Nuno Antunes

According to our database1, Nuno Antunes authored at least 80 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Editorial: Software Reliability and Dependability Engineering.
IEEE Trans. Dependable Secur. Comput., 2023

MONDEO: Multistage Botnet Detection.
CoRR, 2023

Detecting Anomalies Through Sequential Performance Analysis in Virtualized Environments.
IEEE Access, 2023

µDetector: Automated Intrusion Detection for Microservices.
Proceedings of the IEEE International Conference on Software Analysis, 2023

Savery: A Framework for the Assessment and Comparison of Mobile Development Tools.
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023

Intrusion Detection for Scalable and Elastic Microservice Applications.
Proceedings of the 28th IEEE Pacific Rim International Symposium on Dependable Computing, 2023

On Security and Energy Efficiency in Android Smartphones.
Proceedings of the 10th IEEE/ACM International Conference on Mobile Software Engineering and Systems, 2023

Intrusion Detection and Tolerance for Microservice Applications.
Proceedings of the 12th Latin-American Symposium on Dependable and Secure Computing, 2023

Evaluation of Machine Learning for Intrusion Detection in Microservice Applications.
Proceedings of the 12th Latin-American Symposium on Dependable and Secure Computing, 2023

Intrusion Injection for Virtualized Systems: Concepts and Approach.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

2022
A Multi-Criteria Analysis of Benchmark Results With Expert Support for Security Tools.
IEEE Trans. Dependable Secur. Comput., 2022

Generating personalized business card designs from images.
Multim. Tools Appl., 2022

Privacy risk assessment and privacy-preserving data monitoring.
Expert Syst. Appl., 2022

A Study on the Aging and Fault Tolerance of Microservices in Kubernetes.
IEEE Access, 2022

OIDC-TCI: OIDC with Trust Context Information.
Proceedings of the 14th IFIP Wireless and Mobile Networking Conference, 2022

Adversarial Robustness Assessment of NeuroEvolution Approaches.
Proceedings of the IEEE Congress on Evolutionary Computation, 2022

BIANFE: Object identification and authentication in federated scenarios.
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022

2021
Towards a Robustness Assessment Methodology for IoT Systems.
Proceedings of the 10th Latin-American Symposium on Dependable Computing, 2021

My Services Got Old! Can Kubernetes Handle the Aging of Microservices?
Proceedings of the IEEE International Symposium on Software Reliability Engineering, 2021

Software Testing Strategies for Detecting Hypercall Handlers' Aging-related Bugs.
Proceedings of the IEEE International Symposium on Software Reliability Engineering, 2021

2020
Risk Management and Privacy Violation Detection in the PoSeID-on Data Privacy Platform.
SN Comput. Sci., 2020

Using natural language processing to detect privacy violations in online contracts.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

Using Attack Injection to Evaluate Intrusion Detection Effectiveness in Container-based Systems.
Proceedings of the 25th IEEE Pacific Rim International Symposium on Dependable Computing, 2020

A Model-Based Approach to Anomaly Detection Trading Detection Time and False Alarm Rate.
Proceedings of the Mediterranean Communication and Computer Networking Conference, 2020

SIDE: Security-aware Integrated Development Environment.
Proceedings of the 2020 IEEE International Symposium on Software Reliability Engineering Workshops, 2020

Vulnerability Analysis as Trustworthiness Evidence in Security Benchmarking: A Case Study on Xen.
Proceedings of the 2020 IEEE International Symposium on Software Reliability Engineering Workshops, 2020

Using NLP and Machine Learning to Detect Data Privacy Violations.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

A platform to enable self-adaptive cloud applications using trustworthiness properties.
Proceedings of the SEAMS '20: IEEE/ACM 15th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, Seoul, Republic of Korea, 29 June, 2020

2019
Understanding How to Use Static Analysis Tools for Detecting Cryptography Misuse in Software.
IEEE Trans. Reliab., 2019

BIGSEA: A Big Data analytics platform for public transportation information.
Future Gener. Comput. Syst., 2019

An Integrated Big and Fast Data Analytics Platform for Smart Urban Transportation Management.
IEEE Access, 2019

Combining State and Interface - Based Robustness Testing for OpenStack Components.
Proceedings of the 9th Latin-American Symposium on Dependable Computing, 2019

The Impact of Data Preparation on the Fairness of Software Systems.
Proceedings of the 30th IEEE International Symposium on Software Reliability Engineering, 2019

Towards Testing the Software Aging Behavior of Hypervisor Hypercall Interfaces.
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2019

Studying the Applicability of Intrusion Detection to Multi-Tenant Container Environments.
Proceedings of the 15th European Dependable Computing Conference, 2019

2018
A Europe-Brazil Context for Secure Data Analytics in the Cloud.
IEEE Secur. Priv., 2018

Evaluating the Applicability of Robustness Testing in Virtualized Environments.
Proceedings of the 8th Latin-American Symposium on Dependable Computing, 2018

An Empirical Study of Docker Vulnerabilities and of Static Code Analysis Applicability.
Proceedings of the 8th Latin-American Symposium on Dependable Computing, 2018


Fairness and Transparency of Machine Learning for Trustworthy Cloud Services.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2018

2017
Designing vulnerability testing tools for web services: approach, components, and tools.
Int. J. Inf. Sec., 2017

Smells are sensitive to developers!: on the efficiency of (un)guided customized detection.
Proceedings of the 25th International Conference on Program Comprehension, 2017

Practical Evaluation of Static Analysis Tools for Cryptography: Benchmarking Method and Case Study.
Proceedings of the 28th IEEE International Symposium on Software Reliability Engineering, 2017

Evaluating the Accuracy of Machine Learning Algorithms on Detecting Code Smells for Different Developers.
Proceedings of the ICEIS 2017, 2017

An Analysis of OpenStack Vulnerabilities.
Proceedings of the 13th European Dependable Computing Conference, 2017

RADIANCE Welcome.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2017

PRIVAaaS: privacy approach for a distributed cloud-based data analytics platforms.
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, 2017

2016
Challenges on Anonymity, Privacy, and Big Data.
Proceedings of the 2016 Seventh Latin-American Symposium on Dependable Computing, 2016

Experimenting Machine Learning Techniques to Predict Vulnerabilities.
Proceedings of the 2016 Seventh Latin-American Symposium on Dependable Computing, 2016

Quantifying the Attack Detection Accuracy of Intrusion Detection Systems in Virtualized Environments.
Proceedings of the 27th IEEE International Symposium on Software Reliability Engineering, 2016

Fishing Monitor System Data: A Naïve Bayes Approach.
Proceedings of the Intelligent Systems Design and Applications, 2016

Experimental Assessment of NoSQL Databases Dependability.
Proceedings of the 12th European Dependable Computing Conference, 2016

Coverage Metrics and Detection of Injection Vulnerabilities: An Experimental Study.
Proceedings of the 12th European Dependable Computing Conference, 2016

Software Metrics and Security Vulnerabilities: Dataset and Exploratory Study.
Proceedings of the 12th European Dependable Computing Conference, 2016

Code Change History and Software Vulnerabilities.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2016

Introduction to RADIANCE 2016.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2016

2015
Assessing and Comparing Vulnerability Detection Tools for Web Services: Benchmarking Approach and Examples.
IEEE Trans. Serv. Comput., 2015

Evaluation of Intrusion Detection Systems in Virtualized Environments Using Attack Injection.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

Experience report: Evaluating the effectiveness of decision trees for detecting code smells.
Proceedings of the 26th IEEE International Symposium on Software Reliability Engineering, 2015

Workshop on Recent Advances in the DependabIlity AssessmeNt of Complex systEms (RADIANCE).
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

On the Metrics for Benchmarking Vulnerability Detection Tools.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

2014
Technical Information on Vulnerabilities of Hypercall Handlers.
CoRR, 2014

On Benchmarking Intrusion Detection Systems in Virtualized Environments.
CoRR, 2014

Penetration Testing for Web Services.
Computer, 2014

On Applying FMEA to SOAs: A Proposal and Open Challenges.
Proceedings of the Software Engineering for Resilient Systems - 6th International Workshop, 2014

Cost-Effective Testing for Critical Off-the-Shelf Services.
Proceedings of the Computer Safety, Reliability, and Security, 2014

Experience Report: An Analysis of Hypercall Handler Vulnerabilities.
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering, 2014

2013
A monitoring and testing framework for critical off-the-shelf applications and services.
Proceedings of the IEEE 24th International Symposium on Software Reliability Engineering, 2013

An XML-Based Policy Model for Access Control in Web Applications.
Proceedings of the Database and Expert Systems Applications, 2013

SOA-Scanner: An Integrated Tool to Detect Vulnerabilities in Service-Based Infrastructures.
Proceedings of the 2013 IEEE International Conference on Services Computing, Santa Clara, CA, USA, June 28, 2013

2012
Defending against Web Application Vulnerabilities.
Computer, 2012

Evaluating and Improving Penetration Testing in Web Services.
Proceedings of the 23rd IEEE International Symposium on Software Reliability Engineering, 2012

Detecting Vulnerabilities in Service Oriented Architectures.
Proceedings of the 23rd IEEE International Symposium on Software Reliability Engineering Workshops, 2012

Robustness Testing Techniques and Tools.
Proceedings of the Resilience Assessment and Evaluation of Computing Systems, 2012

2011
Enhancing Penetration Testing with Attack Signatures and Interface Monitoring for the Detection of Injection Vulnerabilities in Web Services.
Proceedings of the IEEE International Conference on Services Computing, 2011

2010
Benchmarking Vulnerability Detection Tools for Web Services.
Proceedings of the IEEE International Conference on Web Services, 2010

2009
Comparing the Effectiveness of Penetration Testing and Static Code Analysis on the Detection of SQL Injection Vulnerabilities in Web Services.
Proceedings of the 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing, 2009

Detecting SQL Injection Vulnerabilities in Web Services.
Proceedings of the Fourth Latin-American Symposium on Dependable Computing, 2009

Using web security scanners to detect vulnerabilities in web services.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

Effective Detection of SQL/XPath Injection Vulnerabilities in Web Services.
Proceedings of the 2009 IEEE International Conference on Services Computing (SCC 2009), 2009


  Loading...