The broadening dependency and reliance that modern societies have on essential services provided by Critical Infrastructures is increasing the relevance of their trustworthiness. However, Critical Infrastructures are attractive targets for cyberattacks, due to the potential for considerable impact, not just at the economic level but also in terms of physical damage and even loss of human life. Complementing tra...
The documental and museum assets of the Portuguese working class and trade union movement, including the assets from Portugal’s Autonomous Region of Madeira (ARM), are generally little-known. It is for the owners of those assets to play a more dynamic role in their treatment and disclosure, while, at the same time, alerting for the urgency of state authorities developing a more assertive action, in order to ide...
In the past few decades, the urbanization area increased significantly, requiring enhanced services and applications to improve the lifestyle of its citizens. Lighting is one of the most relevant infrastructures due to its impact on modern societies, but it is also complex to manage them in cities since it involves a massive number of widespread posts and is costly as the result of the consumption of significan...
The need for a more sustainable world is increasing the number of installations of photovoltaic systems including batteries as a way to postpone energy consumption when it is most needed. However, the chemical nature of batteries makes them unreliable and prompt to dangerous situations and can lead to a potential disaster, such as fires and explosions, in case the underline issues keep undetected for a long tim...
As number of photovoltaic systems being installed is increasing, also many users are deciding to include batteries, and postpone the consumption of that energy when it is most needed. Moreover,a crucial issue can keep undetected for long time causing dangerous situation which can lead to a potential disaster. However, the chemical nature of batteries makes them unreliable and dangerous. In this risky scenario, ...
Contemporary societies are increasingly dependent on products and services provided by Critical Infrastructure (CI) such as power plants, energy distribution networks, transportation systems and manufacturing facilities. Due to their nature, size and complexity, such CIs are often supported by Industrial Automation and Control Systems (IACS), which are in charge of managing assets and controlling everyday opera...
A Distributed Denial-of-Service attack uses multiple sources operating in concert to attack a network or site. A typical DDoS flood attack on a website targets a web server with multiple valid requests, exhausting the server’s resources. The participants in this attack are usually compromised/infected computers controlled by the attackers. There are several variations of this kind of attack, and torrent index p...
The electric charging solutions for the residential market imply, in many situations, an increase in the contracted power in order to allow to perform an efficient charging cycle that starts when the charger is connected and ends when the VE battery is fully charged. However, the increase in contracted power is not always the best solution for faster and more efficient charging. With a focus on the residential ...
Due to the SARS-COV-2 pandemic, educational institutions are immediately faced with a new challenge to adapt, forcing the transition from face-to-face teaching to distance learning in a short period. Distance education supported by technology is a challenge for educational institutions based on binomial technology/teaching. This paper presents a proposal for an e-learning technology structure, supported by a cl...
A Distributed Denial-of-Service attack uses multiple sources operating in concert to attack a network or site. A typical DDoS flood attack on a website targets a web server with multiple valid requests, exhausting the server’s resources. The participants in this attack are usually compromised/infected computers controlled by the attackers. There are several variations of this kind of attack, and torrent index p...