default search action
Pedro R. M. Inácio
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j29]Joana Cabral Costa, Tiago Roxo, Hugo Proença, Pedro Ricardo M. Inácio:
How Deep Learning Sees the World: A Survey on Adversarial Attacks & Defenses. IEEE Access 12: 61113-61136 (2024) - [j28]Francisco T. Chimuco, João B. F. Sequeiros, Tiago M. C. Simões, Mário M. Freire, Pedro R. M. Inácio:
Expediting the design and development of secure cloud-based mobile apps. Int. J. Inf. Sec. 23(4): 3043-3064 (2024) - [j27]Manoel C. Silva Filho, Claudio C. Monteiro, Pedro Ricardo M. Inácio, Mário M. Freire:
A Distributed Virtual-Machine Placement and Migration Approach Based on Modern Portfolio Theory. J. Netw. Syst. Manag. 32(1): 2 (2024) - [c22]Bernardo Louro, Raquel Abreu, Joana Cabral Costa, João B. F. Sequeiros, Pedro R. M. Inácio:
Analysis of the Capability and Training of Chat Bots in the Generation of Rules for Firewall or Intrusion Detection Systems. ARES 2024: 123:1-123:7 - [c21]João B. F. Sequeiros, Francisco Tchissaquila Chimuco, Tiago M. C. Simões, Mário M. Freire, Pedro R. M. Inácio:
An Approach to Attack Modeling for the IoT: Creating Attack Trees from System Descriptions. AINA (2) 2024: 424-436 - [c20]Vinícius de Miranda Rios, Pedro R. M. Inácio, Damien Magoni, Mário M. Freire:
Detection of Slowloris Attacks using Machine Learning Algorithms. SAC 2024: 1321-1330 - 2023
- [j26]Francisco T. Chimuco, João B. F. Sequeiros, Carolina Galvão Lopes, Tiago M. C. Simões, Mário M. Freire, Pedro R. M. Inácio:
Secure cloud-based mobile apps: attack taxonomy, requirements, mechanisms, tests and automation. Int. J. Inf. Sec. 22(4): 833-867 (2023) - [j25]Joana Cabral Costa, Tiago Roxo, Carolina Galvão Lopes, João B. F. Sequeiros, Tiago M. C. Simões, Pedro R. M. Inácio:
Theoretical and practical assessments over SSH. Res. Pract. Technol. Enhanc. Learn. 18: 30 (2023) - [c19]Tiago Roxo, Joana Cabral Costa, Pedro R. M. Inácio, Hugo Proença:
On Exploring Audio Anomaly in Speech. WIFS 2023: 1-6 - [i2]Tiago Roxo, Joana Cabral Costa, Pedro R. M. Inácio, Hugo Proença:
WASD: A Wilder Active Speaker Detection Dataset. CoRR abs/2303.05321 (2023) - [i1]Joana Cabral Costa, Tiago Roxo, Hugo Proença, Pedro R. M. Inácio:
How Deep Learning Sees the World: A Survey on Adversarial Attacks & Defenses. CoRR abs/2305.10862 (2023) - 2022
- [j24]Joana Cabral Costa, Tiago Roxo, João B. F. Sequeiros, Hugo Proença, Pedro R. M. Inácio:
Predicting CVSS Metric via Description Interpretation. IEEE Access 10: 59125-59134 (2022) - [j23]Vinícius de Miranda Rios, Pedro R. M. Inácio, Damien Magoni, Mário M. Freire:
Detection and Mitigation of Low-Rate Denial-of-Service Attacks: A Survey. IEEE Access 10: 76648-76668 (2022) - [j22]Rui P. Pinto, Bruno M. C. Silva, Pedro R. M. Inácio:
A System for the Promotion of Traceability and Ownership of Health Data Using Blockchain. IEEE Access 10: 92760-92773 (2022) - [j21]Vanice Canuto Cunha, Arturo A. Z. Zavala, Damien Magoni, Pedro R. M. Inácio, Mário M. Freire:
A Complete Review on the Application of Statistical Methods for Evaluating Internet Traffic Usage. IEEE Access 10: 128433-128455 (2022) - [j20]Chetna Gupta, Pedro R. M. Inácio, Mário M. Freire:
Improving software maintenance with improved bug triaging. J. King Saud Univ. Comput. Inf. Sci. 34(10 Part A): 8757-8764 (2022) - [c18]Vanice Canuto Cunha, Damien Magoni, Pedro R. M. Inácio, Mário M. Freire:
Impact of Self C Parameter on SVM-based Classification of Encrypted Multimedia Peer-to-Peer Traffic. AINA (1) 2022: 180-193 - 2021
- [j19]Vinícius de Miranda Rios, Pedro R. M. Inácio, Damien Magoni, Mário M. Freire:
Detection of reduction-of-quality DDoS attacks using Fuzzy Logic and machine learning algorithms. Comput. Networks 186: 107792 (2021) - [j18]Musa G. Samaila, Carolina Galvão Lopes, Édi Aires, João B. F. Sequeiros, Tiago M. C. Simões, Mário M. Freire, Pedro R. M. Inácio:
Performance evaluation of the SRE and SBPG components of the IoT hardware platform security advisor framework. Comput. Networks 199: 108496 (2021) - [j17]João B. F. Sequeiros, Francisco T. Chimuco, Musa G. Samaila, Mário M. Freire, Pedro R. M. Inácio:
Attack and System Modeling Applied to IoT, Cloud, and Mobile Ecosystems: Embedding Security by Design. ACM Comput. Surv. 53(2): 25:1-25:32 (2021) - [j16]João Amaral Santos, Pedro R. M. Inácio, Bruno M. C. Silva:
Towards the Use of Blockchain in Mobile Health Services and Applications. J. Medical Syst. 45(2): 17 (2021) - [j15]André Prata Ferreira, Chetna Gupta, Pedro R. M. Inácio, Mário M. Freire:
Behaviour-based Malware Detection in Mobile AndroidPlatforms Using Machine Learning Algorithms. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 12(4): 62-88 (2021) - [c17]Marcos Cavalcanti, Pedro R. M. Inácio, Mário M. Freire:
Performance Evaluation of Container-Level Anomaly-Based Intrusion Detection Systems for Multi-Tenant Applications Using Machine Learning Algorithms. ARES 2021: 109:1-109:9 - 2020
- [j14]Musa G. Samaila, João B. F. Sequeiros, Tiago M. C. Simões, Mário M. Freire, Pedro R. M. Inácio:
IoT-HarPSecA: A Framework and Roadmap for Secure Design and Development of Devices and Applications in the IoT Space. IEEE Access 8: 16462-16494 (2020) - [j13]Shohreh Hosseinzadeh, Bernardo Sequeiros, Pedro R. M. Inácio, Ville Leppänen:
Recent trends in applying TPM to cloud computing. Secur. Priv. 3(1) (2020) - [c16]Vanice Canuto Cunha, Arturo A. Z. Zavala, Pedro R. M. Inácio, Damien Magoni, Mário M. Freire:
Classification of Encrypted Internet Traffic Using Kullback-Leibler Divergence and Euclidean Distance. AINA 2020: 883-897 - [c15]Musa G. Samaila, Carolina Galvão Lopes, Édi Aires, João B. F. Sequeiros, Tiago M. C. Simões, Mário M. Freire, Pedro R. M. Inácio:
A Preliminary Evaluation of the SRE and SBPG Components of the IoT-HarPSecA Framework. GIoTS 2020: 1-7
2010 – 2019
- 2019
- [c14]Musa G. Samaila, Moser Z. V. José, João B. F. Sequeiros, Mário M. Freire, Pedro R. M. Inácio:
IoT-HarPSecA: A Framework for Facilitating the Design and Development of Secure IoT Devices. ARES 2019: 72:1-72:7 - 2018
- [j12]Manoel C. Silva Filho, Claudio C. Monteiro, Pedro R. M. Inácio, Mário M. Freire:
Approaches for optimizing virtual machine placement and migration in cloud environments: A survey. J. Parallel Distributed Comput. 111: 222-250 (2018) - [j11]Musa G. Samaila, Miguel Neto, Diogo A. B. Fernandes, Mário M. Freire, Pedro R. M. Inácio:
Challenges of securing Internet of Things devices: A survey. Secur. Priv. 1(2) (2018) - [c13]Musa G. Samaila, João B. F. Sequeiros, Mário M. Freire, Pedro R. M. Inácio:
Security Threats and Possible Countermeasures in IoT Applications Covering Different Industry Domains. ARES 2018: 16:1-16:9 - 2017
- [j10]Diogo A. B. Fernandes, Mário M. Freire, Paulo A. P. Fazendeiro, Pedro R. M. Inácio:
Applications of artificial immune systems to computer security: A survey. J. Inf. Secur. Appl. 35: 138-159 (2017) - [c12]Manoel C. Silva Filho, Raysa L. Oliveira, Claudio C. Monteiro, Pedro R. M. Inácio, Mário M. Freire:
CloudSim Plus: A cloud computing simulation framework pursuing software engineering principles for improved modularity, extensibility and correctness. IM 2017: 400-406 - [p1]Mohammad Reza Memarian, Diogo Fernandes, Pedro R. M. Inácio, Ville Leppänen, Mauro Conti:
Applications of Trusted Computing in Cloud Context. Research Advances in Cloud Computing 2017: 449-465 - 2015
- [c11]João Cordeiro, Pedro R. M. Inácio, Diogo A. B. Fernandes:
Fractal Beauty in Text. EPIA 2015: 796-802 - [c10]Francisco Vigário, Miguel Neto, Diogo Fonseca, Mário M. Freire, Pedro R. M. Inácio:
Assessment of the Susceptibility to Data Manipulation of Android Games with In-app Purchases. SEC 2015: 528-541 - 2014
- [j9]Diogo A. B. Fernandes, Liliana F. B. Soares, João V. P. Gomes, Mário M. Freire, Pedro R. M. Inácio:
Security issues in cloud environments: a survey. Int. J. Inf. Sec. 13(2): 113-170 (2014) - [c9]Diogo A. B. Fernandes, Miguel Neto, Liliana F. B. Soares, Mário M. Freire, Pedro R. M. Inácio:
A tool for estimating the hurst parameter and for generating self-similar sequences. SummerSim 2014: 40 - 2013
- [j8]João V. P. Gomes, Pedro R. M. Inácio, Manuela Pereira, Mário M. Freire, Paulo P. Monteiro:
Detection and classification of peer-to-peer traffic: A survey. ACM Comput. Surv. 45(3): 30:1-30:40 (2013) - [j7]João V. P. Gomes, Pedro R. M. Inácio, Manuela Pereira, Mário M. Freire, Paulo P. Monteiro:
Identification of Peer-to-Peer VoIP Sessions Using Entropy and Codec Properties. IEEE Trans. Parallel Distributed Syst. 24(10): 2004-2014 (2013) - [c8]Liliana F. B. Soares, Diogo A. B. Fernandes, Mário M. Freire, Pedro R. M. Inácio:
Secure user authentication in cloud computing management interfaces. IPCCC 2013: 1-2 - [c7]Miguel Neto, João V. P. Gomes, Mário M. Freire, Pedro R. M. Inácio:
Real-time traffic classification based on statistical tests for matching signatures with packet length distributions. LANMAN 2013: 1-6 - [c6]Diogo A. B. Fernandes, Liliana F. B. Soares, Mário M. Freire, Pedro R. M. Inácio:
Randomness in Virtual Machines. UCC 2013: 282-286 - 2012
- [j6]João V. P. Gomes, Pedro R. M. Inácio, Manuela Pereira, Mário M. Freire, Paulo P. Monteiro:
Exploring Behavioral Patterns Through Entropy in Multimedia Peer-to-Peer Traffic. Comput. J. 55(6): 740-755 (2012) - [j5]João V. P. Gomes, Pedro R. M. Inácio, Manuela Pereira, Mário M. Freire, Paulo P. Monteiro:
Corrigendum: Exploring Behavioral Patterns Through Entropy in Multimedia Peer-to-Peer Traffic. Comput. J. 55(10): 1265 (2012) - [j4]Pedro R. M. Inácio, Mário M. Freire, Manuela Pereira, Paulo P. Monteiro:
Fast synthesis of persistent fractional Brownian motion. ACM Trans. Model. Comput. Simul. 22(2): 11:1-11:21 (2012) - 2011
- [c5]André F. Esteves, Pedro R. M. Inácio, Manuela Pereira, Mário M. Freire:
On-line Detection of Encrypted Traffic Generated by Mesh-Based Peer-to-Peer Live Streaming Applications: The Case of GoalBit. NCA 2011: 223-228 - 2010
- [j3]João V. P. Gomes, Pedro R. M. Inácio, Branka Lakic, Mário M. Freire, Henrique J. A. da Silva, Paulo P. Monteiro:
Source traffic analysis. ACM Trans. Multim. Comput. Commun. Appl. 6(3): 21:1-21:23 (2010) - [c4]Fábio D. Beirão, João V. P. Gomes, Pedro R. M. Inácio, Manuela Pereira, Mário M. Freire:
NetOdyssey - A New Tool for Real-Time Analysis of Network Traffic. NCA 2010: 239-242
2000 – 2009
- 2009
- [j2]Pedro R. M. Inácio, Branka Lakic, Mário M. Freire, Manuela Pereira, Paulo P. Monteiro:
The design and evaluation of the Simple Self-Similar Sequences Generator. Inf. Sci. 179(23): 4029-4045 (2009) - 2008
- [c3]João V. P. Gomes, Pedro R. M. Inácio, Mário M. Freire, Manuela Pereira, Paulo P. Monteiro:
Analysis of Peer-to-Peer Traffic Using a Behavioural Method Based on Entropy. IPCCC 2008: 201-208 - [c2]Pedro R. M. Inácio, Mário M. Freire, Manuela Pereira, Paulo P. Monteiro:
Analysis of the Impact of Intensive Attacks on the Self-Similarity Degree of the Network Traffic. SECURWARE 2008: 107-113 - 2007
- [j1]Marek Hajduczenia, Pedro R. M. Inácio, Henrique J. A. da Silva, Mário M. Freire, Paulo P. Monteiro:
On EPON security issues. IEEE Commun. Surv. Tutorials 9(1-4): 68-83 (2007) - 2006
- [c1]Pedro R. M. Inácio, Marek Hajduczenia, Mário M. Freire, Henrique J. A. da Silva, Paulo P. Monteiro:
Preamble Encryption Mechanism for Enhanced Privacy in Ethernet Passive Optical Networks. OTM Workshops (1) 2006: 404-414
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint