Eduardo Feitosa

Orcid: 0000-0001-6401-3992

According to our database1, Eduardo Feitosa authored at least 24 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Exploring how experienced and unexperienced professionals use a privacy threat modeling methodology.
J. Interact. Syst., July, 2023

Privacy Threat MOdeling Language.
IEEE Access, 2023

2022
Piracema.io: A rules-based tree model for phishing prediction.
Expert Syst. Appl., 2022

PTMOL: a suitable approach for modeling privacy threats in online social networks.
Proceedings of the 21st Brazilian Symposium on Human Factors in Computing Systems, 2022

Hidden things and implicit interaction: looking back on how invisibility evolved as a quality-in-use attribute.
Proceedings of the 21st Brazilian Symposium on Human Factors in Computing Systems, 2022

2021
Representação e Aplicação de Políticas de Segurança em Firewalls de Redes Híbridas.
Proceedings of the 39th Brazilian Symposium on Computer Networks and Distributed Systems, 2021

2020
Heuristic-based strategy for Phishing prediction: A survey of URL-based approach.
Comput. Secur., 2020

2019
A Web Browser Fingerprinting Method Based on the Web Audio API.
Comput. J., 2019

Evaluating PIT-OSN 1 in inspecting the privacy levels of an online social network.
Proceedings of the 18th Brazilian Symposium on Human Factors in Computing Systems, 2019

2018
A Set of Privacy Inspection Techniques for Online Social Networks.
Proceedings of the 17th Brazilian Symposium on Human Factors in Computing Systems, 2018

2017
Remote Routing Approach to Restricted Devices in MANETs.
Proceedings of the XXXV Brazilian Symposium on Computer Networks and Distributed Systems, 2017

2016
A cyber-resilient architecture for critical security services.
J. Netw. Comput. Appl., 2016

A Taxonomy to Classify Risk End-User Profile in Interaction with the Computing Environment.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2016

2015
A role-based routing solution for MANET to support hierarchical rescue teams in emergency scenarios.
Proceedings of the 2015 International Conference on Information Networking, 2015

Identifying and Classifying Suspicious Network Behavior Using Passive DNS Analysis.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
Towards Secure and Dependable Authentication and Authorization Infrastructures.
Proceedings of the 20th IEEE Pacific Rim International Symposium on Dependable Computing, 2014

Identity Providers-as-a-Service built as Cloud-of-Clouds: challenges and opportunities.
Proceedings of the Position Papers of the 2014 Federated Conference on Computer Science and Information Systems, 2014

A Multipath Extension for the Heterogeneous Technology Routing Protocol.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 13th International Conference, 2014

Increasing the Resilience and Trustworthiness of OpenID Identity Providers for Future Networks and Services.
Proceedings of the Ninth International Conference on Availability, 2014

2013
On the tuning of wireless heterogeneous routing.
Proceedings of the 24th IEEE Annual International Symposium on Personal, 2013

An Intrusion Tolerant Identity Management Infrastructure for Cloud Computing Services.
Proceedings of the 2013 IEEE 20th International Conference on Web Services, Santa Clara, CA, USA, June 28, 2013

2012
An orchestration approach for unwanted Internet traffic identification.
Comput. Networks, 2012

Automatic classification of cross-site scripting in web pages using document-based and URL-based features.
Proceedings of the 2012 IEEE Symposium on Computers and Communications, 2012

2009
RIP - A robust IP access architecture.
Comput. Secur., 2009


  Loading...