Ricardo Macedo

Learn More
Cysticercosis is an endemic condition in many developing countries. Although it is the most common parasitic disease of the central nervous system, cysticercal involvement of the spinal cord is rare. It may occur as intradural extramedullary, intramedullary, intramedullary associated with intradural-extramedullary or as the vertebral presentation. We report(More)
Keywords: Smart cities Heterogeneous wireless communication Architecture Low cost Interoperability a b s t r a c t Smart cities have become a reality around the world. They rely on wireless communication technologies, and they have provided many benefits to society, such as monitoring road traffic in real-time, giving continuous healthcare assistance to(More)
Under the increasing popularization of portable and mobile devices, as well as the positive trends to the Internet of Everything, Identity Management systems gain a crucial role in integrating different administrative domains towards a global ubiquitous computing. Denial-of-Service (DoS) attacks can make IdM operations unavailable, preventing the use of(More)
Ensuring identity management (IdM) systems availability plays a key role to support networked systems. Denial-of-Service (DoS) attacks can make IdM operations unavailable, preventing the use of computational resources by legitimate users. In the literature, the main countermeasures against DoS over IdM systems are based on either the application of external(More)
Vehicular ad hoc networks (VANETs) are envisioned to support Intelligent Transportation Systems, providing services to drivers. VANETs comprise of vehicles equipped with wireless communication devices, and access points spread over streets and roads. VANETs require multi-hop routing protocols to data tranmission, following two main approaches in relation to(More)
The characteristics of the Future Internet and the emerging technologies result in new requirements, in which user security issues are highlighted. Identity Management requirements are linked to the development of systems able to prevent unauthorized use of digital identities, information overload, and to enhance user privacy. This paper highlights the(More)
The shape, orientation and distribution of brushstrokes are distinctive markers left by the artist on the surface of a painting. Consequently, they are useful as additional evidence to decide on issues of attribution and authenticity. This paper proposes an image classification algorithm for the paintings of Amadeo de Souza-Cardoso, a modern Portuguese(More)
Identity management (IdM) systems employ Identity Providers (IdPs), as guardians of users' critical information. However, Distributed Denial-of-Service (DDoS) attacks can make IdPs operations unavailable, compromising legitimate users. In the literature, the main countermeasures against DDoS attacks are based on either the application of external resources(More)
Large scale networked systems, such as Identity Management (IdM) systems and software defined networks (SDN), have contributed to technological evolution. They simplify user and network device management. However, they strengthen Distributed Denial-of-Services (DDoS) attacks. These attacks are able to compromise system availability and harm legitimate(More)