Virginia N. L. Franqueira

According to our database1, Virginia N. L. Franqueira authored at least 32 papers between 2007 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
Towards Sound Forensic Arguments: Structured Argumentation Applied to Digital Forensics Practice.
Digit. Investig., 2020

2019
Behavioural Digital Forensics Model: Embedding Behavioural Evidence Analysis into the Investigation of Digital Crimes.
Digit. Investig., 2019

A Survey of Deep Learning Solutions for Multimedia Visual Content Analysis.
IEEE Access, 2019

WVD: A New Synthetic Dataset for Video-Based Violence Detection.
Proceedings of the Artificial Intelligence XXXVI, 2019

Privacy verification of PhotoDNA based on machine learning.
Proceedings of the Security and Privacy for Big Data, Cloud Computing and Applications, 2019

2018
Man-In-The-Middle Attacks in Vehicular Ad-Hoc Networks: Evaluating the Impact of Attackers' Strategies.
Sensors, 2018

Investigation of Indecent Images of Children cases: Challenges and suggestions collected from the trenches.
Digit. Investig., 2018

TEAM: A Trust Evaluation and Management Framework in Context-Enabled Vehicular Ad-Hoc Networks.
IEEE Access, 2018

Analytical Tools for Blockchain: Review, Taxonomy and Open Challenges.
Proceedings of the 2018 International Conference on Cyber Security and Protection of Digital Services, 2018

Blockchain-Based Distributed Marketplace.
Proceedings of the Business Information Systems Workshops, 2018

2017
Verifiable Public Key Encryption Scheme With Equality Test in 5G Networks.
IEEE Access, 2017

Faith in Vehicles: A Set of Evaluation Criteria for Trust Management in Vehicular Ad-Hoc Network.
Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2017

On Locky Ransomware, Al Capone and Brexit.
Proceedings of the Digital Forensics and Cyber Crime - 9th International Conference, 2017

2016
Forensic investigation of cyberstalking cases using Behavioural Evidence Analysis.
Digit. Investig., 2016

Forensically-Sound Analysis of Security Risks of Using Local Password Managers.
Proceedings of the 24th IEEE International Requirements Engineering Conference, 2016

2015
Automated analysis of security requirements through risk-based argumentation.
J. Syst. Softw., 2015

Factors Influencing Digital Forensic Investigations: Empirical Evaluation of 12 Years of Dubai Police Cases.
J. Digit. Forensics Secur. Law, 2015

Behavioural Evidence Analysis Applied to Digital Forensics: An Empirical Analysis of Child Pornography Cases Using P2P Networks.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

Challenges of Data Provenance for Cloud Forensic Investigations.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Introduction to Special Issue on Risk and Trust in Embedded Critical Systems.
ACM Trans. Embed. Comput. Syst., 2014

2013
Engineering Security Agreements Against External Insider Threat.
Inf. Resour. Manag. J., 2013

2012
Role-Based Access Control in Retrospect.
Computer, 2012

2011
OpenArgue: Supporting argumentation to evolve secure software systems.
Proceedings of the RE 2011, 19th IEEE International Requirements Engineering Conference, Trento, Italy, August 29 2011, 2011

Risk and argument: A risk-based argumentation method for practical security.
Proceedings of the RE 2011, 19th IEEE International Requirements Engineering Conference, Trento, Italy, August 29 2011, 2011

Towards agile security risk management in RE and beyond.
Proceedings of the First International Workshop on Empirical Requirements Engineering, 2011

2010
Quantifying security risk level from CVSS estimates of frequency and impact.
J. Syst. Softw., 2010

Using Real Option Thinking to Improve Decision Making in Security Investment.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2010, 2010

External Insider Threat: A Real Security Challenge in Enterprise Value Webs.
Proceedings of the ARES 2010, 2010

2009
Multi-step attack modelling and simulation (MsAMS) framework based on mobile ambients.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

Estimating ToE Risk Level Using CVSS.
Proceedings of the The Forth International Conference on Availability, 2009

A Mobile Ambients-Based Approach for Network Attack Modelling and Simulation.
Proceedings of the The Forth International Conference on Availability, 2009

2007
Vulnerability Assessment by Learning Attack Specifications in Graphs.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007


  Loading...