Ferreira, A., Lenzini, G., & Conventry, L. (2015). Principles of Persuasion in Social Engineering and Their Use in Phishing. In I. A. T. Tryfonas (Ed.), Human Aspects of Information Security, Privacy, and Trust Third International Conference, HAS 2015 (pp. 36-47). Switzerland: Springer. doi:10.1007/978-3-319-20376-8_4 Peer reviewed |
Lenzini, G., & Ferreira, A. (2015). Can Transparency Enhancing Tools support patient's accessing Electronic Health Records? In Advances in Intelligent Systems and Computing. Springer. doi:10.1007/978-3-319-16486-1_111 Peer reviewed |
Ferreira, A., Huynen, J.-L., Koenig, V., Lenzini, G., & Rivas, S. (2015). Do graphical cues effectively inform users? A socio-technical security study in accessing wifi networks. Lecture Notes in Computer Science, 9190, 323-334. doi:10.1007/978-3-319-20376-8_29 Peer reviewed |
Ferreira, A., Huynen, J.-L., Koenig, V., & Lenzini, G. (2015). In Cyber-Space No One Can Hear You S·CREAM, A Root Cause Analysis for Socio-Technical Security. In S. Foresti (Ed.), Security and Trust Management (pp. 255-264). Springer. doi:10.1007/978-3-319-24858-5_16 Peer reviewed |
Ferreira, A., Lenzini, G., Santos-Pereira, C., Augusto, A., & Correia, M. (2014). Envisioning secure and usable access control for patients. In IEEE 3rd International Conference on Serious Games and Applications in Healthcare. Peer reviewed |
Ferreira, A., Huynen, J.-L., Koenig, V., & Lenzini, G. (2014). A Conceptual Framework to Study Socio-Technical Security. Lecture Notes in Computer Science. doi:10.1007/978-3-319-07620-1_28 Peer reviewed |
Ferreira, A., Huynen, J.-L., Koenig, V., & Lenzini, G. (2014). Socio-technical Security Analysis of Wireless Hotspots. Lecture Notes in Computer Science. doi:10.1007/978-3-319-07620-1_27 Peer reviewed |
Rodrigues, J. D., Natarajan, S., Ferreira, A., Carrera, E., Cinefra, M., & Bordas, S. (2014). Analysis of composite plates through cell-based smoothed finite element and 4-noded mixed interpolation of tensorial components techniques. Computers and Structures, 135, 83-87. doi:10.1016/j.compstruc.2014.01.011 Peer Reviewed verified by ORBi |
Ferreira, A. (July 2013). Log analysis of human computer interactions regarding Break The Glass accesses to genetic reports [Paper presentation]. 15th International Conference on Enterprise Information Systems. |
Ferreira, A., Giustolisi, R., Huynen, J.-L., & Lenzini, G. (12 April 2013). On Tools for Socio-Technical Security Analysis [Paper presentation]. Grande Region Security and Reliability Day 2013, Luxembourg, Luxembourg. |
Ferreira, A., Huynen, J.-L., Koenig, V., Lenzini, G., & Rivas, S. (2013). Socio-Technical Study On the Effect of Trust and Context when Choosing WiFi Names. Lecture Notes in Computer Science, 8203, 131-143. doi:10.1007/978-3-642-41098-7_9 Peer reviewed |
Ferreira, A., Giustolisi, R., Huynen, J.-L., Koenig, V., & Lenzini, G. (2013). Studies in Socio-Technical Security Analysis: Authentication of Identities with TLS Certificates. IEEE TrustCom. doi:10.1109/TrustCom.2013.190 Peer reviewed |
Natarajan, S., Ferreira, A., Bordas, S., Carrera, E., & Cinefra, M. (2013). Analysis of composite plates by a unified formulation-cell based smoothed finite element method and field consistent elements. Composite Structures, 105, 75-81. doi:10.1016/j.compstruct.2013.04.040 Peer Reviewed verified by ORBi |