Jose Andre Morales
Orcid: 0000-0001-7177-8192
According to our database1,
Jose Andre Morales
authored at least 38 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Insights on Implementing a Metrics Baseline for Post-Deployment AI Container Monitoring.
Proceedings of the 2024 International Conference on Software and Systems Processes, 2024
2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
2020
Proceedings of the Computational Science - ICCS 2020, 2020
Security impacts of sub-optimal DevSecOps implementations in a highly regulated environment.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
2019
Commun. ACM, 2019
Proceedings of the Advances in Human Factors in Cybersecurity, 2019
2018
Int. J. Syst. Softw. Secur. Prot., 2018
Proceedings of the 19th International Conference on Agile Software Development, 2018
Proceedings of the Computational Science - ICCS 2018, 2018
2017
Proceedings of the 4th IEEE International Conference on Cyber Security and Cloud Computing, 2017
Using semi-supervised machine learning to address the Big Data problem in DNS networks.
Proceedings of the IEEE 7th Annual Computing and Communication Workshop and Conference, 2017
2016
EAI Endorsed Trans. Security Safety, 2016
Epistatic Signaling and Minority Games, the Adversarial Dynamics in Social Technological Systems.
Mob. Networks Appl., 2016
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2016
Comput. Math. Organ. Theory, 2016
Proceedings of the 13th IEEE Symposium on Visualization for Cyber Security, 2016
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016
2015
Int. J. Secur. Softw. Eng., 2015
Proceedings of the 10th International Conference on Malicious and Unwanted Software, 2015
Proceedings of the 10th International Conference on Malicious and Unwanted Software, 2015
Compliance Control: Managed Vulnerability Surface in Social-Technological Systems via Signaling Games.
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, 2015
2014
Proceedings of the IEEE 1st Workshop on Evolving Security and Privacy Requirements Engineering, 2014
Agent-based trace learning in a recommendation-verification system for cybersecurity.
Proceedings of the 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, 2014
Proceedings of the Distributed Computing and Internet Technology, 2014
Proceedings of the 8th International Conference on Bio-inspired Information and Communications Technologies, 2014
2011
Proceedings of the 6th International Conference on Malicious and Unwanted Software, 2011
Proceedings of the Financial Cryptography and Data Security, 2011
2010
Identification of file infecting viruses through detection of self-reference replication.
J. Comput. Virol., 2010
Proceedings of the Security and Privacy in Communication Networks, 2010
Proceedings of the Computer Network Security, 2010
Evaluating detection and treatment effectiveness of commercial anti-malware programs.
Proceedings of the 5th International Conference on Malicious and Unwanted Software, 2010
Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010
2009
Proceedings of the 4th International Conference on Malicious and Unwanted Software, 2009
2008
Proceedings of the Third International Conference on Systems, 2008
Proceedings of the 46th Annual Southeast Regional Conference, 2008
2006