The absence of essential security protocols in Industrial Internet of Things (IIoT) networks introduces cybersecurity vulnerabilities and turns them into potential targets for various attack types. Although machine learning has been used for intrusion detection in the IIoT, datasets with representative data of common attacks of IIoT network traffic are limited and often imbalanced. Data augmentation techniques ...
The application of the Internet of Things concept in domains such as industrial control, building automation, human health, and environmental monitoring, introduces new privacy and security challenges. Consequently, traditional implementation of monitoring and security mechanisms cannot always be presently feasible and adequate due to the number of IoT devices, their heterogeneity and the typical limitations of...
Internet of Things (IoT) devices are now widely used, enabling intelligent services that, in association with new communication technologies like the 5G and broadband internet, boost smart-city environments. Despite their limited resources, IoT devices collect and share large amounts of data and are connected to the internet, becoming an attractive target for malicious actors. This work uses machine learning co...
Internet of Things (IoT) devices have become day-to-day technologies. They collect and share a large amount of data, including private data, and are an attractive target of potential attackers. On the other hand, machine learning has been used in several contexts to analyze and classify large volumes of data. Hence, using machine learning to classify network traffic data and identify anomalous traffic and poten...
Mobile phones, social media, and Internet of Things (IoT) devices are examples of day-to-day technologies that collect large amounts of data, including people's location, habits, and preferences. The first regulations on digital data collection and processing privacy were created decades ago, but such an increased amount of collected digital data and the risks associated with the illegal processing and exposure...
Technology is changing society, organizations, and interactions between service organizations and customers at a fast pace. Moreover, technology is transforming the nature of services and, in academia, multidisciplinary research is trying to make sense of these changes and leverage the opportunity of service innovation in different fields. After a brief review of the literature focused on services, we found tha...
Este trabalho insere-se no estudo das redes sociais e das comunidades virtuais. Comecei por fazer um trabalho de campo sobre dois grupos de jovens, que acompanhei durante dois anos, fazendo a etnografia dos seus usos da Internet, em especial dos modernos programas ditos de Rede Social; e de como eles os integram no seu quotidiano, de como se apropriavam da Internet no seu uso próprio. Finalmente procurei contri...
The People’s Republic of China (PRC) has a long tradition on military strategy. In the end of the 20 th century this was one of the first nations to prepare itself for the new emerging concept of war that includes the combat in cyberspace, both with the intention to obtain privileged information (espionage), to reduce the enemy attack and/or military capability or even to create casualties. This paper presents ...
The evolution of the technology and the changes in the organization and control of the critical infrastructures of the nations are creating a new combat front. The case studied in this paper refers to the attack to the information systems of the Georgian organizations that occurred at the same time as the conventional military operation executed by the Russian army in the South Ossetia in August 2008. The data ...
In information systems, authentication involves, traditionally, sharing a secret with the authenticating entity and presenting it whenever a confirmation of the user’s identity is needed. In the digital era, that secret is commonly a user name and password pair and/or, sometimes, a biometric feature. Both present difficulties of different kinds once the traditional user name and password are no longer enough to...