Luiz Fernando Rust da Costa Carmo
Orcid: 0000-0001-6131-7771
According to our database1,
Luiz Fernando Rust da Costa Carmo
authored at least 74 papers
between 1992 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Autoencoder-based Approach to Detect Stealth Cyberattacks in Battery Energy Storage Systems.
Proceedings of the IEEE International Workshop on Metrology for Industry 4.0 and IoT, 2024
2023
Proceedings of the IEEE International Instrumentation and Measurement Technology Conference, 2023
2021
IEEE Trans. Instrum. Meas., 2021
IEEE Trans. Ind. Electron., 2021
J. Netw. Comput. Appl., 2021
Malicious Traffic Description: Toward a Data Model for Mitigating Security Threats to Home IoT.
IEEE Commun. Stand. Mag., 2021
2020
Identification of Data Injection Attacks in Networked Control Systems Using Noise Impulse Integration.
Sensors, 2020
Bio-inspired Active System Identification: a Cyber-Physical Intelligence Attack in Networked Control Systems.
Mob. Networks Appl., 2020
Proceedings of the 2020 IEEE International Instrumentation and Measurement Technology Conference, 2020
2019
IEEE Trans. Instrum. Meas., 2019
Proceedings of the 15th ACM International Symposium on QoS and Security for Wireless and Mobile Networks, 2019
Countermeasure for Identification of Controlled Data Injection Attacks in Networked Control Systems.
Proceedings of the 2nd Workshop on Metrology for Industry 4.0 and IoT MetroInd4.0&IoT 2019, 2019
Proceedings of the 22th International Conference on Information Fusion, 2019
Proceedings of the 22th International Conference on Information Fusion, 2019
Proceedings of the Bio-inspired Information and Communication Technologies, 2019
2018
Using Physical Context-Based Authentication against External Attacks: Models and Protocols.
Secur. Commun. Networks, 2018
A controller design for mitigation of passive system identification attacks in networked control systems.
J. Internet Serv. Appl., 2018
Proceedings of the 2018 IEEE/ACM International Conference on Utility and Cloud Computing Companion, 2018
Evaluation on Passive System Identification and Covert Misappropriation Attacks in Large Pressurized Heavy Water Reactors.
Proceedings of the 2018 Workshop on Metrology for Industry 4.0 and IoT, 2018
Proceedings of the IEEE International Instrumentation and Measurement Technology Conference, 2018
Proceedings of the 2018 IEEE International Conference on Cloud Computing Technology and Science, 2018
2017
Future Gener. Comput. Syst., 2017
Proceedings of the 1st Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers, 2017
Use of Switching Controllers for Mitigation of Active Identification Attacks in Networked Control Systems.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017
EVINCED: Integrity Verification Scheme for Embedded Systems Based on Time and Clock Cycles.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017
Towards a Storage-Efficient and Categorized Secure Log Structure Scheme for Embedded Systems.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017
2016
IEEE Trans. Computers, 2016
Proceedings of the ICT Systems Security and Privacy Protection, 2016
2015
Int. J. Distributed Sens. Networks, 2015
Ensuring energy efficiency of power quality applications in smart grids through a framework based on Wireless Sensor and Actuator Networks.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015
SensorWatermark: a scheme of software watermark using code obfuscation and tamperproofing for WSN.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015
Proceedings of the Internet and Distributed Computing Systems, 2015
2014
A control and decision system for smart buildings using wireless sensor and actuator networks.
Trans. Emerg. Telecommun. Technol., 2014
Proceedings of the 2014 IEEE International Symposium on Medical Measurements and Applications, 2014
Proceedings of the 17th International Conference on Information Fusion, 2014
2013
A tight bound for exhaustive key search attacks against Message Authentication Codes.
RAIRO Theor. Informatics Appl., 2013
Intrusion Detection System for Wireless Sensor Networks Using Danger Theory Immune-Inspired Techniques.
Int. J. Wirel. Inf. Networks, 2013
IEEE Commun. Mag., 2013
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013
2012
Int. J. Softw. Eng. Knowl. Eng., 2012
2011
Enhancing Levenshtein distance algorithm for assessing behavioral trust.
Comput. Syst. Sci. Eng., 2011
2010
Enhancing Levenshtein distance algorithm for assessing behavioral trust.
Comput. Syst. Sci. Eng., 2010
Comput. Networks, 2010
Proceedings of the Information Security - 13th International Conference, 2010
Software evaluation of smart meters within a Legal Metrology perspective: A Brazilian case.
Proceedings of the IEEE PES Conference on Innovative Smart Grid Technologies, 2010
Proceedings of the Bio-Inspired Models of Network, Information, and Computing Systems, 2010
2008
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008
2007
Proceedings of the New Approaches for Security, 2007
2005
A Service Approach for Architecting Application Independent Wireless Sensor Networks.
Clust. Comput., 2005
Proceedings of the 10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS 2005), 2005
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005
Proceedings of the Networking, 2005
2003
A Proactive Management and Rerouting Framework for QoS Critical Distributed Applications Using Active Technology.
Proceedings of the 9th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS Fall 2003), 2003
Proceedings of the Middleware 2003, 2003
Proceedings of the 23rd International Conference on Distributed Computing Systems Workshops (ICDCS 2003 Workshops), 2003
2002
Proceedings of the 7th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS 2002), 2002
2001
Proceedings of the 2nd Latin American Network Operations and Management Symposium, 2001
Data Agent System: A Query Service based on Mobile Agent Technology.
Proceedings of the Fifth IASTED International Conference Internet and Multimedia Systems and Applications (IMSA 2001), 2001
1999
Micael: An Autonomous Mobile Agent System to Protect New Generation Networked Applications.
Proceedings of the Recent Advances in Intrusion Detection, Second International Workshop, 1999
Architecture for Adaptive Multimedia Document Retrieval with Real-Time Monitoring.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999
Design of an Integrated Environment for Adaptive Multimedia Document Presentation Through Real Time Monitoring.
Proceedings of the Interactive Distributed Multimedia Systems and Telecommunication Services, 1999
Proceedings of the Internet Applications, 5th International Computer Science Conference, 1999
1996
IEEE J. Sel. Areas Commun., 1996
1995
Inf. Syst., 1995
1994
Proceedings of the Second ACM International Conference on Multimedia '94, 1994
A New Mechanism for Achieving Inter-stream Synchronization in Multimedia Communication Systems.
Proceedings of the International Conference on Multimedia Computing and Systems, 1994
Implementing Intra-Stream Synchronization by Means of Conditional Dependency Expressions.
Proceedings of the High Performance Networking V, Proceedings of the IFIP TC6/WG6.4 Fifth International Conference on High Performance Networking, Grenoble, France, 27 June, 1994
1992
Proceedings of the Network and Operating System Support for Digital Audio and Video, 1992