Newton Carlos Will

Orcid: 0000-0003-2976-4533

According to our database1, Newton Carlos Will authored at least 22 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Enclave Management Models for Safe Execution of Software Components.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

A Categorical Data Approach for Anomaly Detection in WebAssembly Applications.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

Anywhere on Earth: A Look at Regional Characteristics of DRDoS Attacks.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

2023
Intel Software Guard Extensions Applications: A Survey.
ACM Comput. Surv., 2023

Inspecting Binder Transactions to Detect Anomalies in Android.
Proceedings of the IEEE International Systems Conference, 2023

Security Challenges and Recommendations in 5G-IoT Scenarios.
Proceedings of the Advanced Information Networking and Applications, 2023

Trusted and only Trusted. That is the Access! - Improving Access Control Allowing only Trusted Execution Environment Applications.
Proceedings of the Advanced Information Networking and Applications, 2023

2022
Confidential computing in cloud/fog-based Internet of Things scenarios.
Internet Things, 2022

A Privacy-Preserving Data Aggregation Scheme for Fog/Cloud-Enhanced IoT Applications Using a Trusted Execution Environment.
Proceedings of the IEEE International Systems Conference, 2022

Is It Safe? Identifying Malicious Apps Through the Use of Metadata and Inter-Process Communication.
Proceedings of the IEEE International Systems Conference, 2022

Behavior Modeling of a Distributed Application for Anomaly Detection.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

How DRDoS attacks vary across the globe?
Proceedings of the 22nd ACM Internet Measurement Conference, 2022

2021
Systematic Literature Review on the Use of Trusted Execution Environments to Protect Cloud/Fog-Based Internet of Things Applications.
IEEE Access, 2021

Trusted Inter-Process Communication Using Hardware Enclaves.
Proceedings of the IEEE International Systems Conference, 2021

Security and Threats in the Brazilian e-Voting System: A Documentary Case Study Based on Public Security Tests.
Proceedings of the ICEGOV 2021: 14th International Conference on Theory and Practice of Electronic Governance, Athens, Greece, October 6, 2021

Intel Software Guard Extensions in Internet of Things Scenarios: A Systematic Mapping Study.
Proceedings of the 8th International Conference on Future Internet of Things and Cloud, 2021

Trusted Execution Environments for Cloud/Fog-based Internet of Things Applications.
Proceedings of the 11th International Conference on Cloud Computing and Services Science, 2021

2020
Using a Shared SGX Enclave in the UNIX PAM Authentication Service.
Proceedings of the IEEE International Systems Conference, 2020

Trusted Client-Side Encryption for Cloud Storage.
Proceedings of the Cloud Computing and Services Science - 10th International Conference, 2020

Secure Cloud Storage with Client-side Encryption using a Trusted Execution Environment.
Proceedings of the 10th International Conference on Cloud Computing and Services Science, 2020

2018
Using Intel SGX to Protect Authentication Credentials in an Untrusted Operating System.
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018

2012
Implementation of the IEEE Std 1459-2010 using Kalman filter for fundamental and harmonics detection.
Proceedings of the 3rd IEEE PES Innovative Smart Grid Technologies Europe, 2012


  Loading...