Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- short-paperDecember 2024
The Role of TCP Congestion Control in the Throughput Forecasting
- Ariel Portela,
- Maria Melo Linhares,
- Francisco Valderlan Jorge Nobre,
- Rafael Menezes,
- Maria Mesquita,
- Rafael Lopes Gomes
LADC '24: Proceedings of the 13th Latin-American Symposium on Dependable and Secure ComputingPages 196–199https://doi.org/10.1145/3697090.3699869Performance forecasting is essential in network management, allowing administrators to anticipate and prepare for future changes in network performance by analyzing historical data and applying forecasting models. Additionally, throughput forecasting ...
- abstractDecember 2024
MQTT-VET: Exploring MQTT Protocol Vulnerabilities
LADC '24: Proceedings of the 13th Latin-American Symposium on Dependable and Secure ComputingPages 111–113https://doi.org/10.1145/3697090.3699800The Message Queuing Telemetry Transport (MQTT) protocol is essential for IoT communications, enabling lightweight device messaging. However, its widespread use increases security vulnerabilities. This paper introduces the MQTT Vulnerability Exploration ...
- Work in ProgressDecember 2024
Assessment of Availability and Reliability of a Textile Manufacturing 4.0 Using Stochastic Models
LADC '24: Proceedings of the 13th Latin-American Symposium on Dependable and Secure ComputingPages 146–152https://doi.org/10.1145/3697090.3699799The Brazilian apparel industry ranks seventh globally, generating a revenue of USD 10 billion per year. Despite the increasing adoption of Internet of Things (IoT) devices in so-called “Industry 4.0” manufacturing, accurately estimating crucial ...
- Work in ProgressDecember 2024
Capturing the security expert knowledge in feature selection for web application attack detection
LADC '24: Proceedings of the 13th Latin-American Symposium on Dependable and Secure ComputingPages 153–158https://doi.org/10.1145/3697090.3699797This article puts forward the use of mutual information values to replicate the expertise of security professionals in selecting features for detecting web attacks. The goal is to enhance the effectiveness of web application firewalls (WAFs). Web ...
- research-articleDecember 2024
Practical Challenges and Pitfalls of Bluetooth Mesh Data Collection Experiments with ESP32 Microcontrollers
LADC '24: Proceedings of the 13th Latin-American Symposium on Dependable and Secure ComputingPages 49–54https://doi.org/10.1145/3697090.3697111Testing network algorithms in physical environments using real hardware is essential to reduce the gap between theory and practice in the field and is an exciting way to explore technologies such as Bluetooth Mesh. We implemented a Bluetooth Mesh data ...
- research-articleDecember 2024
Modeling Availability in Softwarized MEC: Integrating a Fault Injection Tool for Effective Validation
LADC '24: Proceedings of the 13th Latin-American Symposium on Dependable and Secure ComputingPages 38–48https://doi.org/10.1145/3697090.3697097Fifth-generation (5G) networks promise ultra-fast speeds, minimal latency, and improved reliability, essential for supporting critical applications such as healthcare systems. Stochastic models are prominent in addressing the Multi-access edge computing (...
- research-articleDecember 2024
Disaster-FD: A Failure Detector for Disaster-Prone Environments
- Abadio de Paulo Silva,
- Anubis Graciela de M. Rossetto,
- Pierre Sens,
- Luciana Arantes,
- Rafael Pasquini,
- Paulo Coelho
LADC '24: Proceedings of the 13th Latin-American Symposium on Dependable and Secure ComputingPages 200–209https://doi.org/10.1145/3697090.3697096This paper introduces Disaster-FD, a failure detector designed for disaster-prone environments, focusing on real-time IoT network monitoring. Inspired by Impact-FD, Disaster-FD features active and federated monitoring to ensure network reliability under ...
- research-articleDecember 2024
Adversary-Augmented Simulation to evaluate order-fairness on HyperLedger Fabric
LADC '24: Proceedings of the 13th Latin-American Symposium on Dependable and Secure ComputingPages 126–135https://doi.org/10.1145/3697090.3697093This paper presents an adversary model specifically tailored to the simulation of attacks on distributed systems which combine several distributed protocols, with the aim to assess the security of blockchain networks. Our model classifies and constrains ...