Nuno Neves
Nuno Neves
LASIGE, Dep. de Informática, Faculdade de Ciências, Universidade de Lisboa
E-mail confirmado em di.fc.ul.pt - Página inicial
Título
Citado por
Citado por
Ano
Intrusion-tolerant architectures: Concepts and design
PE Veríssimo, NF Neves, MP Correia
Architecting dependable systems, 3-36, 2003
2792003
Adaptive recovery for mobile environments
N Neves, WK Fuchs
Proceedings. IEEE High-Assurance Systems Engineering Workshop (Cat. No …, 1996
1871996
How to tolerate half less one Byzantine nodes in practical distributed systems
M Correia, NF Neves, P Verissimo
Proceedings of the 23rd IEEE International Symposium on Reliable Distributed …, 2004
1712004
Highly available intrusion-tolerant services with proactive-reactive recovery
P Sousa, AN Bessani, M Correia, NF Neves, P Verissimo
IEEE Transactions on Parallel and Distributed Systems 21 (4), 452-465, 2009
1692009
SCFS: A Shared Cloud-backed File System.
AN Bessani, R Mendes, T Oliveira, NF Neves, M Correia, M Pasin, ...
USENIX Annual Technical Conference, 169-180, 2014
1472014
From consensus to atomic broadcast: Time-free Byzantine-resistant protocols without signatures
M Correia, NF Neves, P Veríssimo
The Computer Journal 49 (1), 82-96, 2006
1432006
OS diversity for intrusion tolerance: Myth or reality?
M Garcia, A Bessani, I Gashi, N Neves, R Obelheiro
2011 IEEE/IFIP 41st International Conference on Dependable Systems …, 2011
1202011
Intrusion-tolerant middleware: The road to automatic security
PE Veríssimo, NF Neves, C Cachin, J Poritz, D Powell, Y Deswarte, ...
IEEE Security & Privacy 4 (4), 54-62, 2006
1132006
The design of a COTS real-time distributed security kernel
M Correia, P Veríssimo, NF Neves
European Dependable Computing Conference, 234-252, 2002
1072002
Resilient intrusion tolerance through proactive and reactive recovery
P Sousa, AN Bessani, M Correia, NF Neves, P Verissimo
13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007 …, 2007
1012007
Detecting and removing web application vulnerabilities with static analysis and data mining
I Medeiros, N Neves, M Correia
IEEE Transactions on Reliability 65 (1), 54-69, 2015
1002015
Reverse engineering of protocols from network traces
J Antunes, N Neves, P Verissimo
2011 18th Working Conference on Reverse Engineering, 169-178, 2011
1002011
Analysis of operating system diversity for intrusion tolerance
M Garcia, A Bessani, I Gashi, N Neves, R Obelheiro
Software: Practice and Experience 44 (6), 735-770, 2014
992014
A checkpoint protocol for an entry consistent shared memory system
N Neves, M Castro, P Guedes
Proceedings of the thirteenth annual ACM symposium on Principles of …, 1994
981994
The CRUTIAL way of critical infrastructure protection
AN Bessani, P Sousa, M Correia, NF Neves, P Verissimo
IEEE Security & Privacy 6 (6), 44-51, 2008
952008
Automatic detection and correction of web application vulnerabilities using data mining to predict false positives
I Medeiros, NF Neves, M Correia
Proceedings of the 23rd international conference on World wide web, 63-74, 2014
852014
Byzantine consensus in asynchronous message-passing systems: a survey
M Correia, GS Veronese, NF Neves, P Verissimo
International Journal of Critical Computer-Based Systems 2 (2), 141-161, 2011
852011
Lightweight logging for lazy release consistent distributed shared memory
M Costa, P Guedes, M Sequeira, N Neves, M Castro
OSDI 10, 238721.238762, 1996
831996
On the Efficiency of Durable State Machine Replication
A Bessani, M Santos, J Felix, N Neves, M Correia
2013 {USENIX} Annual Technical Conference ({USENIX}{ATC} 13), 169-180, 2013
692013
Using attack injection to discover new vulnerabilities
N Neves, J Antunes, M Correia, P Verissimo, R Neves
International Conference on Dependable Systems and Networks (DSN'06), 457-466, 2006
682006
O sistema não pode executar a operação agora. Tente novamente mais tarde.
Artigos 1–20