Semantic search
From Navigators
Publications
- Diego Kreutz, Jiangshan Yu, Paulo Verissimo, Fernando Ramos, Cátia Magalhães, “The KISS principle in Software-Defined Networking: a framework for secure communications”, IEEE Security & Privacy, Oct. 2018.
- Alysson Bessani, Nuno Ferreira Neves, Paulo Verissimo, Wagner Saback Dantas, Alexandre Fonseca, Rui Silva, Pedro Luz, Miguel Correia, “JITeR: Just-In-Time Application-Layer Routing”, Computer Networks, vol. 104, pp. 122–136, Jul. 2016.
- Vinicius Vielmo Cogo, Alysson Bessani, Francisco M. Couto, Paulo Verissimo, “A High-Throughput Method to Detect Privacy-Sensitive Human Genomic Data”, in Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2015), Denver, CO, US, Oct. 2015.
- Fernando Ramos, Diego Kreutz, Paulo Verissimo, “Software-Defined Networks: On the Road to the Softwarization of Networking”, Cutter IT Journal, May 2015.
- Diego Kreutz, Fernando Ramos, Paulo Verissimo, Christian Rothenberg, Siamak Azodolmolky, Steve Uhlig, “Software-defined networking: A comprehensive survey”, Proceedings of the IEEE, vol. 103, no. 1, Jan. 2015.
- Diego Kreutz, Fernando Ramos, Paulo Verissimo, “Anchors of Trust for Autonomic and Secure Configuration and Assessment in SDN”, in Fast Abstract at the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Atlanta, USA, Jun. 2014.
- Alysson Bessani, Ricardo Mendes, Tiago Oliveira, Nuno Ferreira Neves, Miguel Correia, Marcelo Pasin, Paulo Verissimo, “SCFS: A Shared Cloud-backed File System”, in Proceedings of the 2014 USENIX Annual Technical Conference (USENIX-ATC), Philadelphia, PA, US, Jun. 2014.
- Rolando Martins, Rajeev Gandhi, Priya Narasimhan, Soila Pertet, António Casimiro, Diego Kreutz, Paulo Verissimo, “Experiences with Fault-Injection in a Byzantine Fault-Tolerant Protocol”, in Middleware 2013, Eyers, David and Schwan, Karsten, Eds., ser. Lecture Notes in Computer Science. Beijing, China: Springer Berlin Heidelberg, Dec. 2013, vol. 8275, pp. 41–61.
- Paulo Verissimo, Alysson Bessani, “E-biobanking: What Have You Done to My Cell Samples?”, IEEE Security & Privacy, vol. 11, no. 6, pp. 62–65, Dec. 2013.
- Diego Kreutz, Fernando Ramos, Paulo Verissimo, “Towards Secure and Dependable Software-Defined Networks”, in ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN), Hong Kong, China, Aug. 2013.
- Miguel Correia, Nuno Ferreira Neves, Paulo Verissimo, “BFT-TO: Intrusion Tolerance with”, The Computer Journal, vol. 56, no. 6, pp. 693–715, Jun. 2013.
- Francisco M. Couto, Daniel Faria, Bruno Tavares, Pedro Gonçalves, Paulo Verissimo, “Benchmarking some Portuguese S&T system research units (2nd Edition)”, University of Lisbon, DI-FCUL, Tech. Rep. TR-2013-03, Feb. 2013.
- Giuliana Santos Veronese, Miguel Correia, Alysson Bessani, Lau Cheuk Lung, Paulo Verissimo, “Efficient Byzantine Fault-Tolerance”, IEEE Transactions on Computers, vol. 62, no. 1, pp. 16–30, Jan. 2013.
- Mônica Dixit, António Casimiro, Paulo Verissimo, Paolo Lollini, Andrea Bondavalli, “Adaptare: Supporting automatic and dependable adaptation in dynamic environments”, ACM Transactions on Autonomous and Adaptive Systems, vol. 7, no. 2, pp. 18:1–18:25, Jul. 2012. http://doi.acm.org/10.1145/2240166.2240168
- Amir Soltani Nezhad, António Casimiro, Paulo Verissimo, “A Multi-Layered Architecture for a Secure Virtualization Environment”, in Fast Abstract at the 2012 International Conference on Dependable Systems and Networks, Boston, MA, USA, Jun. 2012.
- António Casimiro, Paulo Verissimo, Diego Kreutz, Filipe Araújo, Raul Barbosa, Samuel Neves, Bruno Sousa, Marília Curado, Carlos Silva, Rajeev Gandhi, Priya Narasimhan, “TRONE: Trustworthy and Resilient Operations in a Network Environment”, in Dependable Systems and Networks Workshops (DSN-W), 2012 IEEE/IFIP 42nd International Conference on, Boston, MA, USA, Jun. 2012, pp. 1–6. http://dx.doi.org/10.1109/DSNW.2012.6264694
- Paulo Verissimo, Alysson Bessani, Marcelo Pasin, “The TClouds Architecture:Open and Resilient Cloud-of-clouds Computing”, in Dependable Systems and Networks Workshops (DSN-W), 2012 IEEE/IFIP 42nd International Conference on, Jun. 2012.
- Miguel Correia, Pedro Costa, Marcelo Pasin, Alysson Bessani, Fernando Ramos, Paulo Verissimo, “On the Feasibility of Byzantine Fault-Tolerant MapReduce in Clouds-of-Cloud”, in First International Workshop on Dependability Issues in Cloud Computing (DISCCO 2012), San Francisco, California, 2012.
- Bernhard kauer, Paulo Verissimo, Alysson Bessani, “Recursive Virtual Machines for Advanced Security Mechanisms”, in Proceedings of the 1st International Workshop on Dependability of Clouds, Data Centers and Virtual Computing Environments (DCDV'11). DSN'11 supplemental volume., Jun. 2011.
- Henrique Moniz, Nuno Ferreira Neves, Miguel Correia, Paulo Verissimo, “RITAS: Services for Randomized Intrusion Tolerance”, IEEE Transactions on Dependable and Secure Computing, vol. 8, n. 1, pp. 122-136, Jan.-Feb. 2011., Jan. 2011.
- José Rufino, João Pedro Craveiro, Paulo Verissimo, “Architecting Robustness and Timeliness in a New Generation of Aerospace Systems”, in Architecting Dependable Systems VII, António Casimiro, Rogério de Lemos, Cristina Gacek, Eds., ser. LNCS. Springer, Nov. 2010, vol. 6420.
- Francisco M. Couto, Ivan Andrade, Pedro Gonçalves, Paulo Verissimo, “Benchmarking some Portuguese S&T system research units”, University of Lisbon, DI-FCUL, Tech. Rep. TR-2010-07, Nov. 2010. http://hdl.handle.net/10455/6682
- José Rufino, João Pedro Craveiro, Paulo Verissimo, “Building a time- and space-partitioned architecture for the next generation of space vehicle avionics”, in Proceedings of the 8th IFIP Workshop on Software Technologies for Future Embedded and Ubiquitous Systems (SEUS 2010), Waidhofen an der Ybbs, Austria, Oct. 2010.
- João Antunes, Nuno Ferreira Neves, Paulo Verissimo, “Using Attack Injection on Closed Protocols”, in Fast Abstract in Supplement of the International Conference on Dependable Systems and Networks (DSN'10), Jun. 2010.
- João Antunes, Nuno Ferreira Neves, Miguel Correia, Paulo Verissimo, Rui Neves, “Vulnerability Removal with Attack Injection”, IEEE Transactions on Software Engineering, Special issue on Evaluation and Improvement of Software Dependability, Jun. 2010.
- Paulo Sousa, Alysson Bessani, Miguel Correia, Nuno Ferreira Neves, Paulo Verissimo, “Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery”, IEEE Transactions on Parallel and Distributed Systems, vol. 21, no. 4, pp. 452-465, Apr. 2010., Apr. 2010.
- Mônica Dixit, António Casimiro, Paulo Verissimo, Paolo Lollini, Andrea Bondavalli, “A Probabilistic Framework for Automatic and Dependable Adaptation in Dynamic Environments”, Department of Informatics, University of Lisboa, Tech. Rep. TR-09-19, Dec. 2009. http://hdl.handle.net/10455/3273
- Francisco M. Couto, Tiago Grego, Catia Pesquita, Paulo Verissimo, “Handling self-citations using Google Scholar”, International Journal of Scientometrics, Informetrics and Bibliometrics, vol. 13, no. 2, Dec. 2009.
- António Casimiro, José Rufino, Luís Marques, Mário Calha, Paulo Verissimo, “Applying architectural hybridization in networked embedded systems”, in Proceedings of the 7th IFIP WG 10.2 International Workshop (SEUS 2009), Software Technologies for Embedded and Ubiquitous Systems, LNCS 5860, Sunggu Lee and Priya Narasimhan (Eds), Newport Beach, CA, USA, November 2009, Nov. 2009.
- Henrique Moniz, Nuno Ferreira Neves, Miguel Correia, Paulo Verissimo, “Randomization can be a Healer: Consensus with Dynamic Omission Failures”, in Proceedings of the 23rd International Symposium on Distributed Computing (DISC 2009), pages 63-77, Sept. 2009.
- Alysson Bessani, Paulo Sousa, Miguel Correia, Nuno Ferreira Neves, Paulo Verissimo, “Cheap Intrusion-Tolerant Protection for CRUTIAL Things”, Missing institution, Tech. Rep., Aug. 2009. DI-FCUL TR-2009-14
- Paulo Verissimo, Miguel Correia, Nuno Ferreira Neves, Paulo Sousa, “Intrusion-Resilient Middleware Design and Validation”, in Information Assurance, Security and Privacy Services, ser. Handbooks in Information Systems. Emerald Group Publishing Limited, May 2009, vol. 4, pp. 615–678.
- Mônica Dixit, António Casimiro, Paulo Verissimo, “Probabilistic Adaptive Time-Aware Consensus”, in Eurosys 2009, WIP session, Nuremberg, Germany, March 2009, Mar. 2009.
- Paulo Verissimo, Alysson Bessani, Miguel Correia, Nuno Ferreira Neves, Paulo Sousa, “Designing Modular and Redundant Cyber Architectures for Process Control: Lessons learned”, in Proceedings of the 42nd Hawaii International Conference for the Systems Sciences (HICSS-42), Waikoloa, Hawaii, January 2009., Jan. 2009.
- Alysson Bessani, Paulo Sousa, Miguel Correia, Nuno Ferreira Neves, Paulo Verissimo, “The CRUTIAL Way of Critical Infrastructure Protection”, IEEE Security and Privacy, vol. 6, no. 6, pp. 44-51, Nov/Dec 2008., Dec. 2008.
- João Antunes, Nuno Ferreira Neves, Paulo Verissimo, “Detection and Prediction of Resource-Exhaustion Vulnerabilities”, in Proceedings of the 19th IEEE International Symposium on Software Reliability Engineering, Seattle/Redmond, WA, USA, Nov. 2008.
- Hugo Ortiz, Paulo Sousa, Paulo Verissimo, “Towards Intrusion-Tolerant Process Control Software”, in 4th National Conference on Segurança Informática nas Organizações (SINO 2008), Coimbra, Portugal, October 2008., Oct. 2008.
- Miguel Correia, Alysson Bessani, Paulo Verissimo, “On Byzantine Generals with Alternative Plans”, Journal of Parallel and Distributed Computing, Vol. 68, Issue 9, pages 1291-1296, Elsevier., Sept. 2008.
- António Casimiro, Paolo Lollini, Mônica Dixit, Andrea Bondavalli, Paulo Verissimo, “A framework for dependable QoS adaptation in probabilistic environments”, in Proceedings of the 23rd ACM Symposium on Applied Computing, Dependable and Adaptive Distributed Systems Track, Fortaleza, Ceara, Brazil, March 2008., Mar. 2008.
- Paulo Verissimo, Nuno Ferreira Neves, Miguel Correia, “The CRUTIAL Reference Critical Information Infrastructure Architecture: A Blueprint”, International Journal of System of Systems Engineering, vol. 1, no. 1/2, pp. 78–95, Jan. 2008.
- Steven M. Bellovin, Terry V. Benzel, Bob Blakley, Dorothy E. Denning, Whitfield Diffie, Jeremy Epstein, Paulo Verissimo, “Information Assurance Technology Forecast 2008”, IEEE Security & Privacy, vol. 6, no. 1, pp. 10-17, January/February, 2008., Jan. 2008.
- Giuliana Santos Veronese, Miguel Correia, Lau Cheuk Lung, Paulo Verissimo, “On the Effects of Finite Memory on Intrusion-Tolerant Systems”, in The 13th IEEE Pacific Rim International Symposiumon Dependable Computing (PRDC 07), Dec. 2007.
- Paulo Sousa, Alysson Bessani, Miguel Correia, Nuno Ferreira Neves, Paulo Verissimo, “Resilient Intrusion Tolerance through Proactive and Reactive Recovery”, in Proceedings of the 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 07), Melbourne, Australia, pages 373-380, December 2007., Dec. 2007.
- Henrique Moniz, Nuno Ferreira Neves, Miguel Correia, António Casimiro, Paulo Verissimo, “Intrusion Tolerance in Wireless Environments: An Experimental Evaluation”, in Proceedings of the 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 07), Dec. 2007.
- João Antunes, Nuno Ferreira Neves, Paulo Verissimo, “Finding Local Resource Exhaustion Vulnerabilities”, in Student paper in Proceedings of the International Symposium on Software Reliability Engineering (ISSRE), Trollhättan, Sweden, November 2007., Nov. 2007.
- Gunjan Khanna, Mike Yu Cheng, Padma Varadharajan, Saurabh Bagchi, Miguel Correia, Paulo Verissimo, “Automated Rule-Based Diagnosis Through A Distributed Monitor System”, IEEE Transactions on Dependable and Secure Computing, vol. 4, no. 4, pp. 266-279, Oct-Dec, 2007, Oct. 2007.
- Alysson Bessani, Miguel Correia, Henrique Moniz, Nuno Ferreira Neves, Paulo Verissimo, “When 3f+1 is not Enough: Tradeoffs for Decentralized Asynchronous Byzantine Consensus”, in Proceedings of 21st International Symposium on Distributed Computing (DISC 07), Sept. 2007.
- Paulo Verissimo, “Assumptions: The Trojan Horses of Secure Protocols”, in In V. Gorodetsky, I. Kotenko, and V.A. Skormin (Eds.): "Mathematical Methods, Models and Architectures for Computer Networks Security" (MMM-ACNS) 2007, CCIS 1, pp. 34-41, 2007. Springer-Verlag., Sept. 2007.
- Alessandro Daidone, Silvano Chiaradonna, Andrea Bondavalli, Paulo Verissimo, “Analysis of a Redundant Architecture for Critical Infrastructure Protection”, in Architecting Dependable Systems V, Rogério de Lemos, Felicita Di Giandomenico, Cristina Gacek, Henry Muccini, Marco Vieira, Eds., ser. LNCS. Springer, Aug. 2007, vol. 5135.
- Paulo Verissimo, Nuno Ferreira Neves, Miguel Correia, Yves Deswarte, A. Abou El Kalam, Andrea Bondavalli, Alessandro Daidone, “The CRUTIAL Architecture for Critical Information Infrastructures”, in Architecting Dependable Systems V, Rogério de Lemos, Felicita Di Giandomenico, Cristina Gacek, Henry Muccini, Marco Vieira, Eds., ser. LNCS. Springer, Aug. 2007, vol. 5135.