- Network Security and Intrusion Detection
- Smart Grid Security and Resilience
- Mobile Agent-Based Network Management
- Caching and Content Delivery
- Advanced Malware Detection Techniques
- Software-Defined Networks and 5G
- Peer-to-Peer Network Technologies
- Network Traffic and Congestion Control
- IoT and Edge/Fog Computing
- IPv6, Mobility, Handover, Networks, Security
- Service-Oriented Architecture and Web Services
- Digital and Cyber Forensics
- Cloud Computing and Resource Management
- Advanced Wireless Network Optimization
- Access Control and Trust
- Software System Performance and Reliability
- Information and Cyber Security
- Anomaly Detection Techniques and Applications
- Wireless Networks and Protocols
- Advanced MIMO Systems Optimization
- Internet Traffic Analysis and Secure E-voting
- Advanced Optical Network Technologies
- Physical Unclonable Functions (PUFs) and Hardware Security
- Cloud Computing and Remote Desktop Technologies
- Digital Transformation in Industry
University of Coimbra
2016-2025
Universidade Federal do Ceará
2022
Força Aérea Portuguesa
2021
Portuguese Air Force Academy
2021
Institute of Electrical and Electronics Engineers
2018
Regional Municipality of Niagara
2018
IEEE Computer Society
2018
Instituto Superior de Gestão
2015
Technical University of Darmstadt
2013
Nokia (Finland)
2013
This paper presents a distributed intrusion detection system (DIDS) for supervisory control and data acquisition (SCADA) industrial systems, which was developed the CockpitCI project. Its architecture designed to address specific characteristics requirements SCADA cybersecurity that cannot be adequately fulfilled by techniques from information technology world, thus requiring domain-specific approach. DIDS components are described in terms of their functionality, operation, integration,...
Computing and networking systems traditionally record their activity in log files, which have been used for multiple purposes, such as troubleshooting, accounting, post-incident analysis of security breaches, capacity planning anomaly detection. In earlier those files were processed manually by system administrators, or with the support basic applications filtering, compiling pre-processing logs specific purposes. However, volume these continues to grow (more per system, more domain), it is...
Electrical grids generate, transport, distribute and deliver electrical power to consumers through a complex Critical Infrastructure which progressively shifted from an air-gaped connected architecture. Specifically, Smart Substations are important parts of Grids, providing switching, transforming, monitoring, metering protection functions offer safe, efficient reliable distribution consumers. The evolution was closely followed by the digitization all its improvements in communication...
Contemporary societies are increasingly dependent on products and services provided by Critical Infrastructure (CI) such as power plants, energy distribution networks, transportation systems manufacturing facilities. Due to their nature, size complexity, CIs often supported Industrial Automation Control Systems (IACS), which in charge of managing assets controlling everyday operations. As these IACS become larger more complex, encompassing a growing number processes interconnected monitoring...
The broadening dependency and reliance that modern societies have on essential services provided by Critical Infrastructures is increasing the relevance of their trustworthiness. However, are attractive targets for cyberattacks, due to potential considerable impact, not just at economic level but also in terms physical damage even loss human life. Complementing traditional security mechanisms, forensics compliance audit processes play an important role ensuring Infrastructure Compliance...
Programmable Logic Controller (PLC) technology plays an important role in the automation architectures of several critical infrastructures such as Industrial Control Systems (ICS), controlling equipment contexts chemical processes, factory lines, power production plants or distribution grids, just to mention a few examples. Despite their importance, PLCs constitute one weakest links ICS security, frequently due reasons absence secure communication mechanisms, authenticated access system...
Building Automation and Control Systems (BACS) designate the mechanisms that are used to automate buildings’ operations such as climate control, lightning access control. As such, traditional BACS encompass extensively automated buildings managed in an integrated manner, with support of Supervisory Data Acquisition (SCADA) systems specialized industry standards BACnet KNX. More recently, increasing adoption IP-connected, IoT-like devices for automating single tasks led a substantial increase...
Building Automation and Control Systems (BACS) are traditionally based on specialized communications protocols, such as KNX or BACnet, dedicated sensing actuating devices. Despite the increased awareness about security risks associated with BACS, there is a lack of tools for protecting this special breed cyber-physical systems. This further aggravated by fact that general-purpose typically not able to cope specific requirements technologies making it necessary devise domain-specific...
Modern programmable logic controllers (PLCs) are pervasive components in industrial control systems (ICSs) such as supervisory and data acquisition, designed to processes autonomously or part of a distributed system topology. Its success may be explained by its robustness reliability, being one the most enduring legacies on modern ICS, despite having evolved very little over last years. This letter proposes an x86-based virtual PLC (vPLC) architecture that decouples capabilities from I/O...
This paper illustrates the activities under development within FP7 EU MICIE project. The project is devoted to design and implement an on-line alerting system, able evaluate, in real time, level of risk interdependent Critical Infrastructures (CIs). Such a generated by undesired events high interconnection different infrastructures. Heterogeneous models are perform short term predictions Quality Service (QoS) each CI according QoS others, interdependency among Infrastructures, identified...
The evolution of Software-Defined Networking and the overall acceptance protocols such as OpenFlow, demonstrates added value decoupling data plane from control plane. Existing SDN Controllers enable expected flexibility networks by dynamically providing a fine-grained each flow. However, hardware-specific configurations, creation queues or other mechanisms is out scope these controllers. This work presents an extension to well known OpenFlow controller (Floodlight) efficiently handle...
Industrial Control Systems (ICS) are getting more vulnerable as they become increasingly interconnected with other systems. Internet of Things(IIoT) will bring new opportunities to business and society, along threats security risks. One major change that ICS face be
With the emergence of Industry 4.0 paradigm, there is a need to introduce significant degree flexibility, security and resilience in automation infrastructures, while keeping up with real-time requirements that are characteristic such domains. Interestingly, many these driving principles same encouraged adoption virtualization technologies on IT domain, somehow suggesting benefits could be realisable for Industrial Automation Control Systems, allowing virtualise servers cyber–physical system...
The railway infrastructure constitutes a type of operational technology (OT)-based critical infrastructure, which is expected to work 24x7, 365 days year, and where the life expectancy equipment often exceeds 30 years. In this domain, an anomaly compromising OT system can cause train accident or interrupt traffic, with potentially significant impact in terms business as well for passenger safety. Due their relevance, railways are strategic assets national interest and, consequently, targets...