Carlos Becker Westphall

Orcid: 0000-0002-5391-7942

Affiliations:
  • Federal University of Santa Catarina, Brazil


According to our database1, Carlos Becker Westphall authored at least 94 papers between 1993 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Distributed AgriFood Supply Chains.
J. Netw. Syst. Manag., July, 2024

Performance of security options for message protocols: A comparative analysis.
Int. J. Netw. Manag., 2024

A Survey of Large Language Models in Cybersecurity.
CoRR, 2024

Hierarchical multistep approach for intrusion detection and identification in IoT and Fog computing-based environments.
Ad Hoc Networks, 2024

Access control of IoT devices based on smart contracts and double-layer channels.
Proceedings of the International Conference on Information Networking, 2024

2023
IoT Energy Management for Smart Homes' Water Management System.
J. Circuits Syst. Comput., September, 2023

A Formal Verification of a Reputation Multi-Factor Authentication Mechanism for Constrained Devices and Low-Power Wide-Area Network Using Temporal Logic.
Sensors, August, 2023

DNNET-Ensemble approach to detecting and identifying attacks in IoT environments.
Proceedings of the 41st Brazilian Symposium on Computer Networks and Distributed Systems, 2023

Advances in Distributed Load Orchestration for Vision Computing in 5G-MEC Environments.
Proceedings of the International Conference on Information Networking, 2023

An Experimentation on CoAP Multi Factor Authentication Mechanism with Reputation for Internet of Things Constrained Devices and Low Power Wide Area Network.
Proceedings of the International Conference on Information Networking, 2023

2022
Distributed Load Orchestration for Vision Computing in Multi-Access Edge Computing.
CoRR, 2022

A Bibliometrics Analysis on 28 years of Authentication and Threat Model Area.
CoRR, 2022

Characteristics and Main Threats about Multi-Factor Authentication: A Survey.
CoRR, 2022

Trends, Opportunities, and Challenges in Using Restricted Device Authentication in Fog Computing.
CoRR, 2022

Intrusion detection and prevention in fog based IoT environments: A systematic literature review.
Comput. Networks, 2022

Two-step ensemble approach for intrusion detection and identification in IoT and fog computing environments.
Comput. Electr. Eng., 2022

2021
Mutual authentication with multi-factor in IoT-Fog-Cloud environment.
J. Netw. Comput. Appl., 2021

Models of Computing as a Service and IoT: an analysis of the current scenario with applications using LPWAN.
CoRR, 2021

Autonomic Management of Power Consumption with IoT and Fog Computing.
CoRR, 2021

Autonomic energy management with Fog Computing.
Comput. Electr. Eng., 2021

Experiments on Energy Optimization in Smart Residences.
Proceedings of the International Conference on Software, 2021

2020
Autonomic Intrusion Detection and Response Using Big Data.
IEEE Syst. J., 2020

Hybrid approach to intrusion detection in fog-based IoT environments.
Comput. Networks, 2020

2019
Order@Cloud: An agnostic meta-heuristic for VM provisioning, adaptation, and organisation.
Int. J. Netw. Manag., 2019

Privacy Policies Model in Access Control.
Proceedings of the 2019 IEEE International Systems Conference, 2019

Autonomic IoT Battery Management with Fog Computing.
Proceedings of the Green, Pervasive, and Cloud Computing - 14th International Conference, 2019

Mutual Authentication for IoT in the Context of Fog Computing.
Proceedings of the 11th International Conference on Communication Systems & Networks, 2019

2018
Autonomic Intrusion Response in Distributed Computing using Big Data.
CoRR, 2018

Autenticação mútua de nós sensores com nós intermediários para IoT no contexto de Fog Computing.
Proceedings of the Companion Proceedings of the 36th Brazilian Symposium on Computer Networks and Distributed Systems, 2018

2017
Cloud identity management: A survey on privacy strategies.
Comput. Networks, 2017

Improving Cloud Computing Virtual Machines Balancing through Hosts and Virtual Machines Similarities.
Proceedings of the 2017 IEEE World Congress on Services, 2017

2016
A framework and risk assessment approaches for risk-based access control in the cloud.
J. Netw. Comput. Appl., 2016

A Distributed Autonomic Management Framework for Cloud Computing Orchestration.
Proceedings of the IEEE World Congress on Services, 2016

Order@Cloud: A VM organisation framework based on multi-objectives placement ranking.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

2015
Cloud resource management: A survey on forecasting and profiling models.
J. Netw. Comput. Appl., 2015

An Approach to IdM with Privacy in the Cloud.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
A cyclical evaluation model of information security maturity.
Inf. Manag. Comput. Secur., 2014

Privacy-preserving identity federations in the cloud: a proof of concept.
Int. J. Secur. Networks, 2014

Panoptes: A monitoring architecture and framework for supporting autonomic Clouds.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

A dynamic risk-based access control architecture for cloud computing.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

2012
Environment, Services and Network Management for Green Clouds.
CLEI Electron. J., 2012

Hybrid protocol for group key management and transparent cluster interconnection in a secure wireless sensor network.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

Proposal and development of the Web services input validation model.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

2011
Toward an architecture for monitoring private clouds.
IEEE Commun. Mag., 2011

Simulator improvements to validate the Green Cloud Computing approach.
Proceedings of the 7th Latin American Network Operations and Management Symposium, 2011

2010
Management of Security and Security for Management Systems.
J. Netw. Syst. Manag., 2010

Analytical Model to Evaluate the Performance of Mobile Agents in a Generic Network Topology.
J. Netw. Syst. Manag., 2010

Intrusion Detection for Grid and Cloud Computing.
IT Prof., 2010

A Cloud Computing Solution for Patient's Data Collection in Health Care Institutions.
Proceedings of the Second International Conference on eHealth, 2010

2009
Self-Configuration Channel in the Wireless Networks.
Proceedings of the Eighth International Conference on Networks, 2009

2008
Pervasive Management for Ubiquitous Networks and Services - Report on NOMS 2008.
J. Netw. Syst. Manag., 2008

A Security Framework for Input Validation.
Proceedings of the Second International Conference on Emerging Security Information, 2008

Intrusion Detection for Computational Grids.
Proceedings of the NTMS 2008, 2008

Towards Advance Reservation in Large-Scale Grids.
Proceedings of the Third International Conference on Systems, 2008

User Maturity Based Trust Management for Grid Computing.
Proceedings of the Seventh International Conference on Networking (ICN 2008), 2008

A Price-Based Task Scheduling for Grid Computing.
Proceedings of the Seventh International Conference on Networking (ICN 2008), 2008

2007
Improvements in the model for interoperability of intrusion detection responses compatible with the IDWG model.
Int. J. Netw. Manag., 2007

Design and Evaluation of a Grid Computing Based Architecture for Integrating Heterogeneous IDSs.
Proceedings of the Global Communications Conference, 2007

2006
Evaluation of QoS Metrics in Ad Hoc Networks with the use of Secure Routing Protocols.
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006

An Intrusion Answer Model Compatible with the Alerts IDWG Model.
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006

Towards Grid-based Intrusion Detection.
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006

Towards a Middleware for Mobile Grids.
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006

Composition of a DIDS by integrating heterogeneous IDSs on grids.
Proceedings of the 4th international workshop on Middleware for grid computing, 2006

A Grid-based Intrusion Detection System.
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006

Grid Middleware for Mobile Decision Support Systems.
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006

An Architecture to Provide QoS in Web Services.
Proceedings of IEEE International Conference on Communications, 2006

Defending Grids Against Intrusions.
Proceedings of the Self-Organizing Systems, First International Workshop, 2006

Towards a Grid of Sensors for Telemedicine.
Proceedings of the 19th IEEE International Symposium on Computer-Based Medical Systems (CBMS 2006), 2006

Security Approaches for Cluster Interconnection in a Wireless Sensor Network.
Proceedings of the Management of Convergence Networks and Services, 2006

2005
Distribution of Network Management Policies with Emphasis on Quality of Service.
Proceedings of the 4th Latin American Network Operations and Management Symposium, 2005

Performance Analysis and Service Differentiation in the MAC SubLayer of IEEE 802.11e Ad Hoc Networks.
Proceedings of the Telecommunications 2005: Advanced Industrial Conference on Telecommunications / Service Assurance with Partial and Intermittent Resources Conference / E-Learning on Telecommunications Workshop (AICT / SAPIR / ELETE 2005), 2005

2004
Grids of agents for computer and telecommunication network management.
Concurr. Pract. Exp., 2004

Distributed Artificial Intelligence for Network Management Systems ? New Approaches.
Proceedings of the First International Workshop, 2004

2003
Extending TINA with Secure On-Line Accounting Services.
J. Netw. Syst. Manag., 2003

Automations in Computer Network Management Utilizing Computational Intelligence.
Proceedings of the 3rd Latin American Network Operations and Management Symposium, 2003

An Authentication for Non-Adjacent LSRs in the LDP.
Proceedings of the 3rd Latin American Network Operations and Management Symposium, 2003

2002
Mandatory Security Policies for CORBA Security Model.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002

Quality of Service for Ad Hoc Wireless Network.
Proceedings of the 22nd International Conference of the Chilean Computer Science Society (SCCC 2002), 2002

2001
Decentralized Network Management Using Distributed Artificial Intelligence.
J. Netw. Syst. Manag., 2001

Development of a Prototype Based on TINA Accounting and Security Management Architecture.
Proceedings of the 21st International Conference of the Chilean Computer Science Society (SCCC 2001), 2001

Using Fuzzy Specifications to Manage QoS.
Proceedings of the 2nd Latin American Network Operations and Management Symposium, 2001

Development of a Prototype based on TINA Accounting Management Architecture.
Proceedings of the 2001 IEEE/IFIP International Symposium on Integrated Network Management, 2001

Development of Accounting Management Based Service Environment in Tina, Java and Corba Architectures.
Proceedings of the Networking, 2001

Security within TINA accounting architecture management.
Proceedings of the IEEE International Conference on Communications, 2001

Accounting management based service environment in a TINA architecture.
Proceedings of the IEEE International Conference on Communications, 2001

2000
Distributed Network Management Using SNMP, Java, WWW, and CORBA.
J. Netw. Syst. Manag., 2000

1999
Wireless communications: security management against cloned cellular phones.
Proceedings of the 1999 IEEE Wireless Communications and Networking Conference, 1999

TMN Distributed Management with CORBA: A Experience in Alarm Surveillance.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999

Security management against cloned cellular telephones.
Proceedings of the IEEE International Conference on Networks 1999, 1999

1997
Formal design of a telecommunications networks management system.
Proceedings of the Second IEEE Symposium on Computers and Communications (ISCC 1997), 1997

Proactive network management using remote monitoring and artificial intelligence techniques.
Proceedings of the Second IEEE Symposium on Computers and Communications (ISCC 1997), 1997

Proactive Management of Computer Networks Using Artificial Intelligence Agents and Techniques.
Proceedings of the Integrated Network Management V, 1997

1996
OSI Usage Metering Function for the OSIMIS Management Platform.
J. Netw. Syst. Manag., 1996

1993
Management in Broadband Networks: ATM Networks Fault Management.
Proceedings of the Advanced Information Processing Techniques for LAN and MAN Management, 1993


  Loading...