cyberattacks that can affect the devices and their impact on their business domain.
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.