CIIC - Publicações em Atas de Conferências com Peer Review
Permanent URI for this collection
Browse
Recent Submissions
- Digital Forensic Artifacts of FIDO2 Passkeys in Windows 11Publication . Domingues, Patricio; Frade, Miguel; Negrão, MiguelFIDO2’s passkey aims to provide a passwordless authentication solution. It relies on two main protocols – WebAuthn and CTAP2 – for authentication in computer systems, relieving users from the burden of using and managing passwords. FIDO2’s passkey leverages asymmetric cryptography to create a unique public/private key pair for website authentication. While the public key is kept at the website/application, the private key is created and stored on the authentication device designated as the authenticator. The authenticator can be the computer itself – same-device signing –, or another device – cross-device signing –, such as an Android smartphone that connects to the computer through a short-range communication method (NFC, Bluetooth). Authentication is performed by the user unlocking the authenticator device. In this paper, we report on the digital forensic artifacts left on Windows 11 systems by registering and using passkeys to authenticate on websites. We show that digital artifacts are created in Windows Registry and Windows Event Log. These artifacts enable the precise dating and timing of passkey registration, as well as the usage and identification of the websites on which they have been activated and utilized. We also identify digital artifacts created when Android smartphones are registered and used as authenticators in a Windows system. This can prove useful in detecting the existence of smartphones linked to a given individual.
- Evaluation of AI-based Malware Detection in IoT Network TrafficPublication . Prazeres, Nuno; Costa, Rogério Luís de C.; Santos, Leonel; Rabadão, CarlosInternet of Things (IoT) devices have become day-to-day technologies. They collect and share a large amount of data, including private data, and are an attractive target of potential attackers. On the other hand, machine learning has been used in several contexts to analyze and classify large volumes of data. Hence, using machine learning to classify network traffic data and identify anomalous traffic and potential attacks promises. In this work, we use deep and traditional machine learning to identify anomalous traffic in the IoT-23 dataset, which contains network traffic from real-world equipment. We apply feature selection and encoding techniques and expand the types of networks evaluated to improve existing results from the literature. We compare the performance of algorithms in binary classification, which separates normal from anomalous traffic, and in multiclass classification, which aims to identify the type of attack.
- A Conversational Agent for Promoting Physical Activity Among COPD PatientsPublication . Rodrigues, Ricardo; Caceiro, Ruben; Brites, Marcelo; Flora, Sofia; Cruz, Joana; Silva, Fernando; Ribeiro, JoséChronic Obstructive Pulmonary Disease (COPD) is one of the most prevalent diseases in the world, affecting respiratory performance of many people, limiting the airflow and is not fully reversible. It is a clinical syndrome characterized by chronic respiratory symptoms, structural pulmonary abnormalities or impairment of lung function. In order to help people with this disease, we propose an innovative personalized mHealth coaching platform that will address patient preferences and contextual factors – the OnTRACK platform. This platform is composed of a mobile application for patients, a web platform for healthcare professionals – and a conversational agent (or chatbot), named “Hígia”, which acts as an alternative interface between patients and the platform. This conversational agent includes several of the main functionalities already available in OnTRACK’s smartphone app, complementing and extending it. It allows consulting prescription information in a multitude of ways, getting and setting all personal data, inserting physical activity measurements, and obtaining historical data on physical activity and prescriptions, among others. The evaluation of the conversational agent yielded encouraging results, with users reporting being happier, more motivated, dedicated and confident when interacting with the systems using their voice, while allowing the development team to identify topics for improvement.
- Communication Protocol for Unmanned Vehicles : An Architectural ApproachPublication . Ramos, João; Ribeiro, Roberto; Safadinho, David; Barroso, João; Pereira, AntonioThe great potential of Unmanned Vehicles (UV) for services is supported by the evolution of drones and their flexible ability to help us performing dangerous, boring and difficult tasks. The common communication solutions e.g., radio, consider a pilot and a vehicle in the same location. Besides, the alternatives based on Ground Control Stations (GCS) are difficult to configure, which makes it difficult for a common user and a developer to use and/or implement new services for drones. This work proposes a solution with a new messaging protocol to overcome the previous problems, allowing controlling a UV in a remote location after a simple configuration. The implementation of this approach is based on a cloud platform, responsible for UV and user management, and on TCP/IP WebSockets for the user to control remotely located vehicles, anytime and anywhere. This research starts with the analysis of the prior work regarding UV communication technologies and the available GCS. Minding the identified problems, we designed an architecture that represents a cloud platform and multiple users and UVs in different networks. To prototype this architecture, we developed the user interface, the platform and the UV control module. The functional assessment considers a generic simplified and controlled scenario, focusing on the real-time control and video stream. The results confirmed the possibility to control a UV in a different location, in real-time, with an average response time of 25ms. This work provides valuable insights regarding the communication in the fields of anytime and anywhere device control and vehicle-based services.
- ACCEPT: Web Applications for visualization and analytics of shop floor dataPublication . Godinho, Eduardo Miguel Ascenso; Piedade, Maria BeatrizNo contexto atual da Indústria 4.0 e do controlo metrológico de produtos pré-embalados, procura-se que os dados provenientes de chão de fábrica sejam recolhidos de forma automática e que diferentes tipos de dispositivos digitais tenham acesso aos mesmos dados de forma ubíqua. Pretendeu-se desenvolver e integrar aplicações Web no sistema ACCEPT, sistema que permite a recolha, armazenamento, visualização e análise de dados de chão de fábrica. Neste artigo é descrito o processo de desenvolvimento das aplicações ACCEPT Quality Hub e ACCEPT Analytics e a sua integração neste sistema.
- Benchmarking bioinspired machine learning algorithms with CSE-CIC-IDS2018 network intrusions datasetPublication . Ferreira, Paulo; Antunes, MárioThis paper aims to evaluate CSE-CIC-IDS2018 network intrusions dataset and benchmark a set of supervised bioinspired machine learning algo rithms, namely CLONALG Artificial Immune System, Learning Vector Quantization (LVQ) and Back-Propagation Multi-Layer Perceptron (MLP). The results obtained were also compared with an ensemble strategy based on a majority voting algorithm. The results obtained show the appropri ateness of using the dataset to test behaviour based network intrusion de tection algorithms and the efficiency of MLP algorithm to detect zero-day attacks, when comparing with CLONALG and LVQ.
- Industry 4.0 for fashion products – Case studies using 3D technologyPublication . Spahiu, T.; Manavis, A.; Kazlacheva, Z.; Almeida, H.; Kyratsis, P.The Fourth Industrial Revolution is based on digitalization where virtual and physical systems of manufacturing are linked and operate together. Fashion products are of a great interest not only as items used to cover and protect the body but even to express individuality, personality and attractiveness. Due to the high interest of consumers for fashion items or products, fashion industry is one of the most important industries globally due to its effect on economic growth. As a result, companies try to invest continually on new technologies by implementing them in various processes of production. The aim of this paper is to present here the implementation of advanced technologies for various fashion products as garments, jewelery and accessories. These products are modelled, evaluated and produced by using 3D modelling software, simulation and additive manufacturing as some of the pillars of Industry 4.0 will be presented. The reduced time, waste and advantages to create, visualize and evaluate products at early stages of product creation are some of the advantages of these technologies, part of Industry 4.0 in the fashion industry.
- Advanced technologies for shoe sole productionPublication . Spahiu, Tatjana; Almeida, Henrique; Ascenso, Rita M. T.; Vitorino, Liliana; Marto, AnabelaAdvanced technologies for modelling and production are an important part in the whole process of product manufacturing. These advancements have changed the way of product development and play an important role in customization. In the footwear industry, as in any other industry, the use of these technologies is widely spread. Footwear comfort is one of the main selection criteria for purchase. Considering this fact, a case study of different steps for shoe designing according to individual foot shape will be presented. Taking into consideration the aesthetics of the sole and in a more sustainable view, through topological optimization reducing of material wastage for sole production will be presented. By means of the topological optimization in the shoe design process, sole optimization is realized. As a part of personalization, feet’s plantar pressure maps taken from 1 participant gave a better explanation of weight distribution of each foot. Following, sole personalization according the plantar pressure maps for each foot gives the possibility to obtain the best least material design according to the feet’s pressure while maintaining biomechanical performance.
- Evaluating cybersecurity attitudes and behaviors in Portuguese healthcare institutionsPublication . Nunes, Paulo; Antunes, Mário; Silva, CarinaThe growing digitization of healthcare institutions and its increasing dependence on Internet infrastructure has boosted the concerns related to data privacy and confidentiality. These institutions have been challenged with specific issues, namely the sensitivity of data, the specificity of networked equipment, the heterogeneity of healthcare professionals (nurses, doctors, administrative staff and other) and the IT skills they have.
- Identification of Fake Profiles in Twitter Social NetworkPublication . Antunes, Mário; Baptista, Hugo; Rodrigues, BaltazarOnline social networks are being intensively used by millions of users, Twitter being one of the most popular, as a powerful source of information with impact on opinion and decision making. However, in Twitter as in other online social networks, not all the users are legitimate, and it is not easy to detect those accounts that correspond to fake profiles. In this work in progress paper, we propose a method to help practitioners to identify fake Twitter accounts, by calculating the “fake probability” based on a weighted parameter set collected from public Twitter accounts. The preliminary results obtained with a subset of an existing annotated dataset of Twitter accounts are promising and give confidence on using this method as a decision support system, to help practitioners to identify fake profiles.