Algoritmi | User | Henrique Manuel Dinis Santos
Henrique Manuel Dinis Santos
Henrique Manuel Dinis Santos
At Algoritmi
Academic Degree
Dr habil
Current Position
Associate Professor with Habilitation at Escola de Engenharia da Universidade do Minho
Personal Webpage
http://www3.dsi.uminho.pt/hsantosPersonal Email
hsantos@dsi.uminho.ptOrcid
0000-0001-5389-3285Researcher ID
B-3004-2008Ciência ID
B618-62ED-57FDGoogle Scholar
https://scholar.google.pt/citations?hl=en&user=S9bS-_QAAAAJh-index
15Publications
151Editorial
4Citations
895Q1 / Q2
8About Me
Henrique M. Dinis Santos received his first degree in Electric and Electronic Engineering, from the University of Coimbra, Portugal, in 1984. In 1996, he received a PhD degree in Computer Engineering from the University of the Minho, Portugal and a habilitation degree in 2013 from the same institution. Currently, he is an Associate Professor (with Habilitation) at the Information Systems Department, University of Minho, and a member of the ALGORITMI R&D centre, more specifically, the Computer Communications and Pervasive Media (CCPM) research group, and member of its Urban Informatics lab, with interests in the fields of Information Security – emphasis on Intrusion Detection, Information Security Management, and biometrical technologies – and Computer Architecture area – emphasis on Computer Vision and Cloud Computing. He co-authored a patent with an industrial partner in 2012 in the biometric area. He is also the President of a national Technical Committee (CT 136) for information system security standardization, President of the Portuguese Association for Data Protection (APPD), University of Minho representative in a NATO project (MN CD E&T – Multi Nacional Cyber Defense Education and Training), within the Smart Defense initiative -, Associate Member of the SysSec community (European Network of Excellence, promoted by a consortium of several universities, institutes and research centres, in the Information Systems Security area) and integrates frequently advice and scientific committees supporting civil (emphasis on accreditation panels for study programs in Cybersecurity), governmental and military organizations. He was Vice President for Conferences and Workshops of IEEE Education Society from 2017 to 2021. During the second semester of 1990, under an ERASMUS program, he taught at the University of Bristol, United Kingdom, where he was recognized as a university academic staff member. Concerning the involvement in the organization of scientific events over the last two years, it should be highlighted: - Steering Committee member of the EAI IoECon 2023 - The Second EAI International Conference on the Internet of Everything, September 28-29, 2023, Guimarães, Portugal; - Guest editor of the Special Issue Advances in IoT Privacy, Security and Applications, Sensors Journal, MDPI, 2023; - Editor-in-chief of the EAI Endorsed Transactions on Smart Cities (open access, peer-reviewed scholarly journal), European Alliance for Innovation (EAI), published by Springer; - Technical Committee member of the International Congress on Blockchain and Applications, University of Salamanca (Spain), 26th-28th June 2024. He regularly collaborates with the editorial body of several journals, namely as a reviewer, including (more recent): Future Generation Computer Systems (Elsevier); Computer Standards & Interfaces (Elsevier); European Journal of Management Studies (EJMS); Cluster Computing (Springer); Computer Methods and Programs in Biomedicine (Elsevier); IEEE Transactions on Industrial Electronics; EEE Internet of Things Journal; and MDPI Sensors.
Publications (192)
Cybersecurity in Supply Chain Systems: The Farm-to-Fork Use Case
Electronics (Switzerland)
2024 | journal-article
Exploring Risk Analysis Methods in IoE Projects: A Smart Campus Use Case
2024 | book-chapter
Information Security Metrics: Challenges and Models in an All-Digital World
2024 | book-chapter
Blockchain and Sustainability in the Public Sector: A Risk Management Perspective
2023 | book-chapter
Blockchain in the Public Sector: An Umbrella Review of Literature
Lecture Notes in Networks and Systems
2023 | conference-paper
Data Management in a Smart Campus Project: An Ontological Approach
2023 International Conference on Engineering Management of Communication and Technology, EMCTECH 2023 - Proceedings
2023 | conference-paper
Editorial: Wireless Networks and IoT Applications
Mobile Networks and Applications
2023 | journal-article
People Tracking in a Smart Campus context using Multiple Cameras
2023 | conference-paper
Preface
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
2023 | book
Continuous Industrial Sector Cybersecurity Assessment Paradigm∗ : Proposed Model of Cybersecurity Certification
2022 18th International Conference on the Design of Reliable Communication Networks, DRCN 2022
2022 | conference-paper
Cybersecurity ; A Practical Engineering Approach
2022 | book
Gain Enhancement of Diversity Slot Antenna Using FSS with Metamaterial Unit Cells for UWB Systems
IEEE Wireless Antenna and Microwave Symposium (WAMS)
2022 | conference-paper
Low-Profile MM-Wave PIFA Array with Omni-Directional and Full-Coverage Radiations
2022 IEEE Wireless Antenna and Microwave Symposium, WAMS 2022
2022 | conference-paper
Virtual Lab Virtues in Distance Learning
Smart Innovation, Systems and Technologies
2022 | conference-paper
Cybersecurity in ict supply chains: Key challenges and a relevant architecture
Sensors
2021 | journal-article
Distributed architecture to enhance systems protection against unauthorized activity via usb devices
Journal of Sensor and Actuator Networks
2021 | journal-article
Dual-Band MIMO Antenna Array for Sub 6 GHz 5G Smartphone Applications
2021 29th Telecommunications Forum, TELFOR 2021 - Proceedings
2021 | conference-paper
Information Security Assessment and Certification within Supply Chains
ACM International Conference Proceeding Series
2021 | conference-paper
Internal MIMO Antenna Design for Multi-Band Mobile Handset Applications
Telecommunications Forum (TELFOR)
2021 | conference-paper
Proposing an Architecture for IoT Based on WSN
Lecture Notes on Data Engineering and Communications Technologies
2021 | book-chapter
Provisioning Cybersecurity in ICT Complex Supply Chains: An Overview, Key Issues and a Relevant Architecture
Preprints.org
2021 | journal-article
Roadmap of security threats between IPv4/IPv6
2021 IEEE International IOT, Electronics and Mechatronics Conference, IEMTRONICS 2021 - Proceedings
2021 | conference-paper
The Future of Engineering Education: Current Challenges and Opportunities
EDUNINE 2021 - 5th IEEE World Engineering Education Conference: The Future of Engineering Education: Current Challenges and Opportunities, Proceedings
2021 | conference-paper
Wideband and Low-Profile Phased Array Smartphone Antenna Supporting 28-38 GHz
Telecommunications Forum (TELFOR)
2021 | conference-paper
Agência da União Europeia para a Cibersegurança (ENISA)
Instituições, Órgão e Organismos da União Europeia, Manuais Universitários
2020 | book-chapter
EDGE4ALL: Edge Computing for Smart City
EAI/Springer Innovations in Communication and Computing
2020 | conference-paper
Plenary: The Challenges of Education in Engineering, Computing and Technology without exclusions: Innovation in the era of the Industrial Revolution 4.0.
EDUNINE 2020 - 4th IEEE World Engineering Education Conference: The Challenges of Education in Engineering, Computing and Technology without Exclusions: Innovation in the Era of the Industrial Revolution 4.0, Proceedings
2020 | conference-paper
Preface S-cube 2019
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
2020 | book
Simulator for Smart City Environment
2020 | book-chapter
Special Issue "Achieving Predictive Maintenance using Sensors: Real or Fantasy?"
Sensors
2020 | journal-issue
Healthcare Critical Knowledge Monitor System Model: Healthcare Knowledge Capture Component Specification
Research in Medical & Engineering Sciences
2019 | journal-article
EDGE4ALL - Edge Platform For Smart City
2019 | conference-paper
Plenary: Modern Educational Paradigms for a Computer and Engineer Career
EDUNINE 2019 - 3rd IEEE World Engineering Education Conference: Modern Educational Paradigms for Computer and Engineering Career, Proceedings
2019 | conference-paper
Promoting Creativity in Final Year Engineering Students' Project: A case study in the Smart Cities context
EDUNINE 2019 - 3rd IEEE World Engineering Education Conference: Modern Educational Paradigms for Computer and Engineering Career, Proceedings
2019 | conference-paper
Smart City Summit Demos 2018
EAI
2019 | edited-book
Study of the Means of Online Payment in the Portuguese Population
Proceedings of 12th International Conference on Global Security, Safety and Sustainability, ICGS3 2019
2019 | conference-paper
Trends in engineering education: A disruptive view for not so far future
2019 18th International Conference on Information Technology Based Higher Education and Training, ITHET 2019
2019 | conference-paper
Work-in-Progress: Global Experiences for Engineering Programs
Advances in Intelligent Systems and Computing
2019 | conference-paper
Automatic human trajectory destination prediction from video
Expert Systems with Applications
2018 | journal-article
Comparison and evaluation of organizational transactions for continuous auditing and business compliance
International Journal of Information System Modeling and Design
2018 | journal-article
Engineering education program promoting the profession
Advances in Intelligent Systems and Computing
2018 | book
Global perspectives on cybersecurity education
Annual Conference on Innovation and Technology in Computer Science Education, ITiCSE
2018 | conference-paper
Global perspectives on cybersecurity education for 2030: A case for a meta-discipline
Annual Conference on Innovation and Technology in Computer Science Education, ITiCSE
2018 | conference-paper
High quality engineering program achievement
Advances in Intelligent Systems and Computing
2018 | conference-paper
International Experiences and the Implications for the Success of Engineering Programs
Proceedings of 2018 IEEE International Conference on Teaching, Assessment, and Learning for Engineering, TALE 2018
2018 | conference-paper
Internationalization project to face the uncertainties of work market
Proceedings - Frontiers in Education Conference, FIE
2018 | conference-paper
Message from the technical program chairs
EDUNINE 2018 - 2nd IEEE World Engineering Education Conference: The Role of Professional Associations in Contemporaneous Engineer Careers, Proceedings
2018 | conference-paper
Proposing a behavior-based IDS model for IoT environment
Lecture Notes in Business Information Processing
2018 | conference-paper
The role of professional associations in contemporaneous engineer careers
EDUNINE 2018 - 2nd IEEE World Engineering Education Conference: The Role of Professional Associations in Contemporaneous Engineer Careers, Proceedings
2018 | conference-paper
Classical Engineering Education Revisited - Why it Matters
2017 | conference-paper
Challenges and Reflections in Designing Cyber Security Curriculum
2017 Ieee World Engineering Education Conference (Edunine)
2017 | journal-article
Challenges and reflections in designing Cyber security curriculum
EDUNINE 2017 - IEEE World Engineering Education Conference: Engineering Education - Balancing Generalist and Specialist Formation in Technological Carriers: A Current Challenge, Proceedings
2017 | conference-paper
Classical engineering education coping with engineering profession demands
Proceedings of the 45th SEFI Annual Conference 2017 - Education Excellence for Sustainability, SEFI 2017
2017 | conference-paper
Classical engineering education revisited - Why it matters
ASEE Annual Conference and Exposition, Conference Proceedings
2017 | conference-paper
Engineering Education: Balancing generalist and specialist formation in technological carriers: A current challenge
EDUNINE 2017 - IEEE World Engineering Education Conference: Engineering Education - Balancing Generalist and Specialist Formation in Technological Carriers: A Current Challenge, Proceedings
2017 | conference-paper
Engineering course specially designed to face retention issue
Proceedings of the 45th SEFI Annual Conference 2017 - Education Excellence for Sustainability, SEFI 2017
2017 | conference-paper
Human skeleton detection from semi-constrained environment video
VISIGRAPP 2017 - Proceedings of the 12th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications
2017 | conference-paper
Knowledge security an empirical use of IT - Child abuse monitor system model
ICT4AWE 2017 - Proceedings of the 3rd International Conference on Information and Communication Technologies for Ageing Well and e-Health
2017 | conference-paper
Pointer dynamics as cognitive biometrics
2016 23 Encontro Portugues de Computacao Grafica e Interacao, EPCGI 2016
2017 | conference-paper
Rethinking engineering education
Proceedings - Frontiers in Education Conference, FIE
2017 | conference-paper
Self-oriented learning based on intelligent systems into the workplace
EDUNINE 2017 - IEEE World Engineering Education Conference: Engineering Education - Balancing Generalist and Specialist Formation in Technological Carriers: A Current Challenge, Proceedings
2017 | conference-paper
Behavioural biometrics for authentication and stress detection – A case study with children
Communications in Computer and Information Science
2016 | conference-paper
Evaluating information systems with continuous assurance services
International Journal of Information Systems in the Service Sector
2016 | journal-article
The information value: Perception of the problem
Advances in Intelligent Systems and Computing
2016 | conference-paper
What is missing for trust in the Cloud Computing?
SIGMIS-CPR 2016 - Proceedings of the 2016 ACM SIGMIS Conference on Computers and People Research
2016 | conference-paper
A Trust model for Cloud Computing environment
Proceedings of the International Conference on Cloud Security Management, ICCSM
2015 | conference-paper
An immunity based configuration for multilayer single featured biometric authentication algorithms
Communications in Computer and Information Science
2015 | conference-paper
Automatic human action recognition from video using Hidden Markov Model
Proceedings - IEEE 18th International Conference on Computational Science and Engineering, CSE 2015
2015 | conference-paper
Automatic visual detection of human behavior: A review from 2000 to 2014
Expert Systems with Applications
2015 | journal-article
Child abuse monitor system model: A health care critical knowledge monitor system
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
2015 | conference-paper
Design of a case-based reasoner for information security in military organizations
European Conference on Information Warfare and Security, ECCWS
2015 | conference-paper
Detection of dangerous situations using a smart internet of things system
Advances in Intelligent Systems and Computing
2015 | conference-paper
Determinants of behavioral intention to mobile banking in Arab culture
Banking, Finance, and Accounting: Concepts, Methodologies, Tools, and Applications
2015 | book-chapter
Enrollment time as a requirement for biometric hand recognition systems
Proceedings of the 10th International Conference on Cyber Warfare and Security, ICCWS 2015
2015 | conference-paper
Insider threats: The major challenge to security risk management
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2015 | conference-paper
Monitoring organizational transactions in enterprise information systems with continuous assurance requirements
International Journal of Enterprise Information Systems
2015 | journal-article
Challenges in information security protection
European Conference on Information Warfare and Security, ECCWS
2014 | conference-paper
Determinants of Behavioral Intention to Mobile Banking in Arab Culture
Research and Design Innovations for Mobile User Experience
2014 | book-chapter
Enrolment time as a requirement for biometric fingerprint recognition
2014 | journal-article
Enrolment time as a requirement for face recognition biometric systems
European Conference on Information Warfare and Security, ECCWS
2014 | conference-paper
Free typed text using keystroke dynamics for continuous authentication
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2014 | conference-paper
Management of internal control mechanisms in ERP for continuous monitoring purposes
Information Systems and Technologies (CISTI), 2014 9th Iberian Conference on
2014 | conference-paper
Planning method of information security for military organizations
European Conference on Information Warfare and Security, ECCWS
2014 | conference-paper
Security metrics to evaluate organizational IT security
ACM International Conference Proceeding Series
2014 | conference-paper
A study of biometric authentication adoption in health services
2013 | book
An enterprise ontology-based database for continuous monitoring application
2013 | conference-paper
Biometrics Acceptance in Arab Culture: an Exploratory Study
2013 International Conference on Computer Applications Technology (Iccat)
2013 | conference-paper
Determinants of behavioral intention to mobile banking in Arab culture
Research and Design Innovations for Mobile User Experience
2013 | book-chapter
Feasibility Study of a Multimodal Biometric Authentication Solution Based on Pointer Dynamics and Skin Conductivity
3rd International Conference on Cybercrime, Security and Digital Forensics
2013 | conference-paper
Health users' perception of biometric authentication technologies
Proceedings of CBMS 2013 - 26th IEEE International Symposium on Computer-Based Medical Systems
2013 | conference-paper
Health users' perception of biometric authentication technologies
Proceedings - IEEE Symposium on Computer-Based Medical Systems
2013 | conference-paper
Information security - Military standards versus ISO 27001: A case study in a Portuguese military organization
European Conference on Information Warfare and Security, ECCWS
2013 | conference-paper
New Technology Acceptance in Europe and Arabic Cultures: Comparative Study
Informing Science & IT Education Conference (InSITE)
2013 | conference-paper
Organizational transactions with real time monitoring and auditing
2013 | journal-article
Password sharing and how to reduce it
IT Policy and Ethics: Concepts, Methodologies, Tools, and Applications
2013 | book-chapter
Requirements in an Internet access sharing model
2013 | journal-article
Requisitos para um Sistema Inteligente de Gestão/Análise de Eventos de Segurançada Informação
Proceedings of World Congress on Systems Engineering and Information Technology
2013 | journal-article
Scan detection system using artificial neural networks
European Conference on Information Warfare and Security, ECCWS
2013 | conference-paper
Specialized knowledge systems - A model for intelligent learning management within organizations
2013 | book
The matrix of quality dimensions of knowledge management: Knowledge management assessment models review
2013 | journal-article
User Perception for Biometrics and Secret Management
Proceedings of World Congress on Systems Engineering and Information Technology
2013 | journal-article
User's requirements in Internet access sharing
Advances in Intelligent Systems and Computing
2013 | conference-paper
A solution for real time monitoring and auditing of organizational transactions
2012 | conference-paper
An Ontological Approach to Information Security Management
2012 | conference-paper
An ontology approach in designing security information systems to support organizational security risk knowledge
2012 | conference-paper
Automation of the Approval and Control Process of Documents
2012 | book-chapter
Biometric Graphical Authentication – a Patent Review: New Approaches in the Recognition of Users
2012 | conference-paper
Biometric technologies and their perception by the common citizen
2012 | journal-article
Botnets: A heuristic-based detection framework
2012 | conference-paper
Continuous assurance on organizational transactions
2012 | conference-paper
Critical knowledge monitor system model: Healthcare context
2012 | conference-paper
Framework de Gestão de Segurança da Informação para Organizações Militares Orientada pelos Principais Vetores de Ataque
2012 | conference-paper
Healthcare Critical Knowledge Monitor System Model: Critical Knowledge Ontology Component - topic models approach
2012 | conference-paper
Information security model to military organizations in environment of information warfare
2012 | conference-paper
Keystroke dynamics for continuous access control enforcement
2012 | conference-paper
Modelo de Segurança da Informação para Organizações Militares em Ambiente de Guerra de Informação
2012 | journal-article
Study of the perception on the biometric technology by the Portuguese citizens
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering
2012 | conference-paper
Video Casting Application Oriented Key Exchange
2012 | conference-paper
Video casting application oriented key exchange
MMEDIA - International Conferences on Advances in Multimedia
2012 | conference-paper
What is Wrong with Biometrics?
2012 | magazine-article
Wireless Identity Management: Multimodal Biometrics and Multilayered IDM
2012 | book-chapter
Botnet detection: A numerical and heuristic analysis
2011 | conference-paper
Description of a practical application of an information security audit framework
2011 | conference-paper
Estudo da percepção dos utilizadores em relação à utilização de tecnologias de autenticação biométrica no acesso aos serviços de saúde
2011 | conference-paper
Grid Learning Classifiers - A Web Based Interface
2011 | journal-article
Grid data mining by means of learning classifier systems and distributed model induction
2011 | conference-paper
Intrusion detection through keystroke dynamics
2011 | conference-paper
Password Sharing and How to Reduce It
2011 | book-chapter
Sistemas Auto-regulados de Conteúdos Orientados para Contextos de Aprendizagem em Ambiente Profissional
2011 | conference-paper
Supervised Learning Classifier Systems for Grid Data Mining
2011 | book-chapter
A Security Audit Framework to Manage Information System Security
2010 | book-chapter
A conceptual model approach to manage and audit information systems security
2010 | conference-paper
A security framework for audit and manage information system security
2010 | conference-paper
An audit framework to support information system security management
2010 | journal-article
An ontology based approach to semantically structure data in security information systems
2010 | conference-paper
Automation of the Approval and Control Process of Documents
2010 | conference-paper
Cyberwar and the Russian Federation: the usual suspect
2010 | journal-article
GridclassTK- Toolkit for grid learning classifier systems
European Conference of Systems, ECS'10, European Conference of Circuits Technology and Devices, ECCTD'10, European Conference of Communications, ECCOM'10, ECCS'10
2010 | conference-paper
Methods of Organizational Information Security
2010 | book-chapter
Multimodal Biometrics and Multilayered IDM for Secure Authentication
2010 | book-chapter
OTM Machine Acceptance: In the Arab Culture
2010 | book-chapter
Odour user interface for authentication: Possibility and acceptance: Case study
2010 | conference-paper
Password sharing and how to reduce it
Certification and Security in Health-Related Web Applications: Concepts and Solutions
2010 | book-chapter
Podcasts and vodcasts: pros and cons
2010 | book-chapter
Uma Framework Ontológica para a Gestão da Segurança dos Sistemas de Informação
2010 | conference-paper
User acceptance OTM machine: In the Arab culture
2010 | journal-article
Validating Tam With Odour Interface In Atm Machines
2010 | journal-article
A Grid Data Mining architecture for Learning Classifier Systems
2009 | journal-article
An ontology based approach to information security
Communications in Computer and Information Science
2009 | conference-paper
Keystroke Dynamics and Graphical Authentication Systems
2009 | book-chapter
Podcasts in Higher Education: Students’ and Lecturers’ Perspectives
2009 | book-chapter
RFID: Big brother global?
2009 | conference-paper
Security framework for information systems
2009 | conference-paper
Streaming contents and RSS feed in a pedagogical environment
2009 | conference-paper
Subsídeos Para uma Eficaz Segurança da Informação nas Organizações
2009 | journal-article
Supervised learning classifier systems for grid data mining
2009 | other
A survey of user authentication based on mouse dynamics
2008 | book
An Ontology Based Approach to Data Surveillance
2008 | book
Structured Textual Data Monitoring Based on a Rough Set Classifier
2008 | conference-paper
User dynamics in graphical authentication systems
2008 | book-chapter
Using technology to overcome the password's contradiction
Handbook of Research on Social and Organizational Liabilities in Information Security
2008 | book-chapter
Voice based authentication using the null freqencies
2008 | book
A machine learning approach to keystroke dynamics based user authentication
International Journal of Electronic Security and Digital Forensics
2007 | journal-article
Graphical based user authentication with embedded mouse stroke dynamics
2007 | conference-paper
Information technologies for the information agent
2007 | conference-paper
On the use of rough sets for user authentication via keystroke dynamics
2007 | book-chapter
Prediction of abnormal behaviors for intelligent video surveillance systems
2007 | conference-paper
Reusing Streaming Contents in Engineering and Education Courses
Conference ICL2007, September 26 -28, 2007
2007 | conference-paper
A norma das normas em Segurança da Informação
2006 | journal-article
An approach to information systems risk management of health units,Uma abordagem à gestão do risco para os sistemas de informação das unidades de saúde
CISTI 2006 - Actas da 1a Conferencia Iberica de Sistemas e Tecnologias de Informacao
2006 | conference-paper
An international governmental mailing system : A requirement to prevent web-enhanced terrorism
2006 | conference-paper
Authenticating Computer Access Based On Keystroke Dynamics Using A Probabilistic Neural Network
2006 | conference-paper
Critical aspects in authentication graphic keys
2006 | conference-paper
Data mining a prostate cancer dataset using rough sets
IEEE Intelligent Systems
2006 | conference-paper
Enhancing login security through the use of keystroke input dynamics
2006 | book
Generation of authentication strings from graphic keys
2006 | journal-article
N-ary trees classifier
2006 | conference-paper
Reaching learning objectives of the cognitive domain with a synchronized streaming media environment
SEFI 2006 - 34th Annual Conference: Engineering Education and Active Students
2006 | conference-paper
The OBSERVER: An intelligent and automated video surveillance system
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2006 | journal-article
An Improved Statistical Keystroke Dynamics Algorithm
2005 | conference-paper
Data mining a keystroke dynamics based biometrics database using rough sets
2005 | book
Developing a Keystroke Dynamics Based Agent Using Rough Sets
2005 | conference-paper
Moving object detection unaffected by cast shadows, highlights and ghosts
2005 | conference-paper
Password secured sites - Stepping forward with keystroke dynamics
2005 | conference-paper
Segurança e Tecnologias no E-Vote
2005 | conference-paper
Um método para a estimativa do valor da informação, numa unidade de saúde
2005 | conference-paper
Wearable Authentication Device with Biometrical Intrusion Prevention System
2005 | conference-paper
Biometria e Autenticação
2003 | conference-paper
O Combate Electrónico - Ataques e Defesas sobre a Rede
2002 | conference-paper
A methodology for complex embedded systems design: Petri nets within a UML approach
IFIP Advances in Information and Communication Technology
2001 | conference-paper
Modeling industrial embedded systems with UML
2000 | conference-paper
A heterogeneous computer vision architecture: Implementation issues
1995 | journal-article
History
Init | End | Change | Value | |
---|---|---|---|---|
Group | CCPM | |||
17/01/2023 20:15 | ||||
17/01/2023 20:10 |
Cybersecurity in Supply Chain Systems: The Farm-to-Fork Use Case
Electronics (Switzerland)
2024 | journal-article
Exploring Risk Analysis Methods in IoE Projects: A Smart Campus Use Case
2024 | book-chapter
Information Security Metrics: Challenges and Models in an All-Digital World
2024 | book-chapter
Blockchain and Sustainability in the Public Sector: A Risk Management Perspective
2023 | book-chapter
Blockchain in the Public Sector: An Umbrella Review of Literature
Lecture Notes in Networks and Systems
2023 | conference-paper
Data Management in a Smart Campus Project: An Ontological Approach
2023 International Conference on Engineering Management of Communication and Technology, EMCTECH 2023 - Proceedings
2023 | conference-paper
Editorial: Wireless Networks and IoT Applications
Mobile Networks and Applications
2023 | journal-article
People Tracking in a Smart Campus context using Multiple Cameras
2023 | conference-paper
Preface
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
2023 | book
Continuous Industrial Sector Cybersecurity Assessment Paradigm∗ : Proposed Model of Cybersecurity Certification
2022 18th International Conference on the Design of Reliable Communication Networks, DRCN 2022
2022 | conference-paper
Cybersecurity ; A Practical Engineering Approach
2022 | book
Gain Enhancement of Diversity Slot Antenna Using FSS with Metamaterial Unit Cells for UWB Systems
IEEE Wireless Antenna and Microwave Symposium (WAMS)
2022 | conference-paper
Low-Profile MM-Wave PIFA Array with Omni-Directional and Full-Coverage Radiations
2022 IEEE Wireless Antenna and Microwave Symposium, WAMS 2022
2022 | conference-paper
Virtual Lab Virtues in Distance Learning
Smart Innovation, Systems and Technologies
2022 | conference-paper
Cybersecurity in ict supply chains: Key challenges and a relevant architecture
Sensors
2021 | journal-article
Distributed architecture to enhance systems protection against unauthorized activity via usb devices
Journal of Sensor and Actuator Networks
2021 | journal-article
Dual-Band MIMO Antenna Array for Sub 6 GHz 5G Smartphone Applications
2021 29th Telecommunications Forum, TELFOR 2021 - Proceedings
2021 | conference-paper
Information Security Assessment and Certification within Supply Chains
ACM International Conference Proceeding Series
2021 | conference-paper
Internal MIMO Antenna Design for Multi-Band Mobile Handset Applications
Telecommunications Forum (TELFOR)
2021 | conference-paper
Proposing an Architecture for IoT Based on WSN
Lecture Notes on Data Engineering and Communications Technologies
2021 | book-chapter
Provisioning Cybersecurity in ICT Complex Supply Chains: An Overview, Key Issues and a Relevant Architecture
Preprints.org
2021 | journal-article
Roadmap of security threats between IPv4/IPv6
2021 IEEE International IOT, Electronics and Mechatronics Conference, IEMTRONICS 2021 - Proceedings
2021 | conference-paper
The Future of Engineering Education: Current Challenges and Opportunities
EDUNINE 2021 - 5th IEEE World Engineering Education Conference: The Future of Engineering Education: Current Challenges and Opportunities, Proceedings
2021 | conference-paper
Wideband and Low-Profile Phased Array Smartphone Antenna Supporting 28-38 GHz
Telecommunications Forum (TELFOR)
2021 | conference-paper
Agência da União Europeia para a Cibersegurança (ENISA)
Instituições, Órgão e Organismos da União Europeia, Manuais Universitários
2020 | book-chapter
EDGE4ALL: Edge Computing for Smart City
EAI/Springer Innovations in Communication and Computing
2020 | conference-paper
Plenary: The Challenges of Education in Engineering, Computing and Technology without exclusions: Innovation in the era of the Industrial Revolution 4.0.
EDUNINE 2020 - 4th IEEE World Engineering Education Conference: The Challenges of Education in Engineering, Computing and Technology without Exclusions: Innovation in the Era of the Industrial Revolution 4.0, Proceedings
2020 | conference-paper
Preface S-cube 2019
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
2020 | book
Simulator for Smart City Environment
2020 | book-chapter
Special Issue "Achieving Predictive Maintenance using Sensors: Real or Fantasy?"
Sensors
2020 | journal-issue
Healthcare Critical Knowledge Monitor System Model: Healthcare Knowledge Capture Component Specification
Research in Medical & Engineering Sciences
2019 | journal-article
EDGE4ALL - Edge Platform For Smart City
2019 | conference-paper
Plenary: Modern Educational Paradigms for a Computer and Engineer Career
EDUNINE 2019 - 3rd IEEE World Engineering Education Conference: Modern Educational Paradigms for Computer and Engineering Career, Proceedings
2019 | conference-paper
Promoting Creativity in Final Year Engineering Students' Project: A case study in the Smart Cities context
EDUNINE 2019 - 3rd IEEE World Engineering Education Conference: Modern Educational Paradigms for Computer and Engineering Career, Proceedings
2019 | conference-paper
Smart City Summit Demos 2018
EAI
2019 | edited-book
Study of the Means of Online Payment in the Portuguese Population
Proceedings of 12th International Conference on Global Security, Safety and Sustainability, ICGS3 2019
2019 | conference-paper
Trends in engineering education: A disruptive view for not so far future
2019 18th International Conference on Information Technology Based Higher Education and Training, ITHET 2019
2019 | conference-paper
Work-in-Progress: Global Experiences for Engineering Programs
Advances in Intelligent Systems and Computing
2019 | conference-paper
Automatic human trajectory destination prediction from video
Expert Systems with Applications
2018 | journal-article
Comparison and evaluation of organizational transactions for continuous auditing and business compliance
International Journal of Information System Modeling and Design
2018 | journal-article
Engineering education program promoting the profession
Advances in Intelligent Systems and Computing
2018 | book
Global perspectives on cybersecurity education
Annual Conference on Innovation and Technology in Computer Science Education, ITiCSE
2018 | conference-paper
Global perspectives on cybersecurity education for 2030: A case for a meta-discipline
Annual Conference on Innovation and Technology in Computer Science Education, ITiCSE
2018 | conference-paper
High quality engineering program achievement
Advances in Intelligent Systems and Computing
2018 | conference-paper
International Experiences and the Implications for the Success of Engineering Programs
Proceedings of 2018 IEEE International Conference on Teaching, Assessment, and Learning for Engineering, TALE 2018
2018 | conference-paper
Internationalization project to face the uncertainties of work market
Proceedings - Frontiers in Education Conference, FIE
2018 | conference-paper
Message from the technical program chairs
EDUNINE 2018 - 2nd IEEE World Engineering Education Conference: The Role of Professional Associations in Contemporaneous Engineer Careers, Proceedings
2018 | conference-paper
Proposing a behavior-based IDS model for IoT environment
Lecture Notes in Business Information Processing
2018 | conference-paper
The role of professional associations in contemporaneous engineer careers
EDUNINE 2018 - 2nd IEEE World Engineering Education Conference: The Role of Professional Associations in Contemporaneous Engineer Careers, Proceedings
2018 | conference-paper
Classical Engineering Education Revisited - Why it Matters
2017 | conference-paper
Challenges and Reflections in Designing Cyber Security Curriculum
2017 Ieee World Engineering Education Conference (Edunine)
2017 | journal-article
Challenges and reflections in designing Cyber security curriculum
EDUNINE 2017 - IEEE World Engineering Education Conference: Engineering Education - Balancing Generalist and Specialist Formation in Technological Carriers: A Current Challenge, Proceedings
2017 | conference-paper
Classical engineering education coping with engineering profession demands
Proceedings of the 45th SEFI Annual Conference 2017 - Education Excellence for Sustainability, SEFI 2017
2017 | conference-paper
Classical engineering education revisited - Why it matters
ASEE Annual Conference and Exposition, Conference Proceedings
2017 | conference-paper
Engineering Education: Balancing generalist and specialist formation in technological carriers: A current challenge
EDUNINE 2017 - IEEE World Engineering Education Conference: Engineering Education - Balancing Generalist and Specialist Formation in Technological Carriers: A Current Challenge, Proceedings
2017 | conference-paper
Engineering course specially designed to face retention issue
Proceedings of the 45th SEFI Annual Conference 2017 - Education Excellence for Sustainability, SEFI 2017
2017 | conference-paper
Human skeleton detection from semi-constrained environment video
VISIGRAPP 2017 - Proceedings of the 12th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications
2017 | conference-paper
Knowledge security an empirical use of IT - Child abuse monitor system model
ICT4AWE 2017 - Proceedings of the 3rd International Conference on Information and Communication Technologies for Ageing Well and e-Health
2017 | conference-paper
Pointer dynamics as cognitive biometrics
2016 23 Encontro Portugues de Computacao Grafica e Interacao, EPCGI 2016
2017 | conference-paper
Rethinking engineering education
Proceedings - Frontiers in Education Conference, FIE
2017 | conference-paper
Self-oriented learning based on intelligent systems into the workplace
EDUNINE 2017 - IEEE World Engineering Education Conference: Engineering Education - Balancing Generalist and Specialist Formation in Technological Carriers: A Current Challenge, Proceedings
2017 | conference-paper
Behavioural biometrics for authentication and stress detection – A case study with children
Communications in Computer and Information Science
2016 | conference-paper
Evaluating information systems with continuous assurance services
International Journal of Information Systems in the Service Sector
2016 | journal-article
The information value: Perception of the problem
Advances in Intelligent Systems and Computing
2016 | conference-paper
What is missing for trust in the Cloud Computing?
SIGMIS-CPR 2016 - Proceedings of the 2016 ACM SIGMIS Conference on Computers and People Research
2016 | conference-paper
A Trust model for Cloud Computing environment
Proceedings of the International Conference on Cloud Security Management, ICCSM
2015 | conference-paper
An immunity based configuration for multilayer single featured biometric authentication algorithms
Communications in Computer and Information Science
2015 | conference-paper
Automatic human action recognition from video using Hidden Markov Model
Proceedings - IEEE 18th International Conference on Computational Science and Engineering, CSE 2015
2015 | conference-paper
Automatic visual detection of human behavior: A review from 2000 to 2014
Expert Systems with Applications
2015 | journal-article
Child abuse monitor system model: A health care critical knowledge monitor system
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
2015 | conference-paper
Design of a case-based reasoner for information security in military organizations
European Conference on Information Warfare and Security, ECCWS
2015 | conference-paper
Detection of dangerous situations using a smart internet of things system
Advances in Intelligent Systems and Computing
2015 | conference-paper
Determinants of behavioral intention to mobile banking in Arab culture
Banking, Finance, and Accounting: Concepts, Methodologies, Tools, and Applications
2015 | book-chapter
Enrollment time as a requirement for biometric hand recognition systems
Proceedings of the 10th International Conference on Cyber Warfare and Security, ICCWS 2015
2015 | conference-paper
Insider threats: The major challenge to security risk management
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2015 | conference-paper
Monitoring organizational transactions in enterprise information systems with continuous assurance requirements
International Journal of Enterprise Information Systems
2015 | journal-article
Challenges in information security protection
European Conference on Information Warfare and Security, ECCWS
2014 | conference-paper
Determinants of Behavioral Intention to Mobile Banking in Arab Culture
Research and Design Innovations for Mobile User Experience
2014 | book-chapter
Enrolment time as a requirement for biometric fingerprint recognition
2014 | journal-article
Enrolment time as a requirement for face recognition biometric systems
European Conference on Information Warfare and Security, ECCWS
2014 | conference-paper
Free typed text using keystroke dynamics for continuous authentication
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2014 | conference-paper
Management of internal control mechanisms in ERP for continuous monitoring purposes
Information Systems and Technologies (CISTI), 2014 9th Iberian Conference on
2014 | conference-paper
Planning method of information security for military organizations
European Conference on Information Warfare and Security, ECCWS
2014 | conference-paper
Security metrics to evaluate organizational IT security
ACM International Conference Proceeding Series
2014 | conference-paper
A study of biometric authentication adoption in health services
2013 | book
An enterprise ontology-based database for continuous monitoring application
2013 | conference-paper
Biometrics Acceptance in Arab Culture: an Exploratory Study
2013 International Conference on Computer Applications Technology (Iccat)
2013 | conference-paper
Determinants of behavioral intention to mobile banking in Arab culture
Research and Design Innovations for Mobile User Experience
2013 | book-chapter
Feasibility Study of a Multimodal Biometric Authentication Solution Based on Pointer Dynamics and Skin Conductivity
3rd International Conference on Cybercrime, Security and Digital Forensics
2013 | conference-paper
Health users' perception of biometric authentication technologies
Proceedings of CBMS 2013 - 26th IEEE International Symposium on Computer-Based Medical Systems
2013 | conference-paper
Health users' perception of biometric authentication technologies
Proceedings - IEEE Symposium on Computer-Based Medical Systems
2013 | conference-paper
Information security - Military standards versus ISO 27001: A case study in a Portuguese military organization
European Conference on Information Warfare and Security, ECCWS
2013 | conference-paper
New Technology Acceptance in Europe and Arabic Cultures: Comparative Study
Informing Science & IT Education Conference (InSITE)
2013 | conference-paper
Organizational transactions with real time monitoring and auditing
2013 | journal-article
Password sharing and how to reduce it
IT Policy and Ethics: Concepts, Methodologies, Tools, and Applications
2013 | book-chapter
Requirements in an Internet access sharing model
2013 | journal-article
Requisitos para um Sistema Inteligente de Gestão/Análise de Eventos de Segurançada Informação
Proceedings of World Congress on Systems Engineering and Information Technology
2013 | journal-article
Scan detection system using artificial neural networks
European Conference on Information Warfare and Security, ECCWS
2013 | conference-paper
Specialized knowledge systems - A model for intelligent learning management within organizations
2013 | book
The matrix of quality dimensions of knowledge management: Knowledge management assessment models review
2013 | journal-article
User Perception for Biometrics and Secret Management
Proceedings of World Congress on Systems Engineering and Information Technology
2013 | journal-article
User's requirements in Internet access sharing
Advances in Intelligent Systems and Computing
2013 | conference-paper
A solution for real time monitoring and auditing of organizational transactions
2012 | conference-paper
An Ontological Approach to Information Security Management
2012 | conference-paper
An ontology approach in designing security information systems to support organizational security risk knowledge
2012 | conference-paper
Automation of the Approval and Control Process of Documents
2012 | book-chapter
Biometric Graphical Authentication – a Patent Review: New Approaches in the Recognition of Users
2012 | conference-paper
Biometric technologies and their perception by the common citizen
2012 | journal-article
Botnets: A heuristic-based detection framework
2012 | conference-paper
Continuous assurance on organizational transactions
2012 | conference-paper
Critical knowledge monitor system model: Healthcare context
2012 | conference-paper
Framework de Gestão de Segurança da Informação para Organizações Militares Orientada pelos Principais Vetores de Ataque
2012 | conference-paper
Healthcare Critical Knowledge Monitor System Model: Critical Knowledge Ontology Component - topic models approach
2012 | conference-paper
Information security model to military organizations in environment of information warfare
2012 | conference-paper
Keystroke dynamics for continuous access control enforcement
2012 | conference-paper
Modelo de Segurança da Informação para Organizações Militares em Ambiente de Guerra de Informação
2012 | journal-article
Study of the perception on the biometric technology by the Portuguese citizens
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering
2012 | conference-paper
Video Casting Application Oriented Key Exchange
2012 | conference-paper
Video casting application oriented key exchange
MMEDIA - International Conferences on Advances in Multimedia
2012 | conference-paper
What is Wrong with Biometrics?
2012 | magazine-article
Wireless Identity Management: Multimodal Biometrics and Multilayered IDM
2012 | book-chapter
Botnet detection: A numerical and heuristic analysis
2011 | conference-paper
Description of a practical application of an information security audit framework
2011 | conference-paper
Estudo da percepção dos utilizadores em relação à utilização de tecnologias de autenticação biométrica no acesso aos serviços de saúde
2011 | conference-paper
Grid Learning Classifiers - A Web Based Interface
2011 | journal-article
Grid data mining by means of learning classifier systems and distributed model induction
2011 | conference-paper
Intrusion detection through keystroke dynamics
2011 | conference-paper
Password Sharing and How to Reduce It
2011 | book-chapter
Sistemas Auto-regulados de Conteúdos Orientados para Contextos de Aprendizagem em Ambiente Profissional
2011 | conference-paper
Supervised Learning Classifier Systems for Grid Data Mining
2011 | book-chapter
A Security Audit Framework to Manage Information System Security
2010 | book-chapter
A conceptual model approach to manage and audit information systems security
2010 | conference-paper
A security framework for audit and manage information system security
2010 | conference-paper
An audit framework to support information system security management
2010 | journal-article
An ontology based approach to semantically structure data in security information systems
2010 | conference-paper
Automation of the Approval and Control Process of Documents
2010 | conference-paper
Cyberwar and the Russian Federation: the usual suspect
2010 | journal-article
GridclassTK- Toolkit for grid learning classifier systems
European Conference of Systems, ECS'10, European Conference of Circuits Technology and Devices, ECCTD'10, European Conference of Communications, ECCOM'10, ECCS'10
2010 | conference-paper
Methods of Organizational Information Security
2010 | book-chapter
Multimodal Biometrics and Multilayered IDM for Secure Authentication
2010 | book-chapter
OTM Machine Acceptance: In the Arab Culture
2010 | book-chapter
Odour user interface for authentication: Possibility and acceptance: Case study
2010 | conference-paper
Password sharing and how to reduce it
Certification and Security in Health-Related Web Applications: Concepts and Solutions
2010 | book-chapter
Podcasts and vodcasts: pros and cons
2010 | book-chapter
Uma Framework Ontológica para a Gestão da Segurança dos Sistemas de Informação
2010 | conference-paper
User acceptance OTM machine: In the Arab culture
2010 | journal-article
Validating Tam With Odour Interface In Atm Machines
2010 | journal-article
A Grid Data Mining architecture for Learning Classifier Systems
2009 | journal-article
An ontology based approach to information security
Communications in Computer and Information Science
2009 | conference-paper
Keystroke Dynamics and Graphical Authentication Systems
2009 | book-chapter
Podcasts in Higher Education: Students’ and Lecturers’ Perspectives
2009 | book-chapter
RFID: Big brother global?
2009 | conference-paper
Security framework for information systems
2009 | conference-paper
Streaming contents and RSS feed in a pedagogical environment
2009 | conference-paper
Subsídeos Para uma Eficaz Segurança da Informação nas Organizações
2009 | journal-article
Supervised learning classifier systems for grid data mining
2009 | other
A survey of user authentication based on mouse dynamics
2008 | book
An Ontology Based Approach to Data Surveillance
2008 | book
Structured Textual Data Monitoring Based on a Rough Set Classifier
2008 | conference-paper
User dynamics in graphical authentication systems
2008 | book-chapter
Using technology to overcome the password's contradiction
Handbook of Research on Social and Organizational Liabilities in Information Security
2008 | book-chapter
Voice based authentication using the null freqencies
2008 | book
A machine learning approach to keystroke dynamics based user authentication
International Journal of Electronic Security and Digital Forensics
2007 | journal-article
Graphical based user authentication with embedded mouse stroke dynamics
2007 | conference-paper
Information technologies for the information agent
2007 | conference-paper
On the use of rough sets for user authentication via keystroke dynamics
2007 | book-chapter
Prediction of abnormal behaviors for intelligent video surveillance systems
2007 | conference-paper
Reusing Streaming Contents in Engineering and Education Courses
Conference ICL2007, September 26 -28, 2007
2007 | conference-paper
A norma das normas em Segurança da Informação
2006 | journal-article
An approach to information systems risk management of health units,Uma abordagem à gestão do risco para os sistemas de informação das unidades de saúde
CISTI 2006 - Actas da 1a Conferencia Iberica de Sistemas e Tecnologias de Informacao
2006 | conference-paper
An international governmental mailing system : A requirement to prevent web-enhanced terrorism
2006 | conference-paper
Authenticating Computer Access Based On Keystroke Dynamics Using A Probabilistic Neural Network
2006 | conference-paper
Critical aspects in authentication graphic keys
2006 | conference-paper
Data mining a prostate cancer dataset using rough sets
IEEE Intelligent Systems
2006 | conference-paper
Enhancing login security through the use of keystroke input dynamics
2006 | book
Generation of authentication strings from graphic keys
2006 | journal-article
N-ary trees classifier
2006 | conference-paper
Reaching learning objectives of the cognitive domain with a synchronized streaming media environment
SEFI 2006 - 34th Annual Conference: Engineering Education and Active Students
2006 | conference-paper
The OBSERVER: An intelligent and automated video surveillance system
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2006 | journal-article
An Improved Statistical Keystroke Dynamics Algorithm
2005 | conference-paper
Data mining a keystroke dynamics based biometrics database using rough sets
2005 | book
Developing a Keystroke Dynamics Based Agent Using Rough Sets
2005 | conference-paper
Moving object detection unaffected by cast shadows, highlights and ghosts
2005 | conference-paper
Password secured sites - Stepping forward with keystroke dynamics
2005 | conference-paper
Segurança e Tecnologias no E-Vote
2005 | conference-paper
Um método para a estimativa do valor da informação, numa unidade de saúde
2005 | conference-paper
Wearable Authentication Device with Biometrical Intrusion Prevention System
2005 | conference-paper
Biometria e Autenticação
2003 | conference-paper
O Combate Electrónico - Ataques e Defesas sobre a Rede
2002 | conference-paper
A methodology for complex embedded systems design: Petri nets within a UML approach
IFIP Advances in Information and Communication Technology
2001 | conference-paper
Modeling industrial embedded systems with UML
2000 | conference-paper
A heterogeneous computer vision architecture: Implementation issues
1995 | journal-article
Start | End | Term | Value | |
---|---|---|---|---|
Group | CCPM | |||
17/01/2023 20:15 | ||||
17/01/2023 20:10 |