Edmundo Monteiro

ORCID: 0000-0003-1615-2925
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Traffic and Congestion Control
  • Software-Defined Networks and 5G
  • Wireless Networks and Protocols
  • IPv6, Mobility, Handover, Networks, Security
  • IoT and Edge/Fog Computing
  • Advanced Optical Network Technologies
  • Advanced Wireless Network Optimization
  • Network Security and Intrusion Detection
  • Caching and Content Delivery
  • Mobile Agent-Based Network Management
  • Energy Efficient Wireless Sensor Networks
  • Peer-to-Peer Network Technologies
  • Multimedia Communication and Technology
  • Security in Wireless Sensor Networks
  • Internet Traffic Analysis and Secure E-voting
  • Smart Grid Security and Resilience
  • Context-Aware Activity Recognition Systems
  • IoT Networks and Protocols
  • Wireless Body Area Networks
  • Mobile Ad Hoc Networks
  • Opportunistic and Delay-Tolerant Networks
  • Image and Video Quality Assessment
  • Cryptography and Data Security
  • Cooperative Communication and Network Coding
  • Software System Performance and Reliability

University of Coimbra
2015-2024

Apple (Israel)
2023

Polytechnic Institute of Castelo Branco
2021

ORCID
2020

Institute of Electrical and Electronics Engineers
2018

Regional Municipality of Niagara
2018

IEEE Computer Society
2018

Leeds General Infirmary
1992-2014

Iscte – Instituto Universitário de Lisboa
2014

Nokia (Finland)
2013

The Internet of Things (IoT) introduces a vision future where users, computing systems, and everyday objects possessing sensing actuating capabilities cooperate with unprecedented convenience economical benefits. As the current architecture, IP-based communication protocols will play key role in enabling ubiquitous connectivity devices context IoT applications. Such technologies are being developed line constraints platforms likely to be employed by applications, forming communications stack...

10.1109/comst.2015.2388550 article EN IEEE Communications Surveys & Tutorials 2015-01-01

Blockchain is becoming increasingly popular in the business and academic communities because it can provide security for a wide range of applications. Therefore, researchers have been motivated to exploit blockchain characteristics, such as data immutability, transparency, resistance single-point failures Internet Things (IoT), increase IoT ecosystem. However, many existing blockchains rely on classical cryptosystems Elliptic Curve Digital Signature Algorithm (ECDSA) SHA-256 validate...

10.1109/comst.2024.3355222 article EN IEEE Communications Surveys & Tutorials 2024-01-01

Recent developments in telecommunications have allowed drawing new paradigms, including the Internet of Everything, to provide services by interconnection different physical devices enabling exchange data enrich and automate people's daily activities; Fog computing, which is an extension well-known Cloud bringing tasks edge network exploiting characteristics such as lower latency, mobility support, location awareness. Combining these paradigms opens a set possibilities for innovative...

10.1186/s13174-018-0086-3 article EN cc-by-nc Journal of Internet Services and Applications 2018-06-13

The rapid and quick growth of smart mobile devices has caused users to demand pervasive broadband services comparable the fixed Internet. In this direction, research initiatives on 5G networks have gained accelerating momentum globally. Networks will act as a nervous system digital society, economy, everyday peoples life enable new future Internet Services paradigms such Anything Service, where devices, terminals, machines, also things robots become innovative tools that produce use...

10.1109/melcon.2016.7495388 article EN 2016-04-01

The Cloud to Fog continuum is a very dense and complex scenario. At the core level (Cloud) resources are vast, whilst they become scarce at Edge (Fog). This complexity leads need of simulation tools in order evaluate performance novel mechanisms that hardly can be tested real scenarios. Thus, represents solution for early stage evaluation before moving real-world (and more expensive complex) testbeds. However, selecting appropriate tool itself. paper presents conceptual review on six...

10.1016/j.simpat.2019.102029 article EN cc-by-nc-nd Simulation Modelling Practice and Theory 2019-11-23

Security plays a vital role in enabling future integration of Wireless Sensor Networks (WSNs) with the Internet. Although security WSNs is mature field research and many proposals currently exist that can address particular threats, how to guarantee end-to-end at network layer for IPv6-enabled remains an open issue. should be addressed layer, as sensor nodes will evolve become IPv6 aware new applications are adapted or designed depend on connectivity nodes. We propose evaluate compressed AH...

10.1109/glocom.2010.5684293 article EN 2010-12-01

A new era of automated services has permeated user's daily lives thanks to paradigms such as Smart City and the Internet Things. This shift from traditional applications is possible due massive amount heterogeneous devices that constitute To provide newly improved characteristics these services, mobility support, high resilience, low latency, an extension Cloud computing paradigm was created, called Fog computing, which brings processing storage resources towards edge network, in vicinity...

10.1109/ficloud.2017.49 article EN 2017-08-01

One of the goals Federated Learning (FL) is to collaboratively train a global model using local models from remote participants. However, FL process susceptible various security challenges, including interception and tampering models, information leakage through shared gradients, privacy breaches that expose participant identities or data, particularly in sensitive domains such as medical environments. Furthermore, advent quantum computing poses critical threat existing cryptographic...

10.48550/arxiv.2502.14464 preprint EN arXiv (Cornell University) 2025-02-20

Objetivo: Relatar os efeitos dentários e funcionais do tracionamento de canino incluso, exposto por meio uma técnica cirúrgica, tracionado dispositivo ortodôntico. Relato Caso: Paciente G. A. L, 11 anos, feoderma, procurou atendimento na Clínica Escola Odontologia UNIFIP, queixando-se ausência elemento 13. Na análise facial apresentou-se com perfil harmônico; dentária, Classe I, mordida cruzada 13 no arco. O tratamento foi desenvolvido através da remoção 53, exposição cirúrgica coroa...

10.36557/2674-8169.2025v7n3p2026-2041 article PT cc-by Brazilian Journal of Implantology and Health Sciences 2025-03-27

Este artigo apresenta o relato de experiência dos resultados do projeto extensão “Ferment’Ação: qualificação profissional em panificação e confeitaria como estratégia inclusão social mulheres situação vulnerabilidade” realizado no IFPA Campus Cametá cujo objetivo era ofertar cursos a essas mulheres, contribuindo para emancipação feminina sua autonomia financeira. O curso foi panejado baseado levantamento pela equipe parceria com Centro Assistência Social, qual também auxiliou processo...

10.55905/cuadv17n4-026 article PT Cuadernos de Educación y Desarrollo 2025-04-07

EuQoS is the acronym for "end-to-end quality of service support over heterogeneous networks", which a European research project aimed at building an entire QoS framework, addressing all relevant network layers, protocols, and technologies. This includes most common access networks (xDSL, UMTS, WiFi, LAN) being prototyped tested in multidomain scenario throughout Europe, composing what we call system. In this article present novel routing mechanisms that are developed evaluated framework...

10.1109/mcom.2007.313402 article EN IEEE Communications Magazine 2007-02-01

Many issues still remain to be addressed in order achieve acceptable security wireless sensor networks (WSNs). This necessity, together with the adoption of IPv6 on WSNs being defined at 6lowpan working group IETF, motivates our investigation feasibility application IPSec nodes. is already part IPv6, which makes it a natural candidate directly employed or adapted for WSNs. We discuss results obtained from practical experiments usage cryptographic algorithms typically within real analyze and...

10.1109/mahss.2008.4660130 article EN 2008-09-01
Coming Soon ...