Davidson R. Boccardo

According to our database1, Davidson R. Boccardo authored at least 22 papers between 2010 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Towards a Practical Information Security Maturity Evaluation Method focused on People, Process and Technology.
Proceedings of the IEEE International Workshop on Metrology for Industry 4.0 & IoT, 2021

2019
Dijkstra graphs.
Discret. Appl. Math., 2019

Full Characterization of a Class of Graphs Tailored for Software Watermarking.
Algorithmica, 2019

2018
On the resilience of canonical reducible permutation graphs.
Discret. Appl. Math., 2018

2017
EVINCED: Integrity Verification Scheme for Embedded Systems Based on Time and Clock Cycles.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

2016
Software control and intellectual property protection in cyber-physical systems.
EURASIP J. Inf. Secur., 2016

Dijkstra Graphs.
CoRR, 2016

2015
DYSSS: A Dynamic and Context-Aware Security System for Shared Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

SensorWatermark: a scheme of software watermark using code obfuscation and tamperproofing for WSN.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015

The Graphs of Structured Programming.
Proceedings of the 13th Cologne Twente Workshop on Graphs and Combinatorial Optimization, 2015

Fair Fingerprinting Protocol for Attesting Software Misuses.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Software validation of medical instruments.
Proceedings of the 2014 IEEE International Symposium on Medical Measurements and Applications, 2014

2013
A tight bound for exhaustive key search attacks against Message Authentication Codes.
RAIRO Theor. Informatics Appl., 2013

Towards a provably robust graph-based watermarking scheme
CoRR, 2013

Energy footprint framework: A pathway toward smart grid sustainability.
IEEE Commun. Mag., 2013

Towards a Provably Resilient Scheme for Graph-Based Watermarking.
Proceedings of the Graph-Theoretic Concepts in Computer Science, 2013

2012
Program Matching through Code Analysis and Artificial Neural Networks.
Int. J. Softw. Eng. Knowl. Eng., 2012

2010
Context-sensitive analysis without calling-context.
High. Order Symb. Comput., 2010

Context-sensitive analysis of obfuscated x86 executables.
Proceedings of the 2010 ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation, 2010

Traceability of Executable Codes Using Neural Networks.
Proceedings of the Information Security - 13th International Conference, 2010

Software evaluation of smart meters within a Legal Metrology perspective: A Brazilian case.
Proceedings of the IEEE PES Conference on Innovative Smart Grid Technologies, 2010

Program Equivalence Using Neural Networks.
Proceedings of the Bio-Inspired Models of Network, Information, and Computing Systems, 2010


  Loading...