The Internet of Vehicles (IoV) presents complex cybersecurity challenges, particularly against Denial-of-Service (DoS) and spoofing attacks targeting the Controller Area Network (CAN) bus. This study leverages the CICIoV2024 dataset, comprising six distinct classes of benign traffic and various types of attacks, to evaluate advanced machine learning techniques for instrusion detection systems (IDS). The models ...
A EM@IPLeiria é um think tank criado em 2023 para impulsionar um desenvolvimento sustentável, inovador e competitivo na região de Leiria e Oeste. Mais do que um centro de estudos, é uma fábrica de ideias e soluções, dedicada à análise dos desafios estruturais do território, à identificação de novas oportunidades e ao teste de respostas concretas para problemas reais. Como espaço de cocriação e experimentação, a...
The accelerating digitalization of the public and private sectors has made information technologies (IT) indispensable in modern life. As services shift to digital platforms and technologies expand across industries, the complexity of legal, regulatory, and technical requirement documentation is growing rapidly. This increase presents significant challenges in managing, gathering, and analyzing documents, as th...
Cybersecurity has a major impact on the healthcare sector, mainly due to the sensitive data and vital medical devices that, when an attack occurs, may compromise the patient's life, safety, and well-being. However, those institutions fail to implement correct system protection policies and provide adequate programs for cybersecurity training and raising cybersecurity awareness. Healthcare professionals develop ...
Criminal investigations collect and analyze the facts related to a crime, from which the investigators can deduce evidence to be used in court. It is a multidisciplinary and applied science, which includes interviews, interrogations, evidence collection, preservation of the chain of custody, and other methods and techniques of investigation. These techniques produce both digital and paper documents that have to...
Animal activity during the night period is of enormous importance, since it represents approximately half of animals’ lives, and monitoring it during this period makes it possible to detect problems related to well-being and safety, and allows us to infer energy expenditure on the basis of their activity level. The present study analyzes a sheep activity dataset created during the night period to validate non-i...
Digital exposure to the Internet among the younger generations, notwithstanding their digital abilities, has increased and raised the alarm regarding the need to intensify the education on cybersecurity in schools. Understanding the human factor and its influence on children, namely their attitudes and behaviors online, is pivotal to reinforce their awareness towards cyberattacks and to promote their digital ci...
The growing digitization of healthcare institutions and its increasing dependence on Internet infrastructure have boosted concerns related to data privacy and confidentiality. These institutions have been challenged with specific issues, namely the sensitivity of data, the specificity of networked equipment, the heterogeneity of healthcare professionals (nurses, doctors, administrative staff, and others), and t...
Deepfake and manipulated digital photos and videos are being increasingly used in a myriad of cybercrimes. Ransomware, the dissemination of fake news, and digital kidnapping-related crimes are the most recurrent, in which tampered multimedia content has been the primordial disseminating vehicle. Digital forensic analysis tools are being widely used by criminal investigations to automate the identification of di...
Digital exposure to the Internet among the younger generations, notwithstanding their digital abilities, has increased and raised the alarm regarding the need to intensify the education on cybersecurity in schools. Understanding of the human factor and its influence on children, namely their attitudes and behaviors online, is pivotal to reinforce their awareness towards cyberattacks, and to promote their digita...