Cookies
O website necessita de alguns cookies e outros recursos semelhantes para funcionar. Caso o permita, o INESC TEC irá utilizar cookies para recolher dados sobre as suas visitas, contribuindo, assim, para estatísticas agregadas que permitem melhorar o nosso serviço. Ver mais
Aceitar Rejeitar
  • Menu
Publicações

Publicações por CRACS

2017

The present and future of privacy-preserving computation in fog computing

Autores
Sousa, PR; Antunes, L; Martins, R;

Publicação
Fog Computing in the Internet of Things: Intelligence at the Edge

Abstract

2017

FOSTERING EFFICIENT LEARNING IN THE TECHNICAL FIELD OF ROBOTICS BY CHANGING THE AUTONOMOUS DRIVING COMPETITION OF THE PORTUGUESE ROBOTICS OPEN

Autores
Costa, V; Resende, J; Sousa, P; Sousa, A; Lau, N; Reis, L;

Publicação
10TH INTERNATIONAL CONFERENCE OF EDUCATION, RESEARCH AND INNOVATION (ICERI2017)

Abstract
Autonomous Vehicles are a topic of important research, also being visually appealing to the public and attractive to educators and researchers. The autonomous driving competition in the Portuguese Robotics Open tries to take advantage of this context but concerns arise from lack of participators. Participants mention the complexity of issues related to the challenge, the space occupied for the track and the budget needed for participation. This paper takes advantage of a realistic simulator under Gazebo/ROS, studies a new track design and proposes a change in the track. The analysis presented tries to ascertain if the new design facilitates the learning process that is intended for participants while keeping visual appeal for both the general public and the participants. The proposed setup for the rules and simulator is expected to address the mentioned concerns. The rule's modification and simulator are evaluated and tested, hinting that expected learning outcomes are encouraged and the track occupied area is reduced. Learning includes mobile robotics (discrete event system and continuous control), real time artificial image vision systems (2D at image recognition and processing of real world imagery seen in 3D perspective), general real world robotics such as mechanics, control, programming, batteries, systems thinking as well as transversal skills such as team cooperation, soft skills, etc. Shown results hint that the new track and realistic simulation are promising to foster learning and hopefully attract more competing teams.

2017

Collection of State Information in Live Digital Forensics

Autores
Freitas, F; Pinto, A;

Publicação
AMBIENT INTELLIGENCE- SOFTWARE AND APPLICATIONS- 8TH INTERNATIONAL SYMPOSIUM ON AMBIENT INTELLIGENCE (ISAMI 2017)

Abstract
In a digital forensic investigations, the investigator usually wants to get as much state information as possible. Examples of such scenarios are households with wireless networks connecting multiple devices where a security incident occurs. USB devices present themselves as interesting vehicles for the automated collection of state information, as it can store the applications that collect the information, can store the results and can also facilitate the information collection by enabling its automatic operation. This paper proposes a USB solution to facilitate the collection of state information with integrity guarantees and multi-platform operation. Moreover, the proposed solutions is the only one that performs an extensive and homogeneous artifact collection, independently of the underlying operating system.

2017

MuSec: Sonification of Alarms Generated by a SIEM

Autores
Sousa, L; Pinto, A;

Publicação
AMBIENT INTELLIGENCE- SOFTWARE AND APPLICATIONS- 8TH INTERNATIONAL SYMPOSIUM ON AMBIENT INTELLIGENCE (ISAMI 2017)

Abstract
The information generated by a network monitoring system is overwhelming. Monitoring is imperative but very difficult to accomplish due to several reasons. More so for the case of non tech-savvy home users. Security Information Event Management applications generate alarms that correlate multiple occurrences on the network. These events are classified accordingly to their risk. An application that allows the sonification of events generated by a Security Information Event Management can facilitate the security monitoring of a home network by a less tech-savvy user by allowing him to just listen to the result of the sonification of such events.

2017

Online Conversation Application with Confidentiality, Anonymity, and Identity Requirements

Autores
Fernandes, P; Pinto, A;

Publicação
AMBIENT INTELLIGENCE- SOFTWARE AND APPLICATIONS- 8TH INTERNATIONAL SYMPOSIUM ON AMBIENT INTELLIGENCE (ISAMI 2017)

Abstract
The increase in usage of smartphones and the ubiquity of Internet access have made mobile communications services very attractive to users. Messaging services are among the most popular services on the Internet. In recent years, this services started to support confidentiality and anonymity. A recurrent problem with the existing messaging solutions is their lack of resistance to impersonation attacks. The proposed solution addresses the impersonation problem, without neglecting user confidentiality and anonymity, by forcing users to exchange the required cryptographic material among themselves. Moreover, this exchange must use a proximity communication technology, forcing the users to physically meet.

2017

Anomaly Detection in Roads with a Data Mining Approach

Autores
Silva, N; Soares, J; Shah, V; Santos, MY; Rodrigues, H;

Publicação
CENTERIS 2017 - INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS / PROJMAN 2017 - INTERNATIONAL CONFERENCE ON PROJECT MANAGEMENT / HCIST 2017 - INTERNATIONAL CONFERENCE ON HEALTH AND SOCIAL CARE INFORMATION SYSTEMS AND TECHNOLOGIES, CENTERI

Abstract
Road condition has an important role in our daily live. Anomalies in road surface can cause accidents, mechanical failure, stress and discomfort in drivers and passengers. Governments spend millions each year in roads maintenance for maintaining roads in good condition. But extensive maintenance work can lead to traffic jams, causing frustration in road users. In way to avoid problems caused by road anomalies, we propose a system that can detect road anomalies using smartphone sensors. The approach is based in data-mining algorithms to mitigate the problem of hardware diversity. In this work we used scikit-learn, a python module, and Weka, as tools for data-mining. All cleaning data process was made using python language. The fmal results show that it is possible detect road anomalies using only a smartphone. (C) 2017 The Authors. Published by Elsevier B.V.

  • 87
  • 201