Cookies
O website necessita de alguns cookies e outros recursos semelhantes para funcionar. Caso o permita, o INESC TEC irá utilizar cookies para recolher dados sobre as suas visitas, contribuindo, assim, para estatísticas agregadas que permitem melhorar o nosso serviço. Ver mais
Aceitar Rejeitar
  • Menu
Publicações

Publicações por HumanISE

2024

Roadmap Proposal for the Implementation of Business Intelligence Systems in Higher Education Institutions

Autores
Sequeira, N; Reis, A; Branco, F; Alves, P;

Publicação
SMART BUSINESS TECHNOLOGIES, ICSBT 2023

Abstract
Nowadays, Higher Education Institutions (HEIs) are faced with the crucial challenge of establishing and supervising strategies and policies that are essential for decisions in various areas and at various levels. Within this context, the importance of Business Intelligence (BI) has increased significantly, emerging as an essential tool for analysing and managing data. This BI capability enables HEIs to make more informed choices in line with their global strategies. This research focuses on developing a roadmap for the effective implementation of BI systems in HEIs. Using a Design Science Research (DSR) methodology, this work proposes a structured and adaptable roadmap that covers the key factors from the design to the implementation of BI systems in HEIs. This roadmap includes not only a reference architecture for BI systems but also a set of dashboards. The roadmap was validated through a case study at the University of Tras-os-Montes e Alto Douro (UTAD), involving exploratory analysis and feedback from experts. This study stands out for its practical and theoretical approach, offering a strategic and practical guide for the adoption of BI systems in HEIs, thus responding to a need identified in the academic literature.

2024

Enhancing IoT Security in Vehicles: A Comprehensive Review of AI-Driven Solutions for Cyber-Threat Detection

Autores
Abreu, R; Simao, E; Serôdio, C; Branco, F; Valente, A;

Publicação
AI

Abstract
Background: The Internet of Things (IoT) has improved many aspects that have impacted the industry and the people's daily lives. To begin with, the IoT allows communication to be made across a wide range of devices, from household appliances to industrial machinery. This connectivity allows for a better integration of the pervasive computing, making devices smart and capable of interacting with each other and with the corresponding users in a sublime way. However, the widespread adoption of IoT devices has introduced some security challenges, because these devices usually run in environments that have limited resources. As IoT technology becomes more integrated into critical infrastructure and daily life, the need for stronger security measures will increase. These devices are exposed to a variety of cyber-attacks. This literature review synthesizes the current research of artificial intelligence (AI) technologies to improve IoT security. This review addresses key research questions, including: (1) What are the primary challenges and threats that IoT devices face?; (2) How can AI be used to improve IoT security?; (3) What AI techniques are currently being used for this purpose?; and (4) How does applying AI to IoT security differ from traditional methods? Methods: We included a total of 33 peer-reviewed studies published between 2020 and 2024, specifically in journal and conference papers written in English. Studies irrelevant to the use of AI for IoT security, duplicate studies, and articles without full-text access were excluded. The literature search was conducted using scientific databases, including MDPI, ScienceDirect, IEEE Xplore, and SpringerLink. Results were synthesized through a narrative synthesis approach, with the help of the Parsifal tool to organize and visualize key themes and trends. Results: We focus on the use of machine learning, deep learning, and federated learning, which are used for anomaly detection to identify and mitigate the security threats inherent to these devices. AI-driven technologies offer promising solutions for attack detection and predictive analysis, reducing the need for human intervention more significantly. This review acknowledges limitations such as the rapidly evolving nature of IoT technologies, the early-stage development or proprietary nature of many AI techniques, the variable performance of AI models in real-world applications, and potential biases in the search and selection of articles. The risk of bias in this systematic review is moderate. While the study selection and data collection processes are robust, the reliance on narrative synthesis and the limited exploration of potential biases in the selection process introduce some risk. Transparency in funding and conflict of interest reporting reduces bias in those areas. Discussion: The effectiveness of these AI-based approaches can vary depending on the performance of the model and the computational efficiency. In this article, we provide a comprehensive overview of existing AI models applied to IoT security, including machine learning (ML), deep learning (DL), and hybrid approaches. We also examine their role in enhancing the detection accuracy. Despite all the advances, challenges still remain in terms of data privacy and the scalability of AI solutions in IoT security. Conclusion: This review provides a comprehensive overview of ML applications to enhance IoT security. We also discuss and outline future directions, emphasizing the need for collaboration between interested parties and ongoing innovation to address the evolving threat landscape in IoT security.

2024

A Scoping Review of the Use of Blockchain and Machine Learning in Medical Imaging Applications

Autores
Pavao, J; Bastardo, R; Rocha, NP;

Publicação
GOOD PRACTICES AND NEW PERSPECTIVES IN INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 2, WORLDCIST 2024

Abstract
This scoping review systematizes the current research related to the use of both blockchain and machine learning techniques in medical imaging applications. A systematic electronic search was performed, and twenty-five studies were included in the review. These studies aimed to use blockchain and machine learning techniques to provide (i) efficient security mechanisms to support the communication of medical imaging data, (ii) aggregation of distributed medical imaging data to train machine learning algorithms, and (iii) machine learning algorithms based on federated learning strategies. Among the ten machine learning techniques identified in the included studies, Convolutional Neural Network was the most representative (i.e., 44% of the studies). Moreover, Artificial Neural Network, Capsule Network, Deep Neural Network, Gated Recurrent Units, and Neural Network were machine learning techniques used by more than one study. Although the included studies developed algorithms with potential impact in clinical practice, it must be noted that they did not discuss the generalizability of their algorithms in real-world clinical conditions.

2024

Cyber Resilience of Cyber-Physical Systems and Machine Learning, a Scoping Review

Autores
Pavão, J; Bastardo, R; Rocha, NP;

Publicação
Lecture Notes in Networks and Systems

Abstract
The scoping review reported by this paper aimed to analyze and synthesize state-of-the-art studies focused on the application of machine learning methods to enhance the cyber resilience of cyber-physical systems. An electronic search was conducted, and 24 studies were included in this review after the selection process. The most representative application domains were computer networks and power systems, while in terms of cyber resilience functions, risk identification, risk mitigation or protection, and detection of anomalous situations were the most implemented functions. Moreover, the results of this scoping review show that the interest in the topic of cyber resilience and machine learning is quite recent, which justifies the heterogeneity of the included studies in terms of machine learning methods and datasets being used for the experimental validations, as well as in terms of outcomes being measured. © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024.

2024

Integrating Virtual Reality in Cognitive Training of Older Adults Without Cognitive Impairment: A Systematic Review of Randomized Controlled Trials

Autores
Pavão, J; Bastardo, R; da Rocha, NP;

Publicação
Proceedings of the 10th International Conference on Information and Communication Technologies for Ageing Well and e-Health, ICT4AWE 2024, Angers, France, April 28-30, 2024.

Abstract
This article aimed to analyse state-of-the-art empirical evidence of randomized controlled trials designed to assess preventive cognitive training interventions based on virtual reality for older adults without cognitive impairment, by identifying virtual reality setups and tasks, clinical outcomes and respective measurement instruments, and positive effects on outcome parameters. A systematic electronic search was performed, and six randomized controlled trials were included in the systematic review. In terms of results, the included studies pointed to significant positive impact of virtual reality-based cognitive training interventions on global cognition, memory, attention, information processing speed, walking variability, balance, muscle strength, and falls. However, further research is required to evaluate the adequacy of the virtual reality setups and tasks, to study the impact of the interventions’ duration and intensity, to understand how to tailor the interventions to the characteristics and needs of the individuals, and to compare face-to-face to remote interventions. © 2024 by SCITEPRESS – Science and Technology Publications, Lda.

2024

Cyber-Resilience in the Context of National Security and Defense; [Ciber-Resiliência no Contexto da Segurança e Defesa Nacionais]

Autores
Pavão, J; Bastardo, R; Carreira, D; Rocha, NP;

Publicação
RISTI - Revista Iberica de Sistemas e Tecnologias de Informacao

Abstract
Cyber-resilience is a relatively recent concept that, in essence, adds risk management to the cybersecurity concept and extends the scope of its action to processes and people, in addition to the technological component. It aims to ensure that organizations, systems, and especially critical infrastructures of our society function properly regardless of their dependence on cybernetic resources that may be affected by adverse events. Considering that the ongoing digital transition increases the exposure of such infrastructures to physical and cyberspace threats, this article reports on an exploratory study supported by bibliographical research, which aimed to analyze recent scientific publications to determine the relevance of cyber-resilience in the context of national security and defense. Although the number of publications focused on cyber-resilience is still relatively reduced when compared to the number of publications related to cybersecurity, there is a growing interest in exploring cyber-resilience in areas such as international relations, internal security, and national defense, which are fundamental pillars of the security and defense of States. © 2024, Associacao Iberica de Sistemas e Tecnologias de Informacao. All rights reserved.

  • 65
  • 686