Vítor J. Sá
Catholic University of Portugal
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Vítor J. Sá.
International Journal of Electronic Security and Digital Forensics | 2012
Vítor J. Sá; Daniela Borges; Sérgio Tenreiro de Magalhães; Henrique Santos
This article presents the biometric technology and its perception by the common citizen in Portugal. The results of a systematic inquiry about the perception of the Portuguese on the biometric technology are presented, which involved 606 citizens. Through the article, we present the principal biometrics, subdivided in stealth and collaborative, and the main concepts on its evaluation. Following a simple method consisting in a survey by questionnaire, the most relevant conclusions are presented.
ICGS3/e-Democracy | 2011
Daniela Borges; Vítor J. Sá; Sérgio Tenreiro de Magalhães; Henrique Santos
This article presents the results of a systematic inquiry about the perception of the Portuguese on the biometric technology, which involved 606 citizens. It is presented the principal biometrics and the main concepts on its evaluation. Following a simple method consisting in a survey by questionnaire, the most relevant conclusions are presented.
integrating technology into computer science education | 2018
Allen Parrish; John Impagliazzo; Rajendra K. Raj; Henrique Santos; Muhammad Rizwan Asghar; Audun Jøsang; Teresa Susana Mendes Pereira; Vítor J. Sá; Eliana Stavrou
Global cybersecurity crises have compelled universities to address the demand for educated cybersecurity professionals. As no shared framework for cybersecurity as an academic discipline exists, growthhas been unfocused and driven by training materials, which make it harder to create a common body of knowledge. An international perspective is still harder, as different nations use different criteria to define local needs. As a result, new programs entering this space are on their own to conceptualize, design, package and market their programs, as there is no globally accepted reference model for cybersecurity to allow employers or students to understand the extent of a given cybersecurity program. Building on prior efforts at ITiCSE 2010 and 2011, other sources and participant experiences, this working group will develop a taxonomy of approaches to cybersecurity education, capture its dimensions, and develop a corresponding global reference model.
international conference on global security, safety, and sustainability | 2017
Ana Isabel Azevedo; Henrique Santos; Vítor J. Sá; Nuno Vasco Lopes
This article presents a stress detection model based on real time collection and analysis of physiological signals monitored by non-invasive and non-intrusive sensors. The assumption of a state of stress is made taking into account the validation of a certain number of biometric reactions to some specific situations. The biometric data collected is also used to create a method capable of guaranteeing user’s authentication. To validate this model, an experiment was set, demonstrating that it is possible to infer stressful situations by monitoring some specific physiological signals.
2016 23° Encontro Português de Computação Gráfica e Interação (EPCGI) | 2016
Liliana Cunha; Sérgio Tenreiro de Magalhães; Vítor J. Sá; Henrique Santos
Biometric authentication technologies aim to increase the precision of security systems and have given proof of their effectiveness. Cognitive biometrics, in particular, has shown the potential of raising security levels, although lacking somewhat in terms of precision and adequate research. Therefore, this study analyses the viability of the usage of the Pointer Dynamics biometric technique as cognitive biometrics, under certain conditions. To this end, an algorithm was developed, whose identity validation criterion is the execution of the individual pattern in the manner of interaction with the mouse, when selecting the grids of the graphic secret. Authentication and fraudulent authentication tests were conducted with two types of images, one with a supposed emotional meaning for the user, and one without. This was done so as to allow the comparison of results brought forth by the application of the technique with and without cognitive stimulus. Although results do not allow definite conclusions to be drawn, the fact is that the False Acceptance Rate of both the cognitive tests and graphs present marked relative variations, for thresholds between 4 and 7, which indicate that it is likely that the cognitive stimulus has increased the resistance to attempts of fraudulent authentication.
Global Security, Safety and Sustainability & e-Democracy. 7th International and 4th e-Democracy, Joint Conferences, ICGS3/e-Democracy 2011, Thessaloniki, Greece, August 24-26, 2011, Revised Selected Papers | 2012
Isabel Cerqueira; Vítor J. Sá; Sérgio Tenreiro de Magalhães
This article presents an analysis of the adoption the Citizen Card in Portugal based on a survey, in which 601 citizens participated. The survey focused on the knowledge of the card and of its features, as well as in the digital signature capabilities. First the survey population was informed about the concept of the Citizen Card, its applicability, and the technological mechanisms associated with their use. We extracted a set of conclusions, which may be useful to countries seeking to implement this type of technology/procedures.
iberian conference on information systems and technologies | 2011
Lurdes Faria; Vítor J. Sá; Sérgio Tenreiro de Magalhães
10th International Conference on Cyber Warfare and Security (ICCWS 2015) | 2015
João P. Carvalho; Vítor J. Sá; Sérgio Tenreiro de Magalhães; Henrique Santos
International Journal of Electronic Security and Digital Forensics | 2014
Vítor J. Sá; Sérgio Tenreiro de Magalhães; Henrique Santos
Procedia Computer Science | 2015
Sérgio Tenreiro de Magalhães; Maria José Magalhães; Vítor J. Sá