Tiago Cruz

Orcid: 0000-0001-9278-6503

Affiliations:
  • University of Coimbra, Department of Informatics Engineering, Portugal (PhD 2013)


According to our database1, Tiago Cruz authored at least 61 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Container-based Virtualization for Real-time Industrial Systems - A Systematic Review.
ACM Comput. Surv., March, 2024

A Survey on Forensics and Compliance Auditing for Critical Infrastructure Protection.
IEEE Access, 2024

2023
A forensics and compliance auditing framework for critical infrastructure protection.
Int. J. Crit. Infrastructure Prot., September, 2023

Using KNX-Based Building Automation and Control Systems for Data Exfiltration.
IEEE Internet Things J., August, 2023

Testing the limits of general-purpose hypervisors for real-time control systems.
Microprocess. Microsystems, June, 2023

Smart Substation Communications and Cybersecurity: A Comprehensive Survey.
IEEE Commun. Surv. Tutorials, 2023

A Network Intrusion Detection System for Building Automation and Control Systems.
IEEE Access, 2023

Intrusion and Anomaly Detection in Industrial Automation and Control Systems.
Proceedings of the NOMS 2023, 2023

Network Failures in Cloud Management Platforms: A Study on OpenStack.
Proceedings of the 13th International Conference on Cloud Computing and Services Science, 2023

2022
Real-time task latency in general-purpose hypervisors - testing the limits.
Dataset, June, 2022

Denial of Service and Man in The Middle attacks in Programmable Logic Controllers.
Dataset, May, 2022

A Dataset Bundle for Building Automation and Control Systems Security Analysis.
Dataset, January, 2022

An automated closed-loop framework to enforce security policies from anomaly detection.
Comput. Secur., 2022

Security of Building Automation and Control Systems: Survey and future research directions.
Comput. Secur., 2022

2021
Intrusion and anomaly detection for the next-generation of industrial automation and control systems.
Future Gener. Comput. Syst., 2021

An ELEGANT dataset with Denial of Service and Man in The Middle attacks.
CoRR, 2021

ELEGANT: Security of Critical Infrastructures With Digital Twins.
IEEE Access, 2021

Virtualizing Customer Premises Equipment.
Proceedings of the 2021 IEEE Conference on Network Function Virtualization and Software Defined Networks, 2021

2020
Teaching the process of building an Intrusion Detection System using data from a small-scale SCADA testbed.
Internet Technol. Lett., 2020

Adversarial Machine Learning Applied to Intrusion and Malware Scenarios: A Systematic Review.
IEEE Access, 2020

SDN-assisted containerized security and monitoring components.
Proceedings of the NOMS 2020, 2020

2019
Cyber-security Modbus ICS dataset.
Dataset, January, 2019

From Detecting Cyber-Attacks to Mitigating Risk Within a Hybrid Environment.
IEEE Syst. J., 2019

A stealth monitoring mechanism for cyber-physical systems.
Int. J. Crit. Infrastructure Prot., 2019

Virtualization of Residential Gateways: A Comprehensive Survey.
IEEE Commun. Surv. Tutorials, 2019

A Comprehensive Security Analysis of a SCADA Protocol: From OSINT to Mitigation.
IEEE Access, 2019

Analyzing the Footprint of Classifiers in Adversarial Denial of Service Contexts.
Proceedings of the Progress in Artificial Intelligence, 2019

2018
Editorial: Industrial Internet of Things (I2oT).
Mob. Networks Appl., 2018

Integrated protection of industrial control systems from cyber-attacks: the ATENA approach.
Int. J. Crit. Infrastructure Prot., 2018

Cyber security of critical infrastructures.
ICT Express, 2018

Current and Future Trends in Mobile Device Forensics: A Survey.
ACM Comput. Surv., 2018

Mobile Forensic Data Analysis: Suspicious Pattern Detection in Mobile Evidence.
IEEE Access, 2018

Using Low Cost Embedded Systems for Respiratory Sounds Auscultation.
Proceedings of the 15th International Symposium on Wireless Communication Systems, 2018

SDN-Enabled Virtual Data Diode.
Proceedings of the Computer Security - ESORICS 2018 International Workshops, 2018

Denial of Service Attacks: Detecting the Frailties of Machine Learning Algorithms in the Classification Process.
Proceedings of the Critical Information Infrastructures Security, 2018

2017
A Novel Intrusion Detection Mechanism for SCADA systems which Automatically Adapts to Network Topology Changes.
EAI Endorsed Trans. Ind. Networks Intell. Syst., 2017

Attacking SCADA systems: A practical perspective.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017

Fuzzy System-Based Suspicious Pattern Detection in Mobile Forensic Evidence.
Proceedings of the Digital Forensics and Cyber Crime - 9th International Conference, 2017

Building an NFV-based vRGW: Lessons learned.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017

2016
A Cybersecurity Detection Framework for Supervisory Control and Data Acquisition Systems.
IEEE Trans. Ind. Informatics, 2016

Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems.
J. Inf. Secur. Appl., 2016

Virtualizing Programmable Logic Controllers: Toward a Convergent Approach.
IEEE Embed. Syst. Lett., 2016

Effect of Network Architecture Changes on OCSVM Based Intrusion Detection System.
Proceedings of the Industrial Networks and Intelligent Systems, 2016

Evolving L-Systems with Musical Notes.
Proceedings of the Evolutionary and Biologically Inspired Music, Sound, Art and Design, 2016

2015
Cooperative security management for broadband network environments.
Secur. Commun. Networks, 2015

Improving network security monitoring for industrial control systems.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

2014
A Distributed IDS for Industrial Control Systems.
Int. J. Cyber Warf. Terror., 2014

Keeping an Eye on Your Security Through Assurance Indicators.
Proceedings of the SECRYPT 2014, 2014

A Comparison of Classification Techniques for Detection of VoIP Traffic.
Proceedings of the Eighth International Conference on Next Generation Mobile Apps, 2014

Efficient and secure M2M communications for smart metering.
Proceedings of the 2014 IEEE Emerging Technology and Factory Automation, 2014

2013
A Framework for Internet Media Services Delivery to the Home Environment.
J. Netw. Syst. Manag., 2013

On the use of thin-client Set-Top Boxes for IPTV services.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, 2013

An architecture for virtualized home gateways.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

Managed hybrid storage for home and SOHO environments.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

A management framework for residential broadband environments.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

2012
Using UPnP-CWMP integration for operator-assisted management of domestic LANs.
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012

2011
How to provision and manage off-the-shelf SIP phones in domestic and SOHO environments.
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011

Outsourced management of home and SOHO Windows desktops.
Proceedings of the 7th International Conference on Network and Service Management, 2011

2010
CWMP extensions for enhanced management of domestic network services.
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010

Integration of PXE-based desktop solutions into broadband access networks.
Proceedings of the 6th International Conference on Network and Service Management, 2010

2003
Enabling PreOS Desktop Management.
Proceedings of the Integrated Network Management VII, Managing It All, 2003


  Loading...