{"id":1649,"date":"2025-10-10T11:58:33","date_gmt":"2025-10-10T10:58:33","guid":{"rendered":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/?page_id=1649"},"modified":"2026-01-29T16:39:24","modified_gmt":"2026-01-29T16:39:24","slug":"publicacoes-pt","status":"publish","type":"page","link":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/publicacoes-pt\/","title":{"rendered":"Publica\u00e7\u00f5es &#8211; PT"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1649\" class=\"elementor elementor-1649\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d4e5762 e-flex e-con-boxed e-con e-parent\" data-id=\"d4e5762\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-1ff268e e-con-full e-flex e-con e-child\" data-id=\"1ff268e\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-254724a elementor-widget elementor-widget-heading\" data-id=\"254724a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Publica\u00e7\u00f5es<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-70cde8d elementor-widget elementor-widget-text-editor\" data-id=\"70cde8d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Esta sec\u00e7\u00e3o re\u00fane as publica\u00e7\u00f5es, relat\u00f3rios e comunica\u00e7\u00f5es cient\u00edficas que resultam das atividades do projeto, promovendo a dissemina\u00e7\u00e3o do conhecimento e a troca de experi\u00eancias com a comunidade acad\u00e9mica e industrial.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fec406c e-flex e-con-boxed e-con e-parent\" data-id=\"fec406c\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-99d74a9 e-con-full e-flex e-con e-child\" data-id=\"99d74a9\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5de04c1 elementor-widget elementor-widget-heading\" data-id=\"5de04c1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The Impact of Filtering in Differential Cryptanalysis: A Case Study on FEAL-8<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9a2e98b elementor-widget elementor-widget-text-editor\" data-id=\"9a2e98b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Costa, I., Amorim, I., Maia, E., Pra\u00e7a, I. (2026). The Impact of\u00a0Filtering in\u00a0Differential Cryptanalysis: A Case Study on\u00a0FEAL-8. In: Katsikas, S., Alcaraz, C. (eds) Security and Trust Management. STM 2025. Lecture Notes in Computer Science, vol 16137. Springer, Cham.\u00a0<a href=\"https:\/\/doi.org\/10.1007\/978-3-032-06155-3_13\">https:\/\/doi.org\/10.1007\/978-3-032-06155-3_13<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c0d7e06 e-con-full e-flex e-con e-child\" data-id=\"c0d7e06\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5d49370 elementor-widget elementor-widget-heading\" data-id=\"5d49370\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Federated Learning: An approach with Hybrid Homomorphic Encryption<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ef1ffae elementor-widget elementor-widget-text-editor\" data-id=\"ef1ffae\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Correira, P., Costa, I., Amorim, I., Maia, E., Pra\u00e7a, I. (2026). Federated Learning: An approach with Hybrid Homomorphic Encryption. In: International Workshop on Cyber-Physical Security for Critical Infrastructures Protection. CPS4CIP 2025. (IN PRESS).<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6245c5d e-con-full e-flex e-con e-child\" data-id=\"6245c5d\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-35cdb26 elementor-widget elementor-widget-heading\" data-id=\"35cdb26\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Towards Privacy-Preserving Federated Learning using Hybrid Homomorphic Encryption<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c0f53b2 elementor-widget elementor-widget-text-editor\" data-id=\"c0f53b2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Costa, I., Amorim, I., Maia, E., Pra\u00e7a, I. (2025). Towards Privacy-Preserving Federated Learning using Hybrid Homomorphic Encryption. In: International Conference on Applied Cryptography and Network Security. ACNS 2026. (SUBMITTED)<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-287453a e-con-full e-flex e-con e-child\" data-id=\"287453a\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3101544 elementor-widget elementor-widget-heading\" data-id=\"3101544\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Rethinking Phishing Detection: How Dataset Quality Affects Model Generalization<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c65a6fb elementor-widget elementor-widget-text-editor\" data-id=\"c65a6fb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Afonso, P., Maia, E., Amorim, I., Pra\u00e7a, I. (2025). Rethinking Phishing Detection: How Dataset Quality Affects Model Generalization. In: International Conference on Advanced Computer Information Technologies. ACIT\u20192025. (IN PRESS).<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-08ae296 e-con-full e-flex e-con e-child\" data-id=\"08ae296\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2b9cecb elementor-widget elementor-widget-heading\" data-id=\"2b9cecb\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Context Aware Recognition of maLicious Emails<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fe933fb elementor-widget elementor-widget-text-editor\" data-id=\"fe933fb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Afonso, P., Maia, E., Amorim, I., Pra\u00e7a, I. (2025). CARLE: Context Aware Recognition of maLicious Emails. In: International Symposium on Foundations &amp; Practice of Security. FPS 2025. (SUBMITTED)<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b58ad34 e-con-full e-flex e-con e-child\" data-id=\"b58ad34\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f6b9f55 elementor-widget elementor-widget-heading\" data-id=\"f6b9f55\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Binary and Multiclass Cyberattack Classification on GeNIS Dataset<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fe493b7 elementor-widget elementor-widget-text-editor\" data-id=\"fe493b7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Silva, M., Pinto, D., Vitorino, J., Maia, E., Pra\u00e7a, I., Amorim, I., Viamonte, M. (2025). Binary and Multiclass Cyberattack Classification on GeNIS Dataset. In: International Symposium on Foundations &amp; Practice of Security. FPS 2025. (IN PRESS).<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Publica\u00e7\u00f5es Esta sec\u00e7\u00e3o re\u00fane as publica\u00e7\u00f5es, relat\u00f3rios e comunica\u00e7\u00f5es cient\u00edficas que resultam das atividades do projeto, promovendo a dissemina\u00e7\u00e3o do conhecimento e a troca de experi\u00eancias com a comunidade acad\u00e9mica e industrial. The Impact of Filtering in Differential Cryptanalysis: A Case Study on FEAL-8 Costa, I., Amorim, I., Maia, E., Pra\u00e7a, I. (2026). The Impact [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1649","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/pages\/1649","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/comments?post=1649"}],"version-history":[{"count":33,"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/pages\/1649\/revisions"}],"predecessor-version":[{"id":2484,"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/pages\/1649\/revisions\/2484"}],"wp:attachment":[{"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/media?parent=1649"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}