Semantic search
From Navigators
Publications
- Steven M. Bellovin, Terry V. Benzel, Bob Blakley, Dorothy E. Denning, Whitfield Diffie, Jeremy Epstein, Paulo Verissimo, “Information Assurance Technology Forecast 2008”, IEEE Security & Privacy, vol. 6, no. 1, pp. 10-17, January/February, 2008., Jan. 2008.
- Giuliana Santos Veronese, Miguel Correia, Lau Cheuk Lung, Paulo Verissimo, “On the Effects of Finite Memory on Intrusion-Tolerant Systems”, in The 13th IEEE Pacific Rim International Symposiumon Dependable Computing (PRDC 07), Dec. 2007.
- Paulo Sousa, Alysson Bessani, Miguel Correia, Nuno Ferreira Neves, Paulo Verissimo, “Resilient Intrusion Tolerance through Proactive and Reactive Recovery”, in Proceedings of the 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 07), Melbourne, Australia, pages 373-380, December 2007., Dec. 2007.
- Henrique Moniz, Nuno Ferreira Neves, Miguel Correia, António Casimiro, Paulo Verissimo, “Intrusion Tolerance in Wireless Environments: An Experimental Evaluation”, in Proceedings of the 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 07), Dec. 2007.
- João Antunes, Nuno Ferreira Neves, Paulo Verissimo, “Finding Local Resource Exhaustion Vulnerabilities”, in Student paper in Proceedings of the International Symposium on Software Reliability Engineering (ISSRE), Trollhättan, Sweden, November 2007., Nov. 2007.
- Gunjan Khanna, Mike Yu Cheng, Padma Varadharajan, Saurabh Bagchi, Miguel Correia, Paulo Verissimo, “Automated Rule-Based Diagnosis Through A Distributed Monitor System”, IEEE Transactions on Dependable and Secure Computing, vol. 4, no. 4, pp. 266-279, Oct-Dec, 2007, Oct. 2007.
- Alysson Bessani, Miguel Correia, Henrique Moniz, Nuno Ferreira Neves, Paulo Verissimo, “When 3f+1 is not Enough: Tradeoffs for Decentralized Asynchronous Byzantine Consensus”, in Proceedings of 21st International Symposium on Distributed Computing (DISC 07), Sept. 2007.
- Paulo Verissimo, “Assumptions: The Trojan Horses of Secure Protocols”, in In V. Gorodetsky, I. Kotenko, and V.A. Skormin (Eds.): "Mathematical Methods, Models and Architectures for Computer Networks Security" (MMM-ACNS) 2007, CCIS 1, pp. 34-41, 2007. Springer-Verlag., Sept. 2007.
- Alessandro Daidone, Silvano Chiaradonna, Andrea Bondavalli, Paulo Verissimo, “Analysis of a Redundant Architecture for Critical Infrastructure Protection”, in Architecting Dependable Systems V, Rogério de Lemos, Felicita Di Giandomenico, Cristina Gacek, Henry Muccini, Marco Vieira, Eds., ser. LNCS. Springer, Aug. 2007, vol. 5135.
- Paulo Verissimo, Nuno Ferreira Neves, Miguel Correia, Yves Deswarte, A. Abou El Kalam, Andrea Bondavalli, Alessandro Daidone, “The CRUTIAL Architecture for Critical Information Infrastructures”, in Architecting Dependable Systems V, Rogério de Lemos, Felicita Di Giandomenico, Cristina Gacek, Henry Muccini, Marco Vieira, Eds., ser. LNCS. Springer, Aug. 2007, vol. 5135.
- Paulo Sousa, Nuno Ferreira Neves, Paulo Verissimo, “Hidden Problems of Asynchronous Proactive Recovery”, in Third Workshop on Hot Topics in System Dependability (HotDep 2007), Edinburgh, UK, Jun. 2007.
- António Casimiro, Jörg Kaiser, Paulo Verissimo, “Generic-Events Architecture: Integrating real-world aspects in event-based systems”, in Architecting Dependable Systems IV, Rogério de Lemos, Cristina Gacek, Alexander Romanovsky, Eds., ser. LNCS. Springer, Jun. 2007, vol. 4615.
- Alysson Bessani, Paulo Sousa, Miguel Correia, Nuno Ferreira Neves, Paulo Verissimo, “Intrusion-Tolerant Protection for Critical Infrastructures”, Missing institution, Tech. Rep., Apr. 2007. Technical Report DI/FCUL TR-07-8. Department of Computer Science, University of Lisboa. April 2007.
- Miguel Correia, Nuno Ferreira Neves, Lau Cheuk Lung, Paulo Verissimo, “Worm-IT - A Wormhole-based Intrusion-Tolerant Group Communication System”, Journal of Systems & Software, vol. 80, n. 2, pages 178-197, Elsevier, February 2007, Feb. 2007.
- José Rufino, Carlos Almeida, Paulo Verissimo, Guilherme Arroz, “Enforcing Dependability and Timeliness in Controller Area Networks”, in Proceedings of the 32nd Annual Conference of the IEEE Industrial Electronics Society (IECON06), Paris, France, November, 2006., Nov. 2006.
- Paulo Sousa, Nuno Ferreira Neves, Paulo Verissimo, William H. Sanders, “Proactive Resilience Revisited: The Delicate Balance Between Resisting Intrusions and Remaining Available”, in Proceedings of the 25th IEEE Symposium on Reliable Distributed Systems (SRDS), Leeds, UK, pages 71-80, October 2006., Oct. 2006.
- Henrique Moniz, Nuno Ferreira Neves, Miguel Correia, Paulo Verissimo, “Experimental Comparison of Local and Shared Coin Randomized Consensus Protocols”, in Proceedings of the 25th IEEE Symposium on Reliable Distributed Systems (SRDS), Leeds, UK, October 2006, Oct. 2006.
- António Casimiro, Odorico Mendizabal, Paulo Verissimo, “On the development of dependable embedded applications using specialized wormholes”, in 3rd International Workshop on Dependable Embedded Systems (WDES-06), in conjunction with the 25th Symposium on Reliable Distributed Systems, Leeds, UK, October 2006, Oct. 2006.
- José Rufino, Paulo Verissimo, Carlos Almeida, Guilherme Arroz, “Integrating Inaccessibility Control and Timer Management in CANELy”, in Proceedings of the 11th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2006), Prague, Czech Republic, September, 2006., Sept. 2006.
- Paulo Verissimo, Nuno Ferreira Neves, C. Cachin, J. A. Poritz, D. Powell, Yves Deswarte, R. J. Stroud, I. S. Welch, “Intrusion-Tolerant Middleware: The Road to Automatic Security”, IEEE Security & Privacy, vol. 4, no. 4, pp. 54-62, Jul./Aug. 2006., Aug. 2006.