Pedro R. M. Inácio

Orcid: 0000-0001-8221-0666

According to our database1, Pedro R. M. Inácio authored at least 51 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Distributed Virtual-Machine Placement and Migration Approach Based on Modern Portfolio Theory.
J. Netw. Syst. Manag., March, 2024

Detection of Slowloris Attacks using Machine Learning Algorithms.
Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, 2024

An Approach to Attack Modeling for the IoT: Creating Attack Trees from System Descriptions.
Proceedings of the Advanced Information Networking and Applications, 2024

2023
Theoretical and practical assessments over SSH.
Res. Pract. Technol. Enhanc. Learn., 2023

Secure cloud-based mobile apps: attack taxonomy, requirements, mechanisms, tests and automation.
Int. J. Inf. Sec., 2023

How Deep Learning Sees the World: A Survey on Adversarial Attacks & Defenses.
CoRR, 2023

WASD: A Wilder Active Speaker Detection Dataset.
CoRR, 2023

On Exploring Audio Anomaly in Speech.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2023

2022
Improving software maintenance with improved bug triaging.
J. King Saud Univ. Comput. Inf. Sci., 2022

Detection and Mitigation of Low-Rate Denial-of-Service Attacks: A Survey.
IEEE Access, 2022

A System for the Promotion of Traceability and Ownership of Health Data Using Blockchain.
IEEE Access, 2022

A Complete Review on the Application of Statistical Methods for Evaluating Internet Traffic Usage.
IEEE Access, 2022

Predicting CVSS Metric via Description Interpretation.
IEEE Access, 2022

Impact of Self C Parameter on SVM-based Classification of Encrypted Multimedia Peer-to-Peer Traffic.
Proceedings of the Advanced Information Networking and Applications, 2022

2021
Behaviour-based Malware Detection in Mobile AndroidPlatforms Using Machine Learning Algorithms.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021

Towards the Use of Blockchain in Mobile Health Services and Applications.
J. Medical Syst., 2021

Attack and System Modeling Applied to IoT, Cloud, and Mobile Ecosystems: Embedding Security by Design.
ACM Comput. Surv., 2021

Performance evaluation of the SRE and SBPG components of the IoT hardware platform security advisor framework.
Comput. Networks, 2021

Detection of reduction-of-quality DDoS attacks using Fuzzy Logic and machine learning algorithms.
Comput. Networks, 2021

Performance Evaluation of Container-Level Anomaly-Based Intrusion Detection Systems for Multi-Tenant Applications Using Machine Learning Algorithms.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Recent trends in applying TPM to cloud computing.
Secur. Priv., 2020

IoT-HarPSecA: A Framework and Roadmap for Secure Design and Development of Devices and Applications in the IoT Space.
IEEE Access, 2020

A Preliminary Evaluation of the SRE and SBPG Components of the IoT-HarPSecA Framework.
Proceedings of the 2020 Global Internet of Things Summit, 2020

Classification of Encrypted Internet Traffic Using Kullback-Leibler Divergence and Euclidean Distance.
Proceedings of the Advanced Information Networking and Applications, 2020

2019
IoT-HarPSecA: A Framework for Facilitating the Design and Development of Secure IoT Devices.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Challenges of securing Internet of Things devices: A survey.
Secur. Priv., 2018

Approaches for optimizing virtual machine placement and migration in cloud environments: A survey.
J. Parallel Distributed Comput., 2018

Security Threats and Possible Countermeasures in IoT Applications Covering Different Industry Domains.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Applications of artificial immune systems to computer security: A survey.
J. Inf. Secur. Appl., 2017

CloudSim Plus: A cloud computing simulation framework pursuing software engineering principles for improved modularity, extensibility and correctness.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017

Applications of Trusted Computing in Cloud Context.
Proceedings of the Research Advances in Cloud Computing, 2017

2015
Assessment of the Susceptibility to Data Manipulation of Android Games with In-app Purchases.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

Fractal Beauty in Text.
Proceedings of the Progress in Artificial Intelligence, 2015

2014
Security issues in cloud environments: a survey.
Int. J. Inf. Sec., 2014

A tool for estimating the hurst parameter and for generating self-similar sequences.
Proceedings of the 2014 Summer Simulation Multiconference, 2014

2013
Identification of Peer-to-Peer VoIP Sessions Using Entropy and Codec Properties.
IEEE Trans. Parallel Distributed Syst., 2013

Detection and classification of peer-to-peer traffic: A survey.
ACM Comput. Surv., 2013

Randomness in Virtual Machines.
Proceedings of the IEEE/ACM 6th International Conference on Utility and Cloud Computing, 2013

Real-time traffic classification based on statistical tests for matching signatures with packet length distributions.
Proceedings of the 19th IEEE Workshop on Local & Metropolitan Area Networks, 2013

Secure user authentication in cloud computing management interfaces.
Proceedings of the IEEE 32nd International Performance Computing and Communications Conference, 2013

2012
Fast synthesis of persistent fractional Brownian motion.
ACM Trans. Model. Comput. Simul., 2012

Corrigendum: Exploring Behavioral Patterns Through Entropy in Multimedia Peer-to-Peer Traffic.
Comput. J., 2012

Exploring Behavioral Patterns Through Entropy in Multimedia Peer-to-Peer Traffic.
Comput. J., 2012

2011
On-line Detection of Encrypted Traffic Generated by Mesh-Based Peer-to-Peer Live Streaming Applications: The Case of GoalBit.
Proceedings of The Tenth IEEE International Symposium on Networking Computing and Applications, 2011

2010
Source traffic analysis.
ACM Trans. Multim. Comput. Commun. Appl., 2010

NetOdyssey - A New Tool for Real-Time Analysis of Network Traffic.
Proceedings of The Ninth IEEE International Symposium on Networking Computing and Applications, 2010

2009
The design and evaluation of the Simple Self-Similar Sequences Generator.
Inf. Sci., 2009

2008
Analysis of the Impact of Intensive Attacks on the Self-Similarity Degree of the Network Traffic.
Proceedings of the Second International Conference on Emerging Security Information, 2008

Analysis of Peer-to-Peer Traffic Using a Behavioural Method Based on Entropy.
Proceedings of the 2008 IEEE International Performance, 2008

2007
On EPON security issues.
IEEE Commun. Surv. Tutorials, 2007

2006
Preamble Encryption Mechanism for Enhanced Privacy in Ethernet Passive Optical Networks.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006


  Loading...