Tiago Jose dos Santos Martins da Cruz
AuthID: R-000-H8F
31
TÃTULO: A stealth monitoring mechanism for cyber-physical systems
AUTORES: Graveto, V; Rosa, L; Cruz, T; Simoes, P;
PUBLICAÇÃO: 2019, FONTE: INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, VOLUME: 24
AUTORES: Graveto, V; Rosa, L; Cruz, T; Simoes, P;
PUBLICAÇÃO: 2019, FONTE: INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, VOLUME: 24
32
TÃTULO: SDN-enabled virtual data diode
AUTORES: de Freitas, MB; Rosa, L; Cruz, T; Simões, P;
PUBLICAÇÃO: 2019, FONTE: 4th International Workshop on the Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2018 and 2nd International Workshop on Security and Privacy Requirements Engineering, SECPRE 2018 held in conjunction with 23rd European Symposium on Research in Computer Security, ESORICS 2018 in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), VOLUME: 11387 LNCS
AUTORES: de Freitas, MB; Rosa, L; Cruz, T; Simões, P;
PUBLICAÇÃO: 2019, FONTE: 4th International Workshop on the Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2018 and 2nd International Workshop on Security and Privacy Requirements Engineering, SECPRE 2018 held in conjunction with 23rd European Symposium on Research in Computer Security, ESORICS 2018 in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), VOLUME: 11387 LNCS
33
TÃTULO: From Detecting Cyber-Attacks to Mitigating Risk Within a Hybrid Environment
AUTORES: Foglietta, C; Masucci, D; Palazzo, C; Santini, R; Panzieri, S; Rosa, L; Cruz, T; Lev, L;
PUBLICAÇÃO: 2019, FONTE: IEEE SYSTEMS JOURNAL, VOLUME: 13, NÚMERO: 1
AUTORES: Foglietta, C; Masucci, D; Palazzo, C; Santini, R; Panzieri, S; Rosa, L; Cruz, T; Lev, L;
PUBLICAÇÃO: 2019, FONTE: IEEE SYSTEMS JOURNAL, VOLUME: 13, NÚMERO: 1
34
TÃTULO: A Comprehensive Security Analysis of a SCADA Protocol: From OSINT to Mitigation
AUTORES: Rosa, L; Freitas, M; Mazo, S; Monteiro, E; Cruz, T; Simoes, P;
PUBLICAÇÃO: 2019, FONTE: IEEE ACCESS, VOLUME: 7
AUTORES: Rosa, L; Freitas, M; Mazo, S; Monteiro, E; Cruz, T; Simoes, P;
PUBLICAÇÃO: 2019, FONTE: IEEE ACCESS, VOLUME: 7
35
TÃTULO: Virtualization of Residential Gateways: A Comprehensive Survey Full Text
AUTORES: Proenca, J; Cruz, T; Simoes, P; Monteiro, E;
PUBLICAÇÃO: 2019, FONTE: IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, VOLUME: 21, NÚMERO: 2
AUTORES: Proenca, J; Cruz, T; Simoes, P; Monteiro, E;
PUBLICAÇÃO: 2019, FONTE: IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, VOLUME: 21, NÚMERO: 2
36
TÃTULO: A framework for improved home network security
AUTORES: Craveiro, A; Oliveira, A; Proença, J; Cruz, T; Simões, P;
PUBLICAÇÃO: 2019, FONTE: 18th European Conference on Cyber Warfare and Security, ECCWS 2019 in European Conference on Information Warfare and Security, ECCWS, VOLUME: 2019-July
AUTORES: Craveiro, A; Oliveira, A; Proença, J; Cruz, T; Simões, P;
PUBLICAÇÃO: 2019, FONTE: 18th European Conference on Cyber Warfare and Security, ECCWS 2019 in European Conference on Information Warfare and Security, ECCWS, VOLUME: 2019-July
INDEXADO EM: Scopus
NO MEU: ORCID
37
TÃTULO: A Framework for Improved Home Network Security
AUTORES: Antonio Craveiro; Ana Oliveira ; Jorge Proenca; Tiago Cruz; Paulo Simoes;
PUBLICAÇÃO: 2019, FONTE: 18th European Conference on Cyber Warfare and Security (ECCWS) in PROCEEDINGS OF THE 18TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2019)
AUTORES: Antonio Craveiro; Ana Oliveira ; Jorge Proenca; Tiago Cruz; Paulo Simoes;
PUBLICAÇÃO: 2019, FONTE: 18th European Conference on Cyber Warfare and Security (ECCWS) in PROCEEDINGS OF THE 18TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2019)
INDEXADO EM: WOS
38
TÃTULO: Fuzzy system-based suspicious pattern detection in mobile forensic evidence
AUTORES: Barmpatsalou, K; Cruz, T; Monteiro, E; Simoes, P;
PUBLICAÇÃO: 2018, FONTE: 9th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2017 in Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, VOLUME: 216
AUTORES: Barmpatsalou, K; Cruz, T; Monteiro, E; Simoes, P;
PUBLICAÇÃO: 2018, FONTE: 9th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2017 in Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, VOLUME: 216
39
TÃTULO: Cyber security of critical infrastructures
AUTORES: Maglaras, LA; Kim, KH; Janicke, H; Ferrag, MA; Rallis, S; Fragkou, P; Maglaras, A; Cruz, TJ;
PUBLICAÇÃO: 2018, FONTE: ICT EXPRESS, VOLUME: 4, NÚMERO: 1
AUTORES: Maglaras, LA; Kim, KH; Janicke, H; Ferrag, MA; Rallis, S; Fragkou, P; Maglaras, A; Cruz, TJ;
PUBLICAÇÃO: 2018, FONTE: ICT EXPRESS, VOLUME: 4, NÚMERO: 1
40
TÃTULO: Integrated protection of industrial control systems from cyber-attacks: the ATENA approach
AUTORES: Adamsky, F; Aubigny, M; Battisti, F; Carli, M; Cimorelli, F; Cruz, T; Di Giorgio, A; Foglietta, C; Galli, A; Giuseppi, A; Liberati, F; Neri, A; Panzieri, S; Pascucci, F; Proenca, J; Pucci, P; Rosa, L; Soua, R;
PUBLICAÇÃO: 2018, FONTE: INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, VOLUME: 21
AUTORES: Adamsky, F; Aubigny, M; Battisti, F; Carli, M; Cimorelli, F; Cruz, T; Di Giorgio, A; Foglietta, C; Galli, A; Giuseppi, A; Liberati, F; Neri, A; Panzieri, S; Pascucci, F; Proenca, J; Pucci, P; Rosa, L; Soua, R;
PUBLICAÇÃO: 2018, FONTE: INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, VOLUME: 21