{"id":36,"date":"2018-06-06T02:09:40","date_gmt":"2018-06-06T05:09:40","guid":{"rendered":"https:\/\/ppee.unb.br\/?page_id=36"},"modified":"2026-04-24T11:06:34","modified_gmt":"2026-04-24T14:06:34","slug":"producao-academica","status":"publish","type":"page","link":"https:\/\/ppee.unb.br\/?page_id=36","title":{"rendered":"Produ\u00e7\u00e3o discente Stricto Sensu"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"36\" class=\"elementor elementor-36\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7f4d566 e-flex e-con-boxed e-con\" data-id=\"7f4d566\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8c6ac39 e-flex e-con-boxed e-con\" data-id=\"8c6ac39\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7fa6571 elementor-widget elementor-widget-image\" data-id=\"7fa6571\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.14.0 - 26-06-2023 *\/\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/repositorio.unb.br\/handle\/10482\/45725\/simple-search?location=10482%2F45725&#038;query=Mestrado+profissional+em+engenharia+el\u00e9trica&#038;rpp=10&#038;sort_by=score&#038;order=desc\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"http:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/07\/logodspace-1-300x91-1.png\" title=\"\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-268d2808 e-flex e-con-boxed e-con\" data-id=\"268d2808\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-535773f1 e-con-full e-flex e-con\" data-id=\"535773f1\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-227459b5 e-grid e-con-boxed e-con\" data-id=\"227459b5\" data-element_type=\"container\" data-settings=\"{&quot;grid_columns_grid&quot;:{&quot;unit&quot;:&quot;fr&quot;,&quot;size&quot;:&quot;2&quot;,&quot;sizes&quot;:[]},&quot;grid_rows_grid&quot;:{&quot;unit&quot;:&quot;fr&quot;,&quot;size&quot;:&quot;2&quot;,&quot;sizes&quot;:[]},&quot;grid_rows_grid_mobile&quot;:{&quot;unit&quot;:&quot;fr&quot;,&quot;size&quot;:&quot;2&quot;,&quot;sizes&quot;:[]},&quot;content_width&quot;:&quot;boxed&quot;,&quot;grid_outline&quot;:&quot;yes&quot;,&quot;grid_columns_grid_tablet&quot;:{&quot;unit&quot;:&quot;fr&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;grid_columns_grid_mobile&quot;:{&quot;unit&quot;:&quot;fr&quot;,&quot;size&quot;:1,&quot;sizes&quot;:[]},&quot;grid_rows_grid_tablet&quot;:{&quot;unit&quot;:&quot;fr&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-a4d2b33 e-flex e-con-boxed e-con\" data-id=\"a4d2b33\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-ad77692 e-con-full e-flex e-con\" data-id=\"ad77692\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7c4aa6e elementor-widget elementor-widget-heading\" data-id=\"7c4aa6e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.14.0 - 26-06-2023 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): \nFernando Rocha Moreira\n\n<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a95db3 elementor-widget elementor-widget-heading\" data-id=\"4a95db3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Rafael Rabelo Nunes<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-df3e71d elementor-widget elementor-widget-spacer\" data-id=\"df3e71d\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.14.0 - 26-06-2023 *\/\n.elementor-column .elementor-spacer-inner{height:var(--spacer-size)}.e-con{--container-widget-width:100%}.e-con-inner>.elementor-widget-spacer,.e-con>.elementor-widget-spacer{width:var(--container-widget-width,var(--spacer-size));--align-self:var(--container-widget-align-self,initial);--flex-shrink:0}.e-con-inner>.elementor-widget-spacer>.elementor-widget-container,.e-con-inner>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer,.e-con>.elementor-widget-spacer>.elementor-widget-container,.e-con>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer{height:100%}.e-con-inner>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer>.elementor-spacer-inner,.e-con>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer>.elementor-spacer-inner{height:var(--container-widget-height,var(--spacer-size))}<\/style>\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dec0849 elementor-widget elementor-widget-text-editor\" data-id=\"dec0849\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.14.0 - 26-06-2023 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.013<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a id=\"wp-block-file--media-54af63db-e49f-4133-bd57-a30f0847a788\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/Dissertacao_final___Fernando_Rocha_Moreira.pdf\">UMA PROPOSTA PARA PRIORIZA\u00c7\u00c3O DE CONTROLES DE SEGURAN\u00c7A CIBERN\u00c9TICA COM O USO DE UM M\u00c9TODO MULTICRIT\u00c9RIO<\/a><\/p><div class=\"wp-block-column\"><p><strong>Linha de pesquisa<\/strong>: LP3: Aspectos humanos, organizacionais, legais e regulat\u00f3rios em Seguran\u00e7a Cibern\u00e9tica<\/p><p><strong>Data da defesa<\/strong>: 05\/04\/2022<\/p><p><strong>Publica\u00e7\u00f5es:<\/strong><\/p><div class=\"wp-block-file\"><div class=\"wp-block-file\"><div class=\"wp-block-file\"><a id=\"wp-block-file--media-cb0e6fed-3357-40d3-893a-1c5efd83ff7d\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/RESEARCHGATE.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">UMA AN\u00c1LISE DAS APLICABILIDADES DE M\u00c9TODOS MULTICRIT\u00c9RIOS NO CONTEXTO DA SEGURAN\u00c7A DA INFORMA\u00c7\u00c3O<\/a><\/div><div class=\"wp-block-file\"><a id=\"wp-block-file--media-c59ac57d-0ee2-499d-9414-e2b2aad9381f\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/A-UTILIZACAO-DOS-FRAMEWORKS-5.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">A UTILIZA\u00c7\u00c3O DOS FRAMEWORKS NIST CSF E DA S\u00c9RIE NBR ABNT ISO 27.000 NO CONTEXTO DA GEST\u00c3O DA SEGURAN\u00c7A DA INFORMA\u00c7\u00c3O<\/a><\/div><div class=\"wp-block-file\"><a id=\"wp-block-file--media-e3ea0498-23e7-4c38-875f-79a367cd6e7c\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/IEEE-Access-Evaluating_the_Performance_of_NISTs_Framework.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">EVALUATING THE PERFORMACE OF NIST\u2019S FRAMEWORK CYBERSECURITY CONTROLS THROUGH A CONSTRUCTIVIST MULTICRITERIA METHODOLOGY<\/a><\/div><div class=\"wp-block-file\"><a id=\"wp-block-file--media-1d3dd91b-2462-4512-a684-274cb1c052b2\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/CISTI-Optimization_of_the_performance_of_.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">OTIMIZA\u00c7\u00c3O DO DESEMPENHO DE UMA APLICA\u00c7\u00c3O DE PAGAMENTOS PELA MELHORIA DE SUA INFRAESTRUTURA<\/a><\/div><div class=\"wp-block-file\"><a id=\"wp-block-file--media-ecb9de94-78e4-4689-8649-2caefcc55e6d\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/E-E-S.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">GERENCIAMENTO DE PROJETOS USANDO M\u00c9TODOS H\u00cdBRIDOS NA TECNOLOGIA DA INFORMA\u00c7\u00c3O DE UMA INSTITUI\u00c7\u00c3O FINANCEIRA<\/a><\/div><\/div><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9bdd30c e-flex e-con-boxed e-con\" data-id=\"9bdd30c\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3e46d65 e-con-full e-flex e-con\" data-id=\"3e46d65\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9ac8907 elementor-widget elementor-widget-heading\" data-id=\"9ac8907\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Artur Potiguara Carvalho\n\n\n<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ccf472d elementor-widget elementor-widget-heading\" data-id=\"ccf472d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Edna Dias Canedo<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-829be5a elementor-widget elementor-widget-spacer\" data-id=\"829be5a\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6eaff92 elementor-widget elementor-widget-text-editor\" data-id=\"6eaff92\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.012<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a id=\"wp-block-file--media-67e81fba-700d-4d0b-9559-5d0576c7559d\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/PPEE.MP_.012-1.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">PROPOSTA DE UM FRAMEWORK DE COMPLIANCE \u00c0 LEI GERAL DE PROTE\u00c7\u00c3O A DADOS PESSOAIS (LGPD) : UM ESTUDO DE CASO PARA PREVEN\u00c7\u00c3O A FRAUDE NO CONTEXTO DE BIG DATA<\/a><\/p><p><strong>DOI<\/strong>: <a href=\"http:\/\/dx.doi.org\/10.26512\/2021.09.D.42510\">http:\/\/dx.doi.org\/10.26512\/2021.09.D.42510<\/a><\/p><div class=\"wp-block-column\"><p><strong>Linha de pesquisa:<\/strong> LP1: Seguran\u00e7a de Infraestrutura, de Plataformas, de Software e de Sistemas<\/p><p><strong>Data da defesa<\/strong>: 08\/09\/2021<\/p><p><strong>Publica\u00e7\u00f5es:<\/strong><\/p><div class=\"wp-block-file\"><div class=\"wp-block-file\"><a id=\"wp-block-file--media-5c718496-c17e-4e38-8470-59ca99c5e386\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/diagnostic-of-data.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">DIAGNOSTIC OF DATA PROCESSING BY BRAZILIAN ORGANIZATIONS \u2013 A LOW COMPLIANCE ISSUE<\/a><\/div><div class=\"wp-block-file\"><a id=\"wp-block-file--media-06261dda-a2e3-47cd-ab62-bc7149c8fb0b\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/anonymisation-and.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">ANONYMISATION AND COMPLIANCE TO PROTECTION DATA: IMPACTS AND CHALLENGES INTO BIG DATA<\/a><\/div><div class=\"wp-block-file\"><a id=\"wp-block-file--media-00a0c63e-775e-43cb-9061-a5fede88bd25\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/acm.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">BIG DATA, ANONYMISATION AND GOVERNANCE TO PERSONAL DATA PROTECTION<\/a><\/div><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3fead1b e-flex e-con-boxed e-con\" data-id=\"3fead1b\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-1c55ae5 e-con-full e-flex e-con\" data-id=\"1c55ae5\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f136e5a elementor-widget elementor-widget-heading\" data-id=\"f136e5a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Jo\u00e3o Goulart Batista Reis<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b8199ea elementor-widget elementor-widget-heading\" data-id=\"b8199ea\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Daniel Chaves Caf\u00e9<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-926ea9b elementor-widget elementor-widget-spacer\" data-id=\"926ea9b\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-35b1623 elementor-widget elementor-widget-text-editor\" data-id=\"35b1623\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o:<\/strong> PPEE.MP.111<\/p><div><div><p><strong>Disserta\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2026\/04\/Dissertacao-1.pdf\">\u201cSEGURAN\u00c7A E PRIVACIDADE NO ESPA\u00c7O ACAD\u00caMICO: UMA PROPOSTA DE POL\u00cdTICA DE GEST\u00c3O DE RISCOS PARA O SISTEMA DE VIDEOMONITORAMENTO DA UNIVERSIDADE DE BRAS\u00cdLIA<\/a><\/p><\/div><div><p><strong>Linha de pesquisa:<\/strong> LP3: Aspectos humanos,<br \/>organizacionais, legais e regulat\u00f3rios em<br \/>Seguran\u00e7a Cibern\u00e9tica<\/p><p><strong>Data da defesa:<\/strong> 12\/03\/2026<\/p><p><strong>Publica\u00e7\u00f5es:\u00a0<\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2026\/04\/A_IMPORTANCIA_DA_USABILIDADE_E_A_COLABORACAO_POSITIVISTA_APLICADA_A_SEGURANCA_CIBERNETICA__UM_ESTUDO_DE_CASO_DO_APLICATIVO_SOUGOV___ISSN_1678_0817_Qualis_B2.pdf\">A Import\u00e2ncia da Usabilidade e a Colabora\u00e7\u00e3o Positivista Aplicada a Seguran\u00e7a Cibern\u00e9tica: um estudo de caso do aplicativo SOUGOV<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7b15dfe e-flex e-con-boxed e-con\" data-id=\"7b15dfe\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-9de0cfa e-con-full e-flex e-con\" data-id=\"9de0cfa\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7e4794b elementor-widget elementor-widget-heading\" data-id=\"7e4794b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Elon Oliveira Albuquerque<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1b6fff7 elementor-widget elementor-widget-heading\" data-id=\"1b6fff7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a):  F\u00e1bio L\u00facio Lopes de Mendon\u00e7a<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1b616ce elementor-widget elementor-widget-spacer\" data-id=\"1b616ce\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-637056c elementor-widget elementor-widget-text-editor\" data-id=\"637056c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o:<\/strong> PPEE.MP.110<\/p>\n<div>\n<div>\n<p><strong>Disserta\u00e7\u00e3o: <\/strong><a href=\"https:\/\/trello.com\/1\/cards\/6995c7a4315d03d5a09f8969\/attachments\/69cbfbd9a98f8a0bc40226a3\/download\/DISSERTACAO_DE_MESTRADO_PROFISSIONAL.pdf\">ChatORION: FRAMEWORK INTELIGENTE PARA AUTOMA\u00c7\u00c3O CONVERSACIONAL E TRIAGEM DE PROCESSOS NO CONTENCIOSO JUDICIAL COM UTILIZA\u00c7\u00c3O DE IA GENERATIVA<\/a><\/p>\n<\/div>\n<div>\n<p><strong>Linha de pesquisa:<\/strong> LP4: Ci\u00eancia e engenharia de dados, e concep\u00e7\u00e3o e desenvolvimento de materiais&nbsp;<span style=\"font-size: 1rem;\">estrat\u00e9gicos e cr\u00edticos para seguran\u00e7a cibern\u00e9tica<\/span><\/p>\n<p><strong>Data da defesa:<\/strong> 05\/03\/2026<\/p>\n<p><strong>Publica\u00e7\u00f5es:&nbsp;<\/strong><a href=\"https:\/\/trello.com\/1\/cards\/6995c7a4315d03d5a09f8969\/attachments\/69cbfbe06c7cd9bc841232a9\/download\/Artigos_Publicados.pdf\">CATCH: A Nova Fronteira dos Chatbots na Gest\u00e3o de For\u00e7aa de Trabalho<\/a><\/p>\n<p><a href=\"https:\/\/trello.com\/1\/cards\/6995c7a4315d03d5a09f8969\/attachments\/69cbfbe06c7cd9bc841232a9\/download\/Artigos_Publicados.pdf\">Juris Syntax: Automaa\u00e7\u00e3o da An\u00e1lise Jur\u00ccdica Brasileira com IA Generativa e PLN<\/a><\/p>\n<p><a href=\"https:\/\/trello.com\/1\/cards\/6995c7a4315d03d5a09f8969\/attachments\/69cbfbe06c7cd9bc841232a9\/download\/Artigos_Publicados.pdf\">ARQUITETURA PROPOSTA PARA INTEGRA\u00c7\u00c3O DE MIDDLEWARES IOT UTILIZANDO BLOCKCHAIN<\/a><\/p>\n<p><a href=\"https:\/\/trello.com\/1\/cards\/6995c7a4315d03d5a09f8969\/attachments\/69cbfbe06c7cd9bc841232a9\/download\/Artigos_Publicados.pdf\">Data Pipelines Implementation and Management for Data Engineering: A Case Study Applied to the Public Sector<\/a><\/p>\n<\/div>\n<\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9bd845b e-flex e-con-boxed e-con\" data-id=\"9bd845b\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-62c2f74 e-con-full e-flex e-con\" data-id=\"62c2f74\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e8207a4 elementor-widget elementor-widget-heading\" data-id=\"e8207a4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): J\u00falia Jamile Oliveira Gon\u00e7alves<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fa7cdb5 elementor-widget elementor-widget-heading\" data-id=\"fa7cdb5\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a):  Georges Daniel Amvame Nz<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5f19e74 elementor-widget elementor-widget-spacer\" data-id=\"5f19e74\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8a85578 elementor-widget elementor-widget-text-editor\" data-id=\"8a85578\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o:<\/strong> PPEE.MP.109<\/p><div><div><p><strong>Disserta\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2026\/03\/PPEE.MP_.109__1_.pdf\">Detec\u00e7\u00e3o de Prompt Injection em modelos de Linguagem<\/a><\/p><\/div><div><p><strong>Linha de pesquisa:<\/strong> LP1: Seguran\u00e7a de Infraestrutura, de<br \/>Plataformas, de Software e de Sistemas<\/p><p><strong>Data da defesa:<\/strong> 29\/01\/2026<\/p><p><strong>Publica\u00e7\u00f5es:\u00a0<\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2026\/03\/COMPROVANTE_de_publicacao.pdf\">Detec\u00e7\u00e3o de Prompt Injection em modelos de Linguagem <\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-505abc4 e-flex e-con-boxed e-con\" data-id=\"505abc4\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-89d36c9 e-con-full e-flex e-con\" data-id=\"89d36c9\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5900f1c elementor-widget elementor-widget-heading\" data-id=\"5900f1c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Pedro Henrique Silva Gontijo<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-266732b elementor-widget elementor-widget-heading\" data-id=\"266732b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Jo\u00e3o Jose Costa Gondim<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a3d574f elementor-widget elementor-widget-spacer\" data-id=\"a3d574f\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4554888 elementor-widget elementor-widget-text-editor\" data-id=\"4554888\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o:<\/strong> PPEE.MP.108<\/p><div><div><p><strong>Disserta\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2026\/03\/TCC_PPEE_UnB_Dissertacao_25_02_2026.pdf\">A STRUCTURED METHODOLOGY FOR THE DIRECTION AND PLANNING PHASE OF THE CYBER THREAT INTELLIGENCE CYCLE: REDUCING INFORMATIONAL NOISE AND ALIGNING WITH THE REGULATORY FRAMEWORK OF THE BRAZILIAN NATIONAL FINANCIAL SYSTEM<\/a><\/p><\/div><div><p><strong>Linha de pesquisa:<\/strong> LP2: Seguran\u00e7a e intelig\u00eancia cibern\u00e9tica<\/p><p><strong>Data da defesa:<\/strong> 28\/01\/2026 <\/p><p><strong>Publica\u00e7\u00f5es: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2026\/03\/03___Artigo_1_versao_final_publicada___Structured_Direction_and_Planning_for_Cyber_Threat_Intelligence_in_the_Brazilian_Financial_System___WCNPS-1.pdf\">Structured Direction and Planning for Cyber Threat Intelligence in the Brazilian Financial System<\/a><\/p><p><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2026\/03\/03___Operationalizing_Structured_Direction_and_Planning_for_Cyber_Threat_Intelligence_A_Practical_Implementation_for_the_Brazilian_Financial_System___BANDIT-1.pdf\">Operationalizing Structured Direction and Planning for Cyber Threat Intelligence A Practical Implementation for the Brazilian Financial System<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-af22ed5 e-flex e-con-boxed e-con\" data-id=\"af22ed5\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-9eaee68 e-con-full e-flex e-con\" data-id=\"9eaee68\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e853948 elementor-widget elementor-widget-heading\" data-id=\"e853948\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Jaime de Melo Gama da Silva\n\n\n<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d756112 elementor-widget elementor-widget-heading\" data-id=\"d756112\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Cl\u00f3vis Neumann<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d47b481 elementor-widget elementor-widget-text-editor\" data-id=\"d47b481\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de Publica\u00e7\u00e3o: <\/strong>PPEE.MP.107<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2026\/03\/DISSERTACAO-1.pdf\">Seguran\u00e7a de Autentica\u00e7\u00e3o, Dados e Comunica\u00e7\u00e3o em Sistemas HPC (High Performance Computing)<\/a><\/p><div class=\"wp-block-column\"><p><strong>Linha de pesquisa<\/strong>: LP1: Seguran\u00e7a de Infraestrutura, de Plataformas, de Software e de Sistemas<\/p><p><strong>Data da defesa<\/strong>:\u00a023\/01\/2026<\/p><p><strong>Publica\u00e7\u00f5es:<\/strong> <a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2026\/03\/Digital_Certificate_Authentication_in_HPC_A_Technical_Review-1.pdf\">Digital Certificate Authentication in HPC: A Technical Review<\/a><\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-811420b e-flex e-con-boxed e-con\" data-id=\"811420b\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-e1001de e-con-full e-flex e-con\" data-id=\"e1001de\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-416776c elementor-widget elementor-widget-heading\" data-id=\"416776c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Danilo Moura Pereira<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b275076 elementor-widget elementor-widget-heading\" data-id=\"b275076\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Geraldo Pereira Rocha Filho<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9d2530d elementor-widget elementor-widget-spacer\" data-id=\"9d2530d\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-03648e4 elementor-widget elementor-widget-text-editor\" data-id=\"03648e4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o:<\/strong> PPEE.MP.106<\/p><div><div><p><strong>Disserta\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2026\/03\/Danilo_Moura__Dissertacao_PPEE___Mestrado___2025__Revisao_pos_banca_V2.pdf\">CAN-ESP: Uma Rede CAN de Baixo Custo e C\u00f3digo Aberto com Suporte a OTA para Ve\u00edculos El\u00e9tricos<\/a><\/p><\/div><div><p><strong>Linha de pesquisa:<\/strong> LP4: Ci\u00eancia e engenharia de dados,<br \/>e concep\u00e7\u00e3o e desenvolvimento de<br \/>materiais estrat\u00e9gicos e cr\u00edticos para<br \/>seguran\u00e7a cibern\u00e9tica<\/p><p><strong>Data da defesa:<\/strong> 26\/01\/2026<\/p><p><strong>Publica\u00e7\u00f5es: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2026\/03\/Artigo_publicado___Courb_2025___35247_229_28346_1_10_20250522.pdf\">CAN-ESP: Rede CAN de Baixo Custo para Ve\u00edculos El\u00e9tricos<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-63de9e8 e-flex e-con-boxed e-con\" data-id=\"63de9e8\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-c48847d e-con-full e-flex e-con\" data-id=\"c48847d\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c52c614 elementor-widget elementor-widget-heading\" data-id=\"c52c614\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Luis Marcos Martins do Nascimento<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ce252d7 elementor-widget elementor-widget-heading\" data-id=\"ce252d7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Daniel Chaves Caf\u00e9<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1c3d0da elementor-widget elementor-widget-spacer\" data-id=\"1c3d0da\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8e4b3b8 elementor-widget elementor-widget-text-editor\" data-id=\"8e4b3b8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o:<\/strong> PPEE.MP.105<\/p><div><div><p><strong>Disserta\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2026\/01\/dissetacao-luis.pdf\">Automa\u00e7\u00e3o Segura no Moodle: Integra\u00e7\u00e3o com Bancos Institucionais e Fortalecimento da Governan\u00e7a Digital<\/a><\/p><\/div><div><p><strong>Linha de pesquisa:<\/strong> LP1: Seguran\u00e7a de Infraestrutura, de<br \/>Plataformas, de Software e de Sistemas<\/p><p><strong>Data da defesa:<\/strong> 17\/12\/2025<\/p><p><strong>Publica\u00e7\u00f5es: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2026\/01\/Aumentando_a_seguranca_do_gerenciamento_de_usuarios_do_Moodle_usando_bancos_de_dados_de_terceiros.pdf\">AUMENTANDO A SEGURAN\u00c7A DO GERENCIAMENTO DE USU\u00c1RIOS DO MOODLE USANDO BANCOS DE DADOS DE TERCEIROS<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1335322 e-flex e-con-boxed e-con\" data-id=\"1335322\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-c71dea5 e-con-full e-flex e-con\" data-id=\"c71dea5\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b991ac0 elementor-widget elementor-widget-heading\" data-id=\"b991ac0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Evanei Gomes dos Santos<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8a342ac elementor-widget elementor-widget-heading\" data-id=\"8a342ac\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Andr\u00e9 Luiz Marques Serrano<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f3c4ab6 elementor-widget elementor-widget-spacer\" data-id=\"f3c4ab6\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a43224 elementor-widget elementor-widget-text-editor\" data-id=\"4a43224\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o:<\/strong> PPEE.MP.104<\/p><div><div><p><strong>Disserta\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2026\/01\/DISSERTACAO-2-evanei.pdf\">Modelagem Integrada de Viola\u00e7\u00f5es de Dados: Previs\u00e3o de Incidentes, An\u00e1lise de Sobreviv\u00eancia e Privacidade Diferencial em S\u00e9ries Temporais<\/a><\/p><\/div><div><p><strong>Linha de pesquisa:<\/strong> LP4: Ci\u00eancia e engenharia de dados,<br \/>e concep\u00e7\u00e3o e desenvolvimento de<br \/>materiais estrat\u00e9gicos e cr\u00edticos para<br \/>seguran\u00e7a cibern\u00e9tica<\/p><p><strong>Data da defesa:<\/strong> 17\/12\/2025<\/p><p><strong>Publica\u00e7\u00f5es: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2026\/01\/Artigo_Publicado-1.pdf\">Modelos Preditivos para Detec\u00e7\u00e3o de Viola\u00e7\u00f5es de Dados: Uma Abordagem Comparativa entre T\u00e9cnicas Cl\u00e1ssicas e de Aprendizado Profundo<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-94b472d e-flex e-con-boxed e-con\" data-id=\"94b472d\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-33ab350 e-con-full e-flex e-con\" data-id=\"33ab350\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ce59786 elementor-widget elementor-widget-heading\" data-id=\"ce59786\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Paulo Victor de Araujo da Silva<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-23a644f elementor-widget elementor-widget-heading\" data-id=\"23a644f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Georges Daniel Amvame Nze<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a47e93e elementor-widget elementor-widget-spacer\" data-id=\"a47e93e\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a9dbc45 elementor-widget elementor-widget-text-editor\" data-id=\"a9dbc45\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o:<\/strong> PPEE.MP.103<\/p><div><div><p><strong>Disserta\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2026\/01\/Dissertacao_Proposta_de_Controles_Revisada.pdf\">PROPOSTA DE CONTROLES DE SEGURAN\u00c7A PRIORIT\u00c1RIOS CONTRA ATAQUES EM REDES LOCAIS COM DISPOSITIVOS COMPACTOS<\/a><\/p><\/div><div><p><strong>Linha de pesquisa:<\/strong> LP1: Seguran\u00e7a de Infraestrutura, de<br \/>Plataformas, de Software e de Sistemas<\/p><p><strong>Data da defesa:<\/strong> 19\/11\/2025<\/p><p><strong>Publica\u00e7\u00f5es: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2026\/01\/Artigo_Final___RISTI77.pdf\">Proposta de Controles de Seguran\u00e7a Priorit\u00e1rios Contra-ataques em Redes Locais com Dispositivos Comp<\/a><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2026\/01\/Artigo_Final___RISTI77.pdf\">actos <\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-857dd58 e-flex e-con-boxed e-con\" data-id=\"857dd58\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-75a04aa e-con-full e-flex e-con\" data-id=\"75a04aa\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ea4a7a3 elementor-widget elementor-widget-heading\" data-id=\"ea4a7a3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Jo\u00e3o Paulo da Costa e Silva Garcia<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-764855d elementor-widget elementor-widget-heading\" data-id=\"764855d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Georges Daniel Amvame Nze<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-972be21 elementor-widget elementor-widget-spacer\" data-id=\"972be21\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fc2b063 elementor-widget elementor-widget-text-editor\" data-id=\"fc2b063\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o:<\/strong> PPEE.MP.102<\/p><div><div><p><strong>Disserta\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2026\/01\/Dissertacao_final-Joao-paulo.pdf\">BlockGuard: Uma Arquitetura de Seguran\u00e7a para Conformidade LGPD em Redes Hyperledger Fabric<\/a><\/p><\/div><div><p><strong>Linha de pesquisa:<\/strong> LP4: Ci\u00eancia e engenharia de dados,<br \/>e concep\u00e7\u00e3o e desenvolvimento de<br \/>materiais estrat\u00e9gicos e cr\u00edticos para<br \/>seguran\u00e7a cibern\u00e9tica<\/p><p><strong>Data da defesa:<\/strong> 18\/12\/2025<\/p><p><strong>Publica\u00e7\u00f5es: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2026\/01\/Versao_Final_artigo.pdf\">BlockGuard: Framework para implementa\u00e7\u00e3o em conformidade \u00e0 LGPD em redes Hyperledger Fabric <\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8a3ebb2 e-flex e-con-boxed e-con\" data-id=\"8a3ebb2\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-86989a7 e-con-full e-flex e-con\" data-id=\"86989a7\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f03ba7f elementor-widget elementor-widget-heading\" data-id=\"f03ba7f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Kelly Santos de Oliveira Bezerra<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-40c4986 elementor-widget elementor-widget-heading\" data-id=\"40c4986\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): F\u00e1bio L\u00facio Lopes de Mendon\u00e7a<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ad46143 elementor-widget elementor-widget-spacer\" data-id=\"ad46143\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e18c3a1 elementor-widget elementor-widget-text-editor\" data-id=\"e18c3a1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o:<\/strong> PPEE.MP.101<\/p><div><div><p><strong>Disserta\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/12\/PPEE___Dissertacao_Kelly_Santos_Final.pdf\">ARQUITETURA INTELIGENTE E PREDITIVA PARA A QUALIDADE E GEST\u00c3O DO GASTO P\u00daBLICO FEDERAL BRASILEIRO: UM ESTUDO COM APRENDIZADO DE M\u00c1QUINA<\/a><\/p><\/div><div><p><strong>Linha de pesquisa:<\/strong> LP4: Ci\u00eancia e engenharia de dados, e<br \/>concep\u00e7\u00e3o e desenvolvimento de materiais estrat\u00e9gicos e cr\u00edticos para seguran\u00e7a cibern\u00e9tica<\/p><p><strong>Data da defesa:<\/strong> 30\/10\/2025<\/p><p><strong>Publica\u00e7\u00f5es: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/12\/03___Artigo_01.pdf\">PROPOSTA DE ARQUITETURA DE UM SISTEMA INTELIGENTE PARA GEST\u00c3O E QUALIDADE DOS GASTOS NO SETOR P\u00daBLICO FEDERAL BRASILEIRO.<\/a><\/p><p><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/12\/03___Artigo_02__1_.pdf\">Previs\u00e3o Inteligente de Gastos Governamentais: Proposta de uma Arquitetura Baseada em Aprendizado de M\u00e1quina para Efici\u00eancia e Transpar\u00eancia<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-707a287 e-flex e-con-boxed e-con\" data-id=\"707a287\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-b02c158 e-con-full e-flex e-con\" data-id=\"b02c158\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4ccffd1 elementor-widget elementor-widget-heading\" data-id=\"4ccffd1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Mauri Sudario Ferreira Dantas<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a877aea elementor-widget elementor-widget-heading\" data-id=\"a877aea\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): \u00c9der Souza Gualberto<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-77237d2 elementor-widget elementor-widget-spacer\" data-id=\"77237d2\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7d8fb94 elementor-widget elementor-widget-text-editor\" data-id=\"7d8fb94\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o:<\/strong> PPEE.MP.100<\/p><div><div><p><strong>Disserta\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/12\/DISSERTACAO-MAURI.pdf\">DEVELOPMENT OF HOLISTIC FRAMEWORK TO PROTECTING EMBEDDED SOFTWARE AGAINST MALICIOUS ATTACKS<\/a><\/p><\/div><div><p><strong>Linha de pesquisa:<\/strong> LP3: Aspectos humanos, organizacionais, legais e regulat\u00f3rios em Seguran\u00e7a Cibern\u00e9tica<\/p><p><strong>Data da defesa:<\/strong> 29\/10\/2025<\/p><p><strong>Publica\u00e7\u00f5es: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/12\/Artigo_Mauri.pdf\">DESAFIOS NO COMPARTILHAMENTO INTERNACIONAL DE INFORMA\u00c7\u00d5ES SOBRE ATAQUES CIBERN\u00c9TICOS: UMA AN\u00c1LISE COMPARATIVA ENTRE BRASIL, ESTADOS UNIDOS E EUROPA<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4e74907 e-flex e-con-boxed e-con\" data-id=\"4e74907\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2344515 e-con-full e-flex e-con\" data-id=\"2344515\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-52c4307 elementor-widget elementor-widget-heading\" data-id=\"52c4307\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Welber Santos de Oliveira<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-645ffc2 elementor-widget elementor-widget-heading\" data-id=\"645ffc2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Georges Daniel Amvame Nze<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6a0c4ab elementor-widget elementor-widget-spacer\" data-id=\"6a0c4ab\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7e94e8e elementor-widget elementor-widget-text-editor\" data-id=\"7e94e8e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o:<\/strong> PPEE.MP.099<\/p><div><div><p><strong>Disserta\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/11\/Dissertacoa_na_versao_final-1.pdf\">Proposta de Arquitetura para Melhoria do Invent\u00e1rio de Hardware e Software em Sistemas IoT<\/a><\/p><\/div><div><p><strong>Linha de pesquisa:<\/strong> LP1: Seguran\u00e7a de Infraestrutura, de Plataformas, de Software e de Sistemas e LP2: Seguran\u00e7a e intelig\u00eancia cibern\u00e9tica<\/p><p><strong>Data da defesa:<\/strong> 17\/10\/2025<\/p><p><strong>Publica\u00e7\u00f5es: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/11\/03___Comprovante__REVISTA_Conferencia_esociety___HARDWARE_AND_SOFTWARE_INVENTORY.pdf\">HARDWARE AND SOFTWARE INVENTORY BEST PRACTICES APPLIED TO GOVERNMENT COMPUTER NETWORK AND SYSTEMS <\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-aaeccd8 e-flex e-con-boxed e-con\" data-id=\"aaeccd8\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-af69e62 e-con-full e-flex e-con\" data-id=\"af69e62\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ba6be97 elementor-widget elementor-widget-heading\" data-id=\"ba6be97\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): T\u00e1ssio Correira da Silva<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ea803bf elementor-widget elementor-widget-heading\" data-id=\"ea803bf\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Fabiana Freitas mendes<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6411b06 elementor-widget elementor-widget-spacer\" data-id=\"6411b06\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5914ffa elementor-widget elementor-widget-text-editor\" data-id=\"5914ffa\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o:<\/strong> PPEE.MP.098<\/p><div><div><p><strong>Disserta\u00e7\u00e3o:\u00a0<\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/10\/3SW-Um-Modelo-Adaptado-do-CIS-Controls-v8.1.pdf\">3SW: Um Modelo Adaptado do CIS Controls v8.1 para Mitiga\u00e7\u00e3o de Amea\u00e7as a Servidores Web<\/a><\/p><\/div><div><p><strong>Linha de pesquisa:<\/strong> LP1: Seguran\u00e7a de Infraestrutura, de Plataformas, de Software e de Sistemas e LP3: Aspectos humanos, organizacionais, legais e regulat\u00f3rios em Seguran\u00e7a Cibern\u00e9tica<\/p><p><strong>Data da defesa:<\/strong> 26\/08\/2025<\/p><p><strong>Publica\u00e7\u00f5es: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/10\/3SW-Um-Conjunto-de-Medidas-de-Seguranca-para-1.pdf\">3SW: Um Conjunto de Medidas de Seguran\u00e7a para Mitigar Vulnerabilidades em Servidores Web<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-97e328e e-flex e-con-boxed e-con\" data-id=\"97e328e\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-781f332 e-con-full e-flex e-con\" data-id=\"781f332\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-84d2e8d elementor-widget elementor-widget-heading\" data-id=\"84d2e8d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Caio C\u00e9sar Rodrigues Garcez<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-04e201f elementor-widget elementor-widget-heading\" data-id=\"04e201f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): F\u00e1bio L\u00facio Lopes de Mendon\u00e7a<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b5dc866 elementor-widget elementor-widget-spacer\" data-id=\"b5dc866\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fbc10e9 elementor-widget elementor-widget-text-editor\" data-id=\"fbc10e9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o:<\/strong> PPEE.MP.097<\/p><div><div><p><strong>Disserta\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/10\/DISSERTACAO-1.pdf\">AN\u00c1LISE TENSORIAL PARA PREVEN\u00c7\u00c3O DE FALSIFICA\u00c7\u00d5ES EM SISTEMAS DE RECONHECIMENTO FACIAL: UMA PROPOSTA BASEADA EM CLUSTERIZA\u00c7\u00c3O<\/a><\/p><\/div><div><p><strong>Linha de pesquisa:<\/strong> LP4: Ci\u00eancia e engenharia de dados,<br \/>e concep\u00e7\u00e3o e desenvolvimento de materiais estrat\u00e9gicos e cr\u00edticos para seguran\u00e7a cibern\u00e9tica<\/p><p><strong>Data da defesa:<\/strong> 06\/08\/2025<\/p><p><strong>Publica\u00e7\u00f5es: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/10\/202308L005.pdf\"> PREVEN\u00c7\u00c3O DE FALSIFICA\u00c7\u00c3O EM SISTEMAS DE RECONHECIMENTO FACIAL: UMA PROPOSTA BASEADA EM CLUSTERIZA\u00c7\u00c3O<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1044a1b e-flex e-con-boxed e-con\" data-id=\"1044a1b\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-b5ac608 e-con-full e-flex e-con\" data-id=\"b5ac608\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8f75a45 elementor-widget elementor-widget-heading\" data-id=\"8f75a45\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Anna Carolina Ferreira Rosa<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8e561d6 elementor-widget elementor-widget-heading\" data-id=\"8e561d6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): F\u00e1bio L\u00facio Lopes de Mendon\u00e7a<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7cda6af elementor-widget elementor-widget-spacer\" data-id=\"7cda6af\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8749e6e elementor-widget elementor-widget-text-editor\" data-id=\"8749e6e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o:<\/strong> PPEE.MP.096<\/p><div><div><p><strong>Disserta\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/09\/dissertacao-1.pdf\">EVACUAI: PLANEJAMENTO DE ROTAS DE FUGA ADAPTATIVAS EM AMBIENTES COM OBST\u00c1CULOS UTILIZANDO APRENDIZADO POR REFOR\u00c7O<\/a><\/p><\/div><div><p><strong>Linha de pesquisa:<\/strong> LP4: Ci\u00eancia e engenharia de dados,<br \/>e concep\u00e7\u00e3o e desenvolvimento de materiais estrat\u00e9gicos e cr\u00edticos para seguran\u00e7a cibern\u00e9tica<\/p><p><strong>Data da defesa:<\/strong> 05\/08\/2025<\/p><p><strong>Publica\u00e7\u00f5es: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/09\/Artigo_01.pdf\">EvacuAI: An Analysis of Escape Routes in Indoor Environments with the Aid of Reinforcement Learning<\/a><\/p><p><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/09\/Artigo_03.pdf\">Seguran\u00e7a Universit\u00e1ria Refor\u00e7ada: Uma solu\u00e7\u00e3o de IoT para Prote\u00e7\u00e3o de Alunos em Campus<\/a><\/p><p><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/09\/solucao-de.pdf\">Seguran\u00e7a no Registro de Dispositivos IoT: Implementa\u00e7\u00e3o de Autentica\u00e7\u00e3o H\u00edbrida<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8ead845 e-flex e-con-boxed e-con\" data-id=\"8ead845\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-e13284c e-con-full e-flex e-con\" data-id=\"e13284c\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9932afe elementor-widget elementor-widget-heading\" data-id=\"9932afe\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Yuri do Amaral Nobre Maia<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d422aa elementor-widget elementor-widget-heading\" data-id=\"2d422aa\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Demetrio Antonio da Silva Filho<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aab5623 elementor-widget elementor-widget-spacer\" data-id=\"aab5623\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b2d1b66 elementor-widget elementor-widget-text-editor\" data-id=\"b2d1b66\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o:<\/strong> PPEE.MP.095<\/p><div><div><p><strong>Disserta\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/09\/Dissertacao_na_versao_final-1.pdf\">Towards Cybersecurity Dataset Creation An LLM-Assisted Approach for Named Entity Recognition in Threat Intelligence<\/a><\/p><\/div><div><p><strong>Linha de pesquisa: <\/strong>LP4: Ci\u00eancia e engenharia de dados,<br \/>e concep\u00e7\u00e3o e desenvolvimento de materiais estrat\u00e9gicos e cr\u00edticos para seguran\u00e7a cibern\u00e9tica<\/p><p><strong>Data da defesa:<\/strong> 31\/07\/2025<\/p><p><strong>Publica\u00e7\u00f5es: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/09\/Artigo-2-3.pdf\" target=\"_blank\" rel=\"noopener\">YACSDB-NER: Yet Another Cybersecurity Database for Named Entity Recognition Task<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8138053 e-flex e-con-boxed e-con\" data-id=\"8138053\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-363fcf6 e-con-full e-flex e-con\" data-id=\"363fcf6\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-15707f4 elementor-widget elementor-widget-heading\" data-id=\"15707f4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Carlos Eduardo de Sousa<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-afa2c31 elementor-widget elementor-widget-heading\" data-id=\"afa2c31\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Jo\u00e3o Jos\u00e9 Costa Gondim<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f61b329 elementor-widget elementor-widget-spacer\" data-id=\"f61b329\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6f59526 elementor-widget elementor-widget-text-editor\" data-id=\"6f59526\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o:<\/strong> PPEE.MP.094<\/p><div><div><p><strong>Disserta\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/09\/TCC_PPEE_UnB_Final.pdf\">Proposta de um Framework para Enriquecimento de Intelig\u00eancia de Amea\u00e7as Cibern\u00e9ticas Utilizando Informa\u00e7\u00f5es a Partir de Intelig\u00eancia de Fontes Abertas<\/a><\/p><\/div><div><p><strong>Linha de pesquisa:<\/strong> LP2: Seguran\u00e7a e intelig\u00eancia<br \/>cibern\u00e9tica<\/p><p><strong>Data da defesa:<\/strong> 31\/07\/2025<\/p><p><strong>Publica\u00e7\u00f5es: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/09\/Enrich___worldcist.pdf\">Enriched Cyber Threat Intelligence Through OSINT: A Methodology for Strengthening Cybersecurity Resilience<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2546975 e-flex e-con-boxed e-con\" data-id=\"2546975\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-87e624b e-con-full e-flex e-con\" data-id=\"87e624b\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-775019a elementor-widget elementor-widget-heading\" data-id=\"775019a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): D\u00e1rio Perereira dos Santos<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b17b3a8 elementor-widget elementor-widget-heading\" data-id=\"b17b3a8\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Daniel Alves da Silva<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2091a7c elementor-widget elementor-widget-spacer\" data-id=\"2091a7c\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-42a095a elementor-widget elementor-widget-text-editor\" data-id=\"42a095a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o:<\/strong> PPEE.MP.093<\/p><div><div><p><strong>Disserta\u00e7\u00e3o:\u00a0<\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/09\/AVALIACAO-DE-GRANDES-MODELOS-DE.pdf\">AVALIA\u00c7\u00c3O DE GRANDES MODELOS DE LINGUAGEM (LLMS) PARA A TIPIFICA\u00c7\u00c3O DE DOCUMENTOS<\/a><\/p><\/div><div><p><strong>Linha de pesquisa: <\/strong>LP4: Ci\u00eancia e engenharia de dados,<br \/>e concep\u00e7\u00e3o e desenvolvimento de materiais estrat\u00e9gicos e cr\u00edticos para seguran\u00e7a cibern\u00e9tica<\/p><p><strong>Data da defesa:<\/strong> 15\/08\/2025<\/p><p><strong>Publica\u00e7\u00f5es:\u00a0<\/strong><a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-031-90341-0_1\" target=\"_blank\" rel=\"noopener\">Large Language Models for Text Classification: A New Era of Accuracy and Efficiency<\/a><\/p><p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/10459904\" target=\"_blank\" rel=\"noopener\">Multi-Class Text Classification Based in Oversampling for Highly Imbalanced<\/a><a href=\"https:\/\/ieeexplore.ieee.org\/document\/10459904\" target=\"_blank\" rel=\"noopener\"> Dataset<\/a><\/p><p><a href=\"https:\/\/www.iadisportal.org\/digital-library\/an%C3%A1lise-comparativa-via-classifica%C3%A7%C3%A3o-de-textos-gerados-pelo-chatgpt-versus-textos-escritos-manualmente\" target=\"_blank\" rel=\"noopener\">AN\u00c1LISE COMPARATIVA VIA CLASSIFICA\u00c7\u00c3O DE TEXTOS GERADOS PELO CHATGPT VERSUS TEXTOS ESCRITOS MANUALMENTE<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1ad1700 e-flex e-con-boxed e-con\" data-id=\"1ad1700\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-a9ef2aa e-con-full e-flex e-con\" data-id=\"a9ef2aa\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7e28b19 elementor-widget elementor-widget-heading\" data-id=\"7e28b19\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Edvan Gomes da Silva<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b5d0cec elementor-widget elementor-widget-heading\" data-id=\"b5d0cec\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Rafael Rabelo Nunes<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cd89ac0 elementor-widget elementor-widget-spacer\" data-id=\"cd89ac0\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-702f161 elementor-widget elementor-widget-text-editor\" data-id=\"702f161\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o:<\/strong> PPEE.MP.092<\/p><div><div><p><strong>Disserta\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/09\/dissertacao-2.pdf\">Proposta de Modelo Hier\u00e1rquico para Avalia\u00e7\u00e3o de<\/a><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/09\/dissertacao-2.pdf\"> Criticidad<\/a><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/09\/dissertacao-2.pdf\">e<\/a><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/09\/dissertacao-2.pdf\"> em Infraestruturas Cr\u00edticas Brasileiras: Compara\u00e7\u00e3o com o Modelo PPSI<\/a><\/p><\/div><div><p><strong>Linha de pesquisa:<\/strong> LP3: Aspectos humanos, organizacionais, legais e regulat\u00f3rios em Seguran\u00e7a Cibern\u00e9tica<\/p><p><strong>Data da defesa:<\/strong> 18\/07\/2025<\/p><p><strong>Publica\u00e7\u00f5es: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/09\/Revisao-Sistematica-sobre-Frameworks-de.pdf\">Revis\u00e3o Sistem\u00e1tica sobre Frameworks de Modelagem de Amea\u00e7as em Seguran\u00e7a Cibern\u00e9tica<\/a><\/p><p><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/09\/Protecao-Cibernetica-no-Judiciario-Brasileiro-Um-Estudo-Comparativo-das-Estruturas-de-Seguranca-em-Tribunais-Estaduais.pdf\">Prote\u00e7\u00e3o Cibern\u00e9tica no Judici\u00e1rio Brasileiro: Um Estudo Comparativo das Estruturas de Seguran\u00e7a em Tribunais Estaduais<\/a><\/p><p><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/09\/International-perspectives-on-critical-infrastructure-Evaluation-criteria.pdf\">International perspectives on critical infrastructure: Evaluation criteria and definitions<\/a><\/p><p><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/09\/Criterios-de-Avaliacao-e-Definicao-de-Joias-da-Coroa.pdf\">Tomada de Decis\u00e3o em Seguran\u00e7a Cibern\u00e9tica: Modelo para Identifica\u00e7\u00e3o de Joias da Coroa<\/a><\/p><p><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/09\/Comparacao-de-abordagens-de-protecao-a-cadeia-de.pdf\">Compara\u00e7\u00e3o de abordagens de prote\u00e7\u00e3o \u00e0 cadeia de suprimento de software<\/a><\/p><p><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/09\/Binary-Decision-Support-Using-AHP-A-Model-for-1.pdf\">Binary Decision Support Using AHP: A Model for Alternative Analysis<\/a><\/p><\/div><div>\u00a0<\/div><\/div><div><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/09\/Aplicacao-da-Lei-Geral-de-Protecao-de-Dados-Pessoais-para-agentes-de-tratamento-de-pequeno-porte-analise-em-clinicas-odontologicas.pdf\">Aplica\u00e7\u00e3o da Lei Geral de Prote\u00e7\u00e3o de Dados Pessoais para agentes de tratamento de pequeno porte: an\u00e1lise em cl\u00ednicas odontol\u00f3gicas<\/a><\/div><div>\u00a0<\/div><div><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/09\/Analise-de-Feeds-de-Inteligencia-de-Ataques-DDoS.pdf\">An\u00e1lise de Feeds de Intelig\u00eancia de Ataques DDoS sob a \u00d3tica da Qualidade da Informa\u00e7\u00e3o<\/a><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5f53eff e-flex e-con-boxed e-con\" data-id=\"5f53eff\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3dfdc4f e-con-full e-flex e-con\" data-id=\"3dfdc4f\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c2246b4 elementor-widget elementor-widget-heading\" data-id=\"c2246b4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Clendson Domingos Gon\u00e7alves<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-80c0b8f elementor-widget elementor-widget-heading\" data-id=\"80c0b8f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): F\u00e1bio L\u00facio Lopes de Mendon\u00e7a<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d216c72 elementor-widget elementor-widget-spacer\" data-id=\"d216c72\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c06ff32 elementor-widget elementor-widget-text-editor\" data-id=\"c06ff32\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o:<\/strong> PPEE.MP.091<\/p><div><div><p><strong>Disserta\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/08\/Confianca-na-IA-Perspectivas-de-Executivos-C-Level-em-Organizacoes-Brasileiras.pdf\">Confian\u00e7a na IA Perspectivas de Executivos C-Level em Organiza\u00e7\u00f5es Brasileiras<\/a><\/p><\/div><div><p><strong>Linha de pesquisa:<\/strong> LP3: Aspectos humanos, organizacionais, legais e regulat\u00f3rios em Seguran\u00e7a Cibern\u00e9tica<\/p><p><strong>Data da defesa:<\/strong> 07\/07\/2025<\/p><p><strong>Publica\u00e7\u00f5es:\u00a0<\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/08\/Trust-in-AI-Perspectives-of-C-Level-Executives-in-Brazilian.pdf\">Trust in AI: Perspectives of C-Level Executives in Brazilian Organizations<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a69b2e0 e-flex e-con-boxed e-con\" data-id=\"a69b2e0\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-116d069 e-con-full e-flex e-con\" data-id=\"116d069\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-df4a1ed elementor-widget elementor-widget-heading\" data-id=\"df4a1ed\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Jo\u00e3o Paulo Couto de Oliveira<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a904d8c elementor-widget elementor-widget-heading\" data-id=\"a904d8c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Edna Dias Canedo<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3c13689 elementor-widget elementor-widget-spacer\" data-id=\"3c13689\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a49f126 elementor-widget elementor-widget-text-editor\" data-id=\"a49f126\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o:<\/strong> PPEE.MP.090<\/p><div><div><p><strong>Disserta\u00e7\u00e3o:<\/strong> <a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/08\/dissertacao.pdf\">Planejando o Futuro: Como Professores de TIC Abordam a Aposentadoria e a Vida P\u00f3s-Carreira<\/a><\/p><\/div><div><p><strong>Linha de pesquisa:<\/strong> LP3: Aspectos humanos, organizacionais, legais e regulat\u00f3rios em Seguran\u00e7a Cibern\u00e9tica<\/p><p><strong>Data da defesa:<\/strong> 25\/07\/2025<\/p><p><strong>Publica\u00e7\u00f5es:<\/strong> <a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/08\/ARTIGO-1.pdf\">Planning for the Future: How ICT Professors Approach Retirement and Post-Career Life<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4c8d9cd e-flex e-con-boxed e-con\" data-id=\"4c8d9cd\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-8081101 e-con-full e-flex e-con\" data-id=\"8081101\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d309603 elementor-widget elementor-widget-heading\" data-id=\"d309603\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Matheus Noschang de Oliveira<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4478182 elementor-widget elementor-widget-heading\" data-id=\"4478182\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Andr\u00e9 Luiz Marques Serrano<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-528b558 elementor-widget elementor-widget-spacer\" data-id=\"528b558\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ecd379f elementor-widget elementor-widget-text-editor\" data-id=\"ecd379f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o:<\/strong> PPEE.MP.089<\/p><div><div><p><strong>Disserta\u00e7\u00e3o:<\/strong> <a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/09\/Dissertacao_na_versao_final.pdf\" target=\"_blank\" rel=\"noopener\">Rastreando a inova\u00e7\u00e3o industrial: an\u00e1lise de redes sociais de artigos e patentes de SAF assistida por LLM<\/a><\/p><\/div><div><p><strong>Linha de pesquisa:<\/strong> <strong>LP4:<\/strong> Ci\u00eancia e engenharia de dados, e concep\u00e7\u00e3o e desenvolvimento de materiais estrat\u00e9gicos e cr\u00edticos para seguran\u00e7a cibern\u00e9tica<\/p><p><strong>Data da defesa:<\/strong> 20\/08\/2025<\/p><p><strong>Publica\u00e7\u00f5es:<\/strong> <a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/09\/energies_17_03683.pdf\">Tracking Biofuel Innovation: A Graph-Based Analysis of Sustainable Aviation Fuel Patents<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1ec6114 e-flex e-con-boxed e-con\" data-id=\"1ec6114\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-95c7032 e-con-full e-flex e-con\" data-id=\"95c7032\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-afc7464 elementor-widget elementor-widget-heading\" data-id=\"afc7464\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Gabriela Mayumi Saiki<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4ea662e elementor-widget elementor-widget-heading\" data-id=\"4ea662e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Andr\u00e9 Luiz Marques Serrano<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-204a338 elementor-widget elementor-widget-spacer\" data-id=\"204a338\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6ca4f80 elementor-widget elementor-widget-text-editor\" data-id=\"6ca4f80\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o:<\/strong> PPEE.MP.088<\/p><div><div><p><strong>Disserta\u00e7\u00e3o:<\/strong> <a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/08\/Modelo_de_dissertacao_Mayumi__5_.pdf\">Vulnerabilidade e Efici\u00eancia no Setor Energ\u00e9tico Brasileiro: Uma An\u00e1lise Estoc\u00e1stica com Modelos DEA e Forecast<\/a><\/p><\/div><div><p><strong>Linha de pesquisa:<\/strong> LP3: Aspectos humanos, organizacionais, legais e regulat\u00f3rios em Seguran\u00e7a Cibern\u00e9tica<\/p><p><strong>Data da defesa:<\/strong> 03\/07\/2025<\/p><p><strong>Publica\u00e7\u00f5es:<\/strong> <a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/08\/artigo_na_versao_final_publicada.pdf\">Application of Non-Parametric and Forecasting Models for the Sustainable Development of Energy Resources in Brazil<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-975c651 e-flex e-con-boxed e-con\" data-id=\"975c651\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-cdcbf27 e-con-full e-flex e-con\" data-id=\"cdcbf27\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fb5ec34 elementor-widget elementor-widget-heading\" data-id=\"fb5ec34\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Renata de Castro Vianna<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2dbcd23 elementor-widget elementor-widget-heading\" data-id=\"2dbcd23\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Edna Dias Canedo<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-923b228 elementor-widget elementor-widget-spacer\" data-id=\"923b228\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-562c7dd elementor-widget elementor-widget-text-editor\" data-id=\"562c7dd\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o:<\/strong> PPEE.MP.087<\/p><div><div><p><strong>Disserta\u00e7\u00e3o:<\/strong> <a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/06\/Inteligencia-Artificial-na-Administracao-Publica-Brasileira.pdf\">Intelig\u00eancia Artificial na Administra\u00e7\u00e3o P\u00fablica Brasileira: Aplica\u00e7\u00f5es, Desafios e uma An\u00e1lise Comparativa Multivariada com Modelos de Governan\u00e7a Digital na Comunidade Europeia<\/a><\/p><\/div><div><p><strong>Linha de pesquisa:<\/strong> LP2: Seguran\u00e7a e intelig\u00eancia cibern\u00e9tica<\/p><p><strong>Data da defesa:<\/strong> 26\/05\/2025<\/p><p><strong>Publica\u00e7\u00f5es: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/06\/PET-IAUm-Servico-de-previsao-de-peticoes-com.pdf\">PET-IA: Um Servi\u00e7o de previs\u00e3o de peti\u00e7\u00f5es com Intelig\u00eancia Artificial na Procuradoria &#8211; Geral da Fazenda Nacional<\/a><\/p><p><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/06\/Ethical-Requirements-in-the-Age-of-Artificial-Intelligence-A.pdf\">Ethical Requirements in the Age of Artificial Intelligence: A Systematic Literature Review<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8e9c79b e-flex e-con-boxed e-con\" data-id=\"8e9c79b\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-91ef025 e-con-full e-flex e-con\" data-id=\"91ef025\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-072a4a3 elementor-widget elementor-widget-heading\" data-id=\"072a4a3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Ver\u00f4nica Souza dos Santos<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9c56da1 elementor-widget elementor-widget-heading\" data-id=\"9c56da1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Edna Dias Canedo<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d4cc0e9 elementor-widget elementor-widget-spacer\" data-id=\"d4cc0e9\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-81e5879 elementor-widget elementor-widget-text-editor\" data-id=\"81e5879\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o:<\/strong> PPEE.MP.086<\/p><div><div><p><strong>Disserta\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/04\/FACTUAL-Uma-Solucao-Baseada-em-Modelos-de-Linguagem-para.pdf\">FACTUAL: Uma Solu\u00e7\u00e3o Baseada em Modelos de Linguagem para o Combate \u00e0 Desinforma\u00e7\u00e3o<\/a><\/p><\/div><div><p><strong>Linha de pesquisa:<\/strong> LP4: Ci\u00eancia e engenharia de dados,<br \/>e concep\u00e7\u00e3o e desenvolvimento de materiais estrat\u00e9gicos e cr\u00edticos para seguran\u00e7a cibern\u00e9tica<\/p><p><strong>Data da defesa:<\/strong> 28\/02\/2025<\/p><p><strong>Publica\u00e7\u00f5es: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/04\/COMBATE-A-DESINFORMACAO-COM-FACTUAL-UMA-SOLUCAO-BASEADA-EM-MODELOS-DE-LINGUAGEM-DE-GRANDE-ESCALA.pdf\">COMBATE \u00c0 DESINFORMA\u00c7\u00c3O COM FACTUAL: UMA SOLU\u00c7\u00c3O BASEADA EM MODELOS DE LINGUAGEM DE GRANDE ESCALA<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-26d8d60 e-flex e-con-boxed e-con\" data-id=\"26d8d60\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5e98ec7 e-con-full e-flex e-con\" data-id=\"5e98ec7\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e6b2093 elementor-widget elementor-widget-heading\" data-id=\"e6b2093\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Alexander Andr\u00e9 de Souza Vieira<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7466e39 elementor-widget elementor-widget-heading\" data-id=\"7466e39\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Jo\u00e3o Jos\u00e9 Costa Gondim<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c1269ea elementor-widget elementor-widget-spacer\" data-id=\"c1269ea\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ac4db83 elementor-widget elementor-widget-text-editor\" data-id=\"ac4db83\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o:<\/strong> PPEE.MP. 085<\/p><div><div><p><strong>Disserta\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/04\/dissertacao-alexander.pdf\">Metodologia Integrativa Para a Detec\u00e7\u00e3o e Preven\u00e7\u00e3o de Amea\u00e7as Utilizando Intelig\u00eancia de Amea\u00e7a Cibern\u00e9tica e SIEM<\/a><\/p><\/div><div><p><strong>Linha de pesquisa: <\/strong>LP2: SEGURAN\u00c7A E INTELIG\u00caNCIA CIBERN\u00c9TICA<\/p><p><strong>Data da defesa:<\/strong> 26\/03\/2025<\/p><p><strong>Publica\u00e7\u00f5es:<\/strong><\/p><p><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/04\/Methodology-for-Threat-Detection-and.pdf\">Methodology for Threat Detection and Prevention Integrating Cyber Threat Intelligence and SIEM<\/a><\/p><p><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/04\/metodologia-int.pdf\">Metodologia integrativa para a detec\u00e7\u00e3o e preven\u00e7\u00e3o de amea\u00e7as utilizando intelig\u00eancia de amea\u00e7a cibern\u00e9tica e siem<\/a><\/p><p><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/04\/Programa_de_computador2829-alexander.pdf\">Registro de Programa de computador &#8211; Toolkit Para An\u00e1lise e Correlacionamento de TTPs<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eb957ae e-flex e-con-boxed e-con\" data-id=\"eb957ae\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-ec8e0c7 e-con-full e-flex e-con\" data-id=\"ec8e0c7\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-46f1228 elementor-widget elementor-widget-heading\" data-id=\"46f1228\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Alexandre Mundim de Oliveira<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-add7e00 elementor-widget elementor-widget-heading\" data-id=\"add7e00\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Luiz Ant\u00f4nio Ribeiro J\u00fanior<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d86aca6 elementor-widget elementor-widget-spacer\" data-id=\"d86aca6\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fbc50f1 elementor-widget elementor-widget-text-editor\" data-id=\"fbc50f1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o:<\/strong> PPEE.MP.084<\/p><div><div><p><strong>Disserta\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/05\/Dissertacao_na_versao_final-1.pdf\">Influ\u00eancia do vi\u00e9s racial no uso de reconhecimento facial aplicado para controle de acesso<\/a><\/p><\/div><div><p><strong>Linha de pesquisa:\u00a0<\/strong>: Ci\u00eancia e engenharia de dados, e concep\u00e7\u00e3o e desenvolvimento de materiais estrat\u00e9gicos e cr\u00edticos para seguran\u00e7a cibern\u00e9tica<\/p><p><strong>Data da defesa:<\/strong> 14\/04\/2025<\/p><p><strong>Publica\u00e7\u00e3o<\/strong>: <a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/05\/artigo_na_versao_final_publicada-1.pdf\">Influence of racial bias in the use of facial recognition applied to access control: A critical analysis<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-31c1099 e-flex e-con-boxed e-con\" data-id=\"31c1099\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-0f64982 e-con-full e-flex e-con\" data-id=\"0f64982\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7bd0ba8 elementor-widget elementor-widget-heading\" data-id=\"7bd0ba8\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): \u00c2ngello C\u00e1ssio Vasconcelos Oliveira<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c52d796 elementor-widget elementor-widget-heading\" data-id=\"c52d796\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Daniel Chaves Caf\u00e9<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-40eb4ff elementor-widget elementor-widget-spacer\" data-id=\"40eb4ff\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a079744 elementor-widget elementor-widget-text-editor\" data-id=\"a079744\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o:<\/strong> PPEE.MP.083<\/p><div><div><p><strong>Disserta\u00e7\u00e3o<\/strong>: <a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/05\/Dissertacao_na_versao_final.pdf\">Detection of Obfuscated LOLBins Using Machine Learning and NLP Techniques<\/a><\/p><\/div><div><p><strong>Linha de pesquisa:\u00a0<\/strong>Seguran\u00e7a e intelig\u00eancia cibern\u00e9tica<\/p><p><strong>Data da defesa:<\/strong> 17\/03\/2025<\/p><p><strong>Publica\u00e7\u00e3o:<\/strong> <a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/05\/artigo_na_versao_final_publicada.pdf\">Supervised Learning Algorithm used for LOLBins detection in Linux Machines<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c469c42 e-flex e-con-boxed e-con\" data-id=\"c469c42\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-aa15367 e-con-full e-flex e-con\" data-id=\"aa15367\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-76e2123 elementor-widget elementor-widget-heading\" data-id=\"76e2123\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): B\u00e1rbara Silva Cabral<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-479c6d3 elementor-widget elementor-widget-heading\" data-id=\"479c6d3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Carlos Andr\u00e9 de Melo Alves<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-22cab02 elementor-widget elementor-widget-spacer\" data-id=\"22cab02\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bb8aa5b elementor-widget elementor-widget-text-editor\" data-id=\"bb8aa5b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o:<\/strong> PPEE.MP.082<\/p><div><div><p><strong>Disserta\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/05\/Dissertacao_na_versao_final___Barbara-2.pdf\">METAVERSO E PERCEP\u00c7\u00c3O DE GESTORES DA \u00c1REA DE SEGURAN\u00c7A DA INFORMA\u00c7\u00c3O: ESTUDO EM INSTITUI\u00c7\u00c3O FINANCEIRA P\u00daBLICA NO<\/a><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/05\/Dissertacao_na_versao_final___Barbara-2.pdf\"> BRASIL<\/a><\/p><\/div><div><p><strong>Linha de pesquisa: <\/strong>LP3: Aspectos humanos, organizacionais, legais e regulat\u00f3rios em Seguran\u00e7a Cibern\u00e9tica<strong><br \/><\/strong><\/p><p><strong>Data da defesa:<\/strong> 25\/03\/2025<\/p><p><strong>Publica\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/05\/Artigo_na_versao_final_publicada.pdf\">METAVERSO E SEGURAN\u00c7A: AN\u00c1LISE DA PRODU\u00c7\u00c3O DE ARTIGOS PUBLICADOS EM BASES DE DADOS ACAD\u00caMICAS NO PER\u00cdODO DE 2018 A 2023<\/a><\/p><p><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/05\/Artigo-revista.pdf\">Metaverso e seguran\u00e7a: an\u00e1lise de artigos publicados em bases acad\u00eamicas de 2018 a 2023<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3ed206c e-flex e-con-boxed e-con\" data-id=\"3ed206c\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7396163 e-con-full e-flex e-con\" data-id=\"7396163\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-937e09b elementor-widget elementor-widget-heading\" data-id=\"937e09b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Hyago Santana Mariano<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b6270ca elementor-widget elementor-widget-heading\" data-id=\"b6270ca\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Daniel Chaves Caf\u00e9<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7814ceb elementor-widget elementor-widget-spacer\" data-id=\"7814ceb\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9dc682a elementor-widget elementor-widget-text-editor\" data-id=\"9dc682a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o:<\/strong> PPEE.MP.081<\/p><div class=\"wp-block-column\"><div class=\"wp-block-column\"><p><strong>Disserta\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/03\/Dissertacao_na_versao_final.pdf\" target=\"_blank\" rel=\"noopener\">Cyber Awareness em ambientes Wi-Fi: um estudo utilizando portais cativos baseados em microcontroladores<\/a><\/p><\/div><div class=\"wp-block-column\"><p><strong>Linha de pesquisa: <\/strong>LP4: Ci\u00eancia e engenharia de dados, e concep\u00e7\u00e3o e desenvolvimento de materiais estrat\u00e9gicos e cr\u00edticos para seguran\u00e7a cibern\u00e9tica<\/p><p><strong>Data da defesa:<\/strong> 28\/02\/2025<\/p><p><strong>Publica\u00e7\u00e3o:<\/strong> <a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/03\/Artigo_publicado.pdf\">Measuring Public Wi-Fi Security Awareness via Captive Portal Connections Using a Microcontroller<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3bbd94e e-flex e-con-boxed e-con\" data-id=\"3bbd94e\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-8c179b1 e-con-full e-flex e-con\" data-id=\"8c179b1\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4fbf77f elementor-widget elementor-widget-heading\" data-id=\"4fbf77f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Gustavo Vieira Isobe de Macedo<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0b687d9 elementor-widget elementor-widget-heading\" data-id=\"0b687d9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Vin\u00edcius Pereira Gon\u00e7alves<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-27e7b6c elementor-widget elementor-widget-spacer\" data-id=\"27e7b6c\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cad543c elementor-widget elementor-widget-text-editor\" data-id=\"cad543c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o:<\/strong> PPEE.MP.080<\/p><div class=\"wp-block-column\"><div class=\"wp-block-column\"><p><strong>Disserta\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/04\/Arquitetura-Entrelacada-para.pdf\">Arquitetura Entrela\u00e7ada para Predi\u00e7\u00e3o de Pr\u00f3ximo Sensor Externo em Trajet\u00f3ria de Ve\u00edculos Roubados<\/a><\/p><\/div><div class=\"wp-block-column\"><p><strong>Linha de pesquisa:\u00a0<\/strong>LP4: Ci\u00eancia e engenharia de dados,<br \/>e concep\u00e7\u00e3o e desenvolvimento de materiais estrat\u00e9gicos e cr\u00edticos para seguran\u00e7a cibern\u00e9tica<\/p><p><strong>Data da defesa:<\/strong> 25\/02\/2025<\/p><p><strong>Publica\u00e7\u00e3o:<\/strong> <a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/04\/Vista-do-Predicao-de-Geolocalizacao-de-Veiculo-com-Alerta-de-Roubo-Usando-LSTM-Transformer-e-TLE.pdf\">Predi\u00e7\u00e3o de Geolocaliza\u00e7\u00e3o de Ve\u00edculo com Alerta de Roubo Usando LSTM, Transformer e TL<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5408ef0 e-flex e-con-boxed e-con\" data-id=\"5408ef0\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3d40ac5 e-con-full e-flex e-con\" data-id=\"3d40ac5\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a6fe1f9 elementor-widget elementor-widget-heading\" data-id=\"a6fe1f9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Carlos Eduardo Miranda Zottmann<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3798775 elementor-widget elementor-widget-heading\" data-id=\"3798775\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Rafael Rabelo Nunes<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-646dd1e elementor-widget elementor-widget-spacer\" data-id=\"646dd1e\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aff019f elementor-widget elementor-widget-text-editor\" data-id=\"aff019f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de Publica\u00e7\u00e3o: <\/strong>PPEE.MP.079<\/p><div class=\"wp-block-column\"><div class=\"wp-block-column\"><p><strong>Disserta\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/02\/Dissertacao_na_Versao_Final.pdf\">Proposta de Modelo de Conformidade sobre as Melhores Pr\u00e1ticas relativas \u00e0 Seguran\u00e7a de Cadeias de Suprimentos de Software<\/a><\/p><\/div><div class=\"wp-block-column\"><p><strong>Linha de pesquisa:<\/strong> LP3: Aspectos humanos, organizacionais, legais e regulat\u00f3rios em Seguran\u00e7a Cibern\u00e9tica<\/p><p><strong>Data da defesa:<\/strong> 30\/12\/2024<\/p><p><strong>Publica\u00e7\u00f5es:<\/strong><\/p><p><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/02\/Comparing-software-supply-chain-protection.pdf\">Comparing software supply chain protection approaches<\/a><\/p><p><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/02\/Comparacao-de-abordagens-de.pdf\">Compara\u00e7\u00e3o de abordagens de prote\u00e7\u00e3o \u00e0 cadeia de suprimento de software<\/a><\/p><p><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/02\/proposta-de-metodologia-para-avaliacao-de-riscos-de-privacidade-para-orgaos-do-poder-judiciario-no-brasil.pdf\"> Proposta de Metodologia para Avalia\u00e7\u00e3o de Riscos de Privacidade para \u00d3rg\u00e3os do Poder Judici\u00e1rio no Brasil<\/a><\/p><p><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/02\/Enfrentando-os-Ataques-Hackers-Controles-de-Seguranca-da-Informacao-Prioritarios-1.pdf\">Enfrentando os Ataques Hackers: Controles de Seguran\u00e7a da Informa\u00e7\u00e3o Priorit\u00e1rios para o Tratamento dos Riscos de Neg\u00f3cio do Poder Judici\u00e1rio<\/a><\/p><p><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/02\/segurancacibernetica.pdf\">N\u00e3o \u00e9 s\u00f3 trocar a senha: Seguran\u00e7a Cibern\u00e9tica no Tribunal Superior<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-72c7326 e-flex e-con-boxed e-con\" data-id=\"72c7326\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5ff9542 e-con-full e-flex e-con\" data-id=\"5ff9542\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8a5b134 elementor-widget elementor-widget-heading\" data-id=\"8a5b134\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Tayn\u00e1 Gabriela Ara\u00fajo Albuquerque<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-02e0e1a elementor-widget elementor-widget-heading\" data-id=\"02e0e1a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Daniel Alves da Silva<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b5e62a7 elementor-widget elementor-widget-spacer\" data-id=\"b5e62a7\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1498db4 elementor-widget elementor-widget-text-editor\" data-id=\"1498db4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de Publica\u00e7\u00e3o: <\/strong>PPEE.MP.078<\/p><div class=\"wp-block-column\"><div class=\"wp-block-column\"><p><strong>Disserta\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/01\/dissertacao.pdf\">A Influ\u00eancia do Ensino Remoto na Forma\u00e7\u00e3o e Expectativas de Alunos e Professores no P\u00f3sPandemia: Um Estudo de Caso no PPEE\/UnB<\/a><\/p><\/div><div class=\"wp-block-column\"><p><strong>Linha de pesquisa<\/strong>: LP3: Aspectos humanos, organizacionais, legais e regulat\u00f3rios em Seguran\u00e7a Cibern\u00e9tica<\/p><p><strong>Data da defesa<\/strong>: 20\/12\/2024<\/p><p><strong>Publica\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/01\/Artigo_s__publicado_s__na_versao_final_publicada-1.pdf\">THE USE OF MOBILE LEARNING IN THE PROFESSIONAL MASTER&#8217;S DEGREE IN CYBERSECURITY<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-df844e2 e-flex e-con-boxed e-con\" data-id=\"df844e2\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-bf05121 e-con-full e-flex e-con\" data-id=\"bf05121\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-de4a737 elementor-widget elementor-widget-heading\" data-id=\"de4a737\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Suenia Carvalho Vieira Carneiro de Almeida <\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-17a37ee elementor-widget elementor-widget-heading\" data-id=\"17a37ee\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): William Ferreira Giozza<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a9806ec elementor-widget elementor-widget-spacer\" data-id=\"a9806ec\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5fa12fc elementor-widget elementor-widget-text-editor\" data-id=\"5fa12fc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de Publica\u00e7\u00e3o: <\/strong>PPEE.MP.077<\/p><div class=\"wp-block-column\"><div class=\"wp-block-column\"><p><strong>Disserta\u00e7\u00e3o:\u00a0<\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/01\/Dissertacao_na_versao_final.pdf\">SeletorDLTSaude: Uma Proposta de Framework de Sele\u00e7\u00e3o de DLT (Distributed Ledger Technology) e Algoritmos de Consenso aplicados a Sistemas de Gest\u00e3o de Sa\u00fade<\/a><\/p><\/div><div class=\"wp-block-column\"><p><strong>Linha de pesquisa<\/strong>: LP3: Aspectos humanos, organizacionais, legais e regulat\u00f3rios em Seguran\u00e7a Cibern\u00e9tica<\/p><p><strong>Data da defesa:<\/strong> 13\/12\/2024<\/p><p><strong>Publica\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/01\/Artigo_s__na_versao_final_publicada.pdf\">Operational requirement ranking for consensus algorithm selection in Blockchain health management systems<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cdcdebe e-flex e-con-boxed e-con\" data-id=\"cdcdebe\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5629894 e-con-full e-flex e-con\" data-id=\"5629894\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cf238ca elementor-widget elementor-widget-heading\" data-id=\"cf238ca\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Fabricio Rodrigues Freire<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-346d495 elementor-widget elementor-widget-heading\" data-id=\"346d495\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): William Ferreira Giozza<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9036e4d elementor-widget elementor-widget-spacer\" data-id=\"9036e4d\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d334dee elementor-widget elementor-widget-text-editor\" data-id=\"d334dee\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de Publica\u00e7\u00e3o: <\/strong>PPEE.MP.076<\/p><div class=\"wp-block-column\"><div class=\"wp-block-column\"><p><strong>Disserta\u00e7\u00e3o:\u00a0<\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/01\/DISSERTACAO_NA_VERSAO_FINAL.pdf\">Byzantine Fault Tolerant to Health (BFT- H) \u2013 Proposta de um algoritmo de consenso direcionado \u00e0s especificidades de sistemas de gest\u00e3o de sa\u00fade baseados em Blockchain<\/a><\/p><\/div><div class=\"wp-block-column\"><p><strong>Linha de pesquisa:<\/strong> LP1: Seguran\u00e7a de Infraestrutura, de Plataformas, de Software e de Sistemas<\/p><p><strong>Data da defesa:<\/strong> 10\/12\/2024<\/p><p><strong>Publica\u00e7\u00f5es:<\/strong><\/p><p><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/01\/Artigo_na_versao_final_publicada-1.pdf\">Proposta de um Algoritmo de Consenso para Plataformas Blockchain em Sistemas de Gest\u00e3o de Sa\u00fade Privados. RISTI &#8211; Revista Ib\u00e9rica de Sistemas e Tecnologias de Informa\u00e7\u00e3o, n. E57, p. 103-116, abr. 2023<\/a><\/p><p><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/01\/CTCSA.MS_.ID_.000141.pdf\">Towards Consensus Algorithm for Healthcare Management Systems in Blockchains. Current Trends in Computer Sciences &amp; Applications, v. 2, n. 4, p. 228-234, 2023<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c2b9e55 e-flex e-con-boxed e-con\" data-id=\"c2b9e55\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5d7a013 e-con-full e-flex e-con\" data-id=\"5d7a013\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c475aeb elementor-widget elementor-widget-heading\" data-id=\"c475aeb\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Mauricio Madalozzo Bordini<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0f76392 elementor-widget elementor-widget-heading\" data-id=\"0f76392\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Georges Daniel Amvame Nze<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fb3aac6 elementor-widget elementor-widget-spacer\" data-id=\"fb3aac6\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e2c6bb elementor-widget elementor-widget-text-editor\" data-id=\"2e2c6bb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de Publica\u00e7\u00e3o: <\/strong>PPEE.MP.075<\/p><div class=\"wp-block-column\"><div class=\"wp-block-column\"><p><strong>Disserta\u00e7\u00e3o:<\/strong> <a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/01\/Proposta-de-Arquitetura.pdf\">Proposta de Arquitetura para um Rastreador Veicular com Criptografia Ponta-a-ponta<\/a><\/p><\/div><div class=\"wp-block-column\"><p><strong>Linha de pesquisa:<\/strong> LP1: Seguran\u00e7a de Infraestrutura, de Plataformas, de Software e de Sistemas<\/p><p><strong>Data da defesa:<\/strong> 18\/12\/2024<\/p><p><strong>Publica\u00e7\u00f5es: <\/strong><a href=\"Certificado de Registro de Programa de Computador - INPI - Processo N\u00ba: BR512024001704-6\">Certificado de Registro de Programa de Computador &#8211; INPI &#8211; Processo N\u00ba: BR512024001704-6<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dc1c374 e-flex e-con-boxed e-con\" data-id=\"dc1c374\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-ee91fd6 e-con-full e-flex e-con\" data-id=\"ee91fd6\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ee214fb elementor-widget elementor-widget-heading\" data-id=\"ee214fb\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Larissa Pereira Gon\u00e7alves<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b167ed6 elementor-widget elementor-widget-heading\" data-id=\"b167ed6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Edna Dias Canedo<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-01fae6b elementor-widget elementor-widget-spacer\" data-id=\"01fae6b\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0b3b5f7 elementor-widget elementor-widget-text-editor\" data-id=\"0b3b5f7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.074<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2024\/11\/Dissertacao_na_versao_final-8.pdf\">Proposta de um modelo para documentar os requisitos conversacionais de Chatbot<\/a><\/p><div class=\"wp-block-column\"><div class=\"wp-block-column\"><p><strong>Linha de pesquisa:<\/strong> LP3: Aspectos humanos, organizacionais, legais e regulat\u00f3rios em Seguran\u00e7a Cibern\u00e9tica<\/p><p><strong>Data da defesa<\/strong>:\u00a016\/09\/2024<\/p><p><strong>Publica\u00e7\u00f5es:\u00a0<\/strong><\/p><p><a href=\"http:\/\/wer.inf.puc-rio.br\/WERpapers\/artigos\/artigos_WER24\/WER2024_paper_49.pdf\">Documentation Artifactis For Conversation-Related Requirements Specification in Chatbots<\/a><\/p><p><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2024\/11\/Artigo_na_versao_final_publicado_paper_50-1.pdf\">Requirements Documentation Containing Natural Language: A ystematic Tertiary Literature Review<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4884d8f e-flex e-con-boxed e-con\" data-id=\"4884d8f\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7976b13 e-con-full e-flex e-con\" data-id=\"7976b13\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-77a5c08 elementor-widget elementor-widget-heading\" data-id=\"77a5c08\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Luiz Augusto dos Santos Pires<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-03fc881 elementor-widget elementor-widget-heading\" data-id=\"03fc881\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a):  Georges Daniel Amvame Nze<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-40d7026 elementor-widget elementor-widget-spacer\" data-id=\"40d7026\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a6af81 elementor-widget elementor-widget-text-editor\" data-id=\"4a6af81\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.073<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2024\/11\/Dissertacao_na_versao_final-1.pdf\">Manuten\u00e7\u00e3o de Sistemas de Detec\u00e7\u00e3o de Intrus\u00e3o Baseados em Algoritmos de Aprendizado de M\u00e1quina Utilizando Benchmarks e Software de Extra\u00e7\u00e3o de Features<\/a><\/p><div class=\"wp-block-column\"><div class=\"wp-block-column\"><p><strong>Linha de pesquisa:<\/strong> LP4: Ci\u00eancia e engenharia de dados, e concep\u00e7\u00e3o e desenvolvimento de materiais estrat\u00e9gicos e cr\u00edticos para seguran\u00e7a cibern\u00e9tica<\/p><p><strong>Data da defesa:<\/strong> 06\/09\/2024<\/p><p><strong>Publica\u00e7\u00e3o: <\/strong><a href=\"https:\/\/www.proquest.com\/openview\/f8ad54135b58d81569d5a0d0fdd50d69\/1?pq-origsite=gscholar&amp;cbl=1006393\">Real-Time Feature Extraction Software for Machine Learning Models Focused on Cyber Attacks<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4d660f8 e-flex e-con-boxed e-con\" data-id=\"4d660f8\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-fb8e863 e-con-full e-flex e-con\" data-id=\"fb8e863\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fcc12e9 elementor-widget elementor-widget-heading\" data-id=\"fcc12e9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Lucas Vinicius Andrade Ferreira<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7bf228f elementor-widget elementor-widget-heading\" data-id=\"7bf228f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Rafael Tim\u00f3teo de Sousa J\u00fanior<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-667045c elementor-widget elementor-widget-spacer\" data-id=\"667045c\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d91106 elementor-widget elementor-widget-text-editor\" data-id=\"2d91106\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.072<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2024\/11\/Dissertacao_na_versao_final-2.pdf\">O papel da Auditoria Interna na Gest\u00e3o de Riscos Cibern\u00e9ticos em Institui\u00e7\u00f5es Financeiras Brasileiras &#8211; Estudo sob a perspectiva das tr\u00eas linhas<\/a><\/p><div><p><strong>Linha de pesquisa:<\/strong> LP3: Aspectos humanos, organizacionais, legais e regulat\u00f3rios em Seguran\u00e7a Cibern\u00e9tica<\/p><p><strong>Data da defesa:<\/strong> 30\/08\/2024<\/p><p><strong>Publica\u00e7\u00f5es: <\/strong><a href=\"https:\/\/www.researchgate.net\/publication\/373439857_Uso_de_honeypots_na_deteccao_de_rootkits_de_malware_proposta_de_uma_agenda_de_pesquisa\">Uso de honeypots na detec\u00e7\u00e3o de rootkits de malware: proposta de uma agenda de pesquisa<\/a><\/p><p><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/07\/Navus_14_2032.pdf\">Prote\u00e7\u00e3o Cibern\u00e9tica no Judici\u00e1rio Brasileiro: Um Estudo Comparativo das Estruturas de Seguran\u00e7a em Tribunais Estaduais<\/a><\/p><p><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/07\/applsci-15-05715-v2-1.pdf\">Internal Audit Strategies for Assessing Cybersecurity Controls in the Brazilian Financial Institutions<\/a><\/p><p>\u00a0<\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-51b194a e-flex e-con-boxed e-con\" data-id=\"51b194a\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-db04616 e-con-full e-flex e-con\" data-id=\"db04616\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1ae0532 elementor-widget elementor-widget-heading\" data-id=\"1ae0532\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Gabriel Arquelau Pimenta Rodrigues<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6fee4b5 elementor-widget elementor-widget-heading\" data-id=\"6fee4b5\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a):  Andr\u00e9 Luiz Marques Serrano\n<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8d3e29f elementor-widget elementor-widget-spacer\" data-id=\"8d3e29f\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-14c53de elementor-widget elementor-widget-text-editor\" data-id=\"14c53de\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.071<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2024\/11\/Dissertacao_na_versao_final-3.pdf\">An\u00e1lise Abrangente de Vazamentos de Dados: Riscos, Conformidade e Estrat\u00e9gias de Preven\u00e7\u00e3o<\/a><\/p><div class=\"wp-block-column\"><div class=\"wp-block-column\"><p><strong>Linha de pesquisa<\/strong>: LP4: Ci\u00eancia e engenharia de dados, e concep\u00e7\u00e3o e desenvolvimento de materiais estrat\u00e9gicos e cr\u00edticos para seguran\u00e7a cibern\u00e9tica<\/p><p><strong>Data da defesa:<\/strong> 12\/07\/2024<\/p><p><strong>Publica\u00e7\u00f5es:<\/strong><\/p><p><a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2590123024001464\">Mapping of data breaches in companies listed on the NYSE and NASDAQ Insights and implications<\/a><\/p><p><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2024\/11\/Artigo_s__na_versao_final_publicada.pdf\">Impact, Compliance, and Countermeasures in Relation to Data Breaches in Publicly Traded U.S. Companies<\/a><\/p><p><a href=\"https:\/\/www.mdpi.com\/2306-5729\/9\/2\/27\"> Understanding Data Breach from a Global Perspective: Incident Visualization and Data Protection Law Review<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-045b502 e-flex e-con-boxed e-con\" data-id=\"045b502\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-4ecaf8d e-con-full e-flex e-con\" data-id=\"4ecaf8d\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f7b64f7 elementor-widget elementor-widget-heading\" data-id=\"f7b64f7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Regilson Vasconcellos Jesus<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-17ebf75 elementor-widget elementor-widget-heading\" data-id=\"17ebf75\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a):  Daniel Alves da Silva\n<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d56eb5 elementor-widget elementor-widget-spacer\" data-id=\"4d56eb5\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-87cf01b elementor-widget elementor-widget-text-editor\" data-id=\"87cf01b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.070<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2024\/11\/Dissertacao.pdf\">Proposta de framework de compliance para prote\u00e7\u00e3o de dados de risco de cr\u00e9dito em atendimento \u00e0 Lei Geral de Prote\u00e7\u00e3o de Dados Pessoais (LGPD) e o Open Finance<\/a><\/p><div class=\"wp-block-column\"><div class=\"wp-block-column\"><p><strong>Linha de pesquisa:<\/strong> LP3: Aspectos humanos, organizacionais, legais e regulat\u00f3rios em Seguran\u00e7a Cibern\u00e9tica<\/p><p><strong>Data da defesa:<\/strong> 08\/07\/2024<\/p><p><strong>Publica\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2024\/11\/Artigo_na_versao_final_publicado.pdf\">OPEN SOURCE INTELLIGENCE: CLASSIFICA\u00c7\u00c3O E MITIGA\u00c7\u00c3O DE RISCOS E FRAUDES NO \u00c2MBITO DE INSTITUI\u00c7\u00d5ES FINANCEIRAS<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1442073 e-flex e-con-boxed e-con\" data-id=\"1442073\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7076809 e-con-full e-flex e-con\" data-id=\"7076809\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5925907 elementor-widget elementor-widget-heading\" data-id=\"5925907\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Edilson de Oliveira Caldas<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-05ea7a5 elementor-widget elementor-widget-heading\" data-id=\"05ea7a5\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a):  F\u00e1bio L\u00facio Lopes de\nMendon\u00e7a\n<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8e6e81a elementor-widget elementor-widget-spacer\" data-id=\"8e6e81a\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d65192b elementor-widget elementor-widget-text-editor\" data-id=\"d65192b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.069<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2024\/11\/Dissertacao_na_versao_final-5.pdf\">Proposta de Solu\u00e7\u00e3o e Arquitetura para Avalia\u00e7\u00e3o de Condu\u00e7\u00e3o Segura de Usu\u00e1rios de Ve\u00edculos Automotores para Benef\u00edcios em Seguros Veiculares<\/a><\/p><div class=\"wp-block-column\"><div class=\"wp-block-column\"><p><strong>Linha de pesquisa:<\/strong> LP4: Ci\u00eancia e engenharia de dados, e concep\u00e7\u00e3o e desenvolvimento de materiais estrat\u00e9gicos e cr\u00edticos para seguran\u00e7a cibern\u00e9tica<\/p><p><strong>Data da defesa<\/strong>: 19\/04\/2024.<\/p><p><strong>Publica\u00e7\u00e3o: <\/strong><a href=\"https:\/\/www.iadisportal.org\/digital-library\/aplicativo-para-avalia%C3%A7%C3%A3o-de-condu%C3%A7%C3%A3o-segura-de-usu%C3%A1rios-de-ve%C3%ADculos-automotores-por-meio-de-intelig%C3%AAncia-artificial-para-benef%C3%ADcios-em-seguros-veiculares\">Aplicativo para Avalia\u00e7\u00e3o de Condu\u00e7\u00e3o Segura de Usu\u00e1rios de Veiculos Automotores por meio de Intelig\u00eancia Artificial para Beneficios em Seguros Veiculares<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a8632ed e-flex e-con-boxed e-con\" data-id=\"a8632ed\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-708b6e4 e-con-full e-flex e-con\" data-id=\"708b6e4\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ce8aba2 elementor-widget elementor-widget-heading\" data-id=\"ce8aba2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Rodrigo Franco de Souza<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8248007 elementor-widget elementor-widget-heading\" data-id=\"8248007\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a):  Carlos Andr\u00e9 de Melo Alves\n<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0d8b448 elementor-widget elementor-widget-spacer\" data-id=\"0d8b448\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8d8abe0 elementor-widget elementor-widget-text-editor\" data-id=\"8d8abe0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.068<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2024\/11\/Dissertacao___Versao_Final.pdf\">Identifica\u00e7\u00e3o de fatores de riscos associados ao processo de desenvolvimento de softwares provedores dos programas sociais: o caso do Programa Social Brasileiro Alfa<\/a><\/p><div class=\"wp-block-column\"><div class=\"wp-block-column\"><p><strong>Linha de pesquisa<\/strong>: LP3: Aspectos humanos, organizacionais, legais e regulat\u00f3rios em Seguran\u00e7a Cibern\u00e9tica<\/p><p><strong>Data da defesa:<\/strong> 28\/03\/2024<\/p><p><strong>Publica\u00e7\u00e3o: <\/strong><a href=\"https:\/\/www.proquest.com\/openview\/beefcdab053a39e6243ba98fa31f7f1c\/1?pq-origsite=gscholar&amp;cbl=1006393\">Transformando a infraestrutura governamental: um estudo de caso sobre a implanta\u00e7\u00e3o da virtualiza\u00e7\u00e3o bimodal em nuvem privada<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2287e37 e-flex e-con-boxed e-con\" data-id=\"2287e37\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-dfb25e4 e-con-full e-flex e-con\" data-id=\"dfb25e4\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1415cfd elementor-widget elementor-widget-heading\" data-id=\"1415cfd\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): \u00c1tila Batista Bandeira<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8f7a468 elementor-widget elementor-widget-heading\" data-id=\"8f7a468\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Cl\u00f3vis Neumann<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d9cc16 elementor-widget elementor-widget-spacer\" data-id=\"2d9cc16\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c3d21ec elementor-widget elementor-widget-text-editor\" data-id=\"c3d21ec\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.067<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2024\/11\/Dissertacao_na_Versao_Final___atualizada.pdf\">Fingerprints de sistemas operacionais para identificar equipamentos IoT esp\u00farios na aus\u00eancia de controle de admiss\u00e3o \u00e0 Rede, uma proposta e implementa\u00e7\u00e3o<\/a><\/p><div class=\"wp-block-column\"><div class=\"wp-block-column\"><p><strong>Linha de pesquisa:<\/strong> LP1: Seguran\u00e7a de Infraestrutura, de Plataformas, de Software e de Sistemas<\/p><p><strong>Data da defesa<\/strong>: 29\/02\/2024<\/p><p><strong>Publica\u00e7\u00e3o: <\/strong><a href=\"https:\/\/www.iadisportal.org\/digital-library\/modelo-para-utiliza%C3%A7%C3%A3o-de-fingerprints-de-sistemas-operacionais-so-para-identificar-e-responder-a-conex%C3%B5es-n%C3%A3o-autorizadas-de-dispositivos-iot-na-aus%C3%AAncia-de-controle-de-admiss%C3%A3o-%C3%A0-red\">MODELO PARA UTILIZA\u00c7\u00c3O DE FINGERPRINTS DE SISTEMAS OPERACIONAIS (SO) PARA IDENTIFICAR E RESPONDER A CONEX\u00d5ES N\u00c3O AUTORIZADAS DE DISPOSITIVOS IOT NA AUS\u00caNCIA DE CONTROLE DE ADMISS\u00c3O \u00c0 REDE (NAC)<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c2b34b5 e-flex e-con-boxed e-con\" data-id=\"c2b34b5\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3abec93 e-con-full e-flex e-con\" data-id=\"3abec93\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-29f68ba elementor-widget elementor-widget-heading\" data-id=\"29f68ba\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Renato Solimar Alves<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a6ac976 elementor-widget elementor-widget-heading\" data-id=\"a6ac976\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Rafael Rabelo Nunes<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-06c4f31 elementor-widget elementor-widget-spacer\" data-id=\"06c4f31\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1b60cd7 elementor-widget elementor-widget-text-editor\" data-id=\"1b60cd7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.066<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2024\/11\/Proposta_de_uma_Linha_de_Base_de_Controles_de_Seguranca_da_Informacao_para_Mitigacao_dos_Riscos_de_Negocio_do_Poder_Judiciario_Brasileiro_final.pdf\">Proposta de uma Linha de Base de Controles de Seguran\u00e7a da Informa\u00e7\u00e3o para Mitiga\u00e7\u00e3o dos Riscos de Neg\u00f3cio do Poder Judici\u00e1rio Brasileiro<\/a><\/p><div class=\"wp-block-column\"><div class=\"wp-block-column\"><p><strong>Linha de pesquisa:<\/strong> LP3: Aspectos humanos, organizacionais, legais e regulat\u00f3rios em Seguran\u00e7a Cibern\u00e9tica<\/p><p><strong>Data da defesa<\/strong>: 31\/01\/2024<\/p><p><strong>Publica\u00e7\u00f5es:<\/strong><\/p><p><a href=\"https:\/\/enajus.org.br\/anais\/2023\/proposta-de-metodologia-para-avaliacao-de-riscos-de-privacidade-para-orgaos-do-poder-judiciario-no-brasil\">Proposta de Metodologia para Avalia\u00e7\u00e3o de Riscos de Privacidade para \u00d3rg\u00e3os do Poder Judici\u00e1rio no Brasil<\/a><\/p><p><a href=\"https:\/\/grupogometa.com.br\/2023\/11\/07\/judiciario-sob-ataque-hacker-riscos-de-negocio-para-seguranca-cibernetica-em-tribunais-brasileiros\/\">Judici\u00e1rio sob ataque hacker: riscos de neg\u00f3cio para seguran\u00e7a cibern\u00e9tica em tribunais brasileiros<\/a><\/p><p><a href=\"https:\/\/revistacej.cjf.jus.br\/cej\/index.php\/revcej\/article\/view\/2838\">OS TRIBUNAIS DO DISTRITO FEDERAL POSSUEM ESTRUTURAS PARA GERENCIAR RISCOS DE SEGURAN\u00c7A DA INFORMA\u00c7\u00c3O? UM ESTUDO \u00c0 LUZ DAS TR\u00caS LINHAS DE DEFESA<\/a><\/p><p><a href=\"https:\/\/www.enajus.org.br\/anais\/2022\/judiciario-sob-ataque-hacker-fatores-de-risco-para-a-seguranca-do-processo-decisorio-em-sistemas-judiciais-eletronicos\">JUDICI\u00c1RIO SOB ATAQUE HACKER: FATORES DE RISCO PARA A SEGURAN\u00c7A DO PROCESSO DECIS\u00d3RIO EM SISTEMAS JUDICIAIS ELETR\u00d4NICOS<\/a><\/p><p><a href=\"https:\/\/enajus.org.br\/anais\/2023\/enfrentando-os-ataques-hackers-controles-de-seguranca-da-informacao-prioritarios-para-o-tratamento-dos-riscos-de-negocio-do-poder-judiciario\">Enfrentando os Ataques Hackers: Controles de Seguran\u00e7a da Informa\u00e7\u00e3o Priorit\u00e1rios para o Tratamento dos Riscos de Neg\u00f3cio do Poder Judici\u00e1rio<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ac23532 e-flex e-con-boxed e-con\" data-id=\"ac23532\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-4284211 e-con-full e-flex e-con\" data-id=\"4284211\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-84303cd elementor-widget elementor-widget-heading\" data-id=\"84303cd\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Andr\u00e9 Luiz Louren\u00e7o de Andrade<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2f80ebd elementor-widget elementor-widget-heading\" data-id=\"2f80ebd\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Rafael Tim\u00f3teo de Sousa J\u00fanior<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-81de465 elementor-widget elementor-widget-spacer\" data-id=\"81de465\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4e7741c elementor-widget elementor-widget-text-editor\" data-id=\"4e7741c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.065<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2024\/11\/dissertacao_na_versao_final-1.pdf\">Estudo comparativo de tokens de autoriza\u00e7\u00e3o em APIs REST<\/a><\/p><div class=\"wp-block-column\"><div class=\"wp-block-column\"><p><strong>Linha de pesquisa:<\/strong> LP1: Seguran\u00e7a de Infraestrutura, de Plataformas, de Software e de Sistemas<\/p><p><strong>Data da defesa:<\/strong> 24\/01\/2024<\/p><p><strong>Publica\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2024\/11\/Artigo_s__na_versao_final_publicada-1.pdf\">Estudo Comparativo de Solu\u00e7\u00f5es IAM Para Arquitetura Zero Trust Sobre Microsservi\u00e7os<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-01ff318 e-flex e-con-boxed e-con\" data-id=\"01ff318\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-52e43ef e-con-full e-flex e-con\" data-id=\"52e43ef\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-220e24e elementor-widget elementor-widget-heading\" data-id=\"220e24e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): \nLucas de Ara\u00fajo Wanderley Romeiro\n\n\n<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-610be62 elementor-widget elementor-widget-heading\" data-id=\"610be62\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Dem\u00e9trio Ant\u00f4nio da Silva Filho<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c20f4f0 elementor-widget elementor-widget-spacer\" data-id=\"c20f4f0\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-758d1da elementor-widget elementor-widget-text-editor\" data-id=\"758d1da\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.014<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a id=\"wp-block-file--media-97d10319-9488-4eac-b005-967ed6e05c31\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/SISTEMA-DE-BAIXO-CUSTO.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">SISTEMA DE BAIXO CUSTO PARA MONITORAMENTO E ALERTA REMOTO DA TEMPERATURA DE MEDICAMENTOS TERMOL\u00c1BEIS, COM BASE EM TECNOLOGIA EDGE COMPUTING, BLE E IoT<\/a><\/p><div class=\"wp-block-column\"><p><strong>Linha de pesquisa<\/strong>: LP4: Ci\u00eancia e engenharia de dados, e concep\u00e7\u00e3o e desenvolvimento de materiais estrat\u00e9gicos e cr\u00edticos para seguran\u00e7a cibern\u00e9tica<\/p><p><strong>Data da defesa<\/strong>: 26\/04\/2022<\/p><p><strong>Publica\u00e7\u00f5es:<\/strong><\/p><div class=\"wp-block-column\"><div class=\"wp-block-file\"><a id=\"wp-block-file--media-6bdcec06-546a-4f47-bd4c-ec9e6a848ec6\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/DySPAN-Low_Cost_Monitoring.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">LOW-COST MONITORING DEVICE FOR COLD-CHAIN USING EDGE COMPUTING<\/a><\/div><div class=\"wp-block-file\"><a id=\"wp-block-file--media-f8c12c94-1be1-42d8-97ed-9324ed5cc10e\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/SBA-View-of-SISTEMA-INTELIGENTE-PARA.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">SISTEMA INTLIGENTE PARA DETEC\u00c7\u00c3O DE IMPACTO EM PARTIDAS AIRSOFT USANDO M\u00c1QUINAS DE VETORES DE SUPORTE E REDES NEURAIS ARTIFICIAIS<\/a><\/div><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b7383b5 e-flex e-con-boxed e-con\" data-id=\"b7383b5\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-52427d6 e-con-full e-flex e-con\" data-id=\"52427d6\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5333ef6 elementor-widget elementor-widget-heading\" data-id=\"5333ef6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Diego Martins de Oliveira<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b5b6156 elementor-widget elementor-widget-heading\" data-id=\"b5b6156\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): F\u00e1bio L\u00facio Lopes de Mendon\u00e7a<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-48668d5 elementor-widget elementor-widget-spacer\" data-id=\"48668d5\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-75fc871 elementor-widget elementor-widget-text-editor\" data-id=\"75fc871\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.064<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2024\/11\/dissertaA_A_o_na_versA_o_final.pdf\">PROPOSTA DE ESQUEMA DE MONITORAMENTO E GERENCIAMENTO REMOTO DE REDES COMO PRESTA\u00c7\u00c3O DE SERVI\u00c7O<\/a><\/p><div class=\"wp-block-column\"><div class=\"wp-block-column\"><p><strong>Linha de pesquisa:<\/strong> LP4: Ci\u00eancia e engenharia de dados, e concep\u00e7\u00e3o e desenvolvimento de materiais estrat\u00e9gicos e cr\u00edticos para seguran\u00e7a cibern\u00e9tica<\/p><p><strong>Data da defesa:<\/strong> 11\/01\/2024<\/p><p><strong>Publica\u00e7\u00f5es:<\/strong><\/p><p><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2024\/11\/Artigo_s__na_versao_final_publicada-2.pdf\">Arquitetura para monitoramento e gerenciamento remoto de redes como presta\u00e7\u00e3o de servi\u00e7os<\/a><\/p><p><a href=\"https:\/\/www.iadisportal.org\/digital-library\/aplicativo-para-avalia%C3%A7%C3%A3o-de-condu%C3%A7%C3%A3o-segura-de-usu%C3%A1rios-de-ve%C3%ADculos-automotores-por-meio-de-intelig%C3%AAncia-artificial-para-benef%C3%ADcios-em-seguros-veiculares\">Aplicativo para avalia\u00e7\u00e3o de condu\u00e7\u00e3o segura de usu\u00e1rios de ve\u00edculos automotores por meio de intelig\u00eancia artificial para benef\u00edcios em seguros veiculares<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cea12e8 e-flex e-con-boxed e-con\" data-id=\"cea12e8\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-8283212 e-con-full e-flex e-con\" data-id=\"8283212\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1802aba elementor-widget elementor-widget-heading\" data-id=\"1802aba\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Danilo Anderson de Moura Chagas<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7e2a87c elementor-widget elementor-widget-heading\" data-id=\"7e2a87c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Vin\u00edcius Pereira Gon\u00e7alves<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-185668f elementor-widget elementor-widget-spacer\" data-id=\"185668f\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-98f8e5f elementor-widget elementor-widget-text-editor\" data-id=\"98f8e5f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.063<\/p><div class=\"wp-block-column\"><div class=\"wp-block-column\"><p><strong>Disserta\u00e7\u00e3o:\u00a0<\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2024\/11\/dissertacao_na_versao_final-2.pdf\">Detec\u00e7\u00e3o de Ataques de Nega\u00e7\u00e3o de Servi\u00e7o em SGBDs a Partir de Logs Internos Usando Abordagens Supervisionada e N\u00e3oSupervisionada<\/a><\/p><p><strong>Linha de pesquisa: <\/strong>LP2: Seguran\u00e7a e intelig\u00eancia cibern\u00e9tica<\/p><p><strong>Data da defesa:<\/strong> 30\/01\/2024<\/p><p><strong>Publica\u00e7\u00f5es: <a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2025\/04\/jonathas.pdf\">Machine Learning for Detection of Distributed Denial-of-Service Attacks from Queries Executed in DBMS<\/a><\/strong><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b0fa9b8 e-flex e-con-boxed e-con\" data-id=\"b0fa9b8\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-1460a17 e-con-full e-flex e-con\" data-id=\"1460a17\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6d7d799 elementor-widget elementor-widget-heading\" data-id=\"6d7d799\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Jonathan Gomes Pereira dos Santos<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cc5b3b6 elementor-widget elementor-widget-heading\" data-id=\"cc5b3b6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Vin\u00edcius Pereira Gon\u00e7alves<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-083ded5 elementor-widget elementor-widget-spacer\" data-id=\"083ded5\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-22542bc elementor-widget elementor-widget-text-editor\" data-id=\"22542bc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.062<\/p><div class=\"wp-block-column\"><div class=\"wp-block-column\"><p><strong>Disserta\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2024\/11\/dissertacao_na_versao_final-3.pdf\">SARIK: Uma proposta de framework para o aprimoramento da seguran\u00e7a em Kubernetes por meio de pol\u00edticas de rede<\/a><\/p><p><strong>Linha de pesquisa:<\/strong> LP2: Seguran\u00e7a e intelig\u00eancia cibern\u00e9tica<\/p><p><strong>Data da defesa:<\/strong> 18\/01\/2024<\/p><p><strong>Publica\u00e7\u00f5es:<\/strong><\/p><p><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2024\/11\/Artigo_s__na_versao_final_publicada-4.pdf\">Enhancing IoT Device Security in Kubernetes: An Approach with Network Policies and the SARIK Framework<\/a><\/p><p><a href=\"https:\/\/sol.sbc.org.br\/index.php\/sbrc_estendido\/article\/view\/21419\/21243\">SARIK &#8211; framework para automatizar a seguran\u00e7a em ambientes de orquestra\u00e7\u00e3o kubernetes<\/a><\/p><p><a href=\"https:\/\/ouci.dntb.gov.ua\/en\/works\/ldOOvK04\/\">Enhancing IoT device security\u00a0in Kubernetes: An approach adopted for network policies and the SARIK framework<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-db5ccde e-flex e-con-boxed e-con\" data-id=\"db5ccde\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-f3a2748 e-con-full e-flex e-con\" data-id=\"f3a2748\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c37417d elementor-widget elementor-widget-heading\" data-id=\"c37417d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Jonathas Alves de Oliveira<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3d29e81 elementor-widget elementor-widget-heading\" data-id=\"3d29e81\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Geraldo Pereira Filho<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-551fef5 elementor-widget elementor-widget-spacer\" data-id=\"551fef5\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0f9fe2c elementor-widget elementor-widget-text-editor\" data-id=\"0f9fe2c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.061\u00a0<\/p><div class=\"wp-block-column\"><div class=\"wp-block-column\"><p><strong>Disserta\u00e7\u00e3o:\u00a0<\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2024\/11\/dissertacao_na_versao_final-4.pdf\">F-NIDS \u2014 SISTEMA DE DETEC\u00c7\u00c3O DE INTRUS\u00c3O BASEADO EM APRENDIZADO FEDERADO<\/a><\/p><p><strong>Linha de pesquisa:<\/strong> LP2: Seguran\u00e7a e intelig\u00eancia cibern\u00e9tica<\/p><p><strong>Data da defesa:<\/strong> 25\/01\/2024<\/p><p><strong>Publica\u00e7\u00e3o: <\/strong><a href=\"https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S1389128623004553\">F-NIDS \u2014 A Network Intrusion Detection System based on federated learning<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7bc392e e-flex e-con-boxed e-con\" data-id=\"7bc392e\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-f68683e e-con-full e-flex e-con\" data-id=\"f68683e\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e6c9b6d elementor-widget elementor-widget-heading\" data-id=\"e6c9b6d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Mois\u00e9s Silva de Sousa<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-40a310a elementor-widget elementor-widget-heading\" data-id=\"40a310a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): William Ferreira Giozza<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-14cf8f6 elementor-widget elementor-widget-spacer\" data-id=\"14cf8f6\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7ab3ae5 elementor-widget elementor-widget-text-editor\" data-id=\"7ab3ae5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.060<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2024\/11\/dissertacao_na_versao_final-5.pdf\">O USO DA ENGENHARIA DE ATRIBUTOS PARA OTIMIZAR O DESEMPENHO DE MODELOS DE APRENDIZADO DE M\u00c1QUINA SUPERVISIONADO APLICADOS A SISTEMAS DE DETEC\u00c7\u00c3O DE INTRUS\u00c3O<\/a><\/p><div class=\"wp-block-column\"><div class=\"wp-block-column\"><p><strong>Linha de pesquisa:<\/strong> LP2: Seguran\u00e7a e intelig\u00eancia cibern\u00e9tica<\/p><p><strong>Data da defesa:<\/strong> 20\/12\/2023<\/p><p><strong>Publica\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/9820579\">INFORMATION GAIN APPLIED TO REDUCE MODEL-BUILDING TIME IN DECISION-TREE-BASED INTRUSION DETECTION SYSTEM<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3385ff5 e-flex e-con-boxed e-con\" data-id=\"3385ff5\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-f329edf e-con-full e-flex e-con\" data-id=\"f329edf\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-89e54a9 elementor-widget elementor-widget-heading\" data-id=\"89e54a9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Bruno Soares Rabelo<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-67025e3 elementor-widget elementor-widget-heading\" data-id=\"67025e3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): F\u00e1bio L\u00facio Lopes de Mendon\u00e7a<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a194649 elementor-widget elementor-widget-spacer\" data-id=\"a194649\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0ed8a79 elementor-widget elementor-widget-text-editor\" data-id=\"0ed8a79\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.059<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2024\/11\/Dissertacao_Mestrado___Bruno_Rabelo___Versao_Final__1_.pdf\">PLATAFORMA IOT PARA PREDI\u00c7\u00c3O DE FALHAS EM FREEZERS DE VACINAS A PARTIR DO MONITORAMENTO CONT\u00cdNUO DA TEMPERATURA INTERNA<\/a><\/p><div class=\"wp-block-column\"><div class=\"wp-block-column\"><p><strong>Linha de pesquisa:<\/strong> LP4: Ci\u00eancia e engenharia de dados, e concep\u00e7\u00e3o e desenvolvimento de materiais estrat\u00e9gicos e cr\u00edticos para seguran\u00e7a cibern\u00e9tica<\/p><p><strong>Data da defesa:<\/strong> 30\/08\/2023<\/p><p><strong>Publica\u00e7\u00e3o:\u00a0<\/strong><a href=\"https:\/\/www.semanticscholar.org\/paper\/PLATAFORMA-IoT-PARA-PREDI%C3%87%C3%83O-DE-FALHAS-EM-ATRAV%C3%89S-Rabelo-Moura\/4a854e30d36f005c8cab1035ac413306ec9751b5\">PLATAFORMA IoT PARA PREDI\u00c7\u00c3O DE FALHAS EM CONGELADORES ATRAV\u00c9S DE MODELO AUTO-REGRESSIVO INTEGRADO DE M\u00c9DIA MOVEL (ARIMA)<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e77f070 e-flex e-con-boxed e-con\" data-id=\"e77f070\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-469ec1a e-con-full e-flex e-con\" data-id=\"469ec1a\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f35544a elementor-widget elementor-widget-heading\" data-id=\"f35544a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Fl\u00e1vio Garcia Praciano<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-92f41e4 elementor-widget elementor-widget-heading\" data-id=\"92f41e4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Daniel Alves da Silva<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d0393d6 elementor-widget elementor-widget-spacer\" data-id=\"d0393d6\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-221f6cc elementor-widget elementor-widget-text-editor\" data-id=\"221f6cc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.058<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2024\/11\/Dissertacao_Mestrado_Flavio_Garcia_Praciano__PPEE.MP_.058.pdf\">An\u00e1lise de integridade de dados e desempenho em cursos online utilizando m\u00e9todos de aprendizado de m\u00e1quina<\/a><\/p><div class=\"wp-block-column\"><div class=\"wp-block-column\"><p><strong>Linha de pesquisa:<\/strong> LP4: Ci\u00eancia e engenharia de dados, e concep\u00e7\u00e3o e desenvolvimento de materiais estrat\u00e9gicos e cr\u00edticos para seguran\u00e7a cibern\u00e9tica<\/p><p><strong>Data da defesa<\/strong>: 28\/07\/2023<\/p><p><strong>Publica\u00e7\u00f5es:<\/strong><\/p><p><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2024\/11\/Paper_Enap_Cisti_2022.pdf\">Integridade dos Dados de Treinamento para Funcion\u00e1rios P\u00fablicos Federais no Brasil<\/a><\/p><p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/9820275\">Integrity of Training Data for Federal Civil Employees in Brazil<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-90612d7 e-flex e-con-boxed e-con\" data-id=\"90612d7\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-8fcccfe e-con-full e-flex e-con\" data-id=\"8fcccfe\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9046d71 elementor-widget elementor-widget-heading\" data-id=\"9046d71\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Liomar de Miranda Leite<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6df634e elementor-widget elementor-widget-heading\" data-id=\"6df634e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a) F\u00e1bio L\u00facio Lopes de Mendon\u00e7a<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ec074c2 elementor-widget elementor-widget-spacer\" data-id=\"ec074c2\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b4c2a26 elementor-widget elementor-widget-text-editor\" data-id=\"b4c2a26\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.057<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2024\/11\/Dissertacao_Liomar_PPEE_Final_REV01-1.pdf\">PLATAFORMA IoT PARA SUPERVIS\u00c3O DE USINA FOTOVOLTAICA E AUTOMA\u00c7\u00c3O PREDIAL NO MINIST\u00c9RIO DA DEFESA<\/a><\/p><div class=\"wp-block-column\"><div class=\"wp-block-column\"><p><strong>Linha de pesquisa:<\/strong> LP4: Ci\u00eancia e engenharia de dados, e concep\u00e7\u00e3o e desenvolvimento de materiais estrat\u00e9gicos e cr\u00edticos para seguran\u00e7a cibern\u00e9tica<\/p><p><strong>Data da defesa:<\/strong> 30\/06\/2023<\/p><p><strong>Publica\u00e7\u00e3o: <\/strong><a href=\"https:\/\/www.proquest.com\/docview\/2828438619?sourcetype=Scholarly%20Journals\">PLATAFORMA IOT PARA SUPERVIS\u00c3O DE USINA FOTOVOLTAICA E AUTOMA\u00c7\u00c3O PREDIAL COM VALIDA\u00c7\u00c3O NO MINIST\u00c9RIO DA DEFESA DO BRASIL<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0fd2832 e-flex e-con-boxed e-con\" data-id=\"0fd2832\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2a6b644 e-con-full e-flex e-con\" data-id=\"2a6b644\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c1ae6dc elementor-widget elementor-widget-heading\" data-id=\"c1ae6dc\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Alexandre Cabral Godinho<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b7ab86b elementor-widget elementor-widget-heading\" data-id=\"b7ab86b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Geraldo Pereira Rocha Filho<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-80b7d5e elementor-widget elementor-widget-spacer\" data-id=\"80b7d5e\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cddaf3f elementor-widget elementor-widget-text-editor\" data-id=\"cddaf3f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.056<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2024\/11\/Dissertacao_Alexandre_Godinho_Versao_Final.pdf\">STALLA: UM FRAMEWORK PARA AN\u00c1LISE DE FONTES ABERTAS DURANTE A PANDEMIA DO COVID-19<\/a><\/p><div class=\"wp-block-column\"><div class=\"wp-block-column\"><p><strong>Linha de pesquisa<\/strong>: LP2: Seguran\u00e7a e intelig\u00eancia cibern\u00e9tica<\/p><p><strong>Data da defesa<\/strong>: 29\/06\/2023<\/p><p><strong>Publica\u00e7\u00e3o:<\/strong> <a href=\"https:\/\/sol.sbc.org.br\/index.php\/courb\/article\/view\/24571\">STALLA: UM FRAMEWORK PARA AN\u00c1LISE DE FONTES ABERTAS DURANTE A PANDEMIA DO COVID19<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c0e06c1 e-flex e-con-boxed e-con\" data-id=\"c0e06c1\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-1b3a57d e-con-full e-flex e-con\" data-id=\"1b3a57d\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b279f0d elementor-widget elementor-widget-heading\" data-id=\"b279f0d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Marcus Aur\u00e9lio Carvalho Georg<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-65fe119 elementor-widget elementor-widget-heading\" data-id=\"65fe119\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a) Dem\u00e9trio Antonio da Silva Filho<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e3f6e86 elementor-widget elementor-widget-spacer\" data-id=\"e3f6e86\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b7d1d46 elementor-widget elementor-widget-text-editor\" data-id=\"b7d1d46\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.055<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2024\/11\/Dissertacao_versao_final.pdf\">Proposta de Modelo de Mensura\u00e7\u00e3o de Apetite a Riscos Cibern\u00e9ticos Uso do M\u00e9todo AHP e da Estrutura B\u00e1sica de Seguran\u00e7a Cibern\u00e9tica<\/a><\/p><div class=\"wp-block-column\"><div class=\"wp-block-column\"><p><strong>Linha de pesquisa<\/strong>: LP3: Aspectos humanos, organizacionais, legais e regulat\u00f3rios em Seguran\u00e7a Cibern\u00e9tica<\/p><p><strong>Data da defesa<\/strong>: 29\/06\/2023<\/p><p><strong>Publica\u00e7\u00f5es:<\/strong><\/p><p><a href=\"https:\/\/www.proquest.com\/docview\/2812112984?pq-origsite=gscholar&amp;fromopenview=true&amp;sourcetype=Scholarly%20Journals\">Os desafios da Seguran\u00e7a Cibern\u00e9tica no setor p\u00fablico federal do Brasil: estudo sob a \u00f3tica de gestores de tecnologia da informa\u00e7\u00e3o<\/a><\/p><p><a href=\"https:\/\/www.enajus.org.br\/anais\/2022\/judiciario-sob-ataque-hacker-fatores-de-risco-para-a-seguranca-do-processo-decisorio-em-sistemas-judiciais-eletronicos\">Judici\u00e1rio sob ataque hacker: Fatores de risco para a seguran\u00e7a do processo decis\u00f3rio em sistemas judiciais eletr\u00f4nicos<\/a><\/p><p><a href=\"https:\/\/www.researchgate.net\/publication\/371510704_Judiciario_sob_ataque_hacker_riscos_de_negocio_para_seguranca_cibernetica_em_tribunais_brasileiros\">Judici\u00e1rio sob ataque hacker: riscos de neg\u00f3cio para seguan\u00e7a e tribunais brasileiros<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-baa00a9 e-flex e-con-boxed e-con\" data-id=\"baa00a9\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-e63b6e0 e-con-full e-flex e-con\" data-id=\"e63b6e0\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1cc6c08 elementor-widget elementor-widget-heading\" data-id=\"1cc6c08\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Alcides Francinaldo Souza Macedo<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a96596a elementor-widget elementor-widget-heading\" data-id=\"a96596a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Fl\u00e1vio Elias Gomes de Deus<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a67f462 elementor-widget elementor-widget-spacer\" data-id=\"a67f462\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a7f0b95 elementor-widget elementor-widget-text-editor\" data-id=\"a7f0b95\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.054<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2024\/11\/Dissertacao_versao_final-1.pdf\">FRAMEWORK DE INTELIG\u00caNCIA CIBERN\u00c9TICA PARA INTERA\u00c7\u00c3O HUMANA UTILIZANDO AS MELHORES PR\u00c1TICAS DE FONTES ABERTAS<\/a><\/p><div class=\"wp-block-column\"><div class=\"wp-block-column\"><p><strong>Linha de pesquisa<\/strong>: LP2: Seguran\u00e7a e intelig\u00eancia cibern\u00e9tica<\/p><p><strong>Data da defesa:<\/strong> 23\/06\/2023<\/p><p><strong>Publica\u00e7\u00e3o:<\/strong> <a href=\"https:\/\/ijcionline.com\/abstract\/12123ijci05\">A REVIEW OF THE INTERSECTION TECHNIQUES ON HUMINT AND OSINT<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eb33143 e-flex e-con-boxed e-con\" data-id=\"eb33143\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-f7a69fc e-con-full e-flex e-con\" data-id=\"f7a69fc\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-40b6e4b elementor-widget elementor-widget-heading\" data-id=\"40b6e4b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Paulo Magno de Melo Rodrigues\nAlves<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-685af3b elementor-widget elementor-widget-heading\" data-id=\"685af3b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Vin\u00edcius Pereira Gon\u00e7alves<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cc3df5c elementor-widget elementor-widget-spacer\" data-id=\"cc3df5c\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ce6852d elementor-widget elementor-widget-text-editor\" data-id=\"ce6852d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.053<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2024\/11\/TCC_PPEE_UnB___Paulo_Magno___versao_final-1.pdf\">Leveraging BERT\u2019s Power to Classify TTP from Unstructured Text<\/a><\/p><div class=\"wp-block-column\"><div class=\"wp-block-column\"><p><strong>Linha de pesquisa<\/strong>: LP1: Seguran\u00e7a de Infraestrutura, de Plataformas, de Software e de Sistemas<\/p><p><strong>Data da defesa<\/strong>: 27\/06\/2023<\/p><p><strong>Publica\u00e7\u00f5es: <\/strong><\/p><p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/9969697\">Leveraging BERT\u2019s Power to Classify TTP from Unstructured Text<\/a><\/p><p><a href=\"https:\/\/ciaca-conf.org\/wp-content\/uploads\/2022\/11\/2_CIACA2022_PT_F_063.pdf\">MODELO DE CLASSIFICA\u00c7\u00c3O DE TTP BASEADO EM TRANSFORMADAS BERT<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b75f456 e-flex e-con-boxed e-con\" data-id=\"b75f456\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-b681df7 e-con-full e-flex e-con\" data-id=\"b681df7\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9f884d3 elementor-widget elementor-widget-heading\" data-id=\"9f884d3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Luiz Guilherme Schiefler de Arruda<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-45d192d elementor-widget elementor-widget-heading\" data-id=\"45d192d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Rafael Rabelo Nunes<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-666b357 elementor-widget elementor-widget-spacer\" data-id=\"666b357\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-29b55a1 elementor-widget elementor-widget-text-editor\" data-id=\"29b55a1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.052<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/07\/Dissertacao_Luiz_Guilherme_Schiefler_de_Arruda.pdf\">PROPOSTA DE M\u00c9TODO DE PRIORIZA\u00c7\u00c3O DE CONTROLES PARA IMPLEMENTA\u00c7\u00c3O DA ARQUITETURA ZERO TRUST UTILIZANDO M\u00c9TODOS MULTICRIT\u00c9RIOS<\/a><\/p><div class=\"wp-block-column\"><div class=\"wp-block-column\"><p><strong>Linha de pesquisa:<\/strong> LP3: Aspectos humanos, organizacionais, legais e regulat\u00f3rios em Seguran\u00e7a Cibern\u00e9tica<\/p><p><strong>Data da defesa:<\/strong> 27\/06\/2023<\/p><p><strong>Publica\u00e7\u00f5es: <\/strong><\/p><p><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/07\/Comprovante_de_publicacao-2.pdf\">O M\u00c9TODO MULTICRIT\u00c9RIO NO APOIO \u00c0 PRIORIZA\u00c7\u00c3O NA IMPLEMENTA\u00c7\u00c3O DO ZERO TRUST<\/a><\/p><p><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/07\/Comprovante_de_publicacao-3-1.pdf\">Implementa\u00e7\u00e3o da Arquitetura Zero Trust: uma Revis\u00e3o Sistem\u00e1tica de Literatura<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-96e3c69 e-flex e-con-boxed e-con\" data-id=\"96e3c69\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-f4aeca0 e-con-full e-flex e-con\" data-id=\"f4aeca0\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-791fa23 elementor-widget elementor-widget-heading\" data-id=\"791fa23\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Ricardo Ramos Sampaio<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-532d89b elementor-widget elementor-widget-heading\" data-id=\"532d89b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Ugo Silva Dias<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-412456d elementor-widget elementor-widget-spacer\" data-id=\"412456d\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3c848c5 elementor-widget elementor-widget-text-editor\" data-id=\"3c848c5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.051<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/07\/A-POSSIBILIDADE-DA-REALIZACAO-DE-VIGILANCIA-POR.pdf\">A POSSIBILIDADE DA REALIZA\u00c7\u00c3O DE VIGIL\u00c2NCIA POR MEIO DE GEOLOCALIZA\u00c7\u00c3O EM TEMPO REAL PELA AG\u00caNCIA BRASILEIRA DE INTELIG\u00caNCIA<\/a><\/p><div class=\"wp-block-column\"><div class=\"wp-block-column\"><p><strong>Linha de pesquisa:<\/strong> LP3: Aspectos humanos, organizacionais, legais e regulat\u00f3rios em Seguran\u00e7a Cibern\u00e9tica<\/p><p><strong>Data da defesa<\/strong>: 30\/06\/2023<\/p><p><strong>Publica\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/07\/Inaplicabilidade-da-Lei-Geral-de-Protecao-de-Dados.pdf\">Inaplicabilidade da Lei Geral de Prote\u00e7\u00e3o de Dados: A interpreta\u00e7\u00e3o do art. 4\u00b0, inciso III e \u00a71\u00b0 da LGPD \u00e0 luz do direito comparado.<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ba4763f e-flex e-con-boxed e-con\" data-id=\"ba4763f\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5072a7f e-con-full e-flex e-con\" data-id=\"5072a7f\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-26e12d9 elementor-widget elementor-widget-heading\" data-id=\"26e12d9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Ricardo Cincinato Freitas De Oliveira<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3d08629 elementor-widget elementor-widget-heading\" data-id=\"3d08629\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Ugo Silva Dias<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-71bdfcd elementor-widget elementor-widget-spacer\" data-id=\"71bdfcd\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eb3e6b4 elementor-widget elementor-widget-text-editor\" data-id=\"eb3e6b4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.050<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/08\/dissertacao_na_versao_final-1.pdf\">EMPREGO DO 5G NA DEFESA E SEGURAN\u00c7A NACIONAL: POSSIBILIDADES, LIMITA\u00c7\u00d5ES E UMA PROPOSTA CONCEITUAL DE ARQUITETURA PARA O EX\u00c9RCITO BRASILEIRO<\/a><\/p><div class=\"wp-block-column\"><div class=\"wp-block-column\"><p><strong>Linha de pesquisa<\/strong>: LP4: Ci\u00eancia e engenharia de dados, e concep\u00e7\u00e3o e desenvolvimento de materiais estrat\u00e9gicos e cr\u00edticos para seguran\u00e7a cibern\u00e9tica<\/p><p><strong>Data da defesa:<\/strong> 29\/06\/2023<\/p><p><strong>Publica\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/07\/Comprovante_de_publicacao-1.pdf\">Emprego dual &#8211; civil e militar &#8211; do 5G na defesa brasileira: uma proposta para o SISFRON, sob dom\u00ednio do Ex\u00e9rcito<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c3fe349 e-flex e-con-boxed e-con\" data-id=\"c3fe349\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-ebd6e15 e-con-full e-flex e-con\" data-id=\"ebd6e15\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c65a27d elementor-widget elementor-widget-heading\" data-id=\"c65a27d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Alexandre Henrique Radis<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e46bd59 elementor-widget elementor-widget-heading\" data-id=\"e46bd59\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a):Daniel Chaves Caf\u00e9<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f91aa1b elementor-widget elementor-widget-spacer\" data-id=\"f91aa1b\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a77b817 elementor-widget elementor-widget-text-editor\" data-id=\"a77b817\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.049<\/p><div class=\"wp-block-column\"><div class=\"wp-block-column\"><p><strong>Disserta\u00e7\u00e3o:\u00a0<\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/07\/Dissertacao_versao_final-2.pdf\">PROTOCOLO SEGURO PARA INJE\u00c7\u00c3O DE C\u00d3DIGO EM CUBESATS<\/a><\/p><p><strong>Linha de pesquisa:<\/strong> LP1: Seguran\u00e7a de Infraestrutura, de Plataformas, de Software e de Sistemas<\/p><p><strong>Data da defesa<\/strong>: 30\/06\/2023<\/p><p><strong>Publica\u00e7\u00e3o<\/strong>: <a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/07\/Proposed-Security-Measures-for-Code-Injection-for-CubeSats.pdf\">Proposed Security Measures for Code Injection for CubeSats<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f5049b8 e-flex e-con-boxed e-con\" data-id=\"f5049b8\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-811d4e0 e-con-full e-flex e-con\" data-id=\"811d4e0\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-42ab3a6 elementor-widget elementor-widget-heading\" data-id=\"42ab3a6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Rodrigo Vilela Fonseca de Souza<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-61c8514 elementor-widget elementor-widget-heading\" data-id=\"61c8514\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a):Alexandre Solon Nery<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e90a019 elementor-widget elementor-widget-spacer\" data-id=\"e90a019\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-42ce899 elementor-widget elementor-widget-text-editor\" data-id=\"42ce899\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.048<\/p><div class=\"wp-block-column\"><div class=\"wp-block-column\"><p><strong>Disserta\u00e7\u00e3o:\u00a0<\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/07\/Dissertacao_na_versao_final-3.pdf\">IDENTIFICA\u00c7\u00c3O AUTOM\u00c1TICA DE CONLUIO EM PREG\u00d5ES DO COMPRASNET COM APRENDIZADO DE M\u00c1QUINA<\/a><\/p><p><strong>Linha de pesquisa:<\/strong> LP2: Seguran\u00e7a e intelig\u00eancia cibern\u00e9tica<\/p><p><strong>Data da defesa<\/strong>: 20\/06\/2023<\/p><p><strong>Publica\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/07\/Identificacao_automatica_de_conluio_em_licitacoes_do_Comprasnet_com_Aprendizado_de.pdf\">Identifica\u00e7\u00e3o autom\u00e1tica de conluio em licita\u00e7\u00f5es do Comprasnet com Aprendizado de M\u00e1quina<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fe3d3de e-flex e-con-boxed e-con\" data-id=\"fe3d3de\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-89a538e e-con-full e-flex e-con\" data-id=\"89a538e\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-719cbc0 elementor-widget elementor-widget-heading\" data-id=\"719cbc0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Rogerio Machado da Silva<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-492d856 elementor-widget elementor-widget-heading\" data-id=\"492d856\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Jo\u00e3o Jos\u00e9 Costa Gondim<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d66be3d elementor-widget elementor-widget-spacer\" data-id=\"d66be3d\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ac89246 elementor-widget elementor-widget-text-editor\" data-id=\"ac89246\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.047<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/07\/Proposta-de-um-framework-para.pdf\">Proposta de um framework para melhoria da qualidade na produ\u00e7\u00e3o de intelig\u00eancia de amea\u00e7a cibern\u00e9tica<\/a><\/p><div class=\"wp-block-column\"><div class=\"wp-block-column\"><p><strong>Linha de pesquisa:<\/strong> LP2: Seguran\u00e7a e intelig\u00eancia cibern\u00e9tica<\/p><p><strong>Data da defesa:<\/strong> 20\/06\/2023<\/p><p><strong>Publica\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/07\/Methodology-to-Improve-the-Quality-of-Cyber.pdf\">Methodology to Improve the Quality of Cyber Threat Intelligence Production Through Open Source Platforms<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a6a9921 e-flex e-con-boxed e-con\" data-id=\"a6a9921\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-eba9881 e-con-full e-flex e-con\" data-id=\"eba9881\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7f12ee6 elementor-widget elementor-widget-heading\" data-id=\"7f12ee6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Maickel Josu\u00e9 Trinks<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e434c2e elementor-widget elementor-widget-heading\" data-id=\"e434c2e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Jo\u00e3o Jos\u00e9 Costa Gondim<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c74d8eb elementor-widget elementor-widget-spacer\" data-id=\"c74d8eb\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1004d86 elementor-widget elementor-widget-text-editor\" data-id=\"1004d86\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.046<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/07\/dissertacao_na_versao_final_1.pdf\">Arquitetura multiagente para detec\u00e7\u00e3o passiva de rootkits com enriquecimento de dados<\/a><\/p><div class=\"wp-block-column\"><div class=\"wp-block-column\"><p><strong>Linha de pesquisa:<\/strong> LP2: Seguran\u00e7a e intelig\u00eancia cibern\u00e9tica<\/p><p><strong>Data da defesa:<\/strong> 22\/06\/2023<\/p><p><strong>Publica\u00e7\u00e3o:\u00a0<\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/07\/comprovante_de_publicacao-2.pdf\">Multi-agent Architecture for Passive Rootkit Detection with Data Enrichment<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5853a58 e-flex e-con-boxed e-con\" data-id=\"5853a58\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-ef5c03d e-con-full e-flex e-con\" data-id=\"ef5c03d\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3cd5271 elementor-widget elementor-widget-heading\" data-id=\"3cd5271\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Renata Colares Policarpo<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7619294 elementor-widget elementor-widget-heading\" data-id=\"7619294\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Alexandre Solon Nery<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f6fef97 elementor-widget elementor-widget-spacer\" data-id=\"f6fef97\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-829ee60 elementor-widget elementor-widget-text-editor\" data-id=\"829ee60\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero da publica\u00e7\u00e3o: <\/strong>PPEE.MP.045<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/07\/Dissertacao___Renata___final.pdf\">Implementa\u00e7\u00e3o em FPGA de um mecanismo de encapsulamento de chave p\u00f3s-qu\u00e2ntico utilizando HLS<\/a><\/p><div class=\"wp-block-column\"><div class=\"wp-block-column\"><p><strong>Linha de pesquisa<\/strong>: LP2: Seguran\u00e7a e intelig\u00eancia cibern\u00e9tica<\/p><p><strong>Data da defesa<\/strong>: 27\/06\/2023<\/p><p><strong>Publica\u00e7\u00e3o:<\/strong> <a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/07\/comprovante_de_publicacao-1.pdf\">Quantum-resistant Cryptography in FPGA<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2440e8a e-flex e-con-boxed e-con\" data-id=\"2440e8a\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-19e326f e-con-full e-flex e-con\" data-id=\"19e326f\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4d91f6e elementor-widget elementor-widget-heading\" data-id=\"4d91f6e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Marcelo Garcia<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0d5baeb elementor-widget elementor-widget-heading\" data-id=\"0d5baeb\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Robson de Oliveira Albuquerque<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-483bb21 elementor-widget elementor-widget-spacer\" data-id=\"483bb21\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0060968 elementor-widget elementor-widget-text-editor\" data-id=\"0060968\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.044<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/07\/Key-Factors-for-a-Cybersecurity-and.pdf\">Key Factors for a Cybersecurity and Cyberintelligence Policy in Brazil<\/a><\/p><div class=\"wp-block-column\"><div class=\"wp-block-column\"><p><strong>Linha de pesquisa:<\/strong> LP2: Seguran\u00e7a e intelig\u00eancia cibern\u00e9tica<\/p><p><strong>Data da defesa:<\/strong> 19\/06\/2023<\/p><p><strong>Publica\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/07\/Assessments-on-National-Cyber-Capability-A-Brazilian-Perspective-in-a-Comparison-with-Spain-1.pdf\">Assessments on National Cyber Capability: A Brazilian Perspective in a Comparison with Spain<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-95c5999 e-flex e-con-boxed e-con\" data-id=\"95c5999\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5bde50e e-con-full e-flex e-con\" data-id=\"5bde50e\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e957304 elementor-widget elementor-widget-heading\" data-id=\"e957304\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Cileno de Magalh\u00e3es Ribeiro<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-82198e6 elementor-widget elementor-widget-heading\" data-id=\"82198e6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Rafael Rabelo Nunes<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9a4c79e elementor-widget elementor-widget-spacer\" data-id=\"9a4c79e\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-536f529 elementor-widget elementor-widget-text-editor\" data-id=\"536f529\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.043<\/p><div class=\"wp-block-column\"><div class=\"wp-block-column\"><p><strong>Disserta\u00e7\u00e3o:\u00a0<\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/07\/Dissertacao-Cileno-1.pdf\">UMA PROPOSTA DE OTIMIZA\u00c7\u00c3O DA COMUNICA\u00c7\u00c3O SIGILOSA NO SISBIN COM O USO DA COMPUTA\u00c7\u00c3O EM NUVEM PRIVADA<\/a><\/p><p><strong>Linha de pesquisa<\/strong>: LP3: Aspectos humanos, organizacionais, legais e regulat\u00f3rios em Seguran\u00e7a Cibern\u00e9tica<\/p><p><strong>Data da defesa<\/strong>: 15\/06\/2023<\/p><p><strong>Publica\u00e7\u00f5es:<\/strong><\/p><p><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/07\/Mitigacao_dos_Riscos_a_Privaci.pdf\">Mitiga\u00e7\u00e3o dos Riscos \u00e0 Privacidade atrav\u00e9s da Anonimiza\u00e7\u00e3o de Dados<\/a><\/p><p><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/07\/Um-diagnostico-sobre-o-processo-de-comunicacao-sigilosa-entre-os-orgaos-do-Sistema-Brasileiro-de-Inteligencia.pdf\">Um diagn\u00f3stico sobre o processo de comunica\u00e7\u00e3o sigilosa entre os \u00f3rg\u00e3os do Sistema Brasileiro de Intelig\u00eancia<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3912cd2 e-flex e-con-boxed e-con\" data-id=\"3912cd2\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-e4007a6 e-con-full e-flex e-con\" data-id=\"e4007a6\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5384971 elementor-widget elementor-widget-heading\" data-id=\"5384971\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Felipe Barreto de Oliveira<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-74ca8b8 elementor-widget elementor-widget-heading\" data-id=\"74ca8b8\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Georges Daniel Amvame Nze<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dedca5f elementor-widget elementor-widget-spacer\" data-id=\"dedca5f\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8deb6a4 elementor-widget elementor-widget-text-editor\" data-id=\"8deb6a4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.042<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/07\/Dissertacao_Felipe_Barreto.pdf\">FRAMEWORK PARA DETEC\u00c7\u00c3O DE ATAQUES DOS EM DISPOSITIVOS IOT, UTILIZANDO ABORDAGENS DE APRENDIZADO DE M\u00c1QUINAS<\/a><\/p><div class=\"wp-block-column\"><div class=\"wp-block-column\"><p><strong>Linha de pesquisa:<\/strong> LP4: Ci\u00eancia e engenharia de dados, e concep\u00e7\u00e3o e desenvolvimento de materiais estrat\u00e9gicos e cr\u00edticos para seguran\u00e7a cibern\u00e9tica<\/p><p><strong>Data da defesa:<\/strong> 16\/06\/2023<\/p><p><strong>Publica\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/07\/Certificado_de_Registro_de_Programa_de_Computador.pdf\">NSL-KDD Extractor (NDE)<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6463902 e-flex e-con-boxed e-con\" data-id=\"6463902\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-383a336 e-con-full e-flex e-con\" data-id=\"383a336\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4f94ec2 elementor-widget elementor-widget-heading\" data-id=\"4f94ec2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Virg\u00ednia de Melo Dantas Trinks<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-93b7a5c elementor-widget elementor-widget-heading\" data-id=\"93b7a5c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): \n\nRobson de Oliveira Albuquerque<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-312ec5d elementor-widget elementor-widget-spacer\" data-id=\"312ec5d\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a9641e1 elementor-widget elementor-widget-text-editor\" data-id=\"a9641e1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.041<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a id=\"wp-block-file--media-74a86507-5ced-42eb-809a-2d90f3283936\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/06\/Dissertacao_versao_final_pos_correcao.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">STRATEGIC ASSESSMENT OF CYBER SECURITY CONTENDERS TO THE BRAZILIAN AGRIBUSINESS IN THE BEEF SECTOR<\/a><\/p><div class=\"wp-block-column\"><div class=\"wp-block-column\"><p><strong>Linha de pesquisa:<\/strong> LP3: Aspectos humanos, organizacionais, legais e regulat\u00f3rios em Seguran\u00e7a Cibern\u00e9tica<\/p><p><strong>Data da defesa<\/strong>: 02\/06\/2023<\/p><p><strong>Publica\u00e7\u00e3o: <\/strong><a id=\"wp-block-file--media-017a4569-3a15-4949-a087-00197fce3e24\" href=\"https:\/\/www.mdpi.com\/2078-2489\/13\/9\/431\">STRATEGIC ASSESSMENT OF CYBER SECURITY CONTENDERS TO THE BRAZILIAN AGRIBUSINESS IN THE BEEF SECTOR<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fa60a70 e-flex e-con-boxed e-con\" data-id=\"fa60a70\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-683f0b3 e-con-full e-flex e-con\" data-id=\"683f0b3\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-77e9bdc elementor-widget elementor-widget-heading\" data-id=\"77e9bdc\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): \nRenato Carvalho Raposo de Melo<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c9bc0ba elementor-widget elementor-widget-heading\" data-id=\"c9bc0ba\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): \n\nF\u00e1bio L\u00facio Lopes de Mendon\u00e7a<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-68139da elementor-widget elementor-widget-spacer\" data-id=\"68139da\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-97a9006 elementor-widget elementor-widget-text-editor\" data-id=\"97a9006\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.040<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a id=\"wp-block-file--media-8585ff94-b63e-4a96-b954-7c03a2412279\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/07\/dissertacao_na_versao_final.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">MODELO PARA MAPEAMENTO DE AMEA\u00c7AS CIBERN\u00c9TICAS<\/a><\/p><div class=\"wp-block-column\"><div class=\"wp-block-column\"><p><strong>Linha de pesquisa:<\/strong> LP1: Seguran\u00e7a de Infraestrutura, de Plataformas, de Software e de Sistemas<\/p><p><strong>Data da defesa:<\/strong> 26\/05\/2023<\/p><p><strong>Publica\u00e7\u00e3o: <\/strong><a id=\"wp-block-file--media-4b4befba-3c35-43f7-bce3-63e88b90cef3\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/05\/MODELO-PARA-MAPEAMENTO-DE_compressed-1.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">MODELO PARA MAPEAMENTO DE AMEA\u00c7AS CIBERN\u00c9TICAS CYBER THREAT MODELING FRAMEWORK<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-752b889 e-flex e-con-boxed e-con\" data-id=\"752b889\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-202dc0e e-con-full e-flex e-con\" data-id=\"202dc0e\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-00b2140 elementor-widget elementor-widget-heading\" data-id=\"00b2140\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): \nM\u00e1rcio da Mota Ribeiro<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0a69725 elementor-widget elementor-widget-heading\" data-id=\"0a69725\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): \n\nRafael Rabelo Nunes<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2a77fe4 elementor-widget elementor-widget-spacer\" data-id=\"2a77fe4\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-24cc4c0 elementor-widget elementor-widget-text-editor\" data-id=\"24cc4c0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.039<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a id=\"wp-block-file--media-f833c0c8-ae88-4d9b-af06-bc9a118c40d8\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/05\/Marcio-da-Mota-Ribeiro-1.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">A ATIVIDADE DE INTELIG\u00caNCIA DE ESTADO BRASILEIRA EST\u00c1 EM XEQUE COM A PROMULGA\u00c7\u00c3O DA EMENDA CONSTITUCIONAL N. 115\/2022? UMA AVALIA\u00c7\u00c3O DE RISCOS E IMPACTOS E PROPOSTA DE UMA AGENDA DE SOLU\u00c7\u00d5ES<\/a><\/p><div class=\"wp-block-column\"><div class=\"wp-block-column\"><p><strong>Linha de pesquisa:<\/strong> LP3: Aspectos humanos, organizacionais, legais e regulat\u00f3rios em Seguran\u00e7a Cibern\u00e9tica<\/p><p><strong>Data da defesa<\/strong>: 30\/03\/2023<\/p><p><strong>Publica\u00e7\u00e3o:<\/strong> <a id=\"wp-block-file--media-017a4569-3a15-4949-a087-00197fce3e24\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/05\/Marcio-da-mota-ribeiro-artigo-1.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">INTELIG\u00caNCIA DE ESTADO, APLICA\u00c7\u00d5ES DE BIG<br \/>DATA ANALYTICS E O DIREITO FUNDAMENTAL \u00c0<br \/>PROTE\u00c7\u00c3O DE DADOS PESSOAIS<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-062d0c7 e-flex e-con-boxed e-con\" data-id=\"062d0c7\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-aa7ccb1 e-con-full e-flex e-con\" data-id=\"aa7ccb1\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-40b585d elementor-widget elementor-widget-heading\" data-id=\"40b585d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): \nJuliano Rodrigues Ferreira<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-60b0df1 elementor-widget elementor-widget-heading\" data-id=\"60b0df1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): \n\nEdna Dias Canedo<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-443f14c elementor-widget elementor-widget-spacer\" data-id=\"443f14c\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bb80233 elementor-widget elementor-widget-text-editor\" data-id=\"bb80233\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.038<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a id=\"wp-block-file--media-2fe21bcd-04a7-43be-b743-4dc18e37328c\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/05\/PPEE___Dissertacao_Juliano_Ferreira-v3-1.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">APLICA\u00c7\u00c3O DA LEI GERAL DE PROTE\u00c7\u00c3O DE DADOS COM UTILIZA\u00c7\u00c3O DE MODELOS DE ANONIMIZA\u00c7\u00c3O DE DADOS EM AMBIENTE DE NUVEM P\u00daBLICA<\/a><\/p><div class=\"wp-block-column\"><div class=\"wp-block-column\"><p><strong>Linha de pesquisa:<\/strong> LP1: Seguran\u00e7a de Infraestrutura, de Plataformas, de Software e de Sistemas<\/p><p><strong>Data da defesa:<\/strong> 17\/04\/2023<\/p><p><strong>Publica\u00e7\u00e3o: <\/strong><a id=\"wp-block-file--media-b2600d68-4f8d-4c24-a4b9-ff8d76b06275\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/05\/comprovante_de_publicacao.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">MITIGA\u00c7\u00c3O DOS RISCOS \u00c0 PRIVACIDADE ATRAV\u00c9S DA ANONIMIZA\u00c7\u00c3O DE DADOS<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1e8f418 e-flex e-con-boxed e-con\" data-id=\"1e8f418\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-cf19677 e-con-full e-flex e-con\" data-id=\"cf19677\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c29a162 elementor-widget elementor-widget-heading\" data-id=\"c29a162\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): \n\nAline dos Santos Pereira<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6e3670c elementor-widget elementor-widget-heading\" data-id=\"6e3670c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): \nDaniel Chaves Caf\u00e9<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cfd2cac elementor-widget elementor-widget-spacer\" data-id=\"cfd2cac\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eabd7e9 elementor-widget elementor-widget-text-editor\" data-id=\"eabd7e9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.037<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a id=\"wp-block-file--media-d441907a-7e25-432f-992b-fd8b710c8d0b\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/04\/Final_Template_dissertacao.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">PROSPOTA DE CRIA\u00c7\u00c3O DE BANCO DE IMAGENS DE DESAPARECIDOS E PROGRESS\u00c3O DE IDADE FACIAL AUTOM\u00c1TICA USANDO APRENDIZADO DE M\u00c1QUINA<\/a><\/p><div class=\"wp-block-column\"><p><strong>Linha de pesquisa<\/strong>: LP4: Ci\u00eancia e engenharia de dados, e concep\u00e7\u00e3o e desenvolvimento de materiais estrat\u00e9gicos e cr\u00edticos para seguran\u00e7a cibern\u00e9tica<\/p><p><strong>Data da defesa:<\/strong> 30\/03\/2023<\/p><p><strong>Publica\u00e7\u00e3o: <\/strong><a id=\"wp-block-file--media-0e56f941-d2ca-494e-8559-cd2fd9956614\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/04\/ICAT22_Proceedings_V2.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">TOWARDS A MISSING PERSONS DATABASE FOR FACE AGE PROGRESSION USING MACHINE LEARNING<\/a><\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-766bf72 e-flex e-con-boxed e-con\" data-id=\"766bf72\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-726866f e-con-full e-flex e-con\" data-id=\"726866f\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9c767b3 elementor-widget elementor-widget-heading\" data-id=\"9c767b3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): \nLuiz Henrique Filadelfo Cardoso<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-75b93f3 elementor-widget elementor-widget-heading\" data-id=\"75b93f3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Georges Daniel Amvame Nze<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5c6bd56 elementor-widget elementor-widget-spacer\" data-id=\"5c6bd56\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-448d9cd elementor-widget elementor-widget-text-editor\" data-id=\"448d9cd\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.036<\/p><div class=\"wp-block-column\"><div><strong>Disserta\u00e7\u00e3o:\u00a0<\/strong><a id=\"wp-block-file--media-8d4a8530-2d12-4a35-a9c2-d8baf2b80559\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/04\/Dissertacao.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">GEST\u00c3O DO RISCO CIBERN\u00c9TICO \u00c0 IMPLANTA\u00c7\u00c3O ADS-B NO \u00c2MBITO DO SISCEAB POR MEIO DO M\u00c9TODO DE GERENCIAMENTO DE RISCOS \u00c0 SEGURAN\u00c7A OPERACIONAL (GRSO)<\/a><\/div><p><strong>Linha de pesquisa<\/strong>: LP2: Seguran\u00e7a e intelig\u00eancia cibern\u00e9tica<\/p><p><strong>Data da defesa:<\/strong> 15\/02\/2023<\/p><p><strong>Publica\u00e7\u00e3o:\u00a0<\/strong><a id=\"wp-block-file--media-85aeec97-d30c-4f95-a323-588dc2465b78\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/04\/ANEXO_4_ARTIGO_10.23919_CISTI49556.2020.9140970.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">EXPLORA\u00c7\u00c3O DO SISTEMA ADS-B: AN\u00c1LISE DO IMPACTO NO PROCESSO DECIS\u00d3RIO DE CONTROLADORES DE TR\u00c1FEGO A\u00c9REO POR MEIO DO M\u00c9TODO GRSO<\/a><\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-86c61b6 e-flex e-con-boxed e-con\" data-id=\"86c61b6\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-ca1f7c5 e-con-full e-flex e-con\" data-id=\"ca1f7c5\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2c5060c elementor-widget elementor-widget-heading\" data-id=\"2c5060c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Renato Luiz Alves Tavares<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a928369 elementor-widget elementor-widget-heading\" data-id=\"a928369\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): William Ferreira Giozza<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fba498f elementor-widget elementor-widget-spacer\" data-id=\"fba498f\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a18f87e elementor-widget elementor-widget-text-editor\" data-id=\"a18f87e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.035<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a id=\"wp-block-file--media-8e643103-5798-4a09-8481-88c8332d09c7\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/03\/Dissertacao_Renato_PPEE_UnB_final_publi.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">AVALIA\u00c7\u00c3O DA EFETIVIDADE DE SISTEMAS DE SEGURAN\u00c7A DE INSTALA\u00c7\u00d5ES NUCLEARES EM CEN\u00c1RIOS DE ATAQUES CIBERN\u00c9TICOS E F\u00cdSICOS<\/a><\/p><div class=\"wp-block-column\"><p><strong>Linha de pesquisa: LP2: Seguran\u00e7a e intelig\u00eancia cibern\u00e9tica<\/strong><\/p><p><strong>Data da defesa:<\/strong> 09\/02\/2023<\/p><p><strong>Publica\u00e7\u00e3o: <\/strong><a id=\"wp-block-file--media-60cd8adf-c82d-48b3-8345-a2189bc1dc72\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/03\/Effectiveness_evaluation_of_a_nuclear_facility_security_system_under_a_cyber_physical_attack_scenario__2_.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">EFFECTIVENESS EVALUATION OF A NUCLEAR FACILITY SECURITY SYSTEM UNDER A CYBER-PHYSICAL ATTACK SCENARIO<\/a><\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-699d432 e-flex e-con-boxed e-con\" data-id=\"699d432\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-e7e96e6 e-con-full e-flex e-con\" data-id=\"e7e96e6\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c9ee5c8 elementor-widget elementor-widget-heading\" data-id=\"c9ee5c8\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): \n\n\nLucas Coelho Almeida<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4e5a58c elementor-widget elementor-widget-heading\" data-id=\"4e5a58c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): \nF\u00e1bio L\u00facio Lopes de Mendon\u00e7a\n<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e437e6c elementor-widget elementor-widget-spacer\" data-id=\"e437e6c\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-65f6499 elementor-widget elementor-widget-text-editor\" data-id=\"65f6499\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.034<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a id=\"wp-block-file--media-0a05b2a1-378e-4fdb-ba37-4249273f6a09\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/PROPOSTA-DE-UM-MOTOR.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">PROPOSTA DE UM MOTOR DE BUSCA METASEM\u00c2NTICA COMO FERRAMENTA DE INVESTIGA\u00c7\u00c3O DE DADOS OBTIDOS ATRAV\u00c9S DA INTERNET<\/a><\/p><div class=\"wp-block-column\"><p><strong>Linha de pesquisa:<\/strong> LP4: Ci\u00eancia e engenharia de dados, e concep\u00e7\u00e3o e desenvolvimento de materiais estrat\u00e9gicos e cr\u00edticos para seguran\u00e7a cibern\u00e9tica<\/p><p><strong>Data da defesa:<\/strong> 16\/12\/2022<\/p><p><strong>Publica\u00e7\u00f5es:<\/strong><\/p><div class=\"wp-block-column\"><div class=\"wp-block-file\"><a id=\"wp-block-file--media-4716f837-d7cf-4fae-9c3a-e9ded70de0ce\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/META-SEMANTIC.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">META-SEMANTIC SEARCH ENGINE METHOD PROPOSITION FOR TRANSPARENT DECISION AUDITING<\/a><\/div><div class=\"wp-block-file\"><a id=\"wp-block-file--media-cd53b3ee-b5cc-436f-825d-27caf7f4d342\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/DESIGN-AND-IMPLEMANTATION.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">DESIGN AND IMPLEMENTATION OF A COLLABORATIVE PLATFORM MODEL FOR EPIDEMIC AND COLLECTIVE HEALTH SERVICES<\/a><\/div><div class=\"wp-block-file\"><a id=\"wp-block-file--media-528dbc0d-905d-499d-8aaa-cb1d388df6a7\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/PROJETO-E-IMPLEMENTACAO.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">PROJETO E IMPLEMENTA\u00c7\u00c3O DE UM SISTEMA DE VISUALIZA\u00c7\u00c3O DE DADOS DE EPIDEMIAS OBTIDOS COLABORATIVAMENTE<\/a><\/div><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-02cc3f7 e-flex e-con-boxed e-con\" data-id=\"02cc3f7\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-cf0ca36 e-con-full e-flex e-con\" data-id=\"cf0ca36\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-af74f6c elementor-widget elementor-widget-heading\" data-id=\"af74f6c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): \n\nFrancisco Luziaro de Sousa<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-151b00e elementor-widget elementor-widget-heading\" data-id=\"151b00e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): \nRafael Rabelo Nunes\n<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5fc4d38 elementor-widget elementor-widget-spacer\" data-id=\"5fc4d38\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5695574 elementor-widget elementor-widget-text-editor\" data-id=\"5695574\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.033<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a id=\"wp-block-file--media-60bf25fb-5292-4337-b73a-c45a6bf5c373\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/TRANSFORMACAO-DIGITAL.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">TRANSFORMA\u00c7\u00c3O DIGITAL NO CONTEXTO DA INTELIG\u00caNCIA DE ESTADO: AN\u00c1LISE E MITIGA\u00c7\u00c3O DAS VULNERABILIDADES DO DOCUMENTO DIGITAL<\/a><\/p><div class=\"wp-block-column\"><p><strong>Linha de pesquisa:<\/strong> LP3: Aspectos humanos, organizacionais, legais e regulat\u00f3rios em Seguran\u00e7a Cibern\u00e9tica<\/p><p><strong>Data da defesa<\/strong>: 09\/12\/2022<\/p><p><strong>Publica\u00e7\u00e3o:\u00a0<\/strong><a id=\"wp-block-file--media-725b87c4-f93d-49be-bcbf-e30daaa4e916\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/ELEMENTOS-CHAVE.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">ELEMENTOS-CHAVE DA TRANSFORMA\u00c7\u00c3O DIGITAL QUE INFLUENCIAM NA CURADORIA DIGITAL: UMA REVIS\u00c3O SISTEM\u00c1TICA DE LITERATURA SOB O M\u00c9TODO TEMAC<\/a><\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fd2fb58 e-flex e-con-boxed e-con\" data-id=\"fd2fb58\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-49f648c e-con-full e-flex e-con\" data-id=\"49f648c\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ce7cecf elementor-widget elementor-widget-heading\" data-id=\"ce7cecf\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): \nJeferson Nascimento Aquilar Pey\n<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ecabf2d elementor-widget elementor-widget-heading\" data-id=\"ecabf2d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Georges Daniel Amvame Nze\n\n<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a857331 elementor-widget elementor-widget-spacer\" data-id=\"a857331\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e198094 elementor-widget elementor-widget-text-editor\" data-id=\"e198094\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.032<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a id=\"wp-block-file--media-46b2e240-026f-420e-9690-a71eedbf23dd\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/ESTUDO-SOBRE-EMPREGO.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">ESTUDO SOBRE EMPREGO DE DRONES EM OPERA\u00c7\u00d5ES DE INTELIG\u00caNCIA DE SEGURAN\u00c7A P\u00daBLICA<\/a><\/p><div class=\"wp-block-column\"><p><strong>Linha de pesquisa:<\/strong> LP1: Seguran\u00e7a de Infraestrutura, de Plataformas, de Software e de Sistemas<\/p><p><strong>Data da defesa<\/strong>: 15\/12\/2022<\/p><p><strong>Publica\u00e7\u00e3o:\u00a0<\/strong><a id=\"wp-block-file--media-5f6813d0-9766-4ba8-b6fe-a1a3b99c37d9\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/Analysis_of_jamming-ANALISE-DE-ATAQUES.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">AN\u00c1LISE DE ATAQUES CIBERN\u00c9TICOS DE JAMMING E SPOOFING EM DRONES<\/a><\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-325d70e e-flex e-con-boxed e-con\" data-id=\"325d70e\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-a478ca8 e-con-full e-flex e-con\" data-id=\"a478ca8\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-13fdcd0 elementor-widget elementor-widget-heading\" data-id=\"13fdcd0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): \nS\u00e1vio Levy Rocha\n<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-643b5fa elementor-widget elementor-widget-heading\" data-id=\"643b5fa\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Georges Daniel Amvame Nze\n\n<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-288868b elementor-widget elementor-widget-spacer\" data-id=\"288868b\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2cc10cc elementor-widget elementor-widget-text-editor\" data-id=\"2cc10cc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.031<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2024\/11\/PROPOSTA-DE-UM-FRAMEWORK-PARA-DETECCAO-DE-INTRUSAO-EM-CLUSTERS-DE-ORQUESTRACAO-DE-CONTEINERES-UTILIZANDO-MACHINE-LEARNING-PARA-IDENTIFICACAO-DE-ANOMALIAS-EM-SYSTEM-CALLS.pdf\">PROPOSTA DE UM FRAMEWORK PARA DETEC\u00c7\u00c3O DE INTRUS\u00c3O EM CLUSTERS DE ORQUESTRA\u00c7\u00c3O DE CONT\u00caINERES UTILIZANDO MACHINE LEARNING PARA IDENTIFICA\u00c7\u00c3O DE ANOMALIAS EM SYSTEM CALLS<\/a><\/p><div class=\"wp-block-column\"><p><strong>Linha de pesquisa<\/strong>: LP1: Seguran\u00e7a de Infraestrutura, de Plataformas, de Software e de Sistemas<\/p><p><strong>Data da defesa<\/strong>: 15\/12\/2022<\/p><p><strong>Publica\u00e7\u00f5es:<\/strong><\/p><div class=\"wp-block-column\"><a id=\"wp-block-file--media-a354cc4e-75ac-486e-91ad-3bf318816446\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/deteccao-de-intrusao.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">DETEC\u00c7\u00c3O DE INTRUS\u00c3O EM CLUSTERS DE ORQUESTRA\u00c7\u00c3O DE CONT\u00caINERES<\/a><\/div><div>\u00a0<\/div><div><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/09\/04-applsci-13-09301.pdf\">DCIDS\u2014Distributed Container IDS<\/a><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-59c24a8 e-flex e-con-boxed e-con\" data-id=\"59c24a8\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-449d405 e-con-full e-flex e-con\" data-id=\"449d405\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e446e5f elementor-widget elementor-widget-heading\" data-id=\"e446e5f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): \nThiago Melo Stuckert Do Amaral\n\n<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8fe1c85 elementor-widget elementor-widget-heading\" data-id=\"8fe1c85\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Jo\u00e3o Jos\u00e9 Costa Gondim<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-594c6a6 elementor-widget elementor-widget-spacer\" data-id=\"594c6a6\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6769556 elementor-widget elementor-widget-text-editor\" data-id=\"6769556\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.030<\/p><p><strong>Disserta\u00e7\u00e3o:<\/strong> <a id=\"wp-block-file--media-39e4bfe3-48f7-42bc-a60d-5228d355c146\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/proposta-de-integracao.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">PROPOSTA DE INTEGRA\u00c7\u00c3O DE CONTROLES DE SEGURAN\u00c7A BASEADOS NOS PRINC\u00cdPIOS ZERO TRUST EM UMA CYBER SUPPLY CHAIN<\/a><\/p><div class=\"wp-block-column\"><p><strong>Linha de pesquisa:<\/strong> LP2: Seguran\u00e7a e intelig\u00eancia cibern\u00e9tica<\/p><p><strong>Data da defesa<\/strong>: 20\/12\/2022<\/p><p><strong>Publica\u00e7\u00e3o: <\/strong><a id=\"wp-block-file--media-70ed2a73-4aa5-409c-bef8-d7b009b59d4a\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/Integrating_Zero_Trust_in_the_cyber_supply_chain_security.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">INTEGRATING ZERO TRUST IN THE CYBER SUPPLY CHAIN SECURITY<\/a><\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-054ac55 e-flex e-con-boxed e-con\" data-id=\"054ac55\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-a055984 e-con-full e-flex e-con\" data-id=\"a055984\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-60d5178 elementor-widget elementor-widget-heading\" data-id=\"60d5178\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Jo\u00e3o Alberto Pincovscy\n\n<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-02b4c98 elementor-widget elementor-widget-heading\" data-id=\"02b4c98\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Jo\u00e3o Jos\u00e9 Costa Gondim<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-87db47c elementor-widget elementor-widget-spacer\" data-id=\"87db47c\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c6e09c8 elementor-widget elementor-widget-text-editor\" data-id=\"c6e09c8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.029<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a id=\"wp-block-file--media-4dd5858f-10c3-494b-855d-60e994eaee2d\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/METODOLOGIA-PARA-INTELIGENCIA.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">METODOLOGIA PARA INTELIG\u00caNCIA DE AMEA\u00c7AS CIBERN\u00c9TICAS COM INTEGRA\u00c7\u00c3O DE SENSORES<\/a><\/p><div class=\"wp-block-column\"><p><strong>Linha de pesquisa<\/strong>: LP2: Seguran\u00e7a e intelig\u00eancia cibern\u00e9tica<\/p><p><strong>Data da defesa<\/strong>: 19\/12\/2022<\/p><p><strong>Publica\u00e7\u00f5es:<\/strong><\/p><div class=\"wp-block-column\"><p><a id=\"wp-block-file--media-39fc433f-ec61-401e-83ce-935c748d22af\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/ARTIGO-METODOLOGIA-PARA-INTELIGENCIA-DE-AMEACAS.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">METODOLOGIA PARA INTELIG\u00caNCIA DE AMEA\u00c7AS CIBERN\u00c9TICAS COM INTEGRA\u00c7\u00c3O DE SENSORES<\/a><\/p><p><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=pt-BR&amp;user=zDMtVHwAAAAJ&amp;citation_for_view=zDMtVHwAAAAJ:2osOgNQ5qMEC\">Methodology for Cyber Threat Intelligence with Sensor Integration<\/a><\/p><p><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=pt-BR&amp;user=zDMtVHwAAAAJ&amp;citation_for_view=zDMtVHwAAAAJ:d1gkVwhDpl0C\">Mitiga\u00e7\u00e3o dos Riscos \u00e0 Privacidade atrav\u00e9s da Anonimiza\u00e7\u00e3o de Dados<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-563e32f e-flex e-con-boxed e-con\" data-id=\"563e32f\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-c3d6040 e-con-full e-flex e-con\" data-id=\"c3d6040\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-12e7090 elementor-widget elementor-widget-heading\" data-id=\"12e7090\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Roberto Tanabe\n\n<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-da84ee1 elementor-widget elementor-widget-heading\" data-id=\"da84ee1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Robson de Oliveira Albuquerque<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-382327e elementor-widget elementor-widget-spacer\" data-id=\"382327e\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-350999a elementor-widget elementor-widget-text-editor\" data-id=\"350999a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.028<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a id=\"wp-block-file--media-d6113ddd-983d-4e26-9cc0-a6601f726b84\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/PROPOSTA-DE-UM-METODO-PARA-INTELIGENCIA-DE.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">PROPOSTA DE UM M\u00c9TODO PARA INTELIG\u00caNCIA DE FONTES ABERTAS; VALORES E PRINC\u00cdPIOS PARA UMA ATIVIDADE \u00c9TICA PROFISSIONAL<\/a><\/p><div class=\"wp-block-column\"><p><strong>Linha de pesquisa:<\/strong> LP4: Ci\u00eancia e engenharia de dados, e concep\u00e7\u00e3o e desenvolvimento de materiais estrat\u00e9gicos e cr\u00edticos para seguran\u00e7a cibern\u00e9tica<\/p><p><strong>Data da defesa:<\/strong> 14\/12\/2022<\/p><p><strong>Publica\u00e7\u00e3o: <\/strong><a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-031-30592-4_4\" data-type=\"URL\" data-id=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-031-30592-4_4\">OSINT METHODS IN THE INTELLIGNCE CYCLE<\/a><\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-999d9db e-flex e-con-boxed e-con\" data-id=\"999d9db\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-bc93e98 e-con-full e-flex e-con\" data-id=\"bc93e98\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8cd4272 elementor-widget elementor-widget-heading\" data-id=\"8cd4272\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): \nLorena de Souza Bezerra Borges\n\n\n\n<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dc5fba4 elementor-widget elementor-widget-heading\" data-id=\"dc5fba4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Rafael Tim\u00f3teo de Sousa J\u00fanior<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7f40fe5 elementor-widget elementor-widget-spacer\" data-id=\"7f40fe5\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-27ce890 elementor-widget elementor-widget-text-editor\" data-id=\"27ce890\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.027<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a id=\"wp-block-file--media-bf922677-a0b4-4287-a2cb-b2d3fd0cd01b\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/SOLUCAO-PARA-DETECCAO.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">SOLU\u00c7\u00c3O PARA DETEC\u00c7\u00c3O DE TUNELAMENTO DNS EM AMBIENTE DE NUVEM COMPUTACIONAL<\/a><\/p><div class=\"wp-block-column\"><p><strong>Linha de pesquisa:<\/strong> LP1: Seguran\u00e7a de Infraestrutura, de Plataformas, de Software e de Sistemas<\/p><p><strong>Data da defesa<\/strong>: 13\/12\/2022<\/p><p><strong>Publica\u00e7\u00f5es:<\/strong><\/p><div class=\"wp-block-column\"><div class=\"wp-block-file\"><a id=\"wp-block-file--media-070c5c3a-2f80-4675-b1ba-d8f4055a3b47\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/IDENTIFICACAO-DE-TUNEIS.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">IDENTIFICA\u00c7\u00c3O DE T\u00daNEIS DNS EM NUVEM COMPUTACIONAL USANDO DETEC\u00c7\u00c3O DE ANOMALIAS<\/a><\/div><div class=\"wp-block-file\"><a id=\"wp-block-file--media-eabe0157-59ee-4bc0-b5ed-7fc7dd41291c\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/A_security_model_for_DNS_tunnel_detection_on_cloud_platform.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">A SECURITY MODEL FOR DNS TUNNEL DETECTION ON CLOUD PLATFORM<\/a><\/div><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fd3fc64 e-flex e-con-boxed e-con\" data-id=\"fd3fc64\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5257c58 e-con-full e-flex e-con\" data-id=\"5257c58\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-137e757 elementor-widget elementor-widget-heading\" data-id=\"137e757\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): \nBruno Carneiro da Rocha\n\n\n\n<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-193c6eb elementor-widget elementor-widget-heading\" data-id=\"193c6eb\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Georges Daniel Amvame Nze<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9aac772 elementor-widget elementor-widget-spacer\" data-id=\"9aac772\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-acaa9e5 elementor-widget elementor-widget-text-editor\" data-id=\"acaa9e5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.026<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a id=\"wp-block-file--media-4c8a8729-86ef-4de8-83cf-3a16cee7a3ff\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/PREVENINDO-AMEACAS.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">PREVENINDO AMEA\u00c7AS PERSISTENTES AVAN\u00c7ADAS EM REDES CORPORATIVAS UTILIZANDO UM MODELO DE SEGURAN\u00c7A BASEADO EM ZERO TRUST E UEBA<\/a><\/p><div class=\"wp-block-column\"><p><strong>Linha de pesquisa<\/strong>: LP1: Seguran\u00e7a de Infraestrutura, de Plataformas, de Software e de Sistemas<\/p><p><strong>Data da defesa<\/strong>: 13\/12\/2022<\/p><p><strong>Publica\u00e7\u00f5es:<\/strong><\/p><div class=\"wp-block-column\"><div class=\"wp-block-file\"><a id=\"wp-block-file--media-400794b8-692e-41fd-be54-61f98199fb10\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/A-STUDY.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">A STUDY ON APT IN IOT NETWORKS<\/a><\/div><div class=\"wp-block-file\"><a id=\"wp-block-file--media-a0a2cf97-bf12-46bd-abf0-49d082402f48\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/Preventing_APT_attack.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">PREVENTING APT ATTACKS ON LAN NETWORKS WITH CONNECTED IOT DEVICES USING A ZERO TRUST BASED SECURITY MODEL<\/a><\/div><div class=\"wp-block-file\"><a id=\"wp-block-file--media-edcbfccc-ed98-4831-b52f-2ac015c8e537\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/UTILIZACAO-DE-ARVORES-DE-DECISAO.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">UTILIZA\u00c7\u00c3O DE \u00c1RVORES DE DECIS\u00c3O NO PROCESSO DE DETERMINA\u00c7\u00c3O DAS MELHORES HEUR\u00cdSTICAS DE USABILIDADE PARA ACELERAR O PROCESSO DE INCLUS\u00c3O DIGITAL<\/a><\/div><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7d1fb5b e-flex e-con-boxed e-con\" data-id=\"7d1fb5b\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-a4834da e-con-full e-flex e-con\" data-id=\"a4834da\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a9838ae elementor-widget elementor-widget-heading\" data-id=\"a9838ae\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Eduardo de Oliveira Lima\n\n\n\n<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4e96728 elementor-widget elementor-widget-heading\" data-id=\"4e96728\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Rafael Rabelo Nunes<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-41bb574 elementor-widget elementor-widget-spacer\" data-id=\"41bb574\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-21a3745 elementor-widget elementor-widget-text-editor\" data-id=\"21a3745\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.025<\/p><p><strong>Dsserta\u00e7\u00e3o: <\/strong><a id=\"wp-block-file--media-32bb8f0b-b33b-4848-b810-891b81773b66\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/uma-avaliacao.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">UMA AVALIA\u00c7\u00c3O DO CEN\u00c1RIO DA GEST\u00c3O DE RISCOS CIBERN\u00c9TICOS NO SETOR EL\u00c9TRICO BRASILEIRO SOB A \u00d3TICA DA ROTINA OPERACIONAL DO ONS RO CB.BR.01<\/a><\/p><div class=\"wp-block-column\"><p><strong>Linha de pesquisa:<\/strong> LP3: Aspectos humanos, organizacionais, legais e regulat\u00f3rios em Seguran\u00e7a Cibern\u00e9tica<\/p><p><strong>Data da defesa:<\/strong> 25\/11\/2022<\/p><p><strong>Publica\u00e7\u00f5es:<\/strong><\/p><div class=\"wp-block-column\"><div class=\"wp-block-file\"><a id=\"wp-block-file--media-b7ed46b1-32b7-4e39-a8f7-cbeff877e1be\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/avaliacao-da-rotina.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">AVALIA\u00c7\u00c3O DA ROTINA OPERACIONAL DO OPERADOR NACIONAL DO SISTEMA EL\u00c9TRICO BRASILEIRO (ONS) EM RELA\u00c7\u00c3O \u00c0S A\u00c7\u00d5ES DE GERENCIAMENTO DE RISCOS ASSOCIADOS \u00c0 SEGURAN\u00c7A CIBERN\u00c9TICA<\/a><\/div><div class=\"wp-block-file\"><a id=\"wp-block-file--media-774b0c72-0821-41b8-a9b1-b0bdf21ea657\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/A-UTILIZACAO-DOS-FRAMEWORKS-5-1.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">A UTILIZA\u00c7\u00c3O DOS FRAMEWORKS NIST CSF E DA S\u00c9RIE NBR ABNT ISO 27.000 NO CONTEXTO DA GEST\u00c3O DA SEGURAN\u00c7A DA INFORMA\u00c7\u00c3O<\/a><\/div><div class=\"wp-block-file\"><a id=\"wp-block-file--media-19a7ae7b-15c6-49ca-8fd1-34c7f588dd9f\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/03\/artigo-76efb4390f2fda13441c6124ad7c1ce05836501f-arquivo-1.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">UMA AN\u00c1LISE DAS APLICABILIDADES DE M\u00c9TODOS MULTICRIT\u00c9RIOS NO CONTEXTO DA SEGURAN\u00c7A DA INFORMA\u00c7\u00c3O<\/a><\/div><div class=\"wp-block-file\"><a id=\"wp-block-file--media-7d0a9b21-3f46-4f7b-9738-48172f69942e\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/03\/351-CIS_CSC_MacroControl_11_x_SCADA_Data_Recovery.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">GEST\u00c3O DE RISCOS CIBERN\u00c9TICOS NO AMBIENTE OPERACIONAL DO SISTEMA EL\u00c9TRICO BRASILEIRO (ARCIBER ONS): UMA AVALIA\u00c7\u00c3O DO PROCESSO DE RECUPERA\u00c7\u00c3O DE DADOS PELO SISTEMA SCADA<\/a><\/div><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5de8646 e-flex e-con-boxed e-con\" data-id=\"5de8646\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6773093 e-con-full e-flex e-con\" data-id=\"6773093\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c7005ff elementor-widget elementor-widget-heading\" data-id=\"c7005ff\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): \n\nIgor Forain de S\u00e1 Freire\n\n\n\n<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7c1c47b elementor-widget elementor-widget-heading\" data-id=\"7c1c47b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Rafael Tim\u00f3teo de Sousa J\u00fanior<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3416971 elementor-widget elementor-widget-spacer\" data-id=\"3416971\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-62f45e5 elementor-widget elementor-widget-text-editor\" data-id=\"62f45e5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.024<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a id=\"wp-block-file--media-81005d4f-6c71-4b30-a1fc-0e64feafe8e5\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/DATA-COLLECTION.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">DATA COLLECTION AND PROCESSING PIPELINE FOR CYBER VULNERABILITY INTELLIGENCE<\/a><\/p><div class=\"wp-block-column\"><p><strong>Linha de pesquisa<\/strong>: LP1: Seguran\u00e7a de Infraestrutura, de Plataformas, de Software e de Sistemas<\/p><p><strong>Data da defesa:<\/strong> 18\/11\/2022<\/p><p><strong>Publica\u00e7\u00f5es:<\/strong><\/p><div class=\"wp-block-column\"><div class=\"wp-block-file\"><a id=\"wp-block-file--media-65c608e9-bd8a-40bb-aa3e-7956d45a7c19\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/REVS-A-VULNERABILITY.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">REVS: A VULNERABILITY RANKING TOOL FOR ENTERPRISE SECURITY<\/a><\/div><div class=\"wp-block-file\"><a id=\"wp-block-file--media-551330b8-fcf7-4055-8fe7-840ba0b8acad\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/Towards_System.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">TOWARDS SYSTEM SECURITY: WHAT A COMPARISON OF NATIONAL VULNERABILITY DATABASES REVEALS<\/a><\/div><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3e844db e-flex e-con-boxed e-con\" data-id=\"3e844db\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3a3c38a e-con-full e-flex e-con\" data-id=\"3a3c38a\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-de59b7b elementor-widget elementor-widget-heading\" data-id=\"de59b7b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): \nIsrael Barbosa de Brito\n\n\n\n\n<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7ecbef3 elementor-widget elementor-widget-heading\" data-id=\"7ecbef3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Rafael Tim\u00f3teo de Sousa J\u00fanior<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-951d926 elementor-widget elementor-widget-spacer\" data-id=\"951d926\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cd9a964 elementor-widget elementor-widget-text-editor\" data-id=\"cd9a964\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.023<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a id=\"wp-block-file--media-282c8a55-3096-4ad9-96ea-2d211d7e4c99\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/AN-OPEN-SOURS.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">AN OPEN-SOURCE TESTBED BASED ON THE MODBUS PROTOCOL FOR CYBERSECURITY ANALYSIS OF NUCLEAR POWER PLANTS<\/a><\/p><div class=\"wp-block-column\"><p><strong>Linha de pesquisa<\/strong>: LP1: Seguran\u00e7a de Infraestrutura, de Plataformas, de Software e de Sistemas<\/p><p><strong>Data da defesa<\/strong>: 07\/11\/2022<\/p><p><strong>Publica\u00e7\u00e3o: <\/strong><a id=\"wp-block-file--media-d9dddc71-8298-456f-bd4f-6e10c29bf656\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/DEVELOPMENT.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">DEVELOPMENT OF AN OPEN-SOURCE TESTBED BASED ON THE MODBUS PROTOCOL FOR CYBERSECURITY ANALYSIS OF NUCLEAR POWER PLANTS<\/a><\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-93f3015 e-flex e-con-boxed e-con\" data-id=\"93f3015\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7a87c40 e-con-full e-flex e-con\" data-id=\"7a87c40\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-226d0d9 elementor-widget elementor-widget-heading\" data-id=\"226d0d9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Lucas Jos\u00e9 Borges Amaro\n\n\n\n\n<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-460aa83 elementor-widget elementor-widget-heading\" data-id=\"460aa83\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Robson de Oliveira Albuquerque<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cd4c915 elementor-widget elementor-widget-spacer\" data-id=\"cd4c915\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-99139a2 elementor-widget elementor-widget-text-editor\" data-id=\"99139a2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.022<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a id=\"wp-block-file--media-6baa385f-fa4b-4f4a-9c7a-d8c9abf6f669\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/Lucas_Amaro___METHODOLOGICAL_FRAMEWORK_.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">METHODOLOGICAL FRAMEWORK TO COLLECT, PROCESS, ANALYZE AND VISUALIZE CYBER THREAT INTELLIGENCE DATA<\/a><\/p><div class=\"wp-block-column\"><p><strong>Linha de pesquisa:<\/strong> LP2: Seguran\u00e7a e intelig\u00eancia cibern\u00e9tica<\/p><p><strong>Data da defesa<\/strong>: 05\/10\/2022<\/p><p><strong>Publica\u00e7\u00e3o: <\/strong><a id=\"wp-block-file--media-2a5db04d-6c31-4db9-914e-7f4f0bf53cc8\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/METHODOLOGICAL-FRAMEWORK-ARTIGO.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">METHODOLOGICAL FRAMEWORK TO COLLECT, PROCESS, ANALYZE AND VISUALIZE CYBER THREAT INTELLIGENCE DATA<\/a><\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-32c5e51 e-flex e-con-boxed e-con\" data-id=\"32c5e51\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-d850e7f e-con-full e-flex e-con\" data-id=\"d850e7f\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f568503 elementor-widget elementor-widget-heading\" data-id=\"f568503\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): F\u00e1bio Galv\u00e3o Ferreira Tabosa\n\n\n\n\n<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8684c55 elementor-widget elementor-widget-heading\" data-id=\"8684c55\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Rafael Rabelo Nunes<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5a58585 elementor-widget elementor-widget-spacer\" data-id=\"5a58585\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1500379 elementor-widget elementor-widget-text-editor\" data-id=\"1500379\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.021<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a id=\"wp-block-file--media-04f17d9f-f274-4bad-a0ed-8c71a333e649\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/AVALIACAO-DA-EVOLUCAO.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">AVALIA\u00c7\u00c3O DA EVOLU\u00c7\u00c3O P\u00d3S-PANDEMIA DA PROPENS\u00c3O AO ENFRENTAMENTO DE RISCOS DE COMPUTA\u00c7\u00c3O EM NUVEM POR GESTORES DA ADMINISTRA\u00c7\u00c3O P\u00daBLICA FEDERAL<\/a><\/p><div class=\"wp-block-column\"><p><strong>Linha de pesquisa: <\/strong>LP3: Aspectos humanos, organizacionais, legais e regulat\u00f3rios em Seguran\u00e7a Cibern\u00e9tica<\/p><p><strong>Data da defesa<\/strong>: 22\/09\/2022<\/p><p><strong>Publica\u00e7\u00f5es:<\/strong><\/p><div class=\"wp-block-column\"><div class=\"wp-block-file\"><div class=\"wp-block-file\"><a id=\"wp-block-file--media-2c6c235c-5c2c-427f-ae11-5d917996753c\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/RISCO-DA-COMPUTACAO-EM-NUVEM.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">RISCOS DA COMPUTA\u00c7\u00c3O EM NUVEM: ESTUDO NA \u00d3TICA DOS GESTORES DE \u00d3RG\u00c3OS P\u00daBLICOS FEDERAIS NO BRASIL<\/a><\/div><div class=\"wp-block-file\"><a id=\"wp-block-file--media-6e4c7716-9e83-4009-b096-87817b2756ee\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/FATORES-DE-RISCO-QUE-INFLUENCIAM.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">FATORES DE RISCOS QUE INFLUENCIAM EM UMA INFRAESTRUTURA DE DATA CENTER UTILIZANDO O M\u00c9TODO TEMAC<\/a><\/div><\/div><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b837b7b e-flex e-con-boxed e-con\" data-id=\"b837b7b\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-8074444 e-con-full e-flex e-con\" data-id=\"8074444\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ea7fdda elementor-widget elementor-widget-heading\" data-id=\"ea7fdda\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Andr\u00e9 Luiz Bandeira Molina\n\n\n\n\n<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c33c2f5 elementor-widget elementor-widget-heading\" data-id=\"c33c2f5\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Geraldo Pereira Rocha Filho<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e7220b9 elementor-widget elementor-widget-spacer\" data-id=\"e7220b9\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d57b27e elementor-widget elementor-widget-text-editor\" data-id=\"d57b27e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.020<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2024\/11\/WEAPON-UMA-ARQUITETURA-DE-APRENDIZADO-NAO-SUPERVISIONADO-PARA-DETECCAO-DE-ANOMALIAS-DE-COMPORTAMENTO-DE-USUARIOS.pdf\">WEAPON: UMA ARQUITETURA DE APRENDIZADO N\u00c3O SUPERVISIONADO PARA DETEC\u00c7\u00c3O DE ANOMALIAS DE COMPORTAMENTO DE USU\u00c1RIOS<\/a><\/p><div class=\"wp-block-column\"><p><strong>Linha de pesquisa<\/strong>: LP4: Ci\u00eancia e engenharia de dados, e concep\u00e7\u00e3o e desenvolvimento de materiais estrat\u00e9gicos e cr\u00edticos para seguran\u00e7a cibern\u00e9tica<\/p><p><strong>Data da defesa:<\/strong> 15\/09\/2022<\/p><p><strong>Publica\u00e7\u00e3o: <\/strong><a id=\"wp-block-file--media-4e0bc1d1-fa1a-471e-91a1-e1c76a4fc757\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/ARTIGO-WEAPON_-Uma-Arquitetura-para-Deteccao-de-Anomalias-de-Comportamento-do-Usuario.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">WEAPON: UMA ARQUITETURA PAR DETEC\u00c7\u00c3O DE ANOMALIAS DE COMPORTAMENTO DO USU\u00c1RIO<\/a><\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f8bd1da e-flex e-con-boxed e-con\" data-id=\"f8bd1da\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-c525dbb e-con-full e-flex e-con\" data-id=\"c525dbb\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-230a2e3 elementor-widget elementor-widget-heading\" data-id=\"230a2e3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): \nM\u00e1rcio Aur\u00e9lio de Souza Fernandes\n\n\n<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f704f82 elementor-widget elementor-widget-heading\" data-id=\"f704f82\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Edna Dias Canedo<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ccf3e23 elementor-widget elementor-widget-spacer\" data-id=\"ccf3e23\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c1c82df elementor-widget elementor-widget-text-editor\" data-id=\"c1c82df\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.019<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a id=\"wp-block-file--media-2b4fd5e9-ad15-424c-902d-00d6aaf23250\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/02\/Dissertacao__o_RDC_Arq__x_LGPD.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">REPOSIT\u00d3RIO SEGURO E O IMPACTO GERADO PELA LEI GERAL DE PROTE\u00c7\u00c3O DE DADOS PESSOAIS (LGPD)<\/a><\/p><div class=\"wp-block-column\"><p><strong>Linha de pesquisa<\/strong>: LP3: Aspectos humanos, organizacionais, legais e regulat\u00f3rios em Seguran\u00e7a Cibern\u00e9tica<\/p><p><strong>Data da defesa:<\/strong> 19\/09\/2022<\/p><p><strong>Publica\u00e7\u00e3o: <\/strong><a id=\"wp-block-file--media-aef2246d-529c-4c92-86e2-edc03d2688cb\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/RISTI-impactosdaleideprotecaodedadosLGPDbrasileiranousodacomputacaoemnuvem.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">IMPACTOS DA LEI DE PROTE\u00c7\u00c3O DE DADOS (LGPD) BRASILEIRA NO USO DA COMPUTA\u00c7\u00c3O EM NUVEM<\/a><\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5f1a823 e-flex e-con-boxed e-con\" data-id=\"5f1a823\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-64a9d4d e-con-full e-flex e-con\" data-id=\"64a9d4d\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cea145e elementor-widget elementor-widget-heading\" data-id=\"cea145e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): S\u00e2mmara \u00c9llen Renner Ferr\u00e3o\n\n\n<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7a4885a elementor-widget elementor-widget-heading\" data-id=\"7a4885a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Edna Dias Canedo<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-500b8dc elementor-widget elementor-widget-spacer\" data-id=\"500b8dc\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e3326d9 elementor-widget elementor-widget-text-editor\" data-id=\"e3326d9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.018<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2024\/11\/Dissertac_amp__807_a_amp__771_o_Versa_amp__771_oFinal.pdf\">PROPOSTA DE UMA TAXONOMIA DE REQUISITOS DE PRIVACIDADE BASEADA NA LGPD E ISO\/IEC 29100 : APLICA\u00c7\u00c3O PR\u00c1TICA NO OPEN BANKING BRASIL<\/a><\/p><div class=\"wp-block-column\"><p><strong>Linha de pesquisa<\/strong>: LP3: Aspectos humanos, organizacionais, legais e regulat\u00f3rios em Seguran\u00e7a Cibern\u00e9tica<\/p><p><strong>Data da defesa<\/strong>: 30\/06\/2022<\/p><p><strong>Publica\u00e7\u00f5es:<\/strong><\/p><div class=\"wp-block-column\"><div class=\"wp-block-file\"><a id=\"wp-block-file--media-cc3eb3a8-330c-46ee-8378-570e353bb34d\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/DIAGNOSTIC-OF-DATA.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">DIAGNOSTIC OF DATA PROCESSING BY BRAZILIAN ORGANIZATIONS \u2013 A LOW COMPLIANCE ISSUE<\/a><\/div><div class=\"wp-block-file\"><a id=\"wp-block-file--media-8c1c9828-aee2-487e-b153-8780b13abe1c\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/UMA-TAXONOMIA.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">UMA TAXONOMIA PARA REQUISITOS DE PRIVACIDADE E SUA APLICA\u00c7\u00c3O NO OPEN BANKING BRASIL<\/a><\/div><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ef1910c e-flex e-con-boxed e-con\" data-id=\"ef1910c\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7b974e6 e-con-full e-flex e-con\" data-id=\"7b974e6\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6b5a6ff elementor-widget elementor-widget-heading\" data-id=\"6b5a6ff\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Fillipe Barros Rodrigues\n\n\n<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5a35469 elementor-widget elementor-widget-heading\" data-id=\"5a35469\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Robson de Oliveira Albuquerque<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ec45ffb elementor-widget elementor-widget-spacer\" data-id=\"ec45ffb\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-44b837e elementor-widget elementor-widget-text-editor\" data-id=\"44b837e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.017<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a id=\"wp-block-file--media-de39f800-2a83-4d7c-8c85-89e1606f68b0\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/NEURAL-1.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">NEURAL INFORMATION EXTRACTION PIPELINE FOR CYBER FORENSICS WITH PRE-TRAINED LANGUAGE MODELS<\/a><\/p><div class=\"wp-block-column\"><p><strong>Linha de pesquisa:<\/strong> LP4: Ci\u00eancia e engenharia de dados, e concep\u00e7\u00e3o e desenvolvimento de materiais estrat\u00e9gicos e cr\u00edticos para seguran\u00e7a cibern\u00e9tica<\/p><p><strong>Data da defesa:<\/strong> 16\/05\/2022<\/p><p><strong>Publica\u00e7\u00e3o:\u00a0<\/strong><a id=\"wp-block-file--media-5b6de6dc-64dd-4929-9ab4-f263d6dfa673\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/IEE-XPLORE-Natural_Language.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">NATURAL LANGUAGE PROCESSING APPLIED TO FORENSICS INFORMATION EXTRACTION WITH TRANSFORMERS AND GRAPH VISULIZATION<\/a><\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fd886ef e-flex e-con-boxed e-con\" data-id=\"fd886ef\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6e68375 e-con-full e-flex e-con\" data-id=\"6e68375\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f7b592c elementor-widget elementor-widget-heading\" data-id=\"f7b592c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): \n\nJo\u00e3o Paulo Pimentel\n\n\n<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f52998d elementor-widget elementor-widget-heading\" data-id=\"f52998d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Georges Daniel Amvame Nze<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f44413e elementor-widget elementor-widget-spacer\" data-id=\"f44413e\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-99cbcf3 elementor-widget elementor-widget-text-editor\" data-id=\"99cbcf3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de punlica\u00e7\u00e3o: <\/strong>PPEE.MP.016<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a id=\"wp-block-file--media-5400d2f5-7d45-406d-a45d-078a01482e5a\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/PROPOSTA_DE_ARQUITETURA.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">PROPOSTA DE ARQUITETURA DE UM PORTAL SEGURO DE PROVAS ELETR\u00d4NICAS UTILIZANDO SDN COMO SOLU\u00c7\u00c3O DE GERENCIAMENTO DOS USU\u00c1RIOS DA REDE<\/a><\/p><div class=\"wp-block-column\"><p><strong>Linha de pesquisa<\/strong>: LP1: Seguran\u00e7a de Infraestrutura, de Plataformas, de Software e de Sistemas<\/p><p><strong>Data da defesa<\/strong>: 28\/04\/2022<\/p><p><strong>Publica\u00e7\u00e3o:\u00a0<\/strong><a id=\"wp-block-file--media-8fa07ffb-ae7d-4d3c-94e5-7803da031df6\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/02\/ata-das-conf.-2020.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">VULNERABILIDADES DE SISTEMAS CIBER F\u00cdSICOS<\/a><\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7b6a7f0 e-flex e-con-boxed e-con\" data-id=\"7b6a7f0\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-cb9fbf0 e-con-full e-flex e-con\" data-id=\"cb9fbf0\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dbebbad elementor-widget elementor-widget-heading\" data-id=\"dbebbad\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): \nAlexandro de Oliveira Paula\n\n\n<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-835e252 elementor-widget elementor-widget-heading\" data-id=\"835e252\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Geraldo Pereira Rocha Filho<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b14adfd elementor-widget elementor-widget-spacer\" data-id=\"b14adfd\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-07e9886 elementor-widget elementor-widget-text-editor\" data-id=\"07e9886\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.015<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a id=\"wp-block-file--media-02664e0d-c1e5-4631-9c5c-bf38deb1ef32\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/UMA-ARQUITETURA-DE-AUTOMACAO.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">UMA ARQUITETURA DE AUTOMA\u00c7\u00c3O ADAPTADA PARA SMART GRIDS CONTRA ATAQUES CIBERN\u00c9TICOS<\/a><\/p><div class=\"wp-block-column\"><p><strong>Linha de pesquisa<\/strong>: LP4: Ci\u00eancia e engenharia de dados, e concep\u00e7\u00e3o e desenvolvimento de materiais estrat\u00e9gicos e cr\u00edticos para seguran\u00e7a cibern\u00e9tica<\/p><p><strong>Data da defesa:<\/strong> 03\/05\/2022<\/p><p><strong>Publica\u00e7\u00f5es:<\/strong><\/p><div class=\"wp-block-column\"><div class=\"wp-block-file\"><a id=\"wp-block-file--media-da716979-deeb-45b8-8064-cf715a14bbd6\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/PLATAFORMA-INTEGRADA.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">PLATAFORMA INTEGRADA DE AUTOMA\u00c7\u00c3O PARA SIMULA\u00c7\u00c3O COMPLETA DE SUBESTA\u00c7\u00d5ES DIGITAIS COM FOCO EM INTEROPERABILIDADE E SEGURAN\u00c7A CIBERN\u00c9TICA<\/a><\/div><div class=\"wp-block-file\"><a id=\"wp-block-file--media-3899b6be-9886-419d-b21a-0214f79d0c24\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/JISA-STRAYER-A-SMART.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">STRAYER: A SMART GRID ADAPTED AUTOMATION ARCHITECTURE AGAINST CYBERATTACKS<\/a><\/div><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-93474d4 e-flex e-con-boxed e-con\" data-id=\"93474d4\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-76e38f6 e-con-full e-flex e-con\" data-id=\"76e38f6\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a2f07c8 elementor-widget elementor-widget-heading\" data-id=\"a2f07c8\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Matheus Belin\n\n\n<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fb26ee5 elementor-widget elementor-widget-heading\" data-id=\"fb26ee5\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Ricardo Staciarini Puttini<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ebeb996 elementor-widget elementor-widget-spacer\" data-id=\"ebeb996\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8423c52 elementor-widget elementor-widget-text-editor\" data-id=\"8423c52\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.011<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a id=\"wp-block-file--media-519dc22d-9a8d-40bc-b57f-31c2dc925709\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/Dissertacao_Final_Matheus_Belin_Corrigido__Assinado_-1.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">ESTUDO DE CASO DE DESENVOLVIMENTO DE PLATAFORMA DE CLOUD GOVERNAMENTAL PARA TI BIMODAL<\/a><\/p><p><strong>DOI:\u00a0<\/strong><a href=\"http:\/\/dx.doi.org\/10.26512\/2021.05.D.41874\">http:\/\/dx.doi.org\/10.26512\/2021.05.D.41874<\/a><\/p><div class=\"wp-block-column\"><p><strong>Linha de pesquisa<\/strong>: LP1: Seguran\u00e7a de Infraestrutura, de Plataformas, de Software e de Sistemas<\/p><p><strong>Data da defesa<\/strong>: 21\/05\/2021<\/p><p><strong>Publica\u00e7\u00e3o: <\/strong><a href=\"https:\/\/www.nucleodoconhecimento.com.br\/\">Estudo de caso de desenvolvimento de Plataforma Cloud governamental para TI Bimodal<\/a><\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-947ffe9 e-flex e-con-boxed e-con\" data-id=\"947ffe9\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-a20239e e-con-full e-flex e-con\" data-id=\"a20239e\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-86ef936 elementor-widget elementor-widget-heading\" data-id=\"86ef936\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Awatef Ali Yousef Rodrigues\n\n\n<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c19acdc elementor-widget elementor-widget-heading\" data-id=\"c19acdc\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Georges Daniel Amvame Nze<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-22fd56c elementor-widget elementor-widget-spacer\" data-id=\"22fd56c\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-febc703 elementor-widget elementor-widget-text-editor\" data-id=\"febc703\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.010<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a id=\"wp-block-file--media-dc90bc4b-1f38-4616-85a3-b40d73cfcd4c\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/PROPOSTA_DE_INTEGRA__O_DE_UM_SISTEMA_DE_DETEC__O_DE_INTRUS_O__IDS__ENTRE_UMA_REDE_SDN_E_UMA_HONEYNET__V_F__pub_29_05_21__2_.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">PROPOSTA DE INTEGRA\u00c7\u00c3O DE UM SISTEMA DE DETEC\u00c7\u00c3O DE INTRUS\u00c3O (IDS) ENTRE UMA REDE SDN E UMA HONEYNET<\/a><\/p><p><strong>DOI:\u00a0<\/strong><a href=\"http:\/\/dx.doi.org\/10.26512\/2021.05.D.41908\">http:\/\/dx.doi.org\/10.26512\/2021.05.D.41908<\/a><\/p><div class=\"wp-block-column\"><p><strong>Linha de pesquisa: <\/strong>LP1: Seguran\u00e7a de Infraestrutura, de Plataformas, de Software e de Sistemas<\/p><p><strong>Data da defesa<\/strong>: 18\/12\/2020<\/p><p><strong>Publica\u00e7\u00e3o:\u00a0<\/strong><a id=\"wp-block-file--media-546cc087-d0a4-41d0-8033-43764a38a038\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/wcnps.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">DOS ATTACK PREVENTION ON IPS SDN NETWORKS<\/a><\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0c03000 e-flex e-con-boxed e-con\" data-id=\"0c03000\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-bbe6f24 e-con-full e-flex e-con\" data-id=\"bbe6f24\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4fbb2df elementor-widget elementor-widget-heading\" data-id=\"4fbb2df\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Calvin Mariano R\u00eago Crispim\n\n\n<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-46d1c56 elementor-widget elementor-widget-heading\" data-id=\"46d1c56\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Georges Daniel Amvame Nze<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2ebb3c4 elementor-widget elementor-widget-spacer\" data-id=\"2ebb3c4\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e6fe9f1 elementor-widget elementor-widget-text-editor\" data-id=\"e6fe9f1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o: <\/strong>PPEE.MP.009<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a id=\"wp-block-file--media-a3a7478b-4d8c-4ff2-8eea-b46165497117\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/Dissertacao_Mestrado___Calvin_Mariano_Rego_Crispim.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">PROPOSTA DE ARQUITETURA SEGURA DE CENTRAIS DE INC\u00caNDIO EM NUVEM<\/a><\/p><p><strong>DOI:<\/strong> <a href=\"http:\/\/dx.doi.org\/10.26512\/2020.12.D.40580\">http:\/\/dx.doi.org\/10.26512\/2020.12.D.40580<\/a><\/p><div class=\"wp-block-column\"><p><strong>Linha de pesquisa<\/strong>: SEGURAN\u00c7A DOS SISTEMAS DE INFORMA\u00c7\u00c3O E DAS REDES<\/p><p><strong>Data da defesa:<\/strong> 16\/12\/2020<\/p><p><strong>Publica\u00e7\u00f5es:<\/strong><\/p><div class=\"wp-block-file\"><a id=\"wp-block-file--media-eac0b639-263b-462f-b991-b9e4b10a1d40\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/Visao-da-Tecnologia-Bim-aplicada-ao-combate-a-incendio-_-Tecnologia-Bim-aplicada-ao-combate-a-incendio.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">TECNOLOGIA BIM APLICADA AO COMBATE A INC\u00caNDIO<\/a><\/div><div class=\"wp-block-file\"><a id=\"wp-block-file--media-4c5e8eff-3a76-497e-9168-7fd6ca370a6f\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/View-of-Projeto-de-Prevencao-e-Combate-a-Incendio-realizado-em-Softwares-com-tecnologia-BIM-_-Fire-Prevention-and-Fighting-Project-carried-out-in-Software-with-BIM-technology.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">PROJETO DE PREVEN\u00c7\u00c3O E COMBATE A INC\u00caNDIO REALIZADO EM SOFTWARES COM TECNOLOGIA BIM<\/a><\/div><div class=\"wp-block-file\"><a id=\"wp-block-file--media-6a0f1e8b-7386-401b-9a5a-b08286d6f3c3\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/60669View-of-Analise-de-estruturas-de-concreto-armado-em-situacao-de-incendio-_-Analysis-of-reinforced-concrete-structures-in-a-fire-situation-1.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">AN\u00c1LISE DE ESTRUTURAS DE CONCRETO ARMADO EM SISTUA\u00c7\u00c3O DE INC\u00caNDIO<\/a><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-835a0b6 e-flex e-con-boxed e-con\" data-id=\"835a0b6\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2892189 e-con-full e-flex e-con\" data-id=\"2892189\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f4119cb elementor-widget elementor-widget-heading\" data-id=\"f4119cb\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Alessandra de Melo e Silva\n\n\n<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c32c523 elementor-widget elementor-widget-heading\" data-id=\"c32c523\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Jo\u00e3o Jos\u00e9 Costa Gondim<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-38d3361 elementor-widget elementor-widget-spacer\" data-id=\"38d3361\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fbce100 elementor-widget elementor-widget-text-editor\" data-id=\"fbce100\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de publica\u00e7\u00e3o:<\/strong> PPEE.MP.008<\/p><div><div><p><strong>Disserta\u00e7\u00e3o:<\/strong><a id=\"wp-block-file--media-0ee83b78-651b-4ed3-805e-28b60f6c70eb\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/Dissertacao_FInal___Alessandra_Silva.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">METODOLOGIA INTEGRATIVA PARA PRODU\u00c7\u00c3O DE INTELIG\u00caNCIA DE AMEA\u00c7AS CIBERN\u00c9TICAS UTILIZANDO PLATAFORMAS DE C\u00d3DIGO ABERTO<\/a><\/p><p><strong>DOI:\u00a0<\/strong><a href=\"http:\/\/dx.doi.org\/10.26512\/2020.10.D.40089\">http:\/\/dx.doi.org\/10.26512\/2020.10.D.40089<\/a><\/p><\/div><div><p><strong>Linha de pesquisa:<\/strong>Seguran\u00e7a dos sistemas de informa\u00e7\u00e3o e das redes<\/p><p><strong>Data da defesa:<\/strong>\u00a018\/12\/2020<\/p><p><strong>Publica\u00e7\u00e3o: <\/strong><a id=\"wp-block-file--media-2629e93f-15ce-4302-9379-b9498b35bf0e\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/mpdi-2.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">A METHODOLOGY TO EVALUATE STANDARDS AND PLATAFORMS WITHIN CYBER THREAT INTELLIGENCE<\/a><\/p><\/div><\/div><div class=\"wp-block-column\">\u00a0<\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0b4b1bf e-flex e-con-boxed e-con\" data-id=\"0b4b1bf\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-04c7c74 e-con-full e-flex e-con\" data-id=\"04c7c74\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6caa0ac elementor-widget elementor-widget-heading\" data-id=\"6caa0ac\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Rafael Pinto Prata\n\n\n<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f1be893 elementor-widget elementor-widget-heading\" data-id=\"f1be893\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Rafael Tim\u00f3teo de Sousa J\u00fanior<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-41692db elementor-widget elementor-widget-spacer\" data-id=\"41692db\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3e43751 elementor-widget elementor-widget-text-editor\" data-id=\"3e43751\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de Publica\u00e7\u00e3o: <\/strong>PPEE.MP.007<\/p><p><strong>Disserta\u00e7\u00e3o:<\/strong><a id=\"wp-block-file--media-f6ca360c-b69a-437b-9d53-113474ccbaab\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/RAFAEL_PRATA__ppee_master_Dissertacao_vfinal_2.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">PROTE\u00c7\u00c3O DE CANAL DE COMUNICA\u00c7\u00c3O CR\u00cdTICO EM SISTEMA DE CONTROLE DE SAT\u00c9LITE POR MEIO DE CINTUR\u00c3O DE PROTE\u00c7\u00c3O<\/a><\/p><p><strong>DOI:\u00a0<\/strong><a href=\"http:\/\/dx.doi.org\/10.26512\/2020.12.D.40371\">http:\/\/dx.doi.org\/10.26512\/2020.12.D.40371<\/a><\/p><div class=\"wp-block-column\"><p><strong>Linha de pesquisa<\/strong>: Seguran\u00e7a dos Sistemas de Informa\u00e7\u00e3o e das Redes<\/p><p><strong>Data da defesa<\/strong>: 02\/12\/2020<\/p><p><strong>Publica\u00e7\u00f5es:\u00a0<\/strong><\/p><p><a id=\"wp-block-file--media-c4fd2792-edb0-4f78-8550-f971d1691530\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/7.4___Artigo_Publicado_Ettc2020.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">PROTECTING SATELLITE DOWNLINK TRACKING AND TELEMETRY CHANNELS BY IMT-2020 5G BASE STATIONS PROTECTION BELTS SURROUNDING SATELLITE TT&amp;C EARTH STATIONS OPERATING IN THE 40 GHZ BAD<\/a><\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-262152e e-flex e-con-boxed e-con\" data-id=\"262152e\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-fd1e069 e-con-full e-flex e-con\" data-id=\"fd1e069\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5c7e7f0 elementor-widget elementor-widget-heading\" data-id=\"5c7e7f0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Antonio Anderson Silva Marques\n\n\n<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3225432 elementor-widget elementor-widget-heading\" data-id=\"3225432\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Paulo Henrique Portela de Carvalho<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9a5e0de elementor-widget elementor-widget-spacer\" data-id=\"9a5e0de\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d5e082f elementor-widget elementor-widget-text-editor\" data-id=\"d5e082f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de Publica\u00e7\u00e3o: <\/strong>PPEE.MP.006<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a id=\"wp-block-file--media-8851b921-95be-4839-8ab2-b6f727dd92c0\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/Dissertacao_Antonio_Anderson.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">AN\u00c1LISE E VERIFICA\u00c7\u00c3O EMP\u00cdRICA DE MODELOS DE PREDI\u00c7\u00c3O DE FREQU\u00caNCIAS PARA COMUNICA\u00c7\u00c3O EM HF EM REGI\u00d5ES DE BAIXA LATITUDE<\/a><\/p><p><strong>DOI:\u00a0<\/strong><a href=\"http:\/\/dx.doi.org\/10.26512\/2020.10.D.40178\">http:\/\/dx.doi.org\/10.26512\/2020.10.D.40178<\/a><\/p><div class=\"wp-block-column\"><p><strong>Linha de pesquisa<\/strong>: Seguran\u00e7a da Infraestrutura cr\u00edtica de comunica\u00e7\u00f5es<\/p><p><strong>Data da defesa<\/strong>: 19\/10\/2020<\/p><p><strong>Publica\u00e7\u00f5es: <\/strong><a id=\"wp-block-file--media-1a52ef73-08fb-44ae-b1b1-96babfb30186\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/Artigo.SBRT__Antonio_Anderson_Silva_Marques.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">AN\u00c1LISE E VERIFICA\u00c7\u00c3O EMP\u00cdRICA DE MODELOS DE PREDI\u00c7\u00c3O PARA COMUNICA\u00c7\u00c3O EM HF EM REGI\u00d5ES DE BAIXA LATITUDE<\/a><\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-87819b6 e-flex e-con-boxed e-con\" data-id=\"87819b6\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-e142a01 e-con-full e-flex e-con\" data-id=\"e142a01\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cb54c55 elementor-widget elementor-widget-heading\" data-id=\"cb54c55\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Alan Tamer Vasques\n\n\n<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-410362d elementor-widget elementor-widget-heading\" data-id=\"410362d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Jo\u00e3o Jos\u00e9 Costa Gondim<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c7ea7c9 elementor-widget elementor-widget-spacer\" data-id=\"c7ea7c9\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8b551c1 elementor-widget elementor-widget-text-editor\" data-id=\"8b551c1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de Publica\u00e7\u00e3o: <\/strong>PPEE.MP.005<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a id=\"wp-block-file--media-29fd172b-26b8-41fa-b675-6eace4b27175\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/Dissertacao_de_Mestrado_PPEE_AlanTamerVasques_Final.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">AN\u00c1LISE DE SATURA\u00c7\u00c3O DE DISPOSITIVOS IoT ATUANDO COMO REFLETORES EM ATAQUES DISTRIBU\u00cdDOS DE NEGA\u00c7\u00c3O DE SERVI\u00c7O POR REFLEX\u00c3O AMPLIFICADA<\/a><\/p><div class=\"wp-block-column\"><div class=\"wp-block-column\"><div><strong>DOI:\u00a0<\/strong><a href=\"http:\/\/dx.doi.org\/10.26512\/2020.10.D.40089\">http:\/\/dx.doi.org\/10.26512\/2020.10.D.40089<\/a><\/div><p><strong>Linha de pesquisa:<\/strong> Seguran\u00e7a dos sistemas de informa\u00e7\u00e3o e das redes<\/p><p><strong>Data da defesa:<\/strong> 08\/10\/2020<\/p><p><strong>Publica\u00e7\u00f5es: <\/strong><a id=\"wp-block-file--media-6b0f50b5-84b0-4105-9834-c475b8a14e36\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/ALAN.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">LINDERHOF: UMA FERRAMENTA PARA AVALIA\u00c7\u00c3O DE SISTEMAS DE MITIGA\u00c7\u00c3O DE ATAQUES REFLWXIVOS VOLUM\u00c9TICOS (DDOS)<\/a><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4a107ea e-flex e-con-boxed e-con\" data-id=\"4a107ea\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-58dd96a e-con-full e-flex e-con\" data-id=\"58dd96a\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0bf1ee3 elementor-widget elementor-widget-heading\" data-id=\"0bf1ee3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Claudinei Morin da Silveira\n\n\n<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7748144 elementor-widget elementor-widget-heading\" data-id=\"7748144\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Rafael Tim\u00f3teo de Sousa J\u00fanior<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5175025 elementor-widget elementor-widget-spacer\" data-id=\"5175025\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2b01e01 elementor-widget elementor-widget-text-editor\" data-id=\"2b01e01\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de Publica\u00e7\u00e3o: <\/strong>PPEE.MP.004<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a id=\"wp-block-file--media-85b57fc1-c64b-45f8-9219-bcdaebe70512\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/Dissertacao_Claudinei_Morin_PPEE.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">METODOLOGIA PARA RECONSTRU\u00c7\u00c3O DE DADOS EM DISPOSITIVOS M\u00d3VEIS COM SISTEMA OPERACIONAL ANDROID MEDIANTE APLICA\u00c7\u00c3O DE T\u00c9CNICAS ISP E COMBINATION FIRMWARE<\/a><\/p><p><strong>DOI:\u00a0<\/strong><a href=\"http:\/\/dx.doi.org\/10.26512\/2020.08.D.39901\">http:\/\/dx.doi.org\/10.26512\/2020.08.D.39901<\/a><\/p><div class=\"wp-block-column\"><p><strong>Linha de pesquisa<\/strong>: Seguran\u00e7a dos sistemas de informa\u00e7\u00e3o e das redes<\/p><p><strong>Data da defesa<\/strong>: 17\/08\/2020<\/p><p><strong>Publica\u00e7\u00f5es: <\/strong><a id=\"wp-block-file--media-c6355c16-fb9c-490e-9e21-2e161b5ac6ae\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/mpdi-1.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">METHODOLOGY FOR FORENSICS DATA RECONSTRUCTION ON MOBILE DEVICES WITH ANDROID OPERATING SYSTEM APPLYUNG IN-SYSTEM PROGRAMMING AND COMBINATION FIRMWARE<\/a><\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-464d133 e-flex e-con-boxed e-con\" data-id=\"464d133\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-f61f213 e-con-full e-flex e-con\" data-id=\"f61f213\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7cd5c39 elementor-widget elementor-widget-heading\" data-id=\"7cd5c39\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Jos\u00e9 Augusto de Almeida J\u00fanior\n\n\n<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-03d7571 elementor-widget elementor-widget-heading\" data-id=\"03d7571\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Paulo Henrique Portela de Carvalho<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7f051a0 elementor-widget elementor-widget-spacer\" data-id=\"7f051a0\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-14b888d elementor-widget elementor-widget-text-editor\" data-id=\"14b888d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de Publica\u00e7\u00e3o: <\/strong>PPEE.MP.003<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a id=\"wp-block-file--media-9d6ffa2f-8337-4ec5-9449-f5946c2d4887\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/Dissertacao___Jose_Augusto_de_Almeida_Junior__2_-2.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">IDENTIFICA\u00c7\u00c3O DE COMPET\u00caNCIAS DOS CYBER RED TEAMS MILITARES E PROPOSTA DE METODOLOGIA DE TREINAMENTO CONT\u00cdNUO PARA PROJE\u00c7\u00c3O DO PODER NA GUERRA CIBERN\u00c9TICA<\/a><\/p><p><strong>DOI:\u00a0<\/strong><a href=\"http:\/\/dx.doi.org\/10.26512\/2020.08.D.40003\">http:\/\/dx.doi.org\/10.26512\/2020.08.D.40003<\/a><\/p><div class=\"wp-block-column\"><p><strong>Linha de pesquisa<\/strong>: Seguran\u00e7a dos sistemas de informa\u00e7\u00e3o e das redes<\/p><p><strong>Data da defesa<\/strong>: 03\/08\/2020<\/p><p><strong>Publica\u00e7\u00f5es:<\/strong> <a id=\"wp-block-file--media-2663d1c3-bcfe-44d4-be29-3394b9550e4f\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/1.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">COMPET\u00caNCIAS PARA OS CYBER RED TEAMS NO CONTEXTO MILITAR<\/a><\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a30d4b7 e-flex e-con-boxed e-con\" data-id=\"a30d4b7\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2b3afb3 e-con-full e-flex e-con\" data-id=\"2b3afb3\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-66266d9 elementor-widget elementor-widget-heading\" data-id=\"66266d9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Bruce William Perc\u00edlio Azevedo\n\n\n<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5674609 elementor-widget elementor-widget-heading\" data-id=\"5674609\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): Robson de Oliveira Albuquerque\u200b<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-97c1bb4 elementor-widget elementor-widget-spacer\" data-id=\"97c1bb4\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a571d8c elementor-widget elementor-widget-text-editor\" data-id=\"a571d8c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de Publica\u00e7\u00e3o: <\/strong>PPEE.MP.002<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a id=\"wp-block-file--media-f6831766-5a50-4fbd-b887-1c9b93ed5ed2\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/PPEE_UNB_BruceAzevedo.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">MODELO DE REFER\u00caNCIA PARA O DESENVOLVIMENTO DE APLICA\u00c7\u00d5ES DE INTELIG\u00caNCIA DE AMEA\u00c7AS CIBERN\u00c9TICAS E SUA APLICABILIDADE PARA O COMPARTILHAMENTO DE DADOS<\/a><\/p><p><strong>DOI:\u00a0<\/strong><a href=\"http:\/\/dx.doi.org\/10.26512\/2020.08.D.39792\">http:\/\/dx.doi.org\/10.26512\/2020.08.D.39792<\/a><\/p><div class=\"wp-block-column\"><p><strong>Linha de pesquisa<\/strong>: Seguran\u00e7a dos sistemas de informa\u00e7\u00e3o e das redes<\/p><p><strong>Data da defesa<\/strong>: 03\/08\/2020<\/p><p><strong>Publica\u00e7\u00f5es:<\/strong><\/p><div class=\"wp-block-file\"><a id=\"wp-block-file--media-570ff87b-258d-406a-9568-66e10da49f1d\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/IADES.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">ESTUDO EXPERIMENTAL DA BIOMETRIA COMPORTAMENTAL PARA AUTENTICA\u00c7\u00c3O CONT\u00cdNUA DE USU\u00c1RIOS EM APLICA\u00c7\u00d5ES BANC\u00c1RIAS MOBILE<\/a><\/div><div class=\"wp-block-file\"><a id=\"wp-block-file--media-d1eda3b1-d1af-43fb-a66f-ed2fd57bb583\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/mpdi.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">METHODOLOGICAL FRAMEWORK TO COLLECT, PROCESS, ANALYZE AND VISUALIZE CYBER THREAT INTELLIGENCE DATA<\/a><\/div><div>\u00a0<\/div><div class=\"wp-block-file\"><a id=\"wp-block-file--media-c0cd69af-af0c-40b7-bb22-4a4f740b67d1\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/IADES-IBERO-AMERICANA.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">PROPOSTA DE MODELO DE REFER\u00caNCIA DE INTELIG\u00caNCIA DE AMEA\u00c7AS<\/a><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-29ade23 e-flex e-con-boxed e-con\" data-id=\"29ade23\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-b44b21c e-con-full e-flex e-con\" data-id=\"b44b21c\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dd096e8 elementor-widget elementor-widget-heading\" data-id=\"dd096e8\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Autor(a): Priscila Morais Argolo Bonfim Estrela\n\n\n<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c393335 elementor-widget elementor-widget-heading\" data-id=\"c393335\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Orientador(a): William Ferreira Giozza\u200b<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dfe6f58 elementor-widget elementor-widget-spacer\" data-id=\"dfe6f58\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b10b0f5 elementor-widget elementor-widget-text-editor\" data-id=\"b10b0f5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>N\u00famero de Publica\u00e7\u00e3o: <\/strong>PPEE.MP.001<\/p><p><strong>Disserta\u00e7\u00e3o: <\/strong><a id=\"wp-block-file--media-8bc8fb32-fec7-463e-9232-786954d094b2\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/Dissertacao_PPEE_UnB_Priscila_vFinal.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">AUTENTICA\u00c7\u00c3O CONT\u00cdNUA BASEADA EM BIOMETRIA COMPORTAMENTAL PARA APLICA\u00c7\u00d5ES BANC\u00c1RIAS MOBILE<\/a><\/p><p><strong>DOI: <\/strong><a href=\"http:\/\/&quot; http:\/\/dx.doi.org\/10.26512\/2020.08.D.39850&quot;\">http:\/\/dx.doi.org\/10.26512\/2020.08.D.39850&#8243;<\/a><\/p><div class=\"wp-block-column\"><p><strong>Linha de pesquisa<\/strong>: Seguran\u00e7a dos sistemas de informa\u00e7\u00e3o e das redes<\/p><p><strong>Data da defesa<\/strong>: 03\/08\/2020<\/p><p><strong>Publica\u00e7\u00f5es:<\/strong><\/p><div class=\"wp-block-file\"><a id=\"wp-block-file--media-df2d90fb-43a3-452f-a7d5-818d26e6b68b\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/CIACA.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">ESTUDO EXPERIMENTAL DA BIOMETRIA COMPORTAMENTAL PARA AUTENTICA\u00c7\u00c3O CONT\u00cdNUA DE USU\u00c1RIOS EM APLICA\u00c7\u00d5ES BANC\u00c1RIAS MOBILE<\/a><\/div><div class=\"wp-block-file\"><a id=\"wp-block-file--media-b3c0b88e-8ff5-4ca5-b239-1ea818b66fac\" href=\"https:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/01\/sensors-PRI-1.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">A FRAMEWORK FOR CONTINUOUS AUTHENTICATION BASED ON TOUCH DYNAMICS BIOMETRICS FOR MOBILE BANKING APPLICATIONS<\/a><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-231ff49 e-con-full e-flex e-con\" data-id=\"231ff49\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5f1797c elementor-widget elementor-widget-spacer\" data-id=\"5f1797c\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-77f5170 e-con-full e-flex e-con\" data-id=\"77f5170\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;}\">\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7bf275d3 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"7bf275d3\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.14.0 - 26-06-2023 *\/\n.elementor-widget-divider{--divider-border-style:none;--divider-border-width:1px;--divider-color:#0c0d0e;--divider-icon-size:20px;--divider-element-spacing:10px;--divider-pattern-height:24px;--divider-pattern-size:20px;--divider-pattern-url:none;--divider-pattern-repeat:repeat-x}.elementor-widget-divider .elementor-divider{display:flex}.elementor-widget-divider .elementor-divider__text{font-size:15px;line-height:1;max-width:95%}.elementor-widget-divider .elementor-divider__element{margin:0 var(--divider-element-spacing);flex-shrink:0}.elementor-widget-divider .elementor-icon{font-size:var(--divider-icon-size)}.elementor-widget-divider .elementor-divider-separator{display:flex;margin:0;direction:ltr}.elementor-widget-divider--view-line_icon .elementor-divider-separator,.elementor-widget-divider--view-line_text .elementor-divider-separator{align-items:center}.elementor-widget-divider--view-line_icon .elementor-divider-separator:after,.elementor-widget-divider--view-line_icon .elementor-divider-separator:before,.elementor-widget-divider--view-line_text .elementor-divider-separator:after,.elementor-widget-divider--view-line_text .elementor-divider-separator:before{display:block;content:\"\";border-bottom:0;flex-grow:1;border-top:var(--divider-border-width) var(--divider-border-style) var(--divider-color)}.elementor-widget-divider--element-align-left .elementor-divider .elementor-divider-separator>.elementor-divider__svg:first-of-type{flex-grow:0;flex-shrink:100}.elementor-widget-divider--element-align-left .elementor-divider-separator:before{content:none}.elementor-widget-divider--element-align-left .elementor-divider__element{margin-left:0}.elementor-widget-divider--element-align-right .elementor-divider .elementor-divider-separator>.elementor-divider__svg:last-of-type{flex-grow:0;flex-shrink:100}.elementor-widget-divider--element-align-right .elementor-divider-separator:after{content:none}.elementor-widget-divider--element-align-right .elementor-divider__element{margin-right:0}.elementor-widget-divider:not(.elementor-widget-divider--view-line_text):not(.elementor-widget-divider--view-line_icon) .elementor-divider-separator{border-top:var(--divider-border-width) var(--divider-border-style) var(--divider-color)}.elementor-widget-divider--separator-type-pattern{--divider-border-style:none}.elementor-widget-divider--separator-type-pattern.elementor-widget-divider--view-line .elementor-divider-separator,.elementor-widget-divider--separator-type-pattern:not(.elementor-widget-divider--view-line) .elementor-divider-separator:after,.elementor-widget-divider--separator-type-pattern:not(.elementor-widget-divider--view-line) .elementor-divider-separator:before,.elementor-widget-divider--separator-type-pattern:not([class*=elementor-widget-divider--view]) .elementor-divider-separator{width:100%;min-height:var(--divider-pattern-height);-webkit-mask-size:var(--divider-pattern-size) 100%;mask-size:var(--divider-pattern-size) 100%;-webkit-mask-repeat:var(--divider-pattern-repeat);mask-repeat:var(--divider-pattern-repeat);background-color:var(--divider-color);-webkit-mask-image:var(--divider-pattern-url);mask-image:var(--divider-pattern-url)}.elementor-widget-divider--no-spacing{--divider-pattern-size:auto}.elementor-widget-divider--bg-round{--divider-pattern-repeat:round}.rtl .elementor-widget-divider .elementor-divider__text{direction:rtl}.e-con-inner>.elementor-widget-divider,.e-con>.elementor-widget-divider{width:var(--container-widget-width,100%);--flex-grow:var(--container-widget-flex-grow)}<\/style>\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-efbc92f e-con-full e-flex e-con\" data-id=\"efbc92f\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-912bedc e-flex e-con-boxed e-con\" data-id=\"912bedc\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7010 elementor-widget elementor-widget-global elementor-global-7010 elementor-widget-image\" data-id=\"7010\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"http:\/\/ppee.unb.br\/wp-content\/uploads\/2023\/06\/UnBHeaderbranco.png\" title=\"\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Autor(a): Fernando Rocha Moreira Orientador(a): Rafael Rabelo Nunes N\u00famero de publica\u00e7\u00e3o: PPEE.MP.013 Disserta\u00e7\u00e3o: UMA PROPOSTA PARA PRIORIZA\u00c7\u00c3O DE CONTROLES DE SEGURAN\u00c7A CIBERN\u00c9TICA COM O USO DE UM M\u00c9TODO MULTICRIT\u00c9RIO Linha [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":5226,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/ppee.unb.br\/index.php?rest_route=\/wp\/v2\/pages\/36"}],"collection":[{"href":"https:\/\/ppee.unb.br\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ppee.unb.br\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ppee.unb.br\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ppee.unb.br\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=36"}],"version-history":[{"count":1050,"href":"https:\/\/ppee.unb.br\/index.php?rest_route=\/wp\/v2\/pages\/36\/revisions"}],"predecessor-version":[{"id":17772,"href":"https:\/\/ppee.unb.br\/index.php?rest_route=\/wp\/v2\/pages\/36\/revisions\/17772"}],"up":[{"embeddable":true,"href":"https:\/\/ppee.unb.br\/index.php?rest_route=\/wp\/v2\/pages\/5226"}],"wp:attachment":[{"href":"https:\/\/ppee.unb.br\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=36"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}