Nuno Antunes

According to our database1, Nuno Antunes authored at least 44 papers between 2009 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
BIGSEA: A Big Data analytics platform for public transportation information.
Future Generation Comp. Syst., 2019

2018
A Europe-Brazil Context for Secure Data Analytics in the Cloud.
IEEE Security & Privacy, 2018

Evaluating the Applicability of Robustness Testing in Virtualized Environments.
Proceedings of the 8th Latin-American Symposium on Dependable Computing, 2018

An Empirical Study of Docker Vulnerabilities and of Static Code Analysis Applicability.
Proceedings of the 8th Latin-American Symposium on Dependable Computing, 2018


Fairness and Transparency of Machine Learning for Trustworthy Cloud Services.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2018

2017
Designing vulnerability testing tools for web services: approach, components, and tools.
Int. J. Inf. Sec., 2017

Smells are sensitive to developers!: on the efficiency of (un)guided customized detection.
Proceedings of the 25th International Conference on Program Comprehension, 2017

Practical Evaluation of Static Analysis Tools for Cryptography: Benchmarking Method and Case Study.
Proceedings of the 28th IEEE International Symposium on Software Reliability Engineering, 2017

Evaluating the Accuracy of Machine Learning Algorithms on Detecting Code Smells for Different Developers.
Proceedings of the ICEIS 2017, 2017

An Analysis of OpenStack Vulnerabilities.
Proceedings of the 13th European Dependable Computing Conference, 2017

RADIANCE Welcome.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2017

PRIVAaaS: privacy approach for a distributed cloud-based data analytics platforms.
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, 2017

2016
Challenges on Anonymity, Privacy, and Big Data.
Proceedings of the 2016 Seventh Latin-American Symposium on Dependable Computing, 2016

Experimenting Machine Learning Techniques to Predict Vulnerabilities.
Proceedings of the 2016 Seventh Latin-American Symposium on Dependable Computing, 2016

Quantifying the Attack Detection Accuracy of Intrusion Detection Systems in Virtualized Environments.
Proceedings of the 27th IEEE International Symposium on Software Reliability Engineering, 2016

Fishing Monitor System Data: A Naïve Bayes Approach.
Proceedings of the Intelligent Systems Design and Applications, 2016

Experimental Assessment of NoSQL Databases Dependability.
Proceedings of the 12th European Dependable Computing Conference, 2016

Coverage Metrics and Detection of Injection Vulnerabilities: An Experimental Study.
Proceedings of the 12th European Dependable Computing Conference, 2016

Software Metrics and Security Vulnerabilities: Dataset and Exploratory Study.
Proceedings of the 12th European Dependable Computing Conference, 2016

Code Change History and Software Vulnerabilities.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2016

Introduction to RADIANCE 2016.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2016

2015
Assessing and Comparing Vulnerability Detection Tools for Web Services: Benchmarking Approach and Examples.
IEEE Trans. Services Computing, 2015

Evaluation of Intrusion Detection Systems in Virtualized Environments Using Attack Injection.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

Experience report: Evaluating the effectiveness of decision trees for detecting code smells.
Proceedings of the 26th IEEE International Symposium on Software Reliability Engineering, 2015

Workshop on Recent Advances in the DependabIlity AssessmeNt of Complex systEms (RADIANCE).
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

On the Metrics for Benchmarking Vulnerability Detection Tools.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

2014
Penetration Testing for Web Services.
IEEE Computer, 2014

On Applying FMEA to SOAs: A Proposal and Open Challenges.
Proceedings of the Software Engineering for Resilient Systems - 6th International Workshop, 2014

Cost-Effective Testing for Critical Off-the-Shelf Services.
Proceedings of the Computer Safety, Reliability, and Security, 2014

Experience Report: An Analysis of Hypercall Handler Vulnerabilities.
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering, 2014

2013
A monitoring and testing framework for critical off-the-shelf applications and services.
Proceedings of the IEEE 24th International Symposium on Software Reliability Engineering, 2013

An XML-Based Policy Model for Access Control in Web Applications.
Proceedings of the Database and Expert Systems Applications, 2013

SOA-Scanner: An Integrated Tool to Detect Vulnerabilities in Service-Based Infrastructures.
Proceedings of the 2013 IEEE International Conference on Services Computing, Santa Clara, CA, USA, June 28, 2013

2012
Defending against Web Application Vulnerabilities.
IEEE Computer, 2012

Evaluating and Improving Penetration Testing in Web Services.
Proceedings of the 23rd IEEE International Symposium on Software Reliability Engineering, 2012

Detecting Vulnerabilities in Service Oriented Architectures.
Proceedings of the 23rd IEEE International Symposium on Software Reliability Engineering Workshops, 2012

Robustness Testing Techniques and Tools.
Proceedings of the Resilience Assessment and Evaluation of Computing Systems, 2012

2011
Enhancing Penetration Testing with Attack Signatures and Interface Monitoring for the Detection of Injection Vulnerabilities in Web Services.
Proceedings of the IEEE International Conference on Services Computing, 2011

2010
Benchmarking Vulnerability Detection Tools for Web Services.
Proceedings of the IEEE International Conference on Web Services, 2010

2009
Comparing the Effectiveness of Penetration Testing and Static Code Analysis on the Detection of SQL Injection Vulnerabilities in Web Services.
Proceedings of the 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing, 2009

Detecting SQL Injection Vulnerabilities in Web Services.
Proceedings of the Fourth Latin-American Symposium on Dependable Computing, 2009

Using web security scanners to detect vulnerabilities in web services.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

Effective Detection of SQL/XPath Injection Vulnerabilities in Web Services.
Proceedings of the 2009 IEEE International Conference on Services Computing (SCC 2009), 2009


  Loading...