<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <title>DSpace Collection:</title>
  <link rel="alternate" href="http://hdl.handle.net/10174/738" />
  <subtitle />
  <id>http://hdl.handle.net/10174/738</id>
  <updated>2026-04-05T21:11:34Z</updated>
  <dc:date>2026-04-05T21:11:34Z</dc:date>
  <entry>
    <title>Mobile Digital Forensics: Report</title>
    <link rel="alternate" href="http://hdl.handle.net/10174/38637" />
    <author>
      <name>Lamar-Leon, Javier</name>
    </author>
    <author>
      <name>Quaresma, Paulo</name>
    </author>
    <author>
      <name>Nogueira, Vitor</name>
    </author>
    <id>http://hdl.handle.net/10174/38637</id>
    <updated>2025-06-17T09:32:17Z</updated>
    <published>2024-06-30T23:00:00Z</published>
    <summary type="text">Title: Mobile Digital Forensics: Report
Authors: Lamar-Leon, Javier; Quaresma, Paulo; Nogueira, Vitor
Abstract: In today's digital age, mobile devices are essential to daily life, serving as primary tools for communication, information storage, and data exchange. With the widespread use of smartphones, there has been a significant rise in cybercrimes, increasing the demand for effective digital forensic tools and techniques to extract, analyze, and present evidence from these devices.&#xD;
&#xD;
Mobile device forensic tools are crucial for retrieving valuable information such as text messages, emails, social media chats, location data, photographs, and videos. These tools are utilized by law enforcement, digital forensic investigators, and corporate security professionals to investigate various crimes, including fraud, theft, child exploitation, and terrorism.&#xD;
&#xD;
The rapid evolution of mobile technology presents challenges for investigators, as traditional forensic techniques are often insufficient for modern smartphones and tablets. Specialized mobile device forensic tools have become necessary to keep pace with these advancements. The following list highlights the main forensic digital tools used in this field.</summary>
    <dc:date>2024-06-30T23:00:00Z</dc:date>
  </entry>
  <entry>
    <title>Plagiarism: Report</title>
    <link rel="alternate" href="http://hdl.handle.net/10174/38636" />
    <author>
      <name>Lamar-Leon, Javier</name>
    </author>
    <author>
      <name>Quaresma, Paulo</name>
    </author>
    <author>
      <name>Nogueira, Vitor</name>
    </author>
    <id>http://hdl.handle.net/10174/38636</id>
    <updated>2025-06-17T09:32:09Z</updated>
    <published>2024-09-30T23:00:00Z</published>
    <summary type="text">Title: Plagiarism: Report
Authors: Lamar-Leon, Javier; Quaresma, Paulo; Nogueira, Vitor
Abstract: Plagiarism detection is essential for maintaining academic integrity, ensuring that scholarly works are original and properly cited. With the rise of online resources and AI writing tools, the risk of plagiarism has increased, making detection crucial in the academic process. Detection methods can be monolingual or cross-lingual and are classified as intrinsic or extrinsic, utilizing various techniques such as N-gram-based, vector-based, and semantic-based methods. The expansion of the internet and new detection tools like large language models have intensified the need for effective plagiarism detection. Academic institutions rely on these tools to ensure the originality of submissions, preserving the credibility of academic work.</summary>
    <dc:date>2024-09-30T23:00:00Z</dc:date>
  </entry>
  <entry>
    <title>Vision Documentation</title>
    <link rel="alternate" href="http://hdl.handle.net/10174/35195" />
    <author>
      <name>Javier, Leon</name>
    </author>
    <author>
      <name>Pedro, Salgueiro</name>
    </author>
    <id>http://hdl.handle.net/10174/35195</id>
    <updated>2023-05-18T09:59:54Z</updated>
    <published>2022-08-31T23:00:00Z</published>
    <summary type="text">Title: Vision Documentation
Authors: Javier, Leon; Pedro, Salgueiro
Abstract: Documentation on how to the Vision supercomputer, including information on how to submit&#xD;
and manage jobs in the best possible way.</summary>
    <dc:date>2022-08-31T23:00:00Z</dc:date>
  </entry>
  <entry>
    <title>VISTA Lab  Évora University GPU-Cluster - Instructions to launch Jobs</title>
    <link rel="alternate" href="http://hdl.handle.net/10174/31992" />
    <author>
      <name>Leon, Javier</name>
    </author>
    <id>http://hdl.handle.net/10174/31992</id>
    <updated>2022-05-03T14:40:33Z</updated>
    <published>2021-12-01T00:00:00Z</published>
    <summary type="text">Title: VISTA Lab  Évora University GPU-Cluster - Instructions to launch Jobs
Authors: Leon, Javier
Abstract: Two NVIDIA DGX™ A100 Stations are deployed in the HPC laboratory "VISTA Lab" in the Évora University. Universal system purpose-built for all AI infrastructure and workloads, from analytics to training to inference. Each station is built on eight NVIDIA A100 Tensor Core GPUs. Docker Containers platform is used to deploy the toolset for high-performance computing (HPC) in the Vista Lab.</summary>
    <dc:date>2021-12-01T00:00:00Z</dc:date>
  </entry>
</feed>

