Gonçalo Martins

Learn More
—Cyber-Physical Systems (CPS) are systems with seamless integration of physical, computational and networking components. These systems can potentially have an impact on the physical components, hence it is critical to safeguard them against a wide range of attacks. In this paper, it is argued that an effective approach to achieve this goal is to(More)
In order to obtain information on athletic performance, strength and power characteristics of the athlete are generally evaluated. However, due to the large number of variables needed for the assessment, this kind of evaluations is usually time consuming. Taking advantage of recent developments in the area of sensors and acquisition systems and using signal(More)
One step involved in the security engineering process is threat modeling. Threat modeling involves understanding the complexity of the system and identifying all of the possible threats, regardless of whether or not they can be exploited. Proper identification of threats and appropriate selection of countermeasures reduces the ability of attackers to misuse(More)
• Conducting research on patterns, diagnostic techniques and mitigation strategies for resilient cyber-physical systems and model-driven architectures for designing and analyzing properties of dynamic distributed real-time systems. • Research in real-time reflex and healing architectures for large-scale computing clusters. • Research in performance modeling(More)
In modern networked control applications, confidentiality and integrity are important features to address in order to prevent against attacks. Moreover, network control systems are a fundamental part of the communication components of current cyber-physical systems (e.g., automotive communications). Many networked control systems employ Time-Triggered (TT)(More)
—Industrial control systems (ICS) are composed of sensors, actuators, control processing units, and communication devices all interconnected to provide monitoring and control capabilities. Due to the integral role of the networking infrastructure , such systems are vulnerable to cyber attacks. In-depth consideration of security and resilience and their(More)
—An important challenge in networked control systems is to ensure the confidentiality and integrity of the message in order to secure the communication and prevent attackers or intruders from compromising the system. However, security mechanisms may jeopardize the temporal behavior of the network data communication because of the computation and(More)
A major problem in the field of communication is the management of the shared transmission medium. For example, if multiple radios are transmitting simultaneously on the same frequency the signals may overlap, leading to interference. Some wireless techniques require the sender to sense before transmitting, introducing non-determinism as they wait a random(More)
Groups of autonomous robots become increasingly useful as the mission complexity they can handle increases. However, in a mobile ad hoc network, there are continually communication failures due to changing environmental conditions and of course hardware problems, both temporary and permanent. For this work, we envision a heterogeneous robotic swarm with(More)
Athletic performance is evaluated by measuring specific variables which provide information about the physical condition of a given athlete [1]. In order to design an athlete's follow-up or training program, an objective quantitative knowledge of the physical condition being evaluated is needed. Nowadays, the use of technology in this kind of tasks [2] is(More)
  • 1