Paulo S. Motta Pires

According to our database1, Paulo S. Motta Pires authored at least 16 papers between 2004 and 2015.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Minimization and Placement of Sensors in Structurally Observable Networks.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
Learning Remote Computer Fingerprinting.
Proceedings of the Computational Intelligence in Digital Forensics: Forensic Investigation and Applications, 2014

2011
A Qualitative Survey of Active TCP/IP Fingerprinting Tools and Techniques for Operating Systems Identification.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011

2009
Advances in network topology security visualisation.
Int. J. Syst. Syst. Eng., 2009

A New Method for Recognizing Operating Systems of Automation Devices.
Proceedings of 12th IEEE International Conference on Emerging Technologies and Factory Automation, 2009

An Effective TCP/IP Fingerprinting Technique Based on Strange Attractors Classification.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2009

Application Filters for TCP/IP Industrial Automation Protocols.
Proceedings of the Critical Information Infrastructures Security, 2009

A Data Mining Based Analysis of Nmap Operating System Fingerprint Database.
Proceedings of the Computational Intelligence in Security for Information Systems, 2009

2008
A model for security management of SCADA systems.
Proceedings of 13th IEEE International Conference on Emerging Technologies and Factory Automation, 2008

Analysis of Malicious Traffic in Modbus/TCP Communications.
Proceedings of the Critical Information Infrastructure Security, 2008

2007
Automating security tests for industrial automation devices using neural networks.
Proceedings of 12th IEEE International Conference on Emerging Technologies and Factory Automation, 2007

Using a packet manipulation tool for security analysis of industrial network protocols.
Proceedings of 12th IEEE International Conference on Emerging Technologies and Factory Automation, 2007

Application of Kohonen Maps to Improve Security Tests on Automation Devices.
Proceedings of the Critical Information Infrastructures Security, 2007

2006
Improvements on Ethernet LAN Network Infrastructure for Industrial Automation: a Case Study.
Proceedings of 11th IEEE International Conference on Emerging Technologies and Factory Automation, 2006

Security Aspects of SCADA and Corporate Network Interconnection: An Overview.
Proceedings of the 2006 International Conference on Dependability of Computer Systems (DepCoS-RELCOMEX 2006), 2006

2004
LIV - The Linux Integrated Viruswall.
Proceedings of the Detection of Intrusions and Malware & Vulnerability Assessment, 2004


  Loading...