Search

Your search keyword '"Mário M. Freire"' showing total 214 results

Search Constraints

Start Over You searched for: Author "Mário M. Freire" Remove constraint Author: "Mário M. Freire"
214 results on '"Mário M. Freire"'

Search Results

59. Attack and System Modeling Applied to IoT, Cloud, and Mobile Ecosystems

60. IoT-HarPSecA: A Framework and Roadmap for Secure Design and Development of Devices and Applications in the IoT Space

64. A Preliminary Evaluation of the SRE and SBPG Components of the IoT-HarPSecA Framework

66. Classification of Encrypted Internet Traffic Using Kullback-Leibler Divergence and Euclidean Distance

67. Approaches for optimizing virtual machine placement and migration in cloud environments: A survey

68. A User Trust System for Online Games—Part II: A Subjective Logic Approach for Trust Inference

70. Performance evaluation of the SRE and SBPG components of the IoT hardware platform security advisor framework

72. A decentralized blockchain oriented framework for automated bug assignment

73. A User Trust System for Online Games—Part I: An Activity Theory Approach for Trust Representation

82. IoT-HarPSecA

85. Detection of reduction-of-quality DDoS attacks using Fuzzy Logic and machine learning algorithms

86. Security Threats and Possible Countermeasures in IoT Applications Covering Different Industry Domains

87. A Tutorial Introduction to IoT Design and Prototyping with Examples

89. CloudSim Plus: A cloud computing simulation framework pursuing software engineering principles for improved modularity, extensibility and correctness

90. Session details: NET - networking track

91. Security Challenges of the Internet of Things

92. Classification of Breast Masses on Contrast-Enhanced Magnetic Resonance Images Through Log Detrended Fluctuation Cumulant-Based Multifractal Analysis

93. 3D Lacunarity in Multifractal Analysis of Breast Tumor Lesions in Dynamic Contrast-Enhanced Magnetic Resonance Imaging

94. Identification of Peer-to-Peer VoIP Sessions Using Entropy and Codec Properties

95. Security issues in cloud environments: a survey

96. Detection and classification of peer-to-peer traffic

98. Fast synthesis of persistent fractional Brownian motion

99. Exploring Behavioral Patterns Through Entropy in Multimedia Peer-to-Peer Traffic

100. The design and evaluation of the Simple Self-Similar Sequences Generator

Catalog

Books, media, physical & digital resources