Iberia Medeiros

Orcid: 0000-0003-4478-8680

According to our database1, Iberia Medeiros authored at least 40 papers between 2013 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
CorCA: An Automatic Program Repair Tool for Checking and Removing Effectively C Flaws.
Proceedings of the IEEE Conference on Software Testing, Verification and Validation, 2023

Code Privacy in Detection of Web Vulnerabilities.
Proceedings of the 27th International Conference on Evaluation and Assessment in Software Engineering, 2023

Towards PHP Vulnerability Detection at an Intermediate Language Level.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2023

2022
Statically Detecting Vulnerabilities by Processing Programming Languages as Natural Languages.
IEEE Trans. Reliab., 2022

Generating Quality Threat Intelligence Leveraging OSINT and a Cyber Threat Unified Taxonomy.
ACM Trans. Priv. Secur., 2022

Fast Abstracts and Student Forum Proceedings, 18th European Dependable Computing Conference - EDCC 2022.
CoRR, 2022

Effectiveness on C Flaws Checking and Removal.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

2021
ETIP: An Enriched Threat Intelligence Platform for improving OSINT correlation, analysis, visualization and sharing capabilities.
J. Inf. Secur. Appl., 2021

SRXCRM: Discovering Association Rules Between System Requirements and Product Specifications.
Proceedings of the Joint Proceedings of REFSQ 2021 Workshops, 2021

Improving Web Application Vulnerability Detection Leveraging Ensemble Fuzzing.
Proceedings of the 16th International Conference on Evaluation of Novel Approaches to Software Engineering, 2021

Third International Workshop on Data-Centric Dependability and Security (DCDS).
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2021

Finding Web Application Vulnerabilities with an Ensemble Fuzzing.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

2020
Towards a Deep Learning Model for Vulnerability Detection on Web Application Variants.
Proceedings of the 13th IEEE International Conference on Software Testing, 2020

Generating Tests for the Discovery of Security Flaws in Product Variants.
Proceedings of the 13th IEEE International Conference on Software Testing, 2020

Towards Web Application Security by Automated Code Correction.
Proceedings of the 15th International Conference on Evaluation of Novel Approaches to Software Engineering, 2020

Effect of Coding Styles in Detection of Web Application Vulnerabilities.
Proceedings of the 16th European Dependable Computing Conference, 2020

Second International Workshop on Data-Centric Dependability and Security (DCDS).
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2020

Impact of Coding Styles on Behaviours of Static Analysis Tools for Web Applications.
Proceedings of the 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks, 2020

2019
SEPTIC: Detecting Injection Attacks and Vulnerabilities Inside the DBMS.
IEEE Trans. Reliab., 2019

An empirical study on combining diverse static analysis tools for web security vulnerabilities based on development scenarios.
Computing, 2019

PURE: Generating Quality Threat Intelligence by Clustering and Correlating OSINT.
Proceedings of the 18th IEEE International Conference On Trust, 2019

A Cost-Effective Cloud Event Archival for SIEMs.
Proceedings of the 38th International Symposium on Reliable Distributed Systems Workshops, 2019

Low-Cost Serverless SIEM in the Cloud.
Proceedings of the 38th Symposium on Reliable Distributed Systems, 2019

SLICER: Safe Long-Term Cloud Event Archival.
Proceedings of the 24th IEEE Pacific Rim International Symposium on Dependable Computing, 2019

LADS: A Live Anomaly Detection System based on Machine Learning Methods.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

Enriching Threat Intelligence Platforms Capabilities.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

Enhancing Information Sharing and Visualization Capabilities in Security Data Analytic Platforms.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2019

2018
Benchmarking Static Analysis Tools for Web Security.
IEEE Trans. Reliab., 2018

FlowHacker: Detecting Unknown Network Attacks in Big Traffic Data Using Network Flows.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Detecting Network Threats using OSINT Knowledge-Based IDS.
Proceedings of the 14th European Dependable Computing Conference, 2018

Validating and Securing DLMS/COSEM Implementations with the ValiDLMS Framework.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2018

2017
On Combining Diverse Static Analysis Tools for Web Security: An Empirical Study.
Proceedings of the 13th European Dependable Computing Conference, 2017

Demonstrating a Tool for Injection Attack Prevention in MySQL.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

2016
Detection of vulnerabilities and automatic protection for web applications
PhD thesis, 2016

Detecting and Removing Web Application Vulnerabilities with Static Analysis and Data Mining.
IEEE Trans. Reliab., 2016

DEKANT: a static analysis tool that learns to detect web application vulnerabilities.
Proceedings of the 25th International Symposium on Software Testing and Analysis, 2016

Equipping WAP with WEAPONS to Detect Vulnerabilities: Practical Experience Report.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

Hacking the DBMS to Prevent Injection Attacks.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

2014
Automatic detection and correction of web application vulnerabilities using data mining to predict false positives.
Proceedings of the 23rd International World Wide Web Conference, 2014

2013
Securing energy metering software with automatic source code correction.
Proceedings of the 11th IEEE International Conference on Industrial Informatics, 2013


  Loading...