Security from Caesar to Vigenère
Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.
Authors
António Santos, Assistant Professor at ISTEC
Media
To cite this article
António Santos, Security from Caesar to Vigenère
DOI: 10.31112/kriativ-tech-2022-06-74
Abstract
Cryptography has accompanied the human being for centuries, starting with being used only by kings and emperors to communicate with their governors and military until now when its use is in all information transfers carried out digitally. The Caesar cipher was one of the first to appear and served for Roman emperors to communicate with their generals and provincial governors. It is a simple substitution number, and as such it has some limitations which, at the time it was used, were not relevant because of the illiteracy of the populations. While the Vigenère cipher brought much more security, filling the vulnerabilities of the Caeser cipher, transforming the Caeser cipher into a polyalphabetic substitution cipher. In this study we will compare the figures: Caeser, Shift and Vigenère; regarding your safety. It is also intended to make some modifications in order to improve and optimize the code without changing the original cipher.
Keywords
Encryption, substitution method, Caesar cipher, Shift cipher, Vigenère cipher.
References
[1] Jain, A., Dedhia, R. and Patil, A. (2015) “Enhancing the Security of Caesar Cipher Substitution Method using a Randomized Approach for more Secure Communication”, International Journal of Computer Applications, Vol. 129 No.13, pp: 144-150,
[2] Saraswat, A., Khatria, C., Sudhakara, Thakrala, P., Biswasa, P.. ( 2016 ) An Extended Hybridization of Vigenere and Caesar Cipher Techniques for Secure Communication, 2nd International Conference on Intelligent Computing, Communication & Convergence (ICCC-2016), Procedia Computer Science 92 pp 355 – 360.
[3] Balogun, A.O. , Sadiku, P. O., Mojeed, H. A., Raifu, H. A. (2017) Multiple Caesar Cypher Encryption Algorithm. ABACUS, (Mathematics Science Series) Vol. 44, No 2. pp 250-258.
[4] Kahate, Atul (2003). Cryptography and network security, Tata McGraw-Hill, New Delhi.
[5] Paar, Christof\ and Pelzl, Jan (2010). Understanding Cryptography: A Textbook for Students and Practitioners. Springer-Verlag, Berlin.
[6] Stinson, D.R. and Paterson, M. B. (2018) Cryptography: Theory and Practice, Fourth Edition. Textbooks in Mathemátics, CRC Press.
[7] Katz, Jonathan and Lindell, Yehuda (2015). Introduction to Modern Cryptography. Second Edition, Taylor & Francis Group, LLC, CRC Press.
[8] Aggarwal, Surabhi (2016). A Review on Enhancing Caesar Cipher, International Journal of Research Science & Management, 3(6).
[9] Stallings, William (2017). Cryptography and network security: Principles and Practice, Fifth Edition, Prentice Hall, New York.
[10] Shrivastava, M., Jain, M, and Singh, P. (2016) Content Based Symmetric Key Algorithm, International Conference on Computational Modeling and Security, Procedia Computer Science 85, pp. 222 – 227.
[11] Singh, Simon (1999).The Code Book, Anchor Books: The Science of Secrecy from Ancient Egypt to Quantum Cryptography. Anchor Boks. New York.
[12] Stamp, Mark and Low, Richard M.(2007). Applied Cryptanalysis - Breaking Ciphers in the Real World. Wiley-Interscience, John Wiley & Sons, Inc..
[13] Holden, Joshua (2017), The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption, Princeton University Press, New Jersey.
[14] Kumari, Sarita (2017) A research Paper on Cryptography Encryption and Compression Techniques, International Journal Of Engineering And Computer Science. Volume 6 Issue 4Page No. 20915-20919. DOI: 10.18535/ijecs/v6i4.20.
[15] Luciano, D. and Priche,, G. Cryptology: From Caesar Ciphers to Public-Key Cryptosystems, The College Mathematics Journal, Vol. 18, No. 1 (Jan., 1987), pp. 2-17
[16] Omolara O.E., Oludare A.I. and Abdulahi S.E..( 2014) Developing a Modified Hybrid Caesar Cipher and Vigenere Cipher for Secure Data Communication, Computer Engineering and Intelligent Systems Vol.5, No.5, pp 34- 47
[17] Singh, Pooja and Sen, Pintu (2017). Enhancing Security of Caesar Cipher Using Divide and Conquer Approach, International Journal of Advance Research in Science and Enginheering, Volume 6, special issue (02).
[18] Sinkov, Abraham (1966), Elementary Cryptanalysis - A Mathematical Approach, Fifth Printing, The Mathematical Association of America. Washington, USA.
[19] Mollin, Richard A. (2007) An Introduction to Cryptography, Second Edition. Discrete Mathematics and its Applications, Chapman & Hall/CRC, California.
[20] Santos, Antonio and Vasconcelos Junior, Renato (2021). Improving Caesar Cipher for greater security. kriativ-tech (9) ,DOI: 10.31112/kriativ-tech-2021-10-54.
[21] Stinson, Douglas and Paterson, Maura. (2018) Cryptography: Theory and Practice fourth edition. CRC Press, CRC Press LLC. Florida.
[22] Musa, Sarhan M. (2018). Network Security and Cryptography: A Self-teaching Introduction. Mercury Learning & Information. Virgínia.
[23] Stallings, William (2017). Cryptography and network security: Principles and Practice, Seventh Edition. Pearson. Essex.
[24] Schneier, Bruce (1996). Applied Cryptography, Second Edition. John Wiley & Sons.
Geographic Information Systems
Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.
Authors
Luísa Orvalho , Professor Coordinator at ISTEC Porto
João Morais, Undergraduate in Computer Engineering at ISTEC Porto
Carlos Teixeira , Undergraduate in Computer Engineering at ISTEC Porto
Media
To cite this article
Luísa Orvalho, João Morais, Carlos Teixeira, Geographic Information Systems
DOI: 10.31112/kriativ-tech-2022-06-76
Abstract
With this article we intend to review the state of the art regarding Geographic Information Systems (GIS) and recognize the great technological evolution of the last decades. Identifying the objectives of GIS, describing its components, its main uses, functions and characterizing the available software of this technology are the main objectives of this investigation.
Keywords
Geographic Information Systems, Uses, Functions, Components, Desktop GIS Applications, Web GIS Applications, Explore Porto Application
References
[1] ArcGIS (2022). ArcGIS https://www.esri-portugal.pt/pt-pt/arcgis/produtos/arcgis-pro/overview
[2] BOLFE, E., & M. FERREIRA. (2008). Sistemas de Informação Geográfica: uma abordagem contextualizada na história. GEOGRAFIA, Rio Claro, v. 33, n. 1, p. 40-45, jan./abr. file:///Downloads/1775-Texto%20do%20artigo-38395-2-10-20200821%20(3).pdf
[3] CÂMARA, G. & J. MEDEIROS. (2003). Tendências de evolução do geoprocessamento. In: ASSAD, E. D.; SANO, E. (Org.) Sistemas de Informações Geográficas. 2. ed. Brasília, DF: Embrapa, cap. XX, p. 411-424. file:////Downloads/1775-Texto%20do%20artigo-38395-2-10-20200821%20(1).pdf
[4] CARTER, J. (1989). On defining the geographic information system. In: Ripple W J (ed.) Fundamentals of Geographic Information Systems: a compendium. ASPRS/ACSM, Falls Church Virginia. http://lidecc.cs.uns.edu.ar/~nbb/ccm/downloads/Literatura/OVERVIEW%20AND%20DEFINITION%20OF%20GIS.pdf
[5] Explore Porto. (2022). Explore Porto https://explore.porto.pt/
[6] GRASS (2022). GRASS. https://grass.osgeo.org/
[7] gvSIG (2022). gvSIG. http://www.gvsig.com/pt/produtos/gvsig-desktop
[8] Intergraph. (2022). Intergraph. https://www.intergraph.com/
[9] MACHADO, J. A. R. (2000). A emergência dos Sistemas e Informação Geográfica na análise e organização do espaço; Fundação Calouste Gulbenkian. http://koha-bmc.ubi.pt/cgi-bin/koha/opac-detail.pl?biblionumber=16377
[10] Map Server. (2022). Map Server https://www.mapserver.org/
[11] Mapinfo. (2022). Mapinfo http://www.geobis.com/mapinfo-gis-software/
[12] Landsat. (2022). https://en.wikipedia.org/wiki/Landsat_program
[13] OpenJUMP. (2022). OpenJump http://www.openjump.org/
[14] QGIS. (2022). QGIS https://www.qgis.org/en/site/
Applications of Artificial Intelligence in Neuroscience Research: an Overview
Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.
Authors
João Emílio Almeida, Assistant Professor at ISTEC Porto
Carlos Teixeira, Student at ISTEC-Porto
João Morais, Student at ISTEC-Porto
Ernesto Oliveira, Student at ISTEC-Porto
Luís Couto, Student at ISTEC-Porto
Media
To cite this article
João Emílio Almeida, Carlos Teixeira, João Morais, Ernesto Oliveira, Luís Couto, Applications of Artificial Intelligence in Neuroscience Research: an Overview
DOI: 10.31112/kriativ-tech-2022-06-75
Abstract
This article presents a review of how artificial intelligence (AI) supports neuroscience investigations and explores a case study where it is applied. AI has an important role to play in research, because it focuses on the mechanisms that generate intelligence and cognition. Neuroscience benefits from AI techniques and increased computing power to improve the interpretation of brain behaviors, having focused on the reciprocal importance that both areas have on research & development. In the future, it is expected that both neuroscience and AI will increase their results of research and empirical advances, accelerating the knowledge of these areas of research and science.
Keywords
Artificial Intelligence, Neuroscience Research, Applied AI.
References
[1] McCarthy, J. & Minsky, M., (2006). A Proposal for the Dartmouth Summer Research Project on Artificial Intelligence. AI Magazine. 27(4), 12-14.
[2] Built In. (2021) 32 Examples of AI in healthcare that will make you feel Better About the Future, https://builtin.com/artificial-intelligence/artificial-intelligence-healthcare
[3] Human Brain Project. (2020) Discover EBRAINS A key enabler to advance brain science, https://www.humanbrainproject.eu/en/
[4] J. Frye, R. Ananthanarayanan, and D. S. Modha. (2007) Towards real-time, mouse-scale cortical simulations, IBM Research Report RJ10404
[5] Goldman, J.S., Kusch, L., Yalcinkaya, B.H., Depannemaecker, D., Nghiem, T-A., Jirsa, V. and Destexhe, A., (2020). Brain-scale emergence of slow-wave synchrony and highly responsive asynchronous states based on biologically realistic population models simulated in The Virtual Brain. bioRxiv.
https://doi.org/10.1101/2020.12.28.424574
[6] V. Braitenberg and A. Schuz. (1991) Anatomy of the Cortex: Statistics and Geometry. Springer.
[7] H. Markram. (2006) The blue brain project. Nature Reviews Neuroscience, 7 (2), 153–160.
[8] Gonzalez, R.T., Riascos, J.A., Barone, D.A.C. (2017) How Artificial Intelligence is Supporting Neuroscience Research: A Discussion About Foundations, Methods and Applications. In: Barone D., Teles E., Brackmann C. (eds) Computational Neuroscience. LAWCN 2017. Communications in Computer and Information Science, vol 720. Springer.
[9] SAS Institute Inc. (2021) Deep Learning https://doi.org/10.1 007/978-3-319-71011-2_6
[10] Hassabis D, Kumaran D, Summerfield C, Botvinick M. (2017) Neuroscience-Inspired Artificial Intelligence, Neuron, 95(2). https://doi.org/10.1016/j.neuron.2017.06.011
[11] Marblestone H, Wayne G, Kording KP. (2016). Toward an integration of deep learning and neuroscience. Front. Comput. Neurosci., 10, p. 94
[12] Ribeiro, J. (2021) Neuroética e Inteligência Artificial, Jornal Público, (in Portuguese). https://www.publico.pt/2021/02/11/opiniao/noticia/neuroetica-inteligencia-artificial-1950013 consulted on May 7, 2022.
[13] Parlamento Europeu (2020) Parlamento na vanguarda das normas europeias sobre inteligência artificial, (in Portuguese) https://www.europarl.europa.eu/news/pt/press-room/20201016IPR89544/parlamento-na-vanguarda-das-normas-europeias-sobre-inteligencia-artificial consulted on May 7, 2022.
[14] Antunes, J. (2010, Janeiro, 18) Neurociências, os Avanços e os Desafios que se Colocam, VI Conferência da Indústria Farmacêutica, Lisboa. (in Portuguese) https://www.medicina.ulisboa.pt/newsfmul-artigo/11/vi-conferencia-da-industria-farmaceutica consulted on May 7, 2022.
Honeypot - a weapon for cyber combat
Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.
Authors
Paulo V. Monteiro, Assistant Professor at ISTEC Porto
João Emílio Almeida, Assistant Professor at ISTEC Porto
Diogo Cunha, Student at ISTEC-Porto
Diana Rodrigues, Student at ISTEC-Porto
Media
To cite this article
Paulo V. Monteiro,João Emílio Almeida, Diogo Cunha e Diana Rodrigues, CHoneypot - a weapon for cyber combat
DOI: 10.31112/kriativ-tech-2022-06-71
Abstract
In this article the honeypot concept is presented, starting with its features, advantages, and disadvantages. High and low interactivity honeypot types are detailed and compared. An open implementation is provided by means of an example, showing how honeypots can be used as an asset defending against cyberattacks.
Keywords
Honeypot; Hacker; Computer Security; Cybersecurity; Countermeasures; Open code; T-Pot.
References
[1] Misa, Thomas J. (2016). "Computer Security Discourse at RAND, SDC, and NSA (1958-1970)". IEEE Annals of the History of Computing. 38 (4): 12–25. doi:10.1109/MAHC.2016.48. S2CID 17609542.
[2] The Portuguese News (2022). “Hospital target of cyberattack”. https://www.theportugalnews.com/news/2022-04-26/hospital-target-of-cyberattack/66614 consulted on May 7, 2022.
[3] Silicon Republic (2022). “Targeted cyberattack takes out Vodafone Portugal”. https://www.siliconrepublic.com/enterprise/vodafone-portugal-cyberattack, consulted on May 7, 2022.
[4] Cybernews (2022). “Major Portuguese media conglomerate hit by ransomware”. https://cybernews.com/news/major-portuguese-media-conglomerate-hit-by-ransomware/, , consulted on January 15, 2022.
[5] Reuters (2022). “Portugal's largest retailer's websites, some services hit by hackers”. https://www.reuters.com/technology/portugals-largest-retailers-websites-some-services-hit-by-hackers-2022-03-30/, consulted on May 7, 2022.
[6] Szor,Peter.The Art Of Computer Virus Research. Addison Wesley Professional,2005.
[7] Cheswick, Bill (1992). "An Evening with BerferdIn Which a Cracker is Lured, Endured, and Studied" (PDF). http://cheswick.com/ches/papers/berferd.pdf Retrieved 3 Feb 2022.
[8] Singh, R. K., & Ramajujam, P. (2009). Intrusion Detection System Using Advanced Honeypots. arXiv preprint arXiv:0906.5031.
[9] Nicomette, V., Kaâniche, M., Alata, E., & Herrb, M. (2011). Set-up and deployment of a high-interaction honeypot: experiment and lessons learned. Journal in computer virology, 7(2), 143-157.
[10] Mokube, I., & Adams, M. (2007, March). Honeypots: concepts, approaches, and challenges. In Proceedings of the 45th annual southeast regional conference (pp. 321-326).
Celebration of the 5th Centenary of Fernão de Magalhães´s circumnavigation voyage
Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.
Authors
Luísa Orvalho,Professor Coordinator at ISTEC Porto
João Sousa, Undergraduate in Multimedia Engineering at ISTEC Porto
Lucas Brito, Undergraduate in Multimedia Engineering at ISTEC Porto
Media
To cite this article
Luísa Orvalho, João Sousa e Lucas Brito, Celebration of the 5th Centenary of Fernão de Magalhães´s circumnavigation voyage
DOI: 10.31112/kriativ-tech-2022-06-72
Abstract
Keywords
References
[1] Carlos Fiolhais e Décio Martins (2010). Breve História da Ciência em Portugal. Gradiva
[2] Castro.M.J(n.d).Fernão de Magalhães.FSCH.http://www.fcsh.unl.pt/artravel/pdf/TS-42.pdf
[3] Lusa.(2020,outubro).V Centenário Magalhães. Oito projetos de investigação financiados com 2,3 milhões de euros.Observador.https://observador.pt/2020/10/21/v-centenario-magalhaes-oito-projetos-de-investigacao-financiados-com-23-milhoes-de-euros/
[4] Lusa.(2018,setembro). Talvez ainda haja coisas para descobrir sobre a viagem de Fernão de Magalhães.Diário De Notícias. https://www.dn.pt/vida-e-futuro/talvez-ainda-haja-coisas-para-descobrir-sobre-a-viagem-de-magalhaes----biografo-9894643.html
[5] República Portuguesa.Defesa Nacional.(2019,janeiro).Comemorações dos 500 anos da circum-navegação de Fernão de Magalhães.https://www.defesa.gov.pt/pt/comunicacao/noticias/Paginas/Comemorações-dos-500-anos-da-circum-navegação-de-Fernão-de-Magalhães.
[6] República Portuguesa.Governo Português.(2021,novembro)Relato da viagem de circum-navegação de Fernão de Magalhães candidato à Memória do Mundo da UNESCO.https://www.portugal.gov.pt/pt/gc22/comunicacao/noticia?i=documentos-da-viagem-de-fernao-de-magalhaes-candidatos-a-memoria-da-unesco
[7] República Portuguesa.Marinha Portuguesa.(2019,setembro). Efeméride | início da viagem de circum navegação.https://ccm.marinha.pt/pt/museumarinha_web/multimedia_web/Paginas/efemeride-inicio-viagem-circumnavegacao-magalhaes---20set19.aspx
[8] República Portuguesa.Marinha Portuguesa .(n.d.).Magalhães 500 anos da circum-navegação.https://www.marinha.pt/pt/magalhaes500anos
[9] Vieira.N.(2019,agosto). Como as navegações de Fernão de Magalhães há 500 anos impactaram a humanidade.CanalTech. https://canaltech.com.br/ciencia/como-as-navegacoes-de-fernao-de-magalhaes-ha-500-anos-impactaram-a-humanidade-145871/
[10] Silva.A.S.(2019,abril).A Viagem de Circum-Navegação como inspiração para agir hoje.Portal Diplomatico.https://portaldiplomatico.mne.gov.pt/images/noticias/2019/A_Viagem_de_Circum-Navegação_como_inspiração_para_agir_hoje.pdf
[11] Wikipedia.(2017,abril).Globalização.Wikipedia.[Webpage].https://pt.wikipedia.org/wiki/Globalização#Teorias_da_Globalização
Environmental Sustainability in Companies: The Circular
Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.
Authors
Luísa Orvalho,Professor Coordinator at ISTEC Porto
Diogo Oliveira, Undergraduate in Multimedia Engineering at ISTEC Porto
Pedro Silva, Undergraduate in Multimedia Engineering at ISTEC Porto
Media
To cite this article
Luísa Orvalho, Diogo Oliveira e Pedro Silva, Environmental Sustainability in Companies: The Circular Economy
DOI: 10.31112/kriativ-tech-2022-06-73
Abstract
Keywords
References
1] Organização das Nações Unidas. (maio 2022). Objetivos de Desenvolvimento Sustentável.
https://unric.org/pt/Objetivos-de-Desenvolvimento-Sustentavel/
[2] Fundação Ellen MacArthur. (maio, 2022). Economia Circular. https://archive.ellenmacarthurfoundation.org/pt/economia-circular/diagrama-sistemico
[3] Fundação Ellen MacArthur. (2021). Objetivos universais de políticas para economia circular. (pp. 35).
[4] apud, p. 46.
[5] apud, p. 53.
[6] Kemp, R. Pearson, P. (2007) Measuring Eco-Innovation. OECD.
[7] Comissão Europeia. (maio, 2022) Eco inovação: o segredo da competitividade futura da europa. (pp. 3).
[8] ZERO – Associação Sistema Terrestre Sustentável. (maio, 2022). 7 de maio: Portugal aciona cartão de crédito ambiental cada vez mais cedo. https://zero.ong/7-de-maio-portugal-aciona-cartao-de-credito-ambiental-cada-vez-mais-cedo/
[9] Resolução n.º 190-A/2017 do Conselho de Ministros (2017). Diário da República: I Série, 2º Suplemento. https://dre.pt/dre/detalhe/resolucao-conselho-ministros/190-a-2017
[10]Câmara Municipal do Porto. (2017). Roadmap para um Porto Circular. (pp. 11).
[11]Porto. (dezembro, 2021). Invicta incentiva outras cidades rumo à economia circular. https://www.porto.pt/pt/noticia/invicta-incentiva-outras-cidades-rumo-a-economia-circular
[12] Fundação Ellen MacArthur. (maio, 2022). Economia Circular. https://archive.ellenmacarthurfoundation.org/pt/economia-circular/diagrama-sistemico
Relation of Data Visualization Techniques with the phases of Cybersecurity Incidents Response process
Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.
Authors
Ivo Ricardo Dias Rosa,Invited Assistant Professor at ISTEC
Media
To cite this article
Ivo Ricardo Dias Rosa, elation of Data Visualization Techniques with the phases of Cybersecurity Incidents Response process
DOI: 10.31112/kriativ-tech-2021-10-70
Abstract
Globally for nations and organizations (also due to the impositions and response needs imposed by security and privacy regulations) it is increasingly relevant to strengthen the ability of organizations to anticipate and detect possible security events in a timely manner, even when it is not possible to contain the threat it is necessary that incident response teams are able to tell and explain what happened.
This article provides a review was made concerning Cybersecurity, in particular the importance and relevance of the security incident response process, which may have operational and reputational impacts, and the identification and mapping of the purposes of applying data visualization techniques to give meaning or explain the typical phases of the security incident response process.
Keywords
Cybersecurity, cybersecurity incidents, incident response process, data visualization
References
DADOS - A Nova Jóia da Coroa. September 04, 2017. Available online: https://dataprivacy-on.com/comunicacao/2017/11/9/dados-a-nova-joia-da-coroa. Accessed on 25-02-2022.
Bravo, R. (2020). Segurança da informação e Cibersegurança: aspetos práticos e legislação. Segurança Da Informação e Cibersegurança: Aspetos Práticos e Legislação.
Diakun-Thibault, Nadia. (2014). Defining Cybersecurity. Technology Innovation Management Review. 2014.
ISO/IEC 27001 - INFORMATION SECURITY MANAGEMEN. Available online: https://www.iso.org/isoiec-27001-information-security.html. Accessed on 25-02-2022
ISO/IEC 27701:2019 Security techniques — Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management — Requirements and guidelines. Available online: https://www.iso.org/standard/71670.html. Accessed on 25-02-2022
World Economic Forum. The Global Risks Report 2021 16th Edition - INSIGHT REPORT. In partnership with Marsh McLennan, SK Group and Zurich Insurance Group published by the World Economic Forum. 2021. Available online: http://www3.weforum.org/docs/WEF_The_Global_Risks_Report_2021.pdf. Accessed on 12-03-2022
World Economic Forum. The Global Risks Report 2022 17th Edition - INSIGHT REPORT. In partnership with Marsh McLennan, SK Group and Zurich Insurance Group published by the World Economic Forum. 2022. Available online: http://www3.weforum.org/docs/WEF_The_Global_Risks_Report_2022.pdf. Accessed on 12-03-2022
Incident Response Steps and Frameworks for SANS and NIST. 3 de Janeiro de 2020. Available online: https://cybersecurity.att.com/blogs/security-essentials/incident-response-steps-comparison-guide. Accessed on 10-03-2022
ENISA. 2018. “Reference Incident Classification Taxonomy Task Force Status and Way Forward.” European Union Agency For Network and Information Security.
Marty, R. (2008). Applied Security Visualization. Addison Wesley Professional Indianapolis, Indiana, ISBN-10:0-321-51010-0.
Ricardo, André & Grégio, André & Pereira, Benício & Filho, Carvalho & Montes, Antonio & Santos, Rafael. (2009). Capítulo 5 Técnicas de Visualização de Dados aplicadas à Segurança da Informação. Available online: https://www.researchgate.net/publication/268397430_Capitulo_5_Tecnicas_de_Visualizacao_de_Dados_aplicadas_a_Seguranca_da_Informacao. Accessed on 10-03-2022
Tufte, Edward R.. The Visual Display of Quantitative Information. Graphic Press, 2nd edition, 2001.
Data visualization techniques for cyber security analysts — Guest Blog by Cambridge Intelligence. Department for International Trade The Netherlands. February 13, 2020. Available online: https://medium.com/cfs2020/data-visualization-techniques-for-cyber-security-analysts-guest-blog-by-cambridge-intelligence-1b3d8ddbfc56. Accessed on 12-03-2022.
Managing difficulties of learning Technical English
Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.
Authors
Ana Cristina Guerra, Assistant Professor at ISTEC
Media
To cite this article
Ana Cristina Guerra, Managing difficulties of learning Technical English
DOI:10.31112/kriativ-tech-2021-10-69
Abstract
The difficulties of learning Technical English. The particularities presented in the pedagogical process. Expectations of students in this type of scientific area. Special Grammar Issues
Keywords
English, Teaching English, Technical English, English and Pedagogical Issues.
References
[1] E. Koenig, “Developing English
Language Competence for Global Engineers”, IEEE Global, 2020.
[2] S. Pazoki, “Engineering Students Motivation to Learn Techical English in ESP Courses”, RELC Journal, 2020.
[3] O. Chugai, “Teaching Technical English: Corrective Feedback Based on Students’ and Teachers’ Beliefs”, Multidisciplinary Journal for Education Social and Technological Sciences, 2021.
[4] X. Xue, “Using a SPOC-based flipped classrroom instructional mode to teach English pronunciation”, Computer Assisted Language Learning, 2021.
[5] M. Karas, “What level of proficiency to teachers need to teach English”, TELSL-EJ, 2020.
[6] V. Dronjic, “How (Not) to Teach English Vocabulary”, The Catesol Journal, 2019.
Procedural generation: diversification algorithms for level generation in an RPG video game
Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.
Authors
Ricardo Baptista, Assistant Professor at ISTEC-Porto/ CITECA
Renato Santos, Computer Degree at ISTEC-Porto
Media
To cite this article
Ricardo Baptista, Renato Santos, Procedural generation: diversification algorithms for level generation in an RPG video game
DOI: 10.31112/kriativ-tech-2021-10-66
Abstract
It is necessary to provide some gameplay diversity to nurture a growing desire to play again when it comes to simple video games. To this end, we can focus on one of the most prominent components, the videogame environment itself.
Procedural generation algorithms assist both the developer in the development process and the player by providing new experiences each time he plays. However, studying and choosing the correct algorithm for the desired video game style is essential for success since if the algorithm does not fit the intended purpose, the feeling when playing will not be the same.
This article intends to approach some of the videogame genres and present a procedural level generation algorithms study, followed by the analysis of the algorithm implemented in a videogame developed as a personal project.
Keywords
Procedural generation, videogames, RPG, development, algorithm
References
Adamatzky, A. (2010). Game of Life Cellular Automata. Springer.
Adams, E., & Rollings, A. (2006). Fundamentals of game design. New Riders. p. 67
Apperley, T. H. (2006). Genre and game studies: Toward a critical approach to video game genres. Simulation & Gaming, 37(1), 6–23. https://doi.org/10.1177/1046878105282278
Atari 2600 VCS catalog - Atari (USA) - 1981 - English. (n.d.). Www.atarimania.com. Retrieved March 22, 2021, from http://www.atarimania.com/catalog-atari-atari-usa-co16725-rev-d_3_2.html
Baptista, R. J. V. (2017). Jogos Sérios para Treino e Certificação de Competências. Repositorio-Aberto.up.pt. https://repositorio-aberto.up.pt/handle/10216/110820
Barton, M., & Stacks, S. (2019). Dungeons and desktops: the history of computer role-playing games. Crc Press.
Baron, J. R. (2017). Procedural Dungeon Generation Analysis and Adaptation. In Proceedings of the Southeast Conference (ACM SE '17). ACM, New York, NY, USA, 168–171. DOI: https://doi.org/10.1145/3077286.3077566
Bateman, C. (2014, August 13). Meet Bertie the Brain, the world’s first arcade game, built in Toronto - Spacing Toronto. Spacing Toronto. http://spacing.ca/toronto/2014/08/13/meet-bertie-brain-worlds-first-arcade-game-built-toronto/
Donovan, T. (2010). Replay: The History of Video Games. Yellow Ant.
Dungeon generation using BSP trees | eskerda.com. (2013, December 22). Eskerda. https://eskerda.com/bsp-dungeon-generation/
Edwards, B. (2012, May 27). Inside the Magnavox Odyssey, the First Video Game Console. PCWorld. https://www.pcworld.com/article/464739/inside_the_magnavox_odyssey_the_first_video_game_console.html
Esposito, N. (2005). A short and simple definition of what a videogame is. In Proceedings of the 2005 DiGRA International Conference: Changing Views: Worlds in Play (DiGRA’05), (3). http://www.digra.org/digital-library/publications/a-short-and-simple-definition-of-what-a-videogame-is/
Esquerda, L. (2013). Dungeon generation using BSP trees. https://eskerda.com/bsp-dungeon-generation/
Greene, G. (2015, November 28). The art and legacy of the ’90s console war. Venture Beat. https://venturebeat.com/2015/11/28/the-art-and-legacy-of-the-90s-console-war/
History.com Editors. (2019, June 10). Video Game History. HISTORY; A&E Television Networks. https://www.history.com/topics/inventions/history-of-video-games
Jogo eletrônico. (2021). Britannica.com.br. https://escola.britannica.com.br/artigo/jogo-eletr%C3%B4nico/481214
Matthews, V. (2018, April 12). The Many Different Types of Video Games & Their Subgenres [Review of The Many Different Types of Video Games & Their Subgenres]. https://www.idtech.com/blog/different-types-of-video-game-genres
McMillen, E. (2012, November 28). Postmortem: McMillen and Himsl’s The Binding of Isaac. Game Developer. https://www.gamedeveloper.com/business/postmortem-mcmillen-and-himsl-s-i-the-binding-of-isaac-i-
Nazgum. (2019). Procedural generation with Godot: Creating caves with Cellular Automata. Abitawake.com. https://abitawake.com/news/articles/procedural-generation-with-godot-creating-caves-with-cellular-automata
Nintendo. (1987). The Official Nintendo Player’s Guide (1987). In Internet Archive. https://archive.org/details/The_Official_Nintendo_Players_Guide_1987/page/n151/mode/2up
Pearson, D. (2013, December 31). Where I’m @: A Brief Look At The Resurgence of Roguelikes [Review of Where I’m @: A Brief Look At The Resurgence of Roguelikes]. GamesIndustry.biz. https://www.gamesindustry.biz/articles/2013-01-30-where-im-a-brief-look-at-the-resurgence-of-roguelikes
Powell, K. (2019, March 10). What electronic games can teach us. Knowable Magazine. https://knowablemagazine.org/article/mind/2019/video-games-educational-benefits
Schiff, J. L. (2011). Cellular automata: A discrete view of the world. (Vol.45). John Wiley & Sons.
Valtchanov, V. & Brown, J. A. (2012). Evolving Dungeon Crawler Level With Relative Placement. In Proceedings of the Fifth International C* Conference on Computer Science and Software Engineering (C3S2E '12). Association for Computing Machinery, New York, NY, USA, 27–35. DOI: https://doi.org/10.1145/2347583.2347587
van der Linden, R., Lopes, R., & Bidarra, R. (2014). Procedural Generation of Dungeons. IEEE Transactions on Computational Intelligence and AI in Games, 6(1), 78–89. https://doi.org/10.1109/tciaig.2013.2290371
Yee, N. (2006). The Demographics, Motivations, and Derived Experiences of Users of Massively Multi-User Online Graphical Environments. Presence: Teleoperators and Virtual Environments 2006; 15 (3), 309–329. DOI: https://doi.org/10.1162/pres.15.3.309
BYOD – Impact in Architecture and Information Security Corporate Policy
Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.
Authors
Nuno Miguel Carvalho Galego, Assistent Professor – ISTEC Lisbon
Media
To cite this article
Nuno Miguel Carvalho Galego, BYOD – Impact in Architecture and Information Security Corporate Policy
DOI: 10.31112/kriativ-tech-2021-10-67
Abstract
BYOD is a new business trend where employees are using their own devices for work purposes. This phenomenon has created new challenges in information security. Thus, organizations should adapt information security corporate strategy in order to address this new reality. This paper tries to identify and explore the optimal way to do this rearrangement, evaluating BYOD environment and measuring all relevant factors.
Keywords
BYOD; Mobility; Threat; Risk; Information Security; Corporate Strategy
References
Astani, M., Ready, K., & Tessema, M. (2013). BYOD ISSUES AND STRATEGIES IN ORGANIZATIONS. Issues in Information Systems, 195-201.
Dedeche, A., Liu, F., Le, M., & Lajami , S. (2013). Emergent BYOD Security Challenges. Melbourne, Australia: University of Melbourne.
Disterer, G., & Kleiner, C. (2013). BYOD Bring Your Own Device. CENTERIS 2013 - Conference on ENTERprise Information Systems / ProjMAN 2013 - (pp. 43 – 53). Procedia Technology.
International Organization for Standardization. (2008, 06 15). ISO/IEC 27005. (I. C. Office, Ed.) Retrieved 02 06, 2014
ISACA. (2008). Glossary of Items. Retrieved 02 06, 2014, from ISACA: http://www.isaca.org/Knowledge-Center/ Documents/Glossary/glossary.pdf
Nicolai, F. J. (1997). Resources Firms and Strategies. In A Reader in the Resource-based Perspective. Oxford.
Risk. (n.d.). Retrieved 02 06, 2014, from Wikipedia: http://en.wikipedia.org/wiki/Risk
Singh, N. (2012). B.Y.O.D. Genie Is Out Of the Bottle – “Devil Or Angel”. Journal of Business Management & Social Sciences Research (JBM&SSR), 1, 3.