Percorrer por data de Publicação, começado por "2026-01"
A mostrar 1 - 10 de 18
Resultados por página
Opções de ordenação
- Projeto Bem-estar digital: uma investigação-ação participativaPublication . Marôpo, Lídia; Kubrusly, Ana; Batista, Susana; Torres, João; Duarte, JoãoEste relatório apresenta os resultados do projeto Bem-estar digital: uma investigação-ação participativa (BED), financiado pelo concurso IPS & Santander InovPed 2024/2025 de apoio à inovação pedagógica. O objetivo é promover o uso das tecnologias digitais em equilíbrio com o bem-estar físico, mental e social, por meio da educação entre pares num processo de investigação-ação. Para tal, estudantes do 1º ano da Licenciatura em Comunicação Social (LCS) da Escola Superior de Educação do Instituto Politécnico de Setúbal receberam formação para realizar workshops com alunos do ensino secundário. Nesta perspetiva, aprenderam estratégias e ferramentas para o bem-estar digital, desenvolveram competências de investigação, disseminação de conhecimentos e produção de conteúdos multimédia. Ao todo, participaram 34 estudantes da LCS que criaram em conjunto um guião e materiais didáticos para a realização de 8 workshops com 178 alunos do ensino secundário. Desenvolveram ainda relatórios sobre esta experiência de investigação-ação participativa, websites com os resultados do projeto e vídeos educativos sobre o tema.
- ARTIFICIAL INTELLIGENCE–BASED SUPER NODES FOR REAL-TIME THREAT DETECTION IN DISTRIBUTED ENVIRONMENTS BIBLIOMETRIC ANALYSISPublication . Lopes, José; Dias Lousã, Mário Jorge; Dias Lousã, Mário Jorge; Pereira de Morais, José Carlos; Pereira de Morais, José Carlos; Morais, José Carlos; Lousã, MárioThe widespread adoption of distributed systems, driven by the growth of the Internet of Things (IoT), edge computing, and cloud infrastructure, has substantially expanded the attack surface of modern digital ecosystems. These environments, characterized by high heterogeneity, large data volumes, and stringent latency requirements, make real-time threat detection a complex task. Traditional, pre-dominantly centralized security mechanisms reveal clear limitations in scalability and response time in the face of increasingly dynamic attack patterns. In this context, Artificial Intelligence (AI) and Machine Learning have emerged as essential enablers for more effective intrusion detection. At the same time, the concept of “super nodes” is gaining prominence: strategically positioned network elements with enhanced computational capabilities that act as intelligent intermediaries between edge devices and the central cloud. This study presents a bibliometric analysis of the use of AI-based super nodes for real-time threat detection. The analysis focuses on a sample of 300 publications indexed in the Lens.org database (2015–2025), selected according to the PRISMA 2020 guidelines. Through descriptive indicators and network analysis (such as keyword co-occurrence), research trends, the-matic structures, and emerging directions in this field are identified.
- SECURITY AND RISK IN SOFTWARE DEVELOPMENT PROJECTS: A BIBLIOMETRIC REVIEWPublication . Conceição, Francisco; Dias Lousã, Mário Jorge; Dias Lousã, Mário Jorge; Pereira de Morais, José Carlos; Pereira de Morais, José Carlos; Morais, José Carlos; Lousã, MárioSecurity analysis is increasingly central to software development as organizations face rising cyber risk and regulatory pressure. Although extensive research exists on cyber risk assessment, secure software development, and security requirements, the literature remains fragmented at the project level. This study presents a bibliometric analysis of research published between 2015 and 2026, using data retrieved exclusively from The Lens and structured through a PRISMA-guided workflow. Only journal and conference publications addressing security analysis within software development pro-jects were retained, while studies focused solely on isolated technical vulnerabilities or non-project contexts were excluded, resulting in a final dataset of 1,008 documents. The dataset was analyzed using descriptive bibliometrics, collaboration and geographical analysis, field-of-study classifica-tion, keyword co-occurrence, co-citation, and bibliographic coupling, supported by VOSviewer. Re-sults show sustained growth after 2019 and strong dominance of computer science and software en-gineering. Influential contributions cluster around secure SDLC frameworks, ISO/NIST standards, requirement decomposition, and emerging quantitative risk models. Despite this consolidation, the analysis reveals persistent gaps, including weak integration between cyber risk assessment and re-quirements engineering, limited project-level operationalization of security attributes, and a scarcity of approaches tailored to small and medium-sized enterprises (SMEs). These findings highlight the need for integrated, requirement-driven security analysis frameworks that bridge technical and or-ganizational perspectives within software development projects.
- MALVERTISING AS A VECTOR OF CYBERCRIME IN DIGITAL PLATFORMSPublication . Sousa, João; Morais, José Carlos; Lousã, MárioThe usage of malvertising, which exploits advertising networks to send malware, ransomware, and phishing techniques while evading traditional security measures, has become a significant avenue for criminality on digital platforms. This study provides a bibliometric analysis of 236 papers from The Lens database, focusing on the evolution of scientific output, author collaboration patterns, and theme frameworks in malvertising research. Using Bibliometrix (R) and VOSviewer, co-authorship networks, keyword co-occurrence maps, theme clusters, and a density metadata table were created to identify research trends and knowledge gaps. Results show that machine learning, behavioral an-alytics, and ecosystem-aware security solutions are receiving more attention in the field of research, with high-impact publications like IEEE Access, Sensors, and Electronics making substantial con-tributions to their development. Additionally, the report highlights research prospects and difficulties by identifying upcoming issues such as blockchain, IoT, AR/VR platforms, and zero-day malvertis-ing. Finally, this report summarizes the state of the art in malvertising research, highlights systemic weaknesses in advertising ecosystems, and offers suggestions for future cybersecurity research top-ics, adaptive defense tactics, and regulation.
- SECURITY AND PRIVACY IN EXPLAINABLE AI: A BIBLIOMETRIC ANALYSIS OF EMERGING LEAKAGE RISKSPublication . Matos, Mafalda; Dias Lousã, Mário Jorge; Dias Lousã, Mário Jorge; Pereira de Morais, José Carlos; Pereira de Morais, José Carlos; Morais, José Carlos; Lousã, MárioExplainable Artificial Intelligence (XAI) has gained increasing attention as a means of improving the transparency and trustworthiness of machine learning algorithms, particularly in domains where security and privacy concerns are relevant. This study presents a bibliometric analysis of research at the intersection of explainable artificial intelligence, security, and privacy. The aim was to charac-terize publication trends, thematic structures, and keyword relationships within the field. Scholarly records were retrieved from the Lens database using a structured search strategy based on the PRISMA protocol and analyzed using bibliometric tools, including Bibliometrix and VOSviewer. The total number of studies analyzed was 8,099, and the analyzed time frame was 2010–2025. The analysis examined general publication information, annual scientific production, leading publication venues, and keyword co-occurrence networks. Results indicate a rapid growth in XAI-related publi-cations in recent years and reveal several major thematic clusters, including deep learning–driven medical imaging applications, foundational machine learning and data science concepts, explaina-bility methods in security and distributed learning contexts, and governance-oriented themes related to ethics, privacy, and trust. Overall, the findings highlight the application-driven and interdiscipli-nary nature of explainable AI research, while showing that security and privacy topics, although present, remain relatively peripheral within the broader XAI literature.
- GENERATIVE AI MUTABILITY IN CYBERSECURITY: A BIBLIOMETRIC REVIEWPublication . Oliveira, Pedro; Dias Lousã, Mário Jorge; Dias Lousã, Mário Jorge; Pereira de Morais, José Carlos; Pereira de Morais, José Carlos; Morais, José Carlos; Lousã, MárioThe expansion of generative AI (GenAI) is forcing us to rethink cybersecurity, expanding both de-fensive automation and scalable offensive techniques. This bibliometric review maps the change driven by GenAI in cybersecurity through a PRISMA-guided selection of 154 documents from The Lens (20 December 2025). The current state is summarized by scientific mapping results (co-author-ship, co-word, and co-citation networks, and thematic evolution) to identify dominant architectures, thematic clusters, and collaboration patterns, and implications for governance and auditing. We note the exponential growth of publications in 2022. We notice the trend. The authors group publications into several architectures: large language models (LLMs), generative networks (GANs), and diffu-sion models. These focus on common topics, (i) large-scale phishing and social engineering, (ii) mutability, obfuscation, and adversarial evasion of malware, and (iii) intrusion detection and cyber threat intelligence using synthetic data. Co-citation networks and keywords show that adversarial robustness, red teaming, and benchmarking are interconnected. We find that explainability and hu-man-in-the-loop defense exist as minor but growing topics. One risk is the BlackMamba case, which transmits an LLM-assisted pipeline capable of generating more than 10,000 semantically identical but structurally distinct mutations per hour and achieving a 98.2% evasion rate against commercial EDR solutions. Risk mitigation should prioritize benchmarking and standardized reporting, continu-ous red teaming, and telemetry monitoring, incorporated into dynamic audit frameworks, supported by explicit international governance for high-risk GenAI cybersecurity applications.
- SECURITY AUTOMATION AND VULNERABILITY ANALYSIS IN .NET APPLICATIONS: A BIBLIOMETRIC REVIEWPublication . Pinto, Rúben; Lousã, Mário Dias; Dias Lousã, Mário Jorge; Morais, José Carlos; Pereira de Morais, José Carlos; Morais, José Carlos; Lousã, Mário DiasApplication security is a crucial requirement in modern software, but manually detecting vulnerabil-ities is time-consuming and prone to failure. In the context of .NET platforms, widely used in corpo-rate development, automation of security checks and vulnerability analysis emerges as a promising approach to efficiently mitigate risks. This article presents a bibliometric review on “Security Auto-mation and Vulnerability Analysis in .NET Applications”, identifying research trends and existing gaps. Publications indexed in The Lens database (2004–2025) were analyzed following PRISMA criteria, complemented by bibliometric techniques (co-authorship, co-citation, and co-occurrence of keywords) using tools such as VOSviewer. The results reveal a significant growth in work in the last decade, mainly addressing web vulnerabilities (e.g., SQL injection and XSS), as well as recent ap-proaches to machine learning. However, there are important gaps, including the scarcity of studies specifically focused on the .NET ecosystem and low levels of collaboration among researchers. In short, although security automation has advanced, there are still research opportunities to fill the identified gaps, namely by adapting and expanding techniques for the .NET context.
- INTEGRATION OF AES AND BLOCKCHAIN FOR SENSITIVE DATA PROTECTION: A BIBLIOMETRIC ANALYSISPublication . Gomes, Filipe; Dias Lousã, Mário Jorge; Dias Lousã, Mário Jorge; Pereira de Morais, José Carlos; Pereira de Morais, José Carlos; Morais, José Carlos; Lousã, MárioThe protection of sensitive data is becoming increasingly complex as digital services expand, con-nected devices multiply, and distributed systems become the norm. Encryption methods such as the Advanced Encryption Standard (AES) remain fundamental to ensuring the confidentiality of infor-mation, but they do not meet all security requirements. At the same time, blockchain technology has been adopted in various contexts for its ability to ensure integrity, traceability, and non-repudiation. Despite the complementary nature of these technologies, studies analyzing their combined use re-main relatively scarce and fragmented. This article analyses existing research on the combined use of blockchain and encryption through a bibliometric analysis of scientific publications indexed in The Lens database between 2016 and 2026. The study is based on descriptive indicators and keyword co-occurrence analysis, using the VOSviewer tool to identify thematic relationships and research trends. Results show significant growth from 2020, with major contributions from Asia and increas-ing interest across multiple disciplinary areas. Most publications are situated within computer science and cybersecurity, while applied research is primarily focused on domains such as healthcare and Internet of Things (IoT) systems. Despite this expansion, the literature remains largely fragmented, with relatively few studies proposing or experimentally evaluating integrated architectures that ef-fectively combine encryption and blockchain mechanisms to simultaneously ensure data confidenti-ality, integrity, and auditability.
- AUDITING NETWORK SECURITY IN REMOTE WORK ENVIRONMENTS: A BIBLIOMETRIC REVIEWPublication . Costa, Filipe; Dias Lousã, Mário Jorge; Dias Lousã, Mário Jorge; Pereira de Morais, José Carlos; Pereira de Morais, José Carlos; Morais, José Carlos; Lousã, MárioThe remote work trend has changed the organizational network architectures of firms, thereby in-creasing the attack surfaces in cybersecurity and auditing. It has thus become increasingly important to understand security controls, risk management practices, and how audit mechanisms are imple-mented in distributed environments. This research employs a bibliometric review, conducted in ac-cordance with the PRISMA protocol, along with a qualitative interpretative analysis to understand scientific literature on cybersecurity, network security, and auditing in remote work contexts. The Lens database was used to collect metadata for publications from 2019 to 2025, which led to a dataset of 1,868 documents. After screening and eligibility assessment, 1868 documents were included in the final bibliometric and qualitative synthesis. The results show a significant increase in research output after 2020, associated with the global expansion of remote work. The analysis also highlights gaps related to remote auditing automation and monitoring in unmanaged environments. Overall, the results underscore the strengthening of technical security measures that are closely aligned with the ongoing gaps in auditing practices, thus indicating key areas for further research and the development of professional practice.
- The role of the gut microbiome in clinical outcomes of colorectal cancer: a systematic review (2020–2025)Publication . Santos, Iara; Liberal, Joana; Teixeira, Paulo; Martins, Diana; Mendes, FernandoABSTRACT: Background: The Colorectal Cancer (CRC) pathogenesis and therapeutic efficacy are influenced by the gut microbiome, making it a promising biomarker for predicting treatment responses and adverse effects. This systematic review aims to outline the gut microbiome composition in individuals with CRC undergoing the same therapeutic regimen and evaluate interindividual microbiome profile variations to better understand how these differences may influence therapeutic outcomes. Methods: Key studies investigating the microbiome’s role in therapeutic approaches for CRC were searched in both PubMed and Cochrane databases on 12 and 22 March 2025, respectively. Eligible studies included free full-text English-language randomized clinical trials and human observational studies reporting on gut microbiome composition and treatment outcomes. RoB 2 and ROBINS-I were employed in the evaluation of bias for randomized trials and observational studies, respectively. Data extracted was narratively analyzed. Results: Six studies involving a total of 361 individuals were included. Therapeutic interventions, either standard treatments and/or those targeting the gut microbiome, generally increased probiotic taxa and reduced pro-carcinogenic bacteria. However, no consistent pattern of improved clinical outcomes was observed, suggesting that treatment mechanisms, the tumor’s nature, and individual characteristics play critical roles in microbiome modulation. Conclusion: The gut microbiome holds significant potential in clinical settings. Nonetheless, further research is needed to better understand its functional aspects and to consider the influence of treatment mechanisms, the tumor’s nature, and individual characteristics as modulators, in order to optimize clinical outcomes
