Tiago Jose dos Santos Martins da Cruz
AuthID: R-000-H8F
31
TITLE: A stealth monitoring mechanism for cyber-physical systems
AUTHORS: Graveto, V; Rosa, L; Cruz, T; Simoes, P;
PUBLISHED: 2019, SOURCE: INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, VOLUME: 24
AUTHORS: Graveto, V; Rosa, L; Cruz, T; Simoes, P;
PUBLISHED: 2019, SOURCE: INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, VOLUME: 24
32
TITLE: SDN-enabled virtual data diode
AUTHORS: de Freitas, MB; Rosa, L; Cruz, T; Simões, P;
PUBLISHED: 2019, SOURCE: 4th International Workshop on the Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2018 and 2nd International Workshop on Security and Privacy Requirements Engineering, SECPRE 2018 held in conjunction with 23rd European Symposium on Research in Computer Security, ESORICS 2018 in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), VOLUME: 11387 LNCS
AUTHORS: de Freitas, MB; Rosa, L; Cruz, T; Simões, P;
PUBLISHED: 2019, SOURCE: 4th International Workshop on the Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2018 and 2nd International Workshop on Security and Privacy Requirements Engineering, SECPRE 2018 held in conjunction with 23rd European Symposium on Research in Computer Security, ESORICS 2018 in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), VOLUME: 11387 LNCS
33
TITLE: From Detecting Cyber-Attacks to Mitigating Risk Within a Hybrid Environment
AUTHORS: Foglietta, C; Masucci, D; Palazzo, C; Santini, R; Panzieri, S; Rosa, L; Cruz, T; Lev, L;
PUBLISHED: 2019, SOURCE: IEEE SYSTEMS JOURNAL, VOLUME: 13, ISSUE: 1
AUTHORS: Foglietta, C; Masucci, D; Palazzo, C; Santini, R; Panzieri, S; Rosa, L; Cruz, T; Lev, L;
PUBLISHED: 2019, SOURCE: IEEE SYSTEMS JOURNAL, VOLUME: 13, ISSUE: 1
34
TITLE: A Comprehensive Security Analysis of a SCADA Protocol: From OSINT to Mitigation
AUTHORS: Rosa, L; Freitas, M; Mazo, S; Monteiro, E; Cruz, T; Simoes, P;
PUBLISHED: 2019, SOURCE: IEEE ACCESS, VOLUME: 7
AUTHORS: Rosa, L; Freitas, M; Mazo, S; Monteiro, E; Cruz, T; Simoes, P;
PUBLISHED: 2019, SOURCE: IEEE ACCESS, VOLUME: 7
35
TITLE: Virtualization of Residential Gateways: A Comprehensive Survey Full Text
AUTHORS: Proenca, J; Cruz, T; Simoes, P; Monteiro, E;
PUBLISHED: 2019, SOURCE: IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, VOLUME: 21, ISSUE: 2
AUTHORS: Proenca, J; Cruz, T; Simoes, P; Monteiro, E;
PUBLISHED: 2019, SOURCE: IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, VOLUME: 21, ISSUE: 2
36
TITLE: A framework for improved home network security
AUTHORS: Craveiro, A; Oliveira, A; Proença, J; Cruz, T; Simões, P;
PUBLISHED: 2019, SOURCE: 18th European Conference on Cyber Warfare and Security, ECCWS 2019 in European Conference on Information Warfare and Security, ECCWS, VOLUME: 2019-July
AUTHORS: Craveiro, A; Oliveira, A; Proença, J; Cruz, T; Simões, P;
PUBLISHED: 2019, SOURCE: 18th European Conference on Cyber Warfare and Security, ECCWS 2019 in European Conference on Information Warfare and Security, ECCWS, VOLUME: 2019-July
INDEXED IN: Scopus
IN MY: ORCID
37
TITLE: A Framework for Improved Home Network Security
AUTHORS: Antonio Craveiro; Ana Oliveira ; Jorge Proenca; Tiago Cruz; Paulo Simoes;
PUBLISHED: 2019, SOURCE: 18th European Conference on Cyber Warfare and Security (ECCWS) in PROCEEDINGS OF THE 18TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2019)
AUTHORS: Antonio Craveiro; Ana Oliveira ; Jorge Proenca; Tiago Cruz; Paulo Simoes;
PUBLISHED: 2019, SOURCE: 18th European Conference on Cyber Warfare and Security (ECCWS) in PROCEEDINGS OF THE 18TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2019)
INDEXED IN: WOS
38
TITLE: Fuzzy system-based suspicious pattern detection in mobile forensic evidence
AUTHORS: Barmpatsalou, K; Cruz, T; Monteiro, E; Simoes, P;
PUBLISHED: 2018, SOURCE: 9th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2017 in Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, VOLUME: 216
AUTHORS: Barmpatsalou, K; Cruz, T; Monteiro, E; Simoes, P;
PUBLISHED: 2018, SOURCE: 9th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2017 in Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, VOLUME: 216
39
TITLE: Cyber security of critical infrastructures
AUTHORS: Maglaras, LA; Kim, KH; Janicke, H; Ferrag, MA; Rallis, S; Fragkou, P; Maglaras, A; Cruz, TJ;
PUBLISHED: 2018, SOURCE: ICT EXPRESS, VOLUME: 4, ISSUE: 1
AUTHORS: Maglaras, LA; Kim, KH; Janicke, H; Ferrag, MA; Rallis, S; Fragkou, P; Maglaras, A; Cruz, TJ;
PUBLISHED: 2018, SOURCE: ICT EXPRESS, VOLUME: 4, ISSUE: 1
40
TITLE: Integrated protection of industrial control systems from cyber-attacks: the ATENA approach
AUTHORS: Adamsky, F; Aubigny, M; Battisti, F; Carli, M; Cimorelli, F; Cruz, T; Di Giorgio, A; Foglietta, C; Galli, A; Giuseppi, A; Liberati, F; Neri, A; Panzieri, S; Pascucci, F; Proenca, J; Pucci, P; Rosa, L; Soua, R;
PUBLISHED: 2018, SOURCE: INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, VOLUME: 21
AUTHORS: Adamsky, F; Aubigny, M; Battisti, F; Carli, M; Cimorelli, F; Cruz, T; Di Giorgio, A; Foglietta, C; Galli, A; Giuseppi, A; Liberati, F; Neri, A; Panzieri, S; Pascucci, F; Proenca, J; Pucci, P; Rosa, L; Soua, R;
PUBLISHED: 2018, SOURCE: INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, VOLUME: 21