{"id":1735,"date":"2025-10-10T16:29:01","date_gmt":"2025-10-10T15:29:01","guid":{"rendered":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/?page_id=1735"},"modified":"2026-01-29T16:39:56","modified_gmt":"2026-01-29T16:39:56","slug":"publications-eng","status":"publish","type":"page","link":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/en\/publications-eng\/","title":{"rendered":"Publica\u00e7\u00f5es-ENG"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1735\" class=\"elementor elementor-1735\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d4e5762 e-flex e-con-boxed e-con e-parent\" data-id=\"d4e5762\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-1ff268e e-con-full e-flex e-con e-child\" data-id=\"1ff268e\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-254724a elementor-widget elementor-widget-heading\" data-id=\"254724a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Publications<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-70cde8d elementor-widget elementor-widget-text-editor\" data-id=\"70cde8d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>This section gathers the publications, reports, and scientific communications resulting from the project\u2019s activities, promoting knowledge dissemination and the exchange of experiences with the academic and industrial community.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fec406c e-flex e-con-boxed e-con e-parent\" data-id=\"fec406c\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-99d74a9 e-con-full e-flex e-con e-child\" data-id=\"99d74a9\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5de04c1 elementor-widget elementor-widget-heading\" data-id=\"5de04c1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The Impact of Filtering in Differential Cryptanalysis: A Case Study on FEAL-8<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9a2e98b elementor-widget elementor-widget-text-editor\" data-id=\"9a2e98b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Costa, I., Amorim, I., Maia, E., Pra\u00e7a, I. (2026). The Impact of\u00a0Filtering in\u00a0Differential Cryptanalysis: A Case Study on\u00a0FEAL-8. In: Katsikas, S., Alcaraz, C. (eds) Security and Trust Management. STM 2025. Lecture Notes in Computer Science, vol 16137. Springer, Cham.\u00a0<a href=\"https:\/\/doi.org\/10.1007\/978-3-032-06155-3_13\">https:\/\/doi.org\/10.1007\/978-3-032-06155-3_13<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c0d7e06 e-con-full e-flex e-con e-child\" data-id=\"c0d7e06\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5d49370 elementor-widget elementor-widget-heading\" data-id=\"5d49370\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Federated Learning: An approach with Hybrid Homomorphic Encryption<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ef1ffae elementor-widget elementor-widget-text-editor\" data-id=\"ef1ffae\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Correira, P., Costa, I., Amorim, I., Maia, E., Pra\u00e7a, I. (2026). Federated Learning: An approach with Hybrid Homomorphic Encryption. In: International Workshop on Cyber-Physical Security for Critical Infrastructures Protection. CPS4CIP 2025. (IN PRESS).<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6245c5d e-con-full e-flex e-con e-child\" data-id=\"6245c5d\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-35cdb26 elementor-widget elementor-widget-heading\" data-id=\"35cdb26\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Towards Privacy-Preserving Federated Learning using Hybrid Homomorphic Encryption<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c0f53b2 elementor-widget elementor-widget-text-editor\" data-id=\"c0f53b2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Costa, I., Amorim, I., Maia, E., Pra\u00e7a, I. (2025). Towards Privacy-Preserving Federated Learning using Hybrid Homomorphic Encryption. In: International Conference on Applied Cryptography and Network Security. ACNS 2026. (SUBMITTED)<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-287453a e-con-full e-flex e-con e-child\" data-id=\"287453a\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3101544 elementor-widget elementor-widget-heading\" data-id=\"3101544\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Rethinking Phishing Detection: How Dataset Quality Affects Model Generalization<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c65a6fb elementor-widget elementor-widget-text-editor\" data-id=\"c65a6fb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Afonso, P., Maia, E., Amorim, I., Pra\u00e7a, I. (2025). Rethinking Phishing Detection: How Dataset Quality Affects Model Generalization. In: International Conference on Advanced Computer Information Technologies. ACIT\u20192025. (IN PRESS).<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-08ae296 e-con-full e-flex e-con e-child\" data-id=\"08ae296\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2b9cecb elementor-widget elementor-widget-heading\" data-id=\"2b9cecb\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Context Aware Recognition of maLicious Emails<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fe933fb elementor-widget elementor-widget-text-editor\" data-id=\"fe933fb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Afonso, P., Maia, E., Amorim, I., Pra\u00e7a, I. (2025). CARLE: Context Aware Recognition of maLicious Emails. In: International Symposium on Foundations &amp; Practice of Security. FPS 2025. (SUBMITTED)<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b58ad34 e-con-full e-flex e-con e-child\" data-id=\"b58ad34\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f6b9f55 elementor-widget elementor-widget-heading\" data-id=\"f6b9f55\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Binary and Multiclass Cyberattack Classification on GeNIS Dataset<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fe493b7 elementor-widget elementor-widget-text-editor\" data-id=\"fe493b7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Silva, M., Pinto, D., Vitorino, J., Maia, E., Pra\u00e7a, I., Amorim, I., Viamonte, M. (2025). Binary and Multiclass Cyberattack Classification on GeNIS Dataset. In: International Symposium on Foundations &amp; Practice of Security. FPS 2025. (IN PRESS).<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Publications This section gathers the publications, reports, and scientific communications resulting from the project\u2019s activities, promoting knowledge dissemination and the exchange of experiences with the academic and industrial community. The Impact of Filtering in Differential Cryptanalysis: A Case Study on FEAL-8 Costa, I., Amorim, I., Maia, E., Pra\u00e7a, I. (2026). The Impact of\u00a0Filtering in\u00a0Differential Cryptanalysis: [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1735","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/pages\/1735","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/comments?post=1735"}],"version-history":[{"count":11,"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/pages\/1735\/revisions"}],"predecessor-version":[{"id":2487,"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/pages\/1735\/revisions\/2487"}],"wp:attachment":[{"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/media?parent=1735"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}