2026
Autores
Tabosa, C; Salgado, M; Leite, D; Cunha, A;
Publicação
Procedia Computer Science
Abstract
2026
Autores
Fernandes, P; Ciardhuáin, SO; Antunes, M;
Publicação
PATTERN RECOGNITION AND IMAGE ANALYSIS, IBPRIA 2025, PT I
Abstract
The increasing connectivity of Internet of Medical Things (IoMT) devices has accentuated their susceptibility to cyberattacks. The sensitive data they handle makes them prime targets for information theft and extortion, while outdated and insecure communication protocols further elevate security risks. This paper presents a lightweight and innovative approach that combines Benford's law with statistical distance functions to detect attacks in IoMT devices. The methodology uses Benford's law to analyze digit frequency and classify IoMT devices traffic as benign or malicious, regardless of attack type. It employs distance-based statistical functions like Jensen-Shannon divergence, KullbackLeibler divergence, Pearson correlation, and the Kolmogorov test to detect anomalies. Experimental validation was conducted on the CIC-IoMT-2024 benchmark dataset, comprising 45 features and multiple attack types. The best performance was achieved with the Kolmogorov test (alpha = 0.01), particularly in DoS ICMP attacks, yielding a precision of.99.24%, a recall of.98.73%, an F1 score of.98.97%, and an accuracy of.97.81%. Jensen-Shannon divergence also performed robustly in detecting SYN-based attacks, demonstrating strong detection with minimal computational cost. These findings confirm that Benford's law, when combined with well-chosen statistical distances, offers a viable and efficient alternative to machine learning models for anomaly detection in constrained environments like IoMT.
2026
Autores
Costa, T; Castro, J; Salgado, M; Cunha, A;
Publicação
Procedia Computer Science
Abstract
2026
Autores
Pilarski, L; Silva, T; Filipe, V; Pinto, T; Barroso, J; Oliveira, AS; Lima, J;
Publicação
Lecture Notes in Networks and Systems
Abstract
This article presents a real-time object detection and distance estimation system implemented on a low-cost platform. The system uses a Raspberry Pi 5 and two cameras in a stereoscopic configuration to capture pairs of images. Object detection is performed using YOLO neural networks and distance estimation is based on the disparity between the centers of the detected bounding boxes. The system is evaluated in terms of detection performance, inference speed and depth estimation accuracy. Three YOLO models (YOLOv8n, YOLO11n and YOLO12n) are tested at different resolutions. Among them, the YOLO11n with a resolution of 320×320 achieves the best balance between processing speed and detection quality in stereoscopic operation. The system has a low error in depth estimation at close range, with absolute errors of less than 1.2 cm up to 60 cm. At greater distances, accuracy is affected by the reduction in the size of the bounding box, which limits the reliability of the disparity. Possible improvements include using segmentation-based localization and optimizing the stereo configuration. The proposed system is suitable for short-range applications in controlled environments and serves as a basis for future improvements in embedded vision systems. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2026.
2026
Autores
de Sousa, PR; Bronzo, M; Torres, NT Jr; Vivaldini, M; Simoes, AC; de Jesus, TS; Couto, G;
Publicação
OPERATIONS MANAGEMENT RESEARCH
Abstract
As collaborative robots increasingly redefine industrial automation, understanding the factors that drive their adoption is essential to operations management. This study examines the main drivers of collaborative robot adoption in the Brazilian manufacturing sector by combining theory-driven framing with a machine learning classification approach. It was developed a Random Forest classifier to identify the strongest predictors of cobot adoption and to rank their relative importance. Data were collected from a sample of respondents-primarily managers and chief executive officers-representing 300 industrial companies. Grounded in the Technology-Organization-Environment (TOE) framework and complemented by Diffusion of Innovations (DoI) and Institutional (INT) perspectives, the analysis shows that technological advantages, namely space efficiency, cost reduction, and ease of integration, are critical drivers of adoption. Organizational factors, including proactive managerial involvement and alignment with an innovation-oriented culture, significantly increase the likelihood of collaborative robot uptake. The model demonstrated robust predictive performance and produced interpretable variable importance scores that confirm the relative influence of technological and managerial factors. These findings provide a structured lens for understanding and guiding managerial decision-making on cobot adoption and translate into practical recommendations for managers.
2026
Autores
Palma, A; Antunes, M; Alves, A;
Publicação
PATTERN RECOGNITION AND IMAGE ANALYSIS, IBPRIA 2025, PT I
Abstract
Ensuring the security of Industrial Control Systems (ICS) is increasingly critical due to increasing connectivity and cyber threats. Traditional security measures often fail to detect evolving attacks, necessitating more effective solutions. This paper evaluates machine learning (ML) methods for ICS cybersecurity, using the ICS-Flow dataset and Optuna for hyperparameter tuning. The selected models, namely Random Forest (RF), AdaBoost, XGBoost, Deep Neural Networks, Artificial Neural Networks, ExtraTrees (ET), and Logistic Regression, are assessed using macro-averaged F1-score to handle class imbalance. Experimental results demonstrate that ensemble-based methods (RF, XGBoost, and ET) offer the highest overall detection performance, particularly in identifying commonly occurring attack types. However, minority classes, such as IP-Scan, remain difficult to detect accurately, indicating that hyperparameter tuning alone is insufficient to fully deal with imbalanced ICS data. These findings highlight the importance of complementary measures, such as focused feature selection, to enhance classification capabilities and protect industrial networks against a wider array of threats.
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.