Catarina Silva

ORCID: 0000-0002-7969-8813
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Privacy, Security, and Data Protection
  • Privacy-Preserving Technologies in Data
  • IoT and Edge/Fog Computing
  • Wood Treatment and Properties
  • Advanced Malware Detection Techniques
  • Blockchain Technology Applications and Security
  • Emotion and Mood Recognition
  • Internet Traffic Analysis and Secure E-voting
  • Cloud Data Security Solutions
  • Caching and Content Delivery
  • IoT-based Smart Home Systems
  • Energy Efficient Wireless Sensor Networks
  • Pain Mechanisms and Treatments
  • Masonry and Concrete Structural Analysis
  • Green IT and Sustainability
  • Data Stream Mining Techniques
  • Water Quality Monitoring Technologies
  • Bamboo properties and applications
  • Data Quality and Management
  • Security in Wireless Sensor Networks
  • Elevator Systems and Control
  • Mobile Health and mHealth Applications
  • Human Mobility and Location-Based Analysis
  • Smart Agriculture and AI
  • Innovative concrete reinforcement materials

University of Aveiro
2006-2025

Instituto de Telecomunicações
2021-2025

University of Coimbra
2023-2024

University of Minho
2011-2021

Instituto Politécnico de Leiria
2011

Assessing privacy within data-driven software is challenging due to its subjective nature and the diverse array of privacy-enhancing technologies. A simplistic personal/non-personal data classification fails capture nuances specifications potential vulnerabilities. Robust, privacy-focused categorization vital for a deeper understanding characteristics evaluation risks. We introduce framework Privacy-sensitive Data Categorization (PsDC), which accounts inference from multiple sources...

10.3390/info16030185 article EN cc-by Information 2025-02-28

Abstract The advances on recent communication paradigms brings new security and privacy challenges, mainly about personal data collection by smart devices. Resource constrained devices face serious issues to run complex cryptographic algorithms. Trying evaluate the performance impact of those algorithms in usual common used homes, this paper we tested different low computational devices, typically applied testing configurations using two most transport protocols (HTTP MQTT). experiment...

10.1007/s10796-023-10383-9 article EN cc-by Information Systems Frontiers 2023-05-05

This paper proposes using reinforcement learning (RL) to schedule maintenance tasks, which can significantly reduce direct operating costs for airlines. The approach consists of a static algorithm long-term scheduling and an adaptive rescheduling based on new information. To assess the performance both approaches, three key indicators (KPIs) are defined: Ground Time, representing hours aircraft spends ground; Time Slack, measuring proximity tasks their due dates; Change Score, quantifying...

10.1038/s41598-023-41169-3 article EN cc-by Scientific Reports 2023-10-03

Aiming at the rehabilitation of a timber warehouse in Tua train station for new use, it was necessary to assess level conservation building's elements and determine whether intervention measures were required. This work summarizes assessment made by means visual inspection non-destructive testing. The main results, obtained diagnostic survey, warehouse, strength grading damage maps indicating pathologies its probable causes.

10.1080/20426445.2016.1273641 article EN cc-by International Wood Products Journal 2017-01-22

Up until recently, a physical SIM card was mandatory to make calls, send messages, and access the Internet using hardware modems, but has some limitations, especially when it is used within IoT devices deployed in wide area. eSIM an embedded alternative of traditional cards, providing same usability, privacy, security, also minimizing disadvantages card. In this work, we explore usability on vertical 5G that can benefit from adopting eSIM. We start by presenting overview eSIM, discuss its...

10.1109/ficloud49777.2021.00038 article EN 2021-08-01

The management of smart devices in IoT environments can benefit from the flexibility offered by delegation-based authorization. Dynamic delegation improves system making process more efficient and autonomous. Privacy preservation that kind scenario has, however, serious problems. This paper proposes an architecture based on authorization to dynamic D2D delegation. A proof concept demonstrates how a device delegate its permissions another with same abilities when it is required. Moreover,...

10.1109/ficloud57274.2022.00014 article EN 2022-08-01

Data has become paramount in modern agriculture industry, empowering precision farming practices, optimizing resource utilization, facilitating predictive analytics, and driving automation. However, the quality of data influences usefulness smart systems. Poor specifically annotations include mislabeling, inaccuracy, incompleteness, irrelevance, inconsistency, duplication, overlap. These limitations often emerge from specific constraints, or small scale problem/limited number stakeholders,...

10.1080/21693277.2024.2377253 article EN cc-by Production & Manufacturing Research 2024-07-10

The proliferation of mobile applications and the subsequent sharing personal data with service application providers have given rise to substantial privacy concerns. Application marketplaces introduced mechanisms conform regulations provide individuals control over their data. However, a notable absence persists regarding clear indications, labels or scores elucidating implications these applications. In response this challenge, paper introduces quantification framework. purpose framework is...

10.48550/arxiv.2311.00066 preprint EN cc-by arXiv (Cornell University) 2023-01-01

The increasing use of smart devices for monitoring spaces has caused an increase in concerns about the privacy users these spaces. Given this problem, legislation on right to been worked ensure that existing laws subject are sufficiently comprehensive preserve users. In way, research topic evolves sense creating systems compliance with laws, is, transparency treatment user data. paper, we propose a demonstrator-based strategy provide control over their stored data during temporary...

10.1109/csndsp54353.2022.9907895 article EN 2022 13th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP) 2022-07-20

The Internet of Things (IoT) is a growing research field and one today's prime examples Wireless Sensor Networks (WSN) applicability possible impact on general society. IoT scenarios use great diversity sensors, protocols, mechanisms widely researched from system perspective. Unfortunately, the security within small sensing devices those sensors choosing cryptographic solution over other still lacking further research. In this paper, we tested different configurations using two most used...

10.1109/ficloud49777.2021.00040 article EN 2021-08-01

Modern technologies are improving the way how human beings monitor surrounding environment and, in fact, their own health conditions. This paper proposes an innovative user-centric framework to quantify privacy level offered by medical awareness devices. Trying address well-known issue about personal data collection without user understanding real risks, a quantification based on: preferences (users have right decide privacy); context (scenario and system analysis); policy analysis. By...

10.1109/ficloud58648.2023.00017 article EN 2023-08-14

We focus on a scenario that we call SmartBnB: smart homes rich in devices are rented for short period of time such as holidays. Such frequent rotation different users raises two types mutually dependent challenges. First, have permissioning challenge since commonly designed with single user mind; yet, given our shared scenario, need to grant the necessary, yet minimum, access and just duration stay. Secondly, privacy challenges arise externally managed nature (e.g., cloud). Other exist lack...

10.1109/wf-iot58464.2023.10539421 article EN 2023-10-12
Coming Soon ...