Journal Articles 2020(1 publication) [publication]João Henriques and Caldeira, F. and Tiago Cruz and Simões, P. , "Combining K-Means and XGBoost Models for Anomaly Detection Using Log Datasets", Electronics (ISSN 2079-9292). Special Issue "Advanced Cybersecurity Services Design", vol. 9, 2020 2019(1 publication) [publication]João Henriques and Caldeira, F. and Tiago Cruz and Simões, P. , "On the Use of Ontology Data for Protecting Critical Infrastructures", Journal of Information Warfare - ISSN 1445-3312 (print) / ISSN 1445-3347 (online), vol. 17, pp. 38-55, 2019 2013(1 publication) [publication]Caldeira, F. and Schaberreiter, T. and Varrete, S. and Edmundo Monteiro and Simões, P. and Bouvry, P. and Khadraoui@tudor.lu, D. , "Trust based interdependency weighting for online risk monitoring in interdependent critical infrastructures", International Journal of Secure Software Engineering (IJSSE), vol. 4, 2013 [citation][year=2019]T. Schaberreiter, V. Kupfersberger, K. Rantos, A. Spyros, A. Papanikolaou, C. Ilioudis, and G. Quirchmayr. 2019. A Quantitative Evaluation of Trust in the Quality of Cyber Threat Intelligence Sources. In Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES '19). ACM, New York, NY, USA, Article 83, 10 pages. DOI: https://doi.org/10.1145/3339252.3342112 2012(1 publication) [publication]Castrucci, M. and Neri, A. and Caldeira, F. and Aubert, J. and Khadraoui@tudor.lu, D. and Aubigny, M. and Harpes, C. and Simões, P. and Suraci, V. and Capodieci, P. , "Design and implementation of a mediation system enabling secure communication among Critical Infrastructures", International Journal of Critical Infrastructure Protection, vol. 5, pp. 86-97, 2012 [citation][year=2018]Talha, M., Malik, M., Hamza, A., Batool, K. and Akram, M., 2018. Hawk eye security-security IOT deveices from cyber attacks. MCS. (BSc Thesis, http://111.68.101.240/xmlui/bitstream/handle/123456789/1153/HAWK EYE SECURITY.pdf?sequence=1) [citation][year=2016]O. A. Alsulami, Strategies and Prospects of Information and Knowledge Security, International Journal of Humanities and Cultural Studies (ISSN 2356-5926), Special Issue August 2016, pp.337-348, 2016. [citation][year=2015]Ercan Nurcan Yilmaz, Halil ?brahim Ulus, Serkan Gonen, Bilgi Toplumuna Geçi? Ve Siber Güvenlik, International Journal of Informatics Technicalogies, V.8, N.3, 2015, http://dx.doi.org/10.17671/btd.87028 [citation][year=2014]M. Leo, F. Battisti, M. Carli, A. Neri, A federated architecture approach for Internet of Things security, Proc. of Euro Med Telco Conference 2014 (EMTC), Naples, Italy, Nov. 2014. [citation][year=2013]Thomas Schaberreiter, A Bayesian Network Based On-line Risk Prediction Framework for Interdependent Critical Infrastructures, PhD Thesis, University of Oulu, Finland, October 2013. 2010(1 publication) [publication]Caldeira, F. and Edmundo Monteiro and Simões, P. , "Trust and reputation management for critical infrastructure protection", Int. J. Electronic Security and Digital Forensics, 2010 [citation][year=2014]Sahli Nabil, Benmohammed Mohamed, El–Bay Bourennane, “Ontology and protocol secure for SCADA”, International Journal of Metadata, Semantics and Ontologies, vol. 9(2), pp. 114-127, 2014. 2004(1 publication) [publication]Caldeira, F. and Edmundo Monteiro , "Policy-Based Networking: Applications to Firewall Management", Annals of Telecommunications - Policy-based network management, vol. 59, 2004 Conference Articles 2018(3 publications) [publication]João Henriques and Caldeira, F. and Tiago Cruz and Simões, P. , "On the Use of Ontology Data for Protecting Critical Infrastructures", in in Proc. of ECCWS 2018 - 17th European Conference on Cyber Warfare and Security (Publishers: ACPI, UK). ISBN: 978-1-911218-85-2, 2018 [publication]Maryam Abbasi and Sá, F. and Caldeira, F. and Tomé, P. and Furtado, P. and Wanzeller, C. and Martins, P.M.O. , "NoSQL Scalability Performance Evaluation over Cassandra", in International Conference Europe Middle East & North Africa Information Systems and Technologies to Support Learning, 2018 [publication]Cecílio, J. and Caldeira, F. and Wanzeller, C. , "CityMii - An integration and interoperable middleware to manage a Smart City", in The 9th International Conference on Ambient Systems, Networks and Technologies (ANT 2018) / The 8th International Conference on Sustainable Energy Information Technology (SEIT-2018) / Affiliated Workshops, 2018 2017(1 publication) [publication]Rosa, L. and J. Proenca and João Henriques and Graveto, V. and Tiago Cruz and Simões, P. and Caldeira, F. and Edmundo Monteiro , "An evolved security architecture for distributed Industrial Automation and Control Systems", in In Proc. of 16th European Conference on Cyber Warfare and Security (ECCWS 2017). ISBN: 978-1-911218-43-2, 2017 [citation][year=2018]Raposo, Duarte & Rodrigues, André & Sinche, Soraya & Sá Silva, Jorge & Boavida, Fernando. (2018). Securing WirelessHART: Monitoring, Exploring and Detecting New Vulnerabilities. 1-9. 10.1109/NCA.2018.8548060. 2011(2 publications) [publication]Caldeira, F. and Schaberreiter, T. and Edmundo Monteiro and Aubert, J. and Simões, P. and Khadraoui@tudor.lu, D. , "Trust based interdependency weighting for on-line risk monitoring in interdependent critical infrastructures", in 6th International Conference on Risk and Security of Internet and Systems (CRiSIS), 2011, 2011 [citation][year=2017]R. C. Cardoso, “Enhancing Trustability in MMOGs Environments”, PhD Thesis, Universidade da Beira Interior, Covilhã-Portugal, January 2017 [citation][year=2016]R. C. Cardoso; A. J. P. Gomes; M. M. Freire, "A User Trust System for Online Games – Part I: An Activity Theory Approach for Trust Representation," in IEEE Transactions on Computational Intelligence and AI in Games , vol.PP, no.99, pp.1-1, doi: 10.1109/TCIAIG.2016.2592965 [citation][year=2015]C. Alippi, R. Camplani, A. Marullo, M. Roveri, “Algorithms and Tools for Intelligent Monitoring of Critical Infrastructure Systems”, in Intelligent Monitoring, Control, and Security of Critical Infrastructure Systems, E. Kyriakides, M. Polycarpou (Eds.), pp 167-184, Springer Studies in Computational Intelligence 565, 2015 doi: 10.1007/978-3-662-44160-2_6 [publication]Schaberreiter, T. and Caldeira, F. and Aubert, J. and Edmundo Monteiro and Khadraoui@tudor.lu, D. and Simões, P. , "Assurance and trust indicators to evaluate accuracy of on-line risk in critical infrastructures", in 6th Int. Conf. on Critical Infrastructures Information Security (CRITIS 2011), 2011 2010(4 publications) [publication]Caldeira, F. and Castrucci, M. and Aubigny, M. and Macone, D. and Edmundo Monteiro and Rente, F.N. and Simões, P. and Suraci, V. , "Secure Mediation Gateway Architecture Enabling the Communication Among Critical Infrastructures", in Future Network and MobileSummit 2010 Conference, 2010 [citation][year=2017]A. Di Giorgio, A. Giuseppi, F. Liberali, A. Ornatelli, A. Rabezzano and L. R. Celsi, "On the optimization of energy storage system placement for protecting power transmission grids against dynamic load altering attacks," 2017 25th Mediterranean Conference on Control and Automation (MED), Valletta, Malta, 2017, pp. 986-992. doi: 10.1109/MED.2017.7984247 [citation][year=2017]A. Di Giorgio, A. Giuseppi, F. Liberati and A. Pietrabissa, "Controlled electricity distribution network black start with energy storage system support," 2017 25th Mediterranean Conference on Control and Automation (MED), Valletta, Malta, 2017, pp. 781-786. doi: 10.1109/MED.2017.7984213 [citation][year=2016]Titus Okathe, Shahram Shah Heydari, Vijay Sood, Orane Cole and Khalil El-Khatib, Miffleware for Smart Heterogeneous Critical Infrastructure Networks Intercommunication, International Journal on Smart Sensing and Intelligent Systems, pp. 1261-1286, V.9, N.3, September 2016 [citation][year=2014]Titus Okathe, Publish-subscribe based Middleware for Heterogeneous Critical Infrastructure Systems Communication, PhD Thesis, University of Ontario Institute of Technology, July 2014. [citation][year=2014]Okathe, Titus; Heydari, Shahram Shah; Sood, Vijay; El-Khatib, Khalil, "Unified multi-critical infrastructure communication architecture," Communications (QBSC), 2014 27th Biennial Symposium on, vol., no., pp.178,183, 1-4 June 2014, doi: 10.1109/QBSC.2014.6841209 [citation][year=2013]Pingal Raj Sapkota, “Security Evaluation of Substation Network Architectures, MSc Thesis, Michigan Technological University, 2013. http://digitalcommons.mtu.edu/etds/647/ [publication]Caldeira, F. and Edmundo Monteiro and Simões, P. , "Trust and Reputation Management for Critical Infrastructure Protection", in Proc. of the 6th Int. Conf. on Global Security, Safety and Sustainability (ICG3S 2010), 2010 [citation][year=2015]M. Asad, C. A. Le Dantec, Illegitimate Civic Participation: Supporting Community Activists on the Ground, CSCW '15, March 14 – 18, 2015, Vancouver, BC, Canada. DOI: 10.1145/2675133.2675212 [publication]Caldeira, F. and Edmundo Monteiro and Simões, P. , "Trust and Reputation for Information Exchange in Critical Infrastructures", in Proc. of the 5th Int. Conf. on Critical Information Infrastructure Security (CRITIS 2010), 2010 [citation][year=2019]Thomas Schaberreiter, Veronika Kupfersberger, Konstantinos Rantos, Arnolnt Spyros, Alexandros Papanikolaou, Christos Ilioudis, and Gerald Quirchmayr. 2019. A Quantitative Evaluation of Trust in the Quality of Cyber Threat Intelligence Sources. In Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES '19). ACM, New York, NY, USA, Article 83, 10 pages. DOI: https://doi.org/10.1145/3339252.3342112 [citation][year=2019]Asad, Mariam. "Sculpting reality from our dreams: prefigurative design for civic engagement." PhD diss., Georgia Institute of Technology, 2019. [citation][year=2015]Mariam Asad and Christopher A. Le Dantec. 2015. Illegitimate Civic Participation: Supporting Community Activists on the Ground. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW '15). ACM, New York, NY, USA, 1694-1703. DOI=http://dx.doi.org/10.1145/2675133.2675156 [publication]Capodieci, P. and Ciancamerla, E. and Minichino, M. and Landi, G. and Lev, L. and Castrucci, M. and Simões, P. and Panzieri, S. and Caldeira, F. , "Improved Resilience of Interdependent Critical Infrastructures via on-line Alerting System", in Proceedings of COMPENG 2010 - Complexity in Engineering, 2010 [citation][year=2018]Giuseppi, Alessandro & Germanà, Roberto & Di Giorgio, Alessandro. (2018). Risk Adverse Virtual Power Plant Control in Unsecure Power Systems. 1-9. 10.1109/MED.2018.8442768. [citation][year=2017]A. Di Giorgio, A. Giuseppi, F. Liberali, A. Ornatelli, A. Rabezzano and L. R. Celsi, "On the optimization of energy storage system placement for protecting power transmission grids against dynamic load altering attacks," 2017 25th Mediterranean Conference on Control and Automation (MED), Valletta, Malta, 2017, pp. 986-992. doi: 10.1109/MED.2017.7984247 [citation][year=2017]A. Di Giorgio, A. Giuseppi, F. Liberati and A. Pietrabissa, "Controlled electricity distribution network black start with energy storage system support," 2017 25th Mediterranean Conference on Control and Automation (MED), Valletta, Malta, 2017, pp. 781-786. doi: 10.1109/MED.2017.7984213 [citation][year=2016]Titus Okathe, Shahram Shah Heydari, Vijay Sood, Orane Cole and Khalil El-Khatib, Miffleware for Smart Heterogeneous Critical Infrastructure Networks Intercommunication, International Journal on Smart Sensing and Intelligent Systems, pp. 1261-1286, V.9, N.3, September 2016 [citation][year=2015]A. Fiaschetti, A. Lanna, M. Panfili, S. Mignanti, A. Pietrabissa, F. Delli Priscoli, R. Cusani, G. Scarano, A. Morgagni, “Attack-Surface metrics, OSSTMM and Common Criteria based approach to Composable Security in Complex Systems”, WSEAS Transactions on Systems, Vol. 14, 2015, pp. 187-202, E-ISSN: 2224-2678. [citation][year=2015]S. Battilotti, F. Delli Priscoli, C. Gori Giorgi, A. Pietrabissa, S. Monaco, M. Panfili, S. Canale, V. Suraci, Approaches for Future Internet architecture design and Quality of Experience (QoE) Control, WSEAS Transactions on Communications, Vol.14, pp. 62-73, 2015. E-ISSN: 2224-2864. [citation][year=2015]Gambuti, Raffaele; Canale, Silvia; Facchinei, Francisco; Lanna, Andrea; Giorgio, Alessandro Di, "Electric vehicle trip planning integrating range constraints and charging facilities," Control and Automation (MED), 2015 23th Mediterranean Conference on, vol., no., pp.472-479, 16-19 June 2015 doi: 10.1109/MED.2015.7158793 [citation][year=2014]Titus Okathe, Publish-subscribe based Middleware for Heterogeneous Critical Infrastructure Systems Communication, PhD Thesis, University of Ontario Institute of Technology, July 2014. [citation][year=2014]Okathe, T.; Heydari, S.S.; Sood, V.; El-Khatib, K., "Unified multi-critical infrastructure communication architecture," Communications (QBSC), 2014 27th Biennial Symposium on , vol., no., pp.178,183, 1-4 June 2014 doi: 10.1109/QBSC.2014.6841209 [citation][year=2013]Jianmin Jiang, Lasith Yasakethu, Intelligent risk detection and analysis tools for critical infrastructure protection, EUROCON, 2013 IEEE, pp.52-59, 1-4 July 2013, doi: 10.1109/EUROCON.2013.6624965 [citation][year=2013]Jianmin Jiang, Lasith Yasakethu, Computerized risk detection towards Critical Infrastructure Protection: An Introduction of CockpitCI Project, Proc. of the 1st Global Virtual Conference, pp. 602-606, Fyr, Macedonia, 8-12 April 2013, ISBN 978-80-554-0649-7 [citation][year=2010]Michael Kennedy, David Llewellyn-Jones, Qi Shi, Madjid Merabti, "System-of-Systems Security: A Survey", The 11th Annual Conference on the Convergence of Telecommunications, Networking & Broadcasting (PGNet 2010), Liverpool, UK, 21-22 June 2010 2002(2 publications) [publication]Caldeira, F. and Edmundo Monteiro , "Gestão por políticas: arquitectura e aplicações", in CRC'2002, 2002 [publication]Caldeira, F. and Edmundo Monteiro , "A policy-based approach to firewall management", in NetCon'2002, 2002 2000(1 publication) [publication]Caldeira, F. and Edmundo Monteiro , "Descrição, Geração e Difusão de Políticas de Segurança", in 3a Conferência sobre Redes de Computadores e Tecnologias e Aplicações, 2000 Book Chapters 2020(1 publication) [publication]Rosa, L. and Freitas, M.B.d. and João Henriques and Quitério, P. and Caldeira, F. and Tiago Cruz and Simões, P. , "Evolving the Security Paradigm for Industrial IoT Environments", in Cyber Security of Industrial Control Systems in the Future Internet Environment (upcoming), ISBN13: 9781799829102, ISBN10: 1799829103, EISBN13: 9781799829126, DOI: 10.4018/978-1-7998-2910-2, vol. N/A, 2020 2015(1 publication) [publication]Caldeira, F. and Tiago Cruz and Simões, P. and Edmundo Monteiro , "Towards protecting critical infrastructures ", in Cybersecurity Policies and Strategies for Cyberwarfare Prevention, vol. 1, pp. 123-169, 2015 [citation][year=2019]van Niekerk, Brett. "Economic Information Warfare: Classifying Cyber-Attacks Against Commodity Value Chains." International Conference on Cyber Warfare and Security. Academic Conferences International Limited, 2019. [citation][year=2019]Sö?üt, Esra & Erdem, Ayhan. (2019). A Review of Research Studies on Cyber Terror. In book: Applying Methods of Scientific Inquiry Into Intelligence, Security, and Counterterrorism. DOI: 10.4018/978-1-5225-8976-1.ch008 [citation][year=2018]Piero Siroli, Gian. (2018). Considerations on the Cyber Domain as the New Worldwide Battlefield. The International Spectator. 53. 111-123. DOI:10.1080/03932729.2018.1453583. [citation][year=2018]Yu-Min Joo & Teck-Boon Tan (2018) Smart Cities: A New Age of Digital Insecurity, Survival, 60:2, 91-106, DOI: 10.1080/00396338.2018.1448577. URL (full paper): http://scholarbank.nus.sg/bitstream/10635/141601/1/10.108000396338.2018.1448577.pdf [citation][year=2017]Roger A. Hallman, Jose Romero-Mariona, et al., "Standardized and Repeatable Technology Evaluation for Cybersecurity Acquisition", SPAWAR Systems Pacific Technical Document 3316, February 2017. Available at: https://www.researchgate.net/profile/Roger_Hallman2/publication/316976845_Standardized_and_Repeatable_Technology_Evaluation_for_Cybersecurity_Acquisition/links/591b3e214585153b614fa208/Standardized-and-Repeatable-Technology-Evaluation-for-Cybersecurity-Acquisition.pdf [citation][year=2017]Kasemsap, K. "Robotics: Theory and Applications." In Cybersecurity Breaches and Issues Surrounding Online Threat Protection, pp. 311-345. IGI Global, 2017. DOI: 10.4018/978-1-5225-1941-6.ch013 PhD Theses 2014(1 publication) [publication]Caldeira, F. , "Trust and Reputation for Critical Infrastructure Protection", 2014 MSc Theses 2002(1 publication) [publication]Caldeira, F. , "Gestão por politicas / Aplicação a sistemas de firewall", 2002