CIIC - Publicações em Atas de Conferências com Peer Review
URI permanente para esta coleção:
Navegar
Percorrer CIIC - Publicações em Atas de Conferências com Peer Review por Domínios Científicos e Tecnológicos (FOS) "Ciências Naturais::Ciências da Computação e da Informação"
A mostrar 1 - 10 de 29
Resultados por página
Opções de ordenação
- 802.21-MPA-IMS ArchitecturePublication . Rodrigues, Carlos Miguel de Jesus; Rabadão, Carlos; Pereira, AntónioMobility has become a keyword nowadays with the evolution of mobile devices market and proliferation of realtime services. IP Multimedia Subsystem (IMS) is a single, standardized service framework that supports voice, video, data and messaging services, but does not provide seamless mobility for packet based sessions. This paper purposes an IMS architecture with IEEE 802.21 and media-independent pre-authentication (MPA) integrated. IEEE 802.21 can enable this seamless mobility in IMS and, additionally, MPA provides a secure handover optimization scheme, reducing, as a consequence, handover latency. The main goal of this architecture is to provide seamless and secure handovers between different access technologies in an IMS-based environment.
- Blind Guide: An Ultrasound Sensor-based Body Area Network for Guiding Blind PeoplePublication . Pereira, António; Nunes, Nelson; Vieira, Daniel; Costa, Nuno; Fernandes, Hugo; Barroso, JoãoWireless Sensor Networks, in particular Wireless Body Area Networks, is a technology suggested by the research community as allowing elderly people, or people with some kind of disability, to live in a safer, responsive and comfortable environment while at their homes. One of the most active threats to the autonomous life of blind people is the quantity and variety of obstacles they face while moving, whether they are obstacles in the footpath or obstacles coming out from the walls of buildings. Hence, it is necessary to develop a solution that helps or assists blind people while moving either in indoor or outdoor scenarios, simultaneously allowing the use of the use of white cane or the Seeing Eye dog. In this article, the authors propose the use of an ultra-sound based body area network for obstacle detection and warning as a complementary and effective solution for aiding blind people when moving from place to place. According to the cost estimates of the solution and to the negligible setup time, this could be a real effective complementary solution for blind people.
- A Customizable Web Platform to Manage Standards Compliance of Information Security and Cybersecurity AuditingPublication . Antunes, Mário; Maximiano, Marisa; Gomes, RicardoInformation security and cybersecurity are key subjects in modern enterprises' management, being ISO-27001:2013, NIST Cybersecurity Framework and ISO-27009 some of the most implemented international frameworks and standards. Their main goal is to globally reduce the risk, by leveraging enterprises' competitiveness in global markets and enhancing business processes and collaborators' cyber awareness. Auditing processes examine and assess a list of predefined controls. For each control, a set of corrective measures could be proposed, to increase its compliance with the standard being used. These processes are time-consuming, involve on-site intervention by specialized consulting teams on the intervened enterprises, and a set of status reports of all the interventions should be elaborated and delivered. The existing auditing information systems are not developed to meet Small and Medium-sized Enterprises (SME) requirements, as they are mostly proprietary and expensive, ground usually on off-the-shelf applications, and are not generic to be used by several standards with different checklists and auditing methodologies. In this paper, a generic and web-integrated cybersecurity auditing information system is described. Its architecture, design, and data model enable it to be used in a wide set of auditing processes, by loading a predefined controls checklist assessment and their corresponding mitigation tasks list. It was designed to meet both SMEs and large enterprises' requirements, and stores auditing and intervention-related data in a relational database. The information system was tested on an ISO-27001:2013 information security auditing project, which has integrated fifty SMEs. The results obtained during the project are promising and reveal the appropriateness of using this information system in further similar auditing processes.
- Os Desafios Web no Processo Formativo - O Caso de Estudo da humansoftPublication . Sousa, Mayelson de; Gonçalves, AlexandrinoA constante evolução das tecnologias web tem originado o aparecimento de plataformas que facilitam a gestão das tarefas dos utilizadores nos dias de hoje. No sentido de maximizar a satisfação do cliente e disporem de soluções de acordo com os padrões de atuais do mercado, as empresas devem adaptar os seus produtos, com particular enfoque nas soluções web-based, com vista a potenciar a usabilidade e a fluidez do seu uso. Neste sentido, este artigo apresenta um caso de estudo real, de desenvolvimento web na empresa humansoft, onde foram desenvolvidos diversos módulos relativos aos dois principais produtos da empresa, o humantrain, que é um sistema de gestão do processo formativo, e o humanportal, que é uma aplicação web que permite a interoperabilidade entre o humantrain e a web. Ambas as aplicações permitem às entidades formadoras e/ou empresas rentabilizarem a gestão dos seus recursos tanto ao nível pedagógico como financeiros.
- Discrete Compound Tests and Dorfman’s Methodology in the Presence of MisclassificationPublication . Santos, Rui; Martins, João Paulo; Felgueiras, MiguelCompound tests can be used to save resources for classification or estimation purposes in clinical trials and quality control. Nevertheless, the methodologies that are usually applied are restricted to qualitative group tests. Moreover, when quantitative compound tests are applied the problem is to ascertain whether the amount of some substance of any individual in the group is greater or lower than a prefixed threshold. An overview of the applications of the discrete compound tests highlights the advantages (to save resources) and disadvantages (higher probability of misclassification), and suggests criteria to assess the suitability of applying Dorfman’s methodology.
- An easy-to-use tool to inject DoS and spoofing networking attacksPublication . Almeida, Rafaela; Pacheco, Vasco; Antunes, Mário; Frazão, LuísComputer network attacks are vast and negatively impact the infrastructure and its applicational services. From a cyber offensive and defensive perspective, there are a plethora of tools to craft and inject customized malicious packets in the network and exploit operating systems and application vulnerabilities. Those tools are however hard to operate by practitioners with less knowledge on networking fundamentals and students in the early stage of their studies. This paper proposes an easy-to-use application tool that can produce customized Denial of Service (DoS) and spoofing attacks. It was developed in Python and takes advantage of scapy library to process and inject network packets. A set of experiments was made, and the results obtained show the efficiency and accuracy of the attacks, by impairing the proper functioning of the victim's machines.
- EasyBDI: Near Real-Time Data Analytics over Heterogeneous Data SourcesPublication . Silva, Bruno; Moreira, José; Costa, Rogério Luís de C.The large volume of currently available data creates several opportunities for sciences and industry, especially with the application of data analytics. But also raises challenges that make unfeasible the use of batch-based ETL processes. Indeed, near real-time data analytics is a requirement in several domains as an alternative to traditional data warehouses. In the last years, big data platforms have been developed to enable query execution over distributed data sources. However, they do not deal with subject-oriented analysis, do not provide data distribution transparency, or do not assist with schema mapping and integration. In this demonstration, we present EasyBDI. It's a near real-time big data analytics prototype that enables users to run queries over heterogeneous data sources based on global logical abstractions created by the system and provides some usual concepts of data warehouse systems, like facts and dimensions. We use two motivating scenarios, one based on three years of real data on photovoltaic energy production and consumption, and the other based on the SSB+ benchmark. We will also present implementation challenges, issues, solutions, and insights.
- Elder Care Modular SolutionPublication . Marcelino, Isabel; Pereira, António Manuel de JesusThe Elder Care solution has two primary goals: monitoring vital signs, sending alerts to family and specialized help and provide a social network in order to wrap all older population to avoid social isolation [1][2]. In this paper we will show the methodology used to obtain Elder Care's architecture and point some guidelines to our present work: Elder Care's implementation.
- An end-to-end cryptography based real-time chatPublication . Melo, Tiezer; Barros, António; Antunes, Mário; Frazão, LuísConfidentiality protects users' data from digital eavesdroppers when traveling through the Internet. Confidentiality is complex and costly, especially on applications that involve communication and data exchange between multiple users. Cryptography has been the most used medium to achieve confidentiality, being the greatest challenge the sharing of a secret key to a group of people in a safe and effective way. This paper presents a chat application that implements an innovative way of sending messages with end-to-end encryption, in real-time, with a dynamic key store, and without the existence of data persistence. The application stands out from the others by the fact that it innovates the way the keys are shared with multiple users.
- Evolution of Artificial Terrains for Video Games Based on AccessibilityPublication . Frade, Miguel; Vega, Francisco Fernandez de; Cotta, CarlosDiverse methods have been developed to generate terrains under constraints to control terrain features, but most of them use strict restrictions. However, there are situations were more flexible restrictions are sufficient, such as ensuring that terrains have enough accessible area, which is an important trait for video games. The Genetic Terrain Program technique, based on genetic programming, was used to automatically evolve Terrain Programs (TPs - which are able to generate terrains procedurally) for the desired accessibility parameters. Results showed that the accessibility parameters have negligible influence on the evolutionary system and that the terminal set has a major role on the terrain look. TPs produced this way are already being used on Chapas video game.
- «
- 1 (current)
- 2
- 3
- »
