Algoritmi | User | Henrique Manuel Dinis Santos


Henrique Manuel Dinis Santos

Henrique Manuel Dinis Santos
At Algoritmi
Senior Researcher with Dr habil
Member of the CCPM R&D Group
Academic Degree
Dr habil
Current Position
Associate Professor with Habilitation at Escola de Engenharia da Universidade do Minho
Personal Webpage
http://www3.dsi.uminho.pt/hsantosPersonal Email
hsantos@dsi.uminho.ptOrcid
0000-0001-5389-3285Researcher ID
B-3004-2008FCT Public Key
J005081qm88Y
Ciência ID
B618-62ED-57FDGoogle Scholar
https://scholar.google.pt/citations?hl=en&user=S9bS-_QAAAAJh-index
12Publications
133Editorial
1Citations
621Q1 / Q2
8About Me
Henrique M. Dinis Santos received his first degree in Electric and Electronic Engineering, from the University of Coimbra, Portugal, in 1984. In 1996 he received the Ph.D. degree in Computer Engineering, from the University of the Minho, Portugal and the habilitation degree in 2013, by the same institution. Currently, he is an Associate Professor (with Habilitation) at the Information Systems Department, University of Minho, and member of the ALGORITMI R&D centre, more specifically, the Information Systems and Technologies (IST) research group, and member of its Intelligent Data Systems (IDS) lab, with interests in the fields of: Information Security – emphasis on Intrusion Detection, biometrical technologies and Information Security Management – and Computer Architecture area – emphasis on Computer Vision and Cloud Computing. He co-authored a patent with an industrial partner, in 2012, in the biometric area. He is also the President of a national Technical Committee (CT 136) for information system security standardization, Vice President for Conferences and Workshops of IEEE Education Society, President of the Portuguese Association for Data Protection (APPD), University of Minho representative in a NATO project (MN CD E&T – Multi Nacional Cyber Defense Education and Training), within the Smart Defense initiative -, Associate Member of the SysSec community (European Network of Excellence, promoted by a consortium of several universities, institutes and research centers, in the Information Systems Security area) and integrates frequently advice and scientific committees supporting civil, governmental and military organizations. During the second semester of 1990, under an ERASMUS program, he was teaching at the University of Bristol, United Kingdom, where he was recognized a University Academic staff. Concerning the involvement in the organization of scientific events, over the last two years, it should be highlighted: - General Local Chair of the 4th Smartcity360 Experience and Perspectives Summit, Guimaraes, Portugal, November 21-23, 2018; - General Chair of the 4th EAI International Workshop on Security and Privacy Challenges in Smart Cities, MOBILITY IoT, co-located event in Smartcity360 Experience and Perspectives, Helsinki, Finland, November 29-30, 2017; - General Co-Chair of the EAI Industry of Things and Future Technologies Conference, Bratislavia, Eslováquia, 22-24 November 2016; - Technical Program Chair of the IEEE World Engineering Education Conference (EDUNINE) in 2017 and 2018. He regularly collaborates with the editorial body of several journals, namely as a reviewer, including (more recent): Future Generation Computer Systems (Elsevier); Computer Standards & Interfaces (Elsevier); European Journal of Management Studies (EJMS); Cluster Computing (Springer); Computer Methods and Programs in Biomedicine (Elsevier); IEEE Transactions on Industrial Electronics; EEE Internet of Things Journal; and MDPI Sensors.
Publications (172)
Blockchain in the Public Sector: An Umbrella Review of Literature
2023 | book-chapter
Continuous Industrial Sector Cybersecurity Assessment Paradigm∗ : Proposed Model of Cybersecurity Certification
2022 18th International Conference on the Design of Reliable Communication Networks, DRCN 2022
2022 | conference-paper
Virtual Lab Virtues in Distance Learning
2022 | book-chapter
Cybersecurity in ICT Supply Chains: Key Challenges and a Relevant Architecture
Sensors
2021 | journal-article
Roadmap of Security threats between IPv4/IPv6
2021 | conference-paper
Distributed Architecture to Enhance Systems Protection against Unauthorized Activity via USB Devices
Journal of Sensor and Actuator Networks
2021 | journal-article
Information Security Assessment and Certification within Supply Chains
ACM International Conference Proceeding Series
2021 | conference-paper
Proposing an Architecture for IoT Based on WSN
2021 | book-chapter
Agência da União Europeia para a Cibersegurança (ENISA)
Instituições, Órgão e Organismos da União Europeia, Manuais Universitários
2020 | book-chapter
EDGE4ALL: Edge Computing for Smart City
2020 | book-chapter
Science and Technologies for Smart Cities
Springer International Publishing
2020 | edited-book
Simulator for Smart City Environment
2020 | book-chapter
Special Issue "Achieving Predictive Maintenance using Sensors: Real or Fantasy?"
Sensors
2020 | journal-issue
Healthcare Critical Knowledge Monitor System Model: Healthcare Knowledge Capture Component Specification
Research in Medical & Engineering Sciences
2019 | journal-article
EDGE4ALL - Edge Platform For Smart City
2019 | conference-paper
International Experiences and the Implications for the Success of Engineering Programs
2019 | conference-paper
Internationalization project to face the uncertainties of work market
2019 | conference-paper
Promoting Creativity in Final Year Engineering Students' Project: A case study in the Smart Cities context
2019 | conference-paper
Smart City Summit Demos 2018
EAI
2019 | edited-book
Study of the Means of Online Payment in the Portuguese Population
2019 | conference-paper
Trends in engineering education: A disruptive view for not so far future
2019 18th International Conference on Information Technology Based Higher Education and Training, ITHET 2019
2019 | conference-paper
Work-in-Progress: Global Experiences for Engineering Programs
2019 | book
Automatic human trajectory destination prediction from video
Expert Systems With Applications
2018 | journal-article
Engineering education program promoting the profession
2018 | book
Global perspectives on cybersecurity education
2018 | conference-paper
High quality engineering program achievement
2018 | book
Message from the technical program chairs
2018 | conference-paper
Proposing a behavior-based IDS model for IoT environment
2018 | book
The role of professional associations in contemporaneous engineer careers
2018 | conference-paper
Classical Engineering Education Revisited - Why it Matters
2017 | conference-paper
Challenges and reflections in designing Cyber security curriculum
2017 | conference-paper
Classical engineering education coping with engineering profession demands
Proceedings of the 45th SEFI Annual Conference 2017 - Education Excellence for Sustainability, SEFI 2017
2017 | conference-paper
Classical engineering education revisited - Why it matters
ASEE Annual Conference and Exposition, Conference Proceedings
2017 | conference-paper
Engineering Education: Balancing generalist and specialist formation in technological carriers: A current challenge
EDUNINE 2017 - IEEE World Engineering Education Conference: Engineering Education - Balancing Generalist and Specialist Formation in Technological Carriers: A Current Challenge, Proceedings
2017 | conference-paper
Engineering course specially designed to face retention issue
Proceedings of the 45th SEFI Annual Conference 2017 - Education Excellence for Sustainability, SEFI 2017
2017 | conference-paper
Human skeleton detection from semi-constrained environment video
VISIGRAPP 2017 - Proceedings of the 12th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications
2017 | conference-paper
Knowledge security an empirical use of IT - Child abuse monitor system model
ICT4AWE 2017 - Proceedings of the 3rd International Conference on Information and Communication Technologies for Ageing Well and e-Health
2017 | conference-paper
Pointer dynamics as cognitive biometrics
2016 23 Encontro Portugues de Computacao Grafica e Interacao, EPCGI 2016
2017 | conference-paper
Rethinking engineering education
Proceedings - Frontiers in Education Conference, FIE
2017 | conference-paper
Self-oriented learning based on intelligent systems into the workplace
EDUNINE 2017 - IEEE World Engineering Education Conference: Engineering Education - Balancing Generalist and Specialist Formation in Technological Carriers: A Current Challenge, Proceedings
2017 | conference-paper
Behavioural Biometrics for Authentication and Stress Detection - A Case Study with Children
Global Security, Safety and Sustainability: the Security Challenges of the Connected World, Icgs3 2017
2016 | book-chapter
Evaluating information systems with continuous assurance services
International Journal of Information Systems in the Service Sector
2016 | journal-article
The information value: Perception of the problem
Advances in Intelligent Systems and Computing
2016 | book
What is missing for trust in the Cloud Computing?
SIGMIS-CPR 2016 - Proceedings of the 2016 ACM SIGMIS Conference on Computers and People Research
2016 | conference-paper
A Trust Model for Cloud Computing environment
Proceedings of the 3rd International Conference on Cloud Security and Management (Iccsm-2015)
2015 | book-chapter
An immunity based configuration for multilayer single featured biometric authentication algorithms
Communications in Computer and Information Science
2015 | book
Automatic human action recognition from video using Hidden Markov Model
Proceedings - IEEE 18th International Conference on Computational Science and Engineering, CSE 2015
2015 | conference-paper
Automatic visual detection of human behavior: A review from 2000 to 2014
Expert Systems with Applications
2015 | journal-article
Child abuse monitor system model: A health care critical knowledge monitor system
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
2015 | book
Design of a case-based reasoner for information security in military organizations
European Conference on Information Warfare and Security, ECCWS
2015 | conference-paper
Detection of dangerous situations using a smart internet of things system
Advances in Intelligent Systems and Computing
2015 | book
Determinants of behavioral intention to mobile banking in Arab culture
Banking, Finance, and Accounting: Concepts, Methodologies, Tools, and Applications
2015 | book
Enrollment time as a requirement for biometric hand recognition systems
Proceedings of the 10th International Conference on Cyber Warfare and Security, ICCWS 2015
2015 | conference-paper
Insider threats: The major challenge to security risk management
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2015 | book
Monitoring organizational transactions in enterprise information systems with continuous assurance requirements
International Journal of Enterprise Information Systems
2015 | journal-article
Challenges in Information Security Protection
13th European Conference on Cyber Warfare and Security (ECCWS 2014)
2014 | conference-paper
Child Abuse Monitor System Model: A Health Care Critical Knowledge Monitor System
1st International Conference on IoT Technologies for HealthCare (HealthyIoT)
2014 | conference-paper
Determinants of Behavioral Intention to Mobile Banking in Arab Culture
Research and Design Innovations for Mobile User Experience
2014 | book-chapter
Enrolment Time as a Requirement for Face Recognition Biometric Systems
13th European Conference on Cyber Warfare and Security (ECCWS 2014)
2014 | conference-paper
Enrolment time as a requirement for biometric fingerprint recognition
2014 | journal-article
Free typed text using keystroke dynamics for continuous authentication
2014 | book
Management of internal control mechanisms in ERP for continuous monitoring purposes
Information Systems and Technologies (CISTI), 2014 9th Iberian Conference on
2014 | conference-paper
Planning Method of Information Security for Military Organizations
13th European Conference on Cyber Warfare and Security (ECCWS 2014)
2014 | conference-paper
Security metrics to evaluate organizational IT security
Proceedings of the 8th International Conference on Theory and Practice of Electronic Governance
2014 | other
A study of biometric authentication adoption in health services
2013 | book
An enterprise ontology-based database for continuous monitoring application
2013 | conference-paper
Biometrics Acceptance in Arab Culture: an Exploratory Study
2013 International Conference on Computer Applications Technology (Iccat)
2013 | conference-paper
Determinants of behavioral intention to mobile banking in Arab culture
Research and Design Innovations for Mobile User Experience
2013 | book
Feasibility Study of a Multimodal Biometric Authentication Solution Based on Pointer Dynamics and Skin Conductivity
3rd International Conference on Cybercrime, Security and Digital Forensics
2013 | conference-paper
Health users' perception of biometric authentication technologies
Proceedings of CBMS 2013 - 26th IEEE International Symposium on Computer-Based Medical Systems
2013 | conference-paper
Health users' perception of biometric authentication technologies
Proceedings - IEEE Symposium on Computer-Based Medical Systems
2013 | conference-paper
Information security - Military standards versus ISO 27001: A case study in a Portuguese military organization
European Conference on Information Warfare and Security, ECCWS
2013 | conference-paper
New Technology Acceptance in Europe and Arabic Cultures: Comparative Study
Informing Science & IT Education Conference (InSITE)
2013 | conference-paper
Organizational transactions with real time monitoring and auditing
2013 | journal-article
Password sharing and how to reduce it
IT Policy and Ethics: Concepts, Methodologies, Tools, and Applications
2013 | book
Requirements in an Internet access sharing model
2013 | journal-article
Requisitos para um Sistema Inteligente de Gestão/Análise de Eventos de Segurançada Informação
Proceedings of World Congress on Systems Engineering and Information Technology
2013 | journal-article
Scan detection system using artificial neural networks
European Conference on Information Warfare and Security, ECCWS
2013 | conference-paper
Specialized knowledge systems - A model for intelligent learning management within organizations
2013 | book
The matrix of quality dimensions of knowledge management: Knowledge management assessment models review
2013 | journal-article
User Perception for Biometrics and Secret Management
Proceedings of World Congress on Systems Engineering and Information Technology
2013 | journal-article
User's requirements in Internet access sharing
2013 | book
A solution for real time monitoring and auditing of organizational transactions
2012 | conference-paper
An Ontological Approach to Information Security Management
2012 | conference-paper
An ontology approach in designing security information systems to support organizational security risk knowledge
2012 | conference-paper
Automation of the Approval and Control Process of Documents
2012 | book-chapter
Biometric Graphical Authentication – a Patent Review: New Approaches in the Recognition of Users
2012 | conference-paper
Biometric technologies and their perception by the common citizen
2012 | journal-article
Botnets: A heuristic-based detection framework
2012 | conference-paper
Continuous assurance on organizational transactions
2012 | conference-paper
Critical knowledge monitor system model: Healthcare context
2012 | conference-paper
Framework de Gestão de Segurança da Informação para Organizações Militares Orientada pelos Principais Vetores de Ataque
2012 | conference-paper
Healthcare Critical Knowledge Monitor System Model: Critical Knowledge Ontology Component - topic models approach
2012 | conference-paper
Information security model to military organizations in environment of information warfare
2012 | conference-paper
Keystroke dynamics for continuous access control enforcement
2012 | conference-paper
Modelo de Segurança da Informação para Organizações Militares em Ambiente de Guerra de Informação
2012 | journal-article
Study of the perception on the biometric technology by the Portuguese citizens
2012 | book
Video Casting Application Oriented Key Exchange
2012 | conference-paper
Video casting application oriented key exchange
MMEDIA - International Conferences on Advances in Multimedia
2012 | conference-paper
What is Wrong with Biometrics?
2012 | magazine-article
Wireless Identity Management: Multimodal Biometrics and Multilayered IDM
2012 | book-chapter
Botnet detection: A numerical and heuristic analysis
2011 | conference-paper
Description of a practical application of an information security audit framework
2011 | conference-paper
Estudo da percepção dos utilizadores em relação à utilização de tecnologias de autenticação biométrica no acesso aos serviços de saúde
2011 | conference-paper
Grid Learning Classifiers - A Web Based Interface
2011 | journal-article
Grid data mining by means of learning classifier systems and distributed model induction
2011 | conference-paper
Intrusion detection through keystroke dynamics
2011 | conference-paper
Password Sharing and How to Reduce It
2011 | book-chapter
Sistemas Auto-regulados de Conteúdos Orientados para Contextos de Aprendizagem em Ambiente Profissional
2011 | conference-paper
Supervised Learning Classifier Systems for Grid Data Mining
2011 | book-chapter
A Security Audit Framework to Manage Information System Security
2010 | book-chapter
A conceptual model approach to manage and audit information systems security
2010 | conference-paper
A security framework for audit and manage information system security
2010 | conference-paper
An audit framework to support information system security management
2010 | journal-article
An ontology based approach to semantically structure data in security information systems
2010 | conference-paper
Automation of the Approval and Control Process of Documents
2010 | conference-paper
Cyberwar and the Russian Federation: the usual suspect
2010 | journal-article
GridclassTK- Toolkit for grid learning classifier systems
European Conference of Systems, ECS'10, European Conference of Circuits Technology and Devices, ECCTD'10, European Conference of Communications, ECCOM'10, ECCS'10
2010 | conference-paper
Methods of Organizational Information Security
2010 | book-chapter
Multimodal Biometrics and Multilayered IDM for Secure Authentication
2010 | book-chapter
OTM Machine Acceptance: In the Arab Culture
2010 | book-chapter
Odour user interface for authentication: Possibility and acceptance: Case study
2010 | conference-paper
Password sharing and how to reduce it
Certification and Security in Health-Related Web Applications: Concepts and Solutions
2010 | book
Podcasts and vodcasts: pros and cons
2010 | book-chapter
Uma Framework Ontológica para a Gestão da Segurança dos Sistemas de Informação
2010 | conference-paper
User acceptance OTM machine: In the Arab culture
2010 | journal-article
Validating Tam With Odour Interface In Atm Machines
2010 | journal-article
A Grid Data Mining architecture for Learning Classifier Systems
2009 | journal-article
An ontology based approach to information security
2009 | book
Keystroke Dynamics and Graphical Authentication Systems
2009 | book-chapter
Podcasts in Higher Education: Students’ and Lecturers’ Perspectives
2009 | book-chapter
RFID: Big brother global?
2009 | conference-paper
Security framework for information systems
2009 | conference-paper
Streaming contents and RSS feed in a pedagogical environment
2009 | conference-paper
Subsídeos Para uma Eficaz Segurança da Informação nas Organizações
2009 | journal-article
Supervised learning classifier systems for grid data mining
2009 | other
A survey of user authentication based on mouse dynamics
2008 | book
An Ontology Based Approach to Data Surveillance
2008 | book
Structured Textual Data Monitoring Based on a Rough Set Classifier
2008 | conference-paper
User dynamics in graphical authentication systems
2008 | book-chapter
Using technology to overcome the password's contradiction
Handbook of Research on Social and Organizational Liabilities in Information Security
2008 | book
Voice based authentication using the null freqencies
2008 | book
A machine learning approach to keystroke dynamics based user authentication
International Journal of Electronic Security and Digital Forensics
2007 | journal-article
Graphical based user authentication with embedded mouse stroke dynamics
2007 | conference-paper
Information technologies for the information agent
2007 | conference-paper
On the use of rough sets for user authentication via keystroke dynamics
2007 | book-chapter
Prediction of abnormal behaviors for intelligent video surveillance systems
2007 | conference-paper
Reusing Streaming Contents in Engineering and Education Courses
Conference ICL2007, September 26 -28, 2007
2007 | conference-paper
A norma das normas em Segurança da Informação
2006 | journal-article
An approach to information systems risk management of health units,Uma abordagem à gestão do risco para os sistemas de informação das unidades de saúde
CISTI 2006 - Actas da 1a Conferencia Iberica de Sistemas e Tecnologias de Informacao
2006 | conference-paper
An international governmental mailing system : A requirement to prevent web-enhanced terrorism
2006 | conference-paper
Authenticating Computer Access Based On Keystroke Dynamics Using A Probabilistic Neural Network
2006 | conference-paper
Critical aspects in authentication graphic keys
2006 | conference-paper
Data mining a prostate cancer dataset using rough sets
2006 | journal-article
Enhancing login security through the use of keystroke input dynamics
2006 | book
Generation of authentication strings from graphic keys
2006 | journal-article
N-ary trees classifier
2006 | conference-paper
Reaching learning objectives of the cognitive domain with a synchronized streaming media environment
SEFI 2006 - 34th Annual Conference: Engineering Education and Active Students
2006 | conference-paper
The OBSERVER: An intelligent and automated video surveillance system
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2006 | journal-article
An Improved Statistical Keystroke Dynamics Algorithm
2005 | conference-paper
Data mining a keystroke dynamics based biometrics database using rough sets
2005 | book
Developing a Keystroke Dynamics Based Agent Using Rough Sets
2005 | conference-paper
Moving object detection unaffected by cast shadows, highlights and ghosts
2005 | conference-paper
Password secured sites - Stepping forward with keystroke dynamics
2005 | conference-paper
Segurança e Tecnologias no E-Vote
2005 | conference-paper
Um método para a estimativa do valor da informação, numa unidade de saúde
2005 | conference-paper
Wearable Authentication Device with Biometrical Intrusion Prevention System
2005 | conference-paper
Biometria e Autenticação
2003 | conference-paper
O Combate Electrónico - Ataques e Defesas sobre a Rede
2002 | conference-paper
A methodology for complex embedded systems design: Petri nets within a UML approach
2001 | book
Modeling industrial embedded systems with UML
2000 | conference-paper
A heterogeneous computer vision architecture: Implementation issues
1995 | journal-article
History
Init | End | Change | Value | |
---|---|---|---|---|
Group | CCPM | |||
17/01/2023 20:15 | ||||
17/01/2023 20:10 |
Blockchain in the Public Sector: An Umbrella Review of Literature
2023 | book-chapter
Continuous Industrial Sector Cybersecurity Assessment Paradigm∗ : Proposed Model of Cybersecurity Certification
2022 18th International Conference on the Design of Reliable Communication Networks, DRCN 2022
2022 | conference-paper
Virtual Lab Virtues in Distance Learning
2022 | book-chapter
Cybersecurity in ICT Supply Chains: Key Challenges and a Relevant Architecture
Sensors
2021 | journal-article
Roadmap of Security threats between IPv4/IPv6
2021 | conference-paper
Distributed Architecture to Enhance Systems Protection against Unauthorized Activity via USB Devices
Journal of Sensor and Actuator Networks
2021 | journal-article
Information Security Assessment and Certification within Supply Chains
ACM International Conference Proceeding Series
2021 | conference-paper
Proposing an Architecture for IoT Based on WSN
2021 | book-chapter
Agência da União Europeia para a Cibersegurança (ENISA)
Instituições, Órgão e Organismos da União Europeia, Manuais Universitários
2020 | book-chapter
EDGE4ALL: Edge Computing for Smart City
2020 | book-chapter
Science and Technologies for Smart Cities
Springer International Publishing
2020 | edited-book
Simulator for Smart City Environment
2020 | book-chapter
Special Issue "Achieving Predictive Maintenance using Sensors: Real or Fantasy?"
Sensors
2020 | journal-issue
Healthcare Critical Knowledge Monitor System Model: Healthcare Knowledge Capture Component Specification
Research in Medical & Engineering Sciences
2019 | journal-article
EDGE4ALL - Edge Platform For Smart City
2019 | conference-paper
International Experiences and the Implications for the Success of Engineering Programs
2019 | conference-paper
Internationalization project to face the uncertainties of work market
2019 | conference-paper
Promoting Creativity in Final Year Engineering Students' Project: A case study in the Smart Cities context
2019 | conference-paper
Smart City Summit Demos 2018
EAI
2019 | edited-book
Study of the Means of Online Payment in the Portuguese Population
2019 | conference-paper
Trends in engineering education: A disruptive view for not so far future
2019 18th International Conference on Information Technology Based Higher Education and Training, ITHET 2019
2019 | conference-paper
Work-in-Progress: Global Experiences for Engineering Programs
2019 | book
Automatic human trajectory destination prediction from video
Expert Systems With Applications
2018 | journal-article
Engineering education program promoting the profession
2018 | book
Global perspectives on cybersecurity education
2018 | conference-paper
High quality engineering program achievement
2018 | book
Message from the technical program chairs
2018 | conference-paper
Proposing a behavior-based IDS model for IoT environment
2018 | book
The role of professional associations in contemporaneous engineer careers
2018 | conference-paper
Classical Engineering Education Revisited - Why it Matters
2017 | conference-paper
Challenges and reflections in designing Cyber security curriculum
2017 | conference-paper
Classical engineering education coping with engineering profession demands
Proceedings of the 45th SEFI Annual Conference 2017 - Education Excellence for Sustainability, SEFI 2017
2017 | conference-paper
Classical engineering education revisited - Why it matters
ASEE Annual Conference and Exposition, Conference Proceedings
2017 | conference-paper
Engineering Education: Balancing generalist and specialist formation in technological carriers: A current challenge
EDUNINE 2017 - IEEE World Engineering Education Conference: Engineering Education - Balancing Generalist and Specialist Formation in Technological Carriers: A Current Challenge, Proceedings
2017 | conference-paper
Engineering course specially designed to face retention issue
Proceedings of the 45th SEFI Annual Conference 2017 - Education Excellence for Sustainability, SEFI 2017
2017 | conference-paper
Human skeleton detection from semi-constrained environment video
VISIGRAPP 2017 - Proceedings of the 12th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications
2017 | conference-paper
Knowledge security an empirical use of IT - Child abuse monitor system model
ICT4AWE 2017 - Proceedings of the 3rd International Conference on Information and Communication Technologies for Ageing Well and e-Health
2017 | conference-paper
Pointer dynamics as cognitive biometrics
2016 23 Encontro Portugues de Computacao Grafica e Interacao, EPCGI 2016
2017 | conference-paper
Rethinking engineering education
Proceedings - Frontiers in Education Conference, FIE
2017 | conference-paper
Self-oriented learning based on intelligent systems into the workplace
EDUNINE 2017 - IEEE World Engineering Education Conference: Engineering Education - Balancing Generalist and Specialist Formation in Technological Carriers: A Current Challenge, Proceedings
2017 | conference-paper
Behavioural Biometrics for Authentication and Stress Detection - A Case Study with Children
Global Security, Safety and Sustainability: the Security Challenges of the Connected World, Icgs3 2017
2016 | book-chapter
Evaluating information systems with continuous assurance services
International Journal of Information Systems in the Service Sector
2016 | journal-article
The information value: Perception of the problem
Advances in Intelligent Systems and Computing
2016 | book
What is missing for trust in the Cloud Computing?
SIGMIS-CPR 2016 - Proceedings of the 2016 ACM SIGMIS Conference on Computers and People Research
2016 | conference-paper
A Trust Model for Cloud Computing environment
Proceedings of the 3rd International Conference on Cloud Security and Management (Iccsm-2015)
2015 | book-chapter
An immunity based configuration for multilayer single featured biometric authentication algorithms
Communications in Computer and Information Science
2015 | book
Automatic human action recognition from video using Hidden Markov Model
Proceedings - IEEE 18th International Conference on Computational Science and Engineering, CSE 2015
2015 | conference-paper
Automatic visual detection of human behavior: A review from 2000 to 2014
Expert Systems with Applications
2015 | journal-article
Child abuse monitor system model: A health care critical knowledge monitor system
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
2015 | book
Design of a case-based reasoner for information security in military organizations
European Conference on Information Warfare and Security, ECCWS
2015 | conference-paper
Detection of dangerous situations using a smart internet of things system
Advances in Intelligent Systems and Computing
2015 | book
Determinants of behavioral intention to mobile banking in Arab culture
Banking, Finance, and Accounting: Concepts, Methodologies, Tools, and Applications
2015 | book
Enrollment time as a requirement for biometric hand recognition systems
Proceedings of the 10th International Conference on Cyber Warfare and Security, ICCWS 2015
2015 | conference-paper
Insider threats: The major challenge to security risk management
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2015 | book
Monitoring organizational transactions in enterprise information systems with continuous assurance requirements
International Journal of Enterprise Information Systems
2015 | journal-article
Challenges in Information Security Protection
13th European Conference on Cyber Warfare and Security (ECCWS 2014)
2014 | conference-paper
Child Abuse Monitor System Model: A Health Care Critical Knowledge Monitor System
1st International Conference on IoT Technologies for HealthCare (HealthyIoT)
2014 | conference-paper
Determinants of Behavioral Intention to Mobile Banking in Arab Culture
Research and Design Innovations for Mobile User Experience
2014 | book-chapter
Enrolment Time as a Requirement for Face Recognition Biometric Systems
13th European Conference on Cyber Warfare and Security (ECCWS 2014)
2014 | conference-paper
Enrolment time as a requirement for biometric fingerprint recognition
2014 | journal-article
Free typed text using keystroke dynamics for continuous authentication
2014 | book
Management of internal control mechanisms in ERP for continuous monitoring purposes
Information Systems and Technologies (CISTI), 2014 9th Iberian Conference on
2014 | conference-paper
Planning Method of Information Security for Military Organizations
13th European Conference on Cyber Warfare and Security (ECCWS 2014)
2014 | conference-paper
Security metrics to evaluate organizational IT security
Proceedings of the 8th International Conference on Theory and Practice of Electronic Governance
2014 | other
A study of biometric authentication adoption in health services
2013 | book
An enterprise ontology-based database for continuous monitoring application
2013 | conference-paper
Biometrics Acceptance in Arab Culture: an Exploratory Study
2013 International Conference on Computer Applications Technology (Iccat)
2013 | conference-paper
Determinants of behavioral intention to mobile banking in Arab culture
Research and Design Innovations for Mobile User Experience
2013 | book
Feasibility Study of a Multimodal Biometric Authentication Solution Based on Pointer Dynamics and Skin Conductivity
3rd International Conference on Cybercrime, Security and Digital Forensics
2013 | conference-paper
Health users' perception of biometric authentication technologies
Proceedings of CBMS 2013 - 26th IEEE International Symposium on Computer-Based Medical Systems
2013 | conference-paper
Health users' perception of biometric authentication technologies
Proceedings - IEEE Symposium on Computer-Based Medical Systems
2013 | conference-paper
Information security - Military standards versus ISO 27001: A case study in a Portuguese military organization
European Conference on Information Warfare and Security, ECCWS
2013 | conference-paper
New Technology Acceptance in Europe and Arabic Cultures: Comparative Study
Informing Science & IT Education Conference (InSITE)
2013 | conference-paper
Organizational transactions with real time monitoring and auditing
2013 | journal-article
Password sharing and how to reduce it
IT Policy and Ethics: Concepts, Methodologies, Tools, and Applications
2013 | book
Requirements in an Internet access sharing model
2013 | journal-article
Requisitos para um Sistema Inteligente de Gestão/Análise de Eventos de Segurançada Informação
Proceedings of World Congress on Systems Engineering and Information Technology
2013 | journal-article
Scan detection system using artificial neural networks
European Conference on Information Warfare and Security, ECCWS
2013 | conference-paper
Specialized knowledge systems - A model for intelligent learning management within organizations
2013 | book
The matrix of quality dimensions of knowledge management: Knowledge management assessment models review
2013 | journal-article
User Perception for Biometrics and Secret Management
Proceedings of World Congress on Systems Engineering and Information Technology
2013 | journal-article
User's requirements in Internet access sharing
2013 | book
A solution for real time monitoring and auditing of organizational transactions
2012 | conference-paper
An Ontological Approach to Information Security Management
2012 | conference-paper
An ontology approach in designing security information systems to support organizational security risk knowledge
2012 | conference-paper
Automation of the Approval and Control Process of Documents
2012 | book-chapter
Biometric Graphical Authentication – a Patent Review: New Approaches in the Recognition of Users
2012 | conference-paper
Biometric technologies and their perception by the common citizen
2012 | journal-article
Botnets: A heuristic-based detection framework
2012 | conference-paper
Continuous assurance on organizational transactions
2012 | conference-paper
Critical knowledge monitor system model: Healthcare context
2012 | conference-paper
Framework de Gestão de Segurança da Informação para Organizações Militares Orientada pelos Principais Vetores de Ataque
2012 | conference-paper
Healthcare Critical Knowledge Monitor System Model: Critical Knowledge Ontology Component - topic models approach
2012 | conference-paper
Information security model to military organizations in environment of information warfare
2012 | conference-paper
Keystroke dynamics for continuous access control enforcement
2012 | conference-paper
Modelo de Segurança da Informação para Organizações Militares em Ambiente de Guerra de Informação
2012 | journal-article
Study of the perception on the biometric technology by the Portuguese citizens
2012 | book
Video Casting Application Oriented Key Exchange
2012 | conference-paper
Video casting application oriented key exchange
MMEDIA - International Conferences on Advances in Multimedia
2012 | conference-paper
What is Wrong with Biometrics?
2012 | magazine-article
Wireless Identity Management: Multimodal Biometrics and Multilayered IDM
2012 | book-chapter
Botnet detection: A numerical and heuristic analysis
2011 | conference-paper
Description of a practical application of an information security audit framework
2011 | conference-paper
Estudo da percepção dos utilizadores em relação à utilização de tecnologias de autenticação biométrica no acesso aos serviços de saúde
2011 | conference-paper
Grid Learning Classifiers - A Web Based Interface
2011 | journal-article
Grid data mining by means of learning classifier systems and distributed model induction
2011 | conference-paper
Intrusion detection through keystroke dynamics
2011 | conference-paper
Password Sharing and How to Reduce It
2011 | book-chapter
Sistemas Auto-regulados de Conteúdos Orientados para Contextos de Aprendizagem em Ambiente Profissional
2011 | conference-paper
Supervised Learning Classifier Systems for Grid Data Mining
2011 | book-chapter
A Security Audit Framework to Manage Information System Security
2010 | book-chapter
A conceptual model approach to manage and audit information systems security
2010 | conference-paper
A security framework for audit and manage information system security
2010 | conference-paper
An audit framework to support information system security management
2010 | journal-article
An ontology based approach to semantically structure data in security information systems
2010 | conference-paper
Automation of the Approval and Control Process of Documents
2010 | conference-paper
Cyberwar and the Russian Federation: the usual suspect
2010 | journal-article
GridclassTK- Toolkit for grid learning classifier systems
European Conference of Systems, ECS'10, European Conference of Circuits Technology and Devices, ECCTD'10, European Conference of Communications, ECCOM'10, ECCS'10
2010 | conference-paper
Methods of Organizational Information Security
2010 | book-chapter
Multimodal Biometrics and Multilayered IDM for Secure Authentication
2010 | book-chapter
OTM Machine Acceptance: In the Arab Culture
2010 | book-chapter
Odour user interface for authentication: Possibility and acceptance: Case study
2010 | conference-paper
Password sharing and how to reduce it
Certification and Security in Health-Related Web Applications: Concepts and Solutions
2010 | book
Podcasts and vodcasts: pros and cons
2010 | book-chapter
Uma Framework Ontológica para a Gestão da Segurança dos Sistemas de Informação
2010 | conference-paper
User acceptance OTM machine: In the Arab culture
2010 | journal-article
Validating Tam With Odour Interface In Atm Machines
2010 | journal-article
A Grid Data Mining architecture for Learning Classifier Systems
2009 | journal-article
An ontology based approach to information security
2009 | book
Keystroke Dynamics and Graphical Authentication Systems
2009 | book-chapter
Podcasts in Higher Education: Students’ and Lecturers’ Perspectives
2009 | book-chapter
RFID: Big brother global?
2009 | conference-paper
Security framework for information systems
2009 | conference-paper
Streaming contents and RSS feed in a pedagogical environment
2009 | conference-paper
Subsídeos Para uma Eficaz Segurança da Informação nas Organizações
2009 | journal-article
Supervised learning classifier systems for grid data mining
2009 | other
A survey of user authentication based on mouse dynamics
2008 | book
An Ontology Based Approach to Data Surveillance
2008 | book
Structured Textual Data Monitoring Based on a Rough Set Classifier
2008 | conference-paper
User dynamics in graphical authentication systems
2008 | book-chapter
Using technology to overcome the password's contradiction
Handbook of Research on Social and Organizational Liabilities in Information Security
2008 | book
Voice based authentication using the null freqencies
2008 | book
A machine learning approach to keystroke dynamics based user authentication
International Journal of Electronic Security and Digital Forensics
2007 | journal-article
Graphical based user authentication with embedded mouse stroke dynamics
2007 | conference-paper
Information technologies for the information agent
2007 | conference-paper
On the use of rough sets for user authentication via keystroke dynamics
2007 | book-chapter
Prediction of abnormal behaviors for intelligent video surveillance systems
2007 | conference-paper
Reusing Streaming Contents in Engineering and Education Courses
Conference ICL2007, September 26 -28, 2007
2007 | conference-paper
A norma das normas em Segurança da Informação
2006 | journal-article
An approach to information systems risk management of health units,Uma abordagem à gestão do risco para os sistemas de informação das unidades de saúde
CISTI 2006 - Actas da 1a Conferencia Iberica de Sistemas e Tecnologias de Informacao
2006 | conference-paper
An international governmental mailing system : A requirement to prevent web-enhanced terrorism
2006 | conference-paper
Authenticating Computer Access Based On Keystroke Dynamics Using A Probabilistic Neural Network
2006 | conference-paper
Critical aspects in authentication graphic keys
2006 | conference-paper
Data mining a prostate cancer dataset using rough sets
2006 | journal-article
Enhancing login security through the use of keystroke input dynamics
2006 | book
Generation of authentication strings from graphic keys
2006 | journal-article
N-ary trees classifier
2006 | conference-paper
Reaching learning objectives of the cognitive domain with a synchronized streaming media environment
SEFI 2006 - 34th Annual Conference: Engineering Education and Active Students
2006 | conference-paper
The OBSERVER: An intelligent and automated video surveillance system
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2006 | journal-article
An Improved Statistical Keystroke Dynamics Algorithm
2005 | conference-paper
Data mining a keystroke dynamics based biometrics database using rough sets
2005 | book
Developing a Keystroke Dynamics Based Agent Using Rough Sets
2005 | conference-paper
Moving object detection unaffected by cast shadows, highlights and ghosts
2005 | conference-paper
Password secured sites - Stepping forward with keystroke dynamics
2005 | conference-paper
Segurança e Tecnologias no E-Vote
2005 | conference-paper
Um método para a estimativa do valor da informação, numa unidade de saúde
2005 | conference-paper
Wearable Authentication Device with Biometrical Intrusion Prevention System
2005 | conference-paper
Biometria e Autenticação
2003 | conference-paper
O Combate Electrónico - Ataques e Defesas sobre a Rede
2002 | conference-paper
A methodology for complex embedded systems design: Petri nets within a UML approach
2001 | book
Modeling industrial embedded systems with UML
2000 | conference-paper
A heterogeneous computer vision architecture: Implementation issues
1995 | journal-article
Start | End | Term | Value | |
---|---|---|---|---|
Group | CCPM | |||
17/01/2023 20:15 | ||||
17/01/2023 20:10 |