Sérgio Tenreiro de Magalhães

Learn More
Software based biometrics, utilising keystroke dynamics has been proposed as a cost effective means of enhancing computer access security. Keystroke dynamics has been successfully employed as a means of identifying legitimate/illegitimate login attempts based on the typing style of the login entry. In this paper, we collected keystroke dynamics data in the(More)
Security is a critical component of most computer systems – especially those used in E-commerce activities over the Internet. Global access to information makes security a critical design issue in these systems. Deployment of sophisticated hardware based authentication systems is prohibitive in all but the most sensitive installations. What is required is a(More)
The majority of computer systems employ a login ID and password as the principal method for access security. In stand-alone situations, this level of security may be adequate, but when computers are connected to the internet, the vulnerability to a security breach is increased. In order to reduce vulnerability to attack, biometric solutions have been(More)
The People’s Republic of China (PRC) has a long tradition on military strategy. In the end of the 20 century this was one of the first nations to prepare itself for the new emerging concept of war that includes the combat in cyberspace, both with the intention to obtain privileged information (espionage), to reduce the enemy attack and/or military(More)
For a query in a Research Information System (CRIS) to return adequate results, it is necessary that the system can “understand” the intention of the enquiring agent. One possible approach to guarantee the success of this communication is to create an intermediate module, responsible for the knowledge discovery processes, that can define concepts(More)
This article presents the results of a systematic inquiry about the perception of the Portuguese on the biometric technology, which involved 606 citizens. It is presented the principal biometrics and the main concepts on its evaluation. Following a simple method consisting in a survey by questionnaire, the most relevant conclusions are presented.
The recognition of entities and their relationships in document collections is an important step towards the discovery of latent knowledge as well as to support knowledge management applications. The challenge lies on how to extract and correlate entities, aiming to answer key knowledge management questions, such as; who works with whom, on which projects,(More)