Marco Paulo Amorim Vieira
AuthID: R-000-ABN
131
TITLE: Evaluating Computer Intrusion Detection Systems: A Survey of Common Practices Full Text
AUTHORS: Aleksandar Milenkoski; Marco Vieira; Samuel Kounev; Alberto Avritzer; Bryan D Payne;
PUBLISHED: 2015, SOURCE: ACM COMPUTING SURVEYS, VOLUME: 48, ISSUE: 1
AUTHORS: Aleksandar Milenkoski; Marco Vieira; Samuel Kounev; Alberto Avritzer; Bryan D Payne;
PUBLISHED: 2015, SOURCE: ACM COMPUTING SURVEYS, VOLUME: 48, ISSUE: 1
INDEXED IN:
Scopus
WOS


IN MY:
ORCID

132
TITLE: Evaluating Computer Intrusion Detection Systems. A Survey of Common Practices Full Text
AUTHORS: Aleksandar Milenkoski; Marco Vieira; Samuel Kounev; Alberto Avritzer; Bryan D Payne;
PUBLISHED: 2015, SOURCE: CSUR - ACM Comput. Surv. - ACM Computing Surveys, VOLUME: 48, ISSUE: 1
AUTHORS: Aleksandar Milenkoski; Marco Vieira; Samuel Kounev; Alberto Avritzer; Bryan D Payne;
PUBLISHED: 2015, SOURCE: CSUR - ACM Comput. Surv. - ACM Computing Surveys, VOLUME: 48, ISSUE: 1
133
TITLE: NoSQL in practice: a write-heavy enterprise application
AUTHORS: Joao Ricardo Lourenco; Verionika Abramova; Bruno Cabral ; Jorge Bernardino ; Paulo Carreiro; Marco Vieira;
PUBLISHED: 2015, SOURCE: IEEE International Congress on Big Data in 2015 IEEE INTERNATIONAL CONGRESS ON BIG DATA - BIGDATA CONGRESS 2015
AUTHORS: Joao Ricardo Lourenco; Verionika Abramova; Bruno Cabral ; Jorge Bernardino ; Paulo Carreiro; Marco Vieira;
PUBLISHED: 2015, SOURCE: IEEE International Congress on Big Data in 2015 IEEE INTERNATIONAL CONGRESS ON BIG DATA - BIGDATA CONGRESS 2015
134
TITLE: Choosing the right NoSQL database for the job: a quality attribute evaluation
AUTHORS: João Ricardo Lourenço; Bruno Cabral; Paulo Carreiro; Marco Vieira; Jorge Bernardino ;
PUBLISHED: 2015, SOURCE: J. Big Data, VOLUME: 2, ISSUE: 1
AUTHORS: João Ricardo Lourenço; Bruno Cabral; Paulo Carreiro; Marco Vieira; Jorge Bernardino ;
PUBLISHED: 2015, SOURCE: J. Big Data, VOLUME: 2, ISSUE: 1
135
TITLE: On the Metrics for Benchmarking Vulnerability Detection Tools
AUTHORS: Nuno Antunes; Marco Vieira;
PUBLISHED: 2015, SOURCE: 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks in 2015 45TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, VOLUME: 2015-September
AUTHORS: Nuno Antunes; Marco Vieira;
PUBLISHED: 2015, SOURCE: 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks in 2015 45TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, VOLUME: 2015-September
136
TITLE: Test-based Interoperability Certification for Web Services
AUTHORS: Ivano Alessandro Elia; Nuno Laranjeiro; Marco Vieira;
PUBLISHED: 2015, SOURCE: 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks in 2015 45TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, VOLUME: 2015-September
AUTHORS: Ivano Alessandro Elia; Nuno Laranjeiro; Marco Vieira;
PUBLISHED: 2015, SOURCE: 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks in 2015 45TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, VOLUME: 2015-September
137
TITLE: phpSAFE: A Security Analysis Tool for OOP Web Application Plugins
AUTHORS: Paulo Nunes; Jose Fonseca; Marco Vieira;
PUBLISHED: 2015, SOURCE: 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks in 2015 45TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, VOLUME: 2015-September
AUTHORS: Paulo Nunes; Jose Fonseca; Marco Vieira;
PUBLISHED: 2015, SOURCE: 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks in 2015 45TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, VOLUME: 2015-September
138
TITLE: Evaluation of intrusion detection systems in virtualized environments using attack injection
AUTHORS: Milenkoski, A; Payne, BD; Antunes, N; Vieira, M; Kounev, S; Avritzer, A; Luft, M;
PUBLISHED: 2015, SOURCE: 18th International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2015 in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), VOLUME: 9404
AUTHORS: Milenkoski, A; Payne, BD; Antunes, N; Vieira, M; Kounev, S; Avritzer, A; Luft, M;
PUBLISHED: 2015, SOURCE: 18th International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2015 in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), VOLUME: 9404
139
TITLE: Requirements, Design and Evaluation of a Privacy Reference Architecture for Web Applications and Services
AUTHORS: Tania Basso; Regina Moraes; Mario Jino; Marco Vieira;
PUBLISHED: 2015, SOURCE: 30th ACM Symposium on Applied Computing (SAC) in 30TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, VOLS I AND II, VOLUME: 13-17-April-2015
AUTHORS: Tania Basso; Regina Moraes; Mario Jino; Marco Vieira;
PUBLISHED: 2015, SOURCE: 30th ACM Symposium on Applied Computing (SAC) in 30TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, VOLS I AND II, VOLUME: 13-17-April-2015
140
TITLE: A Security Configuration Assessment for Android Devices
AUTHORS: Daniel Vecchiato; Marco Vieira; Eliane Martins;
PUBLISHED: 2015, SOURCE: 30th ACM Symposium on Applied Computing (SAC) in 30TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, VOLS I AND II, VOLUME: 13-17-April-2015
AUTHORS: Daniel Vecchiato; Marco Vieira; Eliane Martins;
PUBLISHED: 2015, SOURCE: 30th ACM Symposium on Applied Computing (SAC) in 30TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, VOLS I AND II, VOLUME: 13-17-April-2015