Author of the publication

Intercessão em Tempo de Implantação - uma Abordagem Reflexiva para a Plataforma J2EE™ -.

, and . SBES, page 286-301. SBC, (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Categorical Data Approach for Anomaly Detection in WebAssembly Applications., , , and . ICISSP, page 275-284. SCITEPRESS, (2024)Inspecting Binder Transactions to Detect Anomalies in Android., , , , and . SysCon, page 1-8. IEEE, (2023)New Kids on the DRDoS Block: Characterizing Multiprotocol and Carpet Bombing Attacks., , and . PAM, volume 12671 of Lecture Notes in Computer Science, page 269-283. Springer, (2021)How DRDoS attacks vary across the globe?, , , and . IMC, page 760-761. ACM, (2022)Automatic Classification of Processes in a General-Purpose Operating System., , and . SBESC, page 33-38. IEEE Computer Society, (2011)Is It Safe? Identifying Malicious Apps Through the Use of Metadata and Inter-Process Communication., , , and . SysCon, page 1-8. IEEE, (2022)Intel Software Guard Extensions Applications: A Survey., and . ACM Comput. Surv., 55 (14s): 322:1-322:38 (2023)Anywhere on Earth: A Look at Regional Characteristics of DRDoS Attacks., , , and . ICISSP, page 21-29. SCITEPRESS, (2024)Ambiente de Concepção de Software para Sistemas Distribuídos, Baseado em Rede de Petri., and . SBES, page 150-157. SBC, (1988)A Three-Pass Protocol for Cryptography Based on Padding for Wireless Networks., , , and . CCNC, page 287-291. IEEE, (2007)