Leandro Pfleger de Aguiar

Orcid: 0000-0001-6516-328X

According to our database1, Leandro Pfleger de Aguiar authored at least 14 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A Statistical Relational Learning Approach Towards Products, Software Vulnerabilities and Exploits.
IEEE Trans. Netw. Serv. Manag., September, 2023

Cream Skimming the Underground: Identifying Relevant Information Points from Online Forums.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

2021
On the Flow of Software Security Advisories.
IEEE Trans. Netw. Serv. Manag., 2021

Is Vulnerability Report Confidence Redundant? Pitfalls Using Temporal Risk Scores.
IEEE Secur. Priv., 2021

Software Vulnerabilities, Products and Exploits: A Statistical Relational Learning Approach.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021

2020
Beyond Herd Immunity Against Strategic Attackers.
IEEE Access, 2020

Measuring and Modeling Software Vulnerability Security Advisory Platforms.
Proceedings of the Risks and Security of Internet and Systems, 2020

2017
Characterizing and Modeling Patching Practices of Industrial Control Systems.
Proc. ACM Meas. Anal. Comput. Syst., 2017

2016
On the Efficiency of Sampling and Countermeasures to Critical-Infrastructure-Targeted Malware Campaigns.
SIGMETRICS Perform. Evaluation Rev., 2016

2015
WAP: Models and metrics for the assessment of critical-infrastructure-targeted malware campaigns.
Proceedings of the 26th IEEE International Symposium on Software Reliability Engineering, 2015

2014
Rejuvenation and the Spread of Epidemics in General Topologies.
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering Workshops, 2014

2011
Comparative Analyses of Power Consumption in Arithmetic Algorithms Implementation.
RITA, 2011

Mining redundant industrial alarm occurrences with association rules extraction and complex networks modeling.
J. Comput. Methods Sci. Eng., 2011

Comparative Analysis of Power Consumption in the Implementation of Arithmetic Algorithms.
Proceedings of the IEEE 10th International Conference on Trust, 2011


  Loading...