- Privacy, Security, and Data Protection
- Privacy-Preserving Technologies in Data
- IoT and Edge/Fog Computing
- Wood Treatment and Properties
- Advanced Malware Detection Techniques
- Blockchain Technology Applications and Security
- Emotion and Mood Recognition
- Internet Traffic Analysis and Secure E-voting
- Cloud Data Security Solutions
- Caching and Content Delivery
- IoT-based Smart Home Systems
- Energy Efficient Wireless Sensor Networks
- Pain Mechanisms and Treatments
- Masonry and Concrete Structural Analysis
- Green IT and Sustainability
- Data Stream Mining Techniques
- Water Quality Monitoring Technologies
- Bamboo properties and applications
- Data Quality and Management
- Security in Wireless Sensor Networks
- Elevator Systems and Control
- Mobile Health and mHealth Applications
- Human Mobility and Location-Based Analysis
- Smart Agriculture and AI
- Innovative concrete reinforcement materials
University of Aveiro
2006-2025
Instituto de Telecomunicações
2021-2025
University of Coimbra
2023-2024
University of Minho
2011-2021
Instituto Politécnico de Leiria
2011
Assessing privacy within data-driven software is challenging due to its subjective nature and the diverse array of privacy-enhancing technologies. A simplistic personal/non-personal data classification fails capture nuances specifications potential vulnerabilities. Robust, privacy-focused categorization vital for a deeper understanding characteristics evaluation risks. We introduce framework Privacy-sensitive Data Categorization (PsDC), which accounts inference from multiple sources...
Abstract The advances on recent communication paradigms brings new security and privacy challenges, mainly about personal data collection by smart devices. Resource constrained devices face serious issues to run complex cryptographic algorithms. Trying evaluate the performance impact of those algorithms in usual common used homes, this paper we tested different low computational devices, typically applied testing configurations using two most transport protocols (HTTP MQTT). experiment...
This paper proposes using reinforcement learning (RL) to schedule maintenance tasks, which can significantly reduce direct operating costs for airlines. The approach consists of a static algorithm long-term scheduling and an adaptive rescheduling based on new information. To assess the performance both approaches, three key indicators (KPIs) are defined: Ground Time, representing hours aircraft spends ground; Time Slack, measuring proximity tasks their due dates; Change Score, quantifying...
Aiming at the rehabilitation of a timber warehouse in Tua train station for new use, it was necessary to assess level conservation building's elements and determine whether intervention measures were required. This work summarizes assessment made by means visual inspection non-destructive testing. The main results, obtained diagnostic survey, warehouse, strength grading damage maps indicating pathologies its probable causes.
Up until recently, a physical SIM card was mandatory to make calls, send messages, and access the Internet using hardware modems, but has some limitations, especially when it is used within IoT devices deployed in wide area. eSIM an embedded alternative of traditional cards, providing same usability, privacy, security, also minimizing disadvantages card. In this work, we explore usability on vertical 5G that can benefit from adopting eSIM. We start by presenting overview eSIM, discuss its...
The management of smart devices in IoT environments can benefit from the flexibility offered by delegation-based authorization. Dynamic delegation improves system making process more efficient and autonomous. Privacy preservation that kind scenario has, however, serious problems. This paper proposes an architecture based on authorization to dynamic D2D delegation. A proof concept demonstrates how a device delegate its permissions another with same abilities when it is required. Moreover,...
Data has become paramount in modern agriculture industry, empowering precision farming practices, optimizing resource utilization, facilitating predictive analytics, and driving automation. However, the quality of data influences usefulness smart systems. Poor specifically annotations include mislabeling, inaccuracy, incompleteness, irrelevance, inconsistency, duplication, overlap. These limitations often emerge from specific constraints, or small scale problem/limited number stakeholders,...
The proliferation of mobile applications and the subsequent sharing personal data with service application providers have given rise to substantial privacy concerns. Application marketplaces introduced mechanisms conform regulations provide individuals control over their data. However, a notable absence persists regarding clear indications, labels or scores elucidating implications these applications. In response this challenge, paper introduces quantification framework. purpose framework is...
The increasing use of smart devices for monitoring spaces has caused an increase in concerns about the privacy users these spaces. Given this problem, legislation on right to been worked ensure that existing laws subject are sufficiently comprehensive preserve users. In way, research topic evolves sense creating systems compliance with laws, is, transparency treatment user data. paper, we propose a demonstrator-based strategy provide control over their stored data during temporary...
The Internet of Things (IoT) is a growing research field and one today's prime examples Wireless Sensor Networks (WSN) applicability possible impact on general society. IoT scenarios use great diversity sensors, protocols, mechanisms widely researched from system perspective. Unfortunately, the security within small sensing devices those sensors choosing cryptographic solution over other still lacking further research. In this paper, we tested different configurations using two most used...
Modern technologies are improving the way how human beings monitor surrounding environment and, in fact, their own health conditions. This paper proposes an innovative user-centric framework to quantify privacy level offered by medical awareness devices. Trying address well-known issue about personal data collection without user understanding real risks, a quantification based on: preferences (users have right decide privacy); context (scenario and system analysis); policy analysis. By...
We focus on a scenario that we call SmartBnB: smart homes rich in devices are rented for short period of time such as holidays. Such frequent rotation different users raises two types mutually dependent challenges. First, have permissioning challenge since commonly designed with single user mind; yet, given our shared scenario, need to grant the necessary, yet minimum, access and just duration stay. Secondly, privacy challenges arise externally managed nature (e.g., cloud). Other exist lack...