Pedro Pinto

Orcid: 0000-0003-1856-6101

Affiliations:
  • Polytechnic Institute of Viana do Castelo, Portugal
  • University of Maia, Portugal
  • INESC TEC, Porto, Portugal


According to our database1, Pedro Pinto authored at least 54 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Privacy-Aware and AI Techniques for Healthcare Based on K-Anonymity Model in Internet of Things.
IEEE Trans. Engineering Management, 2024

ORAT - An Open Redirect Analysis Tool.
Proceedings of the 12th International Symposium on Digital Forensics and Security, 2024

The Status and Management of Web-Related Security at Higher Education Institutions in Poland.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

Data Quality Assessment for the Textile and Clothing Value-Chain Digital Product Passport.
Proceedings of the 26th International Conference on Enterprise Information Systems, 2024

Use of Visibility Graphs for the Early Detection of DoS Attacks.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024

An Overview of Threats Exploring the Confusion Between Top-Level Domains and File Type Extensions?
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024

2023
Towards data security assessments using an IDS security model for cyber-physical smart cities.
Inf. Sci., November, 2023

Cost-Effective Resources for Computing Approximation Queries in Mobile Cloud Computing Infrastructure.
Sensors, September, 2023

Enhanced resource allocation in distributed cloud using fuzzy meta-heuristics optimization.
Comput. Commun., September, 2023

Cyber-Physical Systems: Security Threats and Countermeasures.
J. Sens. Actuator Networks, February, 2023

A hybrid heuristics artificial intelligence feature selection for intrusion detection classifiers in cloud of things.
Clust. Comput., February, 2023

DMAIDPS: a distributed multi-agent intrusion detection and prevention system for cloud IoT environments.
Clust. Comput., February, 2023

Mapping and embedding infrastructure resource management in software defined networks.
Clust. Comput., February, 2023

On the Performance of Secure Sharing of Classified Threat Intelligence between Multiple Entities.
Sensors, January, 2023

Toward a Secure Industrial Wireless Body Area Network Focusing MAC Layer Protocols: An Analytical Review.
IEEE Trans. Ind. Informatics, 2023

An intelligent energy-efficient approach for managing IoE tasks in cloud platforms.
J. Ambient Intell. Humaniz. Comput., 2023

An Energy-optimized Embedded load balancing using DVFS computing in Cloud Data centers.
Comput. Commun., 2023

Boosting additive circular economy ecosystems using blockchain: An exploratory case study.
Comput. Ind. Eng., 2023

Using Reinforcement Learning to Reduce Energy Consumption of Ultra-Dense Networks With 5G Use Cases Requirements.
IEEE Access, 2023

On the Use of VGs for Feature Selection in Supervised Machine Learning - A Use Case to Detect Distributed DoS Attacks.
Proceedings of the Optimization, Learning Algorithms and Applications, 2023

A Survey and Risk Assessment on Virtual and Augmented Reality Cyberattacks.
Proceedings of the 30th International Conference on Systems, Signals and Image Processing, 2023

An Overview of HTTPS and DNSSEC Services Adoption in Higher Education Institutions in Brazil.
Proceedings of the 25th International Conference on Advanced Communication Technology, 2023

A Review on Cryptocurrency Transaction Methods for Money Laundering.
Proceedings of the 5th International Conference on Finance, 2023

Assessing Cybersecurity Hygiene and Cyber Threats Awareness in the Campus - A Case Study of Higher Education Institutions in Portugal and Poland.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

A Taxonomy for Tsunami Security Scanner Plugins.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

Severity Analysis of Web3 Security Vulnerabilities Based on Publicly Bug Reports.
Proceedings of the Blockchain and Applications, 5th International Congress, 2023

2022
Exploiting Online Services to Enable Anonymous and Confidential Messaging.
J. Cybersecur. Priv., August, 2022

CL-MLSP: The design of a detection mechanism for sinkhole attacks in smart cities.
Microprocess. Microsystems, April, 2022

Improving Quality of Service in 5G Resilient Communication with the Cellular Structure of Smartphones.
ACM Trans. Sens. Networks, 2022

GSAGA: A hybrid algorithm for task scheduling in cloud infrastructure.
J. Supercomput., 2022

NEWTR: a multipath routing for next hop destination in internet of things with artificial recurrent neural network (RNN).
Int. J. Mach. Learn. Cybern., 2022

Traffic flow control using multi-agent reinforcement learning.
J. Netw. Comput. Appl., 2022

A Vote-Based Architecture to Generate Classified Datasets and Improve Performance of Intrusion Detection Systems Based on Supervised Learning.
Future Internet, 2022

Exploiting Physical Layer Vulnerabilities in LoRaWAN-based IoT Networks.
Proceedings of the 8th IEEE World Forum on Internet of Things, 2022

Prototyping the IDS Security Components in the Context of Industry 4.0 - A Textile and Clothing Industry Case Study.
Proceedings of the Ubiquitous Security - Second International Conference, 2022

2021
A Review of Attacks, Vulnerabilities, and Defenses in Industry 4.0 with New Challenges on Data Sovereignty Ahead.
Sensors, 2021

Distributed Architecture to Enhance Systems Protection against Unauthorized Activity via USB Devices.
J. Sens. Actuator Networks, 2021

Special Issue "Security Threats and Countermeasures in Cyber-Physical Systems".
J. Sens. Actuator Networks, 2021

An Advertising Overflow Attack Against Android Exposure Notification System Impacting COVID-19 Contact Tracing Applications.
IEEE Access, 2021

An Overview of the Status of DNS and HTTP Security Services in Higher Education Institutions in Portugal.
Proceedings of the Science and Technologies for Smart Cities, 2021

A Performance Assessment of Free-to-Use Vulnerability Scanners - Revisited.
Proceedings of the ICT Systems Security and Privacy Protection, 2021

Controlled and Secure Sharing of Classified Threat Intelligence between Multiple Entities.
Proceedings of the IEEE International Mediterranean Conference on Communications and Networking, 2021

A System Architecture to Detect and Block Unwanted Wireless Signals in a Classroom (Short Paper).
Proceedings of the Second International Computer Programming Education Conference, 2021

Using Syntactic Similarity to Shorten the Training Time of Deep Learning Models using Time Series Datasets: A Case Study.
Proceedings of the 2nd International Conference on Deep Learning Theory and Applications, 2021

A Smart Contract Architecture to Enhance the Industrial Symbiosis Process Between the Pulp and Paper Companies - A Case Study.
Proceedings of the Blockchain and Applications - 3rd International Congress, 2021

2020
The Use of ARM-Assembly Language and a Raspberry Pi 1 B+ as a Server to Improve Computer Architecture Skills.
Proceedings of the First International Computer Programming Education Conference, 2020

A Framework for On-Demand Reporting of Cryptocurrency Ownership and Provenance.
Proceedings of the Blockchain and Applications - 2nd International Congress, 2020

2019
The Security Challenges Emerging from the Technological Developments.
Mob. Networks Appl., 2019

OSSEC IDS Extension to Improve Log Analysis and Override False Positive or Negative Detections.
J. Sens. Actuator Networks, 2019

2018
On the Track of ISO/IEC 27001: 2013 Implementation Difficulties in Portuguese Organizations.
Proceedings of the 9th IEEE International Conference on Intelligent Systems, 2018

System Protection Agent Against Unauthorized Activities via USB Devices.
Proceedings of the 3rd International Conference on Internet of Things, 2018

2014
Delay Accounting Optimization Procedure to Enhance End-to-End Delay Estimation in WSNs.
Proceedings of the Wireless Internet - 8th International Conference, 2014

RPL modifications to improve the end-to-end delay estimation in WSN.
Proceedings of the 11th International Symposium on Wireless Communications Systems, 2014

2013
End-to-end delay estimation using RPL metrics in WSN.
Proceedings of the IFIP Wireless Days, 2013


  Loading...