2022
Autores
Queiroz, S; Vilela, JP; Monteiro, E;
Publicação
IEEE ACCESS
Abstract
In this paper, we study the impact of computational complexity on the throughput limits of the fast Fourier transform (FFT) algorithm for orthogonal frequency division multiplexing (OFDM) waveforms. Based on the spectro-computational complexity (SC) analysis, we verify that the complexity of an N-point FFT grows faster than the number of bits in the OFDM symbol. Thus, we show that FFT nullifies the OFDM throughput on N unless the N -point discrete Fourier transform (DFT) problem verifies as Omega(N) , which remains a fascinating open question in theoretical computer science. Also, because FFT demands N to be a power of two 2(i) (i > 0), the spectrum widening leads to an exponential complexity on i , i.e. O (2(i)i) . To overcome these limitations, we consider the alternative frequency-time transform formulation of vector OFDM (V-OFDM), in which an N -point FFT is replaced by N/L (L > 0) smaller L-point FFTs to mitigate the cyclic prefix overhead of OFDM. Building on that, we replace FFT by the straightforward DFT algorithm to release the V-OFDM parameters from growing as powers of two and to benefit from flexible numerology (e.g., L = 3 , N = 156). Besides, by setting L to Theta (1) , the resulting solution can run linearly on N (rather than exponentially on i) while sustaining a non null throughput as N grows.
2022
Autores
Mendes, R; Cunha, M; Vilela, JP; Beresford, AR;
Publicação
COMPUTER SECURITY - ESORICS 2022, PT I
Abstract
The multitude of applications and security configurations of mobile devices requires automated approaches for effective user privacy protection. Current permission managers, the core mechanism for privacy protection in smartphones, have shown to be ineffective by failing to account for privacy's contextual dependency and personal preferences within context. In this paper we focus on the relation between privacy decisions (e.g. grant or deny a permission request) and their surrounding context, through an analysis of a real world dataset obtained in campaigns with 93 users. We leverage such findings and the collected data to develop methods for automated, personalized and context-aware privacy protection, so as to predict users' preferences with respect to permission requests. Our analysis reveals that while contextual features have some relevance in privacy decisions, the increase in prediction performance of using such features is minimal, since two features alone are capable of capturing a relevant effect of context changes, namely the category of the requesting application and the requested permission. Our methods for prediction of privacy preferences achieved an F1 score of 0.88, while reducing the number of privacy violations by 28% when compared to the standard Android permission manager.
2021
Autores
Araújo, R; Pinto, A;
Publicação
J. Cybersecur. Priv.
Abstract
2021
Autores
Araújo, R; Pinto, A; Pinto, P;
Publicação
SEC
Abstract
Vulnerability scanning tools can help secure the computer networks of organisations. Triggered by the release of the Tsunami vulnerability scanner by Google, the authors analysed and compared the commonly used, free-to-use vulnerability scanners. The performance, accuracy and precision of these scanners are quite disparate and vary accordingly to the target systems. The computational, memory and network resources required be these scanners also differ. We present a recent and detailed comparison of such tools that are available for use by organisations with lower resources such as small and medium-sized enterprises.
2021
Autores
Fernandes, R; Pinto, P; Pinto, A;
Publicação
2021 IEEE INTERNATIONAL MEDITERRANEAN CONFERENCE ON COMMUNICATIONS AND NETWORKING (IEEE MEDITCOM 2021)
Abstract
The Malware Information Sharing Platform (MISP) enables the sharing of cyberthreat information within a community, company or organisation. However, this platform presents limitations if its information is deemed as classified or shared only for a given period of time. This implies that this information should to be handled only in encrypted form. One solution is to use MISP with searchable encryption techniques to impose greater control over the sharing of information. In this paper, we propose a controlled information sharing functionality that features a synchronisation procedure that enables classified data exchange between MISP instances, based on policies and ensuring the required confidentiality and integrity of the shared data. Sequence charts are presented validating the configuration, the data synchronisation, and the data searching between multiple entities.
2021
Autores
Pinto, A; Correia, A; Alves, R; Matos, P; Ascensão, J; Camelo, D;
Publicação
MobiHealth
Abstract
For the regularly medicated population, the management of the posology is of utmost importance. With increasing average life expectancy, people tend to become older and more likely to have chronic medical disorders, consequently taking more medicines. This is predominant in the older population, but it’s not exclusive to this generation. It’s a common problem for all those suffering from chronic diseases, regardless of age group. Performing a correct management of the medicines stock, as well as, taking them at the ideal time, is not always easy and, in some cases, the diversity of medicines needed to treat a particular medical disorder is a proof of that. Knowing what to take, how much to take, and ensuring compliance with the medication intervals, for each medication in use, becomes a serious problem for those who experience this reality. The situation is aggravated when the posology admits variable amounts, intervals, and combinations depending on the patient’s health condition. This paper presents a solution that optimizes the management of medication of users who use the services of institutions that provide health care to the elderly (e.g., day care centers or nursing homes). Making use of the NB-IoT network, artificial intelligence algorithms, a set of sensors and an Arduino MKR NB 1500, this solution, in addition to the functionalities already described, eHealthCare also has mechanisms that allow identifying the non-adherence to medication by the elderly.
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.