Michele Nogueira Lima

According to our database1, Michele Nogueira Lima authored at least 88 papers between 2008 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Context-aware network selection in heterogeneous wireless networks.
Computer Communications, 2019

Secure On-skin Biometric Signal Transmission using Galvanic Coupling.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Delay Sensitivity-Aware Aggregation of Smart Microgrid Data Over Heterogeneous Networks.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2018
The computer for the 21st century: present security & privacy challenges.
J. Internet Services and Applications, 2018

Global Communications Newsletter.
IEEE Communications Magazine, 2018

Microgrid Data Aggregation and Wireless Transfer Scheduling in the Presence of Time Sensitive Events.
Proceedings of the 16th ACM International Symposium on Mobility Management and Wireless Access, 2018

ECG-Based User Authentication and Identification Method on VANETs.
Proceedings of the 10th Latin America Networking Conference, 2018

Confidentiality-Aware Decision on Handoffs under Uncertainty on Heterogeneous Wireless Networks.
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018

Does OpenFlow Really Decouple The Data Plane from The Control Plane?
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018

Redundant Packet Scheduling by Uncorrelated Paths in Heterogeneous Wireless Networks.
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018

A Self-Adaptable System for DDoS Attack Prediction Based on the Metastability Theory.
Proceedings of the IEEE Global Communications Conference, 2018

2017
PBF: A New Privacy-Aware Billing Framework for Online Electric Vehicles with Bidirectional Auditability.
Wireless Communications and Mobile Computing, 2017

A Stochastic Adaptive Model to Explore Mobile Botnet Dynamics.
IEEE Communications Letters, 2017

A framework for resilient and secure spectrum sensing on cognitive radio networks.
Computer Networks, 2017

Corrigendum to "A framework for resilient and secure spectrum sensing on cognitive radio networks" [Computer Networks volume 79 (2015) 313-322].
Computer Networks, 2017

SPARTA: A survival performance degradation framework for identity federations.
Computer Networks, 2017

A Dynamic Channel Allocation Protocol for Medical Environment under Multiple Base Stations.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

A multilayer link quality estimator for reliable machine-to-machine communication.
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017

CD-ASM: A new queuing paradigm to overcome bufferbloat effects in HetNets.
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017

Mapping critical illness early signs to priority alert transmission on wireless networks.
Proceedings of the 9th IEEE Latin-American Conference on Communications, 2017

A Survival Performance degrAdation fRamework for lArge-scale neTworked systems.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017

Can MPTCP secure Internet communications from man-in-the-middle attacks?
Proceedings of the 13th International Conference on Network and Service Management, 2017

2016
Cognitive radio based connectivity management for resilient end-to-end communications in VANETs.
Computer Communications, 2016

Virtual and unified address assignment for continuous communication in mobile networks.
Proceedings of the 2016 Wireless Days, 2016

Evaluation of Sybil attack detection approaches in the Internet of Things content dissemination.
Proceedings of the 2016 Wireless Days, 2016

AoT: Authentication and Access Control for the Entire IoT Device Life-Cycle.
Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems, SenSys 2016, 2016

A scheme for DDoS attacks mitigation in IdM systems through reorganizations.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

Offloading cellular networks through V2V communications - How to select the seed-vehicles?
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Avoiding Collisions by Time Slot Reduction Supporting Voice and Video in 802.11 Networks.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Self-Organized SDN Controller Cluster Conformations against DDoS Attacks Effects.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

2015
Routing management for performance and security tradeoff in wireless mesh networks.
Int. J. Inf. Sec., 2015

Aspirations, challenges, and open issues for software-based 5G networks in extremely dense and heterogeneous scenarios.
EURASIP J. Wireless Comm. and Networking, 2015

Programmable Networks - From Software-Defined Radio to Software-Defined Networking.
IEEE Communications Surveys and Tutorials, 2015

Firefly-inspired and robust time synchronization for cognitive radio ad hoc networks.
Computer Communications, 2015

Interoperability issues on heterogeneous wireless communication for smart cities.
Computer Communications, 2015

A framework for resilient and secure spectrum sensing on cognitive radio networks.
Computer Networks, 2015

Data similarity aware dynamic node clustering in wireless sensor networks.
Ad Hoc Networks, 2015

DDOS Mitigation Cloud-Based Service.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Access Decision System for Seamless Connectivity in Heterogeneous Wireless Networks.
Proceedings of the XXXIII Brazilian Symposium on Computer Networks and Distributed Systems, 2015

A New Privacy-Aware Mutual Authentication Mechanism for Charging-on-the-Move in Online Electric Vehicles.
Proceedings of the 11th International Conference on Mobile Ad-hoc and Sensor Networks, 2015

Guard Mounting: Reorganizations to Mitigate DDoS Attacks over Identity Providers Clustering.
Proceedings of the 2015 Workshop on Wireless of the Students, 2015

Mitigating DoS attacks in identity management systems through reorganizations.
Proceedings of the 2015 Latin American Network Operations and Management Symposium, 2015

Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

2014
Disaster resilience in communication networks [Guest Editorial].
IEEE Communications Magazine, 2014

Content dissemination in vehicular social networks: taxonomy and user satisfaction.
IEEE Communications Magazine, 2014

Disaster resilience in communication networks: part 2 [Guest Editorial].
IEEE Communications Magazine, 2014

Connectivity management to support reliable communication on Cognitive vehicular networks.
Proceedings of the 2014 IFIP Wireless Days, 2014

Contact lifespan and interest-based content dissemination in vehicular networks.
Proceedings of the 2014 IFIP Wireless Days, 2014

Utility-based forwarder selection for content dissemination in vehicular networks.
Proceedings of the 25th IEEE Annual International Symposium on Personal, 2014

An architecture to manage performance and reliability on hybrid cloud-based firewalling.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

Data similarity aware dynamic nodes clustering for supporting management operations.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

Autonomous architecture for managing firewalling Cloud-based service.
Proceedings of the 2014 International Conference and Workshop on the Network of the Future, 2014

Experimental performance comparison of single-path and multipath routing in VANETs.
Proceedings of the Global Information Infrastructure and Networking Symposium, 2014

Reducing DDoS attacks impact using a hybrid cloud-based firewalling architecture.
Proceedings of the Global Information Infrastructure and Networking Symposium, 2014

Establishing a rendezvous channel for co-located cognitive radios.
Proceedings of the Global Information Infrastructure and Networking Symposium, 2014

Optimizing FPGAs for supporting WBANs.
Proceedings of the Global Information Infrastructure and Networking Symposium, 2014

Message from the CNSM technical program co-chairs.
Proceedings of the 10th International Conference on Network and Service Management, 2014

Unwanted traffic characterization on IP networks by low interactive honeypot.
Proceedings of the 10th International Conference on Network and Service Management, 2014

Interest-Based Forwarding for Satisfying User Preferences in Vehicular Networks.
Proceedings of the Ad Hoc Networks - 6th International ICST Conference, 2014

2013
A Survey on Identity Management for the Future Network.
IEEE Communications Surveys and Tutorials, 2013

A flexible multi-criteria scheme to detect primary user emulation attacks in CRAHNs.
Proceedings of the IEEE 14th International Symposium on "A World of Wireless, 2013

Resilient and multi-dimensional cooperative spectrum sensing on cognitive radio networks.
Proceedings of the 24th IEEE Annual International Symposium on Personal, 2013

Solving virtual network resource allocation problems using a constraint satisfaction problem model.
Proceedings of the Fourth International Conference on the Network of the Future, 2013

Secure and revocable node authentication in Vehicular Ad-Hoc Networks.
Proceedings of the 2013 IEEE Symposium on Computers and Communications, 2013

2012
A Security Management Architecture for Supporting Routing Services on WANETs.
IEEE Trans. Network and Service Management, 2012

Bio-inspired time synchronization for cognitive radio ad hoc networks.
Proceedings of the 15th International Symposium on Wireless Personal Multimedia Communications, 2012

An autonomic knowledge monitoring scheme for trust management on mobile ad hoc networks.
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, 2012

A bio-inspired scheme on quorum systems for reliable services data management in MANETs.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

Bio-inspired time synchronization for cognitive radio ad hoc networks.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2012

A reliable and distributed time synchronization for Cognitive Radio Networks.
Proceedings of the Global Information Infrastructure and Networking Symposium, 2012

Managing sensing and cooperation to analyze PUE attacks in Cognitive Radio Ad Hoc Networks.
Proceedings of the 8th International Conference on Network and Service Management, 2012

Reliable operational services in MANETs by misbehavior-tolerant quorum systems.
Proceedings of the 8th International Conference on Network and Service Management, 2012

2011
Survivable key management on WANETs.
IEEE Wireless Commun., 2011

Biologically inspired architecture for security management on wireless self-organized networks.
Proceedings of the 7th Latin American Network Operations and Management Symposium, 2011

Resilient approach for energy management on Hot Spots in WSNs.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

Assessing RoQ attacks on MANETs over aware and unaware TPC techniques.
Proceedings of the 7th International Conference on Network and Service Management, 2011

2010
Implications of Misbehaving Attacks on Probabilistic Quorum System for MANETs.
Proceedings of the SECRYPT 2010, 2010

A Cross-Layer and Adaptive Scheme for Balancing Performance and Security on WMN Data Routing.
Proceedings of the Global Communications Conference, 2010

A framework for self-configuration on WMNs aware of performance and security issues.
Proceedings of the 6th International Conference on Network and Service Management, 2010

2009
A Survey of Survivability in Mobile Ad Hoc Networks.
IEEE Communications Surveys and Tutorials, 2009

Survivable keying for wireless ad hoc networks.
Proceedings of the Integrated Network Management, 2009

2008
Identity-based key management in mobile ad hoc networks: techniques and applications.
IEEE Wireless Commun., 2008

Quantifying Misbehaviour Attacks Against the Self-Organized Public Key Management on Manets.
Proceedings of the SECRYPT 2008, 2008

Survival multipath routing for MANETs.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008

Requirements for survivable routing in MANETs.
Proceedings of the Third International Symposium on Wireless Pervasive Computing, 2008

Virtual structure effects in two hybrid routing protocols for ad hoc networks.
Proceedings of the Third International Symposium on Wireless Pervasive Computing, 2008

Analyzing the Effectiveness of the Self-organized Public-Key Management System on MANETs under the Lack of Cooperation and the Impersonation Attacks.
Proceedings of the e-Business and Telecommunications - International Conference, 2008

An Architecture for Survivable Mesh Networking.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008


  Loading...