2018
Authors
Carnaz, G; Nogueira, VB; Antunes, M; Fonseca Ferreira, NM;
Publication
Proceedings of the Tenth International Conference on Soft Computing and Pattern Recognition, SoCPaR 2018, Porto, Portugal, December 13-15, 2018
Abstract
Information Extraction (IE) and fusion are complex fields and have been useful in several domains to deal with heterogeneous data sources. Criminal police are challenged in forensics activities with the extraction, processing and interpretation of numerous documents from different types and with distinct formats (templates), such as narrative criminal reports, police databases and the result of OSINT activities, just to mention a few. Such challenges suggest, among others, to cope with and manually connect some hard to interpret meanings, such as license plates, addresses, names, slang and figures of speech. This paper aims to deal with forensic IE and fusion, thus a system was proposed to automatically extract, transform, clean, load and connect police reports that arrived from different sources. The same system aims to help police investigators to identify and correlate interesting extracted entities. © 2020, Springer Nature Switzerland AG.
2020
Authors
Costa, J; Silva, C; Antunes, M; Ribeiro, B;
Publication
NEURAL COMPUTING & APPLICATIONS
Abstract
Many text classification problems in social networks, and other contexts, are also dynamic problems, where concepts drift through time, and meaningful labels are dynamic. In Twitter-based applications in particular, ensembles are often applied to problems that fit this description, for example sentiment analysis or adapting to drifting circumstances. While it can be straightforward to request different classifiers' input on such ensembles, our goal is to boost dynamic ensembles by combining performance metrics as efficiently as possible. We present a twofold performance-based framework to classify incoming tweets based on recent tweets. On the one hand, individual ensemble classifiers' performance is paramount in defining their contribution to the ensemble. On the other hand, examples are actively selected based on their ability to effectively contribute to the performance in classifying drifting concepts. The main step of the algorithm uses different performance metrics to determine both each classifier strength in the ensemble and each example importance, and hence lifetime, in the learning process. We demonstrate, on a drifted benchmark dataset, that our framework drives the classification performance considerably up for it to make a difference in a variety of applications.
2019
Authors
Ribeiro, G; Grabovschi, M; Antunes, M; Frazao, L;
Publication
2019 14TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI)
Abstract
Each person carries digital devices that communicate with other person's devices and may transmit sensitive data. When the transmitted data is sensitive, it becomes necessary to implement secure mechanisms to hide the information and thus avoid it from being analyzed by third parties. This paper aims to present Ncryptr, a web-based application that allows its users to exchange encrypted instant messages in real time. Outside parties are unable to extract the contents of the messages exchanged between two or more users. Ncryptr allows its users to choose the type of encryption employed, being this a major distinction with others already existing instant messaging applications. The performance analysis is made by comparing the efficiency and latency time of different encryption methods, showing the pros and cons of using each one.
2019
Authors
Ferreira, J; Zhygulskyy, M; Antunes, M; Frazao, L;
Publication
2019 14TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI)
Abstract
The IoT (Internet of Things) is a network composed of several devices (things) connected to the Internet and to each other. IoT services are increasingly growing and are allowing companies to deploy scalable solutions with reduced costs and instantaneous data access. These solutions require seamless authentication, data privacy, security, robustness against attacks, easy deployment, and self- maintenance. Such requirements can be given to a company's IoT solution by applying blockchain technology. This paper analyzes the blockchain technology and the advantages and challenges behind its implementation in an IoT environment. A blockchain in IoT scenario was developed to evaluate the performance of different cryptographic hash functions in the IoT device RaspberryPi. Conclusions were drawn when it comes to the viability of some hash functions mainly based on the low resource characteristic shared by the IoT devices, which compromises the performance of the hash function.
2018
Authors
Cósta, J; Silva, C; Antunes, M; Ribeiro, B;
Publication
2018 International Joint Conference on Neural Networks, IJCNN 2018, Rio de Janeiro, Brazil, July 8-13, 2018
Abstract
2018
Authors
Antunes, M; Rabadão, C;
Publication
Proceedings of the Tenth International Conference on Soft Computing and Pattern Recognition, SoCPaR 2018, Porto, Portugal, December 13-15, 2018
Abstract
Individuals and companies have a feeling of insecurity in the Internet, as every day a reasonable amount of attacks take place against users’ privacy and confidentiality. The use of digital equipment in illicit and unlawful activities has increasing. Attorneys, criminal polices, layers and courts staff have to deal with crimes committed with digital “weapons”, whose evidences have to be examined and reported by applying digital forensics methods. Digital forensics is a recent and fast-growing area of study which needs more graduated professionals. This fact has leveraged higher education institutions to develop courses and curricula to accommodate digital forensics topics and skills in their curricular offers. This paper aims to present the development of a cybersecurity and digital forensics master course in Polytechnic of Leiria, a public higher education institution in Portugal. The authors depict the roadmap and the general milestones that lead to the development of the course. The strengths and opportunities are identified and the major students’ outcomes are pointed out. The way taken and the decisions made are also approached, with a view to understanding the performance obtained so far. © 2020, Springer Nature Switzerland AG.
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.