214 results on '"Mário M. Freire"'
Search Results
2. Detection of Slowloris Attacks using Machine Learning Algorithms.
3. Impact of Self C Parameter on SVM-based Classification of Encrypted Multimedia Peer-to-Peer Traffic.
4. Performance Evaluation of Container-Level Anomaly-Based Intrusion Detection Systems for Multi-Tenant Applications Using Machine Learning Algorithms.
5. Classification of Encrypted Internet Traffic Using Kullback-Leibler Divergence and Euclidean Distance.
6. A Preliminary Evaluation of the SRE and SBPG Components of the IoT-HarPSecA Framework.
7. IoT-HarPSecA: A Framework for Facilitating the Design and Development of Secure IoT Devices.
8. Security Threats and Possible Countermeasures in IoT Applications Covering Different Industry Domains.
9. CloudSim Plus: A cloud computing simulation framework pursuing software engineering principles for improved modularity, extensibility and correctness.
10. Improving software maintenance with improved bug triaging
11. Assessment of the Susceptibility to Data Manipulation of Android Games with In-app Purchases.
12. A Distributed Virtual-Machine Placement and Migration Approach Based on Modern Portfolio Theory
13. Secure cloud-based mobile apps: attack taxonomy, requirements, mechanisms, tests and automation
14. Randomness in Virtual Machines.
15. Real-time traffic classification based on statistical tests for matching signatures with packet length distributions.
16. Breast ultrasound images gland segmentation.
17. On-line Detection of Encrypted Traffic Generated by Mesh-Based Peer-to-Peer Live Streaming Applications: The Case of GoalBit.
18. Joint source-channel decoding of motion-information using maximum-a-posteriori.
19. Extended whole mesh deformation model: Full 3D processing.
20. Multiple-description video coding based on JPEG 2000 MQ-coder registers.
21. NetOdyssey - A New Tool for Real-Time Analysis of Network Traffic.
22. A new 3D image segmentation method for parallel architectures.
23. Towards the Detection of Encrypted BitTorrent Traffic through Deep Packet Inspection.
24. A New Architecture for Optical Burst Switching Networks Based on Cooperative Control.
25. The whole mesh Deformation Model for 2D and 3D image segmentation.
26. The Dynamic Topology Changes model for unsupervised image segmentation.
27. Detection of Encrypted Traffic in eDonkey Network through Application Signatures.
28. Analysis of the Impact of Intensive Attacks on the Self-Similarity Degree of the Network Traffic.
29. Performance Assessment of Enhanced Just-in-Time Protocol in OBS Networks Taking into Account Control Packet Processing and Optical Switch Configuration Times.
30. Analysis of Peer-to-Peer Traffic Using a Behavioural Method Based on Entropy.
31. The Ethernet Frame Payload Size and Its Effect on IPv4 and IPv6 Traffic.
32. Enhanced Just-in-Time: A New Resource Reservation Protocol for Optical Burst Switching Networks.
33. Measuring and Profiling IP Traffic.
34. Preamble Encryption Mechanism for Enhanced Privacy in Ethernet Passive Optical Networks.
35. Performance implications of control packet processing and optical switch configuration times for optical burst switched mesh networks with degree-four topologies.
36. Integration of Ontologies and Semantic Annotations with Resource Description Framework in Eclipse-Based Platforms with Editing Features for Semantic Web.
37. Estimating Network Offered Load for Optical Burst Switching Networks.
38. Issues on Performance Assessment of Optical Burst Switched Networks: Burst Loss Versus Packet Loss Metrics.
39. Burst Assembly with Real IPv4 Data - Performance Assessement of Three Assembly Algorithms.
40. The Role of Meshing Degree in Optical Burst Switching Networks Using Signaling Protocols with One-Way Reservation Schemes.
41. Impact of Setup Message Processing and Optical Switch Configuration Times on the Performance of IP over Optical Burst Switching Networks.
42. One-Way Resource Reservation Protocols for IP Over Optical Burst Switched Mesh Networks.
43. SAPA: Software Agents for Prevention and Auditing of Security Faults in Networked Systems.
44. A Layered Architecture for Supporting Optical Burst Switching.
45. Intelligent Assessment of Distributed Security in TCP/IP Networks.
46. Performance Assessment of Signaling Protocols with One-Way Reservation Schemes for Optical Burst Switching Networks.
47. Performance Assessment of Signaling Protocols in Optical Burst Switching Mesh Networks.
48. Performance Assessment of Optical Burst Switched Degree-Four Chordal Ring Networks.
49. High performance optical Internet backbones with mesh topologies.
50. DENOFAS: A Vulnerability Assessment Tool.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.