Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Regenerating Networked Systems' Monitoring Traces Using Neural Networks., , , , and . J. Netw. Syst. Manag., 32 (1): 16 (March 2024)An Integrated and Automated Network Management and Operation System., and . LANOMS, page 89-100. UFRGS, (2005)Towards secure and dependable software-defined networks, , and . Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking, page 55--60. New York, NY, USA, ACM, (2013)A Trustworthy and Resilient Event Broker for Monitoring Cloud Infrastructures., , and . DAIS, volume 7272 of Lecture Notes in Computer Science, page 87-95. Springer, (2012)A cyber-resilient architecture for critical security services., , , , , and . J. Netw. Comput. Appl., (2016)Representação e Aplicação de Políticas de Segurança em Firewalls de Redes Híbridas., , , , , and . SBRC, page 490-503. (2021)Analyzing the Performance of the Inter-Blockchain Communication Protocol., , , and . DSN, page 151-164. IEEE, (2023)FlexVAPs: a system for managing virtual appliances for heterogeneous virtualized environments., and . LANOMS, IEEE, (2009)Towards Secure and Dependable Authentication and Authorization Infrastructures., , , and . PRDC, page 43-52. IEEE Computer Society, (2014)Towards a Hybrid Storage Architecture for IoT., , , , and . ISCC, page 470-473. IEEE, (2018)