Skip to main content

Showing 1–25 of 25 results for author: Nogueira, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2503.14618  [pdf, other

    cs.CR cs.LG

    Anomaly-Flow: A Multi-domain Federated Generative Adversarial Network for Distributed Denial-of-Service Detection

    Authors: Leonardo Henrique de Melo, Gustavo de Carvalho Bertoli, Michele Nogueira, Aldri Luiz dos Santos, Lourenço Alves Pereira Junior

    Abstract: Distributed denial-of-service (DDoS) attacks remain a critical threat to Internet services, causing costly disruptions. While machine learning (ML) has shown promise in DDoS detection, current solutions struggle with multi-domain environments where attacks must be detected across heterogeneous networks and organizational boundaries. This limitation severely impacts the practical deployment of ML-b… ▽ More

    Submitted 18 March, 2025; originally announced March 2025.

    Comments: 8 pages, 4 figures

  2. arXiv:2412.14877  [pdf, other

    cs.PL

    Investigating the Energy Consumption of C++ and Java Solutions Mined from a Programming Contest Site

    Authors: Sérgio Queiroz de Medeiros, Marcelo Borges Nogueira, Gustavo Quezado

    Abstract: The concern about global warming increased the interest in the energy efficiency of computer applications. Assuming power is constant, the general trend is that faster programs consume less energy, thus optimizing a program for speed would also improve its energy efficiency. We investigate this tendency in a set of C++ and Java solutions mined from Code Submission Evaluation System (CSES), a pop… ▽ More

    Submitted 19 December, 2024; originally announced December 2024.

    ACM Class: D.3.0; D.3.4

  3. arXiv:2409.07709  [pdf, other

    cs.CR cs.IR

    Harnessing TI Feeds for Exploitation Detection

    Authors: Kajal Patel, Zubair Shafiq, Mateus Nogueira, Daniel Sadoc Menasché, Enrico Lovat, Taimur Kashif, Ashton Woiwood, Matheus Martins

    Abstract: Many organizations rely on Threat Intelligence (TI) feeds to assess the risk associated with security threats. Due to the volume and heterogeneity of data, it is prohibitive to manually analyze the threat information available in different loosely structured TI feeds. Thus, there is a need to develop automated methods to vet and extract actionable information from TI feeds. To this end, we present… ▽ More

    Submitted 11 September, 2024; originally announced September 2024.

    Comments: This paper appears at IEEE International Conference on Cyber Security and Resilience (IEEE CSR 2024)

  4. Vulnerable Road User Detection and Safety Enhancement: A Comprehensive Survey

    Authors: Renato M. Silva, Gregorio F. Azevedo, Matheus V. V. Berto, Jean R. Rocha, Eduardo C. Fidelis, Matheus V. Nogueira, Pedro H. Lisboa, Tiago A. Almeida

    Abstract: Traffic incidents involving vulnerable road users (VRUs) constitute a significant proportion of global road accidents. Advances in traffic communication ecosystems, coupled with sophisticated signal processing and machine learning techniques, have facilitated the utilization of data from diverse sensors. Despite these advancements and the availability of extensive datasets, substantial progress is… ▽ More

    Submitted 27 June, 2025; v1 submitted 29 May, 2024; originally announced May 2024.

    Comments: 60 pages, 18 tables, 8 figures, citing 370 (up-to-date) papers. Expert Systems With Applications (2025)

  5. arXiv:2401.16182  [pdf, other

    cs.CL cs.AI

    LLaMandement: Large Language Models for Summarization of French Legislative Proposals

    Authors: Joseph Gesnouin, Yannis Tannier, Christophe Gomes Da Silva, Hatim Tapory, Camille Brier, Hugo Simon, Raphael Rozenberg, Hermann Woehrel, Mehdi El Yakaabi, Thomas Binder, Guillaume Marie, Emilie Caron, Mathile Nogueira, Thomas Fontas, Laure Puydebois, Marie Theophile, Stephane Morandi, Mael Petit, David Creissac, Pauline Ennouchy, Elise Valetoux, Celine Visade, Severine Balloux, Emmanuel Cortes, Pierre-Etienne Devineau , et al. (3 additional authors not shown)

    Abstract: This report introduces LLaMandement, a state-of-the-art Large Language Model, fine-tuned by the French government and designed to enhance the efficiency and efficacy of processing parliamentary sessions (including the production of bench memoranda and documents required for interministerial meetings) by generating neutral summaries of legislative proposals. Addressing the administrative challenges… ▽ More

    Submitted 29 January, 2024; originally announced January 2024.

    Comments: 21 pages, 9 figures

  6. Multidomain transformer-based deep learning for early detection of network intrusion

    Authors: Jinxin Liu, Murat Simsek, Michele Nogueira, Burak Kantarci

    Abstract: Timely response of Network Intrusion Detection Systems (NIDS) is constrained by the flow generation process which requires accumulation of network packets. This paper introduces Multivariate Time Series (MTS) early detection into NIDS to identify malicious flows prior to their arrival at target systems. With this in mind, we first propose a novel feature extractor, Time Series Network Flow Meter (… ▽ More

    Submitted 3 September, 2023; originally announced September 2023.

    Comments: 6 pages, 7 figures, 3 tables, IEEE Global Communications Conference (Globecom) 2023

  7. arXiv:2308.02581  [pdf, other

    cs.CR cs.LG

    Cream Skimming the Underground: Identifying Relevant Information Points from Online Forums

    Authors: Felipe Moreno-Vera, Mateus Nogueira, Cainã Figueiredo, Daniel Sadoc Menasché, Miguel Bicudo, Ashton Woiwood, Enrico Lovat, Anton Kocheturov, Leandro Pfleger de Aguiar

    Abstract: This paper proposes a machine learning-based approach for detecting the exploitation of vulnerabilities in the wild by monitoring underground hacking forums. The increasing volume of posts discussing exploitation in the wild calls for an automatic approach to process threads and posts that will eventually trigger alarms depending on their content. To illustrate the proposed system, we use the Crim… ▽ More

    Submitted 3 August, 2023; originally announced August 2023.

    Comments: 2023 IEEE International Conference on Cyber Security and Resilience (IEEE CSR)

  8. arXiv:2111.11441  [pdf, other

    cs.NI cs.CY cs.LG

    pmSensing: A Participatory Sensing Network for Predictive Monitoring of Particulate Matter

    Authors: Lucas L. S. Sachetti, Enzo B. Cussuol, José Marcos S. Nogueira, Vinicius F. S. Mota

    Abstract: This work presents a proposal for a wireless sensor network for participatory sensing, with IoT sensing devices developed especially for monitoring and predicting air quality, as alternatives of high cost meteorological stations. The system, called pmSensing, aims to measure particulate material. A validation is done by comparing the data collected by the prototype with data from stations. The com… ▽ More

    Submitted 22 November, 2021; originally announced November 2021.

    Journal ref: Anais do V Workshop de Computacao Urbana. SBC, 2021. p. 168-181. ISSN 2595-2706

  9. The CirCor DigiScope Dataset: From Murmur Detection to Murmur Classification

    Authors: Jorge Oliveira, Francesco Renna, Paulo Dias Costa, Marcelo Nogueira, Cristina Oliveira, Carlos Ferreira, Alipio Jorge, Sandra Mattos, Thamine Hatem, Thiago Tavares, Andoni Elola, Ali Bahrami Rad, Reza Sameni, Gari D Clifford, Miguel T. Coimbra

    Abstract: Cardiac auscultation is one of the most cost-effective techniques used to detect and identify many heart conditions. Computer-assisted decision systems based on auscultation can support physicians in their decisions. Unfortunately, the application of such systems in clinical trials is still minimal since most of them only aim to detect the presence of extra or abnormal waves in the phonocardiogram… ▽ More

    Submitted 24 December, 2021; v1 submitted 2 August, 2021; originally announced August 2021.

    Comments: 12 pages, 6 tables, 8 figures, in IEEE Journal of Biomedical and Health Informatics

  10. arXiv:2107.10395  [pdf, other

    cs.SI cs.NI

    An Access Control for IoT Based on Network Community Perception and Social Trust Against Sybil Attacks

    Authors: Gustavo Oliveira, Agnaldo de Souza Batista, Michele Nogueira, Aldri Santos

    Abstract: The evolution of the Internet of Things (IoT) has increased the connection of personal devices, mainly taking into account the habits and behavior of their owners. These environments demand access control mechanisms to protect them against intruders, like Sybil attacks. that can compromise data privacy or disrupt the network operation. The Social IoT paradigm enables access control systems to aggr… ▽ More

    Submitted 21 July, 2021; originally announced July 2021.

    Comments: This work has been submitted to the International Journal of Network Management (IJNM) and accepted for publication

  11. arXiv:2102.01020  [pdf, other

    cs.NI

    Relational Consensus-Based Cooperative Task Allocation Management for IIoT-Health Networks

    Authors: Carlos Pedroso, Yan Uehara de Moraes, Michele Nogueira, Aldri Santos

    Abstract: IIoT services focused on industry-oriented services often require objects run more than one task. IIoT objects poses the challenge of distributing and managing task allocation among them. The fairness of task allocation brings flexible network reconfiguration and maximizes the tasks to be performed. Although existing approaches optimize and manage the dynamics of objects, not all them consider bot… ▽ More

    Submitted 1 February, 2021; originally announced February 2021.

  12. Improving Predictability of User-Affecting Metrics to Support Anomaly Detection in Cloud Services

    Authors: Vilc Rufino, Mateus Nogueira, Alberto Avritzer, Daniel Menasché, Barbara Russo, Andrea Janes, Vincenzo Ferme, André Van Hoorn, Henning Schulz, Cabral Lima

    Abstract: Anomaly detection systems aim to detect and report attacks or unexpected behavior in networked systems. Previous work has shown that anomalies have an impact on system performance, and that performance signatures can be effectively used for implementing an IDS. In this paper, we present an analytical and an experimental study on the trade-off between anomaly detection based on performance signatur… ▽ More

    Submitted 24 December, 2020; originally announced December 2020.

    Journal ref: IEEE Access, vol. 8, p.198152-198167, 2020

  13. arXiv:2010.15862  [pdf, other

    cs.CR cs.DC cs.NI

    Detecting FDI Attack on Dense IoT Network with Distributed Filtering Collaboration and Consensus

    Authors: Carlos Pedroso, Aldri Santos, Michele Nogueira

    Abstract: The rise of IoT has made possible the development of %increasingly personalized services, like industrial services that often deal with massive amounts of data. However, as IoT grows, its threats are even greater. The false data injection (FDI) attack stands out as being one of the most harmful to data networks like IoT. The majority of current systems to handle this attack do not take into accoun… ▽ More

    Submitted 29 October, 2020; originally announced October 2020.

    Comments: This work has been accept to the IEEE LATINCOM2020. Copyright 978-1-7281-8903-1/20/$31.00 \c{opyright}2020 IEEE

  14. arXiv:2010.09134  [pdf, other

    cs.NI

    GROWN: Local Data Compression in Real-Time To Support Energy Efficiency in WBAN

    Authors: Cainã Passos, Carlos Pedroso, Agnaldo Batista, Michele Nogueira, Aldri Santos

    Abstract: The evolution of wireless technologies has enabled the creation of networks for several purposes as health care monitoring. The Wireless Body Area Networks (WBANs) enable continuous and real-time monitoring of physiological signals, but that monitoring leads to an excessive data transmission usage, and drastically affects the power consumption of the devices. Although there are approaches for redu… ▽ More

    Submitted 18 October, 2020; originally announced October 2020.

    Comments: This work has been accepted for presentation at IEEE LATINCOM 2020. 978-1-7281-8903-1/20/\$31.00 Copyright 2020 IEEE

  15. arXiv:2009.04315  [pdf, other

    cs.NI

    Social-based Cooperation of Vehicles for Data Dissemination of Critical Urban Events

    Authors: Alisson Yury, Everaldo Andrade, Michele Nogueira, Aldri Santos, Fernando Matos

    Abstract: Critical urban events need to be efficiently handled, for instance, through rapid notification. VANETs are a promising choice in supporting notification of information on arbitrary critical events. Although the dynamicity of VANETs compromises the dissemination process, the connections among vehicles based on users' social interests allow for optimizing message exchange and data dissemination. Thi… ▽ More

    Submitted 9 September, 2020; originally announced September 2020.

    Comments: Accepted for presentation at the IEEE Global Communications Conference (GLOBECOM) 2020

  16. arXiv:2006.09320  [pdf, other

    cs.NI cs.DC

    Managing Consensus-Based Cooperative Task Allocation for IIoT Networks

    Authors: Carlos Pedroso, Yan Uehara de Moraes, Michele Nogueira, Aldri Santos

    Abstract: Current IoT services include industry-oriented services, which often require objects to run more than one task. However, the exponential growth of objects in IoT poses the challenge of distributing and managing task allocation among objects. One of the main goals of task allocation is to improve the quality of information and maximize the tasks to be performed. Although there are approaches that o… ▽ More

    Submitted 16 June, 2020; originally announced June 2020.

    Comments: This work has been accept to the IEEE ISCC2020. Copyright 978-1-7281-8086-1/20/$31.00 2020 IEEE

  17. arXiv:2005.07296  [pdf, other

    cs.CY cs.NI cs.SI

    E-Health Sensitive Data Dissemination Exploiting Trust and Mobility of Users

    Authors: Agnaldo Batista, Michele Nogueira, Aldri Santos

    Abstract: E-health services handle a massive amount of sensitive data, requiring reliability and privacy. The advent of new technologies drives e-health services into their continuous provision outside traditional care institutions. This creates uncertain and unreliable conditions, resulting in the challenge of controlling sensitive user data dissemination. Then, there is a gap in sensitive data disseminati… ▽ More

    Submitted 14 May, 2020; originally announced May 2020.

    Comments: This work has been submitted to the IEEE for possible publication

  18. arXiv:2003.07981  [pdf, other

    eess.SP cs.LG stat.ML

    Segmentation and Optimal Region Selection of Physiological Signals using Deep Neural Networks and Combinatorial Optimization

    Authors: Jorge Oliveira, Margarida Carvalho, Diogo Marcelo Nogueira, Miguel Coimbra

    Abstract: Physiological signals, such as the electrocardiogram and the phonocardiogram are very often corrupted by noisy sources. Usually, artificial intelligent algorithms analyze the signal regardless of its quality. On the other hand, physicians use a completely orthogonal strategy. They do not assess the entire recording, instead they search for a segment where the fundamental and abnormal waves are eas… ▽ More

    Submitted 17 March, 2020; originally announced March 2020.

    Journal ref: Intl. Trans. in Op. Res., 30: 601-618 (2023)

  19. arXiv:1907.06392  [pdf, ps, other

    cs.MM cs.NI

    Towards QoS-Aware Recommendations

    Authors: Pavlos Sermpezis, Savvas Kastanakis, João Ismael Pinheiro, Felipe Assis, Mateus Nogueira, Daniel Menasché, Thrasyvoulos Spyropoulos

    Abstract: In this paper we propose that recommendation systems (RSs) for multimedia services should be "QoS-aware", i.e., take into account the expected QoS with which a content can be delivered, to increase the user satisfaction. Network-aware recommendations have been very recently proposed as a promising solution to improve network performance. However, the idea of QoS-aware RSs has been studied from the… ▽ More

    Submitted 1 October, 2020; v1 submitted 15 July, 2019; originally announced July 2019.

    Journal ref: ACM RecSys 2020 workshops (CARS: workshop on Context-Aware Recommender Systems)

  20. arXiv:1704.07154  [pdf, other

    cs.NI

    Can MPTCP Secure Internet Communications from Man-in-the-Middle Attacks?

    Authors: Ho-Dac-Duy Nguyen, Chi-Dung Phung, Stefano Secci, Benevid Felix, Michele Nogueira

    Abstract: -Multipath communications at the Internet scale have been a myth for a long time, with no actual protocol being deployed so that multiple paths could be taken by a same connection on the way towards an Internet destination. Recently, the Multipath Transport Control Protocol (MPTCP) extension was standardized and is undergoing a quick adoption in many use-cases, from mobile to fixed access networks… ▽ More

    Submitted 24 April, 2017; originally announced April 2017.

  21. arXiv:1611.09983  [pdf, ps, other

    cs.NI cs.CR

    Anticipating Moves to Prevent Botnet Generated DDoS Flooding Attacks

    Authors: Michele Nogueira

    Abstract: Volumetric Distributed Denial of Service (DDoS) attacks have been a recurrent issue on the Internet. These attacks generate a flooding of fake network traffic to interfere with targeted servers or network links. Despite many efforts to detect and mitigate them, attackers have played a game always circumventing countermeasures. Today, there is an increase in the number of infected devices, even mor… ▽ More

    Submitted 29 November, 2016; originally announced November 2016.

    Comments: 13 pages

  22. arXiv:1611.06609  [pdf, other

    cs.NI

    MAC Protocols for IEEE 802.11ax: Avoiding Collisions on Dense Networks

    Authors: Rafael Araujo da Silva, Michele Nogueira

    Abstract: Wireless networks have become the main form of Internet access. Statistics show that the global mobile Internet penetration should exceed 70\% until 2019. Wi-Fi is an important player in this change. Founded on IEEE 802.11, this technology has a crucial impact in how we share broadband access both in domestic and corporate networks. However, recent works have indicated performance issues in Wi-Fi… ▽ More

    Submitted 20 November, 2016; originally announced November 2016.

  23. arXiv:1609.09560  [pdf, other

    cs.NI cs.CR

    Early Signals from Volumetric DDoS Attacks: An Empirical Study

    Authors: Michele Nogueira, Augusto Almeida Santos, José M. F. Moura

    Abstract: Distributed Denial of Service (DDoS) is a common type of Cybercrime. It can strongly damage a company reputation and increase its costs. Attackers improve continuously their strategies. They doubled the amount of unleashed communication requests in volume, size, and frequency in the last few years. This occurs against different hosts, causing resource exhaustion. Previous studies focused on detect… ▽ More

    Submitted 23 May, 2017; v1 submitted 29 September, 2016; originally announced September 2016.

  24. arXiv:1609.09314  [pdf, other

    cs.NI

    A New Queue Discipline for Reducing Bufferbloat Effects in HetNet Concurrent Multipath Transfer

    Authors: Benevid Felix, Aldri Santos, Michele Nogueira

    Abstract: Heterogeneous wireless networks have evolved to reach application requirements for low latency and high throughput on Internet access. Recent studies have improved network performance employing the Multipath TCP, which aggregates flows from heterogeneous wireless interfaces in a single connection. Although existing proposals are powerful, coupled congestion control algorithms are currently limited… ▽ More

    Submitted 29 September, 2016; originally announced September 2016.

    Comments: 9 pages, 13 figuras

  25. arXiv:1504.05276  [pdf, other

    cs.CR

    PBF: A New Privacy-Aware Billing Framework for Online Electric Vehicles with Bidirectional Auditability

    Authors: Rasheed Hussain, Donghyun Kim, Michele Nogueira, Junggab Son, Alade O. Tokuta, Heekuck Oh

    Abstract: Recently an online electric vehicle (OLEV) concept has been introduced, where vehicles are propelled through the wirelessly transmitted electrical power from the infrastructure installed under the road while moving. The absence of secure-and-fair billing is one main hurdle to widely adopt this promising technology. This paper introduces a secure and privacy-aware fair billing framework for OLEV on… ▽ More

    Submitted 20 April, 2015; originally announced April 2015.

    Comments: 13 pages, 7 figures