Luiz Fernando Rust da Costa Carmo

Orcid: 0000-0001-6131-7771

According to our database1, Luiz Fernando Rust da Costa Carmo authored at least 73 papers between 1992 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Classification and Clustering for predicting breathalyzer failures.
Proceedings of the IEEE International Instrumentation and Measurement Technology Conference, 2023

2021
Securing Smart Meters Through Physical Properties of Their Components.
IEEE Trans. Instrum. Meas., 2021

Model-Based Stealth Attack to Networked Control System Based on Real-Time Ethernet.
IEEE Trans. Ind. Electron., 2021

Field surveillance of fuel dispensers using IoT-based metering and blockchains.
J. Netw. Comput. Appl., 2021

Malicious Traffic Description: Toward a Data Model for Mitigating Security Threats to Home IoT.
IEEE Commun. Stand. Mag., 2021

A multisensor prediction-based heuristic for the internet of things.
Computing, 2021

2020
Identification of Data Injection Attacks in Networked Control Systems Using Noise Impulse Integration.
Sensors, 2020

Bio-inspired Active System Identification: a Cyber-Physical Intelligence Attack in Networked Control Systems.
Mob. Networks Appl., 2020

Controlling Smart Meters Integrity via Identity Management of its Components.
Proceedings of the 2020 IEEE International Instrumentation and Measurement Technology Conference, 2020

2019
Using Blockchains to Implement Distributed Measuring Systems.
IEEE Trans. Instrum. Meas., 2019

Secure end-to-end processing of smart metering data.
J. Cloud Comput., 2019

A Prediction-Based Multisensor Heuristic for the Internet of Things.
Proceedings of the 15th ACM International Symposium on QoS and Security for Wireless and Mobile Networks, 2019

Countermeasure for Identification of Controlled Data Injection Attacks in Networked Control Systems.
Proceedings of the 2nd Workshop on Metrology for Industry 4.0 and IoT MetroInd4.0&IoT 2019, 2019

Sensor Data Prediction techniques for nodes in IoT (poster).
Proceedings of the 22th International Conference on Information Fusion, 2019

Using Trusted Networks to Detect Anomaly Nodes in Internet of Things.
Proceedings of the 22th International Conference on Information Fusion, 2019

Bio-inspired System Identification Attacks in Noisy Networked Control Systems.
Proceedings of the Bio-inspired Information and Communication Technologies, 2019

2018
Using Physical Context-Based Authentication against External Attacks: Models and Protocols.
Secur. Commun. Networks, 2018

A controller design for mitigation of passive system identification attacks in networked control systems.
J. Internet Serv. Appl., 2018

Cloud Challenge: Secure End-to-End Processing of Smart Metering Data.
Proceedings of the 2018 IEEE/ACM International Conference on Utility and Cloud Computing Companion, 2018

Evaluation on Passive System Identification and Covert Misappropriation Attacks in Large Pressurized Heavy Water Reactors.
Proceedings of the 2018 Workshop on Metrology for Industry 4.0 and IoT, 2018

How blockchains can improve measuring instruments regulation and control.
Proceedings of the IEEE International Instrumentation and Measurement Technology Conference, 2018

Using Intel SGX to Enforce Auditing of Running Software in Insecure Environments.
Proceedings of the 2018 IEEE International Conference on Cloud Computing Technology and Science, 2018

2017
Covert Attacks in Cyber-Physical Control Systems.
IEEE Trans. Ind. Informatics, 2017

COMFIT: A development environment for the Internet of Things.
Future Gener. Comput. Syst., 2017

How blockchains can help legal metrology.
Proceedings of the 1st Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers, 2017

Use of Switching Controllers for Mitigation of Active Identification Attacks in Networked Control Systems.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

EVINCED: Integrity Verification Scheme for Embedded Systems Based on Time and Clock Cycles.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

Towards a Storage-Efficient and Categorized Secure Log Structure Scheme for Embedded Systems.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

2016
A Decentralized Damage Detection System for Wireless Sensor and Actuator Networks.
IEEE Trans. Computers, 2016

Multicast Delayed Authentication for Streaming Synchrophasor Data in the Smart Grid.
Proceedings of the ICT Systems Security and Privacy Protection, 2016

2015
DYSSS: A Dynamic and Context-Aware Security System for Shared Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

Ensuring energy efficiency of power quality applications in smart grids through a framework based on Wireless Sensor and Actuator Networks.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015

SensorWatermark: a scheme of software watermark using code obfuscation and tamperproofing for WSN.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015

Web2Compile-CoT: A Web IDE for the Cloud of Things.
Proceedings of the Internet and Distributed Computing Systems, 2015

2014
A control and decision system for smart buildings using wireless sensor and actuator networks.
Trans. Emerg. Telecommun. Technol., 2014

Software validation of medical instruments.
Proceedings of the 2014 IEEE International Symposium on Medical Measurements and Applications, 2014

Multisensor data fusion in Shared Sensor and Actuator Networks.
Proceedings of the 17th International Conference on Information Fusion, 2014

2013
A tight bound for exhaustive key search attacks against Message Authentication Codes.
RAIRO Theor. Informatics Appl., 2013

Intrusion Detection System for Wireless Sensor Networks Using Danger Theory Immune-Inspired Techniques.
Int. J. Wirel. Inf. Networks, 2013

Energy footprint framework: A pathway toward smart grid sustainability.
IEEE Commun. Mag., 2013

A Control and Decision System for Smart Buildings.
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013

2012
Program Matching through Code Analysis and Artificial Neural Networks.
Int. J. Softw. Eng. Knowl. Eng., 2012

2011
Enhancing Levenshtein distance algorithm for assessing behavioral trust.
Comput. Syst. Sci. Eng., 2011

2010
Enhancing Levenshtein distance algorithm for assessing behavioral trust.
Comput. Syst. Sci. Eng., 2010

SUTIL - Network selection based on utility function and integer linear programming.
Comput. Networks, 2010

Traceability of Executable Codes Using Neural Networks.
Proceedings of the Information Security - 13th International Conference, 2010

Software evaluation of smart meters within a Legal Metrology perspective: A Brazilian case.
Proceedings of the IEEE PES Conference on Innovative Smart Grid Technologies, 2010

Program Equivalence Using Neural Networks.
Proceedings of the Bio-Inspired Models of Network, Information, and Computing Systems, 2010

2008
User's Profile-Driven Resource Reservation for WiMAX Networks.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

Evaluating Security Risks following a Compliance Perspective.
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008

2007
Trust Evaluation for Web Applications based on Behavioral Analysis.
Proceedings of the New Approaches for Security, 2007

2005
A Service Approach for Architecting Application Independent Wireless Sensor Networks.
Clust. Comput., 2005

A Framework for Preparing Experimental Evaluation of Rerouting Mechanisms.
Proceedings of the 10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS 2005), 2005

Reflective middleware for wireless sensor networks.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005

Application-Driven Node Management in Multihop Wireless Sensor Networks.
Proceedings of the Networking, 2005

2003
A Proactive Management and Rerouting Framework for QoS Critical Distributed Applications Using Active Technology.
Proceedings of the 9th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS Fall 2003), 2003

A Flexible Middleware System for Wireless Sensor Networks.
Proceedings of the Middleware 2003, 2003

A Flexible Web Service Based Architecture for Wireless Sensor Networks.
Proceedings of the 23rd International Conference on Distributed Computing Systems Workshops (ICDCS 2003 Workshops), 2003

2002
An Adaptive Distributed System Based on Conditional Dependencies.
Proceedings of the 7th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS 2002), 2002

2001
Mobile agents applications.
Internet Res., 2001

Fenix - personalized information filtering system for WWW pages.
Internet Res., 2001

Data Agents System: An Internet-based Distributed Query Service.
Proceedings of the 2nd Latin American Network Operations and Management Symposium, 2001

Data Agent System: A Query Service based on Mobile Agent Technology.
Proceedings of the Fifth IASTED International Conference Internet and Multimedia Systems and Applications (IMSA 2001), 2001

1999
Micael: An Autonomous Mobile Agent System to Protect New Generation Networked Applications.
Proceedings of the Recent Advances in Intrusion Detection, Second International Workshop, 1999

Architecture for Adaptive Multimedia Document Retrieval with Real-Time Monitoring.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999

Design of an Integrated Environment for Adaptive Multimedia Document Presentation Through Real Time Monitoring.
Proceedings of the Interactive Distributed Multimedia Systems and Telecommunication Services, 1999

Applications of Aglet Technology.
Proceedings of the Internet Applications, 5th International Computer Science Conference, 1999

1996
A General-Purpose Multimedia Synchronization Mechanism Based on Casual Relations.
IEEE J. Sel. Areas Commun., 1996

1995
The RT-LOTOS Formal Specification of the Conditional Delivery Mechanism.
Inf. Syst., 1995

1994
Towards a New Multimedia Synchronization Mechanism and its Formal Definition.
Proceedings of the Second ACM International Conference on Multimedia '94, 1994

A New Mechanism for Achieving Inter-stream Synchronization in Multimedia Communication Systems.
Proceedings of the International Conference on Multimedia Computing and Systems, 1994

Implementing Intra-Stream Synchronization by Means of Conditional Dependency Expressions.
Proceedings of the High Performance Networking V, Proceedings of the IFIP TC6/WG6.4 Fifth International Conference on High Performance Networking, Grenoble, France, 27 June, 1994

1992
Basic Synchronization Concepts in Multimedia Systems.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 1992


  Loading...