Raimir Holanda Filho

ORCID: 0000-0002-5754-1372
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Energy Efficient Wireless Sensor Networks
  • Network Security and Intrusion Detection
  • IoT and Edge/Fog Computing
  • Internet Traffic Analysis and Secure E-voting
  • Security in Wireless Sensor Networks
  • Mobile Ad Hoc Networks
  • IoT-based Smart Home Systems
  • Context-Aware Activity Recognition Systems
  • IoT Networks and Protocols
  • Water Quality Monitoring Technologies
  • Opportunistic and Delay-Tolerant Networks
  • Blockchain Technology Applications and Security
  • Information and Cyber Security
  • Network Traffic and Congestion Control
  • Spam and Phishing Detection
  • Advanced Malware Detection Techniques
  • Business Process Modeling and Analysis
  • COVID-19 diagnosis using AI
  • Multi-Criteria Decision Making
  • Information Technology Governance and Strategy
  • Software Engineering Research
  • Cloud Computing and Resource Management
  • Smart Grid Security and Resilience
  • Imbalanced Data Classification Techniques
  • Fuzzy Logic and Control Systems

Universidade de Fortaleza
2014-2024

Unifor
2022-2023

Universidade Estadual do Ceará
2007-2023

Embraer (Brazil)
2020

Instituto Federal de Educação, Ciência e Tecnologia do Ceará
2017

Universitat Politècnica de Catalunya
2005

Network security metrics (NSMs) based on models allow to quantitatively evaluate the overall resilience of networked systems against attacks. For that reason, such are great importance security-related decision-making process organizations. Considering over past two decades several model-based quantitative NSMs have been proposed, this paper presents a deep survey state-of-the-art these proposals. First, distinguish described in from other types metrics, an overview general, and their...

10.1109/comst.2017.2745505 article EN IEEE Communications Surveys & Tutorials 2017-01-01

The time window between the disclosure of a new cyber vulnerability and its use by cybercriminals has been getting smaller over time. Recent episodes, such as Log4j vulnerability, exemplifies this well. Within hours after exploit being released, attackers started scanning internet looking for vulnerable hosts to deploy threats like cryptocurrency miners ransomware on systems. Thus, it becomes imperative cybersecurity defense strategy detect their capabilities early possible maximize success...

10.1109/access.2023.3260020 article EN cc-by-nc-nd IEEE Access 2023-01-01

Low-Power Wide-Area Network (LPWAN) is one of the enabling technologies Internet Things (IoT), and focuses on providing long distance connectivity for a vast amount smart devices. Currently, LoRa leading LPWAN solutions available public use. In LPWANs, especially in LoRa, security major concern due to resource constraints devices, sensitivity level transmitted data, large connected among other reasons. This paper studies key management mechanism LoRaWAN environments. A secure architecture...

10.3390/s20113068 article EN cc-by Sensors 2020-05-29

The Internet of Things (IoT) is based on interconnection intelligent and addressable devices, allowing their autonomy proactive behavior with connectivity. Data dissemination in IoT usually depends the application requires context-aware routing protocols that must include auto-configuration features (which adapt network at runtime, context information). This paper proposes an approach for route selection using fuzzy logic order to attain requirements specific applications. In this case, used...

10.3390/s18020353 article EN cc-by Sensors 2018-01-26

Distinguishing outliers from normal data in wireless sensor networks has been a big challenge the anomaly detection domain, mostly due to nature of anomalies, such as software or hardware failures, reading errors malicious attacks, just name few. In this article, we introduce an detection-based OPF classifier aforementioned context. The results are compared against one-class support vector machines and multivariate Gaussian distribution. Additionally, also propose employ meta-heuristic...

10.1109/mnet.2018.1800151 article EN IEEE Network 2018-10-30

At present, the standardisation of electrical equipment communications is on rise. In particular, manufacturers are releasing for smart grid endowed with communication protocols such as DNP3, IEC 61850, and MODBUS. However, there legacy operating in electricity distribution network that cannot communicate using any these protocols. Thus, we propose an infrastructure to allow integration grids by wireless sensor networks (WSNs). this infrastructure, each device connected a node, sink node...

10.3390/s18051312 article EN cc-by Sensors 2018-04-24

Solid waste management is one of the problems that has gained greater prominence in recent years. This topic been discussed with emphasis conjunction environmental issues, driven by changes most diverse fields provided post-pandemic scenario. However, due to traditional or inefficient approaches, trash bins placed cities can be seen as overflowing. Therefore, a remote monitoring system needed alert level garbage relevant authority for clearance. In this scenario, Internet Things (IoT)...

10.1016/j.procs.2023.03.018 article EN Procedia Computer Science 2023-01-01

The growing demand for link bandwidth and node capacity is a frequent phenomenon in IP network backbones. Within this context, traffic prediction essential the operator. Traffic can be undertaken based on or origin-destination (OD) which presents better results. This work investigates methodology multidimensional OD traffic, focusing stage of short-term using Principal Components Analysis as technique dimensionality reduction Local Linear Model K-means trend analysis. results validated with...

10.1109/noms.2010.5488338 article EN 2010-04-01

Due to their increasing dissemination, wireless sensor networks (WSNs) have become the target of more and sophisticated attacks, even capable circumventing both attack detection prevention mechanisms. This may cause WSN users, who totally trust these security mechanisms, think that a reading is secure, when an adversary has corrupted it. For reason, scheme estimating level (SL) mechanisms provide data needed, so users can be aware actual state this make better decisions on its use. However,...

10.3390/s150102104 article EN cc-by Sensors 2015-01-19

In Brazil, government purchases of products or services, by constitutional and legal impositions, must be preceded bidding, whose supervision is the responsibility Courts Auditors. Bids are subject to numerous frauds, including collusion between bidders, which sometimes occur through exclusive majority participation same group business partners. The transparency spending a global trend and, in there several public databases Auditors on bidding procedures. present study, using data, aims...

10.1016/j.procs.2024.06.022 article EN Procedia Computer Science 2024-01-01

This study proposes to develop, build and implement the IoT of mobile network robot integrated with features mapping location in an internal environment, trace best route obtain a fast efficient change detect changes environment as identifier falls elderly. It is observed that it applied research aggregate several available algorithms. The was provided capabilities map achieve active movements retirement home for also set up monitor assist transport medicines notify caregiver any incident...

10.1109/access.2020.3009167 article EN cc-by IEEE Access 2020-01-01

In the last years, we have seen that use of P2P applications has increased significantly and currently they represent a signiflcant portion Internet traffic. consequence this growth, traffic characterization identification are becoming increasingly important for network administrators designers. However, is not simple. Nowadays, explicitly try to camouflage original in an attempt go undetected. This work presents methodology selection five discriminators applies cluster analysis identify...

10.1109/giis.2007.4404178 article EN 2007-01-01

Predictive modelling strategies can optimise the clinical diagnostic process by identifying patterns among various symptoms and risk factors, such as those presented in cases of severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2), also known (COVID-19). In this context, present research proposes a comparative analysis using benchmarking techniques to evaluate validate performance some classification algorithms applied same dataset, which contains information collected from patients...

10.3390/app12188939 article EN cc-by Applied Sciences 2022-09-06

Summary To improve the efficiency of electricity distribution, smart grids allow communication between their devices. Pieces legacy equipment operating in distribution network do not communicate using any commercial protocol, such as DNP3, IEC 61850, or Modbus. Thus, herein, a middleware is proposed to integration electrical into grid wireless sensor networks (WSNs). Each piece connected node, and WSN sink node runs enable this device with grid, according protocols. The model guide users...

10.1002/dac.3380 article EN International Journal of Communication Systems 2017-07-26

The Wireless Sensor Networks (WSNs) are composed of small sensor nodes capable sensing (collecting), processing and transmitting data related to some phenomenon in the environment. However, have severe constraints, such as: low network bandwidth, short wireless communication range, limited CPU capacity, memory storage power supply. Therefore, maximizing benefits resources WSNs become one relevant challenging issue. One most problem is with energy consumption during transmission, since,...

10.1109/cec.2013.6557967 article EN 2013-06-01

Low-Power Wide-Area Network (LPWAN) is a new type of wireless technology that offers long range communication for devices in the Internet Things (IoT) and LoRaWAN one main technologies currently available to enable LPWAN environments. In architecture, Join Server key component responsible security tasks, such as authentication management. However, acts Single Point Failure (SPOF) since all encryption keys are stored centrally. Then, this paper presents secure fault-tolerant architecture...

10.1109/access.2022.3179004 article EN cc-by IEEE Access 2022-01-01

This work presents an Internet traffic classification methodology based on statistical discriminators and cluster analysis. An accuracy identification of applications is important research area, because it directly related to solve many network problems such as: quality service (QoS), control, security, management operation. The main difference previous approaches lies in the use; rather than using only one set for all classes we use a different each class. Using real traces into training...

10.1109/noms.2008.4575244 article EN 2008-04-01
Coming Soon ...