Cookies Policy
The website need some cookies and similar means to function. If you permit us, we will use those means to collect data on your visits for aggregated statistics to improve our service. Find out More
Accept Reject
  • Menu
Publications

Publications by CRACS

2023

On the Implementation of a Blockchain-Assisted Academic Council Electronic Vote System

Authors
Alves, J; Pinto, A;

Publication
SMART CITIES

Abstract
The digitisation of administrative tasks and processes is a reality nowadays, translating into added value such as agility in process management, or simplified access to stored data. The digitisation of processes of decision-making in collegiate bodies, such as Academic Councils, is not yet a common reality. Voting acts are still carried out in person, or at most in online meetings, without having a real confirmation of the vote of each element. This is particularly complex to achieve in remote meeting scenarios, where connection breaks or interruptions of audio or video streams may exist. A new digital platform was already previously proposed. It considered decision-making, by voting in Academic Councils, to be supported by a system that guarantees the integrity of the decisions taken, even when meeting online. Our previous work mainly considered the overall design. In this work, we bettered the design and specification of our previous proposal and describe the implemented prototype, and validate and discuss the obtained results.

2023

Boosting additive circular economy ecosystems using blockchain: An exploratory case study

Authors
Ferreira, IA; Godina, R; Pinto, A; Pinto, P; Carvalho, H;

Publication
COMPUTERS & INDUSTRIAL ENGINEERING

Abstract
The role of new technologies such as additive manufacturing and blockchain technology in designing and implementing circular economy ecosystems is not a trivial issue. This study aimed to understand if blockchain technology can be an enabler tool for developing additive symbiotic networks. A real case study was developed regarding a circular economy ecosystem in which a fused granular fabrication 3D printer is used to valorize polycarbonate waste. The industrial symbiosis network comprised four stakeholders: a manufacturing company that produces polycarbonate waste, a municipality service responsible for the city waste management, a start-up holding the 3D printer, and a non-profit store. It was identified a set of six requirements to adopt the blockchain technology in an additive symbiotic network, bearing in mind the need to have a database to keep track of the properties of the input material for the 3D printer during the exchanges, in addition to the inexistence of mechanisms of trust or cooperation between well-established industries and the additive manufacturing industry. The findings suggested a permissioned blockchain to support the implementation of the additive symbiotic network, namely, to enable the physical transactions (quantity and quality of waste material PC sheets) and monitoring and reporting (additive manufacturing technology knowledge and final product's quantity and price).Future research venues include developing blockchain-based systems that enhance the development of ad-ditive symbiotic networks.

2023

A Survey and Risk Assessment on Virtual and Augmented Reality Cyberattacks

Authors
Silva, T; Paiva, S; Pinto, P; Pinto, A;

Publication
30th International Conference on Systems, Signals and Image Processing, IWSSIP 2023, Ohrid, North Macedonia, June 27-29, 2023

Abstract
Nowadays, Virtual Reality (VR) and Augmented Reality (AR) systems are not exclusively associated with the gaming industry. Their potential is also useful for other business areas such as healthcare, automotive, and educational domains. Companies need to accompany technological advances and enhance their business processes and thus, the adoption of VR or AR technologies could be advantageous in reducing resource usage or improving the overall efficiency of processes. However, before implementing these technologies, companies must be aware of potential cyberattacks and security risks to which these systems are subject. This study presents a survey of attacks related to VR and AR scenarios and their risk assessment when considering healthcare, automation, education, and gaming industries. The main goal is to make companies aware of the possible cyberattacks that can affect the devices and their impact on their business domain. © 2023 IEEE.

2023

Severity Analysis of Web3 Security Vulnerabilities Based on Publicly Bug Reports

Authors
Melo, R; Pinto, P; Pinto, A;

Publication
Blockchain and Applications, 5th International Congress, BLOCKCHAIN 2023, Guimaraes, Portugal, 12-14 July 2023.

Abstract

2023

Towards Privacy-First Security Enablers for 6G Networks: The PRIVATEER Approach

Authors
Masouros, D; Soudris, D; Gardikis, G; Katsarou, V; Christopoulou, M; Xilouris, G; Ramón, H; Pastor, A; Scaglione, F; Petrollini, C; Pinto, A; Vilela, JP; Karamatskou, A; Papadakis, N; Angelogianni, A; Giannetsos, T; García Villalba, LJ; Alonso López, JA; Strand, M; Grov, G; Bikos, AN; Ramantas, K; Santos, R; Silva, F; Tsampieris, N;

Publication
Embedded Computer Systems: Architectures, Modeling, and Simulation - 23rd International Conference, SAMOS 2023, Samos, Greece, July 2-6, 2023, Proceedings

Abstract
The advent of 6G networks is anticipated to introduce a myriad of new technology enablers, including heterogeneous radio, RAN softwarization, multi-vendor deployments, and AI-driven network management, which is expected to broaden the existing threat landscape, demanding for more sophisticated security controls. At the same time, privacy forms a fundamental pillar in the EU development activities for 6G. This decentralized and globally connected environment necessitates robust privacy provisions that encompass all layers of the network stack. In this paper, we present PRIVATEER’s approach for enabling “privacy-first” security enablers for 6G networks. PRIVATEER aims to tackle four major privacy challenges associated with 6G security enablers, i.e., i) processing of infrastructure and network usage data, ii) security-aware orchestration, iii) infrastructure and service attestation and iv) cyber threat intelligence sharing. PRIVATEER addresses the above by introducing several innovations, including decentralised robust security analytics, privacy-aware techniques for network slicing and service orchestration and distributed infrastructure and service attestation mechanisms. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2023.

2023

On the Use of VGs for Feature Selection in Supervised Machine Learning - A Use Case to Detect Distributed DoS Attacks

Authors
Lopes, J; Partida, A; Pinto, P; Pinto, A;

Publication
Optimization, Learning Algorithms and Applications - Third International Conference, OL2A 2023, Ponta Delgada, Portugal, September 27-29, 2023, Revised Selected Papers, Part I

Abstract

  • 10
  • 192