Cookies
O website necessita de alguns cookies e outros recursos semelhantes para funcionar. Caso o permita, o INESC TEC irá utilizar cookies para recolher dados sobre as suas visitas, contribuindo, assim, para estatísticas agregadas que permitem melhorar o nosso serviço. Ver mais
Aceitar Rejeitar
  • Menu
Publicações

Publicações por CRACS

2019

Performance of Hash Functions in Blockchain Applied to IoT Devices

Autores
Ferreira, J; Zhygulskyy, M; Antunes, M; Frazao, L;

Publicação
2019 14TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI)

Abstract
The IoT (Internet of Things) is a network composed of several devices (things) connected to the Internet and to each other. IoT services are increasingly growing and are allowing companies to deploy scalable solutions with reduced costs and instantaneous data access. These solutions require seamless authentication, data privacy, security, robustness against attacks, easy deployment, and self- maintenance. Such requirements can be given to a company's IoT solution by applying blockchain technology. This paper analyzes the blockchain technology and the advantages and challenges behind its implementation in an IoT environment. A blockchain in IoT scenario was developed to evaluate the performance of different cryptographic hash functions in the IoT device RaspberryPi. Conclusions were drawn when it comes to the viability of some hash functions mainly based on the low resource characteristic shared by the IoT devices, which compromises the performance of the hash function.

2019

Knowledge Representation of Crime-Related Events: a Preliminary Approach

Autores
Carnaz, G; Nogueira, VB; Antunes, M;

Publicação
8th Symposium on Languages, Applications and Technologies, SLATE 2019, June 27-28, 2019, Coimbra, Portugal.

Abstract
The crime is spread in every daily newspaper, and particularly on criminal investigation reports produced by several Police departments, creating an amount of data to be processed by Humans. Other research studies related to relation extraction (a branch of information retrieval) in Portuguese arisen along the years, but with few extracted relations and several computer methods approaches, that could be improved by recent features, to achieve better performance results. This paper aims to present the ongoing work related to SEM (Simple Event Model) ontology population with instances retrieved from crime-related documents, supported by an SVO (Subject, Verb, Object) algorithm using hand-crafted rules to extract events, achieving a performance measure of 0.86 (F-Measure). © Gonçalo Carnaz, Vitor Beires Nogueira, and Mário Antunes.

2019

Using Grover's search quantum algorithm to solve Boolean satisfiability problems: Part I

Autores
Fernandes, D; Dutra, I;

Publicação
ACM Crossroads

Abstract

2019

Characterizing Bipolar Disorder-Associated Single Nucleotide Polymorphisms in a Large British Cohort Using Association Rules

Autores
Pinheira, A; Silva Dias, Rd; Nascimento, C; Dutra, I;

Publicação
Computational Intelligence Methods for Bioinformatics and Biostatistics - 16th International Meeting, CIBB 2019, Bergamo, Italy, September 4-6, 2019, Revised Selected Papers

Abstract
Bipolar Disorder (BD) is chronic and severe psychiatric illness presenting with mood alterations, including manic, hypomanic and depressive episodes. Due to the high clinical heterogeneity and lack of biological validation, both BD treatment and diagnostic are still problematic. Patients and clinicians would benefit from better clinical and biological characterization, ultimately opening a new possibility to distinct forms of treatment. In this context, we studied genome wide association (GWA) data from the Wellcome Trust Case Control Consortium (WTCCC). After an exploratory analysis, we found a higher prevalence of homozygous compared with heterozygous in different single nucleotide polymorphisms (SNPs) in genes previously associated with BD risk. Results from our association rules analysis indicate that there is a group of patients presenting with different groups of genotypes, including pairs or triples, while others present only one. We performed the same analysis with a control group from the same cohort (WTCCC) and found that although healthy subjects may present the same SNPs combinations, the risky alleles occur in a lower frequency. Moreover, no subject in the control group presented the same pairs or triples of genotypes found in the BD group, and if a pair or triple is found, the support and confidence are lower than in the BD group (< 50 %). © Springer Nature Switzerland AG 2020.

2019

Using Grover's search quantum algorithm to solve Boolean satisfiability problems, part 2

Autores
Fernandes, D; Silva, C; Dutra, I;

Publicação
ACM Crossroads

Abstract

2019

Reputation-Based Security System For Edge Computing

Autores
Nwebonyi, FN; Martins, R; Correia, ME;

Publicação
13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018)

Abstract
Given the centralized architecture of cloud computing, there is a genuine concern about its ability to adequately cope with the demands of connecting devices which are sharply increasing in number and capacity. This has led to the emergence of edge computing technologies, including but not limited to mobile edge-clouds. As a branch of Peer-to-Peer (P2P) networks, mobile edge-clouds inherits disturbing security concerns which have not been adequately addressed in previous methods. P2P security systems have featured many trust-based methods owing to their suitability and cost advantage, but these approaches still lack in a number of ways. They mostly focus on protecting client nodes from malicious service providers, but downplay the security of service provider nodes, thereby creating potential loopholes for bandwidth attack. Similarly, trust bootstrapping is often via default scores, or based on heuristics that does not reflect the identity of a newcomer. This work has patched these inherent loopholes and improved fairness among participating peers. The use cases of mobile edge-clouds have been particularly considered and a scalable reputation based security mechanism was derived to suit them. BitTorrent protocol was modified to form a suitable test bed, using Peersim simulator. The proposed method was compared to some related methods in the literature through detailed simulations. Results show that the new method can foster trust and significantly improve network security, in comparison to previous similar systems.

  • 59
  • 201