101
TÍTULO: Assumptions: The Trojan horses of secure protocols
AUTORES: Paulo Verissimo ;
PUBLICAÇÃO: 2007, FONTE: 4th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security in Computer Network Security, Proceedings, VOLUME: 1
INDEXADO EM: Scopus WOS
102
TÍTULO: Automated rule-based diagnosis through a distributed monitor system  Full Text
AUTORES: Gunjan Khanna; Mike Yu Cheng; Padma Varadharajan; Saurabh Bagchi; Miguel P Correia ; Paulo J Verissimo ;
PUBLICAÇÃO: 2007, FONTE: IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOLUME: 4, NÚMERO: 4
INDEXADO EM: Scopus WOS DBLP CrossRef: 22
NO MEU: ORCID | DBLP
103
TÍTULO: Generic-events architecture: Integrating real-world aspects in event-based systems  Full Text
AUTORES: Antonio Casimiro ; Joerg Kaiser; Paulo Verissimo ;
PUBLICAÇÃO: 2007, FONTE: Workshop on Architecting Dependable Systems/International Conference on Dependable Systems and Network in Architecting Dependable Systems IV, VOLUME: 4615
INDEXADO EM: Scopus WOS
NO MEU: ORCID
104
TÍTULO: Intrusion tolerance in wireless environments: an experimental evaluation
AUTORES: Henrique Moniz ; Nuno Ferreira Neves ; Miguel Correia ; Antonio Casimiro ; Paulo Verissimo ;
PUBLICAÇÃO: 2007, FONTE: 13th Pacific Rim International Symposium on Dependable Computing in 13TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING, PROCEEDINGS
INDEXADO EM: WOS DBLP CrossRef: 3
NO MEU: DBLP
105
TÍTULO: Intrusion tolerance in wireless environments: An experimental evaluation
AUTORES: Moniz, H; Neves, NF ; Correia, M ; Casimiro, A; Verissimo, P ;
PUBLICAÇÃO: 2007, FONTE: 13th Pacific Rim International Symposium on Dependable Computing, PRDC 2007 in Proceedings - 13th Pacific Rim International Symposium on Dependable Computing, PRDC 2007
INDEXADO EM: Scopus
106
TÍTULO: On the effects of finite memory on intrusion-tolerant systems
AUTORES: Giuliana Santos Veronese; Miguel Correia ; Lau Cheuk Lung; Paulo Verissimo ;
PUBLICAÇÃO: 2007, FONTE: 13th Pacific Rim International Symposium on Dependable Computing in 13TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING, PROCEEDINGS
INDEXADO EM: WOS DBLP CrossRef: 1
NO MEU: DBLP
107
TÍTULO: On the effects of finite memory on intrusion-tolerant systems
AUTORES: Veronese, GS; Correia, M ; Lung, LC; Verissimo, P ;
PUBLICAÇÃO: 2007, FONTE: 13th Pacific Rim International Symposium on Dependable Computing, PRDC 2007 in Proceedings - 13th Pacific Rim International Symposium on Dependable Computing, PRDC 2007
INDEXADO EM: Scopus
108
TÍTULO: Resilient intrusion tolerance through proactive and reactive recovery
AUTORES: Sousa, P; Bessani, AN ; Correia, M ; Neves, NF ; Verissimo, P ;
PUBLICAÇÃO: 2007, FONTE: 13th Pacific Rim International Symposium on Dependable Computing, PRDC 2007 in Proceedings - 13th Pacific Rim International Symposium on Dependable Computing, PRDC 2007
INDEXADO EM: Scopus
109
TÍTULO: Resilient intrusion tolerance through proactive and reactive recovery
AUTORES: Paulo Sousa; Alysson Neves Bessani ; Miguel Correia ; Nuno Ferreira Neves ; Paulo Verissimo ;
PUBLICAÇÃO: 2007, FONTE: 13th Pacific Rim International Symposium on Dependable Computing in 13TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING, PROCEEDINGS
INDEXADO EM: WOS DBLP CrossRef: 36
NO MEU: DBLP
110
TÍTULO: The CRUTIAL Architecture for Critical Information Infrastructures
AUTORES: Paulo Veríssimo ; Nuno Ferreira Neves ; Miguel Correia ; Yves Deswarte; Anas Abou El Kalam; Andrea Bondavalli; Alessandro Daidone;
PUBLICAÇÃO: 2007, FONTE: Architecting Dependable Systems V [the book is a result from the WADS 2007 and the Third Workshop on the Role of Software Architecture for Testing and Analysis], VOLUME: 5135
INDEXADO EM: DBLP CrossRef: 14
NO MEU: ORCID | DBLP
Página 11 de 22. Total de resultados: 216.