Henrique M. Dinis Santos

Affiliations:
  • University of Minho, Guimarães, Portugal


According to our database1, Henrique M. Dinis Santos authored at least 63 papers between 2000 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Continuous Industrial Sector Cybersecurity Assessment Paradigm* : Proposed Model of Cybersecurity Certification.
Proceedings of the 18th International Conference on the Design of Reliable Communication Networks, 2022

2021
Cybersecurity in ICT Supply Chains: Key Challenges and a Relevant Architecture.
Sensors, 2021

Distributed Architecture to Enhance Systems Protection against Unauthorized Activity via USB Devices.
J. Sens. Actuator Networks, 2021

Information Security Assessment and Certification within Supply Chains.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2019
Trends in Engineering Education: a Disruptive View for not so far Future.
Proceedings of the 18th International Conference on Information Technology Based Higher Education and Training, 2019

Study of the Means of Online Payment in the Portuguese Population.
Proceedings of the 12th IEEE International Conference on Global Security, 2019

2018
Comparison and Evaluation of Organizational Transactions for Continuous Auditing and Business Compliance.
Int. J. Inf. Syst. Model. Des., 2018

Automatic human trajectory destination prediction from video.
Expert Syst. Appl., 2018

International Experiences and the Implications for the Success of Engineering Programs.
Proceedings of the IEEE International Conference on Teaching, 2018

Proposing a Behavior-Based IDS Model for IoT Environment.
Proceedings of the Information Systems: Research, Development, Applications, Education, 2018

Global perspectives on cybersecurity education.
Proceedings of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education, 2018

Global perspectives on cybersecurity education for 2030: a case for a meta-discipline.
Proceedings of the Proceedings Companion of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education, 2018

Internationalization Project to Face the Uncertainties of Work Market.
Proceedings of the IEEE Frontiers in Education Conference, 2018

2017
Human Skeleton Detection from Semi-constrained Environment Video.
Proceedings of the 12th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISIGRAPP 2017) - Volume 5: VISAPP, Porto, Portugal, February 27, 2017

Knowledge Security - An Empirical Use of IT - Child Abuse Monitor System Model.
Proceedings of the 3rd International Conference on Information and Communication Technologies for Ageing Well and e-Health, 2017

Rethinking engineering education.
Proceedings of the 2017 IEEE Frontiers in Education Conference, 2017

2016
Evaluating Information Systems with Continuous Assurance Services.
Int. J. Inf. Syst. Serv. Sect., 2016

The Information Value: Perception of the Problem.
Proceedings of the New Advances in Information Systems and Technologies, 2016

What is Missing for Trust in the Cloud Computing?
Proceedings of the 2016 ACM SIGMIS Conference on Computers and People Research, 2016

2015
Monitoring Organizational Transactions in Enterprise Information Systems with Continuous Assurance Requirements.
Int. J. Enterp. Inf. Syst., 2015

Automatic visual detection of human behavior: A review from 2000 to 2014.
Expert Syst. Appl., 2015

Detection of Dangerous Situations Using a Smart Internet of Things System.
Proceedings of the New Contributions in Information Systems and Technologies, 2015

An Immunity Based Configuration for Multilayer Single Featured Biometric Authentication Algorithms.
Proceedings of the Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security, 2015

Insider Threats: The Major Challenge to Security Risk Management.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

Automatic Human Action Recognition from Video Using Hidden Markov Model.
Proceedings of the 18th IEEE International Conference on Computational Science and Engineering, 2015

2014
Conceptual Model for Specialized Learning Systems within Organizations.
Int. J. Syst. Serv. Oriented Eng., 2014

Enrolment time as a requirement for biometric fingerprint recognition.
Int. J. Electron. Secur. Digit. Forensics, 2014

Child Abuse Monitor System Model: A Health Care Critical Knowledge Monitor System.
Proceedings of the Internet of Things. User-Centric IoT, 2014

Security metrics to evaluate organizational IT security.
Proceedings of the 8th International Conference on Theory and Practice of Electronic Governance, 2014

Free Typed Text Using Keystroke Dynamics for Continuous Authentication.
Proceedings of the Communications and Multimedia Security, 2014

2013
Information Security Management: A Case Study in a Portuguese Military Organization.
Int. J. Cyber Warf. Terror., 2013

User's Requirements in Internet Access Sharing.
Proceedings of the Advances in Information Systems and Technologies [WorldCIST'13, 2013

A Study of Biometric Authentication Adoption in Health Services.
Proceedings of the Advances in Information Systems and Technologies [WorldCIST'13, 2013

Specialized Knowledge Systems - A Model for Intelligent Learning Management within Organizations.
Proceedings of the Advances in Information Systems and Technologies [WorldCIST'13, 2013

An Enterprise Ontology-Based Database for Continuous Monitoring Application.
Proceedings of the IEEE 15th Conference on Business Informatics, 2013

Health users' perception of biometric authentication technologies.
Proceedings of the 26th IEEE International Symposium on Computer-Based Medical Systems, 2013

2012
Biometric technologies and their perception by the common citizen.
Int. J. Electron. Secur. Digit. Forensics, 2012

Botnets: a heuristic-based detection framework.
Proceedings of the 5th International Conference of Security of Information and Networks, 2012

An Ontology Approach in Designing Security Information Systems to Support Organizational Security Risk Knowledge.
Proceedings of the KEOD 2012 - Proceedings of the International Conference on Knowledge Engineering and Ontology Development, Barcelona, Spain, 4, 2012

Keystroke Dynamics for Continuous Access Control Enforcement.
Proceedings of the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2012

Continuous Assurance on Organizational Transactions.
Proceedings of the 2012 IEEE/ACIS 11th International Conference on Computer and Information Science, Shanghai, China, May 30, 2012

2011
Study of the Perception on the Biometric Technology by the Portuguese Citizens.
Proceedings of the Global Security, Safety and Sustainability & e-Democracy, 2011

Grid data mining by means of learning classifier systems and distributed model induction.
Proceedings of the 13th Annual Genetic and Evolutionary Computation Conference, 2011

2010
User acceptance OTM machine: in the Arab culture.
Int. J. Electron. Secur. Digit. Forensics, 2010

An audit framework to support information system security management.
Int. J. Electron. Secur. Digit. Forensics, 2010

Cyberwar and the Russian Federation: the usual suspect.
Int. J. Electron. Secur. Digit. Forensics, 2010

OTM Machine Acceptance: In the Arab Culture.
Proceedings of the Global Security, Safety, and Sustainability, 2010

Multimodal Biometrics and Multilayered IDM for Secure Authentication.
Proceedings of the Global Security, Safety, and Sustainability, 2010

A Security Audit Framework to Manage Information System Security.
Proceedings of the Global Security, Safety, and Sustainability, 2010

Methods of Organizational Information Security - (A Literature Review).
Proceedings of the Global Security, Safety, and Sustainability, 2010

A Security Framework for Audit and Manage Information System Security.
Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology - Workshops, Toronto, Canada, August 31, 2010

Automation of the Approval and Control Process of Documents.
Proceedings of the ENTERprise Information Systems - International Conference, 2010

2009
Podcasts in Higher Education: Students' and Lecturers' Perspectives.
Proceedings of the Education and Technology for a Better World, 2009

An Ontology Based Approach to Information Security.
Proceedings of the Metadata and Semantic Research - Third International Conference, 2009

2007
A machine learning approach to keystroke dynamics based user authentication.
Int. J. Electron. Secur. Digit. Forensics, 2007

On the Use of Rough Sets for User Authentication Via Keystroke Dynamics.
Proceedings of the Progress in Artificial Intelligence, 2007

Prediction of Abnormal Behaviors for Intelligent Video Surveillance Systems.
Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining, 2007

2006
N-ary trees classifier.
Proceedings of the ICINCO 2006, 2006

The OBSERVER: An Intelligent and Automated Video Surveillance System.
Proceedings of the Image Analysis and Recognition, Third International Conference, 2006

Enhancing Login Security Through the Use of Keystroke Input Dynamics.
Proceedings of the Advances in Biometrics, International Conference, 2006

2005
Moving object detection unaffected by cast shadows, highlights and ghosts.
Proceedings of the 2005 International Conference on Image Processing, 2005

2000
A Methodology for Complex Embedded Systems Design: Petri Nets within a UML Approach.
Proceedings of the Architecture and Design of Distributed Embedded Systems, 2000

Modeling industrial embedded systems with UML.
Proceedings of the Eighth International Workshop on Hardware/Software Codesign, 2000


  Loading...