Semantic search

From Navigators

Jump to: navigation, search
Previous     Results 21– 70    Next        (20 | 50 | 100 | 250 | 500)

Publications

  • João Antunes, Nuno Ferreira Neves, Miguel Correia, Paulo Verissimo, Rui Neves, “Vulnerability Removal with Attack Injection”, IEEE Transactions on Software Engineering, Special issue on Evaluation and Improvement of Software Dependability, Jun. 2010.

  • João Antunes, Nuno Ferreira Neves, Paulo Verissimo, “Using Attack Injection on Closed Protocols”, in Fast Abstract in Supplement of the International Conference on Dependable Systems and Networks (DSN'10), Jun. 2010.

  • António Casimiro, José Rufino, Luís Marques, Mário Calha, Paulo Verissimo, “Applying architectural hybridization in networked embedded systems”, in Proceedings of the 7th IFIP WG 10.2 International Workshop (SEUS 2009), Software Technologies for Embedded and Ubiquitous Systems, LNCS 5860, Sunggu Lee and Priya Narasimhan (Eds), Newport Beach, CA, USA, November 2009, Nov. 2009.

  • Paulo Verissimo, Miguel Correia, Nuno Ferreira Neves, Paulo Sousa, “Intrusion-Resilient Middleware Design and Validation”, in Information Assurance, Security and Privacy Services, ser. Handbooks in Information Systems. Emerald Group Publishing Limited, May 2009, vol. 4, pp. 615–678.

  • Steven M. Bellovin, Terry V. Benzel, Bob Blakley, Dorothy E. Denning, Whitfield Diffie, Jeremy Epstein, Paulo Verissimo, “Information Assurance Technology Forecast 2008”, IEEE Security & Privacy, vol. 6, no. 1, pp. 10-17, January/February, 2008., Jan. 2008.

  • João Antunes, Nuno Ferreira Neves, Paulo Verissimo, “Finding Local Resource Exhaustion Vulnerabilities”, in Student paper in Proceedings of the International Symposium on Software Reliability Engineering (ISSRE), Trollhättan, Sweden, November 2007., Nov. 2007.

  • Paulo Verissimo, “Assumptions: The Trojan Horses of Secure Protocols”, in In V. Gorodetsky, I. Kotenko, and V.A. Skormin (Eds.): "Mathematical Methods, Models and Architectures for Computer Networks Security" (MMM-ACNS) 2007, CCIS 1, pp. 34-41, 2007. Springer-Verlag., Sept. 2007.

  • Paulo Verissimo, Nuno Ferreira Neves, Miguel Correia, Yves Deswarte, A. Abou El Kalam, Andrea Bondavalli, Alessandro Daidone, “The CRUTIAL Architecture for Critical Information Infrastructures”, in Architecting Dependable Systems V, Rogério de Lemos, Felicita Di Giandomenico, Cristina Gacek, Henry Muccini, Marco Vieira, Eds., ser. LNCS. Springer, Aug. 2007, vol. 5135.

  • Alysson Bessani, Paulo Sousa, Miguel Correia, Nuno Ferreira Neves, Paulo Verissimo, “Intrusion-Tolerant Protection for Critical Infrastructures”, Missing institution, Tech. Rep., Apr. 2007. Technical Report DI/FCUL TR-07-8. Department of Computer Science, University of Lisboa. April 2007.

  • Paulo Verissimo, “Thou Shalt Not Trust non-Trustworthy Systems”, Jul. 2006. Keynote at the Workshop on Assurance in Distributed Systems and Networks (ADSN2006), with the 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006), Lisboa, Portugal, July 2006.

  • José Rufino, Paulo Verissimo, Guilherme Arroz, Carlos Almeida, “Control of Inaccessibility in CANELy”, in Proceedings of the 6th IEEE International Workshop on Factory Communication Systems (WFCS06), Torino, Italy, June, 2006., Jun. 2006.

  • Henrique Moniz, Nuno Ferreira Neves, Miguel Correia, Paulo Verissimo, “Randomized Intrusion-Tolerant Asynchronous Services”, in Proceedings of the International Conference on Dependable Systems and Networks (DSN), Philadelphia, USA, pages 568-577, June 2006, Jun. 2006.

  • Nuno Ferreira Neves, João Antunes, Miguel Correia, Paulo Verissimo, Rui Neves, “Using Attack Injection to Discover New Vulnerabilities”, in Proceedings of the International Conference on Dependable Systems and Networks (DSN), Philadelphia, USA, June 2006., Jun. 2006.

  • G. Dondossola, G. Deconinck, F. Di Giandomenico, S. Donatelli, M. Kaaniche, Paulo Verissimo, “Critical Utility Infrastructure Resilience”, in In Workshop on Security and Networking in Critical Real-Time and Embedded Systems (CRTES'06), with RTAS'06, San Jose, California, USA, April 2006., Apr. 2006.

  • Nuno Ferreira Neves, Miguel Correia, Paulo Verissimo, “Solving Vector Consensus with a Wormhole”, IEEE Transactions on Parallel and Distributed Systems, vol. 16, no. 12, pp. 1120-1131, December 2005., Dec. 2005.

Previous     Results 21– 70    Next        (20 | 50 | 100 | 250 | 500)
Views
Personal tools
Toolbox
Navigators toolbox