Semantic search

From Navigators

Jump to: navigation, search
Previous     Results 21– 40    Next        (20 | 50 | 100 | 250 | 500)


  • João Antunes, Nuno Ferreira Neves, Miguel Correia, Paulo Verissimo, Rui Neves, “Vulnerability Removal with Attack Injection”, IEEE Transactions on Software Engineering, Special issue on Evaluation and Improvement of Software Dependability, Jun. 2010.

  • João Antunes, Nuno Ferreira Neves, Paulo Verissimo, “Using Attack Injection on Closed Protocols”, in Fast Abstract in Supplement of the International Conference on Dependable Systems and Networks (DSN'10), Jun. 2010.

  • António Casimiro, José Rufino, Luís Marques, Mário Calha, Paulo Verissimo, “Applying architectural hybridization in networked embedded systems”, in Proceedings of the 7th IFIP WG 10.2 International Workshop (SEUS 2009), Software Technologies for Embedded and Ubiquitous Systems, LNCS 5860, Sunggu Lee and Priya Narasimhan (Eds), Newport Beach, CA, USA, November 2009, Nov. 2009.

  • Paulo Verissimo, Miguel Correia, Nuno Ferreira Neves, Paulo Sousa, “Intrusion-Resilient Middleware Design and Validation”, in Information Assurance, Security and Privacy Services, ser. Handbooks in Information Systems. Emerald Group Publishing Limited, May 2009, vol. 4, pp. 615–678.

  • Steven M. Bellovin, Terry V. Benzel, Bob Blakley, Dorothy E. Denning, Whitfield Diffie, Jeremy Epstein, Paulo Verissimo, “Information Assurance Technology Forecast 2008”, IEEE Security & Privacy, vol. 6, no. 1, pp. 10-17, January/February, 2008., Jan. 2008.

Previous     Results 21– 40    Next        (20 | 50 | 100 | 250 | 500)
Personal tools
Navigators toolbox