Agostinho M. Brito Jr.

According to our database1, Agostinho M. Brito Jr. authored at least 14 papers between 2007 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Smart Detection-IoT: A DDoS Sensor System for Internet of Things.
Proceedings of the 2020 International Conference on Systems, Signals and Image Processing, 2020

2019
Smart Detection: An Online Approach for DoS/DDoS Attack Detection Using Machine Learning.
Secur. Commun. Networks, 2019

2014
Learning Remote Computer Fingerprinting.
Proceedings of the Computational Intelligence in Digital Forensics: Forensic Investigation and Applications, 2014

2011
A Qualitative Survey of Active TCP/IP Fingerprinting Tools and Techniques for Operating Systems Identification.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011

2009
Advances in network topology security visualisation.
Int. J. Syst. Syst. Eng., 2009

A New Method for Recognizing Operating Systems of Automation Devices.
Proceedings of 12th IEEE International Conference on Emerging Technologies and Factory Automation, 2009

An Effective TCP/IP Fingerprinting Technique Based on Strange Attractors Classification.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2009

Application Filters for TCP/IP Industrial Automation Protocols.
Proceedings of the Critical Information Infrastructures Security, 2009

A Data Mining Based Analysis of Nmap Operating System Fingerprint Database.
Proceedings of the Computational Intelligence in Security for Information Systems, 2009

2008
A model for security management of SCADA systems.
Proceedings of 13th IEEE International Conference on Emerging Technologies and Factory Automation, 2008

Analysis of Malicious Traffic in Modbus/TCP Communications.
Proceedings of the Critical Information Infrastructure Security, 2008

2007
Automating security tests for industrial automation devices using neural networks.
Proceedings of 12th IEEE International Conference on Emerging Technologies and Factory Automation, 2007

Using a packet manipulation tool for security analysis of industrial network protocols.
Proceedings of 12th IEEE International Conference on Emerging Technologies and Factory Automation, 2007

Application of Kohonen Maps to Improve Security Tests on Automation Devices.
Proceedings of the Critical Information Infrastructures Security, 2007


  Loading...