Cookies Policy
The website need some cookies and similar means to function. If you permit us, we will use those means to collect data on your visits for aggregated statistics to improve our service. Find out More
Accept Reject
  • Menu
Publications

2025

Next Higher Point: Two Novel Approaches for Computing Natural Visibility Graphs

Authors
Daniel, P; Silva, VF; Ribeiro, P;

Publication
COMPLEX NETWORKS & THEIR APPLICATIONS XIII, COMPLEX NETWORKS 2024, VOL 1

Abstract
With the huge amount of data that has been collected over time, many methods are being developed to allow better understanding and forecasting in several domains. Time series analysis is a powerful tool to achieve this goal. Despite being a well-established area, there are some gaps, and new methods are emerging to overcome these limitations, such as visibility graphs. Visibility graphs allow the analyses of times series as complex networks and make possible the use of more advanced techniques from another well-established area, network science. In this paper, we present two new efficient approaches for computing natural visibility graphs from times series, one for online scenarios in.O(n log n) and the other for offline scenarios in.O(nm), the latter taking advantage of the number of different values in the time series (m).

2025

A Review of Voicing Decision in Whispered Speech: From Rules to Machine Learning

Authors
da Silva, JMPP; Duarte Nunes, G; Ferreira, A;

Publication

Abstract

2025

WordPress Architecture Modernization Projects

Authors
Ferreira, D; Pereira, T; Mendes, I; Amaral, A;

Publication
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST

Abstract
Technological evolution is very present in today’s world. The Internet of Everything (IoE) is one of the next steps in this evolution. WordPress is a website-building tool that is used today to its minimum capability. The main problem is how to make WordPress customizable and reliable to support device networking and communication. This can be done by implementing a new architecture that supports WordPress as a powerful tool, allowing for scalability and maintenance. The adoption of a recent trend known as DevOps is an important step in creating and developing a strong website and ensuring its integration with multiple devices. It emphasizes continuous testing, delivery, and integration. This article is based on a literature review to justify using micro-services architecture and the DevOps approach to build a reliable and robust working tool in WordPress that can be part of the IoE. © ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2025.

2025

Academic Mobility as a Service (AMaaS) Cybersecurity Challenges

Authors
Barreto, L; Amaral, A; Pereira, T; Baltazar, S;

Publication
Lecture Notes in Intelligent Transportation and Infrastructure

Abstract
The current era where living demands an accelerated digital transition mainly focused on encouraging a smarter, healthier, and more sustainable mobility, in all its dimensions – a must concern for the young generations. The convergence through several digital services and APP can be an attitudes and perception changer within the group of academic mobility users’, promoting a more sustainable and better mobility choices that impact on the academic user’s mobility routines. Thus, encouraging a global shift to shared and active mobility services and systems bringing significant contributions to environmental sustainability and, also, to users’ health. The Academic Mobility as a Service (AMaaS) provide a digital service with mobility alternatives to support the academic population geographically located in different faculty campuses and Higher Education Institutions (HEI). The AMaaS applied to a restrict group is helpful to test innovative transport solutions and its high cybersecurity vulnerabilities. Despite the shortage of AMaaS case studies and the lack of security reference, it is imperative that a cybersecurity by design is planned and included in AMaaS design. In this paper AMaaS critical cybersecurity challenges, and potential risks are discussed and AMaaS Security by Design framework is described. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2025.

2025

Assessing the information security posture of online public services worldwide: Technical insights, trends, and policy implications?

Authors
Ribeiro, D; Fonte, V; Ramos, LF; Silva, M;

Publication
GOVERNMENT INFORMATION QUARTERLY

Abstract
The fast global expansion of online public services has transformed how governments interact with citizens, offering convenience and efficiency. However, this digital transformation also introduces significant security risks, as sensitive data exchanged between users and service providers over public networks are exposed to cyber threats. Thus, ensuring the security and trustworthiness of these services is critical to the success of Electronic Government (EGOV) initiatives. This study evaluates the information security posture of 3068 public service platforms across all 193 UN Member States through non-intrusive assessments conducted in 2023 and 2024. The evaluation focuses on three key dimensions: (i) the adoption of secure end-to-end communication protocols, (ii) the trustworthiness of digital certificate chains, and (iii) the exposure of hosting servers to known vulnerabilities. The findings reveal that while some progress has been made in securing online public services, substantial gaps remain in the implementation of international security standards and best practices. Many platforms continue to rely on outdated cryptographic protocols, misconfigured certificates, and unpatched vulnerabilities, leaving citizens and services vulnerable to cyber threats due to weaknesses that malicious actors can easily and inconspicuously identify. These insights emphasize the need for effective implementation of more comprehensive cybersecurity policies, proactive security assessments, and improved regulatory compliance checks. Additionally, this work provides actionable guidance for governments and system administrators to enhance the security of EGOV infrastructures by addressing persistent vulnerabilities and adopting robust cybersecurity practices.

2025

Interpretable Rules for Online Failure Prediction: A Case Study on the Metro do Porto dataset

Authors
Jakobs, M; Veloso, B; Gama, J;

Publication
CoRR

Abstract

  • 38
  • 4180