Paulo Simões

Orcid: 0000-0002-5079-8327

Affiliations:
  • University of Coimbra, Portugal


According to our database1, Paulo Simões authored at least 99 papers between 1999 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Container-based Virtualization for Real-time Industrial Systems - A Systematic Review.
ACM Comput. Surv., March, 2024

A Survey on Forensics and Compliance Auditing for Critical Infrastructure Protection.
IEEE Access, 2024

2023
A forensics and compliance auditing framework for critical infrastructure protection.
Int. J. Crit. Infrastructure Prot., September, 2023

Using KNX-Based Building Automation and Control Systems for Data Exfiltration.
IEEE Internet Things J., August, 2023

Testing the limits of general-purpose hypervisors for real-time control systems.
Microprocess. Microsystems, June, 2023

Smart Substation Communications and Cybersecurity: A Comprehensive Survey.
IEEE Commun. Surv. Tutorials, 2023

A Network Intrusion Detection System for Building Automation and Control Systems.
IEEE Access, 2023

Intrusion and Anomaly Detection in Industrial Automation and Control Systems.
Proceedings of the NOMS 2023, 2023

2022
Real-time task latency in general-purpose hypervisors - testing the limits.
Dataset, June, 2022

A Dataset Bundle for Building Automation and Control Systems Security Analysis.
Dataset, January, 2022

An automated closed-loop framework to enforce security policies from anomaly detection.
Comput. Secur., 2022

Security of Building Automation and Control Systems: Survey and future research directions.
Comput. Secur., 2022

2021
Intrusion and anomaly detection for the next-generation of industrial automation and control systems.
Future Gener. Comput. Syst., 2021

Privacy in the Cloud: A Survey of Existing Solutions and Research Challenges.
IEEE Access, 2021

Virtualizing Customer Premises Equipment.
Proceedings of the 2021 IEEE Conference on Network Function Virtualization and Software Defined Networks, 2021

2020
Risk Management and Privacy Violation Detection in the PoSeID-on Data Privacy Platform.
SN Comput. Sci., 2020

SDN-assisted containerized security and monitoring components.
Proceedings of the NOMS 2020, 2020

2019
Cyber-security Modbus ICS dataset.
Dataset, January, 2019

EMPATIA: A Multichannel Platform for Participatory Budgeting.
Int. J. Electron. Gov. Res., 2019

A stealth monitoring mechanism for cyber-physical systems.
Int. J. Crit. Infrastructure Prot., 2019

Virtualization of Residential Gateways: A Comprehensive Survey.
IEEE Commun. Surv. Tutorials, 2019

A Comprehensive Security Analysis of a SCADA Protocol: From OSINT to Mitigation.
IEEE Access, 2019

2018
A Europe-Brazil Context for Secure Data Analytics in the Cloud.
IEEE Secur. Priv., 2018

Current and Future Trends in Mobile Device Forensics: A Survey.
ACM Comput. Surv., 2018

Mobile Forensic Data Analysis: Suspicious Pattern Detection in Mobile Evidence.
IEEE Access, 2018

SDN-Enabled Virtual Data Diode.
Proceedings of the Computer Security - ESORICS 2018 International Workshops, 2018

Denial of Service Attacks: Detecting the Frailties of Machine Learning Algorithms in the Classification Process.
Proceedings of the Critical Information Infrastructures Security, 2018

2017
A Novel Intrusion Detection Mechanism for SCADA systems which Automatically Adapts to Network Topology Changes.
EAI Endorsed Trans. Ind. Networks Intell. Syst., 2017

Edge caching with mobility prediction in virtualized LTE mobile networks.
Future Gener. Comput. Syst., 2017

Evaluation of scalable, on-demand DNS-as-a-Service.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017

Attacking SCADA systems: A practical perspective.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017

Welcome from the Chairs.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017

Towards a Hybrid Intrusion Detection System for Android-based PPDR terminals.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017

Fuzzy System-Based Suspicious Pattern Detection in Mobile Forensic Evidence.
Proceedings of the Digital Forensics and Cyber Crime - 9th International Conference, 2017

Building an NFV-based vRGW: Lessons learned.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017

2016
Toward a Fully Cloudified Mobile Network Infrastructure.
IEEE Trans. Netw. Serv. Manag., 2016

A Cybersecurity Detection Framework for Supervisory Control and Data Acquisition Systems.
IEEE Trans. Ind. Informatics, 2016

Virtualizing Programmable Logic Controllers: Toward a Convergent Approach.
IEEE Embed. Syst. Lett., 2016

A mobile follow-me cloud content caching model.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

Expedite feature extraction for enhanced cloud anomaly detection.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

Enabling a Mobility Prediction-Aware Follow-Me Cloud Model.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016

Effect of Network Architecture Changes on OCSVM Based Intrusion Detection System.
Proceedings of the Industrial Networks and Intelligent Systems, 2016

2015
Cooperative security management for broadband network environments.
Secur. Commun. Networks, 2015

Provisioning of Inter-Domain QoS-Aware Services.
J. Comput. Sci. Technol., 2015

Improving network security monitoring for industrial control systems.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

2014
A Distributed IDS for Industrial Control Systems.
Int. J. Cyber Warf. Terror., 2014

A Survey of Cloud Computing Migration Issues and Frameworks.
Proceedings of the New Perspectives in Information Systems and Technologies, 2014

Keeping an Eye on Your Security Through Assurance Indicators.
Proceedings of the SECRYPT 2014, 2014

A Comparison of Classification Techniques for Detection of VoIP Traffic.
Proceedings of the Eighth International Conference on Next Generation Mobile Apps, 2014

Towards a High Performance DNSaaS Deployment.
Proceedings of the Mobile Networks and Management - 6th International Conference, 2014

Software-Defined Networking: Guidelines for Experimentation and Validation in Large-Scale Real World Scenarios.
Proceedings of the Artificial Intelligence Applications and Innovations, 2014

The QueuePusher: Enabling Queue Management in OpenFlow.
Proceedings of the Third European Workshop on Software Defined Networks, 2014

Efficient and secure M2M communications for smart metering.
Proceedings of the 2014 IEEE Emerging Technology and Factory Automation, 2014

2013
A Framework for Internet Media Services Delivery to the Home Environment.
J. Netw. Syst. Manag., 2013

Trust Based Interdependency Weighting for On-Line Risk Monitoring in Interdependent Critical Infrastructures.
Int. J. Secur. Softw. Eng., 2013

On the use of thin-client Set-Top Boxes for IPTV services.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, 2013

An architecture for virtualized home gateways.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

Managed hybrid storage for home and SOHO environments.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

A management framework for residential broadband environments.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

Tutamen: An Integrated Personal Mobile and Adaptable Video Platform for Health and Protection.
Proceedings of the Artificial Intelligence Applications and Innovations, 2013

Approach for service search and peer selection in P2P service overlays.
Proceedings of the International Conference on Information Networking 2013, 2013

2012
Design and implementation of a mediation system enabling secure communication among Critical Infrastructures.
Int. J. Crit. Infrastructure Prot., 2012

Peer Selection in P2P Service Overlays Using Geographical Location Criteria.
Proceedings of the Computational Science and Its Applications - ICCSA 2012, 2012

Using UPnP-CWMP integration for operator-assisted management of domestic LANs.
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012

VoIP performance over mobile WiMAX: An urban deployment analysis.
Proceedings of the 2nd Baltic Congress on Future Internet Communications, 2012

2011
Integrating a Military Air Traffic Control Simulator with an LMS.
Proceedings of the Third International Conference on Games and Virtual Worlds for Serious Applications, 2011

How to provision and manage off-the-shelf SIP phones in domestic and SOHO environments.
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011

QoS adaptation in inter-domain services.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

Performance evaluation of service searching using aggregation in peer-to-peer Service Overlay Networks.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

Assurance and Trust Indicators to Evaluate Accuracy of On-line Risk in Critical Infrastructures.
Proceedings of the Critical Information Infrastructure Security, 2011

Trust based interdependency weighting for on-line risk monitoring in interdependent critical infrastructures.
Proceedings of the CRiSIS 2011, 2011

An approach to peer selection in service overlays.
Proceedings of the 7th International Conference on Network and Service Management, 2011

Outsourced management of home and SOHO Windows desktops.
Proceedings of the 7th International Conference on Network and Service Management, 2011

On the Dimensioning of an Aggregation Service for P2P Service Overlay Networks.
Proceedings of the Managing the Dynamics of Networks and Services, 2011

2010
Trust and reputation management for critical infrastructure protection.
Int. J. Electron. Secur. Digit. Forensics, 2010

MICIE: An Alerting Framework for Interdependent Critical Infrastructures.
Proceedings of the Towards a Service-Based Internet - Third European Conference, 2010

CWMP extensions for enhanced management of domestic network services.
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010

Trust and Reputation for Information Exchange in Critical Infrastructures.
Proceedings of the Critical Information Infrastructures Security, 2010


A service composition approach for inter-domain provisioning.
Proceedings of the 6th International Conference on Network and Service Management, 2010

An aggregation scheme for the optimisation of service search in Peer-to-Peer overlays.
Proceedings of the 6th International Conference on Network and Service Management, 2010

Integration of PXE-based desktop solutions into broadband access networks.
Proceedings of the 6th International Conference on Network and Service Management, 2010

OMAN - A Management Architecture for P2P Service Overlay Networks.
Proceedings of the Mechanisms for Autonomous Management of Networks and Services, 2010

2009
An IPSec Mediation Approach for Safe Establishment of Inter-domain VPNs.
Proceedings of the IP Operations and Management, 9th IEEE International Workshop, 2009

A P2P-Based Approach to Cross-Domain Network and Service Management.
Proceedings of the Scalability of Networks and Services, 2009

2008
QoS management and control for an all-IP WiMAX network architecture: Design, implementation and evaluation.
Mob. Inf. Syst., 2008

WEIRD testbeds with fixed and mobile WiMAX technology for user applications, telemedicine and monitoring of impervious areas.
Proceedings of the 4th International Conference on Testbeds & Research Infrastructures for the DEvelopment of NeTworks & COMmunities (TRIDENTCOM 2008), 2008

A Framework for the establishment of inter-domain, on-demand VPNs.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008

Extending WiMAX to New Scenarios: Key Results on System Architecture and Test-beds of the WEIRD project.
Proceedings of the 4th International ICST Mobile Multimedia Communications Conference, 2008

2006
NSIS-Based Quality of Service and Resource Allocation in Ethernet Networks.
Proceedings of the Wired/Wireless Internet Communications, 4th International Conference, 2006

2005
The use of COPS and NSIS in the EuQoS Project.
Proceedings of the Network Control and Engineering for QoS, 2005

2003
Enabling PreOS Desktop Management.
Proceedings of the Integrated Network Management VII, Managing It All, 2003

2002
A Component-Based Approach for Integrating Mobile Agents Into the Existing Web Infrastructure.
Proceedings of the 2002 Symposium on Applications and the Internet (SAINT 2002), 28 January, 2002

Distributed retrieval of management information: is it about mobility, locality or distribution?
Proceedings of the Management Solutions for the New Communications World, 2002

2001
Towards Manageable Mobile Agent Infrastructures.
Proceedings of the Networking, 2001

Integrating Mobile Agents into Off-the-Shelf Web Servers: the M&M approach.
Proceedings of the 12th International Workshop on Database and Expert Systems Applications (DEXA 2001), 2001

2000
An Authentication Protocol for Mobilde Devices.
Proceedings of the 2000 ICDCS Workshops, April 10, 2000, Taipei, Taiwan, ROC, 2000

1999
JAMES: A Platform of Mobile Agents for the Management of Telecommunication Networks.
Proceedings of the Intelligent Agents for Telecommunication Applications, 1999

Integrating SNMP into a Mobile Agent Infrastructure.
Proceedings of the Active Technologies for Network and Service Management, 1999


  Loading...