Virginia N. L. Franqueira

Orcid: 0000-0003-1332-9115

According to our database1, Virginia N. L. Franqueira authored at least 42 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Deep labeller: automatic bounding box generation for synthetic violence detection datasets.
Multim. Tools Appl., January, 2024

2023
Adding transparency to uncertainty: An argument-based method for evaluative opinions.
Forensic Sci. Int. Digit. Investig., December, 2023

Learning from cyber security incidents: A systematic review and future research agenda.
Comput. Secur., September, 2023

A Systematic Literature Review on Cyber Security Education for Children.
IEEE Trans. Educ., June, 2023

Investigating the Availability of Child Sexual Abuse Materials in Dark Web Markets: Evidence Gathered and Lessons Learned.
Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference, 2023

2022
Deepfake: Definitions, Performance Metrics and Standards, Datasets and Benchmarks, and a Meta-Review.
CoRR, 2022

A Comprehensive Survey of Natural Language Generation Advances from the Perspective of Digital Deception.
CoRR, 2022

Age Appropriate Design: Assessment of TikTok, Twitch, and YouTube Kids.
CoRR, 2022

2021
Towards Safer Industrial Serial Networks: An Expert System Framework for Anomaly Detection.
Proceedings of the 33rd IEEE International Conference on Tools with Artificial Intelligence, 2021

2020
Towards Sound Forensic Arguments: Structured Argumentation Applied to Digital Forensics Practice.
Digit. Investig., 2020

2019
Behavioural Digital Forensics Model: Embedding Behavioural Evidence Analysis into the Investigation of Digital Crimes.
Digit. Investig., 2019

A Survey of Deep Learning Solutions for Multimedia Visual Content Analysis.
IEEE Access, 2019

WVD: A New Synthetic Dataset for Video-Based Violence Detection.
Proceedings of the Artificial Intelligence XXXVI, 2019

Privacy verification of PhotoDNA based on machine learning.
Proceedings of the Security and Privacy for Big Data, Cloud Computing and Applications, 2019

2018
Man-In-The-Middle Attacks in Vehicular Ad-Hoc Networks: Evaluating the Impact of Attackers' Strategies.
Sensors, 2018

Investigation of Indecent Images of Children cases: Challenges and suggestions collected from the trenches.
Digit. Investig., 2018

TEAM: A Trust Evaluation and Management Framework in Context-Enabled Vehicular Ad-Hoc Networks.
IEEE Access, 2018

Analytical Tools for Blockchain: Review, Taxonomy and Open Challenges.
Proceedings of the 2018 International Conference on Cyber Security and Protection of Digital Services, 2018

Blockchain-Based Distributed Marketplace.
Proceedings of the Business Information Systems Workshops, 2018

2017
Verifiable Public Key Encryption Scheme With Equality Test in 5G Networks.
IEEE Access, 2017

Faith in Vehicles: A Set of Evaluation Criteria for Trust Management in Vehicular Ad-Hoc Network.
Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2017

On Locky Ransomware, Al Capone and Brexit.
Proceedings of the Digital Forensics and Cyber Crime - 9th International Conference, 2017

2016
Forensic investigation of cyberstalking cases using Behavioural Evidence Analysis.
Digit. Investig., 2016

Forensically-Sound Analysis of Security Risks of Using Local Password Managers.
Proceedings of the 24th IEEE International Requirements Engineering Conference, 2016

2015
Automated analysis of security requirements through risk-based argumentation.
J. Syst. Softw., 2015

Factors Influencing Digital Forensic Investigations: Empirical Evaluation of 12 Years of Dubai Police Cases.
J. Digit. Forensics Secur. Law, 2015

Behavioural Evidence Analysis Applied to Digital Forensics: An Empirical Analysis of Child Pornography Cases Using P2P Networks.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

Challenges of Data Provenance for Cloud Forensic Investigations.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Introduction to Special Issue on Risk and Trust in Embedded Critical Systems.
ACM Trans. Embed. Comput. Syst., 2014

2013
Engineering Security Agreements Against External Insider Threat.
Inf. Resour. Manag. J., 2013

2012
Role-Based Access Control in Retrospect.
Computer, 2012

2011
OpenArgue: Supporting argumentation to evolve secure software systems.
Proceedings of the RE 2011, 19th IEEE International Requirements Engineering Conference, Trento, Italy, August 29 2011, 2011

Risk and argument: A risk-based argumentation method for practical security.
Proceedings of the RE 2011, 19th IEEE International Requirements Engineering Conference, Trento, Italy, August 29 2011, 2011

Towards agile security risk management in RE and beyond.
Proceedings of the First International Workshop on Empirical Requirements Engineering, 2011

2010
Quantifying security risk level from CVSS estimates of frequency and impact.
J. Syst. Softw., 2010

Using Real Option Thinking to Improve Decision Making in Security Investment.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2010, 2010

External Insider Threat: A Real Security Challenge in Enterprise Value Webs.
Proceedings of the ARES 2010, 2010

2009
Multi-step attack modelling and simulation (MsAMS) framework based on mobile ambients.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

Estimating ToE Risk Level Using CVSS.
Proceedings of the The Forth International Conference on Availability, 2009

A Mobile Ambients-Based Approach for Network Attack Modelling and Simulation.
Proceedings of the The Forth International Conference on Availability, 2009

2007
Defense against Insider Threat: a Framework for Gathering Goal-based Requirements.
Proceedings of the 12th International Workshop on Exploring Modeling Methods for Systems Analysis and Design, 2007

Vulnerability Assessment by Learning Attack Specifications in Graphs.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007


  Loading...