- Security and Verification in Computing
- Cloud Data Security Solutions
- Cryptography and Data Security
- Digital and Cyber Forensics
- Advanced Malware Detection Techniques
- IoT and Edge/Fog Computing
- Fire effects on ecosystems
- Seedling growth and survival studies
- Chaos-based Image/Signal Encryption
- User Authentication and Security Systems
- Biocrusts and Microbial Ecology
- Aeolian processes and effects
- Diamond and Carbon-based Materials Research
- Big Data and Business Intelligence
- Privacy-Preserving Technologies in Data
- Tree-ring climate responses
- Vehicular Ad Hoc Networks (VANETs)
- Distributed systems and fault tolerance
- Cryptographic Implementations and Security
- Algal biology and biofuel production
- Forest ecology and management
- Autonomous Vehicle Technology and Safety
- Slime Mold and Myxomycetes Research
- Software Testing and Debugging Techniques
- Innovation in Digital Healthcare Systems
Universidade Federal do Piauí
2024
Universidade Federal de Alagoas
2023
University of Lisbon
2011-2021
University of Luxembourg
2016-2017
Newcastle University
2013-2015
Carnegie Mellon University
2011
Cloud Computing is a recent paradigm that creating high expectations about benefits such as the pay-per-use model and elasticity of resources. However, with this optimism come also concerns security. In public cloud, user's data storage processing no longer done inside its premises, but in centers owned administrated by cloud provider. This may be concern for organizations deal critical data, medical records. We show malicious insider can steal confidential user, so user mostly left trusting...
Semi-autonomous driver assists are already widely deployed and fully autonomous cars progressively leaving the realm of laboratories. This evolution coexists with a progressive connectivity cooperation, creating important safety security challenges, latter ranging from casual hackers to highly-skilled attackers, requiring holistic analysis, under perspective fully-fledged ecosystems cooperative vehicles. position paper attempts at contributing better understanding global threat plane...
Soil salinization poses an important threat to terrestrial ecosystems and is expected increase as a consequence of climate change anthropogenic pressures. Conventional methods such salt-leaching or application soil amendments, nature-based solutions (NBSs) phytoremediation, have been widely adopted with contrasting results. The use cyanobacteria for improving conditions has emerged novel biotechnological tool ecosystem restoration due the unique features these organisms, e.g., ability fix...
The boundary between the trusted inside and untrusted outside blurs when a company adopts cloud computing. organization's applications-and data-are no longer onsite, fundamentally changing definition of malicious insider.
A critical challenge in cloud computing is assuring confidentiality and integrity for the execution of arbitrary software a consumer's virtual machine. The problem arises from having multiple machines sharing hardware resources same physical host. security resource random access memory, which current version Xen hyper visor vulnerable to attacks. Like previous work demonstrated, this vulnerability originates adopting avery permissive memory model its management machine (Dom0). assumes it...
Post‐fire environmental conditions can heavily influence the natural regeneration of pine species in Mediterranean forests. Therefore, enhancing post‐fire recovery is fundamental for effective ecological restoration In this study, effects a treatment on seedling emergence and survival Spanish black ( Pinus nigra Arn. ssp. salzmannii ) were investigated under consisting manual cut burnt tree canopies placed soil surface with their branches, following contour lines (contour‐felled log debris,...
Cloud computing offers computational resources such as processing, networking, and storage to customers. However, the cloud also brings with it security concerns which affect both consumers providers. The Security Alliance (CSA) define seven main threats. This paper investigates how threat number one (malicious activities performed in consumers' virtual machines/VMs) can of It proposes logging solutions mitigate risks associated this threat. We systematically design implement a prototype...
Intel SGX is the latest processor architecture promising secure code execution despite large, complex and hence potentially vulnerable legacy operating systems (OSs). However, two recent works identified vulnerabilities that allow an untrusted management OS to extract secret information from SGX's enclaves, violate their integrity by exploiting concurrency bugs. In this work, we re-investigate delayed preemption (DP) in context of SGX. DP a mechanism originally proposed for L4-family...
Abstract Key Message The first bottleneck in Spanish black pine survival through afforestation is the lack of resistance to drought their initial life stages. ( Pinus nigra Arn ssp . salzmannii ) most widely distributed species mountain areas Mediterranean Basin and commonly used for endangered degraded areas. Despite its importance, little known regarding factors driving seedling this species, which may hamper success In study, we assessed effects seed origin plantation site along a natural...
The world is becoming an immense critical information infrastructure, with the fast and increasing entanglement of utilities, telecommunications, Internet, cloud, emerging IoT tissue. This may create enormous opportunities, but also brings about similarly extreme security dependability risks. We predict increase in very sophisticated targeted attacks, or advanced persistent threats (APT), claim that this calls for expanding frontier methods techniques used our current CII. Extreme require...
<title>Abstract</title> The variety of sensors for health monitoring helps professionals in the field make decisions. For certain clinical conditions, it is interesting to monitor patient's after discharge. Wearable devices (smartwatches) can send data hospital. However, many patients (external and internal), a resilient high-performance computing infrastructure required. Such characteristics require high monetary cost equipment. This paper presents an SPN (Stochastic Petri Net) model...
In this practical experience report we discuss a court case in which one of the authors was expert witness. This UK civil considered possible fraud an online product promotion competition, with participants being denied prizes because they were to have cheated. The discussion paper aims provide practice-led perspective on link between technology and legal issues design games web applications. presents court's questions witness responses, also provides synopsis analysis data server log file...