101
TITLE: Vulnerability-Tolerant Transport Layer Security
AUTHORS: André Joaquim; Miguel L Pardal; Miguel Correia ;
PUBLISHED: 2017, SOURCE: OPODIS, VOLUME: 95
INDEXED IN: Scopus DBLP
102
TITLE: Xor-overlay Topology Management Beyond Kademlia
AUTHORS: Lavoie, E; Hendren, L; Correia, M ;
PUBLISHED: 2017, SOURCE: 11th IEEE International Conference on Self-Adaptive and Self-Organizing Systems (SASO) in 2017 IEEE 11TH INTERNATIONAL CONFERENCE ON SELF-ADAPTIVE AND SELF-ORGANIZING SYSTEMS (SASO)
INDEXED IN: WOS DBLP
103
TITLE: DARSHANA: Detecting Route Hijacking for Communication Confidentiality
AUTHORS: Balu, K; Pardal, ML; Correia, M ;
PUBLISHED: 2016, SOURCE: 15th IEEE International Symposium on Network Computing and Applications (IEEE NCA) in 15TH IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (IEEE NCA 2016)
INDEXED IN: Scopus WOS DBLP CrossRef: 3
104
TITLE: DEKANT: a static analysis tool that learns to detect web application vulnerabilities
AUTHORS: Ibéria Medeiros; Nuno Ferreira Neves ; Miguel Correia ;
PUBLISHED: 2016, SOURCE: ISSTA
INDEXED IN: Scopus DBLP CrossRef: 55
105
TITLE: Detecting and Removing Web Application Vulnerabilities with Static Analysis and Data Mining  Full Text
AUTHORS: Medeiros, I; Neves, N ; Correia, M ;
PUBLISHED: 2016, SOURCE: IEEE TRANSACTIONS ON RELIABILITY, VOLUME: 65, ISSUE: 1
INDEXED IN: Scopus WOS DBLP CrossRef: 111
107
TITLE: Feature Set Tuning in Statistical Learning Network Intrusion Detection
AUTHORS: Gouveia, A; Correia, M ;
PUBLISHED: 2016, SOURCE: 15th IEEE International Symposium on Network Computing and Applications (IEEE NCA) in 15TH IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (IEEE NCA 2016)
INDEXED IN: Scopus WOS DBLP CrossRef: 7
108
TITLE: Fingerprinting for Web Applications: from Devices to Related Groups
AUTHORS: Blakemore, C; Redol, J; Correia, M ;
PUBLISHED: 2016, SOURCE: 15th IEEE Int Conf on Trust, Security and Privacy in Comp and Commun / 10th IEEE Int Conf on Big Data Science and Engineering / 14th IEEE Int Symposium on Parallel and Distributed Proc with Applicat (IEEE Trustcom/BigDataSE/ISPA) in 2016 IEEE TRUSTCOM/BIGDATASE/ISPA
INDEXED IN: Scopus WOS DBLP
109
TITLE: Hacking the DBMS to Prevent Injection Attacks
AUTHORS: Medeiros, I; Beatriz, M; Neves, N ; Correia, M ;
PUBLISHED: 2016, SOURCE: 6th ACM Conference on Data and Application Security and Privacy (CODASPY) in CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY
INDEXED IN: Scopus WOS DBLP CrossRef: 4
110
TITLE: JITeR: Just-in-time application-layer routing  Full Text
AUTHORS: Bessani, A ; Neves, NF ; Veríssimo, P ; Dantas, W; Fonsec, A; Silva, R; Luz, P; Correia, M ;
PUBLISHED: 2016, SOURCE: COMPUTER NETWORKS, VOLUME: 104
INDEXED IN: Scopus WOS DBLP CrossRef: 5
Page 11 of 23. Total results: 229.