José Ribeiro

ORCID: 0000-0002-6526-7334
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • IoT and Edge/Fog Computing
  • Power Line Communications and Noise
  • Wireless Communication Networks Research
  • IPv6, Mobility, Handover, Networks, Security
  • Blockchain Technology Applications and Security
  • Advanced Wireless Network Optimization
  • Millimeter-Wave Propagation and Modeling
  • Microwave Engineering and Waveguides
  • Wireless Networks and Protocols
  • Energy Harvesting in Wireless Networks
  • Molecular Communication and Nanonetworks
  • Cryptographic Implementations and Security
  • Cloud Data Security Solutions
  • Anomaly Detection Techniques and Applications
  • Cognitive Radio Networks and Spectrum Sensing
  • Internet Traffic Analysis and Secure E-voting
  • Advanced MIMO Systems Optimization
  • User Authentication and Security Systems
  • Digital and Cyber Forensics
  • Privacy, Security, and Data Protection
  • Satellite Communication Systems
  • Breast Implant and Reconstruction
  • Nutrition, Health, and Society Studies

Instituto de Telecomunicações
2012-2024

Hospital de São José
2024

Molecular Networks (Germany)
2023

Hospital de Câncer de Barretos
2020

Hospital São Paulo
2020

University of Bradford
2020

Altice Portugal (Portugal)
2015

Universidade Federal da Bahia
2012

Instituto Politécnico Nacional
2009-2012

Ambiente Italia (Italy)
2012

Over the past few years, healthcare sector is being transformed due to rise of Internet Things (IoT) and introduction Medical (IoMT) technology, whose purpose improvement patient’s quality life. Nevertheless, heterogenous resource-constrained characteristics IoMT networks make them vulnerable a wide range threats. Thus, novel security mechanisms, such as accurate efficient anomaly-based intrusion detection systems (AIDSs), considering inherent limitations networks, need be developed before...

10.3390/electronics10212562 article EN Electronics 2021-10-20

Previous research efforts on developing an Intrusion Detection and Prevention Systems (IDPS) for Android mobile devices rely mostly centralized data collection processing a cloud server. However, this trend is characterized by two major limitations. First, it requires continuous connection between monitored the server, which might be infeasible, due to network's outage or partial coverage. Second, increases risk of sensitive information leakage violation user's privacy. To help alleviate...

10.1109/access.2020.2969626 article EN cc-by IEEE Access 2020-01-01

Over the past few years, we have witnessed emergence of Internet Things (IoT) and Industrial IoT networks that bring significant benefits to citizens, society, industry. However, their heterogeneous resource-constrained nature makes them vulnerable a wide range threats. Therefore, there is an urgent need for novel security mechanisms such as accurate efficient anomaly-based intrusion detection systems (AIDSs) be developed before these reach full potential. Nevertheless, lack up-to-date,...

10.3390/s21041528 article EN cc-by Sensors 2021-02-23

The fourth industrial revolution (Industry 4.0) is transforming the next generation of supply chain by making it more agile and efficient compared with traditional chain. However, data communication across partners in Industry 4.0 can be target a wide spectrum attackers exploiting security breaches internal/external environment due to its heterogeneous dynamic nature as well fact that non-professional users issues usually operate their information systems. Attackers compromise between...

10.1109/access.2019.2914454 article EN cc-by-nc-nd IEEE Access 2019-01-01

Although blockchain is a promising technology that can bring significant benefits into current centralized IoT-based health monitoring systems in order to address security challenges, the resource-constrained IoT devices of these cannot afford complex and heavyweight operations due their limited processing power, storage capacity, battery life. Therefore, this paper, we propose Hyperledger Fabric-based architecture to: i) enhance systems, ii) achieve better handling capacity sensors...

10.1109/meditcom49071.2021.9647521 article EN 2021-09-07

The new IEEE 802.21 standard specifies link layer intelligence and other related network information to upper layers in order optimize handovers between networks of different types, such as WiMAX, Wi-Fi, 3GPP. This paper makes a short description standard, how it is implemented ns-2, the signaling used handover WiMAX Wi-Fi. also proposes novel very simple approach determine expected number an ns-2 simulation evaluates reliability scalability when simulating scenarios with multiple nodes.

10.1155/2010/794749 article EN cc-by Journal of Computer Systems Networks and Communications 2010-01-01

Smart grid introduces a wealth of promising applications for upcoming fifth-generation mobile networks (5G), enabling households and utility companies to establish two-way digital communications dialogue, which can benefit both them. The monitor real-time consumption end users take proper measures (e.g., pricing) shape their profile or plan enough supply meet the foreseen demand. On other hand, smart home receive electricity prices adjust its minimize daily expenditure, while meeting energy...

10.1109/iwcmc.2017.7986273 article EN 2017-06-01

The Internet of Medical Things (IoMT) has risen significantly in recent years and provided better quality life by enabling IoMT-based health monitoring systems. Despite that fact, innovative security mechanisms are required to meet the concerns such systems effectively efficiently. Additionally, industry research community have anticipated blockchain technology will be a disruptive able integrated into solutions for IoMT networks since it potential play big role in: (a) secure data...

10.3390/fi15090308 article EN cc-by Future Internet 2023-09-11

Internet of Medical Things (IoMT) have improved individuals' quality life by enabling IoMT-based healthcare monitoring systems to grow dramatically in recent years. Therefore, cutting-edge security techniques are needed address the risks IoMT networks effectively and a timely manner. On other hand, blockchain technology has potential play significant role both securing devices preventing unauthorized access during data transmission it been anticipated industry research community be...

10.23919/ifipnetworking57963.2023.10186443 article EN 2023-06-12

This article describes an experimental testbed that combines wireless microphone sensors with a web-based terrestrial digital video broadcasting geolocation database and program making special events spectrumbooking platform. Software defined radio Internet technologies are the enabling tools in use. The key sensing techniques identified implemented. Test trials real scenario have shown platform was able to receive information from DVB-T PMSE spectrum-booking platform, updating list of...

10.1109/mwc.2012.6272424 article EN IEEE Wireless Communications 2012-08-01

TV White Spaces (TVWS) technology allows wireless devices to opportunistically use locally-available channels enabled by a geolocation database. The UK regulator Ofcom has initiated pilot of TVWS in the UK. This paper concerns large- scale series trials under that pilot. purposes are test aspects white space technology, including device and database interactions, validity channel availability/powers calculations associated interference effects on primary services, performances devices, among...

10.1109/vtcspring.2015.7146093 article EN 2015-05-01

In the dawn of 5G era, advances in mobile communications have created a suitable environment for emergence wide spectrum Smart City applications that will play significant role towards improvement citizens' life quality upcoming years. It is expected allow citizens to access numerous and diverse services, provided by third-party Service Providers, through their devices (e.g., smartphones). However, order emerging gain trust all involved stakeholders reach full potential market, many security...

10.1109/camad52502.2021.9617809 article EN 2021-10-01

The growing presence of concurrent heterogeneous wireless access networks, together with the increasing service demands from end-users, require re-thinking current selection polices and appropriate management mechanisms, namely concerning quality service, energy efficiency, etc. recent IEEE 802.21 standard introduces link layer intelligence as well related network information to upper layers in order optimise handovers between networks different technologies, such WiMAX, Wi-Fi 3GPP. With...

10.1049/iet-com.2011.0811 article EN IET Communications 2012-09-25

The rise of the Internet Things (IoT) and Industrial IoT (IIoT), over past few years, has been beneficial for citizens, societies industry. However, their resource-constrained heterogenous nature renders them vulnerable to a wide range threats. Therefore, novel security mechanisms, such as accurate efficient anomaly-based intrusion detection systems (AIDSs), are required be developed before IoT/IIoT networks reach full potential in market. there is lack up-to-date, representative...

10.1109/camad52502.2021.9617799 article EN 2021-10-01

Over the past few years, Internet of Things (IoT) is transforming healthcare sector through introduction Medical (IoMT) technology, whose purpose improvement patient's quality life. Nevertheless, IoMT networks are still vulnerable to a wide range threats because their heterogeneity and resource-constrained characteristics. Thus, novel security mechanisms, such as accurate efficient anomaly-based intrusion detection systems (AIDSs), taking into consideration inherent limitations networks,...

10.1109/camad55695.2022.9966912 article EN 2022-11-02

This paper presents a characterization of spectrum opportunities in GSM900 downlink bands, for fixed and mobile scenarios. A testbed to analyze coexistence between the licensed system an OFDM based secondary that opportunistically shares same is presented. Coexistence analysis on metrics such as collisions rate throughput. Using this cognitive mechanism classify select stable evaluated realistic

10.1109/vetecs.2009.5073448 article EN 2009-04-01

This paper describes a new security framework that will leverage the in cognitive radio cooperative protocols. The architecture uses 802.1X access control mechanism and is supported by Key Distribution Center (KDC) built upon an Authentication Server. KDC used, together with terminal identification policy modified DHCP servers, to provide proper resource allocation message authentication transactions. also used authenticate mappings between layer 2 3 addresses (ARP protocol) distribute...

10.1109/pimrc.2009.5449952 article EN 2009-09-01
Coming Soon ...