Francisco Rocha

ORCID: 0000-0002-8656-627X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Security and Verification in Computing
  • Cloud Data Security Solutions
  • Cryptography and Data Security
  • Digital and Cyber Forensics
  • Advanced Malware Detection Techniques
  • IoT and Edge/Fog Computing
  • Fire effects on ecosystems
  • Seedling growth and survival studies
  • Chaos-based Image/Signal Encryption
  • User Authentication and Security Systems
  • Biocrusts and Microbial Ecology
  • Aeolian processes and effects
  • Diamond and Carbon-based Materials Research
  • Big Data and Business Intelligence
  • Privacy-Preserving Technologies in Data
  • Tree-ring climate responses
  • Vehicular Ad Hoc Networks (VANETs)
  • Distributed systems and fault tolerance
  • Cryptographic Implementations and Security
  • Algal biology and biofuel production
  • Forest ecology and management
  • Autonomous Vehicle Technology and Safety
  • Slime Mold and Myxomycetes Research
  • Software Testing and Debugging Techniques
  • Innovation in Digital Healthcare Systems

Universidade Federal do Piauí
2024

Universidade Federal de Alagoas
2023

University of Lisbon
2011-2021

University of Luxembourg
2016-2017

Newcastle University
2013-2015

Carnegie Mellon University
2011

Cloud Computing is a recent paradigm that creating high expectations about benefits such as the pay-per-use model and elasticity of resources. However, with this optimism come also concerns security. In public cloud, user's data storage processing no longer done inside its premises, but in centers owned administrated by cloud provider. This may be concern for organizations deal critical data, medical records. We show malicious insider can steal confidential user, so user mostly left trusting...

10.1109/dsnw.2011.5958798 article EN 2011-06-01

Semi-autonomous driver assists are already widely deployed and fully autonomous cars progressively leaving the realm of laboratories. This evolution coexists with a progressive connectivity cooperation, creating important safety security challenges, latter ranging from casual hackers to highly-skilled attackers, requiring holistic analysis, under perspective fully-fledged ecosystems cooperative vehicles. position paper attempts at contributing better understanding global threat plane...

10.1145/2994487.2994489 article EN 2016-10-28

Soil salinization poses an important threat to terrestrial ecosystems and is expected increase as a consequence of climate change anthropogenic pressures. Conventional methods such salt-leaching or application soil amendments, nature-based solutions (NBSs) phytoremediation, have been widely adopted with contrasting results. The use cyanobacteria for improving conditions has emerged novel biotechnological tool ecosystem restoration due the unique features these organisms, e.g., ability fix...

10.3390/agronomy10091321 article EN cc-by Agronomy 2020-09-03

The boundary between the trusted inside and untrusted outside blurs when a company adopts cloud computing. organization's applications-and data-are no longer onsite, fundamentally changing definition of malicious insider.

10.1109/mc.2011.223 article EN Computer 2011-07-26

A critical challenge in cloud computing is assuring confidentiality and integrity for the execution of arbitrary software a consumer's virtual machine. The problem arises from having multiple machines sharing hardware resources same physical host. security resource random access memory, which current version Xen hyper visor vulnerable to attacks. Like previous work demonstrated, this vulnerability originates adopting avery permissive memory model its management machine (Dom0). assumes it...

10.1109/ic2e.2013.20 article EN 2013-03-01

Post‐fire environmental conditions can heavily influence the natural regeneration of pine species in Mediterranean forests. Therefore, enhancing post‐fire recovery is fundamental for effective ecological restoration In this study, effects a treatment on seedling emergence and survival Spanish black ( Pinus nigra Arn. ssp. salzmannii ) were investigated under consisting manual cut burnt tree canopies placed soil surface with their branches, following contour lines (contour‐felled log debris,...

10.1111/rec.13338 article EN Restoration Ecology 2020-12-15

Cloud computing offers computational resources such as processing, networking, and storage to customers. However, the cloud also brings with it security concerns which affect both consumers providers. The Security Alliance (CSA) define seven main threats. This paper investigates how threat number one (malicious activities performed in consumers' virtual machines/VMs) can of It proposes logging solutions mitigate risks associated this threat. We systematically design implement a prototype...

10.1109/cloudcom-asia.2013.70 article EN 2013-12-01

Intel SGX is the latest processor architecture promising secure code execution despite large, complex and hence potentially vulnerable legacy operating systems (OSs). However, two recent works identified vulnerabilities that allow an untrusted management OS to extract secret information from SGX's enclaves, violate their integrity by exploiting concurrency bugs. In this work, we re-investigate delayed preemption (DP) in context of SGX. DP a mechanism originally proposed for L4-family...

10.1145/3007788.3007794 article EN 2016-12-12

Abstract Key Message The first bottleneck in Spanish black pine survival through afforestation is the lack of resistance to drought their initial life stages. ( Pinus nigra Arn ssp . salzmannii ) most widely distributed species mountain areas Mediterranean Basin and commonly used for endangered degraded areas. Despite its importance, little known regarding factors driving seedling this species, which may hamper success In study, we assessed effects seed origin plantation site along a natural...

10.1007/s00468-021-02184-x article EN cc-by Trees 2021-07-22

The world is becoming an immense critical information infrastructure, with the fast and increasing entanglement of utilities, telecommunications, Internet, cloud, emerging IoT tissue. This may create enormous opportunities, but also brings about similarly extreme security dependability risks. We predict increase in very sophisticated targeted attacks, or advanced persistent threats (APT), claim that this calls for expanding frontier methods techniques used our current CII. Extreme require...

10.1109/prdc.2017.21 article EN 2017-01-01

<title>Abstract</title> The variety of sensors for health monitoring helps professionals in the field make decisions. For certain clinical conditions, it is interesting to monitor patient's after discharge. Wearable devices (smartwatches) can send data hospital. However, many patients (external and internal), a resilient high-performance computing infrastructure required. Such characteristics require high monetary cost equipment. This paper presents an SPN (Stochastic Petri Net) model...

10.21203/rs.3.rs-3537825/v1 preprint EN cc-by Research Square (Research Square) 2023-11-06

In this practical experience report we discuss a court case in which one of the authors was expert witness. This UK civil considered possible fraud an online product promotion competition, with participants being denied prizes because they were to have cheated. The discussion paper aims provide practice-led perspective on link between technology and legal issues design games web applications. presents court's questions witness responses, also provides synopsis analysis data server log file...

10.1109/issre.2017.41 article EN 2017-10-01
Coming Soon ...