Semantic search

From Navigators

Jump to: navigation, search
Previous     Results 1– 50    Next        (20 | 50 | 100 | 250 | 500)


  • Alysson Bessani, Nuno Ferreira Neves, Paulo Verissimo, Wagner Saback Dantas, Alexandre Fonseca, Rui Silva, Pedro Luz, Miguel Correia, “JITeR: Just-In-Time Application-Layer Routing”, Computer Networks, vol. 104, pp. 122–136, Jul. 2016.

  • Alysson Bessani, Ricardo Mendes, Tiago Oliveira, Nuno Ferreira Neves, Miguel Correia, Marcelo Pasin, Paulo Verissimo, “SCFS: A Shared Cloud-backed File System”, in Proceedings of the 2014 USENIX Annual Technical Conference (USENIX-ATC), Philadelphia, PA, US, Jun. 2014.

  • Rolando Martins, Rajeev Gandhi, Priya Narasimhan, Soila Pertet, António Casimiro, Diego Kreutz, Paulo Verissimo, “Experiences with Fault-Injection in a Byzantine Fault-Tolerant Protocol”, in Middleware 2013, Eyers, David and Schwan, Karsten, Eds., ser. Lecture Notes in Computer Science. Beijing, China: Springer Berlin Heidelberg, Dec. 2013, vol. 8275, pp. 41–61.

  • Giuliana Santos Veronese, Miguel Correia, Alysson Bessani, Lau Cheuk Lung, Paulo Verissimo, “Efficient Byzantine Fault-Tolerance”, IEEE Transactions on Computers, vol. 62, no. 1, pp. 16–30, Jan. 2013.

  • João Antunes, Nuno Ferreira Neves, Paulo Verissimo, “Using Attack Injection on Closed Protocols”, in Fast Abstract in Supplement of the International Conference on Dependable Systems and Networks (DSN'10), Jun. 2010.

  • João Antunes, Nuno Ferreira Neves, Miguel Correia, Paulo Verissimo, Rui Neves, “Vulnerability Removal with Attack Injection”, IEEE Transactions on Software Engineering, Special issue on Evaluation and Improvement of Software Dependability, Jun. 2010.

  • António Casimiro, José Rufino, Luís Marques, Mário Calha, Paulo Verissimo, “Applying architectural hybridization in networked embedded systems”, in Proceedings of the 7th IFIP WG 10.2 International Workshop (SEUS 2009), Software Technologies for Embedded and Ubiquitous Systems, LNCS 5860, Sunggu Lee and Priya Narasimhan (Eds), Newport Beach, CA, USA, November 2009, Nov. 2009.

  • Paulo Verissimo, Miguel Correia, Nuno Ferreira Neves, Paulo Sousa, “Intrusion-Resilient Middleware Design and Validation”, in Information Assurance, Security and Privacy Services, ser. Handbooks in Information Systems. Emerald Group Publishing Limited, May 2009, vol. 4, pp. 615–678.

  • Steven M. Bellovin, Terry V. Benzel, Bob Blakley, Dorothy E. Denning, Whitfield Diffie, Jeremy Epstein, Paulo Verissimo, “Information Assurance Technology Forecast 2008”, IEEE Security & Privacy, vol. 6, no. 1, pp. 10-17, January/February, 2008., Jan. 2008.

  • João Antunes, Nuno Ferreira Neves, Paulo Verissimo, “Finding Local Resource Exhaustion Vulnerabilities”, in Student paper in Proceedings of the International Symposium on Software Reliability Engineering (ISSRE), Trollhättan, Sweden, November 2007., Nov. 2007.

  • Paulo Verissimo, “Assumptions: The Trojan Horses of Secure Protocols”, in In V. Gorodetsky, I. Kotenko, and V.A. Skormin (Eds.): "Mathematical Methods, Models and Architectures for Computer Networks Security" (MMM-ACNS) 2007, CCIS 1, pp. 34-41, 2007. Springer-Verlag., Sept. 2007.

  • Paulo Verissimo, Nuno Ferreira Neves, Miguel Correia, Yves Deswarte, A. Abou El Kalam, Andrea Bondavalli, Alessandro Daidone, “The CRUTIAL Architecture for Critical Information Infrastructures”, in Architecting Dependable Systems V, Rogério de Lemos, Felicita Di Giandomenico, Cristina Gacek, Henry Muccini, Marco Vieira, Eds., ser. LNCS. Springer, Aug. 2007, vol. 5135.

Previous     Results 1– 50    Next        (20 | 50 | 100 | 250 | 500)
Personal tools
Navigators toolbox