ARP spoofing detection on switched Ethernet networks: A feasibility study M Carnut, J Gondim Proceedings of the 5th Simpósio Segurança em Informática, 2003 | 53 | 2003 |
A methodological approach for assessing amplified reflection distributed denial of service on the internet of things JJ Costa Gondim, R de Oliveira Albuquerque, ... Sensors 16 (11), 1855, 2016 | 21 | 2016 |
Bioinformatics of the Paracoccidioides brasiliensis EST Project MM Brígido, MEMT Walter, AG Oliveira, MK Inoue, DS Anjos, EFO Sandes, ... FUNPEC-RP, 2005 | 11 | 2005 |
Evaluation of distributed denial of service threat in the internet of things LAB Pacheco, JJC Gondim, PAS Barreto, E Alchieri 2016 IEEE 15th International Symposium on Network Computing and Applications …, 2016 | 9 | 2016 |
Amplified reflection ddos attacks over iot mirrors: A saturation analysis AT Vasques, JJC Gondim 2019 Workshop on Communication Networks and Power Systems (WCNPS), 1-6, 2019 | 6 | 2019 |
Mirror saturation in amplified reflection DDoS JJC Gondim, R de Oliveira Albuquerque Actas de las V Jornadas Nacionales de Ciberseguridad Junio 5-7, 2019 …, 2019 | 6 | 2019 |
Click Fraud Detection and Prevention System for Ad Networks PS Almeida, JJC Gondim Journal of Information Security and Cryptography (Enigma) 5 (1), 27-39, 2018 | 5 | 2018 |
Mirror saturation in amplified reflection Distributed Denial of Service: A case of study using SNMP, SSDP, NTP and DNS protocols JJC Gondim, R de Oliveira Albuquerque, ALS Orozco Future Generation Computer Systems 108, 68-81, 2020 | 4 | 2020 |
Autenticação mútua entre dispositivos no middleware uos B Ribeiro, J Gondim, R Jacobi, C Castanho SBSEG–Simpósio Brasileiro em Segurança da Informação e de Sistemas …, 2009 | 4 | 2009 |
Attribute based access control in federated clouds: A case study in bionformatics HHPM Costa, APF de Araújo, JJC Gondim, MT de Holanda, MEMT Walter 2017 12th Iberian Conference on Information Systems and Technologies (CISTI …, 2017 | 3 | 2017 |
Linderhof: uma ferramenta para avaliação de sistemas de mitigação de ataques reflexivos volumétricos (DDoS) AL Dantas, M de Oliveira Vieira, AT Vasques, JJC Gondim Anais Estendidos do XXXVIII Simpósio Brasileiro de Redes de Computadores e …, 2020 | 1 | 2020 |
Bot development for social engineering attacks on twitter JVF Abreu, JHC Fernandes, JJC Gondim, CG Ralha arXiv preprint arXiv:2007.11778, 2020 | 1 | 2020 |
A new method for flow-based network intrusion detection using the inverse Potts model C Pontes, M Souza, J Gondim, M Bishop, M Marotta arXiv preprint arXiv:1910.07266, 2019 | 1 | 2019 |
A new method for flow-based network intrusion detection using inverse statistical physics C Pontes, J Gondim, M Bishop, M Marotta arXiv Prepr. arXiv1910 7266, 2019 | 1 | 2019 |
Extraction and analysis of volatile memory in android systems: an approach focused on trajectory reconstruction based on nmea 0183 standard JPC De Sousa, JJC Gondim 2016 11th International Conference on Availability, Reliability and Security …, 2016 | 1 | 2016 |
ARP SPOOFING DETECTION ON SWITCHED ETHERNET NETWORKS: AFeasibility STUDY MA Carnut, JJC Gondim | 1 | 2003 |
ARP SPOOFING DETECTION ON SWITCHED ETHERNET NETWORKS: A FEASIBILITY STUDY JJC Gondim, MA Carnut Symposium on Security in Information Practices, 2003 | 1 | 2003 |
Twitter Bot Detection with Reduced Feature Set JVF Abreu, CG Ralha, JJC Gondim 2020 IEEE International Conference on Intelligence and Security Informatics …, 2020 | | 2020 |
Um plano de controle seguro e distribuído para redes definidas por software JP Silva | | 2020 |
Amplified Reflection DDoS Attacks over IoT Reflector Running CoAP AT Vasques, JJC Gondim 2020 15th Iberian Conference on Information Systems and Technologies (CISTI …, 2020 | | 2020 |