{"id":86,"date":"2025-09-24T14:40:41","date_gmt":"2025-09-24T14:40:41","guid":{"rendered":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/about\/"},"modified":"2026-01-12T14:29:04","modified_gmt":"2026-01-12T14:29:04","slug":"about","status":"publish","type":"page","link":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/about\/","title":{"rendered":"Acerca-PT"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"86\" class=\"elementor elementor-86\">\n\t\t\t\t<div class=\"elementor-element elementor-element-85869d9 e-flex e-con-boxed e-con e-parent\" data-id=\"85869d9\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-37494b4b e-con-full e-flex e-con e-child\" data-id=\"37494b4b\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-35d690cc elementor-widget elementor-widget-heading\" data-id=\"35d690cc\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Projeto<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-303ef84e elementor-widget elementor-widget-text-editor\" data-id=\"303ef84e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>O <strong data-start=\"908\" data-end=\"920\">PC2phish<\/strong> \u00e9 um projeto inovador que visa refor\u00e7ar a resili\u00eancia cibern\u00e9tica da Administra\u00e7\u00e3o P\u00fablica local atrav\u00e9s da dete\u00e7\u00e3o proativa de phishing e malware. Combinando Intelig\u00eancia Artificial, an\u00e1lise contextual e monitoriza\u00e7\u00e3o de software, o PC2phish procura proteger cidad\u00e3os, institui\u00e7\u00f5es e servi\u00e7os p\u00fablicos essenciais de amea\u00e7as digitais.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f4931c e-flex e-con-boxed e-con e-child\" data-id=\"f4931c\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-af07573 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"af07573\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-shield-alt\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M466.5 83.7l-192-80a48.15 48.15 0 0 0-36.9 0l-192 80C27.7 91.1 16 108.6 16 128c0 198.5 114.5 335.7 221.5 380.3 11.8 4.9 25.1 4.9 36.9 0C360.1 472.6 496 349.3 496 128c0-19.4-11.7-36.9-29.5-44.3zM256.1 446.3l-.1-381 175.9 73.3c-3.3 151.4-82.1 261.1-175.8 307.7z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8e08fae elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"8e08fae\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-robot\" viewBox=\"0 0 640 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M32,224H64V416H32A31.96166,31.96166,0,0,1,0,384V256A31.96166,31.96166,0,0,1,32,224Zm512-48V448a64.06328,64.06328,0,0,1-64,64H160a64.06328,64.06328,0,0,1-64-64V176a79.974,79.974,0,0,1,80-80H288V32a32,32,0,0,1,64,0V96H464A79.974,79.974,0,0,1,544,176ZM264,256a40,40,0,1,0-40,40A39.997,39.997,0,0,0,264,256Zm-8,128H192v32h64Zm96,0H288v32h64ZM456,256a40,40,0,1,0-40,40A39.997,39.997,0,0,0,456,256Zm-8,128H384v32h64ZM640,256V384a31.96166,31.96166,0,0,1-32,32H576V224h32A31.96166,31.96166,0,0,1,640,256Z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-38ee174 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"38ee174\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-building\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M128 148v-40c0-6.6 5.4-12 12-12h40c6.6 0 12 5.4 12 12v40c0 6.6-5.4 12-12 12h-40c-6.6 0-12-5.4-12-12zm140 12h40c6.6 0 12-5.4 12-12v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12zm-128 96h40c6.6 0 12-5.4 12-12v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12zm128 0h40c6.6 0 12-5.4 12-12v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12zm-76 84v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm76 12h40c6.6 0 12-5.4 12-12v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12zm180 124v36H0v-36c0-6.6 5.4-12 12-12h19.5V24c0-13.3 10.7-24 24-24h337c13.3 0 24 10.7 24 24v440H436c6.6 0 12 5.4 12 12zM79.5 463H192v-67c0-6.6 5.4-12 12-12h40c6.6 0 12 5.4 12 12v67h112.5V49L80 48l-.5 415z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8678d95 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"8678d95\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-globe\" viewBox=\"0 0 496 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M336.5 160C322 70.7 287.8 8 248 8s-74 62.7-88.5 152h177zM152 256c0 22.2 1.2 43.5 3.3 64h185.3c2.1-20.5 3.3-41.8 3.3-64s-1.2-43.5-3.3-64H155.3c-2.1 20.5-3.3 41.8-3.3 64zm324.7-96c-28.6-67.9-86.5-120.4-158-141.6 24.4 33.8 41.2 84.7 50 141.6h108zM177.2 18.4C105.8 39.6 47.8 92.1 19.3 160h108c8.7-56.9 25.5-107.8 49.9-141.6zM487.4 192H372.7c2.1 21 3.3 42.5 3.3 64s-1.2 43-3.3 64h114.6c5.5-20.5 8.6-41.8 8.6-64s-3.1-43.5-8.5-64zM120 256c0-21.5 1.2-43 3.3-64H8.6C3.2 212.5 0 233.8 0 256s3.2 43.5 8.6 64h114.6c-2-21-3.2-42.5-3.2-64zm39.5 96c14.5 89.3 48.7 152 88.5 152s74-62.7 88.5-152h-177zm159.3 141.6c71.4-21.2 129.4-73.7 158-141.6h-108c-8.8 56.9-25.6 107.8-50 141.6zM19.3 352c28.6 67.9 86.5 120.4 158 141.6-24.4-33.8-41.2-84.7-50-141.6h-108z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c6973d8 e-flex e-con-boxed e-con e-parent\" data-id=\"c6973d8\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5a3d0f3 e-con-full e-flex e-con e-child\" data-id=\"5a3d0f3\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5cd86fc elementor-widget elementor-widget-heading\" data-id=\"5cd86fc\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Acerca<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5dfe92f elementor-widget elementor-widget-text-editor\" data-id=\"5dfe92f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>O <strong>PC2phish<\/strong> (Proactive Cybersecurity for Phishing) surge como resposta \u00e0 crescente amea\u00e7a de phishing e malware na Administra\u00e7\u00e3o P\u00fablica local. Muitas entidades municipais armazenam dados sens\u00edveis pessoais e financeiros, tornando-se alvos atraentes para ataques cibern\u00e9ticos. O comprometimento de contas privilegiadas pode expor n\u00e3o s\u00f3 um indiv\u00edduo, mas dezenas ou centenas de cidad\u00e3os e organiza\u00e7\u00f5es interligadas.<\/p><p>Neste contexto, o PC2phish prop\u00f5e uma solu\u00e7\u00e3o baseada em Intelig\u00eancia Artificial, capaz de analisar emails e comportamentos de software em tempo real, alertar sobre suspeitas de phishing ou malware e fortalecer a resili\u00eancia digital das institui\u00e7\u00f5es p\u00fablicas. O projeto ser\u00e1 realizado em parceria com a C\u00e2mara Municipal de Valongo, demonstrado em ambiente real e em conformidade com regulamentos europeus de seguran\u00e7a e privacidade.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ec8878e e-con-full e-flex e-con e-child\" data-id=\"ec8878e\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e7a0db3 elementor-widget-mobile__width-initial elementor-widget elementor-widget-image\" data-id=\"e7a0db3\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1536\" height=\"1024\" src=\"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/Designer-2.png\" class=\"attachment-full size-full wp-image-1070\" alt=\"\" srcset=\"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/Designer-2.png 1536w, https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/Designer-2-300x200.png 300w, https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/Designer-2-1024x683.png 1024w, https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/Designer-2-768x512.png 768w\" sizes=\"(max-width: 1536px) 100vw, 1536px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7720f113 e-flex e-con-boxed e-con e-parent\" data-id=\"7720f113\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-45114b01 e-con-full e-flex e-con e-child\" data-id=\"45114b01\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-da7ae94 e-con-full e-flex e-con e-child\" data-id=\"da7ae94\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6b33e40 elementor-widget elementor-widget-heading\" data-id=\"6b33e40\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Unidade de Investiga\u00e7\u00e3o<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f989ac9 elementor-widget elementor-widget-heading\" data-id=\"f989ac9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">GECAD - Grupo de investiga\u00e7\u00e3o em Engenharia  e Computa\u00e7\u00e3o Inteligente para a Inova\u00e7\u00e3o e Desenvolvimento<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4fe1438 elementor-widget elementor-widget-text-editor\" data-id=\"4fe1438\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>\u00a0<\/p><p><img decoding=\"async\" class=\"wp-image-529 aligncenter\" src=\"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/09\/GECAD_LOGO-02-300x66.png\" alt=\"\" width=\"223\" height=\"49\" data-wp-editing=\"1\" srcset=\"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/09\/GECAD_LOGO-02-300x66.png 300w, https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/09\/GECAD_LOGO-02-1024x226.png 1024w, https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/09\/GECAD_LOGO-02-768x170.png 768w, https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/09\/GECAD_LOGO-02-1536x339.png 1536w, https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/09\/GECAD_LOGO-02.png 2037w\" sizes=\"(max-width: 223px) 100vw, 223px\" \/><\/p><p>\u00a0<\/p><p>O GECAD (Research Group on Intelligent Engineering and Computing for Advanced Innovation and Development) \u00e9 a maior unidade de Investiga\u00e7\u00e3o &amp; Desenvolvimento do Polit\u00e9cnico do Porto, sediada no Instituto Superior de Engenharia do Porto (ISEP). Coordenado pela Professora Zita Vale e com a Professora Maria Goreti Carvalho Marreiros como vice-coordenadora, o grupo integra atualmente mais de 70 investigadores, incluindo mais de 20 doutorados, com forte experi\u00eancia na aplica\u00e7\u00e3o de t\u00e9cnicas de Intelig\u00eancia Artificial em sistemas de energia e sistemas inteligentes.<\/p><ul><li>Modela\u00e7\u00e3o multiagente e simula\u00e7\u00e3o de sistemas de energia;<\/li><li>Concep\u00e7\u00e3o e desenvolvimento de modelos de Resposta da Procura, aplicados em cen\u00e1rios simulados e reais;<\/li><li>Gest\u00e3o de recursos energ\u00e9ticos distribu\u00eddos em redes inteligentes (smart grids), incluindo penetra\u00e7\u00e3o massiva de ve\u00edculos el\u00e9tricos e fontes renov\u00e1veis;<\/li><li>Modela\u00e7\u00e3o e simula\u00e7\u00e3o de mercados de eletricidade;<\/li><li>T\u00e9cnicas avan\u00e7adas de an\u00e1lise de dados e minera\u00e7\u00e3o de informa\u00e7\u00e3o aplicadas \u00e0 energia e a outros dom\u00ednios.<\/li><\/ul><p>\u00a0<\/p><p>O reconhecimento cient\u00edfico do GECAD \u00e9 vis\u00edvel em m\u00faltiplos indicadores: participa\u00e7\u00e3o em mais de 60 projetos nacionais e internacionais, dezenas de publica\u00e7\u00f5es anuais em revistas cient\u00edficas de prest\u00edgio e a edi\u00e7\u00e3o regular de n\u00fameros especiais em publica\u00e7\u00f5es internacionais de refer\u00eancia.<\/p><p>Ciente da sua responsabilidade perante a sociedade, o GECAD adota o lema \u201cIntelligence for a Sustainable, Safe, and Inclusive World\u201d, direcionando os seus projetos para \u00e1reas cr\u00edticas como Energia, Transportes, Ambiente, Economia, Inclus\u00e3o Social, Infraestruturas Cr\u00edticas, Seguran\u00e7a, Acessibilidade \u00e0 Informa\u00e7\u00e3o e novas formas de Socializa\u00e7\u00e3o.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0530ede e-con-full e-flex e-con e-child\" data-id=\"0530ede\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f06a1de elementor-widget elementor-widget-heading\" data-id=\"f06a1de\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Vis\u00e3o<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0a25abb elementor-widget elementor-widget-text-editor\" data-id=\"0a25abb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Pretende-se que o PC2phish se torne uma ferramenta de refer\u00eancia na prote\u00e7\u00e3o digital da Administra\u00e7\u00e3o P\u00fablica local. A vis\u00e3o \u00e9 proporcionar servi\u00e7os p\u00fablicos mais seguros, confi\u00e1veis e resilientes, com redu\u00e7\u00e3o de incidentes cibern\u00e9ticos. A longo prazo, espera-se que o sistema seja escal\u00e1vel e adapt\u00e1vel a m\u00faltiplas c\u00e2maras municipais e entidades p\u00fablicas em Portugal e na Europa, sempre preservando privacidade, mantendo compliance com RGPD, NIS2 e o Ato de Resili\u00eancia Cibern\u00e9tica.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-49f0034 elementor-widget elementor-widget-heading\" data-id=\"49f0034\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Sum\u00e1rio<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3ca4170 elementor-widget elementor-widget-text-editor\" data-id=\"3ca4170\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>O projeto PC2phish visa desenvolver uma ferramenta baseada em Intelig\u00eancia Artificial para a dete\u00e7\u00e3o proativa de emails de phishing e atividade de malware, direcionada aos funcion\u00e1rios da Administra\u00e7\u00e3o P\u00fablica local. O objetivo \u00e9 aumentar a seguran\u00e7a dos sistemas, proteger dados sens\u00edveis e reduzir o risco de fraude e erro, garantindo ao mesmo tempo efici\u00eancia computacional e preserva\u00e7\u00e3o da privacidade.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-21df158 e-con-full e-flex e-con e-child\" data-id=\"21df158\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-3069ab6 e-con-full e-flex e-con e-child\" data-id=\"3069ab6\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-83abb88 elementor-widget elementor-widget-text-editor\" data-id=\"83abb88\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Objetivos principais:<\/p><ul><li>Implementar an\u00e1lise contextual de emails (remetente, cabe\u00e7alhos, URLs, anexos)<\/li><li>Desenvolver m\u00f3dulo de an\u00e1lise de conte\u00fado textual baseado em LLM para detectar t\u00e1ticas de persuas\u00e3o<\/li><li>Monitorizar processos de software para identificar malware e atividades anormais<\/li><li>Criar materiais educativos e workshops para sensibilizar funcion\u00e1rios<\/li><li>Validar prot\u00f3tipo em ambiente real na C\u00e2mara de Valongo<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a5fa27c e-con-full e-flex e-con e-child\" data-id=\"a5fa27c\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-62832a5 elementor-widget elementor-widget-text-editor\" data-id=\"62832a5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Pacotes de Trabalho<\/p><ul><li><strong>WP1 &#8211; <\/strong>Gest\u00e3o, Comunica\u00e7\u00e3o e Dissemina\u00e7\u00e3o<\/li><li><strong>WP2 &#8211; <\/strong>Especifica\u00e7\u00f5es T\u00e9cnicas<\/li><li><strong>WP3 &#8211; <\/strong>Detec\u00e7\u00e3o de phishing e malware<\/li><li><strong>WP4 &#8211;<\/strong>\u00a0 PC2phish Proof of Concept<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Projeto O PC2phish \u00e9 um projeto inovador que visa refor\u00e7ar a resili\u00eancia cibern\u00e9tica da Administra\u00e7\u00e3o P\u00fablica local atrav\u00e9s da dete\u00e7\u00e3o proativa de phishing e malware. Combinando Intelig\u00eancia Artificial, an\u00e1lise contextual e monitoriza\u00e7\u00e3o de software, o PC2phish procura proteger cidad\u00e3os, institui\u00e7\u00f5es e servi\u00e7os p\u00fablicos essenciais de amea\u00e7as digitais. Acerca O PC2phish (Proactive Cybersecurity for Phishing) surge [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-86","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/pages\/86","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/comments?post=86"}],"version-history":[{"count":107,"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/pages\/86\/revisions"}],"predecessor-version":[{"id":2390,"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/pages\/86\/revisions\/2390"}],"wp:attachment":[{"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/media?parent=86"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}