Nuno Neves
Orcid: 0000-0003-0411-4542Affiliations:
- University of Lisbon, Faculty of Sciences, Department of Computer Science, Portugal
- University of Illinois at Urbana-Champaign, IL, USA (PhD 1998)
According to our database1,
Nuno Neves
authored at least 108 papers
between 1993 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on scopus.com
-
on orcid.org
-
on di.fc.ul.pt
On csauthors.net:
Bibliography
2023
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2023
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2023
2022
Statically Detecting Vulnerabilities by Processing Programming Languages as Natural Languages.
IEEE Trans. Reliab., 2022
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022
2021
IEEE Trans. Cloud Comput., 2021
2020
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Towards a Deep Learning Model for Vulnerability Detection on Web Application Variants.
Proceedings of the 13th IEEE International Conference on Software Testing, 2020
Proceedings of the 13th IEEE International Conference on Software Testing, 2020
Proceedings of the 15th International Conference on Evaluation of Novel Approaches to Software Engineering, 2020
Proceedings of the 16th European Dependable Computing Conference, 2020
Proceedings of the 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks, 2020
Proceedings of the Convergence of Artificial Intelligence and the Internet of Things, 2020
2019
IEEE Trans. Reliab., 2019
IEEE Trans. Instrum. Meas., 2019
BigFlow: Real-time and reliable anomaly-based intrusion detection for high-speed networks.
Future Gener. Comput. Syst., 2019
An empirical study on combining diverse static analysis tools for web security vulnerabilities based on development scenarios.
Computing, 2019
Proceedings of the 20th International Middleware Conference, 2019
2018
IEEE Trans. Dependable Secur. Comput., 2018
CoRR, 2018
Proceedings of the IEEE International Instrumentation and Measurement Technology Conference, 2018
Proceedings of the 14th European Dependable Computing Conference, 2018
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2018
2017
Proceedings of the 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks, 2017
A Resilient Stream Learning Intrusion Detection Mechanism for Real-Time Analysis of Network Traffic.
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Proceedings of the 1st International Workshop on Security and Dependability of Multi-Domain Infrastructures, 2017
Proceedings of the 13th European Dependable Computing Conference, 2017
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017
2016
Detecting and Removing Web Application Vulnerabilities with Static Analysis and Data Mining.
IEEE Trans. Reliab., 2016
IEEE Cloud Comput., 2016
Proceedings of the IEEE NetSoft Conference and Workshops, 2016
DEKANT: a static analysis tool that learns to detect web application vulnerabilities.
Proceedings of the 25th International Symposium on Software Testing and Analysis, 2016
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016
2015
Proceedings of the 34th IEEE Symposium on Reliable Distributed Systems, 2015
2014
Softw. Pract. Exp., 2014
Automatic detection and correction of web application vulnerabilities using data mining to predict false positives.
Proceedings of the 23rd International World Wide Web Conference, 2014
Proceedings of the 2014 USENIX Annual Technical Conference, 2014
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014
2013
IEEE Trans. Mob. Comput., 2013
Proceedings of the 2013 USENIX Annual Technical Conference, 2013
Proceedings of the 11th IEEE International Conference on Industrial Informatics, 2013
Proceedings of IEEE International Conference on Communications, 2013
Proceedings of the Dependable Computing - 14th European Workshop, 2013
Proceedings of the 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, 2013
2012
Robust and Speculative Byzantine Randomized Consensus with Constant Time Complexity in Normal Conditions.
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012
Proceedings of the 23rd IEEE International Symposium on Software Reliability Engineering, 2012
2011
IEEE Trans. Dependable Secur. Comput., 2011
Int. J. Crit. Comput. Based Syst., 2011
Distributed Comput., 2011
Proceedings of the 18th Working Conference on Reverse Engineering, 2011
Proceedings of the 30th IEEE Symposium on Reliable Distributed Systems (SRDS 2011), 2011
Proceedings of the IEEE 22nd International Symposium on Software Reliability Engineering, 2011
Proceedings of the 13th European Workshop on Dependable Computing, 2011
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011
2010
IEEE Trans. Parallel Distributed Syst., 2010
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010
2009
Designing Modular and Redundant Cyber Architectures for Process Control: Lessons learned.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009
2008
Int. J. Syst. Syst. Eng., 2008
Proceedings of the 19th International Symposium on Software Reliability Engineering (ISSRE 2008), 2008
2007
J. Syst. Softw., 2007
When 3<i>f</i>+1 Is Not Enough: Tradeoffs for Decentralized Asynchronous Byzantine Consensus.
Proceedings of the Distributed Computing, 21st International Symposium, 2007
Proceedings of the 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2007), 2007
Proceedings of the 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2007), 2007
Proceedings of the Architecting Dependable Systems V [the book is a result from the WADS 2007 and the Third Workshop on the Role of Software Architecture for Testing and Analysis], 2007
Proceedings of the Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), 2007
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007
2006
IEEE Secur. Priv., 2006
From Consensus to Atomic Broadcast: Time-Free Byzantine-Resistant Protocols without Signatures.
Comput. J., 2006
Proactive Resilience Revisited: The Delicate Balance Between Resisting Intrusions and Remaining Available.
Proceedings of the 25th IEEE Symposium on Reliable Distributed Systems (SRDS 2006), 2006
Proceedings of the 25th IEEE Symposium on Reliable Distributed Systems (SRDS 2006), 2006
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006
CRUTIAL: The Blueprint of a Reference Critical Information Infrastructure Architecture.
Proceedings of the Critical Information Infrastructures Security, 2006
2005
IEEE Trans. Parallel Distributed Syst., 2005
Proceedings of the 11th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2005), 2005
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005
2004
Proceedings of the 23rd International Symposium on Reliable Distributed Systems (SRDS 2004), 2004
Secure Application Updates on Point of Sale Devices.
Proceedings of the ICETE 2004, 2004
Tolerating Intrusions in Grid Systems.
Proceedings of the International Conference on Security and Management, 2004
2002
Proceedings of the 21st Symposium on Reliable Distributed Systems (SRDS 2002), 2002
Proceedings of the Architecting Dependable Systems [the book is a result of the ICSE 2002 Workshop on Software Architectures for Dependable Systems], 2002
Proceedings of the Dependable Computing, 2002
2001
The Architecture of a Secure Group Communication System Based on Intrusion Tolerance.
Proceedings of the 21st International Conference on Distributed Computing Systems Workshops (ICDCS 2001 Workshops), 2001
1998
Proceedings of the Digest of Papers: FTCS-28, 1998
1997
Proceedings of the Sixteenth Symposium on Reliable Distributed Systems, 1997
1996
Proceedings of the Second USENIX Symposium on Operating Systems Design and Implementation (OSDI), 1996
Proceedings of the 1996 International Conference on Parallel Processing, 1996
1994
Comput. J., 1994
Proceedings of the 6th ACM SIGOPS European Workshop: Matching Operating Systems to Application Needs, 1994
Proceedings of the Thirteenth Annual ACM Symposium on Principles of Distributed Computing, 1994
1993
MIKE: A Distributed object-oriented programming platform on top of the Mach micro-kernel.
Proceedings of the USENIX MACH III Symposium, Santa Fe, New Mexico, USA, April 19-21, 1993, 1993