{"id":1697,"date":"2025-10-10T13:36:44","date_gmt":"2025-10-10T12:36:44","guid":{"rendered":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/?page_id=1697"},"modified":"2026-01-12T14:35:29","modified_gmt":"2026-01-12T14:35:29","slug":"acerca-eng","status":"publish","type":"page","link":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/en\/acerca-eng\/","title":{"rendered":"Acerca-Eng"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1697\" class=\"elementor elementor-1697\">\n\t\t\t\t<div class=\"elementor-element elementor-element-85869d9 e-flex e-con-boxed e-con e-parent\" data-id=\"85869d9\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-37494b4b e-con-full e-flex e-con e-child\" data-id=\"37494b4b\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-35d690cc elementor-widget elementor-widget-heading\" data-id=\"35d690cc\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Project<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-303ef84e elementor-widget elementor-widget-text-editor\" data-id=\"303ef84e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><strong>PC2phish<\/strong> is an innovative project aimed at strengthening the cyber resilience of local public administration through proactive detection of phishing and malware. By combining Artificial Intelligence, contextual analysis, and software monitoring, PC2phish seeks to protect citizens, institutions, and essential public services from digital threats.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f4931c e-flex e-con-boxed e-con e-child\" data-id=\"f4931c\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-af07573 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"af07573\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-shield-alt\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M466.5 83.7l-192-80a48.15 48.15 0 0 0-36.9 0l-192 80C27.7 91.1 16 108.6 16 128c0 198.5 114.5 335.7 221.5 380.3 11.8 4.9 25.1 4.9 36.9 0C360.1 472.6 496 349.3 496 128c0-19.4-11.7-36.9-29.5-44.3zM256.1 446.3l-.1-381 175.9 73.3c-3.3 151.4-82.1 261.1-175.8 307.7z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8e08fae elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"8e08fae\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-robot\" viewBox=\"0 0 640 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M32,224H64V416H32A31.96166,31.96166,0,0,1,0,384V256A31.96166,31.96166,0,0,1,32,224Zm512-48V448a64.06328,64.06328,0,0,1-64,64H160a64.06328,64.06328,0,0,1-64-64V176a79.974,79.974,0,0,1,80-80H288V32a32,32,0,0,1,64,0V96H464A79.974,79.974,0,0,1,544,176ZM264,256a40,40,0,1,0-40,40A39.997,39.997,0,0,0,264,256Zm-8,128H192v32h64Zm96,0H288v32h64ZM456,256a40,40,0,1,0-40,40A39.997,39.997,0,0,0,456,256Zm-8,128H384v32h64ZM640,256V384a31.96166,31.96166,0,0,1-32,32H576V224h32A31.96166,31.96166,0,0,1,640,256Z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-38ee174 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"38ee174\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-building\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M128 148v-40c0-6.6 5.4-12 12-12h40c6.6 0 12 5.4 12 12v40c0 6.6-5.4 12-12 12h-40c-6.6 0-12-5.4-12-12zm140 12h40c6.6 0 12-5.4 12-12v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12zm-128 96h40c6.6 0 12-5.4 12-12v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12zm128 0h40c6.6 0 12-5.4 12-12v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12zm-76 84v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm76 12h40c6.6 0 12-5.4 12-12v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12zm180 124v36H0v-36c0-6.6 5.4-12 12-12h19.5V24c0-13.3 10.7-24 24-24h337c13.3 0 24 10.7 24 24v440H436c6.6 0 12 5.4 12 12zM79.5 463H192v-67c0-6.6 5.4-12 12-12h40c6.6 0 12 5.4 12 12v67h112.5V49L80 48l-.5 415z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8678d95 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"8678d95\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-globe\" viewBox=\"0 0 496 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M336.5 160C322 70.7 287.8 8 248 8s-74 62.7-88.5 152h177zM152 256c0 22.2 1.2 43.5 3.3 64h185.3c2.1-20.5 3.3-41.8 3.3-64s-1.2-43.5-3.3-64H155.3c-2.1 20.5-3.3 41.8-3.3 64zm324.7-96c-28.6-67.9-86.5-120.4-158-141.6 24.4 33.8 41.2 84.7 50 141.6h108zM177.2 18.4C105.8 39.6 47.8 92.1 19.3 160h108c8.7-56.9 25.5-107.8 49.9-141.6zM487.4 192H372.7c2.1 21 3.3 42.5 3.3 64s-1.2 43-3.3 64h114.6c5.5-20.5 8.6-41.8 8.6-64s-3.1-43.5-8.5-64zM120 256c0-21.5 1.2-43 3.3-64H8.6C3.2 212.5 0 233.8 0 256s3.2 43.5 8.6 64h114.6c-2-21-3.2-42.5-3.2-64zm39.5 96c14.5 89.3 48.7 152 88.5 152s74-62.7 88.5-152h-177zm159.3 141.6c71.4-21.2 129.4-73.7 158-141.6h-108c-8.8 56.9-25.6 107.8-50 141.6zM19.3 352c28.6 67.9 86.5 120.4 158 141.6-24.4-33.8-41.2-84.7-50-141.6h-108z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c6973d8 e-flex e-con-boxed e-con e-parent\" data-id=\"c6973d8\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5a3d0f3 e-con-full e-flex e-con e-child\" data-id=\"5a3d0f3\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5cd86fc elementor-widget elementor-widget-heading\" data-id=\"5cd86fc\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">About<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5dfe92f elementor-widget elementor-widget-text-editor\" data-id=\"5dfe92f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><strong>PC2phish<\/strong> (Proactive Cybersecurity for Phishing) emerges as a response to the growing threat of phishing and malware within local public administration. Many municipal entities store sensitive personal and financial data, making them attractive targets for cyberattacks. The compromise of privileged accounts can expose not only an individual but also dozens or even hundreds of interconnected citizens and organizations.<\/p><p>In this context, PC2phish proposes an Artificial Intelligence\u2013based solution capable of analyzing emails and software behavior in real time, alerting users to potential phishing or malware threats, and strengthening the digital resilience of public institutions. The project will be carried out in partnership with the Municipality of Valongo, demonstrated in a real environment and in compliance with European security and privacy regulations<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ec8878e e-con-full e-flex e-con e-child\" data-id=\"ec8878e\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e7a0db3 elementor-widget elementor-widget-image\" data-id=\"e7a0db3\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1536\" height=\"1024\" src=\"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/Designer-2.png\" class=\"attachment-full size-full wp-image-1070\" alt=\"\" srcset=\"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/Designer-2.png 1536w, https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/Designer-2-300x200.png 300w, https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/Designer-2-1024x683.png 1024w, https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/Designer-2-768x512.png 768w\" sizes=\"(max-width: 1536px) 100vw, 1536px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7720f113 e-flex e-con-boxed e-con e-parent\" data-id=\"7720f113\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-45114b01 e-con-full e-flex e-con e-child\" data-id=\"45114b01\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-da7ae94 e-con-full e-flex e-con e-child\" data-id=\"da7ae94\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6b33e40 elementor-widget elementor-widget-heading\" data-id=\"6b33e40\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Resarch Group<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f989ac9 elementor-widget elementor-widget-heading\" data-id=\"f989ac9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">GECAD - Research Group on Intelligent Engineering and Computing for Advanced Innovation and Development<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4fe1438 elementor-widget elementor-widget-text-editor\" data-id=\"4fe1438\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>\u00a0<\/p><p><img decoding=\"async\" class=\"wp-image-529 aligncenter\" src=\"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/09\/GECAD_LOGO-02-300x66.png\" alt=\"\" width=\"223\" height=\"49\" data-wp-editing=\"1\" srcset=\"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/09\/GECAD_LOGO-02-300x66.png 300w, https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/09\/GECAD_LOGO-02-1024x226.png 1024w, https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/09\/GECAD_LOGO-02-768x170.png 768w, https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/09\/GECAD_LOGO-02-1536x339.png 1536w, https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/09\/GECAD_LOGO-02.png 2037w\" sizes=\"(max-width: 223px) 100vw, 223px\" \/><\/p><p>The GECAD (Research Group on Intelligent Engineering and Computing for Advanced Innovation and Development) is the largest Research &amp; Development unit of the Polytechnic of Porto, based at the School of Engineering of the Polytechnic of Porto (ISEP). Coordinated by Professor Zita Vale and with Professor Maria Goreti Carvalho Marreiros as vice-coordinator, the group currently integrates more than 70 researchers, including over 20 PhD holders, with strong expertise in the application of Artificial Intelligence techniques to energy systems and intelligent systems.<\/p><ul><li>Multi-agent modeling and simulation of energy systems;<\/li><li>Design and development of Demand Response models, applied in both simulated and real scenarios;<\/li><li>Management of distributed energy resources in smart grids, including large-scale penetration of electric vehicles and renewable sources;<\/li><li>Modeling and simulation of electricity markets;<\/li><li>Advanced data analysis and data mining techniques applied to energy and other domains.<\/li><\/ul><p>The scientific recognition of GECAD is evident in multiple indicators: participation in more than 60 national and international projects, dozens of annual publications in prestigious scientific journals, and regular editing of special issues in leading international publications.<\/p><p>Aware of its responsibility to society, GECAD adopts the motto \u201cIntelligence for a Sustainable, Safe, and Inclusive World\u201d, directing its projects toward critical areas such as Energy, Transport, Environment, Economy, Social Inclusion, Critical Infrastructures, Security, Information Accessibility, and new forms of Socialization.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0530ede e-con-full e-flex e-con e-child\" data-id=\"0530ede\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f06a1de elementor-widget elementor-widget-heading\" data-id=\"f06a1de\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Vision<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0a25abb elementor-widget elementor-widget-text-editor\" data-id=\"0a25abb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>The goal of PC2phish is to become a reference tool in strengthening the digital protection of local Public Administration. The vision is to provide safer, more reliable, and more resilient public services by reducing cybersecurity incidents. In the long term, the system is expected to be scalable and adaptable to multiple municipalities and public entities in Portugal and across Europe, while ensuring privacy and maintaining compliance with GDPR, NIS2, and the Cyber Resilience Act.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-49f0034 elementor-widget elementor-widget-heading\" data-id=\"49f0034\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Summary<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3ca4170 elementor-widget elementor-widget-text-editor\" data-id=\"3ca4170\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>The PC2phish project aims to develop an Artificial Intelligence-based tool for the proactive detection of phishing emails and malware activity, specifically designed for employees of local Public Administration. Its main goal is to enhance system security, protect sensitive data, and reduce the risk of fraud and human error, while ensuring computational efficiency and privacy preservation.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-21df158 e-con-full e-flex e-con e-child\" data-id=\"21df158\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-3069ab6 e-con-full e-flex e-con e-child\" data-id=\"3069ab6\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-83abb88 elementor-widget elementor-widget-text-editor\" data-id=\"83abb88\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\tMain Objectives:\n<ul> <li>Implement contextual email analysis (sender, headers, URLs, attachments)<\/li> <li>Develop a text content analysis module based on LLM to detect persuasion tactics<\/li> <li>Monitor software processes to identify malware and abnormal activities<\/li> <li>Create educational materials and workshops to raise employee awareness<\/li> <li>Validate the prototype in a real-world environment at the Valongo City Council<\/li> <\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a5fa27c e-con-full e-flex e-con e-child\" data-id=\"a5fa27c\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-62832a5 elementor-widget elementor-widget-text-editor\" data-id=\"62832a5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Work Packages<\/p><ul><li><strong>WP1<\/strong> \u2013 Management, Communication and Dissemination<\/li><li><strong>WP2<\/strong> \u2013 Technical Specifications<\/li><li><strong>WP3<\/strong> \u2013 Phishing and Malware Detection<\/li><li><strong>WP4<\/strong> \u2013 PC2phish Proof of Concept<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Project PC2phish is an innovative project aimed at strengthening the cyber resilience of local public administration through proactive detection of phishing and malware. By combining Artificial Intelligence, contextual analysis, and software monitoring, PC2phish seeks to protect citizens, institutions, and essential public services from digital threats. About PC2phish (Proactive Cybersecurity for Phishing) emerges as a response [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1697","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/pages\/1697","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/comments?post=1697"}],"version-history":[{"count":49,"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/pages\/1697\/revisions"}],"predecessor-version":[{"id":2408,"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/pages\/1697\/revisions\/2408"}],"wp:attachment":[{"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/media?parent=1697"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}