Miguel L. Pardal

Orcid: 0000-0003-2872-7300

According to our database1, Miguel L. Pardal authored at least 51 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
MultiTLS: using multiple and diverse ciphers for stronger secure channels.
Comput. Secur., September, 2023

RaDiO: An efficient spatiotemporal radiation diagnostic for particle-in-cell codes.
Comput. Phys. Commun., April, 2023

Sanare: Pluggable Intrusion Recovery for Web Applications.
IEEE Trans. Dependable Secur. Comput., 2023

MIRES: Intrusion Recovery for Applications Based on Backend-As-a-Service.
IEEE Trans. Cloud Comput., 2023

Synthesis of Fault-Tolerant Reliable Broadcast Algorithms With Reinforcement Learning.
IEEE Access, 2023

μVerum: Intrusion Recovery for Microservice Applications.
IEEE Access, 2023

Decentralized position detection for moving vehicles.
Proceedings of the 97th IEEE Vehicular Technology Conference, 2023

IM-DISCO: Invariant Mining for Detecting IntrusionS in Critical Operations.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

Automatic Generation of Distributed Algorithms with Generative AI.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2023

2022
Smart meter data processing: a showcase for simple and efficient textual processing.
CoRR, 2022

Does Big Data Require Complex Systems? A Performance Comparison Between Spark and Unicage Shell Scripts.
CoRR, 2022

Lisbon Hotspots: Wi-Fi access point dataset for time-bound location proofs.
CoRR, 2022

Learning to generate Reliable Broadcast Algorithms.
CoRR, 2022

SureSpace: orchestrating beacons and witnesses to certify device location.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022

FingerCI: generating specifications for critical infrastructures.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022

LoCaaS: Location-Certification-as-a-Service.
Proceedings of the 21st IEEE International Symposium on Network Computing and Applications, 2022

Bluetooth Peer-to-Peer Location Certification with a Gamified Mobile Application.
Proceedings of the 21st IEEE International Symposium on Network Computing and Applications, 2022

SureRepute: Reputation System for Crowdsourced Location Witnesses.
Proceedings of the 21st IEEE International Symposium on Network Computing and Applications, 2022

A Study on the Best Way to Compress Natural Language Processing Models.
Proceedings of the IEEE International Conference on Fuzzy Systems, 2022

ComSEC: Secure Communications for Baggage Handling Systems.
Proceedings of the Computer Security. ESORICS 2022 International Workshops, 2022

2021
Poster: The ROAD to resilient location for the Internet of Vehicles.
Proceedings of the 13th IEEE Vehicular Networking Conference, 2021

Secure protocol buffers for Bluetooth Low-Energy communication with wearable devices.
Proceedings of the 20th IEEE International Symposium on Network Computing and Applications, 2021

2020
MultiTLS: Secure communication channels with cipher suite diversity.
IACR Cryptol. ePrint Arch., 2020

Sensmart: sensor data market for the internet of things.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

Recoverable Token: Recovering from Intrusions against Digital Assets in Ethereum.
Proceedings of the 19th IEEE International Symposium on Network Computing and Applications, 2020

MIRES: Recovering Mobile Applications based on Backend-as-a-Service from Cyber Attacks.
Proceedings of the MobiQuitous '20: Computing, 2020

FaultSee: Reproducible Fault Injection in Distributed Systems.
Proceedings of the 16th European Dependable Computing Conference, 2020

STOP: A Location Spoofing Resistant Vehicle Inspection System.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 2020

CROSS City: Wi-Fi Location Proofs for Smart Tourism.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 2020

2018
S-Audit: Efficient Data Integrity Verification for Cloud Storage.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Witness-Based Location Proofs for Mobile Devices.
Proceedings of the 17th IEEE International Symposium on Network Computing and Applications, 2018

Tamper-Proof Incentive Scheme for Mobile Crowdsensing Systems.
Proceedings of the 17th IEEE International Symposium on Network Computing and Applications, 2018

Big Data Privacy by Design Computation Platform.
Proceedings of the Machine Learning, Optimization, and Data Science, 2018

RockFS: Cloud-backed File System Resilience to Client-Side Attacks.
Proceedings of the 19th International Middleware Conference, 2018

Securing Electronic Health Records in the Cloud.
Proceedings of the 1st Workshop on Privacy by Design in Distributed Systems, 2018

LeanBench: comparing software stacks for batch and query processing of IoT data.
Proceedings of the 9th International Conference on Ambient Systems, 2018

Cloud vs Fog: assessment of alternative deployments for a latency-sensitive IoT application.
Proceedings of the 9th International Conference on Ambient Systems, 2018

2017
Vulnerability-Tolerant Transport Layer Security.
Proceedings of the 21st International Conference on Principles of Distributed Systems, 2017

Rectify: black-box intrusion recovery in PaaS clouds.
Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference, Las Vegas, NV, USA, December 11, 2017

2016
MACHETE: Multi-path communication for security.
Proceedings of the 15th IEEE International Symposium on Network Computing and Applications, 2016

vtTLS: A vulnerability-tolerant communication protocol.
Proceedings of the 15th IEEE International Symposium on Network Computing and Applications, 2016

DARSHANA: Detecting route hijacking for communication confidentiality.
Proceedings of the 15th IEEE International Symposium on Network Computing and Applications, 2016

2015
TrakChain Estimates Costs for Track and Trace in the Internet of (many) Things.
ERCIM News, 2015

2012
Enforcing RFID data visibility restrictions using XACML security policies.
Proceedings of the 2012 IEEE International Conference on RFID-Technologies and Applications, 2012

Performance Assessment of Web Services in the STEP Framework.
Proceedings of the Cloud Computing and Services Science - Second International Conference, 2012

Improving Web Services Performance, One Step at a Time.
Proceedings of the CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science, Porto, Portugal, 18, 2012

Performance assessment of XACML authorizations for Supply Chain Traceability Web Services.
Proceedings of the Fourth International Conference on Computational Aspects of Social Networks, 2012

2011
Cost model for RFID-based traceability information systems.
Proceedings of the 2011 IEEE International Conference on RFID-Technologies and Applications, 2011

2010
EPC Virtual Lab: Experiments using an RFID Location Simulator.
Proceedings of the RFID Technology-Concepts, 2010

Towards the Internet of Things: An Introduction to RFID Technology.
Proceedings of the RFID Technology-Concepts, 2010

Smart Web Services: Systems' Integration Using Policy Driven Automatic Configuration.
Proceedings of the ENTERprise Information Systems - International Conference, 2010


  Loading...