Skip to main content

Showing 1–5 of 5 results for author: Sousa, O

Searching in archive cs. Search in all archives.
.
  1. arXiv:2311.05281  [pdf, other

    cs.CR cs.SE

    Finding Software Vulnerabilities in Open-Source C Projects via Bounded Model Checking

    Authors: Janislley Oliveira de Sousa, Bruno Carvalho de Farias, Thales Araujo da Silva, Eddie Batista de Lima Filho, Lucas C. Cordeiro

    Abstract: Computer-based systems have solved several domain problems, including industrial, military, education, and wearable. Nevertheless, such arrangements need high-quality software to guarantee security and safety as both are mandatory for modern software products. We advocate that bounded model-checking techniques can efficiently detect vulnerabilities in general software systems. However, such an app… ▽ More

    Submitted 9 November, 2023; originally announced November 2023.

    Comments: 27 pages, submitted to STTT journal

  2. arXiv:2211.02627  [pdf

    eess.SP cs.AI cs.LG

    An IoT Cloud and Big Data Architecture for the Maintenance of Home Appliances

    Authors: Pedro Chaves, Tiago Fonseca, Luis Lino Ferreira, Bernardo Cabral, Orlando Sousa, Andre Oliveira, Jorge Landeck

    Abstract: Billions of interconnected Internet of Things (IoT) sensors and devices collect tremendous amounts of data from real-world scenarios. Big data is generating increasing interest in a wide range of industries. Once data is analyzed through compute-intensive Machine Learning (ML) methods, it can derive critical business value for organizations. Powerfulplatforms are essential to handle and process su… ▽ More

    Submitted 25 October, 2022; originally announced November 2022.

    Comments: 6 pages, 6 figures, IECON 2022

  3. arXiv:2112.01103  [pdf

    cs.CR

    A tool to support the investigation and visualization of cyber and/or physical incidents

    Authors: Inês Macedo, Sinan Wanous, Nuno Oliveira, Orlando Sousa, Isabel Praça

    Abstract: Investigating efficiently the data collected from a system's activity can help to detect malicious attempts and better understand the context behind past incident occurrences. Nowadays, several solutions can be used to monitor system activities to detect probable abnormalities and malfunctions. However, most of these systems overwhelm their users with vast amounts of information, making it harder… ▽ More

    Submitted 2 December, 2021; originally announced December 2021.

  4. A Comparative Analysis of Machine Learning Techniques for IoT Intrusion Detection

    Authors: João Vitorino, Rui Andrade, Isabel Praça, Orlando Sousa, Eva Maia

    Abstract: The digital transformation faces tremendous security challenges. In particular, the growing number of cyber-attacks targeting Internet of Things (IoT) systems restates the need for a reliable detection of malicious network activity. This paper presents a comparative analysis of supervised, unsupervised and reinforcement learning techniques on nine malware captures of the IoT-23 dataset, considerin… ▽ More

    Submitted 1 June, 2022; v1 submitted 25 November, 2021; originally announced November 2021.

    Comments: 16 pages, 12 tables, 4 figures, FPS 2021 conference

  5. arXiv:2111.10280  [pdf

    cs.CR cs.AI

    A Hybrid Approach for an Interpretable and Explainable Intrusion Detection System

    Authors: Tiago Dias, Nuno Oliveira, Norberto Sousa, Isabel Praça, Orlando Sousa

    Abstract: Cybersecurity has been a concern for quite a while now. In the latest years, cyberattacks have been increasing in size and complexity, fueled by significant advances in technology. Nowadays, there is an unavoidable necessity of protecting systems and data crucial for business continuity. Hence, many intrusion detection systems have been created in an attempt to mitigate these threats and contribut… ▽ More

    Submitted 19 November, 2021; originally announced November 2021.

    Comments: 11 pages, 5 figures, 1 table, ISDA conference