Cookies Policy
The website need some cookies and similar means to function. If you permit us, we will use those means to collect data on your visits for aggregated statistics to improve our service. Find out More
Accept Reject
  • Menu
Publications

2025

Let's Talk About It: Making Scientific Computational Reproducibility Easy

Authors
Costa, L; Barbosa, S; Cunha, J;

Publication
CoRR

Abstract

2025

A Risk Manager for Intrusion Tolerant Systems: Enhancing HAL 9000 With New Scoring and Data Sources

Authors
Freitas, T; Novo, C; Dutra, I; Soares, J; Correia, ME; Shariati, B; Martins, R;

Publication
Software: Practice and Experience

Abstract
ABSTRACTBackgroundIntrusion Tolerant Systems (ITS) aim to maintain system security despite adversarial presence by limiting the impact of successful attacks. Current ITS risk managers rely heavily on public databases like NVD and Exploit DB, which suffer from long delays in vulnerability evaluation, reducing system responsiveness.ObjectiveThis work extends the HAL 9000 Risk Manager to integrate additional real-time threat intelligence sources and employ machine learning techniques to automatically predict and reassess vulnerability risk scores, addressing limitations of existing solutions.MethodsA custom-built scraper collects diverse cybersecurity data from multiple Open Source Intelligence (OSINT) platforms, such as NVD, CVE, AlienVault OTX, and OSV. HAL 9000 uses machine learning models for CVE score prediction, vulnerability clustering through scalable algorithms, and reassessment incorporating exploit likelihood and patch availability to dynamically evaluate system configurations.ResultsIntegration of newly scraped data significantly enhances the risk management capabilities, enabling faster detection and mitigation of emerging vulnerabilities with improved resilience and security. Experiments show HAL 9000 provides lower risk and more resilient configurations compared to prior methods while maintaining scalability and automation.ConclusionsThe proposed enhancements position HAL 9000 as a next-generation autonomous Risk Manager capable of effectively incorporating diverse intelligence sources and machine learning to improve ITS security posture in dynamic threat environments. Future work includes expanding data sources, addressing misinformation risks, and real-world deployments.

2025

Predicting demand for new products in fashion retailing using censored data

Authors
Sousa, MS; Loureiro, ALD; Miguéis, VL;

Publication
EXPERT SYSTEMS WITH APPLICATIONS

Abstract
In today's highly competitive fashion retail market, it is crucial to have accurate demand forecasting systems, namely for new products. Many experts have used machine learning techniques to forecast product sales. However, sales that do not happen due to lack of product availability are often ignored, resulting in censored demand and service levels that are lower than expected. Motivated by the relevance of this issue, we developed a two-stage approach to forecast the demand for new products in the fashion retail industry. In the first stage, we compared four methods of transforming historical sales into historical demand for products already commercialized. Three methods used sales-weighted averages to estimate demand on the days with stock-outs, while the fourth method employed an Expectation-Maximization (EM) algorithm to account for potential substitute products affected by stock-outs of preferred products. We then evaluated the performance of these methods and selected the most accurate one for calculating the primary demand for these historical products. In the second stage, we predicted the demand for the products of the following collection using Random Forest, Deep Neural Networks, and Support Vector Regression algorithms. In addition, we applied a model that consisted of weighting the demands previously calculated for the products of past collections that were most similar to the new products. We validated the proposed methodology using a European fashion retailer case study. The results revealed that the method using the Expectation-Maximization algorithm had the highest potential, followed by the Random Forest algorithm. We believe that this approach will lead to more assertive and better-aligned decisions in production management.

2025

Agile Processes in Software Engineering and Extreme Programming - Workshops - XP 2024 Workshops, Bozen-Bolzano, Italy, June 4-7, 2024, Revised Selected Papers

Authors
Marchesi, L; Goldman, A; Lunesu, MI; Przybylek, A; Aguiar, A; Morgan, L; Wang, X; Pinna, A;

Publication
XP Workshops

Abstract

2025

A Dataset For Computational Reproducibility

Authors
Costa, L; Barbosa, S; Cunha, J;

Publication
CoRR

Abstract

2025

Multi-criteria placement and sizing of utility-scale grid forming converters

Authors
Fernandes, FS; Lopes, JP; Moreira, CL;

Publication
INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS

Abstract
This work proposes a robust methodology for the location and sizing of grid forming (GFM) converters that simultaneously considers the solution costs and the security gains while accounting for the TSO nonlinear cost-security sensitivity. Such methodology, which includes a collection of techniques to reduce the problem dimensionality, formulates the placement problem as a non-linear multi-criteria decision support problem and uses a solution-seeking algorithm based on Bayesian Optimisation to determine the solution. To ease comprehension, a modified version of the IEEE 39 Test System is used as a case study throughout the method's detailed explanation and application example. A sensitivity analysis of the GFM converter's over-current capacity in the solution of the formulated placement problem is also performed. The results show that the proposed method is successful in finding solutions with physical meaning and that respect the decision agent preferences.

  • 3
  • 4212