Semantic search

From Navigators

Jump to: navigation, search
Previous     Results 51– 100    Next        (20 | 50 | 100 | 250 | 500)

Publications

  • João Antunes, Nuno Ferreira Neves, Paulo Verissimo, “Using Attack Injection on Closed Protocols”, in Fast Abstract in Supplement of the International Conference on Dependable Systems and Networks (DSN'10), Jun. 2010.

  • João Antunes, Nuno Ferreira Neves, Miguel Correia, Paulo Verissimo, Rui Neves, “Vulnerability Removal with Attack Injection”, IEEE Transactions on Software Engineering, Special issue on Evaluation and Improvement of Software Dependability, Jun. 2010.

  • Paulo Verissimo, Miguel Correia, Nuno Ferreira Neves, Paulo Sousa, “Intrusion-Resilient Middleware Design and Validation”, in Information Assurance, Security and Privacy Services, ser. Handbooks in Information Systems. Emerald Group Publishing Limited, May 2009, vol. 4, pp. 615–678.

  • João Antunes, Nuno Ferreira Neves, Paulo Verissimo, “Finding Local Resource Exhaustion Vulnerabilities”, in Student paper in Proceedings of the International Symposium on Software Reliability Engineering (ISSRE), Trollhättan, Sweden, November 2007., Nov. 2007.

  • Paulo Verissimo, Nuno Ferreira Neves, Miguel Correia, Yves Deswarte, A. Abou El Kalam, Andrea Bondavalli, Alessandro Daidone, “The CRUTIAL Architecture for Critical Information Infrastructures”, in Architecting Dependable Systems V, Rogério de Lemos, Felicita Di Giandomenico, Cristina Gacek, Henry Muccini, Marco Vieira, Eds., ser. LNCS. Springer, Aug. 2007, vol. 5135.

  • Alysson Bessani, Paulo Sousa, Miguel Correia, Nuno Ferreira Neves, Paulo Verissimo, “Intrusion-Tolerant Protection for Critical Infrastructures”, Missing institution, Tech. Rep., Apr. 2007. Technical Report DI/FCUL TR-07-8. Department of Computer Science, University of Lisboa. April 2007.

  • Nuno Ferreira Neves, João Antunes, Miguel Correia, Paulo Verissimo, Rui Neves, “Using Attack Injection to Discover New Vulnerabilities”, in Proceedings of the International Conference on Dependable Systems and Networks (DSN), Philadelphia, USA, June 2006., Jun. 2006.

  • Henrique Moniz, Nuno Ferreira Neves, Miguel Correia, Paulo Verissimo, “Randomized Intrusion-Tolerant Asynchronous Services”, in Proceedings of the International Conference on Dependable Systems and Networks (DSN), Philadelphia, USA, pages 568-577, June 2006, Jun. 2006.

  • Paulo Sousa, Nuno Ferreira Neves, Paulo Verissimo, “Resilient State Machine Replication”, in In Proceedings of the 11th Pacific Rim International Symposium on Dependable Computing (PRDC), Changsha, China, pages 305-309, December 2005., Dec. 2005.

  • Nuno Ferreira Neves, Miguel Correia, Paulo Verissimo, “Solving Vector Consensus with a Wormhole”, IEEE Transactions on Parallel and Distributed Systems, vol. 16, no. 12, pp. 1120-1131, December 2005., Dec. 2005.

  • José Pascoal, Tiago Jorge, Miguel Correia, Nuno Ferreira Neves, Paulo Verissimo, “FTP Tolerante a Intrusões”, in In 1ª Conferência Nacional sobre Segurança Informática nas Organizações. Covilhã, Portugal, November 2005., Oct. 2005.

  • Paulo Sousa, Nuno Ferreira Neves, Paulo Verissimo, “A New Approach to Proactive Recovery”, in In Fifth European Dependable Computing Conference (EDCC-5) Supplemental Volume. Budapest, Hungary, pages 35-40, April 2005., Apr. 2005.

  • Nuno Ferreira Neves, Miguel Correia, Paulo Verissimo, “Wormhole-Aware Byzantine Protocols”, in 2nd Bertinoro Workshop on Future Directions in Distributed Computing: Survivability - Obstacles and Solutions (FuDiCo: SOS), Bertinoro, Italy, June, 2004., Jun. 2004.

  • Miguel Correia, Nuno Ferreira Neves, Lau Cheuk Lung, Paulo Verissimo, “Low Complexity Byzantine-Resilient Consensus”, Missing institution, Tech. Rep., Oct. 2003. Technical Report DI/FCUL TR-03-25, Department of Computer Science, University of Lisbon. August 2003

Previous     Results 51– 100    Next        (20 | 50 | 100 | 250 | 500)
Views
Personal tools
Toolbox
Navigators toolbox