Frederico Araujo

Orcid: 0000-0001-5143-8318

According to our database1, Frederico Araujo authored at least 22 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Fashion Faux Pas: Implicit Stylistic Fingerprints for Bypassing Browsers' Anti-Fingerprinting Defenses.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

2022
Using Deception in Markov Game to Understand Adversarial Behaviors Through a Capture-The-Flag Environment.
Proceedings of the Decision and Game Theory for Security - 13th International Conference, 2022

2021
Crook-sourced intrusion detection as a service.
J. Inf. Secur. Appl., 2021

Evidential Cyber Threat Hunting.
CoRR, 2021

Software Deception Steering through Version Emulation.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

2020
Improving cybersecurity hygiene through JIT patching.
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020

Automating Cyberdeception Evaluation with Deep Learning.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

Towards an Open Format for Scalable System Telemetry.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

2019
Improving intrusion detectors by crook-sourcing.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Cross-Stack Threat Sensing for Cyber Security and Resilience.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2018

Hidden in Plain Sight: Filesystem View Separation for Data Integrity and Deception.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018

Dressed up: Baiting Attackers through Endpoint Service Projection.
Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2018

Threat Intelligence Computing.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
POSTER: Hidden in Plain Sight: A Filesystem for Data Integrity and Confidentiality.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Unsupervised deep embedding for novel class detection over data stream.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

2016
Embedded Honeypotting.
Proceedings of the Cyber Deception, Building the Scientific Foundation, 2016

2015
Compiler-instrumented, Dynamic Secret-Redaction of Legacy Processes for Attacker Deception.
Proceedings of the 24th USENIX Security Symposium, 2015

2014
From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
DIVAs 4.0: A Multi-Agent Based Simulation Framework.
Proceedings of the 17th IEEE/ACM International Symposium on Distributed Simulation and Real Time Applications, 2013

DIVAs 4.0: a framework for the development of situated multi-agent based simulation systems.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2013

2012
On Modeling and Verification of Agent-Based Traffic Simulation Properties in Alloy.
Int. J. Agent Technol. Syst., 2012

Modeling agent-based traffic simulation properties in Alloy.
Proceedings of the 2012 Spring Simulation Multiconference, 2012


  Loading...