81
TITLE: Monitoring as a Service for Cloud Environments
AUTHORS: Julius Mueller; David Palma; Giada Landi; Joao Soares; Bruno Parreira; Thijs Metsch; Peter Gray; Alexander Georgiev; Yahya Ai Hazmi; Thomas Magedanz; Paulo Simoes;
PUBLISHED: 2014, SOURCE: 5th IEEE International Conference on Communications and Electronics (ICCE) in 2014 IEEE FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND ELECTRONICS (ICCE)
INDEXED IN: WOS
82
TITLE: Keeping an Eye on Your Security Through Assurance Indicators
AUTHORS: Moussa Ouedraogo; Chien Ting Kuo; Simon Tjoa; David Preston; Eric Dubois; Paulo Simoes; Tiago Cruz;
PUBLISHED: 2014, SOURCE: 11th International Conference on Security and Cryptography (SECRYPT) in 2014 11TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT)
INDEXED IN: WOS
83
TITLE: A Distributed IDS for Industrial Control Systems
AUTHORS: Tiago Cruz; Jorge Proença; Paulo Simões; Matthieu Aubigny; Moussa Ouedraogo; Antonio Graziano; Leandros Maglaras;
PUBLISHED: 2014, SOURCE: International Journal of Cyber Warfare and Terrorism, VOLUME: 4, ISSUE: 2
INDEXED IN: CrossRef: 5
IN MY: ORCID
84
TITLE: Application of the Open Archives Initiative protocols in Scientific Articles Databases
AUTHORS: Ricardo Cabaco; Nuno Francisco; Amilcar Cardoso ; Paulo Simoes;
PUBLISHED: 2013, SOURCE: 8th Iberian Conference on Information Systems and Technologies (CISTI) in PROCEEDINGS OF THE 2013 8TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI 2013)
INDEXED IN: Scopus WOS
IN MY: ORCID
85
TITLE: On the use of honeypots for detecting cyber attacks on industrial control networks
AUTHORS: Simoes, P; Cruz, T; Gomes, J; Monteiro, E;
PUBLISHED: 2013, SOURCE: 12th European Conference on Information Warfare and Security 2013, ECIW 2013 in European Conference on Information Warfare and Security, ECCWS
INDEXED IN: Scopus
IN MY: ORCID
86
TITLE: Tutamen: An Integrated Personal Mobile and Adaptable Video Platform for Health and Protection
AUTHORS: David Palma; Joao Goncalves; Luis Cordeiro ; Paulo Simoes; Edmundo Monteiro; Panagis Magdalinos; Ioannis Chochliouros;
PUBLISHED: 2013, SOURCE: 9th IFIP WG 12.5 International Conference on Artificial Intelligence Applications and Innovations (AIAI) in ARTIFICIAL INTELLIGENCE APPLICATIONS AND INNOVATIONS, AIAI 2013, VOLUME: 412
INDEXED IN: Scopus WOS CrossRef: 7
IN MY: ORCID
87
TITLE: On the use of thin-client set-top boxes for IPTV services
AUTHORS: Cruz, T; Simoes, P; Cabaco, P; Monteiro, E; Bastos, F; Laranjeira, A;
PUBLISHED: 2013, SOURCE: 38th Annual IEEE Conference on Local Computer Networks, LCN 2013 in Proceedings - Conference on Local Computer Networks, LCN
INDEXED IN: Scopus CrossRef: 2
IN MY: ORCID
88
TITLE: Trust Based Interdependency Weighting for On-Line Risk Monitoring in Interdependent Critical Infrastructures
AUTHORS: Filipe Caldeira ; Thomas Schaberreiter; Sébastien Varrette; Edmundo Monteiro; Paulo Simões; Pascal Bouvry; Djamel Khadraoui;
PUBLISHED: 2013, SOURCE: International Journal of Secure Software Engineering, VOLUME: 4, ISSUE: 4
INDEXED IN: CrossRef Handle
IN MY: ORCID
89
TITLE: Approach for Service Search and Peer Selection in P2P Service Overlays
AUTHORS: Adriano Fiorese; Paulo Simoes; Fernando Boavida ;
PUBLISHED: 2013, SOURCE: 27th International Conference on Information Networking (ICOIN) in 2013 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN)
INDEXED IN: WOS
90
TITLE: Assurance and Trust Indicators to Evaluate Accuracy of On-line Risk in Critical Infrastructures
AUTHORS: Thomas Schaberreiter; Filipe Caldeira ; Jocelyn Aubert; Edmundo Monteiro; Djamel Khadraoui; Paulo Simoes;
PUBLISHED: 2013, SOURCE: 6th International Workshop on Critical Information Infrastructures Security (CRITIS) in CRITICAL INFORMATION INFRASTRUCTURE SECURITY, CRITIS 2011, VOLUME: 6983
INDEXED IN: WOS
Page 9 of 11. Total results: 105.