Algoritmi | User | Henrique Manuel Dinis Santos

Henrique Manuel Dinis Santos

Henrique Manuel Dinis Santos

At Algoritmi

Senior Researcher with Dr habil

Member of the CCPM R&D Group

Member of the UCL R&D Lab

Academic Degree

Dr habil

Current Position

Associate Professor with Habilitation at Escola de Engenharia da Universidade do Minho

Personal Webpage

http://www3.dsi.uminho.pt/hsantos

h-index

15

Publications

153

Editorial

4

Citations

923

Q1 / Q2

12

About Me



Sustainable Tokenisation Model for the Public Sector: Selecting the most suitable business process

2024 | conference-paper

Cybersecurity in Supply Chain Systems: The Farm-to-Fork Use Case

Electronics (Switzerland)

2024 | journal-article

Exploring Risk Analysis Methods in IoE Projects: A Smart Campus Use Case

2024 | book-chapter

Information Security Metrics: Challenges and Models in an All-Digital World

2024 | book-chapter

Blockchain and Sustainability in the Public Sector: A Risk Management Perspective

2023 | book-chapter

Blockchain in the Public Sector: An Umbrella Review of Literature

Lecture Notes in Networks and Systems

2023 | conference-paper

Data Management in a Smart Campus Project: An Ontological Approach

2023 International Conference on Engineering Management of Communication and Technology, EMCTECH 2023 - Proceedings

2023 | conference-paper

Editorial: Wireless Networks and IoT Applications

Mobile Networks and Applications

2023 | journal-article

People Tracking in a Smart Campus context using Multiple Cameras

2023 | conference-paper

Preface

Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST

2023 | book

Continuous Industrial Sector Cybersecurity Assessment Paradigm∗ : Proposed Model of Cybersecurity Certification

2022 18th International Conference on the Design of Reliable Communication Networks, DRCN 2022

2022 | conference-paper

Cybersecurity ; A Practical Engineering Approach

2022 | book

Gain Enhancement of Diversity Slot Antenna Using FSS with Metamaterial Unit Cells for UWB Systems

IEEE Wireless Antenna and Microwave Symposium (WAMS)

2022 | conference-paper

Low-Profile MM-Wave PIFA Array with Omni-Directional and Full-Coverage Radiations

2022 IEEE Wireless Antenna and Microwave Symposium, WAMS 2022

2022 | conference-paper

Virtual Lab Virtues in Distance Learning

Smart Innovation, Systems and Technologies

2022 | conference-paper

Cybersecurity in ict supply chains: Key challenges and a relevant architecture

Sensors

2021 | journal-article

Distributed architecture to enhance systems protection against unauthorized activity via usb devices

Journal of Sensor and Actuator Networks

2021 | journal-article

Dual-Band MIMO Antenna Array for Sub 6 GHz 5G Smartphone Applications

2021 29th Telecommunications Forum, TELFOR 2021 - Proceedings

2021 | conference-paper

Information Security Assessment and Certification within Supply Chains

ACM International Conference Proceeding Series

2021 | conference-paper

Internal MIMO Antenna Design for Multi-Band Mobile Handset Applications

Telecommunications Forum (TELFOR)

2021 | conference-paper

Proposing an Architecture for IoT Based on WSN

Lecture Notes on Data Engineering and Communications Technologies

2021 | book-chapter

Provisioning Cybersecurity in ICT Complex Supply Chains: An Overview, Key Issues and a Relevant Architecture

Preprints.org

2021 | journal-article

Roadmap of security threats between IPv4/IPv6

2021 IEEE International IOT, Electronics and Mechatronics Conference, IEMTRONICS 2021 - Proceedings

2021 | conference-paper

The Future of Engineering Education: Current Challenges and Opportunities

EDUNINE 2021 - 5th IEEE World Engineering Education Conference: The Future of Engineering Education: Current Challenges and Opportunities, Proceedings

2021 | conference-paper

Wideband and Low-Profile Phased Array Smartphone Antenna Supporting 28-38 GHz

Telecommunications Forum (TELFOR)

2021 | conference-paper

Agência da União Europeia para a Cibersegurança (ENISA)

Instituições, Órgão e Organismos da União Europeia, Manuais Universitários

2020 | book-chapter

Agência da União Europeia para a Cibersegurança (ENISA)

Instituições, Órgão e Organismos da União Europeia, Manuais Universitários

2020 | book-chapter

EDGE4ALL: Edge Computing for Smart City

EAI/Springer Innovations in Communication and Computing

2020 | conference-paper

Plenary: The Challenges of Education in Engineering, Computing and Technology without exclusions: Innovation in the era of the Industrial Revolution 4.0.

EDUNINE 2020 - 4th IEEE World Engineering Education Conference: The Challenges of Education in Engineering, Computing and Technology without Exclusions: Innovation in the Era of the Industrial Revolution 4.0, Proceedings

2020 | conference-paper

Preface S-cube 2019

Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST

2020 | book

Simulator for Smart City Environment

2020 | book-chapter

Special Issue "Achieving Predictive Maintenance using Sensors: Real or Fantasy?"

Sensors

2020 | journal-issue

Healthcare Critical Knowledge Monitor System Model: Healthcare Knowledge Capture Component Specification

Research in Medical & Engineering Sciences

2019 | journal-article

EDGE4ALL - Edge Platform For Smart City

2019 | conference-paper

Plenary: Modern Educational Paradigms for a Computer and Engineer Career

EDUNINE 2019 - 3rd IEEE World Engineering Education Conference: Modern Educational Paradigms for Computer and Engineering Career, Proceedings

2019 | conference-paper

Promoting Creativity in Final Year Engineering Students' Project: A case study in the Smart Cities context

EDUNINE 2019 - 3rd IEEE World Engineering Education Conference: Modern Educational Paradigms for Computer and Engineering Career, Proceedings

2019 | conference-paper

Smart City Summit Demos 2018

EAI

2019 | edited-book

Study of the Means of Online Payment in the Portuguese Population

Proceedings of 12th International Conference on Global Security, Safety and Sustainability, ICGS3 2019

2019 | conference-paper

Trends in engineering education: A disruptive view for not so far future

2019 18th International Conference on Information Technology Based Higher Education and Training, ITHET 2019

2019 | conference-paper

Work-in-Progress: Global Experiences for Engineering Programs

Advances in Intelligent Systems and Computing

2019 | conference-paper

Automatic human trajectory destination prediction from video

Expert Systems with Applications

2018 | journal-article

Comparison and evaluation of organizational transactions for continuous auditing and business compliance

International Journal of Information System Modeling and Design

2018 | journal-article

Engineering education program promoting the profession

Advances in Intelligent Systems and Computing

2018 | book

Global perspectives on cybersecurity education

Annual Conference on Innovation and Technology in Computer Science Education, ITiCSE

2018 | conference-paper

Global perspectives on cybersecurity education for 2030: A case for a meta-discipline

Annual Conference on Innovation and Technology in Computer Science Education, ITiCSE

2018 | conference-paper

High quality engineering program achievement

Advances in Intelligent Systems and Computing

2018 | conference-paper

International Experiences and the Implications for the Success of Engineering Programs

Proceedings of 2018 IEEE International Conference on Teaching, Assessment, and Learning for Engineering, TALE 2018

2018 | conference-paper

Internationalization project to face the uncertainties of work market

Proceedings - Frontiers in Education Conference, FIE

2018 | conference-paper

Message from the technical program chairs

EDUNINE 2018 - 2nd IEEE World Engineering Education Conference: The Role of Professional Associations in Contemporaneous Engineer Careers, Proceedings

2018 | conference-paper

Proposing a behavior-based IDS model for IoT environment

Lecture Notes in Business Information Processing

2018 | conference-paper

The role of professional associations in contemporaneous engineer careers

EDUNINE 2018 - 2nd IEEE World Engineering Education Conference: The Role of Professional Associations in Contemporaneous Engineer Careers, Proceedings

2018 | conference-paper

Classical Engineering Education Revisited - Why it Matters

2017 | conference-paper

Challenges and Reflections in Designing Cyber Security Curriculum

2017 Ieee World Engineering Education Conference (Edunine)

2017 | journal-article

Challenges and reflections in designing Cyber security curriculum

EDUNINE 2017 - IEEE World Engineering Education Conference: Engineering Education - Balancing Generalist and Specialist Formation in Technological Carriers: A Current Challenge, Proceedings

2017 | conference-paper

Classical engineering education coping with engineering profession demands

Proceedings of the 45th SEFI Annual Conference 2017 - Education Excellence for Sustainability, SEFI 2017

2017 | conference-paper

Classical engineering education revisited - Why it matters

ASEE Annual Conference and Exposition, Conference Proceedings

2017 | conference-paper

Engineering Education: Balancing generalist and specialist formation in technological carriers: A current challenge

EDUNINE 2017 - IEEE World Engineering Education Conference: Engineering Education - Balancing Generalist and Specialist Formation in Technological Carriers: A Current Challenge, Proceedings

2017 | conference-paper

Engineering Education: balancing generalist and specialist formation in technological carriers: a current challenge

2017 Ieee World Engineering Education Conference (Edunine)

2017 | journal-article

Engineering course specially designed to face retention issue

Proceedings of the 45th SEFI Annual Conference 2017 - Education Excellence for Sustainability, SEFI 2017

2017 | conference-paper

Human skeleton detection from semi-constrained environment video

VISIGRAPP 2017 - Proceedings of the 12th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications

2017 | conference-paper

Knowledge security an empirical use of IT - Child abuse monitor system model

ICT4AWE 2017 - Proceedings of the 3rd International Conference on Information and Communication Technologies for Ageing Well and e-Health

2017 | conference-paper

Pointer dynamics as cognitive biometrics

2016 23 Encontro Portugues de Computacao Grafica e Interacao, EPCGI 2016

2017 | conference-paper

Rethinking Engineering Education

2017 Ieee Frontiers in Education Conference (Fie)

2017 | book-chapter

Rethinking engineering education

Proceedings - Frontiers in Education Conference, FIE

2017 | conference-paper

Self-Oriented Learning based on Intelligent Systems into the Workplace

2017 Ieee World Engineering Education Conference (Edunine)

2017 | journal-article

Self-oriented learning based on intelligent systems into the workplace

EDUNINE 2017 - IEEE World Engineering Education Conference: Engineering Education - Balancing Generalist and Specialist Formation in Technological Carriers: A Current Challenge, Proceedings

2017 | conference-paper

Behavioural biometrics for authentication and stress detection – A case study with children

Communications in Computer and Information Science

2016 | conference-paper

Evaluating information systems with continuous assurance services

International Journal of Information Systems in the Service Sector

2016 | journal-article

The information value: Perception of the problem

Advances in Intelligent Systems and Computing

2016 | conference-paper

What is missing for trust in the Cloud Computing?

SIGMIS-CPR 2016 - Proceedings of the 2016 ACM SIGMIS Conference on Computers and People Research

2016 | conference-paper

A Trust Model for Cloud Computing environment

Proceedings of the 3rd International Conference on Cloud Security and Management (Iccsm-2015)

2015 | book-chapter

A Trust model for Cloud Computing environment

Proceedings of the International Conference on Cloud Security Management, ICCSM

2015 | conference-paper

An immunity based configuration for multilayer single featured biometric authentication algorithms

Communications in Computer and Information Science

2015 | conference-paper

Automatic human action recognition from video using Hidden Markov Model

Proceedings - IEEE 18th International Conference on Computational Science and Engineering, CSE 2015

2015 | conference-paper

Automatic visual detection of human behavior: A review from 2000 to 2014

Expert Systems with Applications

2015 | journal-article

Child abuse monitor system model: A health care critical knowledge monitor system

Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST

2015 | conference-paper

Design of a case-based reasoner for information security in military organizations

European Conference on Information Warfare and Security, ECCWS

2015 | conference-paper

Detection of dangerous situations using a smart internet of things system

Advances in Intelligent Systems and Computing

2015 | conference-paper

Enrollment time as a requirement for biometric hand recognition systems

Proceedings of the 10th International Conference on Cyber Warfare and Security, ICCWS 2015

2015 | conference-paper

Insider threats: The major challenge to security risk management

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

2015 | conference-paper

Monitoring organizational transactions in enterprise information systems with continuous assurance requirements

International Journal of Enterprise Information Systems

2015 | journal-article

Um modelo de confiança para o ambiente de computação em nuvem

2015 | conference-paper

Challenges in Information Security Protection

13th European Conference on Cyber Warfare and Security (ECCWS 2014)

2014 | conference-paper

Challenges in information security protection

European Conference on Information Warfare and Security, ECCWS

2014 | conference-paper

Child Abuse Monitor System Model: A Health Care Critical Knowledge Monitor System

1st International Conference on IoT Technologies for HealthCare (HealthyIoT)

2014 | conference-paper

Determinants of Behavioral Intention to Mobile Banking in Arab Culture

Research and Design Innovations for Mobile User Experience

2014 | book-chapter

Enrolment Time as a Requirement for Face Recognition Biometric Systems

13th European Conference on Cyber Warfare and Security (ECCWS 2014)

2014 | conference-paper

Enrolment time as a requirement for biometric fingerprint recognition

2014 | journal-article

Enrolment time as a requirement for face recognition biometric systems

European Conference on Information Warfare and Security, ECCWS

2014 | conference-paper

Free typed text using keystroke dynamics for continuous authentication

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

2014 | conference-paper

Management of internal control mechanisms in ERP for continuous monitoring purposes

Information Systems and Technologies (CISTI), 2014 9th Iberian Conference on

2014 | conference-paper

Planning Method of Information Security for Military Organizations

13th European Conference on Cyber Warfare and Security (ECCWS 2014)

2014 | conference-paper

Planning method of information security for military organizations

European Conference on Information Warfare and Security, ECCWS

2014 | conference-paper

Report of the Participation of University of Minho on Cyber Perseu Exercise 2014,

2014 | report

Security metrics to evaluate organizational IT security

ACM International Conference Proceeding Series

2014 | conference-paper

A conceptual model for evaluating systems with continuous assurance services

Conference on Enterprise Information Systems (CENTERIS 2013)

2013 | conference-paper

A study of biometric authentication adoption in health services

2013 | book

An enterprise ontology-based database for continuous monitoring application

2013 | conference-paper

Biometrics Acceptance in Arab Culture: an Exploratory Study

2013 International Conference on Computer Applications Technology (Iccat)

2013 | conference-paper

Determinants of behavioral intention to mobile banking in Arab culture

Research and Design Innovations for Mobile User Experience

2013 | book-chapter

Feasibility Study of a Multimodal Biometric Authentication Solution Based on Pointer Dynamics and Skin Conductivity

3rd International Conference on Cybercrime, Security and Digital Forensics

2013 | conference-paper

Health Care Critical Knowledge Monitor System Model:Health Care Critical Knowledge Ontology Component

SHEWC2013 - XIII Safety, Health and Environment World Congress

2013 | conference-paper

Health users' perception of biometric authentication technologies

Proceedings of CBMS 2013 - 26th IEEE International Symposium on Computer-Based Medical Systems

2013 | conference-paper

Information security - Military standards versus ISO 27001: A case study in a Portuguese military organization

European Conference on Information Warfare and Security, ECCWS

2013 | conference-paper

New Technology Acceptance in Europe and Arabic Cultures: Comparative Study

Informing Science & IT Education Conference (InSITE)

2013 | conference-paper

Organizational transactions with real time monitoring and auditing

2013 | journal-article

Requirements in an Internet access sharing model

2013 | journal-article

Requisitos para um Sistema Inteligente de Gestão/Análise de Eventos de Segurançada Informação

Proceedings of World Congress on Systems Engineering and Information Technology

2013 | journal-article

Scan detection system using artificial neural networks

European Conference on Information Warfare and Security, ECCWS

2013 | conference-paper

Specialized knowledge systems - A model for intelligent learning management within organizations

2013 | book

The matrix of quality dimensions of knowledge management: Knowledge management assessment models review

2013 | journal-article

User Perception for Biometrics and Secret Management

Proceedings of World Congress on Systems Engineering and Information Technology

2013 | journal-article

User's requirements in Internet access sharing

Advances in Intelligent Systems and Computing

2013 | conference-paper

A solution for real time monitoring and auditing of organizational transactions

2012 | conference-paper

An Ontological Approach to Information Security Management

2012 | conference-paper

An ontological approach to information security management

2012 | conference-paper

An ontology approach in designing security information systems to support organizational security risk knowledge

2012 | conference-paper

Automation of the Approval and Control Process of Documents

2012 | book-chapter

Biometric Graphical Authentication – a Patent Review: New Approaches in the Recognition of Users

2012 | conference-paper

Biometric technologies and their perception by the common citizen

2012 | journal-article

Botnets: A heuristic-based detection framework

2012 | conference-paper

Continuous assurance on organizational transactions

2012 | conference-paper

Critical knowledge monitor system model: Healthcare context

2012 | conference-paper

Framework de Gestão de Segurança da Informação para Organizações Militares Orientada pelos Principais Vetores de Ataque

2012 | conference-paper

Healthcare Critical Knowledge Monitor System Model: Critical Knowledge Ontology Component - topic models approach

2012 | conference-paper

Information security model to military organizations in environment of information warfare

2012 | conference-paper

Keystroke dynamics for continuous access control enforcement

2012 | conference-paper

Modelo de Segurança da Informação para Organizações Militares em Ambiente de Guerra de Informação

2012 | journal-article

Study of the perception on the biometric technology by the Portuguese citizens

Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering

2012 | conference-paper

Video Casting Application Oriented Key Exchange

2012 | conference-paper

Video casting application oriented key exchange

MMEDIA - International Conferences on Advances in Multimedia

2012 | conference-paper

What is Wrong with Biometrics?

2012 | magazine-article

Wireless Identity Management: Multimodal Biometrics and Multilayered IDM

2012 | book-chapter

Botnet detection: A numerical and heuristic analysis

2011 | conference-paper

Description of a practical application of an information security audit framework

2011 | conference-paper

Estudo da percepção dos utilizadores em relação à utilização de tecnologias de autenticação biométrica no acesso aos serviços de saúde

2011 | conference-paper

Grid Learning Classifiers - A Web Based Interface

2011 | journal-article

Grid data mining by means of learning classifier systems and distributed model induction

2011 | conference-paper

Intrusion detection through keystroke dynamics

2011 | conference-paper

Password Sharing and How to Reduce It

2011 | book-chapter

Sistemas Auto-regulados de Conteúdos Orientados para Contextos de Aprendizagem em Ambiente Profissional

2011 | conference-paper

Supervised Learning Classifier Systems for Grid Data Mining

2011 | book-chapter

A conceptual model approach to manage and audit information systems security

2010 | conference-paper

A security audit framework to manage information system security

2010 | book

A security framework for audit and manage information system security

2010 | conference-paper

An audit framework to support information system security management

2010 | journal-article

An ontology based approach to semantically structure data in security information systems

2010 | conference-paper

Another Global City: Historical Explorations into the Transnational Municipal Moment, 1850-2000

ANOTHER GLOBAL CITY: HISTORICAL EXPLORATIONS INTO THE TRANSNATIONAL MUNICIPAL MOMENT, 1850-2000

2010 | journal-article

Automation of the approval and control process of documents

Communications in Computer and Information Science

2010 | conference-paper

Cyberwar and the Russian Federation: the usual suspect

2010 | journal-article

GridclassTK- Toolkit for grid learning classifier systems

European Conference of Systems, ECS'10, European Conference of Circuits Technology and Devices, ECCTD'10, European Conference of Communications, ECCOM'10, ECCS'10

2010 | conference-paper

Methods of Organizational Information Security

2010 | book-chapter

Multimodal Biometrics and Multilayered IDM for Secure Authentication

2010 | book-chapter

OTM Machine Acceptance: In the Arab Culture

2010 | book-chapter

Odour user interface for authentication: Possibility and acceptance: Case study

2010 | conference-paper

Password sharing and how to reduce it

Certification and Security in Health-Related Web Applications: Concepts and Solutions

2010 | book-chapter

Podcasts and vodcasts: pros and cons

2010 | book-chapter

Uma Framework Ontológica para a Gestão da Segurança dos Sistemas de Informação

2010 | conference-paper

User acceptance OTM machine: In the Arab culture

2010 | journal-article

Validating Tam With Odour Interface In Atm Machines

2010 | journal-article

A Grid Data Mining architecture for Learning Classifier Systems

2009 | journal-article

An ontology based approach to information security

Communications in Computer and Information Science

2009 | conference-paper

Keystroke Dynamics and Graphical Authentication Systems

2009 | book-chapter

Podcasts in Higher Education: Students’ and Lecturers’ Perspectives

2009 | book-chapter

RFID: Big brother global?

2009 | conference-paper

Security framework for information systems

2009 | conference-paper

Streaming contents and RSS feed in a pedagogical environment

2009 | conference-paper

Subsídeos Para uma Eficaz Segurança da Informação nas Organizações

2009 | journal-article

Supervised learning classifier systems for grid data mining

2009 | other

A survey of user authentication based on mouse dynamics

2008 | book

An Ontology Based Approach to Data Surveillance

2008 | book

Structured Textual Data Monitoring Based on a Rough Set Classifier

2008 | conference-paper

User dynamics in graphical authentication systems

2008 | book-chapter

Using technology to overcome the password's contradiction

Handbook of Research on Social and Organizational Liabilities in Information Security

2008 | book-chapter

Voice based authentication using the null freqencies

2008 | book

A machine learning approach to keystroke dynamics based user authentication

International Journal of Electronic Security and Digital Forensics

2007 | journal-article

Graphical based user authentication with embedded mouse stroke dynamics

2007 | conference-paper

Information technologies for the information agent

2007 | conference-paper

On the use of rough sets for user authentication via keystroke dynamics

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

2007 | conference-paper

Prediction of abnormal behaviors for intelligent video surveillance systems

2007 | conference-paper

Previsão de Eventos Anormais em Sistemas de Vídeo-Vigilância

Actas do Simpósio Doutoral em Inteligência Artificial

2007 | journal-article

Reusing Streaming Contents in Engineering and Education Courses

Conference ICL2007, September 26 -28, 2007

2007 | conference-paper

Streaming media in different contexts: Engineering and education graduation

Proceedings of the IADIS International Conference e-Learning, EL 2007 - Part of the IADIS Multi Conference on Computer Science and Information Systems, MCCSIS 2007

2007 | conference-paper

A norma das normas em Segurança da Informação

2006 | journal-article

An approach to information systems risk management of health units,Uma abordagem à gestão do risco para os sistemas de informação das unidades de saúde

CISTI 2006 - Actas da 1a Conferencia Iberica de Sistemas e Tecnologias de Informacao

2006 | conference-paper

An international governmental mailing system : A requirement to prevent web-enhanced terrorism

2006 | conference-paper

Authenticating Computer Access Based On Keystroke Dynamics Using A Probabilistic Neural Network

2006 | conference-paper

Critical aspects in authentication graphic keys

2006 | conference-paper

Data mining a prostate cancer dataset using rough sets

IEEE Intelligent Systems

2006 | conference-paper

Enhancing login security through the use of keystroke input dynamics

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

2006 | conference-paper

Generation of authentication strings from graphic keys

2006 | journal-article

N-ary trees classifier

2006 | conference-paper

Reaching learning objectives of the cognitive domain with a synchronized streaming media environment

SEFI 2006 - 34th Annual Conference: Engineering Education and Active Students

2006 | conference-paper

The OBSERVER: An intelligent and automated video surveillance system

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

2006 | journal-article

An Improved Statistical Keystroke Dynamics Algorithm

2005 | conference-paper

Data mining a keystroke dynamics based biometrics database using rough sets

2005 | book

Developing a Keystroke Dynamics Based Agent Using Rough Sets

2005 | conference-paper

Moving object detection unaffected by cast shadows, highlights and ghosts

2005 | conference-paper

Password secured sites - Stepping forward with keystroke dynamics

2005 | conference-paper

Segurança e Tecnologias no E-Vote

2005 | conference-paper

Um método para a estimativa do valor da informação, numa unidade de saúde

2005 | conference-paper

Wearable Authentication Device with Biometrical Intrusion Prevention System

2005 | conference-paper

Biometria e Autenticação

2003 | conference-paper

O Combate Electrónico - Ataques e Defesas sobre a Rede

2002 | conference-paper

A methodology for complex embedded systems design: Petri nets within a UML approach

IFIP Advances in Information and Communication Technology

2001 | conference-paper

Sistemas de informação industriais orientados ao controlo: perspectivas metodológicas para tecnologias reconfiguráveis

Ingenium

2000 | magazine-article

Modeling industrial embedded systems with UML

2000 | conference-paper

A UML-based approach for modeling industrial control applications

1999 | conference-paper

An evolutionary approach to the use of Petri net based models: from parallel controllers to HW/SW co-design

1998 | conference-paper

A heterogeneous computer vision architecture: Implementation issues

1995 | journal-article

FISHY - A coordinated framework for cyber resilient supply chain systems over complex ICT infrastructures

EU Framework Programme for Research and Innovation Euratom

2020-09 to 2023-08 | 952644

Lab4U&Spaces - Living Lab of Interactive Urban Space Solutions

Fundação para a Ciência e Tecnologia

2020-09 to - |

VADE - Ambientes de ValorAcrescentado para Suporte Dinâmico a Serviços Baseados na Localização em Redes UMTS

Fundação para a Ciência e a Tecnologia

2001- to 2003- | POSI/CHS/38475/2001

AROUND: Suporte a ServiçosInternet de Ambito Local

Fundação para a Ciência e a Tecnologia

1999- to 2001- | PRAXIS/P/EEI/14267/1998

Sistemas Embebidos e Reconfiguráveis:Metodologias de Desenvolvimento para Aplicações Tempo-Rea

Fundação para a Ciência e a Tecnologia

1999- to 2001- | PRAXIS/P/EEI/10155/1998

Laboratório Associado de Sistemas Inteligentes

Fundação para a Ciência e a Tecnologia

2021-01 to 2025-12 | 168241UID

CYBERACTIONING: Training Cybersecurity Skills through Advanced Higher Education Joint Programmes

European Commission

2023-10 to 2027-09 | 101123445

ADM.IN - Advanced Decision Making in productive systems through Intelligent Networks

Associação para a Inovação e Desenvolvimento da FCT

2019-07 to - | POCI-01-0247-FEDER-055087

SIDIC - Sistema Integrado de Detecção e Identificação de Comportamentos e Dados Biométricos por Análise de Video

Agência Nacional de Inovação SA

2011-10 to 2013-09 | 2011/021584

OFELIA - Ambientes abertos federados para a alavancagem de Identidade e Autorização.

Fundação para a Ciência e a Tecnologia

2010-04 to 2013-04 | PTDC/EIA-EIA/104328/2008

csSecure II

Agência Nacional de Inovação SA

2010-04 to 2013-03 | 2010/013619

Implicações Pedagógicas da Utilização de Podcasts em Blended-Learning

Fundação para a Ciência e a Tecnologia

2007-10 to 2010-06 | PTDC/CED/70751/2006

GridClass - Learning Classifiers Systems for Grid Data Mining

Fundação para a Ciência e a Tecnologia

2007-07 to 2011-05 | GRID/GRI/81736/2006

HyPERGEO - Easy and Frindly Access to GeographicInformation for Mobile Users

N/A

2000- to 2001- | IST-1999-11641

IntVIS4Insp - Sistema de Visão por Computador Inteligente e Flexível para Inspeção Automática

N/A

2019-10 to 2022-09 | POCI-01-0247-FEDER-042778

Init End Change Value
Group CCPM
17/01/2023 20:15
17/01/2023 20:10

Sustainable Tokenisation Model for the Public Sector: Selecting the most suitable business process

2024 | conference-paper

Cybersecurity in Supply Chain Systems: The Farm-to-Fork Use Case

Electronics (Switzerland)

2024 | journal-article

Exploring Risk Analysis Methods in IoE Projects: A Smart Campus Use Case

2024 | book-chapter

Information Security Metrics: Challenges and Models in an All-Digital World

2024 | book-chapter

Blockchain and Sustainability in the Public Sector: A Risk Management Perspective

2023 | book-chapter

Blockchain in the Public Sector: An Umbrella Review of Literature

Lecture Notes in Networks and Systems

2023 | conference-paper

Data Management in a Smart Campus Project: An Ontological Approach

2023 International Conference on Engineering Management of Communication and Technology, EMCTECH 2023 - Proceedings

2023 | conference-paper

Editorial: Wireless Networks and IoT Applications

Mobile Networks and Applications

2023 | journal-article

People Tracking in a Smart Campus context using Multiple Cameras

2023 | conference-paper

Preface

Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST

2023 | book

Continuous Industrial Sector Cybersecurity Assessment Paradigm∗ : Proposed Model of Cybersecurity Certification

2022 18th International Conference on the Design of Reliable Communication Networks, DRCN 2022

2022 | conference-paper

Cybersecurity ; A Practical Engineering Approach

2022 | book

Gain Enhancement of Diversity Slot Antenna Using FSS with Metamaterial Unit Cells for UWB Systems

IEEE Wireless Antenna and Microwave Symposium (WAMS)

2022 | conference-paper

Low-Profile MM-Wave PIFA Array with Omni-Directional and Full-Coverage Radiations

2022 IEEE Wireless Antenna and Microwave Symposium, WAMS 2022

2022 | conference-paper

Virtual Lab Virtues in Distance Learning

Smart Innovation, Systems and Technologies

2022 | conference-paper

Cybersecurity in ict supply chains: Key challenges and a relevant architecture

Sensors

2021 | journal-article

Distributed architecture to enhance systems protection against unauthorized activity via usb devices

Journal of Sensor and Actuator Networks

2021 | journal-article

Dual-Band MIMO Antenna Array for Sub 6 GHz 5G Smartphone Applications

2021 29th Telecommunications Forum, TELFOR 2021 - Proceedings

2021 | conference-paper

Information Security Assessment and Certification within Supply Chains

ACM International Conference Proceeding Series

2021 | conference-paper

Internal MIMO Antenna Design for Multi-Band Mobile Handset Applications

Telecommunications Forum (TELFOR)

2021 | conference-paper

Proposing an Architecture for IoT Based on WSN

Lecture Notes on Data Engineering and Communications Technologies

2021 | book-chapter

Provisioning Cybersecurity in ICT Complex Supply Chains: An Overview, Key Issues and a Relevant Architecture

Preprints.org

2021 | journal-article

Roadmap of security threats between IPv4/IPv6

2021 IEEE International IOT, Electronics and Mechatronics Conference, IEMTRONICS 2021 - Proceedings

2021 | conference-paper

The Future of Engineering Education: Current Challenges and Opportunities

EDUNINE 2021 - 5th IEEE World Engineering Education Conference: The Future of Engineering Education: Current Challenges and Opportunities, Proceedings

2021 | conference-paper

Wideband and Low-Profile Phased Array Smartphone Antenna Supporting 28-38 GHz

Telecommunications Forum (TELFOR)

2021 | conference-paper

Agência da União Europeia para a Cibersegurança (ENISA)

Instituições, Órgão e Organismos da União Europeia, Manuais Universitários

2020 | book-chapter

Agência da União Europeia para a Cibersegurança (ENISA)

Instituições, Órgão e Organismos da União Europeia, Manuais Universitários

2020 | book-chapter

EDGE4ALL: Edge Computing for Smart City

EAI/Springer Innovations in Communication and Computing

2020 | conference-paper

Plenary: The Challenges of Education in Engineering, Computing and Technology without exclusions: Innovation in the era of the Industrial Revolution 4.0.

EDUNINE 2020 - 4th IEEE World Engineering Education Conference: The Challenges of Education in Engineering, Computing and Technology without Exclusions: Innovation in the Era of the Industrial Revolution 4.0, Proceedings

2020 | conference-paper

Preface S-cube 2019

Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST

2020 | book

Simulator for Smart City Environment

2020 | book-chapter

Special Issue "Achieving Predictive Maintenance using Sensors: Real or Fantasy?"

Sensors

2020 | journal-issue

Healthcare Critical Knowledge Monitor System Model: Healthcare Knowledge Capture Component Specification

Research in Medical & Engineering Sciences

2019 | journal-article

EDGE4ALL - Edge Platform For Smart City

2019 | conference-paper

Plenary: Modern Educational Paradigms for a Computer and Engineer Career

EDUNINE 2019 - 3rd IEEE World Engineering Education Conference: Modern Educational Paradigms for Computer and Engineering Career, Proceedings

2019 | conference-paper

Promoting Creativity in Final Year Engineering Students' Project: A case study in the Smart Cities context

EDUNINE 2019 - 3rd IEEE World Engineering Education Conference: Modern Educational Paradigms for Computer and Engineering Career, Proceedings

2019 | conference-paper

Smart City Summit Demos 2018

EAI

2019 | edited-book

Study of the Means of Online Payment in the Portuguese Population

Proceedings of 12th International Conference on Global Security, Safety and Sustainability, ICGS3 2019

2019 | conference-paper

Trends in engineering education: A disruptive view for not so far future

2019 18th International Conference on Information Technology Based Higher Education and Training, ITHET 2019

2019 | conference-paper

Work-in-Progress: Global Experiences for Engineering Programs

Advances in Intelligent Systems and Computing

2019 | conference-paper

Automatic human trajectory destination prediction from video

Expert Systems with Applications

2018 | journal-article

Comparison and evaluation of organizational transactions for continuous auditing and business compliance

International Journal of Information System Modeling and Design

2018 | journal-article

Engineering education program promoting the profession

Advances in Intelligent Systems and Computing

2018 | book

Global perspectives on cybersecurity education

Annual Conference on Innovation and Technology in Computer Science Education, ITiCSE

2018 | conference-paper

Global perspectives on cybersecurity education for 2030: A case for a meta-discipline

Annual Conference on Innovation and Technology in Computer Science Education, ITiCSE

2018 | conference-paper

High quality engineering program achievement

Advances in Intelligent Systems and Computing

2018 | conference-paper

International Experiences and the Implications for the Success of Engineering Programs

Proceedings of 2018 IEEE International Conference on Teaching, Assessment, and Learning for Engineering, TALE 2018

2018 | conference-paper

Internationalization project to face the uncertainties of work market

Proceedings - Frontiers in Education Conference, FIE

2018 | conference-paper

Message from the technical program chairs

EDUNINE 2018 - 2nd IEEE World Engineering Education Conference: The Role of Professional Associations in Contemporaneous Engineer Careers, Proceedings

2018 | conference-paper

Proposing a behavior-based IDS model for IoT environment

Lecture Notes in Business Information Processing

2018 | conference-paper

The role of professional associations in contemporaneous engineer careers

EDUNINE 2018 - 2nd IEEE World Engineering Education Conference: The Role of Professional Associations in Contemporaneous Engineer Careers, Proceedings

2018 | conference-paper

Classical Engineering Education Revisited - Why it Matters

2017 | conference-paper

Challenges and Reflections in Designing Cyber Security Curriculum

2017 Ieee World Engineering Education Conference (Edunine)

2017 | journal-article

Challenges and reflections in designing Cyber security curriculum

EDUNINE 2017 - IEEE World Engineering Education Conference: Engineering Education - Balancing Generalist and Specialist Formation in Technological Carriers: A Current Challenge, Proceedings

2017 | conference-paper

Classical engineering education coping with engineering profession demands

Proceedings of the 45th SEFI Annual Conference 2017 - Education Excellence for Sustainability, SEFI 2017

2017 | conference-paper

Classical engineering education revisited - Why it matters

ASEE Annual Conference and Exposition, Conference Proceedings

2017 | conference-paper

Engineering Education: Balancing generalist and specialist formation in technological carriers: A current challenge

EDUNINE 2017 - IEEE World Engineering Education Conference: Engineering Education - Balancing Generalist and Specialist Formation in Technological Carriers: A Current Challenge, Proceedings

2017 | conference-paper

Engineering Education: balancing generalist and specialist formation in technological carriers: a current challenge

2017 Ieee World Engineering Education Conference (Edunine)

2017 | journal-article

Engineering course specially designed to face retention issue

Proceedings of the 45th SEFI Annual Conference 2017 - Education Excellence for Sustainability, SEFI 2017

2017 | conference-paper

Human skeleton detection from semi-constrained environment video

VISIGRAPP 2017 - Proceedings of the 12th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications

2017 | conference-paper

Knowledge security an empirical use of IT - Child abuse monitor system model

ICT4AWE 2017 - Proceedings of the 3rd International Conference on Information and Communication Technologies for Ageing Well and e-Health

2017 | conference-paper

Pointer dynamics as cognitive biometrics

2016 23 Encontro Portugues de Computacao Grafica e Interacao, EPCGI 2016

2017 | conference-paper

Rethinking Engineering Education

2017 Ieee Frontiers in Education Conference (Fie)

2017 | book-chapter

Rethinking engineering education

Proceedings - Frontiers in Education Conference, FIE

2017 | conference-paper

Self-Oriented Learning based on Intelligent Systems into the Workplace

2017 Ieee World Engineering Education Conference (Edunine)

2017 | journal-article

Self-oriented learning based on intelligent systems into the workplace

EDUNINE 2017 - IEEE World Engineering Education Conference: Engineering Education - Balancing Generalist and Specialist Formation in Technological Carriers: A Current Challenge, Proceedings

2017 | conference-paper

Behavioural biometrics for authentication and stress detection – A case study with children

Communications in Computer and Information Science

2016 | conference-paper

Evaluating information systems with continuous assurance services

International Journal of Information Systems in the Service Sector

2016 | journal-article

The information value: Perception of the problem

Advances in Intelligent Systems and Computing

2016 | conference-paper

What is missing for trust in the Cloud Computing?

SIGMIS-CPR 2016 - Proceedings of the 2016 ACM SIGMIS Conference on Computers and People Research

2016 | conference-paper

A Trust Model for Cloud Computing environment

Proceedings of the 3rd International Conference on Cloud Security and Management (Iccsm-2015)

2015 | book-chapter

A Trust model for Cloud Computing environment

Proceedings of the International Conference on Cloud Security Management, ICCSM

2015 | conference-paper

An immunity based configuration for multilayer single featured biometric authentication algorithms

Communications in Computer and Information Science

2015 | conference-paper

Automatic human action recognition from video using Hidden Markov Model

Proceedings - IEEE 18th International Conference on Computational Science and Engineering, CSE 2015

2015 | conference-paper

Automatic visual detection of human behavior: A review from 2000 to 2014

Expert Systems with Applications

2015 | journal-article

Child abuse monitor system model: A health care critical knowledge monitor system

Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST

2015 | conference-paper

Design of a case-based reasoner for information security in military organizations

European Conference on Information Warfare and Security, ECCWS

2015 | conference-paper

Detection of dangerous situations using a smart internet of things system

Advances in Intelligent Systems and Computing

2015 | conference-paper

Enrollment time as a requirement for biometric hand recognition systems

Proceedings of the 10th International Conference on Cyber Warfare and Security, ICCWS 2015

2015 | conference-paper

Insider threats: The major challenge to security risk management

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

2015 | conference-paper

Monitoring organizational transactions in enterprise information systems with continuous assurance requirements

International Journal of Enterprise Information Systems

2015 | journal-article

Um modelo de confiança para o ambiente de computação em nuvem

2015 | conference-paper

Challenges in Information Security Protection

13th European Conference on Cyber Warfare and Security (ECCWS 2014)

2014 | conference-paper

Challenges in information security protection

European Conference on Information Warfare and Security, ECCWS

2014 | conference-paper

Child Abuse Monitor System Model: A Health Care Critical Knowledge Monitor System

1st International Conference on IoT Technologies for HealthCare (HealthyIoT)

2014 | conference-paper

Determinants of Behavioral Intention to Mobile Banking in Arab Culture

Research and Design Innovations for Mobile User Experience

2014 | book-chapter

Enrolment Time as a Requirement for Face Recognition Biometric Systems

13th European Conference on Cyber Warfare and Security (ECCWS 2014)

2014 | conference-paper

Enrolment time as a requirement for biometric fingerprint recognition

2014 | journal-article

Enrolment time as a requirement for face recognition biometric systems

European Conference on Information Warfare and Security, ECCWS

2014 | conference-paper

Free typed text using keystroke dynamics for continuous authentication

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

2014 | conference-paper

Management of internal control mechanisms in ERP for continuous monitoring purposes

Information Systems and Technologies (CISTI), 2014 9th Iberian Conference on

2014 | conference-paper

Planning Method of Information Security for Military Organizations

13th European Conference on Cyber Warfare and Security (ECCWS 2014)

2014 | conference-paper

Planning method of information security for military organizations

European Conference on Information Warfare and Security, ECCWS

2014 | conference-paper

Report of the Participation of University of Minho on Cyber Perseu Exercise 2014,

2014 | report

Security metrics to evaluate organizational IT security

ACM International Conference Proceeding Series

2014 | conference-paper

A conceptual model for evaluating systems with continuous assurance services

Conference on Enterprise Information Systems (CENTERIS 2013)

2013 | conference-paper

A study of biometric authentication adoption in health services

2013 | book

An enterprise ontology-based database for continuous monitoring application

2013 | conference-paper

Biometrics Acceptance in Arab Culture: an Exploratory Study

2013 International Conference on Computer Applications Technology (Iccat)

2013 | conference-paper

Determinants of behavioral intention to mobile banking in Arab culture

Research and Design Innovations for Mobile User Experience

2013 | book-chapter

Feasibility Study of a Multimodal Biometric Authentication Solution Based on Pointer Dynamics and Skin Conductivity

3rd International Conference on Cybercrime, Security and Digital Forensics

2013 | conference-paper

Health Care Critical Knowledge Monitor System Model:Health Care Critical Knowledge Ontology Component

SHEWC2013 - XIII Safety, Health and Environment World Congress

2013 | conference-paper

Health users' perception of biometric authentication technologies

Proceedings of CBMS 2013 - 26th IEEE International Symposium on Computer-Based Medical Systems

2013 | conference-paper

Information security - Military standards versus ISO 27001: A case study in a Portuguese military organization

European Conference on Information Warfare and Security, ECCWS

2013 | conference-paper

New Technology Acceptance in Europe and Arabic Cultures: Comparative Study

Informing Science & IT Education Conference (InSITE)

2013 | conference-paper

Organizational transactions with real time monitoring and auditing

2013 | journal-article

Requirements in an Internet access sharing model

2013 | journal-article

Requisitos para um Sistema Inteligente de Gestão/Análise de Eventos de Segurançada Informação

Proceedings of World Congress on Systems Engineering and Information Technology

2013 | journal-article

Scan detection system using artificial neural networks

European Conference on Information Warfare and Security, ECCWS

2013 | conference-paper

Specialized knowledge systems - A model for intelligent learning management within organizations

2013 | book

The matrix of quality dimensions of knowledge management: Knowledge management assessment models review

2013 | journal-article

User Perception for Biometrics and Secret Management

Proceedings of World Congress on Systems Engineering and Information Technology

2013 | journal-article

User's requirements in Internet access sharing

Advances in Intelligent Systems and Computing

2013 | conference-paper

A solution for real time monitoring and auditing of organizational transactions

2012 | conference-paper

An Ontological Approach to Information Security Management

2012 | conference-paper

An ontological approach to information security management

2012 | conference-paper

An ontology approach in designing security information systems to support organizational security risk knowledge

2012 | conference-paper

Automation of the Approval and Control Process of Documents

2012 | book-chapter

Biometric Graphical Authentication – a Patent Review: New Approaches in the Recognition of Users

2012 | conference-paper

Biometric technologies and their perception by the common citizen

2012 | journal-article

Botnets: A heuristic-based detection framework

2012 | conference-paper

Continuous assurance on organizational transactions

2012 | conference-paper

Critical knowledge monitor system model: Healthcare context

2012 | conference-paper

Framework de Gestão de Segurança da Informação para Organizações Militares Orientada pelos Principais Vetores de Ataque

2012 | conference-paper

Healthcare Critical Knowledge Monitor System Model: Critical Knowledge Ontology Component - topic models approach

2012 | conference-paper

Information security model to military organizations in environment of information warfare

2012 | conference-paper

Keystroke dynamics for continuous access control enforcement

2012 | conference-paper

Modelo de Segurança da Informação para Organizações Militares em Ambiente de Guerra de Informação

2012 | journal-article

Study of the perception on the biometric technology by the Portuguese citizens

Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering

2012 | conference-paper

Video Casting Application Oriented Key Exchange

2012 | conference-paper

Video casting application oriented key exchange

MMEDIA - International Conferences on Advances in Multimedia

2012 | conference-paper

What is Wrong with Biometrics?

2012 | magazine-article

Wireless Identity Management: Multimodal Biometrics and Multilayered IDM

2012 | book-chapter

Botnet detection: A numerical and heuristic analysis

2011 | conference-paper

Description of a practical application of an information security audit framework

2011 | conference-paper

Estudo da percepção dos utilizadores em relação à utilização de tecnologias de autenticação biométrica no acesso aos serviços de saúde

2011 | conference-paper

Grid Learning Classifiers - A Web Based Interface

2011 | journal-article

Grid data mining by means of learning classifier systems and distributed model induction

2011 | conference-paper

Intrusion detection through keystroke dynamics

2011 | conference-paper

Password Sharing and How to Reduce It

2011 | book-chapter

Sistemas Auto-regulados de Conteúdos Orientados para Contextos de Aprendizagem em Ambiente Profissional

2011 | conference-paper

Supervised Learning Classifier Systems for Grid Data Mining

2011 | book-chapter

A conceptual model approach to manage and audit information systems security

2010 | conference-paper

A security audit framework to manage information system security

2010 | book

A security framework for audit and manage information system security

2010 | conference-paper

An audit framework to support information system security management

2010 | journal-article

An ontology based approach to semantically structure data in security information systems

2010 | conference-paper

Another Global City: Historical Explorations into the Transnational Municipal Moment, 1850-2000

ANOTHER GLOBAL CITY: HISTORICAL EXPLORATIONS INTO THE TRANSNATIONAL MUNICIPAL MOMENT, 1850-2000

2010 | journal-article

Automation of the approval and control process of documents

Communications in Computer and Information Science

2010 | conference-paper

Cyberwar and the Russian Federation: the usual suspect

2010 | journal-article

GridclassTK- Toolkit for grid learning classifier systems

European Conference of Systems, ECS'10, European Conference of Circuits Technology and Devices, ECCTD'10, European Conference of Communications, ECCOM'10, ECCS'10

2010 | conference-paper

Methods of Organizational Information Security

2010 | book-chapter

Multimodal Biometrics and Multilayered IDM for Secure Authentication

2010 | book-chapter

OTM Machine Acceptance: In the Arab Culture

2010 | book-chapter

Odour user interface for authentication: Possibility and acceptance: Case study

2010 | conference-paper

Password sharing and how to reduce it

Certification and Security in Health-Related Web Applications: Concepts and Solutions

2010 | book-chapter

Podcasts and vodcasts: pros and cons

2010 | book-chapter

Uma Framework Ontológica para a Gestão da Segurança dos Sistemas de Informação

2010 | conference-paper

User acceptance OTM machine: In the Arab culture

2010 | journal-article

Validating Tam With Odour Interface In Atm Machines

2010 | journal-article

A Grid Data Mining architecture for Learning Classifier Systems

2009 | journal-article

An ontology based approach to information security

Communications in Computer and Information Science

2009 | conference-paper

Keystroke Dynamics and Graphical Authentication Systems

2009 | book-chapter

Podcasts in Higher Education: Students’ and Lecturers’ Perspectives

2009 | book-chapter

RFID: Big brother global?

2009 | conference-paper

Security framework for information systems

2009 | conference-paper

Streaming contents and RSS feed in a pedagogical environment

2009 | conference-paper

Subsídeos Para uma Eficaz Segurança da Informação nas Organizações

2009 | journal-article

Supervised learning classifier systems for grid data mining

2009 | other

A survey of user authentication based on mouse dynamics

2008 | book

An Ontology Based Approach to Data Surveillance

2008 | book

Structured Textual Data Monitoring Based on a Rough Set Classifier

2008 | conference-paper

User dynamics in graphical authentication systems

2008 | book-chapter

Using technology to overcome the password's contradiction

Handbook of Research on Social and Organizational Liabilities in Information Security

2008 | book-chapter

Voice based authentication using the null freqencies

2008 | book

A machine learning approach to keystroke dynamics based user authentication

International Journal of Electronic Security and Digital Forensics

2007 | journal-article

Graphical based user authentication with embedded mouse stroke dynamics

2007 | conference-paper

Information technologies for the information agent

2007 | conference-paper

On the use of rough sets for user authentication via keystroke dynamics

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

2007 | conference-paper

Prediction of abnormal behaviors for intelligent video surveillance systems

2007 | conference-paper

Previsão de Eventos Anormais em Sistemas de Vídeo-Vigilância

Actas do Simpósio Doutoral em Inteligência Artificial

2007 | journal-article

Reusing Streaming Contents in Engineering and Education Courses

Conference ICL2007, September 26 -28, 2007

2007 | conference-paper

Streaming media in different contexts: Engineering and education graduation

Proceedings of the IADIS International Conference e-Learning, EL 2007 - Part of the IADIS Multi Conference on Computer Science and Information Systems, MCCSIS 2007

2007 | conference-paper

A norma das normas em Segurança da Informação

2006 | journal-article

An approach to information systems risk management of health units,Uma abordagem à gestão do risco para os sistemas de informação das unidades de saúde

CISTI 2006 - Actas da 1a Conferencia Iberica de Sistemas e Tecnologias de Informacao

2006 | conference-paper

An international governmental mailing system : A requirement to prevent web-enhanced terrorism

2006 | conference-paper

Authenticating Computer Access Based On Keystroke Dynamics Using A Probabilistic Neural Network

2006 | conference-paper

Critical aspects in authentication graphic keys

2006 | conference-paper

Data mining a prostate cancer dataset using rough sets

IEEE Intelligent Systems

2006 | conference-paper

Enhancing login security through the use of keystroke input dynamics

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

2006 | conference-paper

Generation of authentication strings from graphic keys

2006 | journal-article

N-ary trees classifier

2006 | conference-paper

Reaching learning objectives of the cognitive domain with a synchronized streaming media environment

SEFI 2006 - 34th Annual Conference: Engineering Education and Active Students

2006 | conference-paper

The OBSERVER: An intelligent and automated video surveillance system

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

2006 | journal-article

An Improved Statistical Keystroke Dynamics Algorithm

2005 | conference-paper

Data mining a keystroke dynamics based biometrics database using rough sets

2005 | book

Developing a Keystroke Dynamics Based Agent Using Rough Sets

2005 | conference-paper

Moving object detection unaffected by cast shadows, highlights and ghosts

2005 | conference-paper

Password secured sites - Stepping forward with keystroke dynamics

2005 | conference-paper

Segurança e Tecnologias no E-Vote

2005 | conference-paper

Um método para a estimativa do valor da informação, numa unidade de saúde

2005 | conference-paper

Wearable Authentication Device with Biometrical Intrusion Prevention System

2005 | conference-paper

Biometria e Autenticação

2003 | conference-paper

O Combate Electrónico - Ataques e Defesas sobre a Rede

2002 | conference-paper

A methodology for complex embedded systems design: Petri nets within a UML approach

IFIP Advances in Information and Communication Technology

2001 | conference-paper

Sistemas de informação industriais orientados ao controlo: perspectivas metodológicas para tecnologias reconfiguráveis

Ingenium

2000 | magazine-article

Modeling industrial embedded systems with UML

2000 | conference-paper

A UML-based approach for modeling industrial control applications

1999 | conference-paper

An evolutionary approach to the use of Petri net based models: from parallel controllers to HW/SW co-design

1998 | conference-paper

A heterogeneous computer vision architecture: Implementation issues

1995 | journal-article

FISHY - A coordinated framework for cyber resilient supply chain systems over complex ICT infrastructures

EU Framework Programme for Research and Innovation Euratom

2020-09 to 2023-08 | 952644

Lab4U&Spaces - Living Lab of Interactive Urban Space Solutions

Fundação para a Ciência e Tecnologia

2020-09 to - |

VADE - Ambientes de ValorAcrescentado para Suporte Dinâmico a Serviços Baseados na Localização em Redes UMTS

Fundação para a Ciência e a Tecnologia

2001- to 2003- | POSI/CHS/38475/2001

AROUND: Suporte a ServiçosInternet de Ambito Local

Fundação para a Ciência e a Tecnologia

1999- to 2001- | PRAXIS/P/EEI/14267/1998

Sistemas Embebidos e Reconfiguráveis:Metodologias de Desenvolvimento para Aplicações Tempo-Rea

Fundação para a Ciência e a Tecnologia

1999- to 2001- | PRAXIS/P/EEI/10155/1998

Laboratório Associado de Sistemas Inteligentes

Fundação para a Ciência e a Tecnologia

2021-01 to 2025-12 | 168241UID

CYBERACTIONING: Training Cybersecurity Skills through Advanced Higher Education Joint Programmes

European Commission

2023-10 to 2027-09 | 101123445

ADM.IN - Advanced Decision Making in productive systems through Intelligent Networks

Associação para a Inovação e Desenvolvimento da FCT

2019-07 to - | POCI-01-0247-FEDER-055087

SIDIC - Sistema Integrado de Detecção e Identificação de Comportamentos e Dados Biométricos por Análise de Video

Agência Nacional de Inovação SA

2011-10 to 2013-09 | 2011/021584

OFELIA - Ambientes abertos federados para a alavancagem de Identidade e Autorização.

Fundação para a Ciência e a Tecnologia

2010-04 to 2013-04 | PTDC/EIA-EIA/104328/2008

csSecure II

Agência Nacional de Inovação SA

2010-04 to 2013-03 | 2010/013619

Implicações Pedagógicas da Utilização de Podcasts em Blended-Learning

Fundação para a Ciência e a Tecnologia

2007-10 to 2010-06 | PTDC/CED/70751/2006

GridClass - Learning Classifiers Systems for Grid Data Mining

Fundação para a Ciência e a Tecnologia

2007-07 to 2011-05 | GRID/GRI/81736/2006

HyPERGEO - Easy and Frindly Access to GeographicInformation for Mobile Users

N/A

2000- to 2001- | IST-1999-11641

IntVIS4Insp - Sistema de Visão por Computador Inteligente e Flexível para Inspeção Automática

N/A

2019-10 to 2022-09 | POCI-01-0247-FEDER-042778

Start End Term Value
Group CCPM
17/01/2023 20:15
17/01/2023 20:10
This user account status is Approved