Nuno Neves

Orcid: 0000-0003-0411-4542

Affiliations:
  • University of Lisbon, Faculty of Sciences, Department of Computer Science, Portugal
  • University of Illinois at Urbana-Champaign, IL, USA (PhD 1998)


According to our database1, Nuno Neves authored at least 108 papers between 1993 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
FADO: A Federated Learning Attack and Defense Orchestrator.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2023

Towards PHP Vulnerability Detection at an Intermediate Language Level.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2023

2022
Statically Detecting Vulnerabilities by Processing Programming Languages as Natural Languages.
IEEE Trans. Reliab., 2022

Towards Fuzzing Target Lines.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

2021
Charon: A Secure Cloud-of-Clouds System for Storing and Sharing Big Data.
IEEE Trans. Cloud Comput., 2021

2020
Secure multi-cloud virtual network embedding.
Comput. Commun., 2020

Elastic Network Virtualization.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Towards a Deep Learning Model for Vulnerability Detection on Web Application Variants.
Proceedings of the 13th IEEE International Conference on Software Testing, 2020

Generating Tests for the Discovery of Security Flaws in Product Variants.
Proceedings of the 13th IEEE International Conference on Software Testing, 2020

Towards Web Application Security by Automated Code Correction.
Proceedings of the 15th International Conference on Evaluation of Novel Approaches to Software Engineering, 2020

Effect of Coding Styles in Detection of Web Application Vulnerabilities.
Proceedings of the 16th European Dependable Computing Conference, 2020

Impact of Coding Styles on Behaviours of Static Analysis Tools for Web Applications.
Proceedings of the 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks, 2020

Industrial and Artificial Internet of Things with Augmented Reality.
Proceedings of the Convergence of Artificial Intelligence and the Internet of Things, 2020

2019
SEPTIC: Detecting Injection Attacks and Vulnerabilities Inside the DBMS.
IEEE Trans. Reliab., 2019

Using Blockchains to Implement Distributed Measuring Systems.
IEEE Trans. Instrum. Meas., 2019

BigFlow: Real-time and reliable anomaly-based intrusion detection for high-speed networks.
Future Gener. Comput. Syst., 2019

An empirical study on combining diverse static analysis tools for web security vulnerabilities based on development scenarios.
Computing, 2019

Secure Multi-Cloud Network Virtualization.
Comput. Networks, 2019

Lazarus: Automatic Management of Diversity in BFT Systems.
Proceedings of the 20th International Middleware Conference, 2019

2018
Benchmarking Static Analysis Tools for Web Security.
IEEE Trans. Reliab., 2018

SieveQ: A Layered BFT Protection System for Critical Services.
IEEE Trans. Dependable Secur. Comput., 2018

SITAN: Services for Fault-Tolerant Ad Hoc Networks with Unknown Participants.
CoRR, 2018

How blockchains can improve measuring instruments regulation and control.
Proceedings of the IEEE International Instrumentation and Measurement Technology Conference, 2018

Detecting Network Threats using OSINT Knowledge-Based IDS.
Proceedings of the 14th European Dependable Computing Conference, 2018

On the Challenges of Building a BFT SCADA.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

Validating and Securing DLMS/COSEM Implementations with the ValiDLMS Framework.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2018

2017
Secure Virtual Network Embedding in a Multi-Cloud Environment.
CoRR, 2017

Secure network monitoring using programmable data planes.
Proceedings of the 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks, 2017

A Resilient Stream Learning Intrusion Detection Mechanism for Real-Time Analysis of Network Traffic.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Secure and Dependable Multi-Cloud Network Virtualization.
Proceedings of the 1st International Workshop on Security and Dependability of Multi-Domain Infrastructures, 2017

On Combining Diverse Static Analysis Tools for Web Security: An Empirical Study.
Proceedings of the 13th European Dependable Computing Conference, 2017

Secure Tera-scale Data Crunching with a Small TCB.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

Demonstrating a Tool for Injection Attack Prevention in MySQL.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

2016
Detecting and Removing Web Application Vulnerabilities with Static Analysis and Data Mining.
IEEE Trans. Reliab., 2016

Secure and Dependable Virtual Network Embedding.
CoRR, 2016

JITeR: Just-in-time application-layer routing.
Comput. Networks, 2016

User-Centric Security and Dependability in the Clouds-of-Clouds.
IEEE Cloud Comput., 2016

(Literally) Above the clouds: Virtualizing the network over multiple clouds.
Proceedings of the IEEE NetSoft Conference and Workshops, 2016

DEKANT: a static analysis tool that learns to detect web application vulnerabilities.
Proceedings of the 25th International Symposium on Software Testing and Analysis, 2016

Secure Identification of Actively Executed Code on a Generic Trusted Component.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

Equipping WAP with WEAPONS to Detect Vulnerabilities: Practical Experience Report.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

Hacking the DBMS to Prevent Injection Attacks.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

2015
Securing Passive Replication through Verification.
Proceedings of the 34th IEEE Symposium on Reliable Distributed Systems, 2015

2014
Analysis of operating system diversity for intrusion tolerance.
Softw. Pract. Exp., 2014

Automatic detection and correction of web application vulnerabilities using data mining to predict false positives.
Proceedings of the 23rd International World Wide Web Conference, 2014

SCFS: A Shared Cloud-backed File System.
Proceedings of the 2014 USENIX Annual Technical Conference, 2014

Stopping a Rapid Tornado with a Puff.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

2013
Byzantine Fault-Tolerant Consensus in Wireless Ad Hoc Networks.
IEEE Trans. Mob. Comput., 2013

BFT-TO: Intrusion Tolerance with Less Replicas.
Comput. J., 2013

On the Efficiency of Durable State Machine Replication.
Proceedings of the 2013 USENIX Annual Technical Conference, 2013

Securing energy metering software with automatic source code correction.
Proceedings of the 11th IEEE International Conference on Industrial Informatics, 2013

PACE your network: Fair and controllable multi-tenant data center networks.
Proceedings of IEEE International Conference on Communications, 2013

Intercept: Profiling Windows Network Device Drivers.
Proceedings of the Dependable Computing - 14th European Workshop, 2013

An intrusion-tolerant firewall design for protecting SIEM systems.
Proceedings of the 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, 2013

2012
Robust and Speculative Byzantine Randomized Consensus with Constant Time Complexity in Normal Conditions.
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012

Recycling Test Cases to Detect Security Vulnerabilities.
Proceedings of the 23rd IEEE International Symposium on Software Reliability Engineering, 2012

2011
RITAS: Services for Randomized Intrusion Tolerance.
IEEE Trans. Dependable Secur. Comput., 2011

Byzantine consensus in asynchronous message-passing systems: a survey.
Int. J. Crit. Comput. Based Syst., 2011

Randomization can be a healer: consensus with dynamic omission failures.
Distributed Comput., 2011

Reverse Engineering of Protocols from Network Traces.
Proceedings of the 18th Working Conference on Reverse Engineering, 2011

DiveInto: Supporting Diversity in Intrusion-Tolerant Systems.
Proceedings of the 30th IEEE Symposium on Reliable Distributed Systems (SRDS 2011), 2011

Using Behavioral Profiles to Detect Software Flaws in Network Servers.
Proceedings of the IEEE 22nd International Symposium on Software Reliability Engineering, 2011

Automatically complementing protocol specifications from network traces.
Proceedings of the 13th European Workshop on Dependable Computing, 2011

OS diversity for intrusion tolerance: Myth or reality?
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011

2010
Vulnerability Discovery with Attack Injection.
IEEE Trans. Software Eng., 2010

Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery.
IEEE Trans. Parallel Distributed Syst., 2010

Turquois: Byzantine consensus in wireless ad hoc networks.
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010

2009
Designing Modular and Redundant Cyber Architectures for Process Control: Lessons learned.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

Intrusion-tolerant self-healing devices for critical infrastructure protection.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

2008
The CRUTIAL reference critical information infrastructure architecture: a blueprint.
Int. J. Syst. Syst. Eng., 2008

The Crutial Way of Critical Infrastructure Protection.
IEEE Secur. Priv., 2008

Detection and Prediction of Resource-Exhaustion Vulnerabilities.
Proceedings of the 19th International Symposium on Software Reliability Engineering (ISSRE 2008), 2008

2007
Worm-IT - A wormhole-based intrusion-tolerant group communication system.
J. Syst. Softw., 2007

When 3<i>f</i>+1 Is Not Enough: Tradeoffs for Decentralized Asynchronous Byzantine Consensus.
Proceedings of the Distributed Computing, 21st International Symposium, 2007

Resilient Intrusion Tolerance through Proactive and Reactive Recovery.
Proceedings of the 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2007), 2007

Intrusion Tolerance in Wireless Environments: An Experimental Evaluation.
Proceedings of the 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2007), 2007

The CRUTIAL Architecture for Critical Information Infrastructures.
Proceedings of the Architecting Dependable Systems V [the book is a result from the WADS 2007 and the Third Workshop on the Role of Software Architecture for Testing and Analysis], 2007

Fuzzing Wi-Fi Drivers to Locate Security Vulnerabilities.
Proceedings of the Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), 2007

Robustness Testing of the Windows DDK.
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007

2006
Intrusion-tolerant middleware: the road to automatic security.
IEEE Secur. Priv., 2006

From Consensus to Atomic Broadcast: Time-Free Byzantine-Resistant Protocols without Signatures.
Comput. J., 2006

Proactive Resilience Revisited: The Delicate Balance Between Resisting Intrusions and Remaining Available.
Proceedings of the 25th IEEE Symposium on Reliable Distributed Systems (SRDS 2006), 2006

Experimental Comparison of Local and Shared Coin Randomized Consensus Protocols.
Proceedings of the 25th IEEE Symposium on Reliable Distributed Systems (SRDS 2006), 2006

Proactive resilience through architectural hybridization.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

Using Attack Injection to Discover New Vulnerabilities.
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006

Randomized Intrusion-Tolerant Asynchronous Services.
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006

CRUTIAL: The Blueprint of a Reference Critical Information Infrastructure Architecture.
Proceedings of the Critical Information Infrastructures Security, 2006

2005
Solving Vector Consensus with a Wormhole.
IEEE Trans. Parallel Distributed Syst., 2005

Low complexity Byzantine-resilient consensus.
Distributed Comput., 2005

Resilient State Machine Replication.
Proceedings of the 11th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2005), 2005

How Resilient are Distributed f Fault/Intrusion-Tolerant Systems?
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005

2004
How to Tolerate Half Less One Byzantine Nodes in Practical Distributed Systems.
Proceedings of the 23rd International Symposium on Reliable Distributed Systems (SRDS 2004), 2004

Secure Application Updates on Point of Sale Devices.
Proceedings of the ICETE 2004, 2004

Tolerating Intrusions in Grid Systems.
Proceedings of the International Conference on Security and Management, 2004

2002
Efficient Byzantine-Resilient Reliable Multicast on a Hybrid Failure Model.
Proceedings of the 21st Symposium on Reliable Distributed Systems (SRDS 2002), 2002

Intrusion-Tolerant Architectures: Concepts and Design.
Proceedings of the Architecting Dependable Systems [the book is a result of the ICSE 2002 Workshop on Software Architectures for Dependable Systems], 2002

The Design of a COTSReal-Time Distributed Security Kernel.
Proceedings of the Dependable Computing, 2002

2001
The Architecture of a Secure Group Communication System Based on Intrusion Tolerance.
Proceedings of the 21st International Conference on Distributed Computing Systems Workshops (ICDCS 2001 Workshops), 2001

1998
Time-Based Coordinated Checkpointing
PhD thesis, 1998

RENEW: A Tool for Fast and Efficient Implementation of Checkpoint Protocols.
Proceedings of the Digest of Papers: FTCS-28, 1998

1997
Adaptive Recovery for Mobile Environments.
Commun. ACM, 1997

Fault Detection Using Hints from the Socket Layer.
Proceedings of the Sixteenth Symposium on Reliable Distributed Systems, 1997

1996
Lightweight Logging for Lazy Release Consistent Distributed Shared Memory.
Proceedings of the Second USENIX Symposium on Operating Systems Design and Implementation (OSDI), 1996

A Study of a Non-Linear Optimization Problem Using a Distributed Genetic Algorithm.
Proceedings of the 1996 International Conference on Parallel Processing, 1996

1994
Orthogonal Persistence in a Heterogeneous Distributed Object-Oriented Environment.
Comput. J., 1994

The DiSOM Distributed Shared Object Memory.
Proceedings of the 6th ACM SIGOPS European Workshop: Matching Operating Systems to Application Needs, 1994

A Checkpoint Protocol for an Entry Consistent Shared Memory System.
Proceedings of the Thirteenth Annual ACM Symposium on Principles of Distributed Computing, 1994

1993
MIKE: A Distributed object-oriented programming platform on top of the Mach micro-kernel.
Proceedings of the USENIX MACH III Symposium, Santa Fe, New Mexico, USA, April 19-21, 1993, 1993


  Loading...