Altair Olivo Santin

Orcid: 0000-0002-2341-2177

Affiliations:
  • Pontifical Catholic University of Parana - PUCPR, Curitiba, PR, Brazil


According to our database1, Altair Olivo Santin authored at least 83 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Detection of quality of service degradation on multi-tenant containerized services.
J. Netw. Comput. Appl., 2024

Toward a Reliable Network-Based Intrusion Detection Model for SCADA: A Classification with Reject Option Approach.
Proceedings of the International Joint Conference on Neural Networks, 2024

A Non-interactive One-Time Password-Based Method to Enhance the Vault Security.
Proceedings of the Advanced Information Networking and Applications, 2024

A Review of Social Network Regulations and Mechanisms for Safeguarding Children's Privacy.
Proceedings of the Advanced Information Networking and Applications, 2024

2023
Federated learning for reliable model updates in network-based intrusion detection.
Comput. Secur., October, 2023

Reinforcement Learning for Intrusion Detection: More Model Longness and Fewer Updates.
IEEE Trans. Netw. Serv. Manag., June, 2023

Toward a Reliable Evaluation of Machine Learning Schemes for Network-Based Intrusion Detection.
IEEE Internet Things Mag., June, 2023

A Dynamic Network-based Intrusion Detection Model for Industrial Control Systems.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Towards a Reliable Hierarchical Android Malware Detection Through Image-based CNN.
Proceedings of the 20th IEEE Consumer Communications & Networking Conference, 2023

A Dynamic Machine Learning Scheme for Reliable Network-Based Intrusion Detection.
Proceedings of the Advanced Information Networking and Applications, 2023

2022
Toward feasible machine learning model updates in network-based intrusion detection.
Comput. Networks, 2022

A motion-based approach for real-time detection of pornographic content in videos.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022

Towards Multi-view Android Malware Detection Through Image-based Deep Learning.
Proceedings of the 2022 International Wireless Communications and Mobile Computing, 2022

A Machine Learning-Based Digital Twin Model for Pressure Prediction in the Fuel Injection System.
Proceedings of the IECON 2022, 2022

Intrusion Detection Model Updates Through GAN Data Augmentation and Transfer Learning.
Proceedings of the IEEE Global Communications Conference, 2022

Detection of Service Provider Hardware Over-commitment in Container Orchestration Environments.
Proceedings of the IEEE Global Communications Conference, 2022

2021
Machine Learning Intrusion Detection in Big Data Era: A Multi-Objective Approach for Longer Model Lifespans.
IEEE Trans. Netw. Sci. Eng., 2021

Spam Detection Based on Feature Evolution to Deal with Concept Drift.
J. Univers. Comput. Sci., 2021

Enhancing service maintainability by monitoring and auditing SLA in cloud computing.
Clust. Comput., 2021

A Deep Autoencoder and RNN Model for Indoor Localization with Variable Propagation Loss.
Proceedings of the 17th International Conference on Wireless and Mobile Computing, 2021

A Multi-View Intrusion Detection Model for Reliable and Autonomous Model Updates.
Proceedings of the ICC 2021, 2021

A Machine Learning Model for Detection of Docker-based APP Overbooking on Kubernetes.
Proceedings of the ICC 2021, 2021

A Reminiscent Intrusion Detection Model Based on Deep Autoencoders and Transfer Learning.
Proceedings of the IEEE Global Communications Conference, 2021

Improving Intrusion Detection Confidence Through a Moving Target Defense Strategy.
Proceedings of the IEEE Global Communications Conference, 2021

2020
PPCensor: Architecture for real-time pornography detection in video streaming.
Future Gener. Comput. Syst., 2020

Towards Real-time Video Content Detection in Resource Constrained Devices.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

A Host-based Intrusion Detection Model Based on OS Diversity for SCADA.
Proceedings of the 46th Annual Conference of the IEEE Industrial Electronics Society, 2020

A Reliable Semi-Supervised Intrusion Detection Model: One Year of Network Traffic Anomalies.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

A Long-Lasting Reinforcement Learning Intrusion Detection Model.
Proceedings of the Advanced Information Networking and Applications, 2020

Identity and Access Management for IoT in Smart Grid.
Proceedings of the Advanced Information Networking and Applications, 2020

2019
Using Blockchains to Implement Distributed Measuring Systems.
IEEE Trans. Instrum. Meas., 2019

SDN-based and multitenant-aware resource provisioning mechanism for cloud-based big data streaming.
J. Netw. Comput. Appl., 2019

BigFlow: Real-time and reliable anomaly-based intrusion detection for high-speed networks.
Future Gener. Comput. Syst., 2019

Towards Reliable Intrusion Detection in High Speed Networks.
Proceedings of the Companion Proceedings of the 37th Brazilian Symposium on Computer Networks and Distributed Systems, 2019

2018
A Smart Meter and Smart House Integrated to an IdM and Key-based Scheme for Providing Integral Security for a Smart Grid ICT.
Mob. Networks Appl., 2018

A reliable and energy-efficient classifier combination scheme for intrusion detection in embedded systems.
Comput. Secur., 2018

Enabling Anomaly-based Intrusion Detection Through Model Generalization.
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018

Are fintechs really a hype? A machine learning-based polarity analysis of Brazilian posts on social media.
Proceedings of the 16th IEEE International Conference on Industrial Informatics, 2018

How blockchains can improve measuring instruments regulation and control.
Proceedings of the IEEE International Instrumentation and Measurement Technology Conference, 2018

A Machine Learning Auditing Model for Detection of Multi-Tenancy Issues Within Tenant Domain.
Proceedings of the 18th IEEE/ACM International Symposium on Cluster, 2018

2017
Towards an Energy-Efficient Anomaly-Based Intrusion Detection Engine for Embedded Systems.
IEEE Trans. Computers, 2017

Toward a reliable anomaly-based intrusion detection in real-world environments.
Comput. Networks, 2017

Stream learning and anomaly-based intrusion detection in the adversarial settings.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

A multi-domain role activation model.
Proceedings of the IEEE International Conference on Communications, 2017

A Resilient Stream Learning Intrusion Detection Mechanism for Real-Time Analysis of Network Traffic.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

2016
Providing security and privacy in smart house through mobile cloud computing.
Proceedings of the 8th IEEE Latin-American Conference on Communications, 2016

Insights on the resilience and capacity of AMI wireless networks.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

On the dynamics of the RPL protocol in AMI networks under jamming attacks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

2015
Method for testing the fault tolerance of MapReduce frameworks.
Comput. Networks, 2015

A Usage Control Platform Based on Rule Templates and Authorization Credentials.
Proceedings of the XXXIII Brazilian Symposium on Computer Networks and Distributed Systems, 2015

Managing distributed UCONabc policies with authorization assertions and policy templates.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015

The energy cost of network security: A hardware vs. software comparison.
Proceedings of the 2015 IEEE International Symposium on Circuits and Systems, 2015

An IdM and Key-Based Authentication Method for Providing Single Sign-On in IoT.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

An Approach to Deal with Processing Surges in Cloud Computing.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

2014
A (UCON<sub>ABC</sub>) Resilient Authorization Evaluation for Cloud Computing.
IEEE Trans. Parallel Distributed Syst., 2014

Algorithms for a distributed IDS in MANETs.
J. Comput. Syst. Sci., 2014

Moving Network Protection from Software to Hardware: An Energy Efficiency Analysis.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2014

2013
Evaluation of desktop operating systems under thrashing conditions.
J. Braz. Comput. Soc., 2013

Mitigating XML Injection 0-Day Attacks through Strategy-Based Detection Systems.
IEEE Secur. Priv., 2013

Obtaining the threat model for e-mail phishing.
Appl. Soft Comput., 2013

2012
Integral Federated Identity Management for Cloud Computing.
Proceedings of the 5th International Conference on New Technologies, 2012

Distributed Algorithms for the Creation of a New Distributed IDS in MANETs.
Proceedings of the Internet and Distributed Computing Systems, 2012

A Distributed IDS for Ad Hoc Networks.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2011
Applying a usage control model in an operating system kernel.
J. Netw. Comput. Appl., 2011

2010
Octopus-IIDS: An anomaly based intelligent intrusion detection system.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

SP2MS: A MANet-Based P2P Service.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

2009
Policy management architecture based on provisioning model and authorization certificates.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

Applying quorum role in network management.
Proceedings of the Integrated Network Management, 2009

Policy control management for Web Services.
Proceedings of the Integrated Network Management, 2009

Distributed Usage Control Architecture for Business Coalitions.
Proceedings of IEEE International Conference on Communications, 2009

A Public Keys Based Architecture for P2P Identification, Content Authenticity and Reputation.
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009

2008
A Three-Ballot-Based Secure Electronic Voting System.
IEEE Secur. Priv., 2008

A pull-based e-mail architecture.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

Protocol of Authenticity to Provide Legal Security in e-Contracts - A Prototype.
Proceedings of the ICE-B 2008, 2008

An Experimental Peer-to-Peer E-mail System.
Proceedings of the 11th IEEE International Conference on Computational Science and Engineering, 2008

2007
Web2Peer: A Peer-to-Peer Infrastructure for Publishing/Locating/Replicating Web Pages on Internet.
Proceedings of the International Symposium on Autonomous Decentralized Systems (ISADS 2007), 2007

A Grammar for Specifying Usage Control Policies.
Proceedings of IEEE International Conference on Communications, 2007

A Three-Pass Protocol for Cryptography Based on Padding for Wireless Networks.
Proceedings of the 4th IEEE Consumer Communications and Networking Conference, 2007

Implementing a Peer-to-Peer Web Browser for Publishing and Searching Web Pages on Internet.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2004
Teias de federações.
PhD thesis, 2004

2003
Federation Web: A Scheme to Compound Authorization Chains on Large-Scale Distributed Systems.
Proceedings of the 22nd Symposium on Reliable Distributed Systems (SRDS 2003), 2003

Building Trust Chains between CORBA Objects.
Proceedings of the Dependable Computing, First Latin-American Symposium, 2003

Extending the SDSI / SPKI Model through Federation Webs.
Proceedings of the Communications and Multimedia Security, 2003


  Loading...