Pedro R. M. Inácio
Orcid: 0000-0001-8221-0666
According to our database1,
Pedro R. M. Inácio
authored at least 56 papers
between 2006 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
2006
2008
2010
2012
2014
2016
2018
2020
2022
2024
0
1
2
3
4
5
6
7
8
9
10
1
1
6
2
5
5
2
2
1
1
2
3
1
1
1
3
1
1
1
2
1
1
1
2
1
3
1
1
2
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
IEEE Trans. Biom. Behav. Identity Sci., January, 2025
2024
Int. J. Inf. Sec., August, 2024
A Distributed Virtual-Machine Placement and Migration Approach Based on Modern Portfolio Theory.
J. Netw. Syst. Manag., March, 2024
IEEE Access, 2024
Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, 2024
An Approach to Attack Modeling for the IoT: Creating Attack Trees from System Descriptions.
Proceedings of the Advanced Information Networking and Applications, 2024
Analysis of the Capability and Training of Chat Bots in the Generation of Rules for Firewall or Intrusion Detection Systems.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
Res. Pract. Technol. Enhanc. Learn., 2023
Secure cloud-based mobile apps: attack taxonomy, requirements, mechanisms, tests and automation.
Int. J. Inf. Sec., 2023
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2023
2022
J. King Saud Univ. Comput. Inf. Sci., 2022
IEEE Access, 2022
A System for the Promotion of Traceability and Ownership of Health Data Using Blockchain.
IEEE Access, 2022
A Complete Review on the Application of Statistical Methods for Evaluating Internet Traffic Usage.
IEEE Access, 2022
Impact of Self C Parameter on SVM-based Classification of Encrypted Multimedia Peer-to-Peer Traffic.
Proceedings of the Advanced Information Networking and Applications, 2022
2021
Behaviour-based Malware Detection in Mobile AndroidPlatforms Using Machine Learning Algorithms.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021
J. Medical Syst., 2021
Attack and System Modeling Applied to IoT, Cloud, and Mobile Ecosystems: Embedding Security by Design.
ACM Comput. Surv., 2021
Performance evaluation of the SRE and SBPG components of the IoT hardware platform security advisor framework.
Comput. Networks, 2021
Detection of reduction-of-quality DDoS attacks using Fuzzy Logic and machine learning algorithms.
Comput. Networks, 2021
Performance Evaluation of Container-Level Anomaly-Based Intrusion Detection Systems for Multi-Tenant Applications Using Machine Learning Algorithms.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
2020
IoT-HarPSecA: A Framework and Roadmap for Secure Design and Development of Devices and Applications in the IoT Space.
IEEE Access, 2020
A Preliminary Evaluation of the SRE and SBPG Components of the IoT-HarPSecA Framework.
Proceedings of the 2020 Global Internet of Things Summit, 2020
Classification of Encrypted Internet Traffic Using Kullback-Leibler Divergence and Euclidean Distance.
Proceedings of the Advanced Information Networking and Applications, 2020
2019
IoT-HarPSecA: A Framework for Facilitating the Design and Development of Secure IoT Devices.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
2018
Approaches for optimizing virtual machine placement and migration in cloud environments: A survey.
J. Parallel Distributed Comput., 2018
Security Threats and Possible Countermeasures in IoT Applications Covering Different Industry Domains.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
2017
J. Inf. Secur. Appl., 2017
CloudSim Plus: A cloud computing simulation framework pursuing software engineering principles for improved modularity, extensibility and correctness.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017
Proceedings of the Research Advances in Cloud Computing, 2017
2015
Assessment of the Susceptibility to Data Manipulation of Android Games with In-app Purchases.
Proceedings of the ICT Systems Security and Privacy Protection, 2015
2014
Proceedings of the 2014 Summer Simulation Multiconference, 2014
2013
IEEE Trans. Parallel Distributed Syst., 2013
ACM Comput. Surv., 2013
Proceedings of the IEEE/ACM 6th International Conference on Utility and Cloud Computing, 2013
Real-time traffic classification based on statistical tests for matching signatures with packet length distributions.
Proceedings of the 19th IEEE Workshop on Local & Metropolitan Area Networks, 2013
Proceedings of the IEEE 32nd International Performance Computing and Communications Conference, 2013
2012
ACM Trans. Model. Comput. Simul., 2012
Corrigendum: Exploring Behavioral Patterns Through Entropy in Multimedia Peer-to-Peer Traffic.
Comput. J., 2012
Comput. J., 2012
2011
On-line Detection of Encrypted Traffic Generated by Mesh-Based Peer-to-Peer Live Streaming Applications: The Case of GoalBit.
Proceedings of The Tenth IEEE International Symposium on Networking Computing and Applications, 2011
2010
Proceedings of The Ninth IEEE International Symposium on Networking Computing and Applications, 2010
2009
Inf. Sci., 2009
2008
Analysis of the Impact of Intensive Attacks on the Self-Similarity Degree of the Network Traffic.
Proceedings of the Second International Conference on Emerging Security Information, 2008
Proceedings of the 2008 IEEE International Performance, 2008
2007
2006
Preamble Encryption Mechanism for Enhanced Privacy in Ethernet Passive Optical Networks.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006