Rafael Timóteo de Sousa Júnior

Orcid: 0000-0003-1101-3029

Affiliations:
  • University of Brasília, Brazil


According to our database1, Rafael Timóteo de Sousa Júnior authored at least 159 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Stego-STFAN: A Novel Neural Network for Video Steganography.
Comput., July, 2024

Safeguarding the V2X Pathways: Exploring the Cybersecurity Landscape Through Systematic Review.
IEEE Access, 2024

Requirements Documentation Containing Natural Language: A Systematic Tertiary Literature Review.
Proceedings of the Anais do WER24, 2024

2023
F-NIDS - A Network Intrusion Detection System based on federated learning.
Comput. Networks, November, 2023

Botnet Detection and Mitigation Model for IoT Networks Using Federated Learning.
Sensors, July, 2023

Latin Dances Reloaded: Improved Cryptanalysis Against Salsa and ChaCha, and the Proposal of Forró.
J. Cryptol., July, 2023

Business Process Modeling Supporting the Requirements Elicitation of an Audit System: An Experience Report.
Int. J. Electron. Gov. Res., 2023

F-NIDS - Sistema de Detecção de Intrusão descentralizado com base em Aprendizado Federado.
Proceedings of the 41st Brazilian Symposium on Computer Networks and Distributed Systems, 2023

Multi-Class Text Classification Based in Oversampling for Highly Imbalanced Dataset.
Proceedings of the International Conference on Machine Learning and Applications, 2023

Natural Language Processing Applied in the Context of Economic Defense: A Case Study in a Brazilian Federal Public Administration Agency.
Proceedings of the 25th International Conference on Enterprise Information Systems, 2023

2022
ICT Governance and Management Macroprocesses of a Brazilian Federal Government Agency.
Inf., 2022

Secure Multiparty Computation for Synthetic Data Generation from Distributed Data.
CoRR, 2022

A Conversation-Driven Approach for Chatbot Management.
IEEE Access, 2022

Improving Data Security, Privacy, and Interoperability for the IEEE Biometric Open Protocol Standard.
IEEE Access, 2022

Channel-Based RSA Approaches for QoS Protection of Slices Over Elastic Optical Networks.
IEEE Access, 2022

A Lightweight Unsupervised Learning Architecture to Enhance User Behavior Anomaly Detection.
Proceedings of the IEEE Latin-American Conference on Communications, 2022

Meta-semantic Search Engine Method Proposition for Transparent Decision Auditing.
Proceedings of the 19th International Conference on Smart Business Technologies, 2022

REVS: A Vulnerability Ranking Tool for Enterprise Security.
Proceedings of the 24th International Conference on Enterprise Information Systems, 2022

A study of automatic speech recognition in Portuguese by the Brazilian General Attorney of the Union.
Proceedings of the IEEE International Conference on Data Mining Workshops, 2022

Using spatial data and cluster analysis to automatically detect non-trivial relationships between environmental transgressors.
Proceedings of the IEEE International Conference on Data Mining Workshops, 2022

2021
Validation of Architecture Effectiveness for the Continuous Monitoring of File Integrity Stored in the Cloud Using Blockchain and Smart Contracts.
Sensors, 2021

A Framework for Continuous Authentication Based on Touch Dynamics Biometrics for Mobile Banking Applications.
Sensors, 2021

Tensor based framework for Distributed Denial of Service attack detection.
J. Netw. Comput. Appl., 2021

People management: modelling the work of an ICT team in a coordination and governance organisation of state-owned enterprises.
Int. J. Bus. Process. Integr. Manag., 2021

Noise-Robust Multilayer Perceptron Architecture for Distributed Denial of Service Attack Detection.
IEEE Commun. Lett., 2021

Adversarial attacks on a lexical sentiment analysis classifier.
Comput. Commun., 2021

Evaluating the Performance of NIST's Framework Cybersecurity Controls Through a Constructivist Multicriteria Methodology.
IEEE Access, 2021

Information-Theoretically Secure String Commitments Based on Packet Reordering Channels.
IEEE Access, 2021

Design of an Interactive Mobile Platform to Assist Communities in Voluntary Cooperation to Counter the COVID-19 Outbreak.
Proceedings of the Trends and Applications in Information Systems and Technologies, 2021

Data Science Procedures to Aggregate Unstructured Disease Data in Georeferenced Spreading Analysis.
Proceedings of the Trends and Applications in Information Systems and Technologies, 2021

C*DynaConf: An Apache Cassandra Auto-tuning Tool for Internet of Things Data.
Proceedings of the 6th International Conference on Internet of Things, 2021

Design and Evaluation of a Data Collector and Analyzer to Monitor the COVID-19 and Other Epidemic Outbreaks.
Proceedings of the Information Technology and Systems, 2021

An Applied Risk Identification Approach in the ICT Governance and Management Macroprocesses of a Brazilian Federal Government Agency.
Proceedings of the 23rd International Conference on Enterprise Information Systems, 2021

Evaluating and Evolving the Compliance to the Brazilian General Data Protection Law in a Federal Government Agency.
Proceedings of the Enterprise Information Systems - 23rd International Conference, 2021

Proposal of an Implementation Process for the Brazilian General Data Protection Law (LGPD).
Proceedings of the 23rd International Conference on Enterprise Information Systems, 2021

A Study on APT in IoT Networks.
Proceedings of the 18th International Conference on e-Business, 2021

Challenges Regarding the Compliance with the General Data Protection Law by Brazilian Organizations: A Survey.
Proceedings of the Computational Science and Its Applications - ICCSA 2021, 2021


General Data Protection Law: Observations and Analysis of the Compliance Level of Organizations.
Proceedings of Ongoing Research, Practitioners, Posters, Workshops, and Projects of the International Conference EGOV-CeDEM-ePart 2021, University of Granada, Spain (Hybrid) 7, 2021

2020


Data Security and Trading Framework for Smart Grids in Neighborhood Area Networks.
Sensors, 2020

Error-Robust Distributed Denial of Service Attack Detection Based on an Average Common Feature Extraction Technique.
Sensors, 2020

Anonymous Real-Time Analytics Monitoring Solution for Decision Making Supported by Sentiment Analysis.
Sensors, 2020

Information and Communication Technology (ICT) Governance Processes: A Case Study.
Inf., 2020

Robust tensor-based techniques for antenna array-based GNSS receivers in scenarios with highly correlated multipath components.
Digit. Signal Process., 2020

Tensor-Based Framework With Model Order Selection and High Accuracy Factor Decomposition for Time-Delay Estimation in Dynamic Multipath Scenarios.
IEEE Access, 2020

Securing Instant Messages With Hardware-Based Cryptography and Authentication in Browser Extension.
IEEE Access, 2020

Monitoring File Integrity Using Blockchain and Smart Contracts.
IEEE Access, 2020

The Answer is in the Text: Multi-Stage Methods for Phishing Detection Based on Feature Engineering.
IEEE Access, 2020

From Feature Engineering and Topics Models to Enhanced Prediction Rates in Phishing Detection.
IEEE Access, 2020

Continuous Diffusion Analysis.
IEEE Access, 2020

Front End Application Security: Proposal for a New Approach.
Proceedings of the 22nd International Conference on Enterprise Information Systems, 2020

EvaTalk: A Chatbot System for the Brazilian Government Virtual School.
Proceedings of the 22nd International Conference on Enterprise Information Systems, 2020

Technological Solution Development During the COVID-19 Pandemic: a Case Study in an IoT Lab.
Proceedings of the IEEE Global Conference on Artificial Intelligence and Internet of Things, 2020

Optimization Model for an Individualized IoT Ambient Monitoring and Control System.
Proceedings of the IEEE Global Conference on Artificial Intelligence and Internet of Things, 2020

Performance Evaluation of Software Defined Network Controllers.
Proceedings of the 10th International Conference on Cloud Computing and Services Science, 2020

Improving the Accuracy of Pedestrian Detection in Partially Occluded or Obstructed Scenarios.
Proceedings of the 10th International Conference on Advanced Computer Information Technologies, 2020

2019
Low Cost Antenna Array Based Drone Tracking Device for Outdoor Environments.
Wirel. Commun. Mob. Comput., 2019

Joint DL and UL Channel Estimation for Millimeter Wave MIMO Systems Using Tensor Modeling.
Wirel. Commun. Mob. Comput., 2019

Tensor-Based Subspace Tracking for Time-Delay Estimation in GNSS Multi-Antenna Receivers.
Sensors, 2019

Proposal of an Implementation Methodology of ICT Processes.
Inf., 2019

Tensor-based multiple denoising via successive spatial smoothing, low-rank approximation and reconstruction for <i>R</i>-D sensor array processing.
Digit. Signal Process., 2019

A nested-PARAFAC based approach for target localization in bistatic MIMO radar systems.
Digit. Signal Process., 2019

Low-Complexity and High-Accuracy Semi-blind Joint Channel and Symbol Estimation for Massive MIMO-OFDM.
Circuits Syst. Signal Process., 2019

Set of Usability Heuristics for Quality Assessment of Mobile Applications on Smartphones.
IEEE Access, 2019

Tensor-Based Channel Estimation for Massive MIMO-OFDM Systems.
IEEE Access, 2019

Corrections to "Tensor-Based Channel Estimation for Massive MIMO-OFDM Systems".
IEEE Access, 2019

A Real Data Analysis in an Internet of Things Environment.
Proceedings of the 4th International Conference on Internet of Things, 2019

A Chinese Remainder Theorem Based Perfect Secret Sharing Scheme with Enhanced Secret Range Values Using Tensor Based Operations.
Proceedings of the 13th International Conference on Signal Processing and Communication Systems, 2019

Multidimensional Antenna Array based Framework for Drone Localization in Multipath Environments.
Proceedings of the 13th International Conference on Signal Processing and Communication Systems, 2019

Inference of driver behavior using correlated IoT data from the vehicle telemetry and the driver mobile phone.
Proceedings of the 2019 Federated Conference on Computer Science and Information Systems, 2019

Design of a Distributed HIDS for IoT Backbone Components.
Proceedings of the Preprints of Communication Papers of the 2019 Federated Conference on Computer Science and Information Systems, 2019

2018
Security Architecture and Protocol for Trust Verifications Regarding the Integrity of Files Stored in Cloud Services.
Sensors, 2018

New DoS Defense Method Based on Strong Designated Verifier Signatures.
Sensors, 2018

A synthesis of common guidelines for regulatory compliance verification in the context of ICT governance audits.
Inf. Polity, 2018

Best Practices Kits for the ICT Governance Process within the Secretariat of State-Owned Companies of Brazil and Regarding these Public Companies.
Inf., 2018

NoSQL Database Performance Tuning for IoT Data - Cassandra Case Study.
Proceedings of the 3rd International Conference on Internet of Things, 2018

Spatio-Temporal Trend Analysis of the Brazilian Elections Based on Twitter Data.
Proceedings of the 2018 IEEE International Conference on Data Mining Workshops, 2018

Extended ADDIE Model for improved Distance Learning Courses.
Proceedings of the IEEE Frontiers in Education Conference, 2018

2017
Beamforming in Traffic-Aware Two-Way Relay Systems With Channel Estimation Error and Feedback Delay.
IEEE Trans. Veh. Technol., 2017

Distributed Data Service for Data Management in Internet of Things Middleware.
Sensors, 2017

Offline Mode for Corporate Mobile Client Security Architecture.
Mob. Networks Appl., 2017

Model order selection and eigen similarity based framework for detection and identification of network attacks.
J. Netw. Comput. Appl., 2017

Detection of Electronic Anklet Wearers' Groupings throughout Telematics Monitoring.
ISPRS Int. J. Geo Inf., 2017

Non-orthogonal multiple access schemes with partial relay selection.
IET Commun., 2017

Joint effect of jamming and noise on the secrecy outage performance of wiretap channels with feedback delay and multiple antennas.
Trans. Emerg. Telecommun. Technol., 2017

Security analysis of a proposed internet of things middleware.
Clust. Comput., 2017

A National Identity Management Strategy to Enhance the Brazilian Electronic Government.
CLEI Electron. J., 2017

Secure Cooperative Half-Duplex Cognitive Radio Networks With K-th Best Relay Selection.
IEEE Access, 2017

Increasing the Dependability of IoT Middleware with Cloud Computing and Microservices.
Proceedings of the Companion Proceedings of the 10th International Conference on Utility and Cloud Computing, 2017

Design and Evaluation of a Semantic Gateway Prototype for IoT Networks.
Proceedings of the Companion Proceedings of the 10th International Conference on Utility and Cloud Computing, 2017

Joint effect of jamming and noise in wiretap channels with multiple antennas.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

Antenna array based framework with multipath mitigation for signal emitter detection and localization.
Proceedings of the 11th International Conference on Signal Processing and Communication Systems, 2017

Time-delay estimation via procrustes estimation and Khatri-Rao factorization for GNSS multipath mitigation.
Proceedings of the 11th International Conference on Signal Processing and Communication Systems, 2017

A Technique for Extraction and Analysis of Application Heap Objects within Android Runtime (ART).
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Forensic Analysis of Android Runtime (ART) Application Heap Objects in Emulated and Real Devices.
Proceedings of the Information Systems Security and Privacy, 2017

Elements that Orient the Regulatory Compliance Verification Audits on ICT Governance.
Proceedings of the 18th Annual International Conference on Digital Government Research, 2017

2016
Design and Evaluation of a Services Interface for the Internet of Things.
Wirel. Pers. Commun., 2016

On the Effects of LOS Path and Opportunistic Scheduling in Energy Harvesting Relay Systems.
IEEE Trans. Wirel. Commun., 2016

Leveraging information security and computational trust for cybersecurity.
J. Supercomput., 2016

Secrecy performance of MIMO Nakagami-<i>m</i> wiretap channels with optimal TAS and different antenna schemes.
Trans. Emerg. Telecommun. Technol., 2016

Improved Kalman-based attitude estimation framework for UAVs via an antenna array.
Digit. Signal Process., 2016

Energy harvesting relay systems in mixed Rician and Rayleigh fading: The effects of LOS path component.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016

Concepção e Desenvolvimento de um Serviço Distribuído de Coleta e Tratamento de Dados para Ambientes de Internet das Coisas.
Proceedings of the 31º Simpósio Brasileiro de Banco de Dados, 2016

Evaluation of an Arduino-based IoT Person Counter.
Proceedings of the International Conference on Internet of Things and Big Data, 2016

MISO TAS wiretap channels with jamming and noise at the eavesdropper.
Proceedings of the 23rd International Conference on Telecommunications, 2016

A Proposed Protocol for Periodic Monitoring of Cloud Storage Services Using Trust and Encryption.
Proceedings of the Computational Science and Its Applications - ICCSA 2016, 2016

Motivating attendee's participation in distance learning via an automatic messaging plugin for the moodle platform.
Proceedings of the 2016 IEEE Frontiers in Education Conference, 2016

National strategy of identity management to boost Brazilian electronic government program.
Proceedings of the XLII Latin American Computing Conference, 2016

2015
Statistical Audit via Gaussian Mixture Models in Business Intelligence Systems.
Proceedings of the annual conference on Brazilian Symposium on Information Systems, 2015

Predictive Analytics in Business Intelligence Systems via Gaussian Processes for Regression.
Proceedings of the Knowledge Discovery, Knowledge Engineering and Knowledge Management, 2015

Gaussian Process for Regression in Business Intelligence: A Fraud Detection Application.
Proceedings of the KMIS 2015, 2015

2014
A ubiquitous communication architecture integrating transparent UPnP and REST APIs.
Int. J. Embed. Syst., 2014

Analysis of SDN Contributions for Cloud Computing Security.
Proceedings of the 7th IEEE/ACM International Conference on Utility and Cloud Computing, 2014

Improved Business Intelligence Solution with Reimbursement Tracking System for the Brazilian Ministry of Planning, Budget and Management.
Proceedings of the KMIS 2014, 2014

Sensor Localization via Diversely Polarized Antennas.
Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems, 2014

Secure data storage in distributed cloud environments.
Proceedings of the 2014 IEEE International Conference on Big Data (IEEE BigData 2014), 2014

Evaluation of Space-Time-Frequency (STF)-Coded MIMO-OFDM Systems in Realistic Channel Models.
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014

2013
InfoSecRM: Uma Abordagem Ontológica para a Gestão de Riscos de Segurança da Informação.
Braz. J. Inf. Syst., 2013

Trust-based security for the OLSR routing protocol.
Comput. Commun., 2013

Antenna Array Based Positioning Scheme for Unmanned Aerial Vehicles.
Proceedings of the 17th International ITG Workshop on Smart Antennas, 2013

IoT architecture to enable intercommunication through REST API and UPnP using IP, ZigBee and arduino.
Proceedings of the 9th IEEE International Conference on Wireless and Mobile Computing, 2013

Synchronization for Cooperative MIMO in Wireless Sensor Networks.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networking, 2013

Intelligent and Flexible Manufacturing Product Line Supported by Agents and Wireless Sensor and Actuator Network.
Proceedings of the 7th IFAC Conference on Manufacturing Modelling, Management, and Control, 2013

On the use of order selection rules for accurate parameter estimation in threshold region.
Proceedings of the 21st European Signal Processing Conference, 2013

Iterative prewhitening for multidimensional harmonic retrieval: New variants and comparative study.
Proceedings of the 5th IEEE International Workshop on Computational Advances in Multi-Sensor Adaptive Processing, 2013

Using MIMO Techniques to Enhance Communication Among Static and Mobile Nodes in Wireless Sensor Networks.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

2012
Efficient Fully Simulatable Oblivious Transfer from the McEliece Assumptions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

File Exchange in Cloud.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Architecture of a Collaborative Business Intelligence Environment based on an Ontology Repository and Distributed Data Services.
Proceedings of the KMIS 2012, 2012

Trust model for private cloud.
Proceedings of the 2012 International Conference on Cyber Security, 2012

File Exchange in a Private Cloud Supported by a Trust Model.
Proceedings of the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2012

Ontologic audit trails mapping for detection of irregularities in payrolls.
Proceedings of the Fourth International Conference on Computational Aspects of Social Networks, 2012

Construction of Ontologies by Using Concept Maps: A Study Case of Business Intelligence for the Federal Property Department.
Proceedings of the Fifth International Conference on Business Intelligence and Financial Engineering, 2012

2011
Multi-dimensional model order selection.
EURASIP J. Adv. Signal Process., 2011

Subspace based multi-dimensional model order selection in colored noise scenarios.
Proceedings of the 2011 IEEE Information Theory Workshop, 2011

2009
Trust-Based Countermeasures for Securing OLSR Protocol.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
Effectiveness of Trust Reasoning for Attack Detection in OLSR.
Proceedings of the Security in Information Systems, 2008

Autonomic trust reasoning enables misbehavior detection in OLSR.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

Model for Trust within Information Technology Management.
Proceedings of the ICEIS 2008, 2008

Enhancing an Integer Challenge-Response Protocol.
Proceedings of the Computational Science and Its Applications - ICCSA 2008, International Conference, Perugia, Italy, June 30, 2008

2007
Integrating trust reasonings into node behavior in olsr.
Proceedings of the Q2SWinet'07, 2007

Analysis of the implicit trust within the OLSR protocol.
Proceedings of the Trust Management, 2007

2006
On the Anomaly Intrusion-Detection in Mobile Ad Hoc Network Environments.
Proceedings of the Personal Wireless Communications, 2006

Proposal of a System for Searching and Indexing Heterogeneous Vulnerabilities Databases.
Proceedings of the Computational Science and Its Applications, 2006

2005
MANET - Auto Configuration with Distributed Certification Authority models Considering Routing Protocols Usage.
Proceedings of the Security in Information Systems, 2005

SisBrAV - Brazilian Vulnerability Alert System.
Proceedings of the Security in Information Systems, 2005

2004
A fully distributed IDS for MANET.
Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28, 2004

Preventive and Corrective Protection for Mobile Ad Hoc Network Routing Protocols.
Proceedings of the Wireless On-Demand Network Systems, First IFIP TC6 Working Conference, 2004

Load Balancing and Survivability for Network Services Based on Intelligent Agents.
Proceedings of the Computational Science and Its Applications, 2004

Authentication and Autoconfiguration for MANET Nodes.
Proceedings of the Embedded and Ubiquitous Computing, 2004

Survivability for a Network Service and Load Balancing Using Intelligent Agents Software.
Proceedings of the Embedded and Ubiquitous Computing, 2004

A Secure Autoconfiguration Protocol for MANET Nodes.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks: Third International Conference, 2004

2003
Certification and Authentication Services for Securing MANET Routing Protocols.
Proceedings of the Mobile and Wireless Communications Networks, 2003

A Modular Architecture for Distributed IDS in MANET.
Proceedings of the Computational Science and Its Applications, 2003

Implementation of Diffserv/MPLS QOS Laboratory and the WWW Application Allowing its Usage as a Virtual Learning Environment.
Proceedings of the IADIS International Conference WWW/Internet 2003, 2003

A Multiagent Architecture for Information Retrieval in Distributed and Heterogeneous Data Sources.
Proceedings of the IADIS International Conference WWW/Internet 2003, 2003

2002
Webquest: An Internet Based Collaborative Learning Environment.
Proceedings of the IADIS International Conference WWW/Internet 2002, 2002


  Loading...