Pedro Miguel dos Santos Alves Madeira Adão
AuthID: R-000-EYR
21
TITLE: A Comparative Study of Automatic Program Repair Techniques for Security Vulnerabilities
AUTHORS: Pinconschi, Eduard; Abreu, Rui ; Adao, Pedro;
PUBLISHED: 2021, SOURCE: 32nd IEEE International Symposium on Software Reliability Engineering (ISSRE) in 2021 IEEE 32ND INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE 2021), VOLUME: 2021-October
AUTHORS: Pinconschi, Eduard; Abreu, Rui ; Adao, Pedro;
PUBLISHED: 2021, SOURCE: 32nd IEEE International Symposium on Software Reliability Engineering (ISSRE) in 2021 IEEE 32ND INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE 2021), VOLUME: 2021-October
22
TITLE: Super modules-based active QR codes for smart trackability and IoT: a responsive-banknotes case study
AUTHORS: Ramalho, JFCB; Correia, SFH; Fu, LS ; Dias, LMS; Adao, P; Mateus, P; Ferreira, RAS ; Andre, PS ;
PUBLISHED: 2020, SOURCE: NPJ FLEXIBLE ELECTRONICS, VOLUME: 4, ISSUE: 1
AUTHORS: Ramalho, JFCB; Correia, SFH; Fu, LS ; Dias, LMS; Adao, P; Mateus, P; Ferreira, RAS ; Andre, PS ;
PUBLISHED: 2020, SOURCE: NPJ FLEXIBLE ELECTRONICS, VOLUME: 4, ISSUE: 1
23
TITLE: Formal Verification of Ethereum Smart Contracts Using Isabelle/HOL
AUTHORS: Ribeiro, M; Adão, P; Mateus, P;
PUBLISHED: 2020, SOURCE: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), VOLUME: 12300 LNCS
AUTHORS: Ribeiro, M; Adão, P; Mateus, P;
PUBLISHED: 2020, SOURCE: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), VOLUME: 12300 LNCS
24
TITLE: Formal Verification of Ethereum Smart Contracts Using Isabelle/HOL
AUTHORS: Maria Ribeiro; Pedro Adão; Paulo Mateus;
PUBLISHED: 2020, SOURCE: Logic, Language, and Security - Essays Dedicated to Andre Scedrov on the Occasion of His 65th Birthday, VOLUME: 12300
AUTHORS: Maria Ribeiro; Pedro Adão; Paulo Mateus;
PUBLISHED: 2020, SOURCE: Logic, Language, and Security - Essays Dedicated to Andre Scedrov on the Occasion of His 65th Birthday, VOLUME: 12300
INDEXED IN:
DBLP

IN MY:
DBLP

25
TITLE: Advanced MRI Patterns of Muscle Disease in Inherited and Acquired Myopathies: What the Radiologist Should Know
AUTHORS: Antonio Proenca Caetano; Pedro Alves;
PUBLISHED: 2019, SOURCE: SEMINARS IN MUSCULOSKELETAL RADIOLOGY, VOLUME: 23, ISSUE: 3
AUTHORS: Antonio Proenca Caetano; Pedro Alves;
PUBLISHED: 2019, SOURCE: SEMINARS IN MUSCULOSKELETAL RADIOLOGY, VOLUME: 23, ISSUE: 3
INDEXED IN:
Scopus
WOS


26
TITLE: Securing Electronic Health Records in the Cloud
AUTHORS: Matos, DR; Pardal, ML; Adao, P; Silva, AR ; Correia, M ;
PUBLISHED: 2015, SOURCE: 2018 Workshop on Privacy by Design in Distributed Systems, P2DS 2018 in PROCEEDINGS OF THE WORKSHOP ON PRIVACY BY DESIGN IN DISTRIBUTED SYSTEMS (P2DS'18)
AUTHORS: Matos, DR; Pardal, ML; Adao, P; Silva, AR ; Correia, M ;
PUBLISHED: 2015, SOURCE: 2018 Workshop on Privacy by Design in Distributed Systems, P2DS 2018 in PROCEEDINGS OF THE WORKSHOP ON PRIVACY BY DESIGN IN DISTRIBUTED SYSTEMS (P2DS'18)
28
TITLE: Mignis: A semantic based tool for firewall configuration
AUTHORS: Adao, P; Bozzato, C; Dei D Rossi; Focardi, R; Luccio, FL;
PUBLISHED: 2014, SOURCE: 27th IEEE Computer Security Foundations Symposium (CSF) in 2014 IEEE 27TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF)
AUTHORS: Adao, P; Bozzato, C; Dei D Rossi; Focardi, R; Luccio, FL;
PUBLISHED: 2014, SOURCE: 27th IEEE Computer Security Foundations Symposium (CSF) in 2014 IEEE 27TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF)
INDEXED IN:
WOS

29
TITLE: AnonyFacebook - Liking Facebook Posts Anonymously
AUTHORS: Pedro Alves; Paulo Ferreira ;
PUBLISHED: 2013, SOURCE: On The Move (OTM) Federated International Conference in ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2013 WORKSHOPS, VOLUME: 8186
AUTHORS: Pedro Alves; Paulo Ferreira ;
PUBLISHED: 2013, SOURCE: On The Move (OTM) Federated International Conference in ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2013 WORKSHOPS, VOLUME: 8186
30
TITLE: Protocol insecurity with a finite number of sessions and a cost-sensitive guessing intruder is NP-complete
AUTHORS: Adao, P; Mateus, P; Vigano, L;
PUBLISHED: 2013, SOURCE: Theoretical Computer Science
AUTHORS: Adao, P; Mateus, P; Vigano, L;
PUBLISHED: 2013, SOURCE: Theoretical Computer Science
INDEXED IN:
Scopus
