Altair Olivo Santin

According to our database1, Altair Olivo Santin authored at least 51 papers between 2003 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Using Blockchains to Implement Distributed Measuring Systems.
IEEE Trans. Instrumentation and Measurement, 2019

SDN-based and multitenant-aware resource provisioning mechanism for cloud-based big data streaming.
J. Netw. Comput. Appl., 2019

BigFlow: Real-time and reliable anomaly-based intrusion detection for high-speed networks.
Future Gener. Comput. Syst., 2019

2018
A Smart Meter and Smart House Integrated to an IdM and Key-based Scheme for Providing Integral Security for a Smart Grid ICT.
MONET, 2018

A reliable and energy-efficient classifier combination scheme for intrusion detection in embedded systems.
Comput. Secur., 2018

Enabling Anomaly-based Intrusion Detection Through Model Generalization.
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018

Are fintechs really a hype? A machine learning-based polarity analysis of Brazilian posts on social media.
Proceedings of the 16th IEEE International Conference on Industrial Informatics, 2018

How blockchains can improve measuring instruments regulation and control.
Proceedings of the IEEE International Instrumentation and Measurement Technology Conference, 2018

A Machine Learning Auditing Model for Detection of Multi-Tenancy Issues Within Tenant Domain.
Proceedings of the 18th IEEE/ACM International Symposium on Cluster, 2018

2017
Towards an Energy-Efficient Anomaly-Based Intrusion Detection Engine for Embedded Systems.
IEEE Trans. Computers, 2017

Toward a reliable anomaly-based intrusion detection in real-world environments.
Comput. Networks, 2017

Stream learning and anomaly-based intrusion detection in the adversarial settings.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

A multi-domain role activation model.
Proceedings of the IEEE International Conference on Communications, 2017

A Resilient Stream Learning Intrusion Detection Mechanism for Real-Time Analysis of Network Traffic.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

2016
Providing security and privacy in smart house through mobile cloud computing.
Proceedings of the 8th IEEE Latin-American Conference on Communications, 2016

Insights on the resilience and capacity of AMI wireless networks.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

On the dynamics of the RPL protocol in AMI networks under jamming attacks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

2015
Method for testing the fault tolerance of MapReduce frameworks.
Comput. Networks, 2015

A Usage Control Platform Based on Rule Templates and Authorization Credentials.
Proceedings of the XXXIII Brazilian Symposium on Computer Networks and Distributed Systems, 2015

Managing distributed UCONabc policies with authorization assertions and policy templates.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015

The energy cost of network security: A hardware vs. software comparison.
Proceedings of the 2015 IEEE International Symposium on Circuits and Systems, 2015

An IdM and Key-Based Authentication Method for Providing Single Sign-On in IoT.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

An Approach to Deal with Processing Surges in Cloud Computing.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

2014
A (UCONABC) Resilient Authorization Evaluation for Cloud Computing.
IEEE Trans. Parallel Distrib. Syst., 2014

Algorithms for a distributed IDS in MANETs.
J. Comput. Syst. Sci., 2014

Moving Network Protection from Software to Hardware: An Energy Efficiency Analysis.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2014

2013
Evaluation of desktop operating systems under thrashing conditions.
J. Braz. Comp. Soc., 2013

Mitigating XML Injection 0-Day Attacks through Strategy-Based Detection Systems.
IEEE Security & Privacy, 2013

Obtaining the threat model for e-mail phishing.
Appl. Soft Comput., 2013

2012
Integral Federated Identity Management for Cloud Computing.
Proceedings of the 5th International Conference on New Technologies, 2012

Distributed Algorithms for the Creation of a New Distributed IDS in MANETs.
Proceedings of the Internet and Distributed Computing Systems, 2012

A Distributed IDS for Ad Hoc Networks.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2011
Applying a usage control model in an operating system kernel.
J. Netw. Comput. Appl., 2011

2010
Octopus-IIDS: An anomaly based intelligent intrusion detection system.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

SP2MS: A MANet-Based P2P Service.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

2009
Policy management architecture based on provisioning model and authorization certificates.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

Applying quorum role in network management.
Proceedings of the Integrated Network Management, 2009

Policy control management for Web Services.
Proceedings of the Integrated Network Management, 2009

Distributed Usage Control Architecture for Business Coalitions.
Proceedings of IEEE International Conference on Communications, 2009

A Public Keys Based Architecture for P2P Identification, Content Authenticity and Reputation.
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009

2008
A Three-Ballot-Based Secure Electronic Voting System.
IEEE Security & Privacy, 2008

A pull-based e-mail architecture.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

Protocol of Authenticity to Provide Legal Security in e-Contracts - A Prototype.
Proceedings of the ICE-B 2008, 2008

An Experimental Peer-to-Peer E-mail System.
Proceedings of the 11th IEEE International Conference on Computational Science and Engineering, 2008

2007
Web2Peer: A Peer-to-Peer Infrastructure for Publishing/Locating/Replicating Web Pages on Internet.
Proceedings of the International Symposium on Autonomous Decentralized Systems (ISADS 2007), 2007

A Grammar for Specifying Usage Control Policies.
Proceedings of IEEE International Conference on Communications, 2007

Implementing a Peer-to-Peer Web Browser for Publishing and Searching Web Pages on Internet.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2004
Teias de federações.
PhD thesis, 2004

2003
Federation Web: A Scheme to Compound Authorization Chains on Large-Scale Distributed Systems.
Proceedings of the 22nd Symposium on Reliable Distributed Systems (SRDS 2003), 2003

Building Trust Chains between CORBA Objects.
Proceedings of the Dependable Computing, First Latin-American Symposium, 2003

Extending the SDSI / SPKI Model through Federation Webs.
Proceedings of the Communications and Multimedia Security, 2003


  Loading...