Paulo Simões
Orcid: 0000-0002-5079-8327Affiliations:
- University of Coimbra, Portugal
According to our database1,
Paulo Simões
authored at least 101 papers
between 1999 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on cisuc.uc.pt
-
on orcid.org
On csauthors.net:
Bibliography
2024
Container-based Virtualization for Real-time Industrial Systems - A Systematic Review.
ACM Comput. Surv., March, 2024
A Survey on Forensics and Compliance Auditing for Critical Infrastructure Protection.
IEEE Access, 2024
Data-Centric Federated Learning for Anomaly Detection in Smart Grids and Other Industrial Control Systems.
Proceedings of the NOMS 2024 IEEE Network Operations and Management Symposium, 2024
Proceedings of the NOMS 2024 IEEE Network Operations and Management Symposium, 2024
2023
A forensics and compliance auditing framework for critical infrastructure protection.
Int. J. Crit. Infrastructure Prot., September, 2023
IEEE Internet Things J., August, 2023
Microprocess. Microsystems, June, 2023
IEEE Commun. Surv. Tutorials, 2023
IEEE Access, 2023
Proceedings of the NOMS 2023, 2023
2022
Dataset, June, 2022
Dataset, January, 2022
An automated closed-loop framework to enforce security policies from anomaly detection.
Comput. Secur., 2022
Security of Building Automation and Control Systems: Survey and future research directions.
Comput. Secur., 2022
2021
Intrusion and anomaly detection for the next-generation of industrial automation and control systems.
Future Gener. Comput. Syst., 2021
IEEE Access, 2021
Proceedings of the 2021 IEEE Conference on Network Function Virtualization and Software Defined Networks, 2021
2020
Risk Management and Privacy Violation Detection in the PoSeID-on Data Privacy Platform.
SN Comput. Sci., 2020
Proceedings of the NOMS 2020, 2020
2019
Int. J. Electron. Gov. Res., 2019
Int. J. Crit. Infrastructure Prot., 2019
IEEE Commun. Surv. Tutorials, 2019
IEEE Access, 2019
2018
IEEE Secur. Priv., 2018
ACM Comput. Surv., 2018
IEEE Access, 2018
Proceedings of the Computer Security - ESORICS 2018 International Workshops, 2018
Denial of Service Attacks: Detecting the Frailties of Machine Learning Algorithms in the Classification Process.
Proceedings of the Critical Information Infrastructures Security, 2018
2017
A Novel Intrusion Detection Mechanism for SCADA systems which Automatically Adapts to Network Topology Changes.
EAI Endorsed Trans. Ind. Networks Intell. Syst., 2017
Future Gener. Comput. Syst., 2017
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017
Proceedings of the Digital Forensics and Cyber Crime - 9th International Conference, 2017
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017
2016
IEEE Trans. Netw. Serv. Manag., 2016
A Cybersecurity Detection Framework for Supervisory Control and Data Acquisition Systems.
IEEE Trans. Ind. Informatics, 2016
IEEE Embed. Syst. Lett., 2016
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016
Proceedings of the Industrial Networks and Intelligent Systems, 2016
2015
Secur. Commun. Networks, 2015
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015
2014
Proceedings of the New Perspectives in Information Systems and Technologies, 2014
Proceedings of the SECRYPT 2014, 2014
Proceedings of the Eighth International Conference on Next Generation Mobile Apps, 2014
Proceedings of the Mobile Networks and Management - 6th International Conference, 2014
Software-Defined Networking: Guidelines for Experimentation and Validation in Large-Scale Real World Scenarios.
Proceedings of the Artificial Intelligence Applications and Innovations, 2014
Proceedings of the Third European Workshop on Software Defined Networks, 2014
Proceedings of the 2014 IEEE Emerging Technology and Factory Automation, 2014
2013
J. Netw. Syst. Manag., 2013
Trust Based Interdependency Weighting for On-Line Risk Monitoring in Interdependent Critical Infrastructures.
Int. J. Secur. Softw. Eng., 2013
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, 2013
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013
Tutamen: An Integrated Personal Mobile and Adaptable Video Platform for Health and Protection.
Proceedings of the Artificial Intelligence Applications and Innovations, 2013
Proceedings of the International Conference on Information Networking 2013, 2013
2012
Design and implementation of a mediation system enabling secure communication among Critical Infrastructures.
Int. J. Crit. Infrastructure Prot., 2012
Proceedings of the Computational Science and Its Applications - ICCSA 2012, 2012
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012
Proceedings of the 2nd Baltic Congress on Future Internet Communications, 2012
2011
Proceedings of the Third International Conference on Games and Virtual Worlds for Serious Applications, 2011
How to provision and manage off-the-shelf SIP phones in domestic and SOHO environments.
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011
Performance evaluation of service searching using aggregation in peer-to-peer Service Overlay Networks.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011
Assurance and Trust Indicators to Evaluate Accuracy of On-line Risk in Critical Infrastructures.
Proceedings of the Critical Information Infrastructure Security, 2011
Trust based interdependency weighting for on-line risk monitoring in interdependent critical infrastructures.
Proceedings of the CRiSIS 2011, 2011
Proceedings of the 7th International Conference on Network and Service Management, 2011
Proceedings of the 7th International Conference on Network and Service Management, 2011
Proceedings of the Managing the Dynamics of Networks and Services, 2011
2010
Int. J. Electron. Secur. Digit. Forensics, 2010
Proceedings of the Towards a Service-Based Internet - Third European Conference, 2010
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010
Proceedings of the Critical Information Infrastructures Security, 2010
Improving Resilience of Interdependent Critical Infrastructures via an On-Line Alerting System.
Proceedings of the Complexity in Engineering, 2010
Proceedings of the 6th International Conference on Network and Service Management, 2010
An aggregation scheme for the optimisation of service search in Peer-to-Peer overlays.
Proceedings of the 6th International Conference on Network and Service Management, 2010
Proceedings of the 6th International Conference on Network and Service Management, 2010
Proceedings of the Mechanisms for Autonomous Management of Networks and Services, 2010
2009
Proceedings of the IP Operations and Management, 9th IEEE International Workshop, 2009
Proceedings of the Scalability of Networks and Services, 2009
2008
QoS management and control for an all-IP WiMAX network architecture: Design, implementation and evaluation.
Mob. Inf. Syst., 2008
WEIRD testbeds with fixed and mobile WiMAX technology for user applications, telemedicine and monitoring of impervious areas.
Proceedings of the 4th International Conference on Testbeds & Research Infrastructures for the DEvelopment of NeTworks & COMmunities (TRIDENTCOM 2008), 2008
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008
Extending WiMAX to New Scenarios: Key Results on System Architecture and Test-beds of the WEIRD project.
Proceedings of the 4th International ICST Mobile Multimedia Communications Conference, 2008
2006
Proceedings of the Wired/Wireless Internet Communications, 4th International Conference, 2006
2005
Proceedings of the Network Control and Engineering for QoS, 2005
2003
Enabling PreOS Desktop Management.
Proceedings of the Integrated Network Management VII, Managing It All, 2003
2002
A Component-Based Approach for Integrating Mobile Agents Into the Existing Web Infrastructure.
Proceedings of the 2002 Symposium on Applications and the Internet (SAINT 2002), 28 January, 2002
Distributed retrieval of management information: is it about mobility, locality or distribution?
Proceedings of the Management Solutions for the New Communications World, 2002
2001
Proceedings of the 12th International Workshop on Database and Expert Systems Applications (DEXA 2001), 2001
2000
An Authentication Protocol for Mobilde Devices.
Proceedings of the 2000 ICDCS Workshops, April 10, 2000, Taipei, Taiwan, ROC, 2000
1999
Proceedings of the Intelligent Agents for Telecommunication Applications, 1999
Proceedings of the Active Technologies for Network and Service Management, 1999