Mário M. Freire

Orcid: 0000-0002-9017-5001

According to our database1, Mário M. Freire authored at least 107 papers between 1997 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Distributed Virtual-Machine Placement and Migration Approach Based on Modern Portfolio Theory.
J. Netw. Syst. Manag., March, 2024

An Approach to Attack Modeling for the IoT: Creating Attack Trees from System Descriptions.
Proceedings of the Advanced Information Networking and Applications, 2024

2023
Secure cloud-based mobile apps: attack taxonomy, requirements, mechanisms, tests and automation.
Int. J. Inf. Sec., 2023

2022
Improving software maintenance with improved bug triaging.
J. King Saud Univ. Comput. Inf. Sci., 2022

Detection and Mitigation of Low-Rate Denial-of-Service Attacks: A Survey.
IEEE Access, 2022

A Complete Review on the Application of Statistical Methods for Evaluating Internet Traffic Usage.
IEEE Access, 2022

Impact of Self C Parameter on SVM-based Classification of Encrypted Multimedia Peer-to-Peer Traffic.
Proceedings of the Advanced Information Networking and Applications, 2022

2021
Behaviour-based Malware Detection in Mobile AndroidPlatforms Using Machine Learning Algorithms.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021

A decentralized blockchain oriented framework for automated bug assignment.
Inf. Softw. Technol., 2021

Attack and System Modeling Applied to IoT, Cloud, and Mobile Ecosystems: Embedding Security by Design.
ACM Comput. Surv., 2021

Performance evaluation of the SRE and SBPG components of the IoT hardware platform security advisor framework.
Comput. Networks, 2021

Detection of reduction-of-quality DDoS attacks using Fuzzy Logic and machine learning algorithms.
Comput. Networks, 2021

Performance Evaluation of Container-Level Anomaly-Based Intrusion Detection Systems for Multi-Tenant Applications Using Machine Learning Algorithms.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
IoT-HarPSecA: A Framework and Roadmap for Secure Design and Development of Devices and Applications in the IoT Space.
IEEE Access, 2020

A Preliminary Evaluation of the SRE and SBPG Components of the IoT-HarPSecA Framework.
Proceedings of the 2020 Global Internet of Things Summit, 2020

Classification of Encrypted Internet Traffic Using Kullback-Leibler Divergence and Euclidean Distance.
Proceedings of the Advanced Information Networking and Applications, 2020

2019
IoT-HarPSecA: A Framework for Facilitating the Design and Development of Secure IoT Devices.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Challenges of securing Internet of Things devices: A survey.
Secur. Priv., 2018

Approaches for optimizing virtual machine placement and migration in cloud environments: A survey.
J. Parallel Distributed Comput., 2018

Security Threats and Possible Countermeasures in IoT Applications Covering Different Industry Domains.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
A User Trust System for Online Games - Part II: A Subjective Logic Approach for Trust Inference.
IEEE Trans. Comput. Intell. AI Games, 2017

A User Trust System for Online Games - Part I: An Activity Theory Approach for Trust Representation.
IEEE Trans. Comput. Intell. AI Games, 2017

Applications of artificial immune systems to computer security: A survey.
J. Inf. Secur. Appl., 2017

CloudSim Plus: A cloud computing simulation framework pursuing software engineering principles for improved modularity, extensibility and correctness.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017

2015
Assessment of the Susceptibility to Data Manipulation of Android Games with In-app Purchases.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

2014
Classification of Breast Masses on Contrast-Enhanced Magnetic Resonance Images Through Log Detrended Fluctuation Cumulant-Based Multifractal Analysis.
IEEE Syst. J., 2014

Security issues in cloud environments: a survey.
Int. J. Inf. Sec., 2014

A tool for estimating the hurst parameter and for generating self-similar sequences.
Proceedings of the 2014 Summer Simulation Multiconference, 2014

2013
Identification of Peer-to-Peer VoIP Sessions Using Entropy and Codec Properties.
IEEE Trans. Parallel Distributed Syst., 2013

3D Lacunarity in Multifractal Analysis of Breast Tumor Lesions in Dynamic Contrast-Enhanced Magnetic Resonance Imaging.
IEEE Trans. Image Process., 2013

The Whole Mesh Deformation Model: A Fast Image Segmentation Method Suitable for Effective Parallelization.
EURASIP J. Adv. Signal Process., 2013

Detection and classification of peer-to-peer traffic: A survey.
ACM Comput. Surv., 2013

Randomness in Virtual Machines.
Proceedings of the IEEE/ACM 6th International Conference on Utility and Cloud Computing, 2013

Gland segmentation of breast ultrasound exams.
Proceedings of the Medical Imaging 2013: Image Processing, 2013

Real-time traffic classification based on statistical tests for matching signatures with packet length distributions.
Proceedings of the 19th IEEE Workshop on Local & Metropolitan Area Networks, 2013

Secure user authentication in cloud computing management interfaces.
Proceedings of the IEEE 32nd International Performance Computing and Communications Conference, 2013

2012
Fast synthesis of persistent fractional Brownian motion.
ACM Trans. Model. Comput. Simul., 2012

Corrigendum: Exploring Behavioral Patterns Through Entropy in Multimedia Peer-to-Peer Traffic.
Comput. J., 2012

Exploring Behavioral Patterns Through Entropy in Multimedia Peer-to-Peer Traffic.
Comput. J., 2012

Breast ultrasound images gland segmentation.
Proceedings of the IEEE International Workshop on Machine Learning for Signal Processing, 2012

2011
On-line Detection of Encrypted Traffic Generated by Mesh-Based Peer-to-Peer Live Streaming Applications: The Case of GoalBit.
Proceedings of The Tenth IEEE International Symposium on Networking Computing and Applications, 2011

Extended whole mesh deformation model: Full 3D processing.
Proceedings of the 18th IEEE International Conference on Image Processing, 2011

Joint source-channel decoding of motion-information using maximum-a-posteriori.
Proceedings of the 18th IEEE International Conference on Image Processing, 2011

2010
Source traffic analysis.
ACM Trans. Multim. Comput. Commun. Appl., 2010

NetOdyssey - A New Tool for Real-Time Analysis of Network Traffic.
Proceedings of The Ninth IEEE International Symposium on Networking Computing and Applications, 2010

Multiple-description video coding based on JPEG 2000 MQ-coder registers.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2010), May 30, 2010

2009
The design and evaluation of the Simple Self-Similar Sequences Generator.
Inf. Sci., 2009

Secure communications and data management in ubiquitous services.
Int. J. Commun. Syst., 2009

A New Architecture for Optical Burst Switching Networks Based on Cooperative Control.
Proceedings of The Eighth IEEE International Symposium on Networking Computing and Applications, 2009

The Dynamic Topology Changes model for unsupervised image segmentation.
Proceedings of the 2009 IEEE International Workshop on Multimedia Signal Processing, 2009

A new 3D image segmentation method for parallel architectures.
Proceedings of the 2009 IEEE International Conference on Multimedia and Expo, 2009

The whole mesh Deformation Model for 2D and 3D image segmentation.
Proceedings of the International Conference on Image Processing, 2009

Towards the Detection of Encrypted BitTorrent Traffic through Deep Packet Inspection.
Proceedings of the Security Technology, 2009

Detection of Encrypted Traffic in eDonkey Network through Application Signatures.
Proceedings of the First International Conference on Advances in P2P Systems, 2009

2008
Security in mobile ad hoc and sensor networks: part II [guest editorial].
IEEE Commun. Mag., 2008

Analysis of the Impact of Intensive Attacks on the Self-Similarity Degree of the Network Traffic.
Proceedings of the Second International Conference on Emerging Security Information, 2008

Track on Computer Networks: editorial message.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

Analysis of Peer-to-Peer Traffic Using a Behavioural Method Based on Entropy.
Proceedings of the 2008 IEEE International Performance, 2008

The Ethernet Frame Payload Size and Its Effect on IPv4 and IPv6 Traffic.
Proceedings of the 2008 International Conference on Information Networking, 2008

Performance Assessment of Enhanced Just-in-Time Protocol in OBS Networks Taking into Account Control Packet Processing and Optical Switch Configuration Times.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
A new architectural approach for optical burst switching networks based on a common control channel.
Opt. Switch. Netw., 2007

Optical burst switching network: A multi-layered approach.
J. High Speed Networks, 2007

On EPON security issues.
IEEE Commun. Surv. Tutorials, 2007

IS 2007 PC Co-chairs' Message.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

Enhanced Just-in-Time: A New Resource Reservation Protocol for Optical Burst Switching Networks.
Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), 2007

Self-Similarity Analysis Applied to 2D Breast Cancer Imaging.
Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), 2007

On the Performance of Shortest Path Routing Algorithms for Modeling and Simulation of Static Source Routed Networks -- an Extension to the Dijkstra Algorithm.
Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), 2007

Advanced Querying Architecture for DICOM Systems.
Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), 2007

Performance of Optical Burst Switched Networks for Grid Applications.
Proceedings of the Third International Conference on Networking and Services (ICNS 2007), 2007

Measuring and Profiling IP Traffic.
Proceedings of the Fourth European Conference on Universal Multiservice Networks (ECUMN 2007), 2007

2006
Assessment of blocking performance in WDM chordal ring networks.
J. High Speed Networks, 2006

Preamble Encryption Mechanism for Enhanced Privacy in Ethernet Passive Optical Networks.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006

IS 2006 PC Co-chairs' Message.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006

Burst Assembly with Real IPv4 Data - Performance Assessement of Three Assembly Algorithms.
Proceedings of the Next Generation Teletraffic and Wired/Wireless Advanced Networking, 2006

Estimating Network Offered Load for Optical Burst Switching Networks.
Proceedings of the NETWORKING 2006, 2006

Issues on Performance Assessment of Optical Burst Switched Networks: Burst Loss Versus Packet Loss Metrics.
Proceedings of the NETWORKING 2006, 2006

Performance implications of control packet processing and optical switch configuration times for optical burst switched mesh networks with degree-four topologies.
Proceedings of the International Symposium on Computer Networks, 2006

Integration of Ontologies and Semantic Annotations with Resource Description Framework in Eclipse-Based Platforms with Editing Features for Semantic Web.
Proceedings of the Information Networking, 2006

A New Architecture for Optical Burst Switched Networks Based on a Common Control Channel.
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006

SWedt: A Semantic Web Editor Integrating Ontologies and Semantic Annotations with Resource Description Framework.
Proceedings of the Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT/ICIW 2006), 2006

2005
Performance Implications of Meshing Degree for Optical Burst Switched Networks Using One-Way Resource Reservation Protocols.
Telecommun. Syst., 2005

Impact of Setup Message Processing and Optical Switch Configuration Times on the Performance of IP over Optical Burst Switching Networks.
Proceedings of the Computer and Information Sciences, 2005

One-Way Resource Reservation Protocols for IP Over Optical Burst Switched Mesh Networks.
Proceedings of the Systems Communications 2005 (ICW / ICHSN / ICMCS / SENET 2005), 2005

SAPA: Software Agents for Prevention and Auditing of Security Faults in Networked Systems.
Proceedings of the Information Networking, 2005

The Role of Meshing Degree in Optical Burst Switching Networks Using Signaling Protocols with One-Way Reservation Schemes.
Proceedings of the Networking, 2005

Towards Autonomic Minimization of Security Vulnerabilities Exploitation in Hybrid Network Environments.
Proceedings of the Joint International Conference on Autonomic and Autonomous Systems 2005 / International Conference on Networking and Services 2005, 2005

A Layered Architecture for Supporting Optical Burst Switching.
Proceedings of the Telecommunications 2005: Advanced Industrial Conference on Telecommunications / Service Assurance with Partial and Intermittent Resources Conference / E-Learning on Telecommunications Workshop (AICT / SAPIR / ELETE 2005), 2005

2004
Performance Assessment of Optical Burst Switching Ring and Chordal Ring Networks.
Telecommun. Syst., 2004

Performance Assessment of Optical Burst Switched Degree-Four Chordal Ring Networks.
Proceedings of the Telecommunications and Networking, 2004

Performance Assessment of Signaling Protocols in Optical Burst Switching Mesh Networks.
Proceedings of the Information Networking, 2004

Performance Assessment of Signaling Protocols with One-Way Reservation Schemes for Optical Burst Switching Networks.
Proceedings of the High Speed Networks and Multimedia Communications, 2004

Intelligent Assessment of Distributed Security in TCP/IP Networks.
Proceedings of the High Speed Networks and Multimedia Communications, 2004

2003
The Role of Network Topologies in the Optical Core of IP-over-WDM Networks with Static Wavelength Routing.
Telecommun. Syst., 2003

High Performance Optical Backbones for Next Generation Internet.
Proceedings of the 2003 International Symposium on Information Technology (ITCC 2003), 2003

The Role of Nodal Degree in the Optical Core of IP-over-WDM Networks.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003

Management of Security in TCP/IP Hosts Using Dedicated Monitoring Applications.
Proceedings of the Network Control and Engineering for QoS, 2003

High performance optical Internet backbones with mesh topologies.
Proceedings of the 11th IEEE International Conference on Networks, 2003

Performance Analysis of Degree Four Topologies for the Optical Core of IP-over-WDM Networks.
Proceedings of the Information Networking, 2003

DENOFAS: A Vulnerability Assessment Tool.
Proceedings of the IADIS International Conference WWW/Internet 2003, 2003

2002
Assessment of blocking performance in unidirectional and bi-directional wavelength routed ring networks.
J. High Speed Networks, 2002

Performance assessment of wavelength routed optical networks with shortest path routing over degree three topologies.
Proceedings of the Proceedings 10th IEEE International Conference on Networks: Towards Network Superiority, 2002

Optical Backbones with Low Connectivity for IP-over-WDM Networks.
Proceedings of the Information Networking, 2002

Performance Assessment of WDM Degree-four Chordal Ring Networks.
Proceedings of the IASTED International Conference on Communications, 2002

2001
Influence of Chord Length on the Blocking Performance of Wavelength-Routed Chordal Ring Networks.
Proceedings of the Towards an Optical Internet: New Visions in Optical Network Design and Modelling, 2001

Performance Comparison of Wavelength Routing Optical Networks with Chordal Ring and Mesh-Torus Topologies.
Proceedings of the Networking, 2001

1997
Letter: Impact of double cavity FP demultiplexers on the performance of WDM dispersion supported transmission.
Eur. Trans. Telecommun., 1997

Performance assessment of high density wavelength division multiplexing systems with dispersion supported transmission at 10 Gbit/s.
Proceedings of the Second IEEE Symposium on Computers and Communications (ISCC 1997), 1997


  Loading...