2024
Authors
Pinto, MA; Mendonca, MP; Babo, L; Queiros, R; Cruz, M; Mascarenhas, D;
Publication
EEITE 2024 - Proceedings of 2024 5th International Conference in Electronic Engineering, Information Technology and Education
Abstract
Higher Education Institutions (HEIs) are increasingly incorporating artificial i ntelligence (AI) into their learning setup. In this paper, we analyze the results of a survey posed to 152 Higher Education (HE) students and 136 HE educators, of different scientific b ackgrounds, to emphasize the current incorporation of AI in the teaching and learning processes. The results reveal distinct viewpoints from both parties, reflecting diversified l evels o f e xperience, presumptions, and uneasiness. Thirty two percent of the teachers, completing the survey, confirms using AI. Approximately 50% reveal they notice their students using AI to (i) automate routine tasks in or out-ofclass, including check correctness of answers, obtaining real-time feedback; (ii) personalize learning tasks, such as write essays or projects and to illustrate them, and create presentations. A smaller percentage reveals students using AI to produce video content and contrast information learned in class. Alternative means, encompassing using AI at home, to study, to gather information, to sum up ideas in texts, are identified by most teachers as being employed by their students. Students using AI outnumber the teachers, though there are significant d ifferences in some responses, when compared to the teachers' perceptions, for the sames questions. Most of the students prefer AI to study at home, to obtain information to improve or to check an answer. Then a significant number does not exploit AI either to create presentations, write an essay or project, illustrate a project, producing videos, or to contrast information obtained in classes with that collected by AI tools. Regardless of these differences, both parties agree and strongly agree (with 79% of students and 86% of teachers) that AI will affect the HEIs educational process in the future. © 2024 IEEE.
2024
Authors
Alves, S; Mackie, I;
Publication
DCM
Abstract
2024
Authors
Alves, S; Cockx, J;
Publication
TyDe@ICFP
Abstract
2024
Authors
Alves S.; Mackie I.;
Publication
Electronic Proceedings in Theoretical Computer Science Eptcs
Abstract
2024
Authors
Cirne, A; Sousa, PR; Resende, JS; Antunes, L;
Publication
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS
Abstract
With the proliferation of Internet of Things (IoT) devices, there is an increasing need to prioritize their security, especially in the context of identity and authentication mechanisms. However, IoT devices have unique limitations in terms of computational capabilities and susceptibility to hardware attacks, which pose significant challenges to establishing strong identity and authentication systems. Paradoxically, the very hardware constraints responsible for these challenges can also offer potential solutions. By incorporating hardware-based identity implementations, it is possible to overcome computational and energy limitations, while bolstering resistance against both hardware and software attacks. This research addresses these challenges by investigating the vulnerabilities and obstacles faced by identity and authentication systems in the IoT context, while also exploring potential technologies to address these issues. Each identified technology underwent meticulous investigation, considering known security attacks, implemented countermeasures, and an assessment of their pros and cons. Furthermore, an extensive literature survey was conducted to identify instances where these technologies have effectively supported device identity. The research also includes a demonstration that evaluates the effectiveness of hardware trust anchors in mitigating various attacks on IoT identity. This empirical evaluation provides valuable insights into the challenges developers encounter when implementing hardware-based identity solutions. Moreover, it underscores the substantial value of these solutions in terms of mitigating attacks and developing robust identity frameworks. By thoroughly examining vulnerabilities, exploring technologies, and conducting empirical evaluations, this research contributes to understanding and promoting the adoption of hardware-based identity and authentication systems in secure IoT environments. The findings emphasize the challenges faced by developers and highlight the significance of hardware trust anchors in enhancing security and facilitating effective identity solutions.
2024
Authors
Vilalonga, A; Resende, JS; Domingos, H;
Publication
2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023
Abstract
Anonymity networks like Tor significantly enhance online privacy but are vulnerable to correlation attacks by state-level adversaries. While covert channels encapsulated in media protocols, particularly WebRTC-based encapsulation, have demonstrated effectiveness against passive traffic correlation attacks, their resilience against active correlation attacks remains unexplored, and their compatibility with Tor has been limited. This paper introduces TorKameleon, a censorship evasion solution designed to protect Tor users from both passive and active correlation attacks. TorKameleon employs K-anonymization techniques to fragment and reroute traffic through multiple TorKameleon proxies, while also utilizing covert WebRTC-based channels or TLS tunnels to encapsulate user traffic.
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.