Eduardo da Silva

Orcid: 0000-0001-6070-7532

According to our database1, Eduardo da Silva authored at least 23 papers between 2008 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
CEIFA: A multi-level anomaly detector for smart farming.
Comput. Electron. Agric., 2022

2020
Security challenges to smart agriculture: Current state, key issues, and future directions.
Array, 2020

Quantifying the Influence of Regulatory Instructions over the Detection of Network Neutrality Violations.
Proceedings of the 2020 IFIP Networking Conference, 2020

2019
Network slicing security: Challenges and directions.
Internet Technol. Lett., 2019

A Network Service for Preventing Data Leakage from IoT Cloud-assisted Equipment.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

Safeguarding from abuse by IoT vendors: Edge messages verification of cloud-assisted equipment.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

2016
SEMAN: A Novel Secure Middleware for Mobile Ad Hoc Networks.
J. Comput. Networks Commun., 2016

Organizing intelligent vehicles at traffic lights to decrease travel time in a double lane road.
Proceedings of the IEEE 12th International Conference on Intelligent Computer Communication and Processing, 2016

2014
SEMAN - uma proposta de Middleware seguro para as redes ad hoc móveis.
PhD thesis, 2014

Middleware proposals for mobile ad hoc networks.
J. Netw. Comput. Appl., 2014

Travel time management using time compensation scheme for a traffic exclusively of autonomous vehicles in a double lane highway.
Proceedings of the 17th International IEEE Conference on Intelligent Transportation Systems, 2014

2013
Uma Avaliação do Esquema de Gerenciamento de Chave Baseado em Identidade Identity Key Management.
RITA, 2013

Towards a fully self-organized identity-based key management system for MANETs.
Proceedings of the 9th IEEE International Conference on Wireless and Mobile Computing, 2013

2012
True: A Trust Evaluation Service for Mobile Ad Hoc Networks Resistant to Malicious Attacks.
J. Digit. Inf. Manag., 2012

Distributed Self-organized Trust Management for Mobile Ad Hoc Networks.
Proceedings of the Networked Digital Technologies - 4th International Conference, 2012

2011
Survivable key management on WANETs.
IEEE Wirel. Commun., 2011

Resisting to False Identities Attacks to the Public-Key Management System for Wireless Ad Hoc Networks.
Proceedings of the Mobile Networks and Management - Third International ICST Conference, 2011

2010
Implications of Misbehaving Attacks on Probabilistic Quorum System for MANETs.
Proceedings of the SECRYPT 2010, 2010

2009
Resisting Impersonation Attacks in Chaining-based Public-Key Management on Manets - The Virtual Public-key Management.
Proceedings of the SECRYPT 2009, 2009

Survivable keying for wireless ad hoc networks.
Proceedings of the Integrated Network Management, 2009

2008
Identity-based key management in mobile ad hoc networks: techniques and applications.
IEEE Wirel. Commun., 2008

Quantifying Misbehaviour Attacks Against the Self-Organized Public Key Management on Manets.
Proceedings of the SECRYPT 2008, 2008

Analyzing the Effectiveness of the Self-organized Public-Key Management System on MANETs under the Lack of Cooperation and the Impersonation Attacks.
Proceedings of the e-Business and Telecommunications - International Conference, 2008


  Loading...