Mário M. Freire
Orcid: 0000-0002-9017-5001
According to our database1,
Mário M. Freire
authored at least 109 papers
between 1997 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Int. J. Inf. Sec., August, 2024
A Distributed Virtual-Machine Placement and Migration Approach Based on Modern Portfolio Theory.
J. Netw. Syst. Manag., March, 2024
Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, 2024
An Approach to Attack Modeling for the IoT: Creating Attack Trees from System Descriptions.
Proceedings of the Advanced Information Networking and Applications, 2024
2023
Secure cloud-based mobile apps: attack taxonomy, requirements, mechanisms, tests and automation.
Int. J. Inf. Sec., 2023
2022
J. King Saud Univ. Comput. Inf. Sci., 2022
IEEE Access, 2022
A Complete Review on the Application of Statistical Methods for Evaluating Internet Traffic Usage.
IEEE Access, 2022
Impact of Self C Parameter on SVM-based Classification of Encrypted Multimedia Peer-to-Peer Traffic.
Proceedings of the Advanced Information Networking and Applications, 2022
2021
Behaviour-based Malware Detection in Mobile AndroidPlatforms Using Machine Learning Algorithms.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021
Inf. Softw. Technol., 2021
Attack and System Modeling Applied to IoT, Cloud, and Mobile Ecosystems: Embedding Security by Design.
ACM Comput. Surv., 2021
Performance evaluation of the SRE and SBPG components of the IoT hardware platform security advisor framework.
Comput. Networks, 2021
Detection of reduction-of-quality DDoS attacks using Fuzzy Logic and machine learning algorithms.
Comput. Networks, 2021
Performance Evaluation of Container-Level Anomaly-Based Intrusion Detection Systems for Multi-Tenant Applications Using Machine Learning Algorithms.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
2020
IoT-HarPSecA: A Framework and Roadmap for Secure Design and Development of Devices and Applications in the IoT Space.
IEEE Access, 2020
A Preliminary Evaluation of the SRE and SBPG Components of the IoT-HarPSecA Framework.
Proceedings of the 2020 Global Internet of Things Summit, 2020
Classification of Encrypted Internet Traffic Using Kullback-Leibler Divergence and Euclidean Distance.
Proceedings of the Advanced Information Networking and Applications, 2020
2019
IoT-HarPSecA: A Framework for Facilitating the Design and Development of Secure IoT Devices.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
2018
Approaches for optimizing virtual machine placement and migration in cloud environments: A survey.
J. Parallel Distributed Comput., 2018
Security Threats and Possible Countermeasures in IoT Applications Covering Different Industry Domains.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
2017
A User Trust System for Online Games - Part II: A Subjective Logic Approach for Trust Inference.
IEEE Trans. Comput. Intell. AI Games, 2017
A User Trust System for Online Games - Part I: An Activity Theory Approach for Trust Representation.
IEEE Trans. Comput. Intell. AI Games, 2017
J. Inf. Secur. Appl., 2017
CloudSim Plus: A cloud computing simulation framework pursuing software engineering principles for improved modularity, extensibility and correctness.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017
2015
Assessment of the Susceptibility to Data Manipulation of Android Games with In-app Purchases.
Proceedings of the ICT Systems Security and Privacy Protection, 2015
2014
Classification of Breast Masses on Contrast-Enhanced Magnetic Resonance Images Through Log Detrended Fluctuation Cumulant-Based Multifractal Analysis.
IEEE Syst. J., 2014
Proceedings of the 2014 Summer Simulation Multiconference, 2014
2013
IEEE Trans. Parallel Distributed Syst., 2013
3D Lacunarity in Multifractal Analysis of Breast Tumor Lesions in Dynamic Contrast-Enhanced Magnetic Resonance Imaging.
IEEE Trans. Image Process., 2013
The Whole Mesh Deformation Model: A Fast Image Segmentation Method Suitable for Effective Parallelization.
EURASIP J. Adv. Signal Process., 2013
ACM Comput. Surv., 2013
Proceedings of the IEEE/ACM 6th International Conference on Utility and Cloud Computing, 2013
Proceedings of the Medical Imaging 2013: Image Processing, 2013
Real-time traffic classification based on statistical tests for matching signatures with packet length distributions.
Proceedings of the 19th IEEE Workshop on Local & Metropolitan Area Networks, 2013
Proceedings of the IEEE 32nd International Performance Computing and Communications Conference, 2013
2012
ACM Trans. Model. Comput. Simul., 2012
Corrigendum: Exploring Behavioral Patterns Through Entropy in Multimedia Peer-to-Peer Traffic.
Comput. J., 2012
Comput. J., 2012
Proceedings of the IEEE International Workshop on Machine Learning for Signal Processing, 2012
2011
On-line Detection of Encrypted Traffic Generated by Mesh-Based Peer-to-Peer Live Streaming Applications: The Case of GoalBit.
Proceedings of The Tenth IEEE International Symposium on Networking Computing and Applications, 2011
Proceedings of the 18th IEEE International Conference on Image Processing, 2011
Proceedings of the 18th IEEE International Conference on Image Processing, 2011
2010
Proceedings of The Ninth IEEE International Symposium on Networking Computing and Applications, 2010
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2010), May 30, 2010
2009
Inf. Sci., 2009
Int. J. Commun. Syst., 2009
A New Architecture for Optical Burst Switching Networks Based on Cooperative Control.
Proceedings of The Eighth IEEE International Symposium on Networking Computing and Applications, 2009
Proceedings of the 2009 IEEE International Workshop on Multimedia Signal Processing, 2009
Proceedings of the 2009 IEEE International Conference on Multimedia and Expo, 2009
Proceedings of the International Conference on Image Processing, 2009
Towards the Detection of Encrypted BitTorrent Traffic through Deep Packet Inspection.
Proceedings of the Security Technology, 2009
Proceedings of the First International Conference on Advances in P2P Systems, 2009
2008
IEEE Commun. Mag., 2008
Analysis of the Impact of Intensive Attacks on the Self-Similarity Degree of the Network Traffic.
Proceedings of the Second International Conference on Emerging Security Information, 2008
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008
Proceedings of the 2008 IEEE International Performance, 2008
Proceedings of the 2008 International Conference on Information Networking, 2008
Performance Assessment of Enhanced Just-in-Time Protocol in OBS Networks Taking into Account Control Packet Processing and Optical Switch Configuration Times.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
2007
A new architectural approach for optical burst switching networks based on a common control channel.
Opt. Switch. Netw., 2007
J. High Speed Networks, 2007
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007
Enhanced Just-in-Time: A New Resource Reservation Protocol for Optical Burst Switching Networks.
Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), 2007
Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), 2007
On the Performance of Shortest Path Routing Algorithms for Modeling and Simulation of Static Source Routed Networks -- an Extension to the Dijkstra Algorithm.
Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), 2007
Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), 2007
Proceedings of the Third International Conference on Networking and Services (ICNS 2007), 2007
Proceedings of the Fourth European Conference on Universal Multiservice Networks (ECUMN 2007), 2007
2006
J. High Speed Networks, 2006
Preamble Encryption Mechanism for Enhanced Privacy in Ethernet Passive Optical Networks.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006
Burst Assembly with Real IPv4 Data - Performance Assessement of Three Assembly Algorithms.
Proceedings of the Next Generation Teletraffic and Wired/Wireless Advanced Networking, 2006
Proceedings of the NETWORKING 2006, 2006
Issues on Performance Assessment of Optical Burst Switched Networks: Burst Loss Versus Packet Loss Metrics.
Proceedings of the NETWORKING 2006, 2006
Performance implications of control packet processing and optical switch configuration times for optical burst switched mesh networks with degree-four topologies.
Proceedings of the International Symposium on Computer Networks, 2006
Integration of Ontologies and Semantic Annotations with Resource Description Framework in Eclipse-Based Platforms with Editing Features for Semantic Web.
Proceedings of the Information Networking, 2006
A New Architecture for Optical Burst Switched Networks Based on a Common Control Channel.
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006
SWedt: A Semantic Web Editor Integrating Ontologies and Semantic Annotations with Resource Description Framework.
Proceedings of the Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT/ICIW 2006), 2006
2005
Performance Implications of Meshing Degree for Optical Burst Switched Networks Using One-Way Resource Reservation Protocols.
Telecommun. Syst., 2005
Impact of Setup Message Processing and Optical Switch Configuration Times on the Performance of IP over Optical Burst Switching Networks.
Proceedings of the Computer and Information Sciences, 2005
One-Way Resource Reservation Protocols for IP Over Optical Burst Switched Mesh Networks.
Proceedings of the Systems Communications 2005 (ICW / ICHSN / ICMCS / SENET 2005), 2005
SAPA: Software Agents for Prevention and Auditing of Security Faults in Networked Systems.
Proceedings of the Information Networking, 2005
The Role of Meshing Degree in Optical Burst Switching Networks Using Signaling Protocols with One-Way Reservation Schemes.
Proceedings of the Networking, 2005
Towards Autonomic Minimization of Security Vulnerabilities Exploitation in Hybrid Network Environments.
Proceedings of the Joint International Conference on Autonomic and Autonomous Systems 2005 / International Conference on Networking and Services 2005, 2005
Proceedings of the Telecommunications 2005: Advanced Industrial Conference on Telecommunications / Service Assurance with Partial and Intermittent Resources Conference / E-Learning on Telecommunications Workshop (AICT / SAPIR / ELETE 2005), 2005
2004
Telecommun. Syst., 2004
Proceedings of the Telecommunications and Networking, 2004
Performance Assessment of Signaling Protocols in Optical Burst Switching Mesh Networks.
Proceedings of the Information Networking, 2004
Performance Assessment of Signaling Protocols with One-Way Reservation Schemes for Optical Burst Switching Networks.
Proceedings of the High Speed Networks and Multimedia Communications, 2004
Proceedings of the High Speed Networks and Multimedia Communications, 2004
2003
The Role of Network Topologies in the Optical Core of IP-over-WDM Networks with Static Wavelength Routing.
Telecommun. Syst., 2003
Proceedings of the 2003 International Symposium on Information Technology (ITCC 2003), 2003
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003
Management of Security in TCP/IP Hosts Using Dedicated Monitoring Applications.
Proceedings of the Network Control and Engineering for QoS, 2003
Proceedings of the 11th IEEE International Conference on Networks, 2003
Performance Analysis of Degree Four Topologies for the Optical Core of IP-over-WDM Networks.
Proceedings of the Information Networking, 2003
DENOFAS: A Vulnerability Assessment Tool.
Proceedings of the IADIS International Conference WWW/Internet 2003, 2003
2002
Assessment of blocking performance in unidirectional and bi-directional wavelength routed ring networks.
J. High Speed Networks, 2002
Performance assessment of wavelength routed optical networks with shortest path routing over degree three topologies.
Proceedings of the Proceedings 10th IEEE International Conference on Networks: Towards Network Superiority, 2002
Proceedings of the Information Networking, 2002
Performance Assessment of WDM Degree-four Chordal Ring Networks.
Proceedings of the IASTED International Conference on Communications, 2002
2001
Influence of Chord Length on the Blocking Performance of Wavelength-Routed Chordal Ring Networks.
Proceedings of the Towards an Optical Internet: New Visions in Optical Network Design and Modelling, 2001
Performance Comparison of Wavelength Routing Optical Networks with Chordal Ring and Mesh-Torus Topologies.
Proceedings of the Networking, 2001
1997
Letter: Impact of double cavity FP demultiplexers on the performance of WDM dispersion supported transmission.
Eur. Trans. Telecommun., 1997
Performance assessment of high density wavelength division multiplexing systems with dispersion supported transmission at 10 Gbit/s.
Proceedings of the Second IEEE Symposium on Computers and Communications (ISCC 1997), 1997