Marco Vieira

According to our database1, Marco Vieira authored at least 197 papers between 2000 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
BIGSEA: A Big Data analytics platform for public transportation information.
Future Generation Comp. Syst., 2019

An empirical study on combining diverse static analysis tools for web security vulnerabilities based on development scenarios.
Computing, 2019

2018
Benchmarking Static Analysis Tools for Web Security.
IEEE Trans. Reliability, 2018

Toward characterizing HTML defects on the Web.
Softw., Pract. Exper., 2018

Introduction to the special issue on software reliability engineering.
Journal of Systems and Software, 2018

Fog orchestration for the Internet of Everything: state-of-the-art and research challenges.
J. Internet Services and Applications, 2018

A Europe-Brazil Context for Secure Data Analytics in the Cloud.
IEEE Security & Privacy, 2018

An Approach for Trustworthiness Benchmarking Using Software Metrics.
Proceedings of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing, 2018

Evaluating the Applicability of Robustness Testing in Virtualized Environments.
Proceedings of the 8th Latin-American Symposium on Dependable Computing, 2018

Interacting SRN Models for Availability Evaluation of VM Migration as Rejuvenation on a System under Varying Workload.
Proceedings of the 2018 IEEE International Symposium on Software Reliability Engineering Workshops, 2018


Exploratory Study of Machine Learning Techniques for Supporting Failure Prediction.
Proceedings of the 14th European Dependable Computing Conference, 2018

Finding SQL Injection and Cross Site Scripting Vulnerabilities with Diverse Static Analysis Tools.
Proceedings of the 14th European Dependable Computing Conference, 2018

2017
Editorial: Security and Dependability of Cloud Systems and Services - Part II.
IEEE Trans. Services Computing, 2017

Editorial: Security and Dependability of Cloud Systems and Services.
IEEE Trans. Services Computing, 2017

Robustness-Driven Resilience Evaluation of Self-Adaptive Software Systems.
IEEE Trans. Dependable Sec. Comput., 2017

A field study on root cause analysis of defects in space software.
Rel. Eng. & Sys. Safety, 2017

Service-Oriented Architectures for a Flexible and Safe Use of Unmanned Aerial Vehicles.
IEEE Intell. Transport. Syst. Mag., 2017

Designing vulnerability testing tools for web services: approach, components, and tools.
Int. J. Inf. Sec., 2017

Diversity with intrusion detection systems: An empirical study.
Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, 2017

Software Metrics as Indicators of Security Vulnerabilities.
Proceedings of the 28th IEEE International Symposium on Software Reliability Engineering, 2017

Practical Evaluation of Static Analysis Tools for Cryptography: Benchmarking Method and Case Study.
Proceedings of the 28th IEEE International Symposium on Software Reliability Engineering, 2017

INTENSE: INteroperability TEstiNg as a SErvice.
Proceedings of the 2017 IEEE International Conference on Web Services, 2017

Evaluating a Corpus of Root Causes and Measures to Guide RCA Processes in Critical Software.
Proceedings of the 18th IEEE International Symposium on High Assurance Systems Engineering, 2017

Towards an Approach for Trustworthiness Assessment of Software as a Service.
Proceedings of the IEEE International Conference on Edge Computing, 2017

On Combining Diverse Static Analysis Tools for Web Security: An Empirical Study.
Proceedings of the 13th European Dependable Computing Conference, 2017

An Analysis of OpenStack Vulnerabilities.
Proceedings of the 13th European Dependable Computing Conference, 2017

PRIVAaaS: privacy approach for a distributed cloud-based data analytics platforms.
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, 2017

2016
The Perils of Android Security Configuration.
IEEE Computer, 2016

The 2016 IEEE Services Emerging Technology Track on Dependable and Secure Services (DSS 2016).
Proceedings of the IEEE World Congress on Services, 2016

Adapting the Orthogonal Defect Classification Taxonomy to the Space Domain.
Proceedings of the Computer Safety, Reliability, and Security, 2016

Software for embedded systems: a quality assessment based on improved ODC taxonomy.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Risk Assessment of User-Defined Security Configurations for Android Devices.
Proceedings of the 27th IEEE International Symposium on Software Reliability Engineering, 2016

Quantifying the Attack Detection Accuracy of Intrusion Detection Systems in Virtualized Environments.
Proceedings of the 27th IEEE International Symposium on Software Reliability Engineering, 2016

XSX: Lightweight Encryption for Data Warehousing Environments.
Proceedings of the Big Data Analytics and Knowledge Discovery, 2016

2015
Assessing and Comparing Vulnerability Detection Tools for Web Services: Benchmarking Approach and Examples.
IEEE Trans. Services Computing, 2015

A Practical Approach Towards Automatic Testing of Web Services Interoperability.
Int. J. Web Service Res., 2015

A benchmarking process to assess software requirements documentation for space applications.
Journal of Systems and Software, 2015

Assessing the security of web service frameworks against Denial of Service attacks.
Journal of Systems and Software, 2015

Choosing the right NoSQL database for the job: a quality attribute evaluation.
J. Big Data, 2015

Evaluating Computer Intrusion Detection Systems: A Survey of Common Practices.
ACM Comput. Surv., 2015

NoSQL Databases: A Software Engineering Perspective.
Proceedings of the New Contributions in Information Systems and Technologies, 2015

IEEE Services Visionary Track on Dependable and Secure Services (DSS 2015).
Proceedings of the 2015 IEEE World Congress on Services, 2015

A security configuration assessment for android devices.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015

Characterizing the performance of web service frameworks under security attacks.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015

Requirements, design and evaluation of a privacy reference architecture for web applications and services.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015

Evaluation of Intrusion Detection Systems in Virtualized Environments Using Attack Injection.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

Adaptive Failure Prediction for Computer Systems: A Framework and a Case Study.
Proceedings of the 16th IEEE International Symposium on High Assurance Systems Engineering, 2015

Assessment of Defect Type influence in Complex and Integrated Space Systems: Analysis Based on ODC and ISVV Issues.
Proceedings of the IEEE International Conference on Dependable Systems and Networks Workshops, 2015

phpSAFE: A Security Analysis Tool for OOP Web Application Plugins.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

Towards Assessing Representativeness of Fault Injection-Generated Failure Data for Online Failure Prediction.
Proceedings of the IEEE International Conference on Dependable Systems and Networks Workshops, 2015

Test-Based Interoperability Certification for Web Services.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

Studying the Propagation of Failures in SOAs.
Proceedings of the IEEE International Conference on Dependable Systems and Networks Workshops, 2015

On the Metrics for Benchmarking Vulnerability Detection Tools.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

No SQL in Practice: A Write-Heavy Enterprise Application.
Proceedings of the 2015 IEEE International Congress on Big Data, New York City, NY, USA, June 27, 2015

Development of Complex Software with Agile Method.
Proceedings of the 2015 Agile Conference, 2015

2014
A Technique for Deploying Robust Web Services.
IEEE Trans. Services Computing, 2014

Evaluation of Web Security Mechanisms Using Vulnerability & Attack Injection.
IEEE Trans. Dependable Sec. Comput., 2014

Analysis of Field Data on Web Security Vulnerabilities.
IEEE Trans. Dependable Sec. Comput., 2014

Approaches and Challenges in Database Intrusion Detection.
SIGMOD Record, 2014

Testing the robustness of controllers for self-adaptive systems.
J. Braz. Comp. Soc., 2014

Penetration Testing for Web Services.
IEEE Computer, 2014

A Practical Experience on the Impact of Plugins in Web Security.
Proceedings of the 33rd IEEE International Symposium on Reliable Distributed Systems, 2014

IEEE International Workshop on Dependable and Secure Services (DSS 2014).
Proceedings of the 2014 IEEE World Congress on Services, 2014

Robustness evaluation of the rainbow framework for self-adaptation.
Proceedings of the Symposium on Applied Computing, 2014

Empirical resilience evaluation of an architecture-based self-adaptive software system.
Proceedings of the QoSA'14, Proceedings of the 10th International ACM SIGSOFT Conference on Quality of Software Architectures (part of CompArch 2014), Marcq-en-Baroeul, Lille, France, June 30, 2014

A Practical Approach for Generating Failure Data for Assessing and Comparing Failure Prediction Algorithms.
Proceedings of the 20th IEEE Pacific Rim International Symposium on Dependable Computing, 2014

Towards Making Safety-Critical Systems Safer: Learning from Mistakes.
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering Workshops, 2014

Experience Report: Orthogonal Classification of Safety Critical Issues.
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering, 2014

A Research Agenda for Benchmarking the Resilience of Software Defined Networks.
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering Workshops, 2014

Experience Report: An Analysis of Hypercall Handler Vulnerabilities.
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering, 2014

ITWS: An Extensible Tool for Interoperability Testing of Web Services.
Proceedings of the 2014 IEEE International Conference on Web Services, 2014

On the Need for Training Failure Prediction Algorithms in Evolving Software Systems.
Proceedings of the 15th International IEEE Symposium on High-Assurance Systems Engineering, 2014

Towards a Resilience Benchmarking Description Language for the Context of Satellite Simulators (Short Paper).
Proceedings of the 2014 Tenth European Dependable Computing Conference, 2014

Understanding Interoperability Issues of Web Service Frameworks.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

A Field Perspective on the Interoperability of Web Services.
Proceedings of the IEEE International Conference on Services Computing, SCC 2014, Anchorage, AK, USA, June 27, 2014

2013
Architecture-based resilience evaluation for self-adaptive systems.
Computing, 2013

HLA Middleware Robustness and Scalability Evaluation in the Context of Satellite Simulators.
Proceedings of the IEEE 19th Pacific Rim International Symposium on Dependable Computing, 2013

The Time Dimension in Predicting Failures: A Case Study.
Proceedings of the Sixth Latin-American Symposium on Dependable Computing, 2013

Assessing the Impact of Virtualization on the Generation of Failure Prediction Data.
Proceedings of the Sixth Latin-American Symposium on Dependable Computing, 2013

Robustness Evaluation of Controllers in Self-Adaptive Software Systems.
Proceedings of the Sixth Latin-American Symposium on Dependable Computing, 2013

Certification of embedded systems: Quantitative analysis and irrefutable evidences.
Proceedings of the IEEE 24th International Symposium on Software Reliability Engineering, 2013

A monitoring and testing framework for critical off-the-shelf applications and services.
Proceedings of the IEEE 24th International Symposium on Software Reliability Engineering, 2013

A view on the past and future of fault injection.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

Towards evaluating the impact of data quality on service applications.
Proceedings of the 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, 2013

SCoRe: An across-the-board metric for computer systems resilience benchmarking.
Proceedings of the 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, 2013

An XML-Based Policy Model for Access Control in Web Applications.
Proceedings of the Database and Expert Systems Applications, 2013

A Specific Encryption Solution for Data Warehouses.
Proceedings of the Database Systems for Advanced Applications, 2013

SOA-Scanner: An Integrated Tool to Detect Vulnerabilities in Service-Based Infrastructures.
Proceedings of the 2013 IEEE International Conference on Services Computing, Santa Clara, CA, USA, June 28, 2013

2012
A robustness testing approach for SOAP Web services.
J. Internet Services and Applications, 2012

Defending against Web Application Vulnerabilities.
IEEE Computer, 2012

Securing Data Warehouses from Web-Based Intrusions.
Proceedings of the Web Information Systems Engineering - WISE 2012, 2012

Incorporating Recovery from Failures into a Data Integration Benchmark.
Proceedings of the Selected Topics in Performance Evaluation and Benchmarking, 2012

Changeloads: A Fundamental Piece on the SASO Systems Benchmarking Puzzle.
Proceedings of the Sixth IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops, 2012

Lessons Learnt in the Implementation of CMMI Maturity Level 5.
Proceedings of the 8th International Conference on the Quality of Information and Communications Technology, 2012

Towards a Framework to Evaluate and Improve the Quality of Implementation of CMMI® Practices.
Proceedings of the Product-Focused Software Process Improvement, 2012

Evaluating and Improving Penetration Testing in Web Services.
Proceedings of the 23rd IEEE International Symposium on Software Reliability Engineering, 2012

Detecting Vulnerabilities in Service Oriented Architectures.
Proceedings of the 23rd IEEE International Symposium on Software Reliability Engineering Workshops, 2012

DBMS Application Layer Intrusion Detection for Data Warehouses.
Proceedings of the Building Sustainable Information Systems, 2012

Applying Data Mining for Detecting Anomalies in Satellites.
Proceedings of the 2012 Ninth European Dependable Computing Conference, 2012

Changeloads for Resilience Benchmarking of Self-Adaptive Systems: A Risk-Based Approach.
Proceedings of the 2012 Ninth European Dependable Computing Conference, 2012

Evaluating the Feasibility Issues of Data Confidentiality Solutions from a Data Warehousing Perspective.
Proceedings of the Data Warehousing and Knowledge Discovery, 2012

Leveraging 24/7 Availability and Performance for Distributed Real-Time Data Warehouses.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference, 2012

Experimental Evaluation of Web Service Frameworks in the Presence of Security Attacks.
Proceedings of the 2012 IEEE Ninth International Conference on Services Computing, 2012

Resilience Benchmarking.
Proceedings of the Resilience Assessment and Evaluation of Computing Systems, 2012

Robustness Testing Techniques and Tools.
Proceedings of the Resilience Assessment and Evaluation of Computing Systems, 2012

Field Studies on Resilience: Measurements and Repositories.
Proceedings of the Resilience Assessment and Evaluation of Computing Systems, 2012

Fault Injection.
Proceedings of the Resilience Assessment and Evaluation of Computing Systems, 2012

2011
Security Gaps in Databases: A Comparison of Alternative Software Products for Web Applications Support.
IJSSE, 2011

Selecting Secure Web Applications Using Trustworthiness Benchmarking.
IJDTIS, 2011

Balancing Security and Performance for Enhancing Data Privacy in Data Warehouses.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Integrating GQM and Data Warehousing for the Definition of Software Reuse Metrics.
Proceedings of the 34th Annual IEEE Software Engineering Workshop, 2011

Implementing Software Effort Estimation in a Medium-sized Company.
Proceedings of the 34th Annual IEEE Software Engineering Workshop, 2011

A Service Discovery Approach for Testing Dynamic SOAs.
Proceedings of the 14th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops, 2011

A data masking technique for data warehouses.
Proceedings of the 15th International Database Engineering and Applications Symposium (IDEAS 2011), September 21, 2011

Benchmarking the resilience of self-adaptive software systems: perspectives and challenges.
Proceedings of the 2011 ICSE Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2011

Application of SOA in Safety-Critical Embedded Systems.
Proceedings of the Convergence and Hybrid Information Technology, 2011

A Testing Service for Lifelong Validation of Dynamic SOA.
Proceedings of the 13th IEEE International Symposium on High-Assurance Systems Engineering, 2011

Towards benchmarking the trustworthiness of web applications code.
Proceedings of the 13th European Workshop on Dependable Computing, 2011

A survey on data security in data warehousing: Issues, challenges and opportunities.
Proceedings of EUROCON 2011, 2011

TO BEnchmark or NOT TO BEnchmark security: That is the question.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W 2011), 2011

24/7 Real-Time Data Warehousing: A Tool for Continuous Actionable Knowledge.
Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011

A Composed Approach for Automatic Classification of Web Services Robustness.
Proceedings of the IEEE International Conference on Services Computing, 2011

Enhancing Penetration Testing with Attack Signatures and Interface Monitoring for the Detection of Injection Vulnerabilities in Web Services.
Proceedings of the IEEE International Conference on Services Computing, 2011

Trustworthiness Benchmarking of Web Applications Using Static Code Analysis.
Proceedings of the Sixth International Conference on Availability, 2011

Selecting Software Packages for Secure Database Installations.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Benchmarking Untrustworthiness: An Alternative to Security Measurement.
IJDTIS, 2010

How to Advance TPC Benchmarks with Dependability Aspects.
Proceedings of the Performance Evaluation, Measurement and Characterization of Complex Systems, 2010

Applying Text Classification Algorithms in Web Services Robustness Testing.
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010

Benchmarking the Resilience of Self-Adaptive Systems: A New Research Challenge.
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010

Benchmarking Software Requirements Documentation for Space Application.
Proceedings of the Computer Safety, 2010

A Learning-Based Approach to Secure Web Services from SQL/XPath Injection Attacks.
Proceedings of the 16th IEEE Pacific Rim International Symposium on Dependable Computing, 2010

Towards Identifying the Best Variables for Failure Prediction Using Injection of Realistic Software Faults.
Proceedings of the 16th IEEE Pacific Rim International Symposium on Dependable Computing, 2010

Errors on Space Software Requirements: A Field Study and Application Scenarios.
Proceedings of the IEEE 21st International Symposium on Software Reliability Engineering, 2010

The Web Attacker Perspective - A Field Study.
Proceedings of the IEEE 21st International Symposium on Software Reliability Engineering, 2010

Comparing SQL Injection Detection Tools Using Attack Injection: An Experimental Study.
Proceedings of the IEEE 21st International Symposium on Software Reliability Engineering, 2010

Benchmarking Vulnerability Detection Tools for Web Services.
Proceedings of the IEEE International Conference on Web Services, 2010

From Performance to Resilience Benchmarking.
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010

Dependability Benchmarking for OLTP Systems - A Mandatory Path.
LAP Lambert Academic Publishing, ISBN: 978-3-8383-0702-2, 2010

2009
From Performance to Dependability Benchmarking: A Mandatory Path.
Proceedings of the Performance Evaluation and Benchmarking, 2009

A Trust-Based Benchmark for DBMS Configurations.
Proceedings of the 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing, 2009

Comparing the Effectiveness of Penetration Testing and Static Code Analysis on the Detection of SQL Injection Vulnerabilities in Web Services.
Proceedings of the 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing, 2009

Appraisals Based on Security Best Practices for Software Configurations.
Proceedings of the Fourth Latin-American Symposium on Dependable Computing, 2009

Benchmarking Untrustworthiness in DBMS Configurations.
Proceedings of the Fourth Latin-American Symposium on Dependable Computing, 2009

Detecting SQL Injection Vulnerabilities in Web Services.
Proceedings of the Fourth Latin-American Symposium on Dependable Computing, 2009

Looking at Web Security Vulnerabilities from the Programming Language Perspective: A Field Study.
Proceedings of the ISSRE 2009, 2009

Improving Web Services Robustness.
Proceedings of the IEEE International Conference on Web Services, 2009

BIRF: Keeping Software Development under Control across the Organization.
Proceedings of the Fourth International Conference on Software Engineering Advances, 2009

Using web security scanners to detect vulnerabilities in web services.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

Student Forum.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

Vulnerability & attack injection for web applications.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

Protecting Database Centric Web Services against SQL/XPath Injection Attacks.
Proceedings of the Database and Expert Systems Applications, 20th International Conference, 2009

Predicting Timing Failures in Web Services.
Proceedings of the Database Systems for Advanced Applications, 2009

Untrustworthiness: A trust-based security metric.
Proceedings of the CRiSIS 2009, 2009

Effective Detection of SQL/XPath Injection Vulnerabilities in Web Services.
Proceedings of the 2009 IEEE International Conference on Services Computing (SCC 2009), 2009

2008
Deploying fault tolerant web service compositions.
Comput. Syst. Sci. Eng., 2008

Online detection of malicious data access using DBMS auditing.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

Assessing and Comparing Security of Web Servers.
Proceedings of the 14th IEEE Pacific Rim International Symposium on Dependable Computing, 2008

Training Security Assurance Teams Using Vulnerability Injection.
Proceedings of the 14th IEEE Pacific Rim International Symposium on Dependable Computing, 2008

An Application for Electroencephalogram Mining for Epileptic Seizure Prediction.
Proceedings of the Advances in Data Mining. Medical Applications, 2008

Robustness Validation in Service-Oriented Architectures.
Proceedings of the Architecting Dependable Systems VI, 2008

Supporting Fraud Analysis in Mobile Telecommunications Using Case-Based Reasoning.
Proceedings of the Advances in Case-Based Reasoning, 9th European Conference, 2008

Towards assessing the security of DBMS configurations.
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008

Mapping software faults with web security vulnerabilities.
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008

Efficient Data Distribution for DWS.
Proceedings of the Data Warehousing and Knowledge Discovery, 10th International Conference, 2008

RAIN: Always on Data Warehousing.
Proceedings of the Database Systems for Advanced Applications, 2008

Redundant Array of Inexpensive Nodes for DWS.
Proceedings of the Database Systems for Advanced Applications, 2008

Combining Energy and Wavelet Transform for Epileptic Seizure Prediction in an Advanced Computational System.
Proceedings of the 2008 International Conference on BioMedical Engineering and Informatics, 2008

Timing Failures Detection in Web Services.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

Experimental Robustness Evaluation of JMS Middleware.
Proceedings of the 2008 IEEE International Conference on Services Computing (SCC 2008), 2008

wsrbench: An On-Line Tool for Robustness Benchmarking.
Proceedings of the 2008 IEEE International Conference on Services Computing (SCC 2008), 2008

2007
Detecting Malicious SQL.
Proceedings of the Trust, 2007

Towards fault tolerance in web services compositions.
Proceedings of the 2007 Workshop on Engineering Fault Tolerant Systems, 2007

Benchmarking the Robustness of Web Services.
Proceedings of the 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2007), 2007

Testing and Comparing Web Vulnerability Scanning Tools for SQL Injection and XSS Attacks.
Proceedings of the 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2007), 2007

Do You Know... How to Analyze and Share Results from Dependability Evaluation Experiments?
Proceedings of the Dependable Computing, Third Latin-American Symposium, 2007

Integrated Intrusion Detection in Databases.
Proceedings of the Dependable Computing, Third Latin-American Symposium, 2007

Comparing Web Services Performance and Recovery in the Presence of Faults.
Proceedings of the 2007 IEEE International Conference on Web Services (ICWS 2007), 2007

Assessing Robustness of Web-Services Infrastructures.
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007

Towards Timely ACID Transactions in DBMS.
Proceedings of the Advances in Databases: Concepts, 2007

2006
Towards Timely ACID Transactions in DBMS.
Proceedings of the 12th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2006), 2006

Monitoring Database Application Behavior for Intrusion Detection.
Proceedings of the 12th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2006), 2006

2005
Detection of Malicious Transactions in DBMS.
Proceedings of the 11th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2005), 2005

A Data Mining Approach to Identify Key Factors in Dependability Experiments.
Proceedings of the Dependable Computing, 2005

Towards a Security Benchmark for Database Management Systems.
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005

2004
Joint evaluation of recovery and performance of a COTS DBMS in the presence of operator faults.
Perform. Eval., 2004

Dependability Benchmarking of Web-Servers.
Proceedings of the Computer Safety, 2004

Portable Faultloads Based on Operator Faults for DBMS Dependability Benchmarking.
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004

2003
A Dependability Benchmark for OLTP Application Environments.
Proceedings of 29th International Conference on Very Large Data Bases, 2003

Emulation of Software Faults: Representativeness and Usefulness.
Proceedings of the Dependable Computing, First Latin-American Symposium, 2003

Plug and Play Fault Injector for Dependability Benchmarking.
Proceedings of the Dependable Computing, First Latin-American Symposium, 2003

Benchmarking the Dependability of Different OLTP Systems.
Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN 2003), 2003

The OLAP and Data Warehousing Approaches for Analysis and Sharing of Results from Dependability Evaluation Experiments.
Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN 2003), 2003

2002
Definition of Faultloads Based on Operator Faults for DMBS Recovery Benchmarking.
Proceedings of the 9th Pacific Rim International Symposium on Dependable Computing (PRDC 2002), 2002

Recovery and Performance Balance of a COTS DBMS in the Presence of Operator Faults.
Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), 2002

2001
ESFFI - A Novel Technique for the Emulation of Coftware Faults in COTS Components.
Proceedings of the 8th IEEE International Conference on Engineering of Computer-Based Systems (ECBS 2001), 2001

2000
On the Emulation of Software Faults by Software Fault Injection.
Proceedings of the 2000 International Conference on Dependable Systems and Networks (DSN 2000) (formerly FTCS-30 and DCCA-8), 2000


  Loading...