Paulo Lício de Geus

Orcid: 0000-0002-6540-8686

According to our database1, Paulo Lício de Geus authored at least 46 papers between 1998 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Deep Learning Applied to Imbalanced Malware Datasets Classification.
J. Internet Serv. Appl., 2024

2023
Enhancing Malware Family Classification in the Microsoft Challenge Dataset via Transfer Learning.
Proceedings of the 12th Latin-American Symposium on Dependable and Secure Computing, 2023

Static Analysis for Malware Classification Using Machine and Deep Learning.
Proceedings of the XLIX Latin American Computer Conference, 2023

2022
AntiViruses under the microscope: A hands-on perspective.
Comput. Secur., 2022

2021
One Size Does Not Fit All: A Longitudinal Analysis of Brazilian Financial Malware.
ACM Trans. Priv. Secur., 2021

2020
Leveraging branch traces to understand kernel internals from within.
J. Comput. Virol. Hacking Tech., 2020

We need to talk about antiviruses: challenges & pitfalls of AV evaluations.
Comput. Secur., 2020

On the Security of Application Installers and Online Software Repositories.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2020

2019
"VANILLA" malware: vanishing antiviruses by interleaving layers and layers of attacks.
J. Comput. Virol. Hacking Tech., 2019

The AV says: Your Hardware Definitions Were Updated!
Proceedings of the 14th International Symposium on Reconfigurable Communication-centric Systems-on-Chip, 2019

2018
The other guys: automated analysis of marginalized malware.
J. Comput. Virol. Hacking Tech., 2018

Enhancing Branch Monitoring for Security Purposes: From Control Flow Integrity to Malware Analysis and Debugging.
ACM Trans. Priv. Secur., 2018

Who Watches the Watchmen: A Security-focused Review on Current State-of-the-art Techniques, Tools, and Methods for Systems and Binary Analysis on Modern Platforms.
ACM Comput. Surv., 2018

Lumus: Dynamically Uncovering Evasive Android Applications.
Proceedings of the Information Security - 21st International Conference, 2018

2017
Malicious Software Classification Using Transfer Learning of ResNet-50 Deep Neural Network.
Proceedings of the 16th IEEE International Conference on Machine Learning and Applications, 2017

2016
An ontology of suspicious software behavior.
Appl. Ontology, 2016

Going Native: Using a Large-Scale Analysis of Android Apps to Create a Practical Native-Code Sandboxing Policy.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

2015
Identifying Android malware using dynamically obtained features.
J. Comput. Virol. Hacking Tech., 2015

Toward a Taxonomy of Malware Behaviors.
Comput. J., 2015

Security Testing Methodology for Evaluation of Web Services Robustness - Case: XML Injection.
Proceedings of the 2015 IEEE World Congress on Services, 2015

Return on security investment for cloud computing: a customer perspective.
Proceedings of the 7th International Conference on Management of computational and collective intElligence in Digital EcoSystems, Caraguatatuba, Brazil, October 25, 2015

2014
Ontology for Malware Behavior: A Core Model Proposal.
Proceedings of the 2014 IEEE 23rd International WETICE Conference, 2014

An approach to security-SLA in cloud computing environment.
Proceedings of the IEEE Latin-America Conference on Communications, 2014

2013
An empirical analysis of malicious internet banking software behavior.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

2012
A methodology for management of cloud computing using security criteria.
Proceedings of the IEEE Latin America Conference on Cloud Computing and Communications, 2012

Interactive, Visual-Aided Tools to Analyze Malware Behavior.
Proceedings of the Computational Science and Its Applications - ICCSA 2012, 2012

Pinpointing Malicious Activities through Network and System-Level Malware Execution Behavior.
Proceedings of the Computational Science and Its Applications - ICCSA 2012, 2012

Interactive Analysis of Computer Scenarios through Parallel Coordinates Graphics.
Proceedings of the Computational Science and Its Applications - ICCSA 2012, 2012

A hybrid framework to analyze web and OS malware.
Proceedings of IEEE International Conference on Communications, 2012

Tracking Memory Writes for Malware Classification and Code Reuse Identification.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2012

2011
Scalable model-based configuration management of security services in complex enterprise networks.
Softw. Pract. Exp., 2011

2010
Formal validation of automated policy refinement in the management of network security systems.
Int. J. Inf. Sec., 2010

Kolline: a task-oriented system for collaborative information seeking.
Proceedings of the 28th Annual International Conference on Design of Communication, 2010

2009
Um sistema de recomendação para fóruns de discussão na web baseado na estimativa da expertise e na classificação colaborativa de conteúdo.
Proceedings of the 5th Brazilian Symposium on Information Systems, 2009

Malware distributed collection and pre-classification system using honeypot technology.
Proceedings of the Data Mining, 2009

2008
Model-based management of security services in complex network environments.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008

Analisando sistemas de classificação na <i>web</i> sob a perspectiva da interação social em comunidades de prática.
Proceedings of the VIII Simpósio Brasileiro de Fatores Humanos em Sistemas Computacionais (IHC 2008), 2008

2007
A Policy-Based Framework for Interoperable Digital Content Management.
Proceedings of the 4th IEEE Consumer Communications and Networking Conference, 2007

2006
A Service-Oriented Framework to Promote Interoperability Among DRM Systems.
Proceedings of the Autonomic Management of Mobile Multimedia Services, 2006

2005
Policy Modeling and Refinement for Network Security Systems.
Proceedings of the 6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2005), 2005

Modellierung von Netzsicherheitsystemen umfangreicher vernetzter IT-Infrastrukturen.
Proceedings of the 35. Jahrestagung der Gesellschaft für Informatik, 2005

On Scalability and Modularisation in the Modelling of Network Security Systems.
Proceedings of the Computer Security, 2005

Improving the Configuration Management of Large Network Security Systems.
Proceedings of the Ambient Networks, 2005

2004
Attack Evidence Detection, Recovery, and Signature Extraction with ADenoIdS.
Proceedings of the Telecommunications and Networking, 2004

An intrusion detection system using ideas from the immune system.
Proceedings of the IEEE Congress on Evolutionary Computation, 2004

1998
A holographic visualization system: a sequel.
Proceedings of the XI Computer Graphics, 1998


  Loading...