Marco Vieira

Affiliations:
  • University of Coimbra, Portugal


According to our database1, Marco Vieira authored at least 257 papers between 2000 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Security Evaluation of Authentication Requirements in IoT Gateways.
J. Netw. Syst. Manag., October, 2023

Trustworthiness models to categorize and prioritize code for security improvement.
J. Syst. Softw., April, 2023

Online Failure Prediction for Complex Systems: Methodology and Case Studies.
IEEE Trans. Dependable Secur. Comput., 2023

Detecting Anomalies Through Sequential Performance Analysis in Virtualized Environments.
IEEE Access, 2023

Are safety-critical systems really survivable to attacks?
Proceedings of the IEEE International Systems Conference, 2023

Middleware for Digital Twins: A Systematic Mapping Study.
Proceedings of the 1st International Workshop on Middleware for Digital Twin, 2023

Advanced Machine Learning for Runtime Data Generation.
Proceedings of the 12th Latin-American Symposium on Dependable and Secure Computing, 2023

Generating Realistic Attack Data for Microservices: Framework and Case Study.
Proceedings of the 12th Latin-American Symposium on Dependable and Secure Computing, 2023

Leveraging Time Series Autocorrelation Through Numerical Differentiation for Improving Failure Prediction.
Proceedings of the 12th Latin-American Symposium on Dependable and Secure Computing, 2023

Intrusion Detection and Tolerance for Microservice Applications.
Proceedings of the 12th Latin-American Symposium on Dependable and Secure Computing, 2023

Evaluation of Machine Learning for Intrusion Detection in Microservice Applications.
Proceedings of the 12th Latin-American Symposium on Dependable and Secure Computing, 2023

An Approach to Characterize the Security of Open-Source Functions using LSP.
Proceedings of the 34th IEEE International Symposium on Software Reliability Engineering, 2023

Online Failure Prediction Through Fault Injection and Machine Learning: Methodology and Case Study.
Proceedings of the 34th IEEE International Symposium on Software Reliability Engineering, 2023

Exploring Logic Scoring of Preference for DoS Attack Detection in Microservice Applications.
Proceedings of the IEEE International Conference on Web Services, 2023

Intrusion Injection for Virtualized Systems: Concepts and Approach.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

Techniques and Tools for Runtime Security Monitoring and Analysis of Microservices.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2023

2022
A Multi-Criteria Analysis of Benchmark Results With Expert Support for Security Tools.
IEEE Trans. Dependable Secur. Comput., 2022

Guidelines for Artifacts to Support Industry-Relevant Research on Self-Adaptation.
ACM SIGSOFT Softw. Eng. Notes, 2022

Model-Based Performability and Dependability Evaluation of a System with VM Migration as Rejuvenation in the Presence of Bursty Workloads.
J. Netw. Syst. Manag., 2022

A Software Vulnerability Dataset of Large Open Source C/C++ Projects.
Proceedings of the 27th IEEE Pacific Rim International Symposium on Dependable Computing, 2022

On the use of the TMA Framework to promote self-adaptation capabilities in TalkConnect.
Proceedings of the 11th Latin-American Symposium on Dependable Computing, 2022

On the Use of Deep Graph CNN to Detect Vulnerable C Functions.
Proceedings of the 11th Latin-American Symposium on Dependable Computing, 2022

Compliance Evaluation of Cryptographic Security Requirements on IoT Gateways.
Proceedings of the 11th Latin-American Symposium on Dependable Computing, 2022

Detecting DoS Attacks in Microservice Applications: Approach and Case Study.
Proceedings of the 11th Latin-American Symposium on Dependable Computing, 2022

Software Rejuvenation Meets Moving Target Defense: Modeling of Time-Based Virtual Machine Migration Approach.
Proceedings of the IEEE 33rd International Symposium on Software Reliability Engineering, 2022

On the Applicability of Machine Learning-based Online Failure Prediction for Modern Complex Systems.
Proceedings of the 18th European Dependable Computing Conference, 2022

A Dataset of Linux Failure Data for Dependability Evaluation and Improvement.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

2021
Data Processing on Edge and Cloud: A Performability Evaluation and Sensitivity Analysis.
J. Netw. Syst. Manag., 2021

Security Requirements and Solutions for IoT Gateways: A Comprehensive Study.
IEEE Internet Things J., 2021

Characterizing Buffer Overflow Vulnerabilities in Large C/C++ Projects.
IEEE Access, 2021

Analysis of VM migration scheduling as moving target defense against insider attacks.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

On Building a Vulnerability Dataset with Static Information from the Source Code.
Proceedings of the 10th Latin-American Symposium on Dependable Computing, 2021

PyMTDEvaluator: A Tool for Time-Based Moving Target Defense Evaluation: Tool description paper.
Proceedings of the 32nd IEEE International Symposium on Software Reliability Engineering, 2021

VM Migration Scheduling as Moving Target Defense against Memory DoS Attacks: An Empirical Study.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

Machine Learning to Combine Static Analysis Alerts with Software Metrics to Detect Security Vulnerabilities: An Empirical Study.
Proceedings of the 17th European Dependable Computing Conference, 2021

An Empirical Study On Software Metrics and Machine Learning to Identify Untrustworthy Code.
Proceedings of the 17th European Dependable Computing Conference, 2021

2020
Availability and reliability modeling of VM migration as rejuvenation on a system under varying workload.
Softw. Qual. J., 2020

An approach for benchmarking the security of web service frameworks.
Future Gener. Comput. Syst., 2020

Moving target defense in cloud computing: A systematic mapping study.
Comput. Secur., 2020

Vulnerable Code Detection Using Software Metrics and Machine Learning.
IEEE Access, 2020

On Configuring a Testbed for Dependability Experiments: Guidelines and Fault Injection Case Study.
Proceedings of the Computer Safety, Reliability, and Security, 2020

Security and Availability Modeling of VM Migration as Moving Target Defense.
Proceedings of the 25th IEEE Pacific Rim International Symposium on Dependable Computing, 2020

A Model-Based Approach to Anomaly Detection Trading Detection Time and False Alarm Rate.
Proceedings of the Mediterranean Communication and Computer Networking Conference, 2020

A platform to enable self-adaptive cloud applications using trustworthiness properties.
Proceedings of the SEAMS '20: IEEE/ACM 15th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, Seoul, Republic of Korea, 29 June, 2020

An Availability Model for DSS and OLTP Applications in Virtualized Environments.
Proceedings of the 16th European Dependable Computing Conference, 2020

On the Use of Open-Source C/C++ Static Analysis Tools in Large Projects.
Proceedings of the 16th European Dependable Computing Conference, 2020

2019
Understanding How to Use Static Analysis Tools for Detecting Cryptography Misuse in Software.
IEEE Trans. Reliab., 2019

BIGSEA: A Big Data analytics platform for public transportation information.
Future Gener. Comput. Syst., 2019

Towards Models for Availability and Security Evaluation of Cloud Computing with Moving Target Defense.
CoRR, 2019

An empirical study on combining diverse static analysis tools for web security vulnerabilities based on development scenarios.
Computing, 2019

A Model for Availability and Security Risk Evaluation for Systems With VMM Rejuvenation Enabled by VM Migration Scheduling.
IEEE Access, 2019

An Integrated Big and Fast Data Analytics Platform for Smart Urban Transportation Management.
IEEE Access, 2019

Improving Failure Prediction by Ensembling the Decisions of Machine Learning Models: A Case Study.
IEEE Access, 2019

IaaS Cloud Availability Planning using Models and Genetic Algorithms.
Proceedings of the 9th Latin-American Symposium on Dependable Computing, 2019

An Exploratory Study on Machine Learning to Combine Security Vulnerability Alerts from Static Analysis Tools.
Proceedings of the 9th Latin-American Symposium on Dependable Computing, 2019

Trustworthiness Assessment of Web Applications: Approach and Experimental Study using Input Validation Coding Practices.
Proceedings of the 30th IEEE International Symposium on Software Reliability Engineering, 2019

Propheticus: Machine Learning Framework for the Development of Predictive Models for Reliable and Secure Software.
Proceedings of the 30th IEEE International Symposium on Software Reliability Engineering, 2019

An Experimental Study of Software Aging and Rejuvenation in Dockerd.
Proceedings of the 15th European Dependable Computing Conference, 2019

A Hierarchical Model for Virtualized Data Center Availability Evaluation.
Proceedings of the 15th European Dependable Computing Conference, 2019

2018
Benchmarking Static Analysis Tools for Web Security.
IEEE Trans. Reliab., 2018

Toward characterizing HTML defects on the Web.
Softw. Pract. Exp., 2018

Introduction to the special issue on software reliability engineering.
J. Syst. Softw., 2018

Fog orchestration for the Internet of Everything: state-of-the-art and research challenges.
J. Internet Serv. Appl., 2018

A Europe-Brazil Context for Secure Data Analytics in the Cloud.
IEEE Secur. Priv., 2018

Propheticus: Generalizable Machine Learning Framework.
CoRR, 2018

An Approach for Trustworthiness Benchmarking Using Software Metrics.
Proceedings of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing, 2018

Evaluating the Applicability of Robustness Testing in Virtualized Environments.
Proceedings of the 8th Latin-American Symposium on Dependable Computing, 2018

Interacting SRN Models for Availability Evaluation of VM Migration as Rejuvenation on a System under Varying Workload.
Proceedings of the 2018 IEEE International Symposium on Software Reliability Engineering Workshops, 2018


Exploratory Study of Machine Learning Techniques for Supporting Failure Prediction.
Proceedings of the 14th European Dependable Computing Conference, 2018

Finding SQL Injection and Cross Site Scripting Vulnerabilities with Diverse Static Analysis Tools.
Proceedings of the 14th European Dependable Computing Conference, 2018

2017
Editorial: Security and Dependability of Cloud Systems and Services - Part II.
IEEE Trans. Serv. Comput., 2017

Editorial: Security and Dependability of Cloud Systems and Services.
IEEE Trans. Serv. Comput., 2017

Robustness-Driven Resilience Evaluation of Self-Adaptive Software Systems.
IEEE Trans. Dependable Secur. Comput., 2017

A field study on root cause analysis of defects in space software.
Reliab. Eng. Syst. Saf., 2017

Service-Oriented Architectures for a Flexible and Safe Use of Unmanned Aerial Vehicles.
IEEE Intell. Transp. Syst. Mag., 2017

Designing vulnerability testing tools for web services: approach, components, and tools.
Int. J. Inf. Sec., 2017

Diversity with intrusion detection systems: An empirical study.
Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, 2017

Software Metrics as Indicators of Security Vulnerabilities.
Proceedings of the 28th IEEE International Symposium on Software Reliability Engineering, 2017

Practical Evaluation of Static Analysis Tools for Cryptography: Benchmarking Method and Case Study.
Proceedings of the 28th IEEE International Symposium on Software Reliability Engineering, 2017

INTENSE: INteroperability TEstiNg as a SErvice.
Proceedings of the 2017 IEEE International Conference on Web Services, 2017

Evaluating a Corpus of Root Causes and Measures to Guide RCA Processes in Critical Software.
Proceedings of the 18th IEEE International Symposium on High Assurance Systems Engineering, 2017

Towards an Approach for Trustworthiness Assessment of Software as a Service.
Proceedings of the IEEE International Conference on Edge Computing, 2017

On Combining Diverse Static Analysis Tools for Web Security: An Empirical Study.
Proceedings of the 13th European Dependable Computing Conference, 2017

An Analysis of OpenStack Vulnerabilities.
Proceedings of the 13th European Dependable Computing Conference, 2017

PRIVAaaS: privacy approach for a distributed cloud-based data analytics platforms.
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, 2017

2016
The Perils of Android Security Configuration.
Computer, 2016

The 2016 IEEE Services Emerging Technology Track on Dependable and Secure Services (DSS 2016).
Proceedings of the IEEE World Congress on Services, 2016

Adapting the Orthogonal Defect Classification Taxonomy to the Space Domain.
Proceedings of the Computer Safety, Reliability, and Security, 2016

Software for embedded systems: a quality assessment based on improved ODC taxonomy.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Risk Assessment of User-Defined Security Configurations for Android Devices.
Proceedings of the 27th IEEE International Symposium on Software Reliability Engineering, 2016

Quantifying the Attack Detection Accuracy of Intrusion Detection Systems in Virtualized Environments.
Proceedings of the 27th IEEE International Symposium on Software Reliability Engineering, 2016

XSX: Lightweight Encryption for Data Warehousing Environments.
Proceedings of the Big Data Analytics and Knowledge Discovery, 2016

2015
Assessing and Comparing Vulnerability Detection Tools for Web Services: Benchmarking Approach and Examples.
IEEE Trans. Serv. Comput., 2015

A Practical Approach Towards Automatic Testing of Web Services Interoperability.
Int. J. Web Serv. Res., 2015

A benchmarking process to assess software requirements documentation for space applications.
J. Syst. Softw., 2015

Assessing the security of web service frameworks against Denial of Service attacks.
J. Syst. Softw., 2015

Choosing the right NoSQL database for the job: a quality attribute evaluation.
J. Big Data, 2015

Evaluating Computer Intrusion Detection Systems: A Survey of Common Practices.
ACM Comput. Surv., 2015

NoSQL Databases: A Software Engineering Perspective.
Proceedings of the New Contributions in Information Systems and Technologies, 2015

IEEE Services Visionary Track on Dependable and Secure Services (DSS 2015).
Proceedings of the 2015 IEEE World Congress on Services, 2015

A security configuration assessment for android devices.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015

Characterizing the performance of web service frameworks under security attacks.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015

Requirements, design and evaluation of a privacy reference architecture for web applications and services.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015

Evaluation of Intrusion Detection Systems in Virtualized Environments Using Attack Injection.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

Adaptive Failure Prediction for Computer Systems: A Framework and a Case Study.
Proceedings of the 16th IEEE International Symposium on High Assurance Systems Engineering, 2015

Assessment of Defect Type influence in Complex and Integrated Space Systems: Analysis Based on ODC and ISVV Issues.
Proceedings of the IEEE International Conference on Dependable Systems and Networks Workshops, 2015

phpSAFE: A Security Analysis Tool for OOP Web Application Plugins.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

Towards Assessing Representativeness of Fault Injection-Generated Failure Data for Online Failure Prediction.
Proceedings of the IEEE International Conference on Dependable Systems and Networks Workshops, 2015

Test-Based Interoperability Certification for Web Services.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

Studying the Propagation of Failures in SOAs.
Proceedings of the IEEE International Conference on Dependable Systems and Networks Workshops, 2015

On the Metrics for Benchmarking Vulnerability Detection Tools.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

No SQL in Practice: A Write-Heavy Enterprise Application.
Proceedings of the 2015 IEEE International Congress on Big Data, New York City, NY, USA, June 27, 2015

Development of Complex Software with Agile Method.
Proceedings of the 2015 Agile Conference, 2015

2014
A Technique for Deploying Robust Web Services.
IEEE Trans. Serv. Comput., 2014

Evaluation of Web Security Mechanisms Using Vulnerability & Attack Injection.
IEEE Trans. Dependable Secur. Comput., 2014

Analysis of Field Data on Web Security Vulnerabilities.
IEEE Trans. Dependable Secur. Comput., 2014

Approaches and Challenges in Database Intrusion Detection.
SIGMOD Rec., 2014

Testing the robustness of controllers for self-adaptive systems.
J. Braz. Comput. Soc., 2014

Technical Information on Vulnerabilities of Hypercall Handlers.
CoRR, 2014

On Benchmarking Intrusion Detection Systems in Virtualized Environments.
CoRR, 2014

Penetration Testing for Web Services.
Computer, 2014

A Practical Experience on the Impact of Plugins in Web Security.
Proceedings of the 33rd IEEE International Symposium on Reliable Distributed Systems, 2014

IEEE International Workshop on Dependable and Secure Services (DSS 2014).
Proceedings of the 2014 IEEE World Congress on Services, 2014

Robustness evaluation of the rainbow framework for self-adaptation.
Proceedings of the Symposium on Applied Computing, 2014

Empirical resilience evaluation of an architecture-based self-adaptive software system.
Proceedings of the QoSA'14, Proceedings of the 10th International ACM SIGSOFT Conference on Quality of Software Architectures (part of CompArch 2014), Marcq-en-Baroeul, Lille, France, June 30, 2014

A Practical Approach for Generating Failure Data for Assessing and Comparing Failure Prediction Algorithms.
Proceedings of the 20th IEEE Pacific Rim International Symposium on Dependable Computing, 2014

Towards Making Safety-Critical Systems Safer: Learning from Mistakes.
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering Workshops, 2014

Experience Report: Orthogonal Classification of Safety Critical Issues.
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering, 2014

A Research Agenda for Benchmarking the Resilience of Software Defined Networks.
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering Workshops, 2014

Experience Report: An Analysis of Hypercall Handler Vulnerabilities.
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering, 2014

ITWS: An Extensible Tool for Interoperability Testing of Web Services.
Proceedings of the 2014 IEEE International Conference on Web Services, 2014

On the Need for Training Failure Prediction Algorithms in Evolving Software Systems.
Proceedings of the 15th International IEEE Symposium on High-Assurance Systems Engineering, 2014

Towards a Resilience Benchmarking Description Language for the Context of Satellite Simulators (Short Paper).
Proceedings of the 2014 Tenth European Dependable Computing Conference, 2014

Understanding Interoperability Issues of Web Service Frameworks.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

A Field Perspective on the Interoperability of Web Services.
Proceedings of the IEEE International Conference on Services Computing, SCC 2014, Anchorage, AK, USA, June 27, 2014

2013
Architecture-based resilience evaluation for self-adaptive systems.
Computing, 2013

HLA Middleware Robustness and Scalability Evaluation in the Context of Satellite Simulators.
Proceedings of the IEEE 19th Pacific Rim International Symposium on Dependable Computing, 2013

The Time Dimension in Predicting Failures: A Case Study.
Proceedings of the Sixth Latin-American Symposium on Dependable Computing, 2013

Assessing the Impact of Virtualization on the Generation of Failure Prediction Data.
Proceedings of the Sixth Latin-American Symposium on Dependable Computing, 2013

Robustness Evaluation of Controllers in Self-Adaptive Software Systems.
Proceedings of the Sixth Latin-American Symposium on Dependable Computing, 2013

Certification of embedded systems: Quantitative analysis and irrefutable evidences.
Proceedings of the IEEE 24th International Symposium on Software Reliability Engineering, 2013

A monitoring and testing framework for critical off-the-shelf applications and services.
Proceedings of the IEEE 24th International Symposium on Software Reliability Engineering, 2013

A view on the past and future of fault injection.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

Towards evaluating the impact of data quality on service applications.
Proceedings of the 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, 2013

SCoRe: An across-the-board metric for computer systems resilience benchmarking.
Proceedings of the 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, 2013

An XML-Based Policy Model for Access Control in Web Applications.
Proceedings of the Database and Expert Systems Applications, 2013

A Specific Encryption Solution for Data Warehouses.
Proceedings of the Database Systems for Advanced Applications, 2013

SOA-Scanner: An Integrated Tool to Detect Vulnerabilities in Service-Based Infrastructures.
Proceedings of the 2013 IEEE International Conference on Services Computing, Santa Clara, CA, USA, June 28, 2013

2012
A robustness testing approach for SOAP Web services.
J. Internet Serv. Appl., 2012

EDCC 2012 - Fast Abstracts & Student Forum Proceedings
CoRR, 2012

Defending against Web Application Vulnerabilities.
Computer, 2012

Securing Data Warehouses from Web-Based Intrusions.
Proceedings of the Web Information Systems Engineering - WISE 2012, 2012

Incorporating Recovery from Failures into a Data Integration Benchmark.
Proceedings of the Selected Topics in Performance Evaluation and Benchmarking, 2012

Changeloads: A Fundamental Piece on the SASO Systems Benchmarking Puzzle.
Proceedings of the Sixth IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops, 2012

Lessons Learnt in the Implementation of CMMI Maturity Level 5.
Proceedings of the 8th International Conference on the Quality of Information and Communications Technology, 2012

Towards a Framework to Evaluate and Improve the Quality of Implementation of CMMI® Practices.
Proceedings of the Product-Focused Software Process Improvement, 2012

Evaluating and Improving Penetration Testing in Web Services.
Proceedings of the 23rd IEEE International Symposium on Software Reliability Engineering, 2012

Detecting Vulnerabilities in Service Oriented Architectures.
Proceedings of the 23rd IEEE International Symposium on Software Reliability Engineering Workshops, 2012

DBMS Application Layer Intrusion Detection for Data Warehouses.
Proceedings of the Building Sustainable Information Systems, 2012

Applying Data Mining for Detecting Anomalies in Satellites.
Proceedings of the 2012 Ninth European Dependable Computing Conference, 2012

Changeloads for Resilience Benchmarking of Self-Adaptive Systems: A Risk-Based Approach.
Proceedings of the 2012 Ninth European Dependable Computing Conference, 2012

Evaluating the Feasibility Issues of Data Confidentiality Solutions from a Data Warehousing Perspective.
Proceedings of the Data Warehousing and Knowledge Discovery, 2012

Leveraging 24/7 Availability and Performance for Distributed Real-Time Data Warehouses.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference, 2012

Experimental Evaluation of Web Service Frameworks in the Presence of Security Attacks.
Proceedings of the 2012 IEEE Ninth International Conference on Services Computing, 2012

Resilience Benchmarking.
Proceedings of the Resilience Assessment and Evaluation of Computing Systems, 2012

Robustness Testing Techniques and Tools.
Proceedings of the Resilience Assessment and Evaluation of Computing Systems, 2012

Field Studies on Resilience: Measurements and Repositories.
Proceedings of the Resilience Assessment and Evaluation of Computing Systems, 2012

Fault Injection.
Proceedings of the Resilience Assessment and Evaluation of Computing Systems, 2012

2011
Security Gaps in Databases: A Comparison of Alternative Software Products for Web Applications Support.
Int. J. Secur. Softw. Eng., 2011

Selecting Secure Web Applications Using Trustworthiness Benchmarking.
Int. J. Dependable Trust. Inf. Syst., 2011

Balancing Security and Performance for Enhancing Data Privacy in Data Warehouses.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Integrating GQM and Data Warehousing for the Definition of Software Reuse Metrics.
Proceedings of the 34th Annual IEEE Software Engineering Workshop, 2011

Implementing Software Effort Estimation in a Medium-sized Company.
Proceedings of the 34th Annual IEEE Software Engineering Workshop, 2011

A Service Discovery Approach for Testing Dynamic SOAs.
Proceedings of the 14th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops, 2011

A data masking technique for data warehouses.
Proceedings of the 15th International Database Engineering and Applications Symposium (IDEAS 2011), September 21, 2011

Benchmarking the resilience of self-adaptive software systems: perspectives and challenges.
Proceedings of the 2011 ICSE Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2011

Application of SOA in Safety-Critical Embedded Systems.
Proceedings of the Convergence and Hybrid Information Technology, 2011

A Testing Service for Lifelong Validation of Dynamic SOA.
Proceedings of the 13th IEEE International Symposium on High-Assurance Systems Engineering, 2011

Towards benchmarking the trustworthiness of web applications code.
Proceedings of the 13th European Workshop on Dependable Computing, 2011

A survey on data security in data warehousing: Issues, challenges and opportunities.
Proceedings of EUROCON 2011, 2011

TO BEnchmark or NOT TO BEnchmark security: That is the question.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W 2011), 2011

24/7 Real-Time Data Warehousing: A Tool for Continuous Actionable Knowledge.
Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011

A Composed Approach for Automatic Classification of Web Services Robustness.
Proceedings of the IEEE International Conference on Services Computing, 2011

Enhancing Penetration Testing with Attack Signatures and Interface Monitoring for the Detection of Injection Vulnerabilities in Web Services.
Proceedings of the IEEE International Conference on Services Computing, 2011

Trustworthiness Benchmarking of Web Applications Using Static Code Analysis.
Proceedings of the Sixth International Conference on Availability, 2011

Selecting Software Packages for Secure Database Installations.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Benchmarking Untrustworthiness: An Alternative to Security Measurement.
Int. J. Dependable Trust. Inf. Syst., 2010

How to Advance TPC Benchmarks with Dependability Aspects.
Proceedings of the Performance Evaluation, Measurement and Characterization of Complex Systems, 2010

Applying Text Classification Algorithms in Web Services Robustness Testing.
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010

Benchmarking the Resilience of Self-Adaptive Systems: A New Research Challenge.
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010

Benchmarking Software Requirements Documentation for Space Application.
Proceedings of the Computer Safety, 2010

A Learning-Based Approach to Secure Web Services from SQL/XPath Injection Attacks.
Proceedings of the 16th IEEE Pacific Rim International Symposium on Dependable Computing, 2010

Towards Identifying the Best Variables for Failure Prediction Using Injection of Realistic Software Faults.
Proceedings of the 16th IEEE Pacific Rim International Symposium on Dependable Computing, 2010

Errors on Space Software Requirements: A Field Study and Application Scenarios.
Proceedings of the IEEE 21st International Symposium on Software Reliability Engineering, 2010

The Web Attacker Perspective - A Field Study.
Proceedings of the IEEE 21st International Symposium on Software Reliability Engineering, 2010

Comparing SQL Injection Detection Tools Using Attack Injection: An Experimental Study.
Proceedings of the IEEE 21st International Symposium on Software Reliability Engineering, 2010

Benchmarking Vulnerability Detection Tools for Web Services.
Proceedings of the IEEE International Conference on Web Services, 2010

From Performance to Resilience Benchmarking.
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010

Dependability Benchmarking for OLTP Systems - A Mandatory Path.
LAP Lambert Academic Publishing, ISBN: 978-3-8383-0702-2, 2010

2009
From Performance to Dependability Benchmarking: A Mandatory Path.
Proceedings of the Performance Evaluation and Benchmarking, 2009

A Trust-Based Benchmark for DBMS Configurations.
Proceedings of the 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing, 2009

Comparing the Effectiveness of Penetration Testing and Static Code Analysis on the Detection of SQL Injection Vulnerabilities in Web Services.
Proceedings of the 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing, 2009

Appraisals Based on Security Best Practices for Software Configurations.
Proceedings of the Fourth Latin-American Symposium on Dependable Computing, 2009

Benchmarking Untrustworthiness in DBMS Configurations.
Proceedings of the Fourth Latin-American Symposium on Dependable Computing, 2009

Detecting SQL Injection Vulnerabilities in Web Services.
Proceedings of the Fourth Latin-American Symposium on Dependable Computing, 2009

Looking at Web Security Vulnerabilities from the Programming Language Perspective: A Field Study.
Proceedings of the ISSRE 2009, 2009

Improving Web Services Robustness.
Proceedings of the IEEE International Conference on Web Services, 2009

BIRF: Keeping Software Development under Control across the Organization.
Proceedings of the Fourth International Conference on Software Engineering Advances, 2009

Using web security scanners to detect vulnerabilities in web services.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

Student Forum.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

Vulnerability & attack injection for web applications.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

Protecting Database Centric Web Services against SQL/XPath Injection Attacks.
Proceedings of the Database and Expert Systems Applications, 20th International Conference, 2009

Predicting Timing Failures in Web Services.
Proceedings of the Database Systems for Advanced Applications, 2009

Untrustworthiness: A trust-based security metric.
Proceedings of the CRiSIS 2009, 2009

Effective Detection of SQL/XPath Injection Vulnerabilities in Web Services.
Proceedings of the 2009 IEEE International Conference on Services Computing (SCC 2009), 2009

2008
Deploying fault tolerant web service compositions.
Comput. Syst. Sci. Eng., 2008

Online detection of malicious data access using DBMS auditing.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

Assessing and Comparing Security of Web Servers.
Proceedings of the 14th IEEE Pacific Rim International Symposium on Dependable Computing, 2008

Training Security Assurance Teams Using Vulnerability Injection.
Proceedings of the 14th IEEE Pacific Rim International Symposium on Dependable Computing, 2008

An Application for Electroencephalogram Mining for Epileptic Seizure Prediction.
Proceedings of the Advances in Data Mining. Medical Applications, 2008

Robustness Validation in Service-Oriented Architectures.
Proceedings of the Architecting Dependable Systems VI, 2008

Supporting Fraud Analysis in Mobile Telecommunications Using Case-Based Reasoning.
Proceedings of the Advances in Case-Based Reasoning, 9th European Conference, 2008

Towards assessing the security of DBMS configurations.
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008

Mapping software faults with web security vulnerabilities.
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008

Efficient Data Distribution for DWS.
Proceedings of the Data Warehousing and Knowledge Discovery, 10th International Conference, 2008

RAIN: Always on Data Warehousing.
Proceedings of the Database Systems for Advanced Applications, 2008

Redundant Array of Inexpensive Nodes for DWS.
Proceedings of the Database Systems for Advanced Applications, 2008

Combining Energy and Wavelet Transform for Epileptic Seizure Prediction in an Advanced Computational System.
Proceedings of the 2008 International Conference on BioMedical Engineering and Informatics, 2008

Timing Failures Detection in Web Services.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

Experimental Robustness Evaluation of JMS Middleware.
Proceedings of the 2008 IEEE International Conference on Services Computing (SCC 2008), 2008

wsrbench: An On-Line Tool for Robustness Benchmarking.
Proceedings of the 2008 IEEE International Conference on Services Computing (SCC 2008), 2008

2007
Detecting Malicious SQL.
Proceedings of the Trust, 2007

Towards fault tolerance in web services compositions.
Proceedings of the 2007 Workshop on Engineering Fault Tolerant Systems, 2007

Benchmarking the Robustness of Web Services.
Proceedings of the 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2007), 2007

Testing and Comparing Web Vulnerability Scanning Tools for SQL Injection and XSS Attacks.
Proceedings of the 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2007), 2007

Do You Know... How to Analyze and Share Results from Dependability Evaluation Experiments?
Proceedings of the Dependable Computing, Third Latin-American Symposium, 2007

Integrated Intrusion Detection in Databases.
Proceedings of the Dependable Computing, Third Latin-American Symposium, 2007

Comparing Web Services Performance and Recovery in the Presence of Faults.
Proceedings of the 2007 IEEE International Conference on Web Services (ICWS 2007), 2007

Assessing Robustness of Web-Services Infrastructures.
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007

Towards Timely ACID Transactions in DBMS.
Proceedings of the Advances in Databases: Concepts, 2007

2006
Monitoring Database Application Behavior for Intrusion Detection.
Proceedings of the 12th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2006), 2006

2005
Detection of Malicious Transactions in DBMS.
Proceedings of the 11th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2005), 2005

A Data Mining Approach to Identify Key Factors in Dependability Experiments.
Proceedings of the Dependable Computing, 2005

Towards a Security Benchmark for Database Management Systems.
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005

2004
Joint evaluation of recovery and performance of a COTS DBMS in the presence of operator faults.
Perform. Evaluation, 2004

Dependability Benchmarking of Web-Servers.
Proceedings of the Computer Safety, 2004

Portable Faultloads Based on Operator Faults for DBMS Dependability Benchmarking.
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004

2003
A Dependability Benchmark for OLTP Application Environments.
Proceedings of 29th International Conference on Very Large Data Bases, 2003

Emulation of Software Faults: Representativeness and Usefulness.
Proceedings of the Dependable Computing, First Latin-American Symposium, 2003

Plug and Play Fault Injector for Dependability Benchmarking.
Proceedings of the Dependable Computing, First Latin-American Symposium, 2003

Benchmarking the Dependability of Different OLTP Systems.
Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN 2003), 2003

The OLAP and Data Warehousing Approaches for Analysis and Sharing of Results from Dependability Evaluation Experiments.
Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN 2003), 2003

2002
Definition of Faultloads Based on Operator Faults for DMBS Recovery Benchmarking.
Proceedings of the 9th Pacific Rim International Symposium on Dependable Computing (PRDC 2002), 2002

Recovery and Performance Balance of a COTS DBMS in the Presence of Operator Faults.
Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), 2002

2001
ESFFI - A Novel Technique for the Emulation of Coftware Faults in COTS Components.
Proceedings of the 8th IEEE International Conference on Engineering of Computer-Based Systems (ECBS 2001), 2001

2000
On the Emulation of Software Faults by Software Fault Injection.
Proceedings of the 2000 International Conference on Dependable Systems and Networks (DSN 2000) (formerly FTCS-30 and DCCA-8), 2000


  Loading...