Algoritmi | User | Henrique Manuel Dinis Santos

Henrique Manuel Dinis Santos

Henrique Manuel Dinis Santos

At Algoritmi

Senior Researcher with Dr habil

Member of the CCPM R&D Group

Academic Degree

Dr habil

Current Position

Associate Professor with Habilitation at Escola de Engenharia da Universidade do Minho

Personal Webpage

http://www3.dsi.uminho.pt/hsantos

Personal Email

hsantos@dsi.uminho.pt

Orcid

0000-0001-5389-3285

Researcher ID

B-3004-2008

FCT Public Key

J005081qm88Y

Ciência ID

B618-62ED-57FD

Google Scholar

https://scholar.google.pt/citations?hl=en&user=S9bS-_QAAAAJ

h-index

12

Publications

133

Editorial

1

Citations

621

Q1 / Q2

8

About Me



Cybersecurity in Supply Chain Systems: The Farm-to-Fork Use Case

Electronics (Switzerland)

2024 | journal-article

Exploring Risk Analysis Methods in IoE Projects: A Smart Campus Use Case

2024 | book-chapter

Information Security Metrics: Challenges and Models in an All-Digital World

2024 | book-chapter

Blockchain and Sustainability in the Public Sector: A Risk Management Perspective

2023 | book-chapter

Blockchain in the Public Sector: An Umbrella Review of Literature

Lecture Notes in Networks and Systems

2023 | conference-paper

Data Management in a Smart Campus Project: An Ontological Approach

2023 International Conference on Engineering Management of Communication and Technology, EMCTECH 2023 - Proceedings

2023 | conference-paper

Editorial: Wireless Networks and IoT Applications

Mobile Networks and Applications

2023 | journal-article

People Tracking in a Smart Campus context using Multiple Cameras

2023 | conference-paper

Preface

Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST

2023 | book

Continuous Industrial Sector Cybersecurity Assessment Paradigm∗ : Proposed Model of Cybersecurity Certification

2022 18th International Conference on the Design of Reliable Communication Networks, DRCN 2022

2022 | conference-paper

Cybersecurity ; A Practical Engineering Approach

2022 | book

Gain Enhancement of Diversity Slot Antenna Using FSS with Metamaterial Unit Cells for UWB Systems

IEEE Wireless Antenna and Microwave Symposium (WAMS)

2022 | conference-paper

Low-Profile MM-Wave PIFA Array with Omni-Directional and Full-Coverage Radiations

2022 IEEE Wireless Antenna and Microwave Symposium, WAMS 2022

2022 | conference-paper

Virtual Lab Virtues in Distance Learning

Smart Innovation, Systems and Technologies

2022 | conference-paper

Cybersecurity in ict supply chains: Key challenges and a relevant architecture

Sensors

2021 | journal-article

Distributed architecture to enhance systems protection against unauthorized activity via usb devices

Journal of Sensor and Actuator Networks

2021 | journal-article

Dual-Band MIMO Antenna Array for Sub 6 GHz 5G Smartphone Applications

2021 29th Telecommunications Forum, TELFOR 2021 - Proceedings

2021 | conference-paper

Information Security Assessment and Certification within Supply Chains

ACM International Conference Proceeding Series

2021 | conference-paper

Internal MIMO Antenna Design for Multi-Band Mobile Handset Applications

Telecommunications Forum (TELFOR)

2021 | conference-paper

Proposing an Architecture for IoT Based on WSN

Lecture Notes on Data Engineering and Communications Technologies

2021 | book-chapter

Provisioning Cybersecurity in ICT Complex Supply Chains: An Overview, Key Issues and a Relevant Architecture

Preprints.org

2021 | journal-article

Roadmap of security threats between IPv4/IPv6

2021 IEEE International IOT, Electronics and Mechatronics Conference, IEMTRONICS 2021 - Proceedings

2021 | conference-paper

The Future of Engineering Education: Current Challenges and Opportunities

EDUNINE 2021 - 5th IEEE World Engineering Education Conference: The Future of Engineering Education: Current Challenges and Opportunities, Proceedings

2021 | conference-paper

Wideband and Low-Profile Phased Array Smartphone Antenna Supporting 28-38 GHz

Telecommunications Forum (TELFOR)

2021 | conference-paper

Agência da União Europeia para a Cibersegurança (ENISA)

Instituições, Órgão e Organismos da União Europeia, Manuais Universitários

2020 | book-chapter

EDGE4ALL: Edge Computing for Smart City

EAI/Springer Innovations in Communication and Computing

2020 | conference-paper

Plenary: The Challenges of Education in Engineering, Computing and Technology without exclusions: Innovation in the era of the Industrial Revolution 4.0.

EDUNINE 2020 - 4th IEEE World Engineering Education Conference: The Challenges of Education in Engineering, Computing and Technology without Exclusions: Innovation in the Era of the Industrial Revolution 4.0, Proceedings

2020 | conference-paper

Preface S-cube 2019

Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST

2020 | book

Simulator for Smart City Environment

2020 | book-chapter

Special Issue "Achieving Predictive Maintenance using Sensors: Real or Fantasy?"

Sensors

2020 | journal-issue

Healthcare Critical Knowledge Monitor System Model: Healthcare Knowledge Capture Component Specification

Research in Medical & Engineering Sciences

2019 | journal-article

EDGE4ALL - Edge Platform For Smart City

2019 | conference-paper

Plenary: Modern Educational Paradigms for a Computer and Engineer Career

EDUNINE 2019 - 3rd IEEE World Engineering Education Conference: Modern Educational Paradigms for Computer and Engineering Career, Proceedings

2019 | conference-paper

Promoting Creativity in Final Year Engineering Students' Project: A case study in the Smart Cities context

EDUNINE 2019 - 3rd IEEE World Engineering Education Conference: Modern Educational Paradigms for Computer and Engineering Career, Proceedings

2019 | conference-paper

Smart City Summit Demos 2018

EAI

2019 | edited-book

Study of the Means of Online Payment in the Portuguese Population

Proceedings of 12th International Conference on Global Security, Safety and Sustainability, ICGS3 2019

2019 | conference-paper

Trends in engineering education: A disruptive view for not so far future

2019 18th International Conference on Information Technology Based Higher Education and Training, ITHET 2019

2019 | conference-paper

Work-in-Progress: Global Experiences for Engineering Programs

Advances in Intelligent Systems and Computing

2019 | conference-paper

Automatic human trajectory destination prediction from video

Expert Systems with Applications

2018 | journal-article

Comparison and evaluation of organizational transactions for continuous auditing and business compliance

International Journal of Information System Modeling and Design

2018 | journal-article

Engineering education program promoting the profession

Advances in Intelligent Systems and Computing

2018 | book

Global perspectives on cybersecurity education

Annual Conference on Innovation and Technology in Computer Science Education, ITiCSE

2018 | conference-paper

Global perspectives on cybersecurity education for 2030: A case for a meta-discipline

Annual Conference on Innovation and Technology in Computer Science Education, ITiCSE

2018 | conference-paper

High quality engineering program achievement

Advances in Intelligent Systems and Computing

2018 | conference-paper

International Experiences and the Implications for the Success of Engineering Programs

Proceedings of 2018 IEEE International Conference on Teaching, Assessment, and Learning for Engineering, TALE 2018

2018 | conference-paper

Internationalization project to face the uncertainties of work market

Proceedings - Frontiers in Education Conference, FIE

2018 | conference-paper

Message from the technical program chairs

EDUNINE 2018 - 2nd IEEE World Engineering Education Conference: The Role of Professional Associations in Contemporaneous Engineer Careers, Proceedings

2018 | conference-paper

Proposing a behavior-based IDS model for IoT environment

Lecture Notes in Business Information Processing

2018 | conference-paper

The role of professional associations in contemporaneous engineer careers

EDUNINE 2018 - 2nd IEEE World Engineering Education Conference: The Role of Professional Associations in Contemporaneous Engineer Careers, Proceedings

2018 | conference-paper

Classical Engineering Education Revisited - Why it Matters

2017 | conference-paper

Challenges and Reflections in Designing Cyber Security Curriculum

2017 Ieee World Engineering Education Conference (Edunine)

2017 | journal-article

Challenges and reflections in designing Cyber security curriculum

EDUNINE 2017 - IEEE World Engineering Education Conference: Engineering Education - Balancing Generalist and Specialist Formation in Technological Carriers: A Current Challenge, Proceedings

2017 | conference-paper

Classical engineering education coping with engineering profession demands

Proceedings of the 45th SEFI Annual Conference 2017 - Education Excellence for Sustainability, SEFI 2017

2017 | conference-paper

Classical engineering education revisited - Why it matters

ASEE Annual Conference and Exposition, Conference Proceedings

2017 | conference-paper

Engineering Education: Balancing generalist and specialist formation in technological carriers: A current challenge

EDUNINE 2017 - IEEE World Engineering Education Conference: Engineering Education - Balancing Generalist and Specialist Formation in Technological Carriers: A Current Challenge, Proceedings

2017 | conference-paper

Engineering course specially designed to face retention issue

Proceedings of the 45th SEFI Annual Conference 2017 - Education Excellence for Sustainability, SEFI 2017

2017 | conference-paper

Human skeleton detection from semi-constrained environment video

VISIGRAPP 2017 - Proceedings of the 12th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications

2017 | conference-paper

Knowledge security an empirical use of IT - Child abuse monitor system model

ICT4AWE 2017 - Proceedings of the 3rd International Conference on Information and Communication Technologies for Ageing Well and e-Health

2017 | conference-paper

Pointer dynamics as cognitive biometrics

2016 23 Encontro Portugues de Computacao Grafica e Interacao, EPCGI 2016

2017 | conference-paper

Rethinking engineering education

Proceedings - Frontiers in Education Conference, FIE

2017 | conference-paper

Self-oriented learning based on intelligent systems into the workplace

EDUNINE 2017 - IEEE World Engineering Education Conference: Engineering Education - Balancing Generalist and Specialist Formation in Technological Carriers: A Current Challenge, Proceedings

2017 | conference-paper

Behavioural biometrics for authentication and stress detection – A case study with children

Communications in Computer and Information Science

2016 | conference-paper

Evaluating information systems with continuous assurance services

International Journal of Information Systems in the Service Sector

2016 | journal-article

The information value: Perception of the problem

Advances in Intelligent Systems and Computing

2016 | conference-paper

What is missing for trust in the Cloud Computing?

SIGMIS-CPR 2016 - Proceedings of the 2016 ACM SIGMIS Conference on Computers and People Research

2016 | conference-paper

A Trust model for Cloud Computing environment

Proceedings of the International Conference on Cloud Security Management, ICCSM

2015 | conference-paper

An immunity based configuration for multilayer single featured biometric authentication algorithms

Communications in Computer and Information Science

2015 | conference-paper

Automatic human action recognition from video using Hidden Markov Model

Proceedings - IEEE 18th International Conference on Computational Science and Engineering, CSE 2015

2015 | conference-paper

Automatic visual detection of human behavior: A review from 2000 to 2014

Expert Systems with Applications

2015 | journal-article

Child abuse monitor system model: A health care critical knowledge monitor system

Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST

2015 | conference-paper

Design of a case-based reasoner for information security in military organizations

European Conference on Information Warfare and Security, ECCWS

2015 | conference-paper

Detection of dangerous situations using a smart internet of things system

Advances in Intelligent Systems and Computing

2015 | conference-paper

Determinants of behavioral intention to mobile banking in Arab culture

Banking, Finance, and Accounting: Concepts, Methodologies, Tools, and Applications

2015 | book-chapter

Enrollment time as a requirement for biometric hand recognition systems

Proceedings of the 10th International Conference on Cyber Warfare and Security, ICCWS 2015

2015 | conference-paper

Insider threats: The major challenge to security risk management

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

2015 | conference-paper

Monitoring organizational transactions in enterprise information systems with continuous assurance requirements

International Journal of Enterprise Information Systems

2015 | journal-article

Challenges in information security protection

European Conference on Information Warfare and Security, ECCWS

2014 | conference-paper

Determinants of Behavioral Intention to Mobile Banking in Arab Culture

Research and Design Innovations for Mobile User Experience

2014 | book-chapter

Enrolment time as a requirement for biometric fingerprint recognition

2014 | journal-article

Enrolment time as a requirement for face recognition biometric systems

European Conference on Information Warfare and Security, ECCWS

2014 | conference-paper

Free typed text using keystroke dynamics for continuous authentication

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

2014 | conference-paper

Management of internal control mechanisms in ERP for continuous monitoring purposes

Information Systems and Technologies (CISTI), 2014 9th Iberian Conference on

2014 | conference-paper

Planning method of information security for military organizations

European Conference on Information Warfare and Security, ECCWS

2014 | conference-paper

Security metrics to evaluate organizational IT security

ACM International Conference Proceeding Series

2014 | conference-paper

A study of biometric authentication adoption in health services

2013 | book

An enterprise ontology-based database for continuous monitoring application

2013 | conference-paper

Biometrics Acceptance in Arab Culture: an Exploratory Study

2013 International Conference on Computer Applications Technology (Iccat)

2013 | conference-paper

Determinants of behavioral intention to mobile banking in Arab culture

Research and Design Innovations for Mobile User Experience

2013 | book-chapter

Feasibility Study of a Multimodal Biometric Authentication Solution Based on Pointer Dynamics and Skin Conductivity

3rd International Conference on Cybercrime, Security and Digital Forensics

2013 | conference-paper

Health users' perception of biometric authentication technologies

Proceedings of CBMS 2013 - 26th IEEE International Symposium on Computer-Based Medical Systems

2013 | conference-paper

Health users' perception of biometric authentication technologies

Proceedings - IEEE Symposium on Computer-Based Medical Systems

2013 | conference-paper

Information security - Military standards versus ISO 27001: A case study in a Portuguese military organization

European Conference on Information Warfare and Security, ECCWS

2013 | conference-paper

New Technology Acceptance in Europe and Arabic Cultures: Comparative Study

Informing Science & IT Education Conference (InSITE)

2013 | conference-paper

Organizational transactions with real time monitoring and auditing

2013 | journal-article

Password sharing and how to reduce it

IT Policy and Ethics: Concepts, Methodologies, Tools, and Applications

2013 | book-chapter

Requirements in an Internet access sharing model

2013 | journal-article

Requisitos para um Sistema Inteligente de Gestão/Análise de Eventos de Segurançada Informação

Proceedings of World Congress on Systems Engineering and Information Technology

2013 | journal-article

Scan detection system using artificial neural networks

European Conference on Information Warfare and Security, ECCWS

2013 | conference-paper

Specialized knowledge systems - A model for intelligent learning management within organizations

2013 | book

The matrix of quality dimensions of knowledge management: Knowledge management assessment models review

2013 | journal-article

User Perception for Biometrics and Secret Management

Proceedings of World Congress on Systems Engineering and Information Technology

2013 | journal-article

User's requirements in Internet access sharing

Advances in Intelligent Systems and Computing

2013 | conference-paper

A solution for real time monitoring and auditing of organizational transactions

2012 | conference-paper

An Ontological Approach to Information Security Management

2012 | conference-paper

An ontology approach in designing security information systems to support organizational security risk knowledge

2012 | conference-paper

Automation of the Approval and Control Process of Documents

2012 | book-chapter

Biometric Graphical Authentication – a Patent Review: New Approaches in the Recognition of Users

2012 | conference-paper

Biometric technologies and their perception by the common citizen

2012 | journal-article

Botnets: A heuristic-based detection framework

2012 | conference-paper

Continuous assurance on organizational transactions

2012 | conference-paper

Critical knowledge monitor system model: Healthcare context

2012 | conference-paper

Framework de Gestão de Segurança da Informação para Organizações Militares Orientada pelos Principais Vetores de Ataque

2012 | conference-paper

Healthcare Critical Knowledge Monitor System Model: Critical Knowledge Ontology Component - topic models approach

2012 | conference-paper

Information security model to military organizations in environment of information warfare

2012 | conference-paper

Keystroke dynamics for continuous access control enforcement

2012 | conference-paper

Modelo de Segurança da Informação para Organizações Militares em Ambiente de Guerra de Informação

2012 | journal-article

Study of the perception on the biometric technology by the Portuguese citizens

Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering

2012 | conference-paper

Video Casting Application Oriented Key Exchange

2012 | conference-paper

Video casting application oriented key exchange

MMEDIA - International Conferences on Advances in Multimedia

2012 | conference-paper

What is Wrong with Biometrics?

2012 | magazine-article

Wireless Identity Management: Multimodal Biometrics and Multilayered IDM

2012 | book-chapter

Botnet detection: A numerical and heuristic analysis

2011 | conference-paper

Description of a practical application of an information security audit framework

2011 | conference-paper

Estudo da percepção dos utilizadores em relação à utilização de tecnologias de autenticação biométrica no acesso aos serviços de saúde

2011 | conference-paper

Grid Learning Classifiers - A Web Based Interface

2011 | journal-article

Grid data mining by means of learning classifier systems and distributed model induction

2011 | conference-paper

Intrusion detection through keystroke dynamics

2011 | conference-paper

Password Sharing and How to Reduce It

2011 | book-chapter

Sistemas Auto-regulados de Conteúdos Orientados para Contextos de Aprendizagem em Ambiente Profissional

2011 | conference-paper

Supervised Learning Classifier Systems for Grid Data Mining

2011 | book-chapter

A Security Audit Framework to Manage Information System Security

2010 | book-chapter

A conceptual model approach to manage and audit information systems security

2010 | conference-paper

A security framework for audit and manage information system security

2010 | conference-paper

An audit framework to support information system security management

2010 | journal-article

An ontology based approach to semantically structure data in security information systems

2010 | conference-paper

Automation of the Approval and Control Process of Documents

2010 | conference-paper

Cyberwar and the Russian Federation: the usual suspect

2010 | journal-article

GridclassTK- Toolkit for grid learning classifier systems

European Conference of Systems, ECS'10, European Conference of Circuits Technology and Devices, ECCTD'10, European Conference of Communications, ECCOM'10, ECCS'10

2010 | conference-paper

Methods of Organizational Information Security

2010 | book-chapter

Multimodal Biometrics and Multilayered IDM for Secure Authentication

2010 | book-chapter

OTM Machine Acceptance: In the Arab Culture

2010 | book-chapter

Odour user interface for authentication: Possibility and acceptance: Case study

2010 | conference-paper

Password sharing and how to reduce it

Certification and Security in Health-Related Web Applications: Concepts and Solutions

2010 | book-chapter

Podcasts and vodcasts: pros and cons

2010 | book-chapter

Uma Framework Ontológica para a Gestão da Segurança dos Sistemas de Informação

2010 | conference-paper

User acceptance OTM machine: In the Arab culture

2010 | journal-article

Validating Tam With Odour Interface In Atm Machines

2010 | journal-article

A Grid Data Mining architecture for Learning Classifier Systems

2009 | journal-article

An ontology based approach to information security

Communications in Computer and Information Science

2009 | conference-paper

Keystroke Dynamics and Graphical Authentication Systems

2009 | book-chapter

Podcasts in Higher Education: Students’ and Lecturers’ Perspectives

2009 | book-chapter

RFID: Big brother global?

2009 | conference-paper

Security framework for information systems

2009 | conference-paper

Streaming contents and RSS feed in a pedagogical environment

2009 | conference-paper

Subsídeos Para uma Eficaz Segurança da Informação nas Organizações

2009 | journal-article

Supervised learning classifier systems for grid data mining

2009 | other

A survey of user authentication based on mouse dynamics

2008 | book

An Ontology Based Approach to Data Surveillance

2008 | book

Structured Textual Data Monitoring Based on a Rough Set Classifier

2008 | conference-paper

User dynamics in graphical authentication systems

2008 | book-chapter

Using technology to overcome the password's contradiction

Handbook of Research on Social and Organizational Liabilities in Information Security

2008 | book-chapter

Voice based authentication using the null freqencies

2008 | book

A machine learning approach to keystroke dynamics based user authentication

International Journal of Electronic Security and Digital Forensics

2007 | journal-article

Graphical based user authentication with embedded mouse stroke dynamics

2007 | conference-paper

Information technologies for the information agent

2007 | conference-paper

On the use of rough sets for user authentication via keystroke dynamics

2007 | book-chapter

Prediction of abnormal behaviors for intelligent video surveillance systems

2007 | conference-paper

Reusing Streaming Contents in Engineering and Education Courses

Conference ICL2007, September 26 -28, 2007

2007 | conference-paper

A norma das normas em Segurança da Informação

2006 | journal-article

An approach to information systems risk management of health units,Uma abordagem à gestão do risco para os sistemas de informação das unidades de saúde

CISTI 2006 - Actas da 1a Conferencia Iberica de Sistemas e Tecnologias de Informacao

2006 | conference-paper

An international governmental mailing system : A requirement to prevent web-enhanced terrorism

2006 | conference-paper

Authenticating Computer Access Based On Keystroke Dynamics Using A Probabilistic Neural Network

2006 | conference-paper

Critical aspects in authentication graphic keys

2006 | conference-paper

Data mining a prostate cancer dataset using rough sets

IEEE Intelligent Systems

2006 | conference-paper

Enhancing login security through the use of keystroke input dynamics

2006 | book

Generation of authentication strings from graphic keys

2006 | journal-article

N-ary trees classifier

2006 | conference-paper

Reaching learning objectives of the cognitive domain with a synchronized streaming media environment

SEFI 2006 - 34th Annual Conference: Engineering Education and Active Students

2006 | conference-paper

The OBSERVER: An intelligent and automated video surveillance system

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

2006 | journal-article

An Improved Statistical Keystroke Dynamics Algorithm

2005 | conference-paper

Data mining a keystroke dynamics based biometrics database using rough sets

2005 | book

Developing a Keystroke Dynamics Based Agent Using Rough Sets

2005 | conference-paper

Moving object detection unaffected by cast shadows, highlights and ghosts

2005 | conference-paper

Password secured sites - Stepping forward with keystroke dynamics

2005 | conference-paper

Segurança e Tecnologias no E-Vote

2005 | conference-paper

Um método para a estimativa do valor da informação, numa unidade de saúde

2005 | conference-paper

Wearable Authentication Device with Biometrical Intrusion Prevention System

2005 | conference-paper

Biometria e Autenticação

2003 | conference-paper

O Combate Electrónico - Ataques e Defesas sobre a Rede

2002 | conference-paper

A methodology for complex embedded systems design: Petri nets within a UML approach

IFIP Advances in Information and Communication Technology

2001 | conference-paper

Modeling industrial embedded systems with UML

2000 | conference-paper

A heterogeneous computer vision architecture: Implementation issues

1995 | journal-article

Init End Change Value
Group CCPM
17/01/2023 20:15
17/01/2023 20:10

Cybersecurity in Supply Chain Systems: The Farm-to-Fork Use Case

Electronics (Switzerland)

2024 | journal-article

Exploring Risk Analysis Methods in IoE Projects: A Smart Campus Use Case

2024 | book-chapter

Information Security Metrics: Challenges and Models in an All-Digital World

2024 | book-chapter

Blockchain and Sustainability in the Public Sector: A Risk Management Perspective

2023 | book-chapter

Blockchain in the Public Sector: An Umbrella Review of Literature

Lecture Notes in Networks and Systems

2023 | conference-paper

Data Management in a Smart Campus Project: An Ontological Approach

2023 International Conference on Engineering Management of Communication and Technology, EMCTECH 2023 - Proceedings

2023 | conference-paper

Editorial: Wireless Networks and IoT Applications

Mobile Networks and Applications

2023 | journal-article

People Tracking in a Smart Campus context using Multiple Cameras

2023 | conference-paper

Preface

Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST

2023 | book

Continuous Industrial Sector Cybersecurity Assessment Paradigm∗ : Proposed Model of Cybersecurity Certification

2022 18th International Conference on the Design of Reliable Communication Networks, DRCN 2022

2022 | conference-paper

Cybersecurity ; A Practical Engineering Approach

2022 | book

Gain Enhancement of Diversity Slot Antenna Using FSS with Metamaterial Unit Cells for UWB Systems

IEEE Wireless Antenna and Microwave Symposium (WAMS)

2022 | conference-paper

Low-Profile MM-Wave PIFA Array with Omni-Directional and Full-Coverage Radiations

2022 IEEE Wireless Antenna and Microwave Symposium, WAMS 2022

2022 | conference-paper

Virtual Lab Virtues in Distance Learning

Smart Innovation, Systems and Technologies

2022 | conference-paper

Cybersecurity in ict supply chains: Key challenges and a relevant architecture

Sensors

2021 | journal-article

Distributed architecture to enhance systems protection against unauthorized activity via usb devices

Journal of Sensor and Actuator Networks

2021 | journal-article

Dual-Band MIMO Antenna Array for Sub 6 GHz 5G Smartphone Applications

2021 29th Telecommunications Forum, TELFOR 2021 - Proceedings

2021 | conference-paper

Information Security Assessment and Certification within Supply Chains

ACM International Conference Proceeding Series

2021 | conference-paper

Internal MIMO Antenna Design for Multi-Band Mobile Handset Applications

Telecommunications Forum (TELFOR)

2021 | conference-paper

Proposing an Architecture for IoT Based on WSN

Lecture Notes on Data Engineering and Communications Technologies

2021 | book-chapter

Provisioning Cybersecurity in ICT Complex Supply Chains: An Overview, Key Issues and a Relevant Architecture

Preprints.org

2021 | journal-article

Roadmap of security threats between IPv4/IPv6

2021 IEEE International IOT, Electronics and Mechatronics Conference, IEMTRONICS 2021 - Proceedings

2021 | conference-paper

The Future of Engineering Education: Current Challenges and Opportunities

EDUNINE 2021 - 5th IEEE World Engineering Education Conference: The Future of Engineering Education: Current Challenges and Opportunities, Proceedings

2021 | conference-paper

Wideband and Low-Profile Phased Array Smartphone Antenna Supporting 28-38 GHz

Telecommunications Forum (TELFOR)

2021 | conference-paper

Agência da União Europeia para a Cibersegurança (ENISA)

Instituições, Órgão e Organismos da União Europeia, Manuais Universitários

2020 | book-chapter

EDGE4ALL: Edge Computing for Smart City

EAI/Springer Innovations in Communication and Computing

2020 | conference-paper

Plenary: The Challenges of Education in Engineering, Computing and Technology without exclusions: Innovation in the era of the Industrial Revolution 4.0.

EDUNINE 2020 - 4th IEEE World Engineering Education Conference: The Challenges of Education in Engineering, Computing and Technology without Exclusions: Innovation in the Era of the Industrial Revolution 4.0, Proceedings

2020 | conference-paper

Preface S-cube 2019

Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST

2020 | book

Simulator for Smart City Environment

2020 | book-chapter

Special Issue "Achieving Predictive Maintenance using Sensors: Real or Fantasy?"

Sensors

2020 | journal-issue

Healthcare Critical Knowledge Monitor System Model: Healthcare Knowledge Capture Component Specification

Research in Medical & Engineering Sciences

2019 | journal-article

EDGE4ALL - Edge Platform For Smart City

2019 | conference-paper

Plenary: Modern Educational Paradigms for a Computer and Engineer Career

EDUNINE 2019 - 3rd IEEE World Engineering Education Conference: Modern Educational Paradigms for Computer and Engineering Career, Proceedings

2019 | conference-paper

Promoting Creativity in Final Year Engineering Students' Project: A case study in the Smart Cities context

EDUNINE 2019 - 3rd IEEE World Engineering Education Conference: Modern Educational Paradigms for Computer and Engineering Career, Proceedings

2019 | conference-paper

Smart City Summit Demos 2018

EAI

2019 | edited-book

Study of the Means of Online Payment in the Portuguese Population

Proceedings of 12th International Conference on Global Security, Safety and Sustainability, ICGS3 2019

2019 | conference-paper

Trends in engineering education: A disruptive view for not so far future

2019 18th International Conference on Information Technology Based Higher Education and Training, ITHET 2019

2019 | conference-paper

Work-in-Progress: Global Experiences for Engineering Programs

Advances in Intelligent Systems and Computing

2019 | conference-paper

Automatic human trajectory destination prediction from video

Expert Systems with Applications

2018 | journal-article

Comparison and evaluation of organizational transactions for continuous auditing and business compliance

International Journal of Information System Modeling and Design

2018 | journal-article

Engineering education program promoting the profession

Advances in Intelligent Systems and Computing

2018 | book

Global perspectives on cybersecurity education

Annual Conference on Innovation and Technology in Computer Science Education, ITiCSE

2018 | conference-paper

Global perspectives on cybersecurity education for 2030: A case for a meta-discipline

Annual Conference on Innovation and Technology in Computer Science Education, ITiCSE

2018 | conference-paper

High quality engineering program achievement

Advances in Intelligent Systems and Computing

2018 | conference-paper

International Experiences and the Implications for the Success of Engineering Programs

Proceedings of 2018 IEEE International Conference on Teaching, Assessment, and Learning for Engineering, TALE 2018

2018 | conference-paper

Internationalization project to face the uncertainties of work market

Proceedings - Frontiers in Education Conference, FIE

2018 | conference-paper

Message from the technical program chairs

EDUNINE 2018 - 2nd IEEE World Engineering Education Conference: The Role of Professional Associations in Contemporaneous Engineer Careers, Proceedings

2018 | conference-paper

Proposing a behavior-based IDS model for IoT environment

Lecture Notes in Business Information Processing

2018 | conference-paper

The role of professional associations in contemporaneous engineer careers

EDUNINE 2018 - 2nd IEEE World Engineering Education Conference: The Role of Professional Associations in Contemporaneous Engineer Careers, Proceedings

2018 | conference-paper

Classical Engineering Education Revisited - Why it Matters

2017 | conference-paper

Challenges and Reflections in Designing Cyber Security Curriculum

2017 Ieee World Engineering Education Conference (Edunine)

2017 | journal-article

Challenges and reflections in designing Cyber security curriculum

EDUNINE 2017 - IEEE World Engineering Education Conference: Engineering Education - Balancing Generalist and Specialist Formation in Technological Carriers: A Current Challenge, Proceedings

2017 | conference-paper

Classical engineering education coping with engineering profession demands

Proceedings of the 45th SEFI Annual Conference 2017 - Education Excellence for Sustainability, SEFI 2017

2017 | conference-paper

Classical engineering education revisited - Why it matters

ASEE Annual Conference and Exposition, Conference Proceedings

2017 | conference-paper

Engineering Education: Balancing generalist and specialist formation in technological carriers: A current challenge

EDUNINE 2017 - IEEE World Engineering Education Conference: Engineering Education - Balancing Generalist and Specialist Formation in Technological Carriers: A Current Challenge, Proceedings

2017 | conference-paper

Engineering course specially designed to face retention issue

Proceedings of the 45th SEFI Annual Conference 2017 - Education Excellence for Sustainability, SEFI 2017

2017 | conference-paper

Human skeleton detection from semi-constrained environment video

VISIGRAPP 2017 - Proceedings of the 12th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications

2017 | conference-paper

Knowledge security an empirical use of IT - Child abuse monitor system model

ICT4AWE 2017 - Proceedings of the 3rd International Conference on Information and Communication Technologies for Ageing Well and e-Health

2017 | conference-paper

Pointer dynamics as cognitive biometrics

2016 23 Encontro Portugues de Computacao Grafica e Interacao, EPCGI 2016

2017 | conference-paper

Rethinking engineering education

Proceedings - Frontiers in Education Conference, FIE

2017 | conference-paper

Self-oriented learning based on intelligent systems into the workplace

EDUNINE 2017 - IEEE World Engineering Education Conference: Engineering Education - Balancing Generalist and Specialist Formation in Technological Carriers: A Current Challenge, Proceedings

2017 | conference-paper

Behavioural biometrics for authentication and stress detection – A case study with children

Communications in Computer and Information Science

2016 | conference-paper

Evaluating information systems with continuous assurance services

International Journal of Information Systems in the Service Sector

2016 | journal-article

The information value: Perception of the problem

Advances in Intelligent Systems and Computing

2016 | conference-paper

What is missing for trust in the Cloud Computing?

SIGMIS-CPR 2016 - Proceedings of the 2016 ACM SIGMIS Conference on Computers and People Research

2016 | conference-paper

A Trust model for Cloud Computing environment

Proceedings of the International Conference on Cloud Security Management, ICCSM

2015 | conference-paper

An immunity based configuration for multilayer single featured biometric authentication algorithms

Communications in Computer and Information Science

2015 | conference-paper

Automatic human action recognition from video using Hidden Markov Model

Proceedings - IEEE 18th International Conference on Computational Science and Engineering, CSE 2015

2015 | conference-paper

Automatic visual detection of human behavior: A review from 2000 to 2014

Expert Systems with Applications

2015 | journal-article

Child abuse monitor system model: A health care critical knowledge monitor system

Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST

2015 | conference-paper

Design of a case-based reasoner for information security in military organizations

European Conference on Information Warfare and Security, ECCWS

2015 | conference-paper

Detection of dangerous situations using a smart internet of things system

Advances in Intelligent Systems and Computing

2015 | conference-paper

Determinants of behavioral intention to mobile banking in Arab culture

Banking, Finance, and Accounting: Concepts, Methodologies, Tools, and Applications

2015 | book-chapter

Enrollment time as a requirement for biometric hand recognition systems

Proceedings of the 10th International Conference on Cyber Warfare and Security, ICCWS 2015

2015 | conference-paper

Insider threats: The major challenge to security risk management

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

2015 | conference-paper

Monitoring organizational transactions in enterprise information systems with continuous assurance requirements

International Journal of Enterprise Information Systems

2015 | journal-article

Challenges in information security protection

European Conference on Information Warfare and Security, ECCWS

2014 | conference-paper

Determinants of Behavioral Intention to Mobile Banking in Arab Culture

Research and Design Innovations for Mobile User Experience

2014 | book-chapter

Enrolment time as a requirement for biometric fingerprint recognition

2014 | journal-article

Enrolment time as a requirement for face recognition biometric systems

European Conference on Information Warfare and Security, ECCWS

2014 | conference-paper

Free typed text using keystroke dynamics for continuous authentication

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

2014 | conference-paper

Management of internal control mechanisms in ERP for continuous monitoring purposes

Information Systems and Technologies (CISTI), 2014 9th Iberian Conference on

2014 | conference-paper

Planning method of information security for military organizations

European Conference on Information Warfare and Security, ECCWS

2014 | conference-paper

Security metrics to evaluate organizational IT security

ACM International Conference Proceeding Series

2014 | conference-paper

A study of biometric authentication adoption in health services

2013 | book

An enterprise ontology-based database for continuous monitoring application

2013 | conference-paper

Biometrics Acceptance in Arab Culture: an Exploratory Study

2013 International Conference on Computer Applications Technology (Iccat)

2013 | conference-paper

Determinants of behavioral intention to mobile banking in Arab culture

Research and Design Innovations for Mobile User Experience

2013 | book-chapter

Feasibility Study of a Multimodal Biometric Authentication Solution Based on Pointer Dynamics and Skin Conductivity

3rd International Conference on Cybercrime, Security and Digital Forensics

2013 | conference-paper

Health users' perception of biometric authentication technologies

Proceedings of CBMS 2013 - 26th IEEE International Symposium on Computer-Based Medical Systems

2013 | conference-paper

Health users' perception of biometric authentication technologies

Proceedings - IEEE Symposium on Computer-Based Medical Systems

2013 | conference-paper

Information security - Military standards versus ISO 27001: A case study in a Portuguese military organization

European Conference on Information Warfare and Security, ECCWS

2013 | conference-paper

New Technology Acceptance in Europe and Arabic Cultures: Comparative Study

Informing Science & IT Education Conference (InSITE)

2013 | conference-paper

Organizational transactions with real time monitoring and auditing

2013 | journal-article

Password sharing and how to reduce it

IT Policy and Ethics: Concepts, Methodologies, Tools, and Applications

2013 | book-chapter

Requirements in an Internet access sharing model

2013 | journal-article

Requisitos para um Sistema Inteligente de Gestão/Análise de Eventos de Segurançada Informação

Proceedings of World Congress on Systems Engineering and Information Technology

2013 | journal-article

Scan detection system using artificial neural networks

European Conference on Information Warfare and Security, ECCWS

2013 | conference-paper

Specialized knowledge systems - A model for intelligent learning management within organizations

2013 | book

The matrix of quality dimensions of knowledge management: Knowledge management assessment models review

2013 | journal-article

User Perception for Biometrics and Secret Management

Proceedings of World Congress on Systems Engineering and Information Technology

2013 | journal-article

User's requirements in Internet access sharing

Advances in Intelligent Systems and Computing

2013 | conference-paper

A solution for real time monitoring and auditing of organizational transactions

2012 | conference-paper

An Ontological Approach to Information Security Management

2012 | conference-paper

An ontology approach in designing security information systems to support organizational security risk knowledge

2012 | conference-paper

Automation of the Approval and Control Process of Documents

2012 | book-chapter

Biometric Graphical Authentication – a Patent Review: New Approaches in the Recognition of Users

2012 | conference-paper

Biometric technologies and their perception by the common citizen

2012 | journal-article

Botnets: A heuristic-based detection framework

2012 | conference-paper

Continuous assurance on organizational transactions

2012 | conference-paper

Critical knowledge monitor system model: Healthcare context

2012 | conference-paper

Framework de Gestão de Segurança da Informação para Organizações Militares Orientada pelos Principais Vetores de Ataque

2012 | conference-paper

Healthcare Critical Knowledge Monitor System Model: Critical Knowledge Ontology Component - topic models approach

2012 | conference-paper

Information security model to military organizations in environment of information warfare

2012 | conference-paper

Keystroke dynamics for continuous access control enforcement

2012 | conference-paper

Modelo de Segurança da Informação para Organizações Militares em Ambiente de Guerra de Informação

2012 | journal-article

Study of the perception on the biometric technology by the Portuguese citizens

Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering

2012 | conference-paper

Video Casting Application Oriented Key Exchange

2012 | conference-paper

Video casting application oriented key exchange

MMEDIA - International Conferences on Advances in Multimedia

2012 | conference-paper

What is Wrong with Biometrics?

2012 | magazine-article

Wireless Identity Management: Multimodal Biometrics and Multilayered IDM

2012 | book-chapter

Botnet detection: A numerical and heuristic analysis

2011 | conference-paper

Description of a practical application of an information security audit framework

2011 | conference-paper

Estudo da percepção dos utilizadores em relação à utilização de tecnologias de autenticação biométrica no acesso aos serviços de saúde

2011 | conference-paper

Grid Learning Classifiers - A Web Based Interface

2011 | journal-article

Grid data mining by means of learning classifier systems and distributed model induction

2011 | conference-paper

Intrusion detection through keystroke dynamics

2011 | conference-paper

Password Sharing and How to Reduce It

2011 | book-chapter

Sistemas Auto-regulados de Conteúdos Orientados para Contextos de Aprendizagem em Ambiente Profissional

2011 | conference-paper

Supervised Learning Classifier Systems for Grid Data Mining

2011 | book-chapter

A Security Audit Framework to Manage Information System Security

2010 | book-chapter

A conceptual model approach to manage and audit information systems security

2010 | conference-paper

A security framework for audit and manage information system security

2010 | conference-paper

An audit framework to support information system security management

2010 | journal-article

An ontology based approach to semantically structure data in security information systems

2010 | conference-paper

Automation of the Approval and Control Process of Documents

2010 | conference-paper

Cyberwar and the Russian Federation: the usual suspect

2010 | journal-article

GridclassTK- Toolkit for grid learning classifier systems

European Conference of Systems, ECS'10, European Conference of Circuits Technology and Devices, ECCTD'10, European Conference of Communications, ECCOM'10, ECCS'10

2010 | conference-paper

Methods of Organizational Information Security

2010 | book-chapter

Multimodal Biometrics and Multilayered IDM for Secure Authentication

2010 | book-chapter

OTM Machine Acceptance: In the Arab Culture

2010 | book-chapter

Odour user interface for authentication: Possibility and acceptance: Case study

2010 | conference-paper

Password sharing and how to reduce it

Certification and Security in Health-Related Web Applications: Concepts and Solutions

2010 | book-chapter

Podcasts and vodcasts: pros and cons

2010 | book-chapter

Uma Framework Ontológica para a Gestão da Segurança dos Sistemas de Informação

2010 | conference-paper

User acceptance OTM machine: In the Arab culture

2010 | journal-article

Validating Tam With Odour Interface In Atm Machines

2010 | journal-article

A Grid Data Mining architecture for Learning Classifier Systems

2009 | journal-article

An ontology based approach to information security

Communications in Computer and Information Science

2009 | conference-paper

Keystroke Dynamics and Graphical Authentication Systems

2009 | book-chapter

Podcasts in Higher Education: Students’ and Lecturers’ Perspectives

2009 | book-chapter

RFID: Big brother global?

2009 | conference-paper

Security framework for information systems

2009 | conference-paper

Streaming contents and RSS feed in a pedagogical environment

2009 | conference-paper

Subsídeos Para uma Eficaz Segurança da Informação nas Organizações

2009 | journal-article

Supervised learning classifier systems for grid data mining

2009 | other

A survey of user authentication based on mouse dynamics

2008 | book

An Ontology Based Approach to Data Surveillance

2008 | book

Structured Textual Data Monitoring Based on a Rough Set Classifier

2008 | conference-paper

User dynamics in graphical authentication systems

2008 | book-chapter

Using technology to overcome the password's contradiction

Handbook of Research on Social and Organizational Liabilities in Information Security

2008 | book-chapter

Voice based authentication using the null freqencies

2008 | book

A machine learning approach to keystroke dynamics based user authentication

International Journal of Electronic Security and Digital Forensics

2007 | journal-article

Graphical based user authentication with embedded mouse stroke dynamics

2007 | conference-paper

Information technologies for the information agent

2007 | conference-paper

On the use of rough sets for user authentication via keystroke dynamics

2007 | book-chapter

Prediction of abnormal behaviors for intelligent video surveillance systems

2007 | conference-paper

Reusing Streaming Contents in Engineering and Education Courses

Conference ICL2007, September 26 -28, 2007

2007 | conference-paper

A norma das normas em Segurança da Informação

2006 | journal-article

An approach to information systems risk management of health units,Uma abordagem à gestão do risco para os sistemas de informação das unidades de saúde

CISTI 2006 - Actas da 1a Conferencia Iberica de Sistemas e Tecnologias de Informacao

2006 | conference-paper

An international governmental mailing system : A requirement to prevent web-enhanced terrorism

2006 | conference-paper

Authenticating Computer Access Based On Keystroke Dynamics Using A Probabilistic Neural Network

2006 | conference-paper

Critical aspects in authentication graphic keys

2006 | conference-paper

Data mining a prostate cancer dataset using rough sets

IEEE Intelligent Systems

2006 | conference-paper

Enhancing login security through the use of keystroke input dynamics

2006 | book

Generation of authentication strings from graphic keys

2006 | journal-article

N-ary trees classifier

2006 | conference-paper

Reaching learning objectives of the cognitive domain with a synchronized streaming media environment

SEFI 2006 - 34th Annual Conference: Engineering Education and Active Students

2006 | conference-paper

The OBSERVER: An intelligent and automated video surveillance system

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

2006 | journal-article

An Improved Statistical Keystroke Dynamics Algorithm

2005 | conference-paper

Data mining a keystroke dynamics based biometrics database using rough sets

2005 | book

Developing a Keystroke Dynamics Based Agent Using Rough Sets

2005 | conference-paper

Moving object detection unaffected by cast shadows, highlights and ghosts

2005 | conference-paper

Password secured sites - Stepping forward with keystroke dynamics

2005 | conference-paper

Segurança e Tecnologias no E-Vote

2005 | conference-paper

Um método para a estimativa do valor da informação, numa unidade de saúde

2005 | conference-paper

Wearable Authentication Device with Biometrical Intrusion Prevention System

2005 | conference-paper

Biometria e Autenticação

2003 | conference-paper

O Combate Electrónico - Ataques e Defesas sobre a Rede

2002 | conference-paper

A methodology for complex embedded systems design: Petri nets within a UML approach

IFIP Advances in Information and Communication Technology

2001 | conference-paper

Modeling industrial embedded systems with UML

2000 | conference-paper

A heterogeneous computer vision architecture: Implementation issues

1995 | journal-article


Start End Term Value
Group CCPM
17/01/2023 20:15
17/01/2023 20:10
This user account status is Approved