An effective intrusion detection approach for jamming attacks on RFID systems L Avanco, AE Guelfi, E Pontes, AAA Silva, ST Kofuji, F Zhou 2015 International EURASIP Workshop on RFID Technology (EURFID), 73-80, 2015 | 18 | 2015 |
IoT6Sec: reliability model for Internet of Things security focused on anomalous measurements identification with energy analysis N Ferraz Junior, AAA Silva, AE Guelfi, ST Kofuji Wireless Networks, 1-24, 2017 | 16 | 2017 |
Viterbi algorithm for detecting ddos attacks W Bongiovanni, AE Guelfi, E Pontes, AAA Silva, F Zhou, ST Kofuji 2015 IEEE 40th Conference on Local Computer Networks (LCN), 209-212, 2015 | 16 | 2015 |
Methodologies, Tools and New Developments for E-Learning E Pontes, S Kofuji, A Guelfi BoD–Books on Demand, 2012 | 16 | 2012 |
Predicting Model for Identifying the Malicious Activity of Nodes in MANETs AAA Silva, E Pontes, AE Guelfi, I Caproni, R Aguiar, F Zhou, ST Kofuji The 20th IEEE Symposium on Computers and Communications 1 (20), 544-551, 2015 | 14 | 2015 |
Applying multi-correlation for improving forecasting in cyber security E Pontes, AE Guelfi, ST Kofuji, AAA Silva 2011 Sixth International Conference on Digital Information Management, 179-186, 2011 | 14 | 2011 |
Performance evaluation of publish-subscribe systems in IoT using energy-efficient and context-aware secure messages N Ferraz Junior, AAA Silva, AE Guelfi, ST Kofuji Journal of Cloud Computing 11 (1), 6, 2022 | 13 | 2022 |
PRBS/EWMA based model for predicting burst attacks (Brute Froce, DoS) in computer networks A Silva, E Pontes, F Zhou, A Guelf, S Kofuji Ninth International Conference on Digital Information Management (ICDIM 2014 …, 2014 | 12 | 2014 |
Privacy-preserving cloud-connected IoT data using context-aware and end-to-end secure messages NF Junior, AAA Silva, AE Guelfi, ST Kofuji Procedia Computer Science 191, 25-32, 2021 | 8 | 2021 |
Grey model and polynomial regression for identifying malicious nodes in MANETs AAA Silva, E Pontes, F Zhou, ST Kofuji 2014 IEEE global communications conference, 162-168, 2014 | 7 | 2014 |
Energy-efficient node position identification through payoff matrix and variability analysis A Silva, F Zhou, E Pontes, MA Simplicio, R Aguiar, A Guelfi, S Kofuji Telecommunication Systems 63, 19, 2016 | 6 | 2016 |
Impact of Feature Selection Methods on the Classification of DDoS Attacks using XGBoost PHHN de Araujo, A Silva, NF Junior, F Cabrini, A Santiago, A Guelfi, ... Journal of Communication and Information Systems 36 (1), 200-214, 2021 | 5 | 2021 |
A comprehensive risk management framework for approaching the Return on Security Investment (ROSI) E Pontes, AE Guelfi, AAA Silva, ST Kofuji Risk Management in Environment, Production and Economy, 149-170, 2011 | 5 | 2011 |
Grouping detection and forecasting security controls using unrestricted cooperative bargains AAA Silva, N Ferraz Jr, AE Guelfi, SHI Barboza, ST Kofuji Computer Communications 146, 155-173, 2019 | 4 | 2019 |
E-Learning--Engineering, On-Job Training and Interactive Teaching. A Silva, E Pontes, A Guelfi, ST Kofuji InTech, 2012 | 4 | 2012 |
An outlier-based analysis for behaviour and anomaly identification on IoT sensors FC Almeida, AE Guelfi, AAA Silva, NF Junior, MO Schneider, VL Gava, ... International Journal of Sensor Networks 39 (2), 106-124, 2022 | 3 | 2022 |
A proposal to distinguish DDoS traffic in flash crowd environments AAA da Silva, LS Silva, EL Bezerra, AE Guelfi, C de Armas, ... International Journal of Information Security and Privacy (IJISP) 16 (1), 1-16, 2022 | 3 | 2022 |
A proposed blockchain-based voting system with user authentication through biometrics ET Ueda, MM da Silva, AAA da Silva, NF Junior, FD Pereira, ... Journal of Information Security and Cryptography (Enigma) 8 (1), 1-11, 2021 | 3 | 2021 |
E-Learning: Organizational Infrastructure and Tools for Specific Areas A Guelfi, E Pontes, S Kofuji BoD–Books on Demand, 2012 | 3 | 2012 |
Security in cloud manufacturing: Forecasting and multi-correlation techniques for dealing with cyber attacks E Pontes, AA Silva, AE Guelfi, ST Kofuji Journal of Inf Sec Research 2 (3), 266-274, 2011 | 3 | 2011 |