91
TITLE: On Byzantine generals with alternative plans
AUTHORS: Correia, M ; Bessani, AN ; Verissimo, P ;
PUBLISHED: 2008, SOURCE: JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, VOLUME: 68, ISSUE: 9
INDEXED IN: Scopus WOS DBLP CrossRef: 10
92
TITLE: The CRUTIAL reference critical information infrastructure architecture: a blueprint
AUTHORS: Paulo Veríssimo ; Nuno Ferreira Neves ; Miguel Correia ;
PUBLISHED: 2008, SOURCE: Int. J. Syst. Syst. Eng., VOLUME: 1, ISSUE: 1/2
INDEXED IN: DBLP
93
TITLE: The CRUTIAL reference critical information infrastructure architecture: A blueprint
AUTHORS: Verissimo, P ; Neves, NF ; Correia, M ;
PUBLISHED: 2008, SOURCE: International Journal of System of Systems Engineering, VOLUME: 1, ISSUE: 1-2
INDEXED IN: Scopus CrossRef: 16
IN MY: ORCID
94
TITLE: The Crutial Way of Critical Infrastructure Protection
AUTHORS: Bessani, AN ; Sousa, P; Correia, M ; Neves, NF ; Verissimo, P ;
PUBLISHED: 2008, SOURCE: IEEE SECURITY & PRIVACY, VOLUME: 6, ISSUE: 6
INDEXED IN: Scopus WOS DBLP CrossRef: 63
95
TITLE: Analysis of a Redundant Architecture for Critical Infrastructure Protection
AUTHORS: Alessandro Daidone; Silvano Chiaradonna; Andrea Bondavalli; Paulo Veríssimo ;
PUBLISHED: 2007, SOURCE: WADS, VOLUME: 5135 LNCS
INDEXED IN: Scopus DBLP CrossRef: 6
96
TITLE: Arcitecture and implementation of an embedded wormhole
AUTHORS: Ortiz, H; Casimiro, A ; Verissimo, P ;
PUBLISHED: 2007, SOURCE: International Symposium on Industrial Embedded Systems in 2007 INTERNATIONAL SYMPOSIUM ON INDUSTRIAL EMBEDDED SYSTEMS
INDEXED IN: Scopus WOS DBLP CrossRef: 1
97
TITLE: Assumptions: The Trojan horses of secure protocols
AUTHORS: Paulo Verissimo ;
PUBLISHED: 2007, SOURCE: 4th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security in Computer Network Security, Proceedings, VOLUME: 1
INDEXED IN: Scopus WOS
98
TITLE: Automated rule-based diagnosis through a distributed monitor system
AUTHORS: Khanna, G; Cheng, MY; Varadharajan, P; Bagchi, S; Correia, MP ; Verissimo, PJ ;
PUBLISHED: 2007, SOURCE: IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOLUME: 4, ISSUE: 4
INDEXED IN: Scopus WOS DBLP CrossRef: 28
99
TITLE: Generic-events architecture: Integrating real-world aspects in event-based systems
AUTHORS: Casimiro, A ; Kaiser, J; Verissimo, P ;
PUBLISHED: 2007, SOURCE: Workshop on Architecting Dependable Systems/International Conference on Dependable Systems and Network in Architecting Dependable Systems IV, VOLUME: 4615
INDEXED IN: Scopus WOS DBLP CrossRef: 2
100
TITLE: Intrusion tolerance in wireless environments:: an experimental evaluation
AUTHORS: Moniz, H ; Neves, NF ; Correia, M ; Casimiro, A ; Veríssimo, P ;
PUBLISHED: 2007, SOURCE: 13th Pacific Rim International Symposium on Dependable Computing in 13TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING, PROCEEDINGS
INDEXED IN: Scopus WOS DBLP CrossRef: 3
Page 10 of 21. Total results: 205.