Marco Paulo Amorim Vieira
AuthID: R-000-ABN
131
TÃTULO: Evaluating Computer Intrusion Detection Systems: A Survey of Common Practices Full Text
AUTORES: Aleksandar Milenkoski; Marco Vieira; Samuel Kounev; Alberto Avritzer; Bryan D Payne;
PUBLICAÇÃO: 2015, FONTE: ACM COMPUTING SURVEYS, VOLUME: 48, NÚMERO: 1
AUTORES: Aleksandar Milenkoski; Marco Vieira; Samuel Kounev; Alberto Avritzer; Bryan D Payne;
PUBLICAÇÃO: 2015, FONTE: ACM COMPUTING SURVEYS, VOLUME: 48, NÚMERO: 1
INDEXADO EM:
Scopus
WOS


NO MEU:
ORCID

132
TÃTULO: Evaluating Computer Intrusion Detection Systems. A Survey of Common Practices Full Text
AUTORES: Aleksandar Milenkoski; Marco Vieira; Samuel Kounev; Alberto Avritzer; Bryan D Payne;
PUBLICAÇÃO: 2015, FONTE: CSUR - ACM Comput. Surv. - ACM Computing Surveys, VOLUME: 48, NÚMERO: 1
AUTORES: Aleksandar Milenkoski; Marco Vieira; Samuel Kounev; Alberto Avritzer; Bryan D Payne;
PUBLICAÇÃO: 2015, FONTE: CSUR - ACM Comput. Surv. - ACM Computing Surveys, VOLUME: 48, NÚMERO: 1
133
TÃTULO: NoSQL in practice: a write-heavy enterprise application
AUTORES: Joao Ricardo Lourenco; Verionika Abramova; Bruno Cabral ; Jorge Bernardino ; Paulo Carreiro; Marco Vieira;
PUBLICAÇÃO: 2015, FONTE: IEEE International Congress on Big Data in 2015 IEEE INTERNATIONAL CONGRESS ON BIG DATA - BIGDATA CONGRESS 2015
AUTORES: Joao Ricardo Lourenco; Verionika Abramova; Bruno Cabral ; Jorge Bernardino ; Paulo Carreiro; Marco Vieira;
PUBLICAÇÃO: 2015, FONTE: IEEE International Congress on Big Data in 2015 IEEE INTERNATIONAL CONGRESS ON BIG DATA - BIGDATA CONGRESS 2015
134
TÃTULO: Choosing the right NoSQL database for the job: a quality attribute evaluation
AUTORES: João Ricardo Lourenço; Bruno Cabral; Paulo Carreiro; Marco Vieira; Jorge Bernardino ;
PUBLICAÇÃO: 2015, FONTE: J. Big Data, VOLUME: 2, NÚMERO: 1
AUTORES: João Ricardo Lourenço; Bruno Cabral; Paulo Carreiro; Marco Vieira; Jorge Bernardino ;
PUBLICAÇÃO: 2015, FONTE: J. Big Data, VOLUME: 2, NÚMERO: 1
135
TÃTULO: On the Metrics for Benchmarking Vulnerability Detection Tools
AUTORES: Nuno Antunes; Marco Vieira;
PUBLICAÇÃO: 2015, FONTE: 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks in 2015 45TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, VOLUME: 2015-September
AUTORES: Nuno Antunes; Marco Vieira;
PUBLICAÇÃO: 2015, FONTE: 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks in 2015 45TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, VOLUME: 2015-September
136
TÃTULO: Test-based Interoperability Certification for Web Services
AUTORES: Ivano Alessandro Elia; Nuno Laranjeiro; Marco Vieira;
PUBLICAÇÃO: 2015, FONTE: 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks in 2015 45TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, VOLUME: 2015-September
AUTORES: Ivano Alessandro Elia; Nuno Laranjeiro; Marco Vieira;
PUBLICAÇÃO: 2015, FONTE: 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks in 2015 45TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, VOLUME: 2015-September
137
TÃTULO: phpSAFE: A Security Analysis Tool for OOP Web Application Plugins
AUTORES: Paulo Nunes; Jose Fonseca; Marco Vieira;
PUBLICAÇÃO: 2015, FONTE: 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks in 2015 45TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, VOLUME: 2015-September
AUTORES: Paulo Nunes; Jose Fonseca; Marco Vieira;
PUBLICAÇÃO: 2015, FONTE: 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks in 2015 45TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, VOLUME: 2015-September
138
TÃTULO: Evaluation of intrusion detection systems in virtualized environments using attack injection
AUTORES: Milenkoski, A; Payne, BD; Antunes, N; Vieira, M; Kounev, S; Avritzer, A; Luft, M;
PUBLICAÇÃO: 2015, FONTE: 18th International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2015 in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), VOLUME: 9404
AUTORES: Milenkoski, A; Payne, BD; Antunes, N; Vieira, M; Kounev, S; Avritzer, A; Luft, M;
PUBLICAÇÃO: 2015, FONTE: 18th International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2015 in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), VOLUME: 9404
139
TÃTULO: Requirements, Design and Evaluation of a Privacy Reference Architecture for Web Applications and Services
AUTORES: Tania Basso; Regina Moraes; Mario Jino; Marco Vieira;
PUBLICAÇÃO: 2015, FONTE: 30th ACM Symposium on Applied Computing (SAC) in 30TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, VOLS I AND II, VOLUME: 13-17-April-2015
AUTORES: Tania Basso; Regina Moraes; Mario Jino; Marco Vieira;
PUBLICAÇÃO: 2015, FONTE: 30th ACM Symposium on Applied Computing (SAC) in 30TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, VOLS I AND II, VOLUME: 13-17-April-2015
140
TÃTULO: A Security Configuration Assessment for Android Devices
AUTORES: Daniel Vecchiato; Marco Vieira; Eliane Martins;
PUBLICAÇÃO: 2015, FONTE: 30th ACM Symposium on Applied Computing (SAC) in 30TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, VOLS I AND II, VOLUME: 13-17-April-2015
AUTORES: Daniel Vecchiato; Marco Vieira; Eliane Martins;
PUBLICAÇÃO: 2015, FONTE: 30th ACM Symposium on Applied Computing (SAC) in 30TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, VOLS I AND II, VOLUME: 13-17-April-2015