Paulo S. Motta Pires
According to our database1,
Paulo S. Motta Pires
authored at least 16 papers
between 2004 and 2015.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2015
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015
2014
Proceedings of the Computational Intelligence in Digital Forensics: Forensic Investigation and Applications, 2014
2011
A Qualitative Survey of Active TCP/IP Fingerprinting Tools and Techniques for Operating Systems Identification.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011
2009
Proceedings of 12th IEEE International Conference on Emerging Technologies and Factory Automation, 2009
An Effective TCP/IP Fingerprinting Technique Based on Strange Attractors Classification.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2009
Proceedings of the Critical Information Infrastructures Security, 2009
Proceedings of the Computational Intelligence in Security for Information Systems, 2009
2008
Proceedings of 13th IEEE International Conference on Emerging Technologies and Factory Automation, 2008
Proceedings of the Critical Information Infrastructure Security, 2008
2007
Proceedings of 12th IEEE International Conference on Emerging Technologies and Factory Automation, 2007
Using a packet manipulation tool for security analysis of industrial network protocols.
Proceedings of 12th IEEE International Conference on Emerging Technologies and Factory Automation, 2007
Proceedings of the Critical Information Infrastructures Security, 2007
2006
Improvements on Ethernet LAN Network Infrastructure for Industrial Automation: a Case Study.
Proceedings of 11th IEEE International Conference on Emerging Technologies and Factory Automation, 2006
Proceedings of the 2006 International Conference on Dependability of Computer Systems (DepCoS-RELCOMEX 2006), 2006
2004
Proceedings of the Detection of Intrusions and Malware & Vulnerability Assessment, 2004