Percorrer por autor "Goncalves, Ramiro"
A mostrar 1 - 3 de 3
Resultados por página
Opções de ordenação
- Acessibilidade no Ciclo de Vida do Software: Um exercício de maiêutica na engenharia de softwarePublication . Silva, João de Sousa e; Goncalves, Ramiro; Pereira, AntónioA acessibilidade é bastante desqualificada na engenharia de software, o que compromete a sua vulgarização. Neste artigo, este problema é explicado e são evidenciadas algumas das suas consequências. São apresentados alguns conceitos chave da acessibilidade digital, que vão além da acessibilidade Web. A principal contribuição deste artigo é a apresentação de um esquisso de proposta de modelo de desenvolvimento, onde a acessibilidade está presente em todo o ciclo de vida de software, de uma forma explícita e justificada, tendo como base as quatro principais fases presentes na maioria dos modelos de desenvolvimento de software.
- CoAP Flow Signatures for the Internet of ThingsPublication . Canuto, Luis; Santos, Leonel; Vieira, Leandro; Goncalves, Ramiro; Rabadão, CarlosThe development of technology brought an exponential evolution of IoT networks, and with a number of different devices connected to the Internet, meaning, more IP addresses, traffic and devices susceptible to attacks. These types of networks are characterized by their interoperability and low resources, making it a complex ecosystem and making it difficult to implement management and monitoring measures, leading to a lack of security. Considering the impact that IoT networks have on the market, their protection is essential and, is now one of the themes in constant evolution. With the focus on security, this work aims to characterize a CoAP and CoAPS signatures, through the analysis of a flow in a test scenario and recognize the types of messages of the signature and what is their impact on the network and later creating rules that could help an IDS, in order to save resources and time. When analyzing the flows, it was concluded that it is possible to identify some characteristics of a signature, such as identifying Confirmable and Non-Confirmable messages.
- Identifying Attack Signatures for the Internet of Things: An IP Flow Based ApproachPublication . Vieira, Leandro; Santos, Leonel; Goncalves, Ramiro; Rabadão, CarlosAt the time of more and more devices being connected to the internet, personal and sensitive information is going around the network more than ever. Thus, security and privacy regarding IoT communications, devices, and data are a concern due to the diversity of the devices and protocols used. Since traditional security mechanisms cannot always be adequate due to the heterogeneity and resource limitations of IoT devices, we conclude that there are still several improvements to be made to the 2nd line of defense mechanisms like Intrusion Detection Systems. Using a collection of IP flows, we can monitor the network and identify properties of the data that goes in and out. Since network flows collection have a smaller footprint than packet capturing, it makes it a better choice towards the Internet of Things networks. This paper aims to study IP flow properties of certain network attacks, with the goal of identifying an attack signature only by observing those properties.
