Author of the publication

Proposal of a System for Searching and Indexing Heterogeneous Vulnerabilities Databases.

, , , , , , and . ICCSA (5), volume 3984 of Lecture Notes in Computer Science, page 819-828. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Architecture and Protocol for Trust Verifications Regarding the Integrity of Files Stored in Cloud Services., , , , , and . Sensors, 18 (3): 753 (2018)Learning Perfectly Secure Cryptography to Protect Communications with Adversarial Neural Cryptography., , , , and . Sensors, 18 (5): 1306 (2018)GTrust: Group Extension for Trust Models in Distributed Systems., , and . IJDSN, (2014)Load Balancing and Survivability for Network Services Based on Intelligent Agents., , , , , and . ICCSA (1), volume 3043 of Lecture Notes in Computer Science, page 868-881. Springer, (2004)File Exchange in a Private Cloud Supported by a Trust Model., , , and . CyberC, page 89-96. IEEE Computer Society, (2012)Anonymous Real-Time Analytics Monitoring Solution for Decision Making Supported by Sentiment Analysis., , , , , and . Sensors, 20 (16): 4557 (2020)SisBrAV - Brazilian Vulnerability Alert System., , , , , and . WOSIS, page 67-76. INSTICC Press, (2005)Trust model for private cloud., , , and . CyberSec, page 128-132. IEEE, (2012)File Exchange in Cloud., , , and . TrustCom, page 1217-1222. IEEE Computer Society, (2012)Survivability for a Network Service and Load Balancing Using Intelligent Agents Software., , , , and . EUC, volume 3207 of Lecture Notes in Computer Science, page 734-744. Springer, (2004)