This user account status is Approved
Algoritmi | User | Henrique Manuel Dinis Santos

Henrique Manuel Dinis Santos

Henrique Manuel Dinis Santos

At Algoritmi

Integrated Researcher with Dr habil

Member of the IST R&D Group

Member of the IDS R&D Lab

Academic Degree

Dr habil

Current Position

Associate Professor with Habilitation at Escola de Engenharia da Universidade do Minho

Personal Webpage

http://www3.dsi.uminho.pt/hsantos

Personal Email

hsantos@dsi.uminho.pt

Orcid

0000-0001-5389-3285

Researcher ID

B-3004-2008

FCT Public Key

J005081qm88Y

Ciência ID

B618-62ED-57FD

Google Scholar

https://scholar.google.pt/citations?hl=en&user=S9bS-_QAAAAJ

About Me



Cybersecurity in ICT Supply Chains: Key Challenges and a Relevant Architecture

Sensors

2021 | journal-article

Roadmap of Security threats between IPv4/IPv6

2021 | conference-paper

Distributed Architecture to Enhance Systems Protection against Unauthorized Activity via USB Devices

Journal of Sensor and Actuator Networks

2021 | journal-article

Proposing an Architecture for IoT Based on WSN

2021 | book-chapter

Agência da União Europeia para a Cibersegurança (ENISA)

Instituições, Órgão e Organismos da União Europeia, Manuais Universitários

2020 | book-chapter

EDGE4ALL: Edge Computing for Smart City

2020 | book-chapter

Simulator for Smart City Environment

2020 | book-chapter

EDGE4ALL - Edge Platform For Smart City

2019 | conference-paper

International Experiences and the Implications for the Success of Engineering Programs

2019 | conference-paper

Internationalization project to face the uncertainties of work market

2019 | conference-paper

Promoting Creativity in Final Year Engineering Students' Project: A case study in the Smart Cities context

2019 | conference-paper

Study of the Means of Online Payment in the Portuguese Population

2019 | conference-paper

Trends in engineering education: A disruptive view for not so far future

2019 | conference-paper

Work-in-Progress: Global Experiences for Engineering Programs

2019 | book

Automatic human trajectory destination prediction from video

Expert Systems With Applications

2018 | journal-article

Engineering education program promoting the profession

2018 | book

Global perspectives on cybersecurity education

2018 | conference-paper

High quality engineering program achievement

2018 | book

Message from the technical program chairs

2018 | conference-paper

Proposing a behavior-based IDS model for IoT environment

2018 | book

The role of professional associations in contemporaneous engineer careers

2018 | conference-paper

Classical Engineering Education Revisited - Why it Matters

2017 | conference-paper

Challenges and reflections in designing Cyber security curriculum

2017 | conference-paper

Classical engineering education coping with engineering profession demands

Proceedings of the 45th SEFI Annual Conference 2017 - Education Excellence for Sustainability, SEFI 2017

2017 | conference-paper

Classical engineering education revisited - Why it matters

ASEE Annual Conference and Exposition, Conference Proceedings

2017 | conference-paper

Engineering Education: Balancing generalist and specialist formation in technological carriers: A current challenge

EDUNINE 2017 - IEEE World Engineering Education Conference: Engineering Education - Balancing Generalist and Specialist Formation in Technological Carriers: A Current Challenge, Proceedings

2017 | conference-paper

Engineering course specially designed to face retention issue

Proceedings of the 45th SEFI Annual Conference 2017 - Education Excellence for Sustainability, SEFI 2017

2017 | conference-paper

Human skeleton detection from semi-constrained environment video

VISIGRAPP 2017 - Proceedings of the 12th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications

2017 | conference-paper

Knowledge security an empirical use of IT - Child abuse monitor system model

ICT4AWE 2017 - Proceedings of the 3rd International Conference on Information and Communication Technologies for Ageing Well and e-Health

2017 | conference-paper

Pointer dynamics as cognitive biometrics

2016 23 Encontro Portugues de Computacao Grafica e Interacao, EPCGI 2016

2017 | conference-paper

Rethinking engineering education

Proceedings - Frontiers in Education Conference, FIE

2017 | conference-paper

Self-oriented learning based on intelligent systems into the workplace

EDUNINE 2017 - IEEE World Engineering Education Conference: Engineering Education - Balancing Generalist and Specialist Formation in Technological Carriers: A Current Challenge, Proceedings

2017 | conference-paper

Behavioural Biometrics for Authentication and Stress Detection - A Case Study with Children

Global Security, Safety and Sustainability: the Security Challenges of the Connected World, Icgs3 2017

2016 | book-chapter

Evaluating information systems with continuous assurance services

International Journal of Information Systems in the Service Sector

2016 | journal-article

The information value: Perception of the problem

Advances in Intelligent Systems and Computing

2016 | book

What is missing for trust in the Cloud Computing?

SIGMIS-CPR 2016 - Proceedings of the 2016 ACM SIGMIS Conference on Computers and People Research

2016 | conference-paper

A Trust Model for Cloud Computing environment

Proceedings of the 3rd International Conference on Cloud Security and Management (Iccsm-2015)

2015 | book-chapter

An immunity based configuration for multilayer single featured biometric authentication algorithms

Communications in Computer and Information Science

2015 | book

Automatic human action recognition from video using Hidden Markov Model

Proceedings - IEEE 18th International Conference on Computational Science and Engineering, CSE 2015

2015 | conference-paper

Automatic visual detection of human behavior: A review from 2000 to 2014

Expert Systems with Applications

2015 | journal-article

Child abuse monitor system model: A health care critical knowledge monitor system

Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST

2015 | book

Design of a case-based reasoner for information security in military organizations

European Conference on Information Warfare and Security, ECCWS

2015 | conference-paper

Detection of dangerous situations using a smart internet of things system

Advances in Intelligent Systems and Computing

2015 | book

Determinants of behavioral intention to mobile banking in Arab culture

Banking, Finance, and Accounting: Concepts, Methodologies, Tools, and Applications

2015 | book

Enrollment time as a requirement for biometric hand recognition systems

Proceedings of the 10th International Conference on Cyber Warfare and Security, ICCWS 2015

2015 | conference-paper

Insider threats: The major challenge to security risk management

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

2015 | book

Monitoring organizational transactions in enterprise information systems with continuous assurance requirements

International Journal of Enterprise Information Systems

2015 | journal-article

Challenges in Information Security Protection

13th European Conference on Cyber Warfare and Security (ECCWS 2014)

2014 | conference-paper

Child Abuse Monitor System Model: A Health Care Critical Knowledge Monitor System

1st International Conference on IoT Technologies for HealthCare (HealthyIoT)

2014 | conference-paper

Determinants of Behavioral Intention to Mobile Banking in Arab Culture

Research and Design Innovations for Mobile User Experience

2014 | book-chapter

Enrolment Time as a Requirement for Face Recognition Biometric Systems

13th European Conference on Cyber Warfare and Security (ECCWS 2014)

2014 | conference-paper

Enrolment time as a requirement for biometric fingerprint recognition

2014 | journal-article

Free typed text using keystroke dynamics for continuous authentication

2014 | book

Management of internal control mechanisms in ERP for continuous monitoring purposes

Information Systems and Technologies (CISTI), 2014 9th Iberian Conference on

2014 | conference-paper

Planning Method of Information Security for Military Organizations

13th European Conference on Cyber Warfare and Security (ECCWS 2014)

2014 | conference-paper

Security metrics to evaluate organizational IT security

Proceedings of the 8th International Conference on Theory and Practice of Electronic Governance

2014 | other

A study of biometric authentication adoption in health services

2013 | book

An enterprise ontology-based database for continuous monitoring application

2013 | conference-paper

Biometrics Acceptance in Arab Culture: an Exploratory Study

2013 International Conference on Computer Applications Technology (Iccat)

2013 | conference-paper

Determinants of behavioral intention to mobile banking in Arab culture

Research and Design Innovations for Mobile User Experience

2013 | book

Feasibility Study of a Multimodal Biometric Authentication Solution Based on Pointer Dynamics and Skin Conductivity

3rd International Conference on Cybercrime, Security and Digital Forensics

2013 | conference-paper

Health users' perception of biometric authentication technologies

Proceedings of CBMS 2013 - 26th IEEE International Symposium on Computer-Based Medical Systems

2013 | conference-paper

Health users' perception of biometric authentication technologies

Proceedings - IEEE Symposium on Computer-Based Medical Systems

2013 | conference-paper

Information security - Military standards versus ISO 27001: A case study in a Portuguese military organization

European Conference on Information Warfare and Security, ECCWS

2013 | conference-paper

New Technology Acceptance in Europe and Arabic Cultures: Comparative Study

Informing Science & IT Education Conference (InSITE)

2013 | conference-paper

Organizational transactions with real time monitoring and auditing

2013 | journal-article

Password sharing and how to reduce it

IT Policy and Ethics: Concepts, Methodologies, Tools, and Applications

2013 | book

Requirements in an Internet access sharing model

2013 | journal-article

Requisitos para um Sistema Inteligente de Gestão/Análise de Eventos de Segurançada Informação

Proceedings of World Congress on Systems Engineering and Information Technology

2013 | journal-article

Scan detection system using artificial neural networks

European Conference on Information Warfare and Security, ECCWS

2013 | conference-paper

Specialized knowledge systems - A model for intelligent learning management within organizations

2013 | book

The matrix of quality dimensions of knowledge management: Knowledge management assessment models review

2013 | journal-article

User Perception for Biometrics and Secret Management

Proceedings of World Congress on Systems Engineering and Information Technology

2013 | journal-article

User's requirements in Internet access sharing

2013 | book

A solution for real time monitoring and auditing of organizational transactions

2012 | conference-paper

An Ontological Approach to Information Security Management

2012 | conference-paper

An ontology approach in designing security information systems to support organizational security risk knowledge

2012 | conference-paper

Automation of the Approval and Control Process of Documents

2012 | book-chapter

Biometric Graphical Authentication – a Patent Review: New Approaches in the Recognition of Users

2012 | conference-paper

Biometric technologies and their perception by the common citizen

2012 | journal-article

Botnets: A heuristic-based detection framework

2012 | conference-paper

Continuous assurance on organizational transactions

2012 | conference-paper

Critical knowledge monitor system model: Healthcare context

2012 | conference-paper

Framework de Gestão de Segurança da Informação para Organizações Militares Orientada pelos Principais Vetores de Ataque

2012 | conference-paper

Healthcare Critical Knowledge Monitor System Model: Critical Knowledge Ontology Component - topic models approach

2012 | conference-paper

Information security model to military organizations in environment of information warfare

2012 | conference-paper

Keystroke dynamics for continuous access control enforcement

2012 | conference-paper

Modelo de Segurança da Informação para Organizações Militares em Ambiente de Guerra de Informação

2012 | journal-article

Study of the perception on the biometric technology by the Portuguese citizens

2012 | book

Video Casting Application Oriented Key Exchange

2012 | conference-paper

Video casting application oriented key exchange

MMEDIA - International Conferences on Advances in Multimedia

2012 | conference-paper

What is Wrong with Biometrics?

2012 | magazine-article

Wireless Identity Management: Multimodal Biometrics and Multilayered IDM

2012 | book-chapter

Botnet detection: A numerical and heuristic analysis

2011 | conference-paper

Description of a practical application of an information security audit framework

2011 | conference-paper

Estudo da percepção dos utilizadores em relação à utilização de tecnologias de autenticação biométrica no acesso aos serviços de saúde

2011 | conference-paper

Grid Learning Classifiers - A Web Based Interface

2011 | journal-article

Grid data mining by means of learning classifier systems and distributed model induction

2011 | conference-paper

Intrusion detection through keystroke dynamics

2011 | conference-paper

Password Sharing and How to Reduce It

2011 | book-chapter

Sistemas Auto-regulados de Conteúdos Orientados para Contextos de Aprendizagem em Ambiente Profissional

2011 | conference-paper

Supervised Learning Classifier Systems for Grid Data Mining

2011 | book-chapter

A Security Audit Framework to Manage Information System Security

2010 | book-chapter

A conceptual model approach to manage and audit information systems security

2010 | conference-paper

A security framework for audit and manage information system security

2010 | conference-paper

An audit framework to support information system security management

2010 | journal-article

An ontology based approach to semantically structure data in security information systems

2010 | conference-paper

Automation of the Approval and Control Process of Documents

2010 | conference-paper

Cyberwar and the Russian Federation: the usual suspect

2010 | journal-article

GridclassTK- Toolkit for grid learning classifier systems

European Conference of Systems, ECS'10, European Conference of Circuits Technology and Devices, ECCTD'10, European Conference of Communications, ECCOM'10, ECCS'10

2010 | conference-paper

Methods of Organizational Information Security

2010 | book-chapter

Multimodal Biometrics and Multilayered IDM for Secure Authentication

2010 | book-chapter

OTM Machine Acceptance: In the Arab Culture

2010 | book-chapter

Odour user interface for authentication: Possibility and acceptance: Case study

2010 | conference-paper

Password sharing and how to reduce it

Certification and Security in Health-Related Web Applications: Concepts and Solutions

2010 | book

Podcasts and vodcasts: pros and cons

2010 | book-chapter

Uma Framework Ontológica para a Gestão da Segurança dos Sistemas de Informação

2010 | conference-paper

User acceptance OTM machine: In the Arab culture

2010 | journal-article

Validating Tam With Odour Interface In Atm Machines

2010 | journal-article

A Grid Data Mining architecture for Learning Classifier Systems

2009 | journal-article

An ontology based approach to information security

2009 | book

Keystroke Dynamics and Graphical Authentication Systems

2009 | book-chapter

Podcasts in Higher Education: Students’ and Lecturers’ Perspectives

2009 | book-chapter

RFID: Big brother global?

2009 | conference-paper

Security framework for information systems

2009 | conference-paper

Streaming contents and RSS feed in a pedagogical environment

2009 | conference-paper

Subsídeos Para uma Eficaz Segurança da Informação nas Organizações

2009 | journal-article

Supervised learning classifier systems for grid data mining

2009 | other

A survey of user authentication based on mouse dynamics

2008 | book

An Ontology Based Approach to Data Surveillance

2008 | book

Structured Textual Data Monitoring Based on a Rough Set Classifier

2008 | conference-paper

User dynamics in graphical authentication systems

2008 | book-chapter

Using technology to overcome the password's contradiction

Handbook of Research on Social and Organizational Liabilities in Information Security

2008 | book

Voice based authentication using the null freqencies

2008 | book

A machine learning approach to keystroke dynamics based user authentication

International Journal of Electronic Security and Digital Forensics

2007 | journal-article

Graphical based user authentication with embedded mouse stroke dynamics

2007 | conference-paper

Information technologies for the information agent

2007 | conference-paper

On the use of rough sets for user authentication via keystroke dynamics

2007 | book-chapter

Prediction of abnormal behaviors for intelligent video surveillance systems

2007 | conference-paper

Reusing Streaming Contents in Engineering and Education Courses

Conference ICL2007, September 26 -28, 2007

2007 | conference-paper

A norma das normas em Segurança da Informação

2006 | journal-article

An approach to information systems risk management of health units,Uma abordagem à gestão do risco para os sistemas de informação das unidades de saúde

CISTI 2006 - Actas da 1a Conferencia Iberica de Sistemas e Tecnologias de Informacao

2006 | conference-paper

An international governmental mailing system : A requirement to prevent web-enhanced terrorism

2006 | conference-paper

Authenticating Computer Access Based On Keystroke Dynamics Using A Probabilistic Neural Network

2006 | conference-paper

Critical aspects in authentication graphic keys

2006 | conference-paper

Data mining a prostate cancer dataset using rough sets

2006 | journal-article

Enhancing login security through the use of keystroke input dynamics

2006 | book

Generation of authentication strings from graphic keys

2006 | journal-article

N-ary trees classifier

2006 | conference-paper

Reaching learning objectives of the cognitive domain with a synchronized streaming media environment

SEFI 2006 - 34th Annual Conference: Engineering Education and Active Students

2006 | conference-paper

The OBSERVER: An intelligent and automated video surveillance system

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

2006 | journal-article

An Improved Statistical Keystroke Dynamics Algorithm

2005 | conference-paper

Data mining a keystroke dynamics based biometrics database using rough sets

2005 | book

Developing a Keystroke Dynamics Based Agent Using Rough Sets

2005 | conference-paper

Moving object detection unaffected by cast shadows, highlights and ghosts

2005 | conference-paper

Password secured sites - Stepping forward with keystroke dynamics

2005 | conference-paper

Segurança e Tecnologias no E-Vote

2005 | conference-paper

Um método para a estimativa do valor da informação, numa unidade de saúde

2005 | conference-paper

Wearable Authentication Device with Biometrical Intrusion Prevention System

2005 | conference-paper

Biometria e Autenticação

2003 | conference-paper

O Combate Electrónico - Ataques e Defesas sobre a Rede

2002 | conference-paper

A methodology for complex embedded systems design: Petri nets within a UML approach

2001 | book

Modeling industrial embedded systems with UML

2000 | conference-paper

A heterogeneous computer vision architecture: Implementation issues

1995 | journal-article

Cybersecurity in ICT Supply Chains: Key Challenges and a Relevant Architecture

Sensors

2021 | journal-article

Roadmap of Security threats between IPv4/IPv6

2021 | conference-paper

Distributed Architecture to Enhance Systems Protection against Unauthorized Activity via USB Devices

Journal of Sensor and Actuator Networks

2021 | journal-article

Proposing an Architecture for IoT Based on WSN

2021 | book-chapter

Agência da União Europeia para a Cibersegurança (ENISA)

Instituições, Órgão e Organismos da União Europeia, Manuais Universitários

2020 | book-chapter

EDGE4ALL: Edge Computing for Smart City

2020 | book-chapter

Simulator for Smart City Environment

2020 | book-chapter

EDGE4ALL - Edge Platform For Smart City

2019 | conference-paper

International Experiences and the Implications for the Success of Engineering Programs

2019 | conference-paper

Internationalization project to face the uncertainties of work market

2019 | conference-paper

Promoting Creativity in Final Year Engineering Students' Project: A case study in the Smart Cities context

2019 | conference-paper

Study of the Means of Online Payment in the Portuguese Population

2019 | conference-paper

Trends in engineering education: A disruptive view for not so far future

2019 | conference-paper

Work-in-Progress: Global Experiences for Engineering Programs

2019 | book

Automatic human trajectory destination prediction from video

Expert Systems With Applications

2018 | journal-article

Engineering education program promoting the profession

2018 | book

Global perspectives on cybersecurity education

2018 | conference-paper

High quality engineering program achievement

2018 | book

Message from the technical program chairs

2018 | conference-paper

Proposing a behavior-based IDS model for IoT environment

2018 | book

The role of professional associations in contemporaneous engineer careers

2018 | conference-paper

Classical Engineering Education Revisited - Why it Matters

2017 | conference-paper

Challenges and reflections in designing Cyber security curriculum

2017 | conference-paper

Classical engineering education coping with engineering profession demands

Proceedings of the 45th SEFI Annual Conference 2017 - Education Excellence for Sustainability, SEFI 2017

2017 | conference-paper

Classical engineering education revisited - Why it matters

ASEE Annual Conference and Exposition, Conference Proceedings

2017 | conference-paper

Engineering Education: Balancing generalist and specialist formation in technological carriers: A current challenge

EDUNINE 2017 - IEEE World Engineering Education Conference: Engineering Education - Balancing Generalist and Specialist Formation in Technological Carriers: A Current Challenge, Proceedings

2017 | conference-paper

Engineering course specially designed to face retention issue

Proceedings of the 45th SEFI Annual Conference 2017 - Education Excellence for Sustainability, SEFI 2017

2017 | conference-paper

Human skeleton detection from semi-constrained environment video

VISIGRAPP 2017 - Proceedings of the 12th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications

2017 | conference-paper

Knowledge security an empirical use of IT - Child abuse monitor system model

ICT4AWE 2017 - Proceedings of the 3rd International Conference on Information and Communication Technologies for Ageing Well and e-Health

2017 | conference-paper

Pointer dynamics as cognitive biometrics

2016 23 Encontro Portugues de Computacao Grafica e Interacao, EPCGI 2016

2017 | conference-paper

Rethinking engineering education

Proceedings - Frontiers in Education Conference, FIE

2017 | conference-paper

Self-oriented learning based on intelligent systems into the workplace

EDUNINE 2017 - IEEE World Engineering Education Conference: Engineering Education - Balancing Generalist and Specialist Formation in Technological Carriers: A Current Challenge, Proceedings

2017 | conference-paper

Behavioural Biometrics for Authentication and Stress Detection - A Case Study with Children

Global Security, Safety and Sustainability: the Security Challenges of the Connected World, Icgs3 2017

2016 | book-chapter

Evaluating information systems with continuous assurance services

International Journal of Information Systems in the Service Sector

2016 | journal-article

The information value: Perception of the problem

Advances in Intelligent Systems and Computing

2016 | book

What is missing for trust in the Cloud Computing?

SIGMIS-CPR 2016 - Proceedings of the 2016 ACM SIGMIS Conference on Computers and People Research

2016 | conference-paper

A Trust Model for Cloud Computing environment

Proceedings of the 3rd International Conference on Cloud Security and Management (Iccsm-2015)

2015 | book-chapter

An immunity based configuration for multilayer single featured biometric authentication algorithms

Communications in Computer and Information Science

2015 | book

Automatic human action recognition from video using Hidden Markov Model

Proceedings - IEEE 18th International Conference on Computational Science and Engineering, CSE 2015

2015 | conference-paper

Automatic visual detection of human behavior: A review from 2000 to 2014

Expert Systems with Applications

2015 | journal-article

Child abuse monitor system model: A health care critical knowledge monitor system

Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST

2015 | book

Design of a case-based reasoner for information security in military organizations

European Conference on Information Warfare and Security, ECCWS

2015 | conference-paper

Detection of dangerous situations using a smart internet of things system

Advances in Intelligent Systems and Computing

2015 | book

Determinants of behavioral intention to mobile banking in Arab culture

Banking, Finance, and Accounting: Concepts, Methodologies, Tools, and Applications

2015 | book

Enrollment time as a requirement for biometric hand recognition systems

Proceedings of the 10th International Conference on Cyber Warfare and Security, ICCWS 2015

2015 | conference-paper

Insider threats: The major challenge to security risk management

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

2015 | book

Monitoring organizational transactions in enterprise information systems with continuous assurance requirements

International Journal of Enterprise Information Systems

2015 | journal-article

Challenges in Information Security Protection

13th European Conference on Cyber Warfare and Security (ECCWS 2014)

2014 | conference-paper

Child Abuse Monitor System Model: A Health Care Critical Knowledge Monitor System

1st International Conference on IoT Technologies for HealthCare (HealthyIoT)

2014 | conference-paper

Determinants of Behavioral Intention to Mobile Banking in Arab Culture

Research and Design Innovations for Mobile User Experience

2014 | book-chapter

Enrolment Time as a Requirement for Face Recognition Biometric Systems

13th European Conference on Cyber Warfare and Security (ECCWS 2014)

2014 | conference-paper

Enrolment time as a requirement for biometric fingerprint recognition

2014 | journal-article

Free typed text using keystroke dynamics for continuous authentication

2014 | book

Management of internal control mechanisms in ERP for continuous monitoring purposes

Information Systems and Technologies (CISTI), 2014 9th Iberian Conference on

2014 | conference-paper

Planning Method of Information Security for Military Organizations

13th European Conference on Cyber Warfare and Security (ECCWS 2014)

2014 | conference-paper

Security metrics to evaluate organizational IT security

Proceedings of the 8th International Conference on Theory and Practice of Electronic Governance

2014 | other

A study of biometric authentication adoption in health services

2013 | book

An enterprise ontology-based database for continuous monitoring application

2013 | conference-paper

Biometrics Acceptance in Arab Culture: an Exploratory Study

2013 International Conference on Computer Applications Technology (Iccat)

2013 | conference-paper

Determinants of behavioral intention to mobile banking in Arab culture

Research and Design Innovations for Mobile User Experience

2013 | book

Feasibility Study of a Multimodal Biometric Authentication Solution Based on Pointer Dynamics and Skin Conductivity

3rd International Conference on Cybercrime, Security and Digital Forensics

2013 | conference-paper

Health users' perception of biometric authentication technologies

Proceedings of CBMS 2013 - 26th IEEE International Symposium on Computer-Based Medical Systems

2013 | conference-paper

Health users' perception of biometric authentication technologies

Proceedings - IEEE Symposium on Computer-Based Medical Systems

2013 | conference-paper

Information security - Military standards versus ISO 27001: A case study in a Portuguese military organization

European Conference on Information Warfare and Security, ECCWS

2013 | conference-paper

New Technology Acceptance in Europe and Arabic Cultures: Comparative Study

Informing Science & IT Education Conference (InSITE)

2013 | conference-paper

Organizational transactions with real time monitoring and auditing

2013 | journal-article

Password sharing and how to reduce it

IT Policy and Ethics: Concepts, Methodologies, Tools, and Applications

2013 | book

Requirements in an Internet access sharing model

2013 | journal-article

Requisitos para um Sistema Inteligente de Gestão/Análise de Eventos de Segurançada Informação

Proceedings of World Congress on Systems Engineering and Information Technology

2013 | journal-article

Scan detection system using artificial neural networks

European Conference on Information Warfare and Security, ECCWS

2013 | conference-paper

Specialized knowledge systems - A model for intelligent learning management within organizations

2013 | book

The matrix of quality dimensions of knowledge management: Knowledge management assessment models review

2013 | journal-article

User Perception for Biometrics and Secret Management

Proceedings of World Congress on Systems Engineering and Information Technology

2013 | journal-article

User's requirements in Internet access sharing

2013 | book

A solution for real time monitoring and auditing of organizational transactions

2012 | conference-paper

An Ontological Approach to Information Security Management

2012 | conference-paper

An ontology approach in designing security information systems to support organizational security risk knowledge

2012 | conference-paper

Automation of the Approval and Control Process of Documents

2012 | book-chapter

Biometric Graphical Authentication – a Patent Review: New Approaches in the Recognition of Users

2012 | conference-paper

Biometric technologies and their perception by the common citizen

2012 | journal-article

Botnets: A heuristic-based detection framework

2012 | conference-paper

Continuous assurance on organizational transactions

2012 | conference-paper

Critical knowledge monitor system model: Healthcare context

2012 | conference-paper

Framework de Gestão de Segurança da Informação para Organizações Militares Orientada pelos Principais Vetores de Ataque

2012 | conference-paper

Healthcare Critical Knowledge Monitor System Model: Critical Knowledge Ontology Component - topic models approach

2012 | conference-paper

Information security model to military organizations in environment of information warfare

2012 | conference-paper

Keystroke dynamics for continuous access control enforcement

2012 | conference-paper

Modelo de Segurança da Informação para Organizações Militares em Ambiente de Guerra de Informação

2012 | journal-article

Study of the perception on the biometric technology by the Portuguese citizens

2012 | book

Video Casting Application Oriented Key Exchange

2012 | conference-paper

Video casting application oriented key exchange

MMEDIA - International Conferences on Advances in Multimedia

2012 | conference-paper

What is Wrong with Biometrics?

2012 | magazine-article

Wireless Identity Management: Multimodal Biometrics and Multilayered IDM

2012 | book-chapter

Botnet detection: A numerical and heuristic analysis

2011 | conference-paper

Description of a practical application of an information security audit framework

2011 | conference-paper

Estudo da percepção dos utilizadores em relação à utilização de tecnologias de autenticação biométrica no acesso aos serviços de saúde

2011 | conference-paper

Grid Learning Classifiers - A Web Based Interface

2011 | journal-article

Grid data mining by means of learning classifier systems and distributed model induction

2011 | conference-paper

Intrusion detection through keystroke dynamics

2011 | conference-paper

Password Sharing and How to Reduce It

2011 | book-chapter

Sistemas Auto-regulados de Conteúdos Orientados para Contextos de Aprendizagem em Ambiente Profissional

2011 | conference-paper

Supervised Learning Classifier Systems for Grid Data Mining

2011 | book-chapter

A Security Audit Framework to Manage Information System Security

2010 | book-chapter

A conceptual model approach to manage and audit information systems security

2010 | conference-paper

A security framework for audit and manage information system security

2010 | conference-paper

An audit framework to support information system security management

2010 | journal-article

An ontology based approach to semantically structure data in security information systems

2010 | conference-paper

Automation of the Approval and Control Process of Documents

2010 | conference-paper

Cyberwar and the Russian Federation: the usual suspect

2010 | journal-article

GridclassTK- Toolkit for grid learning classifier systems

European Conference of Systems, ECS'10, European Conference of Circuits Technology and Devices, ECCTD'10, European Conference of Communications, ECCOM'10, ECCS'10

2010 | conference-paper

Methods of Organizational Information Security

2010 | book-chapter

Multimodal Biometrics and Multilayered IDM for Secure Authentication

2010 | book-chapter

OTM Machine Acceptance: In the Arab Culture

2010 | book-chapter

Odour user interface for authentication: Possibility and acceptance: Case study

2010 | conference-paper

Password sharing and how to reduce it

Certification and Security in Health-Related Web Applications: Concepts and Solutions

2010 | book

Podcasts and vodcasts: pros and cons

2010 | book-chapter

Uma Framework Ontológica para a Gestão da Segurança dos Sistemas de Informação

2010 | conference-paper

User acceptance OTM machine: In the Arab culture

2010 | journal-article

Validating Tam With Odour Interface In Atm Machines

2010 | journal-article

A Grid Data Mining architecture for Learning Classifier Systems

2009 | journal-article

An ontology based approach to information security

2009 | book

Keystroke Dynamics and Graphical Authentication Systems

2009 | book-chapter

Podcasts in Higher Education: Students’ and Lecturers’ Perspectives

2009 | book-chapter

RFID: Big brother global?

2009 | conference-paper

Security framework for information systems

2009 | conference-paper

Streaming contents and RSS feed in a pedagogical environment

2009 | conference-paper

Subsídeos Para uma Eficaz Segurança da Informação nas Organizações

2009 | journal-article

Supervised learning classifier systems for grid data mining

2009 | other

A survey of user authentication based on mouse dynamics

2008 | book

An Ontology Based Approach to Data Surveillance

2008 | book

Structured Textual Data Monitoring Based on a Rough Set Classifier

2008 | conference-paper

User dynamics in graphical authentication systems

2008 | book-chapter

Using technology to overcome the password's contradiction

Handbook of Research on Social and Organizational Liabilities in Information Security

2008 | book

Voice based authentication using the null freqencies

2008 | book

A machine learning approach to keystroke dynamics based user authentication

International Journal of Electronic Security and Digital Forensics

2007 | journal-article

Graphical based user authentication with embedded mouse stroke dynamics

2007 | conference-paper

Information technologies for the information agent

2007 | conference-paper

On the use of rough sets for user authentication via keystroke dynamics

2007 | book-chapter

Prediction of abnormal behaviors for intelligent video surveillance systems

2007 | conference-paper

Reusing Streaming Contents in Engineering and Education Courses

Conference ICL2007, September 26 -28, 2007

2007 | conference-paper

A norma das normas em Segurança da Informação

2006 | journal-article

An approach to information systems risk management of health units,Uma abordagem à gestão do risco para os sistemas de informação das unidades de saúde

CISTI 2006 - Actas da 1a Conferencia Iberica de Sistemas e Tecnologias de Informacao

2006 | conference-paper

An international governmental mailing system : A requirement to prevent web-enhanced terrorism

2006 | conference-paper

Authenticating Computer Access Based On Keystroke Dynamics Using A Probabilistic Neural Network

2006 | conference-paper

Critical aspects in authentication graphic keys

2006 | conference-paper

Data mining a prostate cancer dataset using rough sets

2006 | journal-article

Enhancing login security through the use of keystroke input dynamics

2006 | book

Generation of authentication strings from graphic keys

2006 | journal-article

N-ary trees classifier

2006 | conference-paper

Reaching learning objectives of the cognitive domain with a synchronized streaming media environment

SEFI 2006 - 34th Annual Conference: Engineering Education and Active Students

2006 | conference-paper

The OBSERVER: An intelligent and automated video surveillance system

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

2006 | journal-article

An Improved Statistical Keystroke Dynamics Algorithm

2005 | conference-paper

Data mining a keystroke dynamics based biometrics database using rough sets

2005 | book

Developing a Keystroke Dynamics Based Agent Using Rough Sets

2005 | conference-paper

Moving object detection unaffected by cast shadows, highlights and ghosts

2005 | conference-paper

Password secured sites - Stepping forward with keystroke dynamics

2005 | conference-paper

Segurança e Tecnologias no E-Vote

2005 | conference-paper

Um método para a estimativa do valor da informação, numa unidade de saúde

2005 | conference-paper

Wearable Authentication Device with Biometrical Intrusion Prevention System

2005 | conference-paper

Biometria e Autenticação

2003 | conference-paper

O Combate Electrónico - Ataques e Defesas sobre a Rede

2002 | conference-paper

A methodology for complex embedded systems design: Petri nets within a UML approach

2001 | book

Modeling industrial embedded systems with UML

2000 | conference-paper

A heterogeneous computer vision architecture: Implementation issues

1995 | journal-article