All Stories

  1. Education Credentials’ Tokenisation – A Use Case
  2. Tokenisation Outcomes Framework for the Public Sector – Is Blockchain Optimal for My Process?
  3. Sustainable Tokenisation Model for the Public Sector: Selecting the most suitable business process
  4. Cybersecurity in Supply Chain Systems: The Farm-to-Fork Use Case
  5. Exploring Risk Analysis Methods in IoE Projects: A Smart Campus Use Case
  6. Information Security Metrics: Challenges and Models in an All-Digital World
  7. Data Management in a Smart Campus Project: An Ontological Approach
  8. Editorial: Wireless Networks and IoT Applications
  9. Blockchain in the Public Sector: An Umbrella Review of Literature
  10. Blockchain and Sustainability in the Public Sector: A Risk Management Perspective
  11. Gain Enhancement of Diversity Slot Antenna Using FSS with Metamaterial Unit Cells for UWB Systems
  12. Low-Profile MM-Wave PIFA Array with Omni-Directional and Full-Coverage Radiations
  13. Cybersecurity
  14. Continuous Industrial Sector Cybersecurity Assessment Paradigm: Proposed Model of Cybersecurity Certification
  15. Dual-Band MIMO Antenna Array for Sub 6 GHz 5G Smartphone Applications
  16. Internal MIMO Antenna Design for Multi-Band Mobile Handset Applications
  17. Wideband and Low-Profile Phased Array Smartphone Antenna Supporting 28-38 GHz
  18. Virtual Lab Virtues in Distance Learning
  19. Cybersecurity in ICT Supply Chains: Key Challenges and a Relevant Architecture
  20. Information Security Assessment and Certification within Supply Chains
  21. Roadmap of Security threats between IPv4/IPv6
  22. Provisioning Cybersecurity in ICT Complex Supply Chains: An Overview, Key Issues and a Relevant Architecture
  23. The Future of Engineering Education: Current Challenges and Opportunities
  24. Distributed Architecture to Enhance Systems Protection against Unauthorized Activity via USB Devices
  25. Proposing an Architecture for IoT Based on WSN
  26. Plenary: The Challenges of Education in Engineering, Computing and Technology without exclusions: Innovation in the era of the Industrial Revolution 4.0
  27. EDGE4ALL: Edge Computing for Smart City
  28. Science and Technologies for Smart Cities
  29. Simulator for Smart City Environment
  30. Healthcare Critical Knowledge Monitor System Model: Healthcare Knowledge Capture Component Specification
  31. Trends in Engineering Education: a Disruptive View for not so far Future
  32. Promoting Creativity in Final Year Engineering Students' Project: a case study in the Smart Cities context
  33. Plenary: Modern Educational Paradigms for a Computer and Engineer Career
  34. EDGE4ALL - Edge Platform For Smart City
  35. Study of the Means of Online Payment in the Portuguese Population
  36. Work-in-Progress: Global Experiences for Engineering Programs
  37. International Experiences and the Implications for the Success of Engineering Programs
  38. Internationalization Project to Face the Uncertainties of Work Market
  39. Global perspectives on cybersecurity education
  40. Automatic human trajectory destination prediction from video
  41. Comparison and Evaluation of Organizational Transactions for Continuous Auditing and Business Compliance
  42. Message from the Technical Program Chair
  43. The Role of Professional Associations in Contemporaneous Engineer Careers
  44. Global perspectives on cybersecurity education for 2030: a case for a meta-discipline
  45. Engineering Education Program Promoting the Profession
  46. High Quality Engineering Program Achievement
  47. Proposing a Behavior-Based IDS Model for IoT Environment
  48. Rethinking engineering education
  49. Challenges and reflections in designing Cyber security curriculum
  50. Engineering Education: Balancing generalist and specialist formation in technological carriers: A current challenge
  51. Self-oriented learning based on intelligent systems into the workplace
  52. Pointer dynamics as cognitive biometrics
  53. Evaluating Information Systems with Continuous Assurance Services
  54. What is Missing for Trust in the Cloud Computing?
  55. Behavioural Biometrics for Authentication and Stress Detection – A Case Study with Children
  56. The Information Value: Perception of the Problem
  57. Automatic visual detection of human behavior: A review from 2000 to 2014
  58. Automatic Human Action Recognition from Video Using Hidden Markov Model
  59. UM MODELO DE CONFIANÇA PARA O AMBIENTE DE COMPUTAÇÃO EM NUVEM.
  60. Detection of Dangerous Situations Using a Smart Internet of Things System
  61. An Immunity Based Configuration for Multilayer Single Featured Biometric Authentication Algorithms
  62. Child Abuse Monitor System Model: A Health Care Critical Knowledge Monitor System
  63. Insider Threats: The Major Challenge to Security Risk Management
  64. Monitoring Organizational Transactions in Enterprise Information Systems with Continuous Assurance Requirements
  65. Security metrics to evaluate organizational IT security
  66. Management of internal control mechanisms in ERP for continuous monitoring purposes
  67. Determinants of Behavioral Intention to Mobile Banking in Arab Culture
  68. Enrolment time as a requirement for biometric fingerprint recognition
  69. Free Typed Text Using Keystroke Dynamics for Continuous Authentication
  70. Organizational transactions with real time monitoring and auditing
  71. An Enterprise Ontology-Based Database for Continuous Monitoring Application
  72. Health users' perception of biometric authentication technologies
  73. Biometrics acceptance in Arab culture: An exploratory study
  74. A Study of Biometric Authentication Adoption in Health Services
  75. Specialized Knowledge Systems – A Model for Intelligent Learning Management within Organizations
  76. User’s Requirements in Internet Access Sharing
  77. A Conceptual Model for Evaluating Systems with Continuous Assurance Services
  78. Botnets
  79. Keystroke Dynamics for Continuous Access Control Enforcement
  80. Continuous Assurance on Organizational Transactions
  81. Wireless Identity Management
  82. A solution for real time monitoring and auditing of organizational transactions
  83. Automation of the Approval and Control Process of Documents
  84. Biometric technologies and their perception by the common citizen
  85. Study of the Perception on the Biometric Technology by the Portuguese Citizens
  86. Grid data mining by means of learning classifier systems and distributed model induction
  87. A Security Framework for Audit and Manage Information System Security
  88. User acceptance OTM machine: in the Arab culture
  89. OTM Machine Acceptance: In the Arab Culture
  90. Multimodal Biometrics and Multilayered IDM for Secure Authentication
  91. A Security Audit Framework to Manage Information System Security
  92. An audit framework to support information system security management
  93. Automation of the Approval and Control Process of Documents
  94. Cyberwar and the Russian Federation: the usual suspect
  95. Methods of Organizational Information Security
  96. Education and Technology for a Better World
  97. An Ontology Based Approach to Information Security
  98. Another Global City
  99. Prediction of Abnormal Behaviors for Intelligent Video Surveillance Systems
  100. A machine learning approach to keystroke dynamics based user authentication
  101. Data Mining a Prostate Cancer Dataset Using Rough Sets
  102. Data Mining a Keystroke Dynamics Based Biometrics Database Using Rough Sets
  103. Moving object detection unaffected by cast shadows, highlights and ghosts
  104. Architecture and Design of Distributed Embedded Systems
  105. A Methodology for Complex Embedded Systems Design
  106. A heterogeneous computer vision architecture: Implementation issues
  107. Password Sharing and How to Reduce It
  108. Classical Engineering Education Revisited - Why it Matters
  109. Password Secured Sites — Stepping Forward with Keystroke Dynamics
  110. On the Use of Rough Sets for User Authentication Via Keystroke Dynamics