Zobrazeno 1 - 10
of 57
pro vyhledávání: '"Rafael Timoteo De Sousa"'
Autor:
Kevin Herman Muraro Gularte, Jose Alfredo Ruiz Vargas, Joao Paulo Javidi da Costa, Antonio Santos da Silva, Giovanni Almeida Santos, Yuming Wang, Christian Alfons Muller, Christoph Lipps, Rafael Timoteo de Sousa Junior, Walter de Britto Vidal Filho, Philipp Slusallek, Hans Dieter Schotten
Publikováno v:
IEEE Access, Vol 12, Pp 72871-72895 (2024)
Vehicle-to-Everything (V2X) communication, essential for enhancing road safety, driving efficiency, and traffic management, must be robust against cybersecurity threats for successful deployment and acceptance. This survey comprehensively explores V2
Externí odkaz:
https://doaj.org/article/19f124b30704422b837bccbd2ebcce22
Autor:
Giovanni Almeida Santos, Guilherme Guy de Andrade, Geovana Ramos Sousa Silva, Francisco Carlos Molina Duarte, Joao Paulo Javidi Da Costa, Rafael Timoteo de Sousa
Publikováno v:
IEEE Access, Vol 10, Pp 8474-8486 (2022)
Managing and evolving a chatbot’s content is a laborious process and there is still a lack of standardization. In this context of standardization, the absence of a management process can lead to bad user experiences with a chatbot. This work propos
Externí odkaz:
https://doaj.org/article/d0de1a80a18442fdb007b4ca9df0cfda
Autor:
Karcius Day Rosario Assis, Raul Camelo De Andrade Almeida, Alex Ferreira Dos Santos, Leonardo Pereira Dias, William Ferreira Giozza, Rafael Timoteo De Sousa, Brigitte Jaumard, Reza Nejabati, Dimitra Simeonidou
Publikováno v:
IEEE Access, Vol 10, Pp 20714-20726 (2022)
Resource efficiency and survivability are critical concerns in elastic optical networks (EONs) with virtualization. In this paper, we investigate some important aspects in network survivability design against single-link failure under dedicated prote
Externí odkaz:
https://doaj.org/article/d342c33a2c36467683ad0c4428f14f1c
Improving Data Security, Privacy, and Interoperability for the IEEE Biometric Open Protocol Standard
Autor:
Eduardo Magalhaes De Lacerda Filho, Geraldo P. Pereira Rocha Filho, Rafael Timoteo De Sousa, Vinicius P. Goncalves
Publikováno v:
IEEE Access, Vol 10, Pp 26985-27001 (2022)
Enhancing security, privacy, and interoperability of biometric networks and protocols has been a challenge for many research works for many years. The several proposed approaches still need to integrate these three characteristics while showing secur
Externí odkaz:
https://doaj.org/article/dacdfad8580c46cd9c6746c0f47063f1
Autor:
Fernando Rocha Moreira, Demetrio Antonio Da Silva Filho, Georges Daniel Amvame Nze, Rafael Timoteo de Sousa Junior, Rafael Rabelo Nunes
Publikováno v:
IEEE Access, Vol 9, Pp 129605-129618 (2021)
This paper aims to show how creating a risk plan can be solved with the help of the constructivist multicriteria method. A case study using Multicriteria Decision Aid Constructivist (MCDA-C) was applied, with cybersecurity framework’s controls as a
Externí odkaz:
https://doaj.org/article/7a3a796cbe8a489795be3ae02626f3f7
Publikováno v:
IEEE Access, Vol 9, Pp 139928-139945 (2021)
Realizing fundamental cryptographic primitives with unconditional security is a central topic in information-theoretic cryptography. These primitives can be realized based on physical assumptions, such as the existence of noisy channels, an upper bou
Externí odkaz:
https://doaj.org/article/37ad00a9d0da48f3b0ebfb9e492c3417
Publikováno v:
IEEE Access, Vol 8, Pp 123735-123745 (2020)
In this work, we propose a new technique called Continuous Diffusion Analysis (CDA) that can be used to study, design, and compare of cryptographic algorithms. CDA allows us to generalize cryptographic algorithms by transforming the discrete bits int
Externí odkaz:
https://doaj.org/article/129927574d884c3d8b3f3b50c1d7f1ec
Autor:
Gabriel Arquelau Pimenta Rodrigues, Robson De Oliveira Albuquerque, Gabriel De Oliveira Alves, Fabio Lucio Lopes De Mendonca, William Ferreira Giozza, Rafael Timoteo De Sousa, Ana Lucila Sandoval Orozco
Publikováno v:
IEEE Access, Vol 8, Pp 95137-95152 (2020)
Instant Messaging (IM) provides near-real-time communication between users, which has shown to be a valuable tool for internal communication in companies and for general-purpose interaction among people. IM systems and supporting protocols, however,
Externí odkaz:
https://doaj.org/article/f12bd8d827eb42f5ba79af6d7bc7ac82
Autor:
Eder Souza Gualberto, Rafael Timoteo De Sousa, Thiago Pereira De Brito Vieira, Joao Paulo Carvalho Lustosa Da Costa, Claudio Gottschalg Duque
Publikováno v:
IEEE Access, Vol 8, Pp 223529-223547 (2020)
A phishing attack is a threat based on fraudulent communication, usually by e-mail, where the cybercriminals, impersonating a trusted person or organization, try to lure and coax a target. Phishing detection approaches that obtain highly representati
Externí odkaz:
https://doaj.org/article/67f66adf564d46f7b25c48416498c5e2
Autor:
Alexandre Pinheiro, Edna Dias Canedo, Rafael Timoteo De Sousa, Robson De Oliveira Albuquerque
Publikováno v:
IEEE Access, Vol 8, Pp 198548-198579 (2020)
The adoption of cloud computing solutions is an established reality in government agencies and in small, medium, and large companies due to procurement easiness and the variety of available services, as well as its low cost compared to the acquisitio
Externí odkaz:
https://doaj.org/article/9a5f2ae42dfb4ca1ada22d061b0f3f61