Marco M. Carvalho

Orcid: 0000-0002-2354-9640

Affiliations:
  • Florida Institute of Technology, Melbourne, FL, USA


According to our database1, Marco M. Carvalho authored at least 81 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
PWN Lessons Made Easy with Docker: Toward an Undergraduate Vulnerability Research Cybersecurity Class.
Proceedings of the 55th ACM Technical Symposium on Computer Science Education, 2024

Informed Decision-Making through Advancements in Open Set Recognition and Unknown Sample Detection.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

2023
Adaptive Attack Detection in Text Classification: Leveraging Space Exploration Features for Text Sentiment Classification.
CoRR, 2023

An Agent-Based Approach Toward Smart Software Testing.
Proceedings of the Future Technologies Conference, 2023

A Survey on Sentiment Classification Methods and Challenges.
Proceedings of the Thirty-Sixth International Florida Artificial Intelligence Research Society Conference, 2023

2021
Assuring Intelligent Systems: Contingency Management for UAS.
IEEE Trans. Intell. Transp. Syst., 2021

A Smart and Defensive Human-Machine Approach to Code Analysis.
CoRR, 2021

Conversational Code Analysis: The Future of Secure Coding.
CoRR, 2021

A Survey on Open Set Recognition.
Proceedings of the Fourth IEEE International Conference on Artificial Intelligence and Knowledge Engineering, 2021

2019
Towards the application of recommender systems to secure coding.
EURASIP J. Inf. Secur., 2019

Evaluation and Comparison of Agent-Oriented Methodologies: A Software Engineering Viewpoint.
Proceedings of the 2019 IEEE International Systems Conference, 2019

2018
Formal Assurance for Cooperative Intelligent Autonomous Agents.
Proceedings of the NASA Formal Methods - 10th International Symposium, 2018

Optimal Trajectory and Schedule Planning for Autonomous Guided Vehicles in Flexible Manufacturing System.
Proceedings of the Second IEEE International Conference on Robotic Computing, 2018

2017
A hybrid approach to improving program security.
Proceedings of the 2017 IEEE Symposium Series on Computational Intelligence, 2017

High fidelity adaptive cyber emulation.
Proceedings of the 2017 IEEE Symposium Series on Computational Intelligence, 2017

Malware classification using static analysis based features.
Proceedings of the 2017 IEEE Symposium Series on Computational Intelligence, 2017

Adaptive Resource Management Enabling Deception (ARMED).
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Using Ontologies to Quantify Attack Surfaces.
Proceedings of the Eleventh Conference on Semantic Technology for Intelligence, 2016

RF-based Monitoring, Sensing and Localization of Mobile Wireless Nodes.
Proceedings of the Mobile Networks and Management - 8th International Conference, 2016

Semi-automated wrapping of defenses (SAWD) for cyber command and control.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

An autonomous resiliency toolkit - needs, challenges, and concepts for next generation cyber defense platforms.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Experimentation Support for Cyber Security Evaluations.
Proceedings of the 11th Annual Cyber and Information Security Research Conference, 2016

2015
Resilient Command and Control Infrastructures for Cyber Operations.
Proceedings of the 10th IEEE/ACM International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2015

Interactive Visualization of Netflow Traffic.
Proceedings of the 2015 European Intelligence and Security Informatics Conference, 2015

VINE: A Cyber Emulation Environment for MTD Experimentation.
Proceedings of the Second ACM Workshop on Moving Target Defense, 2015

2014
Protecting Me.
IEEE Secur. Priv., 2014

Moving-Target Defenses for Computer Networks.
IEEE Secur. Priv., 2014

Heartbleed 101.
IEEE Secur. Priv., 2014

Efficient spectrum allocation in multiband CSMA networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014

Strategies for Spectrum Allocation in OFDMA Cellular Networks.
Proceedings of the Learning and Intelligent Optimization, 2014

Performance evaluation of static frequency reuse techniques for OFDMA cellular networks.
Proceedings of 11th IEEE International Conference on Networking, Sensing and Control, 2014

Empirical Models for Complex Network Dynamics: A Preliminary Study.
Proceedings of the Computing and Combinatorics - 20th International Conference, 2014

2013
Topology design for on-demand dual-path routing in wireless networks.
Optim. Lett., 2013

Domain and location specific modeling of mobile users online Interests.
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013

A layered approach to understanding network dependencies on moving target defense mechanisms.
Proceedings of the Cyber Security and Information Intelligence, 2013

A human-agent teamwork command and control framework for moving target defense (MTC2).
Proceedings of the Cyber Security and Information Intelligence, 2013

Using Network Sciences to Evaluate the Brazilian Airline Network.
Proceedings of the Computing and Combinatorics, 19th International Conference, 2013

A comparison of community identication algorithms for regulatory network motifs.
Proceedings of the 13th IEEE International Conference on BioInformatics and BioEngineering, 2013

2012
A Hybrid Emulation Environment for Airborne Wireless Networks.
Proceedings of the Advances in Intelligent Modelling and Simulation, 2012

Sol: An Agent-Based Framework for Cyber Situation Awareness.
Künstliche Intell., 2012

Command and Control Requirements for Moving-Target Defense.
IEEE Intell. Syst., 2012

Throughput maximization in CSMA networks with collisions.
Proceedings of the 31st IEEE Military Communications Conference, 2012

NextVC2 - A next generation virtual world command and control.
Proceedings of the 31st IEEE Military Communications Conference, 2012

Human-Agent Teamwork in Cyber Operations: Supporting Co-evolution of Tasks and Artifacts with Luna.
Proceedings of the Multiagent System Technologies - 10th German Conference, 2012

Policy-Based Governance within Luna: Why We Developed Yet Another Agent Framework.
Proceedings of the 2012 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology, 2012

2011
Dynamic policy-driven quality of service in service-oriented information management systems.
Softw. Pract. Exp., 2011

Resilience is more than availability.
Proceedings of the 2011 New Security Paradigms Workshop, 2011

Integrated information and network management for end-to-end Quality of Service.
Proceedings of the MILCOM 2011, 2011

The mLab-PENGWUN hybrid emulation environment for airborne networks.
Proceedings of the MILCOM 2011, 2011

Network traffic classification using a parallel neural network classifier architecture.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

Secure VM for monitoring industrial process controllers.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

An evolutionary multi-agent approach to anomaly detection and cyber defense.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

2010
A Crisis Management Approach to Mission Survivability in Computational Multi-Agent Systems.
Comput. Sci., 2010

Dynamic Policy-Driven Quality of Service in Service-Oriented Systems.
Proceedings of the 13th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing, 2010

Organic Resilience for Tactical Environments.
Proceedings of the Bio-Inspired Models of Network, Information, and Computing Systems, 2010

2009
Danger theory and collaborative filtering in MANETs.
J. Comput. Virol., 2009

Generic Danger Detection for Mission Continuity.
Proceedings of The Eighth IEEE International Symposium on Networking Computing and Applications, 2009

Investigating the Use of Topology Adaptation for Robust Multi-path Transport: A Preliminary Study.
Proceedings of The Eighth IEEE International Symposium on Networking Computing and Applications, 2009

Dynamic gateway selection for cross-domain routing with the XLayer communications substrate.
Proceedings of the International Conference on Ultra Modern Telecommunications, 2009

Security in MANETs using reputation-adjusted routing.
Proceedings of the Data Mining, 2009

A distributed reinforcement learning approach to mission survivability in tactical MANETs.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009

2008
Security in Mobile Ad Hoc Networks.
IEEE Secur. Priv., 2008

Policy Management across Multiple Platforms and Application Domains.
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008

Agent-Based Immunological Intrusion Detection System for Mobile Ad-Hoc Networks.
Proceedings of the Computational Science, 2008

Securing MANETs with BITSI: danger theory and mission continuity.
Proceedings of the Data Mining, 2008

2006
A chat interface for human-agent interaction in MAST.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

A distributed stand-in agent based algorithm for opportunistic resource allocation.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

2005
Concept Maps: Integrating Knowledge and Information Visualization.
Proceedings of the Knowledge and Information Visualization, 2005

KARMEN: Multi-agent Monitoring and Notification for Complex Processes.
Proceedings of the Holonic and Multi-Agent Systems for Manufacturing, 2005

A Mobile Agent-Based Middleware for Opportunistic Resource Allocation and Communications.
Proceedings of the Defence Applications of Multi-Agent Systems, International Workshop, 2005

2004
Using mobile agents as roaming security guards to test and improve security of hosts and networks.
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004

Software agents for process monitoring and notification.
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004

2003
Using WordNet for Word Sense Disambiguation to Support Concept Map Construction.
Proceedings of the String Processing and Information Retrieval, 2003

Enforcement of Communications Policies in Software Agent Systems through Mobile Code.
Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), 2003

Aiding knowledge capture by searching for extensions of knowledge models.
Proceedings of the 2nd International Conference on Knowledge Capture (K-CAP 2003), 2003

DAML-Based Policy Enforcement for Semantic Data Transformation and Filtering in Multi-agent Systems.
Proceedings of the Multi-Agent Systems and Applications III, 2003

Agile Computing: Bridging the Gap between Grid Computing and Ad-hoc Peer-to-Peer Resource Sharing.
Proceedings of the 3rd IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2003), 2003

Toward DAML-based policy enforcement for semantic data transformation and filtering in multi-agent systems.
Proceedings of the Second International Joint Conference on Autonomous Agents & Multiagent Systems, 2003

Representation and reasoning for DAML-based policy and domain services in KAoS and nomads.
Proceedings of the Second International Joint Conference on Autonomous Agents & Multiagent Systems, 2003

2002
Toward Interoperability of Mobile-Agent Systems.
Proceedings of the Mobile Agents, 6th International Conference, 2002

Supporting Flexible Data Feeds in Dynamic Sensor Grids through Mobile Agents.
Proceedings of the Mobile Agents, 6th International Conference, 2002


  Loading...