Nuno Mateus-Coelho
YOU?
Author Swipe
View article: AI-Driven Threats in Social Learning Environments - A Multivocal Literature Review
AI-Driven Threats in Social Learning Environments - A Multivocal Literature Review Open
In recent years, artificial intelligence (AI) has become important in improving educational processes by facilitating personalized learning and enhancing collaborative platforms. However, the same technologies that offer these advantages c…
View article: Efficient Git Repository Analysis: A Modular Plugin Approach
Efficient Git Repository Analysis: A Modular Plugin Approach Open
View article: Factores de stress e insatisfação num curso online
Factores de stress e insatisfação num curso online Open
O ensino online pertence à quarta geração do ensino à distância e apresenta um conjunto de factores que podem interferir na satisfação do estudante e causar momentos de insatisfação e de stress. Com a realização deste estudo pretendemos, p…
View article: Moringa oleifera Seed Cake: A Review on the Current Status of Green Nanoparticle Synthesis
Moringa oleifera Seed Cake: A Review on the Current Status of Green Nanoparticle Synthesis Open
Growing demands for sustainable and ecological nanoparticle synthesis methods have incentivized the scientific community to develop new approaches to counteract these challenges. Green synthesis resorts to biocomponents obtained from plant…
View article: Editorial - ARIS - Advanced Research on Information Security
Editorial - ARIS - Advanced Research on Information Security Open
As we delve into this Special Issue on Cybersecurity in Healthcare, part of Volume 4, Issue 1, we find ourselves at a pivotal moment, fully aware of the urgent issues defining cybersecurity in today's era. With each passing day, new vulner…
View article: Preface
Preface Open
View article: Evaluating Effectiveness and Security in Microservices Architecture
Evaluating Effectiveness and Security in Microservices Architecture Open
View article: Virtual Reality on Public Speaking Phobia mitigation
Virtual Reality on Public Speaking Phobia mitigation Open
The capacity to speak in public requires personal skills that not everyone has. Anxiety and nervousness, many times easily classified as phobia, can represent serious handicaps and committing the expected speaking performance. Being a subj…
View article: Paranoid Operating System: Wearable Trackers
Paranoid Operating System: Wearable Trackers Open
The use of wearable devices in conjunction with smartphone applications is at an all-time high and still growing daily. These devices communicate between themselves as well as with remote servers, and research indicates that all these comm…
View article: Evolving Cybersecurity Challenges in the Age of AI-Powered Chatbots: A Comprehensive Review
Evolving Cybersecurity Challenges in the Age of AI-Powered Chatbots: A Comprehensive Review Open
View article: Blockchain - Decentralized Bookmaker
Blockchain - Decentralized Bookmaker Open
Blockchain has become one of the great drivers of technological evolution of nowadays, making industries interested in the possible applications of that technology. One of the sectors that can benefit from this technology is the online bet…
View article: Enhancing Effectiveness and Security in Microservices Architecture
Enhancing Effectiveness and Security in Microservices Architecture Open
Microservices have allowed the decomposition of large monoliths and introduced the simple responsibility principle into its essence. It allowed complex systems to be more cost efficient and easily scalable. With this new architecture, new …
View article: Editorial - ARIS - Advanced Research on Information Security
Editorial - ARIS - Advanced Research on Information Security Open
Strong cybersecurity measures have never been more important than they are in the contemporary digital age when our reliance on networked information systems is growing at an ever-increasing rate. Individuals, corporations, and governments…
View article: Editorial of ARIS2 - Advanced Research on Information Systems Security, an International Journal
Editorial of ARIS2 - Advanced Research on Information Systems Security, an International Journal Open
In the dynamic landscape of contemporary cybersecurity, an arena perpetually shaped by rapid technological advancements and an ever-expanding threat landscape, the significance of staying abreast of the latest research and innovative ideas…
View article: Improving Social Engineering Resilience In Enterprises
Improving Social Engineering Resilience In Enterprises Open
Social Engineering (SE) is a significant problem for enterprises. Cybercriminals continue developing new and sophisticated methods to trick individuals into disclosing confidential information or granting unauthorized access to infrastruct…
View article: Green Synthesis and Antibacterial Activity of Silver Nanoparticles Obtained from Moringa oleifera Seed Cake
Green Synthesis and Antibacterial Activity of Silver Nanoparticles Obtained from Moringa oleifera Seed Cake Open
In the present work, we report a simple, cost-efficient, and eco-friendly green method to synthesize silver nanoparticles with antimicrobial activity. An ethanolic extract from Moringa oleifera seed residue was used as a reducing and stabi…
View article: ChevroCrypto – Blockchain Cryptographic File System Prototype
ChevroCrypto – Blockchain Cryptographic File System Prototype Open
The Internet of Things technologies are progressively being incorporated into the different difficulties that occur and ensuring data protection from these systems is becoming increasingly vital. There are various technologies available to…
View article: Methodology for Predictive Cyber Security Risk Assessment (PCSRA)
Methodology for Predictive Cyber Security Risk Assessment (PCSRA) Open
With the current impulse of Cyberattacks, data becomes of central importance. There are many challenges in how they are used that also need to be discussed. Defining the suitable cybersecurity incident response model is a critical challeng…
View article: Editorial - ARIS - Advanced Research on Information Security
Editorial - ARIS - Advanced Research on Information Security Open
The globe continues to support an abnormal occurrence that has a severe influence on cyber security, which is the conflict between Russia and Ukraine that persists in establishing the first cyber war. This assistance comes as the year 2022…
View article: Editorial of ARIS2 - Advanced Research on Information Systems Security, an International Journal
Editorial of ARIS2 - Advanced Research on Information Systems Security, an International Journal Open
As the year 2022 enters its middle range, the world is assisting an abnormal event with a heavy impact on cyber security, the Russian-Ukraine conflict. Since the beginning of this conflict that two immense groups have been created and expl…
View article: CyberSoc Framework a Systematic Review of the State-of-Art
CyberSoc Framework a Systematic Review of the State-of-Art Open
Security Operation Centers (SOCs) are a crucial service for enterprises looking to face the new global insecure environment, as well as retain compliance and control over threat management. While there are frameworks in place to address th…
View article: Paranoid OS: Wearable Trackers
Paranoid OS: Wearable Trackers Open
The use of wearable devices in conjunction with smartphone applications is at an all-time high, still growing daily. These devices are used to transmit and fetch sensitive user information to a remote server, but perhaps all these communic…
View article: Preface
Preface Open
View article: ChevroCrypto – Cryptography API
ChevroCrypto – Cryptography API Open
The world of IoT systems is increasingly inserted into people's daily lives, whether in people in general who systematically use these technologies in their daily lives and companies. With the growth of this technology, it also carries con…
View article: Editorial of ARIS2 - Advanced Research on Information Systems Security, an International Journal
Editorial of ARIS2 - Advanced Research on Information Systems Security, an International Journal Open
Securing information, actors, and their systems have become a paramount challenge in recent years.
In the first regular issue of 2021 of the ARIS2 - Advanced Research on Information Systems Security, an International Journal, in four of t…
View article: Secure Services Integration and Edge Computing for Effective Beekeeping
Secure Services Integration and Edge Computing for Effective Beekeeping Open
Many of the issues that require resolution are not easy to mitigate just from the technology perspective. The ancestral learned logic of processes, the people traditions, and many other variants define inner contexts that make the adhesion…
View article: Detection and Handling of Threats in Pre-Established Networks Through a Junior Perspective in Internship Scenario
Detection and Handling of Threats in Pre-Established Networks Through a Junior Perspective in Internship Scenario Open
In this paper, there are two questions that we seek to answer, what are the tools used in the industry nowadays regarding its cybersecurity? How is cybersecurity being approached and dealt with by the companies and their greatest difficult…
View article: Preface
Preface Open
View article: Encryption File System Framework - Proof of Concept
Encryption File System Framework - Proof of Concept Open
Edge Computing, also known as the IoT ecosystem, has recently become a cornerstone of computational evolution. Most recently, challenges emerged in the act of protecting such technology, hence it became increasingly popular in recent years…
View article: A New Methodology for the Development of Secure and Paranoid Operating Systems
A New Methodology for the Development of Secure and Paranoid Operating Systems Open
It has recently been discovered that large companies and nations "observe" their customers and citizens, disregarding any remaining moral and technological lines, being able to listen to telephone conversations and monitoring communication…