All Stories

  1. Cybersecurity in Supply Chain Systems: The Farm-to-Fork Use Case
  2. Exploring Risk Analysis Methods in IoE Projects: A Smart Campus Use Case
  3. Information Security Metrics: Challenges and Models in an All-Digital World
  4. Data Management in a Smart Campus Project: An Ontological Approach
  5. Editorial: Wireless Networks and IoT Applications
  6. Blockchain in the Public Sector: An Umbrella Review of Literature
  7. Blockchain and Sustainability in the Public Sector: A Risk Management Perspective
  8. Gain Enhancement of Diversity Slot Antenna Using FSS with Metamaterial Unit Cells for UWB Systems
  9. Low-Profile MM-Wave PIFA Array with Omni-Directional and Full-Coverage Radiations
  10. Cybersecurity
  11. Continuous Industrial Sector Cybersecurity Assessment Paradigm: Proposed Model of Cybersecurity Certification
  12. Dual-Band MIMO Antenna Array for Sub 6 GHz 5G Smartphone Applications
  13. Internal MIMO Antenna Design for Multi-Band Mobile Handset Applications
  14. Wideband and Low-Profile Phased Array Smartphone Antenna Supporting 28-38 GHz
  15. Virtual Lab Virtues in Distance Learning
  16. Cybersecurity in ICT Supply Chains: Key Challenges and a Relevant Architecture
  17. Information Security Assessment and Certification within Supply Chains
  18. Roadmap of Security threats between IPv4/IPv6
  19. Provisioning Cybersecurity in ICT Complex Supply Chains: An Overview, Key Issues and a Relevant Architecture
  20. The Future of Engineering Education: Current Challenges and Opportunities
  21. Distributed Architecture to Enhance Systems Protection against Unauthorized Activity via USB Devices
  22. Proposing an Architecture for IoT Based on WSN
  23. Plenary: The Challenges of Education in Engineering, Computing and Technology without exclusions: Innovation in the era of the Industrial Revolution 4.0
  24. EDGE4ALL: Edge Computing for Smart City
  25. Science and Technologies for Smart Cities
  26. Simulator for Smart City Environment
  27. Healthcare Critical Knowledge Monitor System Model: Healthcare Knowledge Capture Component Specification
  28. Trends in Engineering Education: a Disruptive View for not so far Future
  29. Promoting Creativity in Final Year Engineering Students' Project: a case study in the Smart Cities context
  30. Plenary: Modern Educational Paradigms for a Computer and Engineer Career
  31. EDGE4ALL - Edge Platform For Smart City
  32. Study of the Means of Online Payment in the Portuguese Population
  33. Work-in-Progress: Global Experiences for Engineering Programs
  34. International Experiences and the Implications for the Success of Engineering Programs
  35. Internationalization Project to Face the Uncertainties of Work Market
  36. Global perspectives on cybersecurity education
  37. Automatic human trajectory destination prediction from video
  38. Comparison and Evaluation of Organizational Transactions for Continuous Auditing and Business Compliance
  39. Message from the Technical Program Chair
  40. The Role of Professional Associations in Contemporaneous Engineer Careers
  41. Global perspectives on cybersecurity education for 2030: a case for a meta-discipline
  42. Engineering Education Program Promoting the Profession
  43. High Quality Engineering Program Achievement
  44. Proposing a Behavior-Based IDS Model for IoT Environment
  45. Rethinking engineering education
  46. Challenges and reflections in designing Cyber security curriculum
  47. Engineering Education: Balancing generalist and specialist formation in technological carriers: A current challenge
  48. Self-oriented learning based on intelligent systems into the workplace
  49. Pointer dynamics as cognitive biometrics
  50. Evaluating Information Systems with Continuous Assurance Services
  51. What is Missing for Trust in the Cloud Computing?
  52. Behavioural Biometrics for Authentication and Stress Detection – A Case Study with Children
  53. The Information Value: Perception of the Problem
  54. Automatic visual detection of human behavior: A review from 2000 to 2014
  55. Automatic Human Action Recognition from Video Using Hidden Markov Model
  56. Detection of Dangerous Situations Using a Smart Internet of Things System
  57. An Immunity Based Configuration for Multilayer Single Featured Biometric Authentication Algorithms
  58. Child Abuse Monitor System Model: A Health Care Critical Knowledge Monitor System
  59. Insider Threats: The Major Challenge to Security Risk Management
  60. Monitoring Organizational Transactions in Enterprise Information Systems with Continuous Assurance Requirements
  61. Security metrics to evaluate organizational IT security
  62. Management of internal control mechanisms in ERP for continuous monitoring purposes
  63. Determinants of Behavioral Intention to Mobile Banking in Arab Culture
  64. Enrolment time as a requirement for biometric fingerprint recognition
  65. Free Typed Text Using Keystroke Dynamics for Continuous Authentication
  66. Organizational transactions with real time monitoring and auditing
  67. An Enterprise Ontology-Based Database for Continuous Monitoring Application
  68. Health users' perception of biometric authentication technologies
  69. Biometrics acceptance in Arab culture: An exploratory study
  70. A Study of Biometric Authentication Adoption in Health Services
  71. Specialized Knowledge Systems – A Model for Intelligent Learning Management within Organizations
  72. User’s Requirements in Internet Access Sharing
  73. Botnets
  74. Keystroke Dynamics for Continuous Access Control Enforcement
  75. Continuous Assurance on Organizational Transactions
  76. Wireless Identity Management
  77. A solution for real time monitoring and auditing of organizational transactions
  78. Automation of the Approval and Control Process of Documents
  79. Biometric technologies and their perception by the common citizen
  80. Study of the Perception on the Biometric Technology by the Portuguese Citizens
  81. Grid data mining by means of learning classifier systems and distributed model induction
  82. A Security Framework for Audit and Manage Information System Security
  83. User acceptance OTM machine: in the Arab culture
  84. OTM Machine Acceptance: In the Arab Culture
  85. Multimodal Biometrics and Multilayered IDM for Secure Authentication
  86. A Security Audit Framework to Manage Information System Security
  87. An audit framework to support information system security management
  88. Automation of the Approval and Control Process of Documents
  89. Cyberwar and the Russian Federation: the usual suspect
  90. Methods of Organizational Information Security
  91. Education and Technology for a Better World
  92. An Ontology Based Approach to Information Security
  93. Prediction of Abnormal Behaviors for Intelligent Video Surveillance Systems
  94. A machine learning approach to keystroke dynamics based user authentication
  95. Data Mining a Prostate Cancer Dataset Using Rough Sets
  96. Data Mining a Keystroke Dynamics Based Biometrics Database Using Rough Sets
  97. Moving object detection unaffected by cast shadows, highlights and ghosts
  98. Architecture and Design of Distributed Embedded Systems
  99. A Methodology for Complex Embedded Systems Design
  100. A heterogeneous computer vision architecture: Implementation issues
  101. Password Sharing and How to Reduce It
  102. Classical Engineering Education Revisited - Why it Matters
  103. Password Secured Sites — Stepping Forward with Keystroke Dynamics