ISPG - CID - Politécnica
URI permanente para esta coleção:
Navegar
Entradas recentes
- Politécnica 32Publication . Vários; Morais, José; Lousã, Mário
- INTEGRATION OF AES AND BLOCKCHAIN FOR SENSITIVE DATA PROTECTION: A BIBLIOMETRIC ANALYSISPublication . Gomes, Filipe; Dias Lousã, Mário Jorge; Dias Lousã, Mário Jorge; Pereira de Morais, José Carlos; Pereira de Morais, José Carlos; Morais, José Carlos; Lousã, MárioThe protection of sensitive data is becoming increasingly complex as digital services expand, con-nected devices multiply, and distributed systems become the norm. Encryption methods such as the Advanced Encryption Standard (AES) remain fundamental to ensuring the confidentiality of infor-mation, but they do not meet all security requirements. At the same time, blockchain technology has been adopted in various contexts for its ability to ensure integrity, traceability, and non-repudiation. Despite the complementary nature of these technologies, studies analyzing their combined use re-main relatively scarce and fragmented. This article analyses existing research on the combined use of blockchain and encryption through a bibliometric analysis of scientific publications indexed in The Lens database between 2016 and 2026. The study is based on descriptive indicators and keyword co-occurrence analysis, using the VOSviewer tool to identify thematic relationships and research trends. Results show significant growth from 2020, with major contributions from Asia and increas-ing interest across multiple disciplinary areas. Most publications are situated within computer science and cybersecurity, while applied research is primarily focused on domains such as healthcare and Internet of Things (IoT) systems. Despite this expansion, the literature remains largely fragmented, with relatively few studies proposing or experimentally evaluating integrated architectures that ef-fectively combine encryption and blockchain mechanisms to simultaneously ensure data confidenti-ality, integrity, and auditability.
- SECURITY AND PRIVACY IN EXPLAINABLE AI: A BIBLIOMETRIC ANALYSIS OF EMERGING LEAKAGE RISKSPublication . Matos, Mafalda; Dias Lousã, Mário Jorge; Dias Lousã, Mário Jorge; Pereira de Morais, José Carlos; Pereira de Morais, José Carlos; Morais, José Carlos; Lousã, MárioExplainable Artificial Intelligence (XAI) has gained increasing attention as a means of improving the transparency and trustworthiness of machine learning algorithms, particularly in domains where security and privacy concerns are relevant. This study presents a bibliometric analysis of research at the intersection of explainable artificial intelligence, security, and privacy. The aim was to charac-terize publication trends, thematic structures, and keyword relationships within the field. Scholarly records were retrieved from the Lens database using a structured search strategy based on the PRISMA protocol and analyzed using bibliometric tools, including Bibliometrix and VOSviewer. The total number of studies analyzed was 8,099, and the analyzed time frame was 2010–2025. The analysis examined general publication information, annual scientific production, leading publication venues, and keyword co-occurrence networks. Results indicate a rapid growth in XAI-related publi-cations in recent years and reveal several major thematic clusters, including deep learning–driven medical imaging applications, foundational machine learning and data science concepts, explaina-bility methods in security and distributed learning contexts, and governance-oriented themes related to ethics, privacy, and trust. Overall, the findings highlight the application-driven and interdiscipli-nary nature of explainable AI research, while showing that security and privacy topics, although present, remain relatively peripheral within the broader XAI literature.
- MALVERTISING AS A VECTOR OF CYBERCRIME IN DIGITAL PLATFORMSPublication . Sousa, João; Morais, José Carlos; Lousã, MárioThe usage of malvertising, which exploits advertising networks to send malware, ransomware, and phishing techniques while evading traditional security measures, has become a significant avenue for criminality on digital platforms. This study provides a bibliometric analysis of 236 papers from The Lens database, focusing on the evolution of scientific output, author collaboration patterns, and theme frameworks in malvertising research. Using Bibliometrix (R) and VOSviewer, co-authorship networks, keyword co-occurrence maps, theme clusters, and a density metadata table were created to identify research trends and knowledge gaps. Results show that machine learning, behavioral an-alytics, and ecosystem-aware security solutions are receiving more attention in the field of research, with high-impact publications like IEEE Access, Sensors, and Electronics making substantial con-tributions to their development. Additionally, the report highlights research prospects and difficulties by identifying upcoming issues such as blockchain, IoT, AR/VR platforms, and zero-day malvertis-ing. Finally, this report summarizes the state of the art in malvertising research, highlights systemic weaknesses in advertising ecosystems, and offers suggestions for future cybersecurity research top-ics, adaptive defense tactics, and regulation.
- SECURITY AND RISK IN SOFTWARE DEVELOPMENT PROJECTS: A BIBLIOMETRIC REVIEWPublication . Conceição, Francisco; Dias Lousã, Mário Jorge; Dias Lousã, Mário Jorge; Pereira de Morais, José Carlos; Pereira de Morais, José Carlos; Morais, José Carlos; Lousã, MárioSecurity analysis is increasingly central to software development as organizations face rising cyber risk and regulatory pressure. Although extensive research exists on cyber risk assessment, secure software development, and security requirements, the literature remains fragmented at the project level. This study presents a bibliometric analysis of research published between 2015 and 2026, using data retrieved exclusively from The Lens and structured through a PRISMA-guided workflow. Only journal and conference publications addressing security analysis within software development pro-jects were retained, while studies focused solely on isolated technical vulnerabilities or non-project contexts were excluded, resulting in a final dataset of 1,008 documents. The dataset was analyzed using descriptive bibliometrics, collaboration and geographical analysis, field-of-study classifica-tion, keyword co-occurrence, co-citation, and bibliographic coupling, supported by VOSviewer. Re-sults show sustained growth after 2019 and strong dominance of computer science and software en-gineering. Influential contributions cluster around secure SDLC frameworks, ISO/NIST standards, requirement decomposition, and emerging quantitative risk models. Despite this consolidation, the analysis reveals persistent gaps, including weak integration between cyber risk assessment and re-quirements engineering, limited project-level operationalization of security attributes, and a scarcity of approaches tailored to small and medium-sized enterprises (SMEs). These findings highlight the need for integrated, requirement-driven security analysis frameworks that bridge technical and or-ganizational perspectives within software development projects.
- ARTIFICIAL INTELLIGENCE–BASED SUPER NODES FOR REAL-TIME THREAT DETECTION IN DISTRIBUTED ENVIRONMENTS BIBLIOMETRIC ANALYSISPublication . Lopes, José; Dias Lousã, Mário Jorge; Dias Lousã, Mário Jorge; Pereira de Morais, José Carlos; Pereira de Morais, José Carlos; Morais, José Carlos; Lousã, MárioThe widespread adoption of distributed systems, driven by the growth of the Internet of Things (IoT), edge computing, and cloud infrastructure, has substantially expanded the attack surface of modern digital ecosystems. These environments, characterized by high heterogeneity, large data volumes, and stringent latency requirements, make real-time threat detection a complex task. Traditional, pre-dominantly centralized security mechanisms reveal clear limitations in scalability and response time in the face of increasingly dynamic attack patterns. In this context, Artificial Intelligence (AI) and Machine Learning have emerged as essential enablers for more effective intrusion detection. At the same time, the concept of “super nodes” is gaining prominence: strategically positioned network elements with enhanced computational capabilities that act as intelligent intermediaries between edge devices and the central cloud. This study presents a bibliometric analysis of the use of AI-based super nodes for real-time threat detection. The analysis focuses on a sample of 300 publications indexed in the Lens.org database (2015–2025), selected according to the PRISMA 2020 guidelines. Through descriptive indicators and network analysis (such as keyword co-occurrence), research trends, the-matic structures, and emerging directions in this field are identified.
- GENERATIVE AI MUTABILITY IN CYBERSECURITY: A BIBLIOMETRIC REVIEWPublication . Oliveira, Pedro; Dias Lousã, Mário Jorge; Dias Lousã, Mário Jorge; Pereira de Morais, José Carlos; Pereira de Morais, José Carlos; Morais, José Carlos; Lousã, MárioThe expansion of generative AI (GenAI) is forcing us to rethink cybersecurity, expanding both de-fensive automation and scalable offensive techniques. This bibliometric review maps the change driven by GenAI in cybersecurity through a PRISMA-guided selection of 154 documents from The Lens (20 December 2025). The current state is summarized by scientific mapping results (co-author-ship, co-word, and co-citation networks, and thematic evolution) to identify dominant architectures, thematic clusters, and collaboration patterns, and implications for governance and auditing. We note the exponential growth of publications in 2022. We notice the trend. The authors group publications into several architectures: large language models (LLMs), generative networks (GANs), and diffu-sion models. These focus on common topics, (i) large-scale phishing and social engineering, (ii) mutability, obfuscation, and adversarial evasion of malware, and (iii) intrusion detection and cyber threat intelligence using synthetic data. Co-citation networks and keywords show that adversarial robustness, red teaming, and benchmarking are interconnected. We find that explainability and hu-man-in-the-loop defense exist as minor but growing topics. One risk is the BlackMamba case, which transmits an LLM-assisted pipeline capable of generating more than 10,000 semantically identical but structurally distinct mutations per hour and achieving a 98.2% evasion rate against commercial EDR solutions. Risk mitigation should prioritize benchmarking and standardized reporting, continu-ous red teaming, and telemetry monitoring, incorporated into dynamic audit frameworks, supported by explicit international governance for high-risk GenAI cybersecurity applications.
- AUDITING NETWORK SECURITY IN REMOTE WORK ENVIRONMENTS: A BIBLIOMETRIC REVIEWPublication . Costa, Filipe; Dias Lousã, Mário Jorge; Dias Lousã, Mário Jorge; Pereira de Morais, José Carlos; Pereira de Morais, José Carlos; Morais, José Carlos; Lousã, MárioThe remote work trend has changed the organizational network architectures of firms, thereby in-creasing the attack surfaces in cybersecurity and auditing. It has thus become increasingly important to understand security controls, risk management practices, and how audit mechanisms are imple-mented in distributed environments. This research employs a bibliometric review, conducted in ac-cordance with the PRISMA protocol, along with a qualitative interpretative analysis to understand scientific literature on cybersecurity, network security, and auditing in remote work contexts. The Lens database was used to collect metadata for publications from 2019 to 2025, which led to a dataset of 1,868 documents. After screening and eligibility assessment, 1868 documents were included in the final bibliometric and qualitative synthesis. The results show a significant increase in research output after 2020, associated with the global expansion of remote work. The analysis also highlights gaps related to remote auditing automation and monitoring in unmanaged environments. Overall, the results underscore the strengthening of technical security measures that are closely aligned with the ongoing gaps in auditing practices, thus indicating key areas for further research and the development of professional practice.
- SECURITY AUTOMATION AND VULNERABILITY ANALYSIS IN .NET APPLICATIONS: A BIBLIOMETRIC REVIEWPublication . Pinto, Rúben; Lousã, Mário Dias; Dias Lousã, Mário Jorge; Morais, José Carlos; Pereira de Morais, José Carlos; Morais, José Carlos; Lousã, Mário DiasApplication security is a crucial requirement in modern software, but manually detecting vulnerabil-ities is time-consuming and prone to failure. In the context of .NET platforms, widely used in corpo-rate development, automation of security checks and vulnerability analysis emerges as a promising approach to efficiently mitigate risks. This article presents a bibliometric review on “Security Auto-mation and Vulnerability Analysis in .NET Applications”, identifying research trends and existing gaps. Publications indexed in The Lens database (2004–2025) were analyzed following PRISMA criteria, complemented by bibliometric techniques (co-authorship, co-citation, and co-occurrence of keywords) using tools such as VOSviewer. The results reveal a significant growth in work in the last decade, mainly addressing web vulnerabilities (e.g., SQL injection and XSS), as well as recent ap-proaches to machine learning. However, there are important gaps, including the scarcity of studies specifically focused on the .NET ecosystem and low levels of collaboration among researchers. In short, although security automation has advanced, there are still research opportunities to fill the identified gaps, namely by adapting and expanding techniques for the .NET context.
- AVALIAÇÃO DE DESEMPENHO EM GESTÃO DE RECURSOS HUMANOS E NOMEAÇÃO DE CARGOS DE CONFIANÇA NO IFMTPublication . Lima, Vanessa; Morais, José C.; Andrês, AdelinaA nomeação de cargos de confiança na rede federal de ensino; regida pela Lei nº 8.112/1990; é limitada a servidores efetivos. Esta pesquisa analisa o impacto da gestão no IFMT-SVC na nomeação desses cargos; propondo um modelo de gestão por competências. Utilizou-se um estudo de caso quantitativo com 25 servidores. Os resultados mostram a ausência de critérios formais de gestão por competências; com nomeações baseadas em relações pessoais e falta de um programa estruturado. As limitações incluem o tamanho reduzido da amostra e uma greve durante a coleta de dados. Este estudo é pioneiro no campus; destacando a necessidade de institucionalização e capacitação para desenvolver competências e promover transparência na gestão
