Manuel Eduardo Correia

Orcid: 0000-0002-2348-8075

Affiliations:
  • University of Porto, Portugal


According to our database1, Manuel Eduardo Correia authored at least 42 papers between 1994 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Deterministic or probabilistic? - A survey on Byzantine fault tolerant state machine replication.
Comput. Secur., June, 2023

HAL 9000: Skynet's Risk Manager.
CoRR, 2023

SPIDVerify: A Secure and Privacy-Preserving Decentralised Identity Verification Framework.
Proceedings of the International Conference on Smart Applications, 2023

Skynet: a Cyber-Aware Intrusion Tolerant Overseer.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2023

2022
Digital Forensics for the Detection of Deepfake Image Manipulations.
ERCIM News, 2022

A Decentralised Real Estate Transfer Verification based on Self-Sovereign Identity and Smart Contracts.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

2021
Exposing Manipulated Photos and Videos in Digital Forensics Analysis.
J. Imaging, 2021

A Dataset of Photos and Videos for Digital Forensics Analysis Using Machine Learning Processing.
Data, 2021

Forensic Analysis of Tampered Digital Photos.
Proceedings of the Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, 2021

2020
Profiling IT Security and Interoperability in Brazilian Health Organisations From a Business Perspective.
Int. J. E Health Medical Commun., 2020

Container Hardening Through Automated Seccomp Profiling.
Proceedings of the 6th International Workshop on Container Technologies and Container Clouds, 2020

Providing Secured Access Delegation in Identity Management Systems.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

Illegitimate HIS Access by Healthcare Professionals Detection System Applying an Audit Trail-based Model.
Proceedings of the 13th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2020), 2020

2019
Reputation based approach for improved fairness and robustness in P2P protocols.
Peer-to-Peer Netw. Appl., 2019

Iris: Secure reliable live-streaming with opportunistic mobile edge cloud offloading.
Future Gener. Comput. Syst., 2019

Security and Fairness in IoT Based e-Health System: A Case Study of Mobile Edge-Clouds.
Proceedings of the 2019 International Conference on Wireless and Mobile Computing, 2019

2018
HS.Register - An Audit-Trail Tool to Respond to the General Data Protection Regulation (GDPR).
Proceedings of the Building Continents of Knowledge in Oceans of Data: The Future of Co-Created eHealth, 2018

On the Interoperability of European National Identity Cards.
Proceedings of the Ambient Intelligence, 2018

A Flexible Framework for Rogue Access Point Detection.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

Are Deep Learning Methods Ready for Prime Time in Fingerprints Minutiae Extraction?
Proceedings of the Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, 2018

Reputation-Based Security System For Edge Computing.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2016
Digital Signatures Workflows in Alfresco.
Proceedings of the Electronic Government and the Information Systems Perspective, 2016

2015
Visualization of Passively Extracted HL7 Production Metrics.
Proceedings of the HEALTHINF 2015, 2015

2014
Envisioning secure and usable access control for patients.
Proceedings of the 3nd IEEE International Conference on Serious Games and Applications for Health, 2014

USB Connection Vulnerabilities on Android Smartphones: Default and Vendors' Customizations.
Proceedings of the Communications and Multimedia Security, 2014

2013
A Secure RBAC Mobile Agent Model for Healthcare Institutions - Preliminary Study.
Proceedings of the Information Technology in Bio- and Medical Informatics, 2013

A secure RBAC mobile agent access control model for healthcare institutions.
Proceedings of the 26th IEEE International Symposium on Computer-Based Medical Systems, 2013

Physician's awareness of e-prescribing security risks.
Proceedings of the 26th IEEE International Symposium on Computer-Based Medical Systems, 2013

2012
OFELIA - A Secure Mobile Attribute Aggregation Infrastructure for User-Centric Identity Management.
Proceedings of the Information Security and Privacy Research, 2012

A Mobile Based Authorization Mechanism for Patient Managed Role Based Access Control.
Proceedings of the Information Technology in Bio- and Medical Informatics, 2012

2011
Leveraging identity management interoperability in eHealth.
Proceedings of the International Carnahan Conference on Security Technology, 2011

Tunable Immune Detectors for Behaviour-Based Network Intrusion Detection.
Proceedings of the Artificial Immune Systems - 10th International Conference, 2011

A Hybrid AIS-SVM Ensemble Approach for Text Classification.
Proceedings of the Adaptive and Natural Computing Algorithms, 2011

2010
Self Tolerance by Tuning T-Cell Activation: An Artificial Immune System for Anomaly Detection.
Proceedings of the Bio-Inspired Models of Network, Information, and Computing Systems, 2010

2009
An Artificial Immune System for Temporal Anomaly Detection Using Cell Activation Thresholds and Clonal Size Regulation with Homeostasis.
Proceedings of the International Joint Conferences on Bioinformatics, 2009

Towards an Immune-inspired Temporal Anomaly Detection Algorithm based on Tunable Activation Thresholds.
Proceedings of the BIOSIGNALS 2009, 2009

2008
TAT-NIDS: An Immune-Based Anomaly Detection Architecture for Network Intrusion Detection.
Proceedings of the 2nd International Workshop on Practical Applications of Computational Biology and Bioinformatics, 2008

2007
Storage and retrieval on P2P networks: A DHT based protocol.
Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), 2007

1999
IAP for dummies: The YAP Design.
Proceedings of the Parallelism and Implementation Technology for (Constraint) Logic Programming, 1999

DAOS - Scalable And-Or Parallelism.
Proceedings of the Euro-Par '99 Parallel Processing, 5th International Euro-Par Conference, Toulouse, France, August 31, 1999

1997
The SBA: Exploiting Orthogonality in AND-OR Parallel Systems.
Proceedings of the Logic Programming, 1997

1994
Aurora, Andorra-I and Friends on the Sun.
Proceedings of the ILPS 94 Workshop on Design and Implementation of Parallel Logic Programming Systems, 1994


  Loading...