publications
updated list in DBLP
2025
- Evaluation of time-based virtual machine migration as moving target defense against host-based attacksJournal of Systems and Software, 2025
2024
- A Large Scale Issue Report Dataset (Distinguished Paper Award)In 19th European Dependable Computing Conference, EDCC 2024, Leuven, Belgium, April 8-11, 2024
2023
- Detecting Anomalies Through Sequential Performance Analysis in Virtualized EnvironmentsIEEE Access, 2023
- Security Evaluation of Authentication Requirements in IoT GatewaysJ. Netw. Syst. Manag., 2023
- Trustworthiness models to categorize and prioritize code for security improvementJ. Syst. Softw., 2023
- Online Failure Prediction for Complex Systems: Methodology and Case StudiesIEEE Trans. Dependable Secur. Comput., 2023
- Techniques and Tools for Runtime Security Monitoring and Analysis of MicroservicesIn 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2023 - Supplemental Volume, Porto, Portugal, June 27-30, 2023
- Intrusion Injection for Virtualized Systems: Concepts and ApproachIn 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, DSN 2023, Porto, Portugal, June 27-30, 2023
- Exploring Logic Scoring of Preference for DoS Attack Detection in Microservice ApplicationsIn IEEE International Conference on Web Services, ICWS 2023, Chicago, IL, USA, July 2-8, 2023
- Generating Realistic Attack Data for Microservices: Framework and Case StudyIn 12th Latin-American Symposium on Dependable and Secure Computing, LADC 2023, La Paz, Bolivia, October 16-18, 2023
- Leveraging Time Series Autocorrelation Through Numerical Differentiation for Improving Failure PredictionIn 12th Latin-American Symposium on Dependable and Secure Computing, LADC 2023, La Paz, Bolivia, October 16-18, 2023
- Evaluation of Machine Learning for Intrusion Detection in Microservice ApplicationsIn 12th Latin-American Symposium on Dependable and Secure Computing, LADC 2023, La Paz, Bolivia, October 16-18, 2023
- Are safety-critical systems really survivable to attacks?In IEEE International Systems Conference, SysCon 2023, Vancouver, BC, Canada, April 17-20, 2023
2022
- Model-Based Performability and Dependability Evaluation of a System with VM Migration as Rejuvenation in the Presence of Bursty WorkloadsJ. Netw. Syst. Manag., 2022
- Guidelines for Artifacts to Support Industry-Relevant Research on Self-AdaptationACM SIGSOFT Softw. Eng. Notes, 2022
- A Multi-Criteria Analysis of Benchmark Results With Expert Support for Security ToolsIEEE Trans. Dependable Secur. Comput., 2022
- A Dataset of Linux Failure Data for Dependability Evaluation and ImprovementIn 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN Workshops 2022, Baltimore, MD, USA, June 27-30, 2022, 2022
- On the Applicability of Machine Learning-based Online Failure Prediction for Modern Complex SystemsIn 18th European Dependable Computing Conference, EDCC 2022, Zaragoza, Spain, September 12-15, 2022
- Software Rejuvenation Meets Moving Target Defense: Modeling of Time-Based Virtual Machine Migration ApproachIn IEEE 33rd International Symposium on Software Reliability Engineering, ISSRE 2022, Charlotte, NC, USA, October 31 - Nov. 3, 2022
- On the Use of Deep Graph CNN to Detect Vulnerable C FunctionsIn Proceedings of the 11th Latin-American Symposium on Dependable Computing, LADC 2022, Fortaleza/CE, Brazil, November 21-24, 2022
- Compliance Evaluation of Cryptographic Security Requirements on IoT GatewaysIn Proceedings of the 11th Latin-American Symposium on Dependable Computing, LADC 2022, Fortaleza/CE, Brazil, November 21-24, 2022
- Detecting DoS Attacks in Microservice Applications: Approach and Case StudyIn Proceedings of the 11th Latin-American Symposium on Dependable Computing, LADC 2022, Fortaleza/CE, Brazil, November 21-24, 2022
- On the use of the TMA Framework to promote self-adaptation capabilities in TalkConnectIn Proceedings of the 11th Latin-American Symposium on Dependable Computing, LADC 2022, Fortaleza/CE, Brazil, November 21-24, 2022
- A Software Vulnerability Dataset of Large Open Source C/C++ ProjectsIn 27th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2022, Beijing, China, November 28 - Dec. 1, 2022
- Guidelines for Artifacts to Support Industry-Relevant Research on Self-AdaptationCoRR, 2022
2021
- Characterizing Buffer Overflow Vulnerabilities in Large C/C++ ProjectsIEEE Access, 2021
- Security Requirements and Solutions for IoT Gateways: A Comprehensive StudyIEEE Internet Things J., 2021
- Data Processing on Edge and Cloud: A Performability Evaluation and Sensitivity AnalysisJ. Netw. Syst. Manag., 2021
- Machine Learning to Combine Static Analysis Alerts with Software Metrics to Detect Security Vulnerabilities: An Empirical StudyIn 17th European Dependable Computing Conference, EDCC 2021, Munich, Germany, September 13-16, 2021
- An Empirical Study On Software Metrics and Machine Learning to Identify Untrustworthy CodeIn 17th European Dependable Computing Conference, EDCC 2021, Munich, Germany, September 13-16, 2021
- VM Migration Scheduling as Moving Target Defense against Memory DoS Attacks: An Empirical StudyIn IEEE Symposium on Computers and Communications, ISCC 2021, Athens, Greece, September 5-8, 2021
- PyMTDEvaluator: A Tool for Time-Based Moving Target Defense Evaluation: Tool description paperIn 32nd IEEE International Symposium on Software Reliability Engineering, ISSRE 2021, Wuhan, China, October 25-28, 2021
- On Building a Vulnerability Dataset with Static Information from the Source CodeIn 10th Latin-American Symposium on Dependable Computing, LADC 2021, Florianópolis, Brazil, November 22-26, 2021
- Analysis of VM migration scheduling as moving target defense against insider attacksIn SAC ’21: The 36th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, Republic of Korea, March 22-26, 2021
2020
- Vulnerable Code Detection Using Software Metrics and Machine LearningIEEE Access, 2020
- Moving target defense in cloud computing: A systematic mapping studyComput. Secur., 2020
- An approach for benchmarking the security of web service frameworksFuture Gener. Comput. Syst., 2020
- Availability and reliability modeling of VM migration as rejuvenation on a system under varying workloadSoftw. Qual. J., 2020
- An Availability Model for DSS and OLTP Applications in Virtualized EnvironmentsIn 16th European Dependable Computing Conference, EDCC 2020, Munich, Germany, September 7-10, 2020
- On the Use of Open-Source C/C++ Static Analysis Tools in Large ProjectsIn 16th European Dependable Computing Conference, EDCC 2020, Munich, Germany, September 7-10, 2020
- A platform to enable self-adaptive cloud applications using trustworthiness propertiesIn SEAMS ’20: IEEE/ACM 15th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, Seoul, Republic of Korea, 29 June - 3 July, 2020
- A Model-Based Approach to Anomaly Detection Trading Detection Time and False Alarm RateIn Mediterranean Communication and Computer Networking Conference, MedComNet 2020, Arona, Italy, June 17-19, 2020
- Security and Availability Modeling of VM Migration as Moving Target DefenseIn 25th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2020, Perth, Australia, December 1-4, 2020
- On Configuring a Testbed for Dependability Experiments: Guidelines and Fault Injection Case StudyIn Computer Safety, Reliability, and Security - 39th International Conference, SAFECOMP 2020, Lisbon, Portugal, September 16-18, 2020, Proceedings, 2020
- A Model-Based Approach to Anomaly Detection Trading Detection Time and False Alarm RateCoRR, 2020
2019
- An Integrated Big and Fast Data Analytics Platform for Smart Urban Transportation ManagementIEEE Access, 2019
- A Model for Availability and Security Risk Evaluation for Systems With VMM Rejuvenation Enabled by VM Migration SchedulingIEEE Access, 2019
- Improving Failure Prediction by Ensembling the Decisions of Machine Learning Models: A Case StudyIEEE Access, 2019
- An empirical study on combining diverse static analysis tools for web security vulnerabilities based on development scenariosComputing, 2019
- BIGSEA: A Big Data analytics platform for public transportation informationFuture Gener. Comput. Syst., 2019
- Understanding How to Use Static Analysis Tools for Detecting Cryptography Misuse in SoftwareIEEE Trans. Reliab., 2019
- An Experimental Study of Software Aging and Rejuvenation in DockerdIn 15th European Dependable Computing Conference, EDCC 2019, Naples, Italy, September 17-20, 2019
- A Hierarchical Model for Virtualized Data Center Availability EvaluationIn 15th European Dependable Computing Conference, EDCC 2019, Naples, Italy, September 17-20, 2019
- Propheticus: Machine Learning Framework for the Development of Predictive Models for Reliable and Secure SoftwareIn 30th IEEE International Symposium on Software Reliability Engineering, ISSRE 2019, Berlin, Germany, October 28-31, 2019
- Trustworthiness Assessment of Web Applications: Approach and Experimental Study using Input Validation Coding PracticesIn 30th IEEE International Symposium on Software Reliability Engineering, ISSRE 2019, Berlin, Germany, October 28-31, 2019
- An Exploratory Study on Machine Learning to Combine Security Vulnerability Alerts from Static Analysis ToolsIn 9th Latin-American Symposium on Dependable Computing, LADC 2019, Natal, Brazil, November 19-21, 2019
- IaaS Cloud Availability Planning using Models and Genetic AlgorithmsIn 9th Latin-American Symposium on Dependable Computing, LADC 2019, Natal, Brazil, November 19-21, 2019
- Towards Models for Availability and Security Evaluation of Cloud Computing with Moving Target DefenseCoRR, 2019
2018
- A Europe-Brazil Context for Secure Data Analytics in the CloudIEEE Secur. Priv., 2018
- Fog orchestration for the Internet of Everything: state-of-the-art and research challengesJ. Internet Serv. Appl., 2018
- Introduction to the special issue on software reliability engineeringJ. Syst. Softw., 2018
- Toward characterizing HTML defects on the WebSoftw. Pract. Exp., 2018
- Benchmarking Static Analysis Tools for Web SecurityIEEE Trans. Reliab., 2018
- Exploratory Study of Machine Learning Techniques for Supporting Failure PredictionIn 14th European Dependable Computing Conference, EDCC 2018, Iaşi, Romania, September 10-14, 2018
- Finding SQL Injection and Cross Site Scripting Vulnerabilities with Diverse Static Analysis ToolsIn 14th European Dependable Computing Conference, EDCC 2018, Iaşi, Romania, September 10-14, 2018
- GIS and Data: Three applications to enhance MobilityIn XIX Brazilian Symposium on Geoinformatics - GEOINFO 2018, Campina Grande, PB, Brazil, December 5-7, 2018
- Interacting SRN Models for Availability Evaluation of VM Migration as Rejuvenation on a System under Varying WorkloadIn 2018 IEEE International Symposium on Software Reliability Engineering Workshops, ISSRE Workshops, Memphis, TN, USA, October 15-18, 2018
- Evaluating the Applicability of Robustness Testing in Virtualized EnvironmentsIn 8th Latin-American Symposium on Dependable Computing, LADC 2018, Foz do Iguaçu, Brazil, October 8-10, 2018
- An Approach for Trustworthiness Benchmarking Using Software MetricsIn 23rd IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2018, Taipei, Taiwan, December 4-7, 2018
- Propheticus: Generalizable Machine Learning FrameworkCoRR, 2018
2017
- Designing vulnerability testing tools for web services: approach, components, and toolsInt. J. Inf. Sec., 2017
- Service-Oriented Architectures for a Flexible and Safe Use of Unmanned Aerial VehiclesIEEE Intell. Transp. Syst. Mag., 2017
- A field study on root cause analysis of defects in space softwareReliab. Eng. Syst. Saf., 2017
- Robustness-Driven Resilience Evaluation of Self-Adaptive Software SystemsIEEE Trans. Dependable Secur. Comput., 2017
- Editorial: Security and Dependability of Cloud Systems and ServicesIEEE Trans. Serv. Comput., 2017
- Editorial: Security and Dependability of Cloud Systems and Services - Part IIIEEE Trans. Serv. Comput., 2017
- PRIVAaaS: privacy approach for a distributed cloud-based data analytics platformsIn Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGRID 2017, Madrid, Spain, May 14-17, 2017, 2017
- On Combining Diverse Static Analysis Tools for Web Security: An Empirical StudyIn 13th European Dependable Computing Conference, EDCC 2017, Geneva, Switzerland, September 4-8, 2017
- An Analysis of OpenStack VulnerabilitiesIn 13th European Dependable Computing Conference, EDCC 2017, Geneva, Switzerland, September 4-8, 2017
- Towards an Approach for Trustworthiness Assessment of Software as a ServiceIn IEEE International Conference on Edge Computing, EDGE 2017, Honolulu, HI, USA, June 25-30, 2017
- Evaluating a Corpus of Root Causes and Measures to Guide RCA Processes in Critical SoftwareIn 18th IEEE International Symposium on High Assurance Systems Engineering, HASE 2017, Singapore, January 12-14, 2017
- INTENSE: INteroperability TEstiNg as a SErviceIn 2017 IEEE International Conference on Web Services, ICWS 2017, Honolulu, HI, USA, June 25-30, 2017
- Practical Evaluation of Static Analysis Tools for Cryptography: Benchmarking Method and Case StudyIn 28th IEEE International Symposium on Software Reliability Engineering, ISSRE 2017, Toulouse, France, October 23-26, 2017
- Software Metrics as Indicators of Security VulnerabilitiesIn 28th IEEE International Symposium on Software Reliability Engineering, ISSRE 2017, Toulouse, France, October 23-26, 2017
- Diversity with intrusion detection systems: An empirical studyIn 16th IEEE International Symposium on Network Computing and Applications, NCA 2017, Cambridge, MA, USA, October 30 - November 1, 2017
2016
- The Perils of Android Security ConfigurationComputer, 2016
- XSX: Lightweight Encryption for Data Warehousing EnvironmentsIn Big Data Analytics and Knowledge Discovery - 18th International Conference, DaWaK 2016, Porto, Portugal, September 6-8, 2016, Proceedings, 2016
- Quantifying the Attack Detection Accuracy of Intrusion Detection Systems in Virtualized EnvironmentsIn 27th IEEE International Symposium on Software Reliability Engineering, ISSRE 2016, Ottawa, ON, Canada, October 23-27, 2016
- Risk Assessment of User-Defined Security Configurations for Android DevicesIn 27th IEEE International Symposium on Software Reliability Engineering, ISSRE 2016, Ottawa, ON, Canada, October 23-27, 2016
- Software for embedded systems: a quality assessment based on improved ODC taxonomyIn Proceedings of the 31st Annual ACM Symposium on Applied Computing, Pisa, Italy, April 4-8, 2016
- Adapting the Orthogonal Defect Classification Taxonomy to the Space DomainIn Computer Safety, Reliability, and Security - 35th International Conference, SAFECOMP 2016, Trondheim, Norway, September 21-23, 2016, Proceedings, 2016
- The 2016 IEEE Services Emerging Technology Track on Dependable and Secure Services (DSS 2016)In IEEE World Congress on Services, SERVICES 2016, San Francisco, CA, USA, June 27 - July 2, 2016
2015
- Evaluating Computer Intrusion Detection Systems: A Survey of Common PracticesACM Comput. Surv., 2015
- Choosing the right NoSQL database for the job: a quality attribute evaluationJ. Big Data, 2015
- A benchmarking process to assess software requirements documentation for space applicationsJ. Syst. Softw., 2015
- Assessing the security of web service frameworks against Denial of Service attacksJ. Syst. Softw., 2015
- A Practical Approach Towards Automatic Testing of Web Services InteroperabilityInt. J. Web Serv. Res., 2015
- Assessing and Comparing Vulnerability Detection Tools for Web Services: Benchmarking Approach and ExamplesIEEE Trans. Serv. Comput., 2015
- Development of Complex Software with Agile MethodIn 2015 Agile Conference, AGILE 2015, National Harbor, MD, USA, August 3-7, 2015
- No SQL in Practice: A Write-Heavy Enterprise ApplicationIn 2015 IEEE International Congress on Big Data, New York City, NY, USA, June 27 - July 2, 2015
- Assessment of Defect Type influence in Complex and Integrated Space Systems: Analysis Based on ODC and ISVV IssuesIn IEEE International Conference on Dependable Systems and Networks Workshops, DSN Workshops 2015, Rio de Janeiro, Brazil, June 22-25, 2015, 2015
- Towards Assessing Representativeness of Fault Injection-Generated Failure Data for Online Failure PredictionIn IEEE International Conference on Dependable Systems and Networks Workshops, DSN Workshops 2015, Rio de Janeiro, Brazil, June 22-25, 2015, 2015
- Studying the Propagation of Failures in SOAsIn IEEE International Conference on Dependable Systems and Networks Workshops, DSN Workshops 2015, Rio de Janeiro, Brazil, June 22-25, 2015, 2015
- Test-Based Interoperability Certification for Web ServicesIn 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2015, Rio de Janeiro, Brazil, June 22-25, 2015
- phpSAFE: A Security Analysis Tool for OOP Web Application PluginsIn 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2015, Rio de Janeiro, Brazil, June 22-25, 2015
- On the Metrics for Benchmarking Vulnerability Detection ToolsIn 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2015, Rio de Janeiro, Brazil, June 22-25, 2015
- Adaptive Failure Prediction for Computer Systems: A Framework and a Case StudyIn 16th IEEE International Symposium on High Assurance Systems Engineering, HASE 2015, Daytona Beach, FL, USA, January 8-10, 2015
- Evaluation of Intrusion Detection Systems in Virtualized Environments Using Attack InjectionIn Research in Attacks, Intrusions, and Defenses - 18th International Symposium, RAID 2015, Kyoto, Japan, November 2-4, 2015, Proceedings, 2015
- Requirements, design and evaluation of a privacy reference architecture for web applications and servicesIn Proceedings of the 30th Annual ACM Symposium on Applied Computing, Salamanca, Spain, April 13-17, 2015
- Characterizing the performance of web service frameworks under security attacksIn Proceedings of the 30th Annual ACM Symposium on Applied Computing, Salamanca, Spain, April 13-17, 2015
- A security configuration assessment for android devicesIn Proceedings of the 30th Annual ACM Symposium on Applied Computing, Salamanca, Spain, April 13-17, 2015
- IEEE Services Visionary Track on Dependable and Secure Services (DSS 2015)In 2015 IEEE World Congress on Services, SERVICES 2015, New York City, NY, USA, June 27 - July 2, 2015
- NoSQL Databases: A Software Engineering PerspectiveIn New Contributions in Information Systems and Technologies - Volume 1 [WorldCIST’15, Azores, Portugal, April 1-3, 2015], 2015
2014
- Penetration Testing for Web ServicesComputer, 2014
- Testing the robustness of controllers for self-adaptive systemsJ. Braz. Comput. Soc., 2014
- Approaches and Challenges in Database Intrusion DetectionSIGMOD Rec., 2014
- Analysis of Field Data on Web Security VulnerabilitiesIEEE Trans. Dependable Secur. Comput., 2014
- Evaluation of Web Security Mechanisms Using Vulnerability & Attack InjectionIEEE Trans. Dependable Secur. Comput., 2014
- A Technique for Deploying Robust Web ServicesIEEE Trans. Serv. Comput., 2014
- A Field Perspective on the Interoperability of Web ServicesIn IEEE International Conference on Services Computing, SCC 2014, Anchorage, AK, USA, June 27 - July 2, 2014
- Understanding Interoperability Issues of Web Service FrameworksIn 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2014, Atlanta, GA, USA, June 23-26, 2014
- Towards a Resilience Benchmarking Description Language for the Context of Satellite Simulators (Short Paper)In 2014 Tenth European Dependable Computing Conference, Newcastle, United Kingdom, May 13-16, 2014
- On the Need for Training Failure Prediction Algorithms in Evolving Software SystemsIn 15th International IEEE Symposium on High-Assurance Systems Engineering, HASE 2014, Miami Beach, FL, USA, January 9-11, 2014
- ITWS: An Extensible Tool for Interoperability Testing of Web ServicesIn 2014 IEEE International Conference on Web Services, ICWS, 2014, Anchorage, AK, USA, June 27 - July 2, 2014
- Experience Report: An Analysis of Hypercall Handler VulnerabilitiesIn 25th IEEE International Symposium on Software Reliability Engineering, ISSRE 2014, Naples, Italy, November 3-6, 2014
- Experience Report: Orthogonal Classification of Safety Critical IssuesIn 25th IEEE International Symposium on Software Reliability Engineering, ISSRE 2014, Naples, Italy, November 3-6, 2014
- Towards Making Safety-Critical Systems Safer: Learning from MistakesIn 25th IEEE International Symposium on Software Reliability Engineering Workshops, ISSRE Workshops, Naples, Italy, November 3-6, 2014
- A Research Agenda for Benchmarking the Resilience of Software Defined NetworksIn 25th IEEE International Symposium on Software Reliability Engineering Workshops, ISSRE Workshops, Naples, Italy, November 3-6, 2014
- A Practical Approach for Generating Failure Data for Assessing and Comparing Failure Prediction AlgorithmsIn 20th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2014, Singapore, November 18-21, 2014
- Empirical resilience evaluation of an architecture-based self-adaptive software systemIn QoSA’14, Proceedings of the 10th International ACM SIGSOFT Conference on Quality of Software Architectures (part of CompArch 2014), Marcq-en-Baroeul, Lille, France, June 30 - July 04, 2014
- Robustness evaluation of the rainbow framework for self-adaptationIn Symposium on Applied Computing, SAC 2014, Gyeongju, Republic of Korea - March 24 - 28, 2014
- IEEE International Workshop on Dependable and Secure Services (DSS 2014)In 2014 IEEE World Congress on Services, SERVICES 2014, Anchorage, AK, USA, June 27 - July 2, 2014
- A Practical Experience on the Impact of Plugins in Web SecurityIn 33rd IEEE International Symposium on Reliable Distributed Systems, SRDS 2014, Nara, Japan, October 6-9, 2014
- Technical Information on Vulnerabilities of Hypercall HandlersCoRR, 2014
- On Benchmarking Intrusion Detection Systems in Virtualized EnvironmentsCoRR, 2014
2013
- Architecture-based resilience evaluation for self-adaptive systemsComputing, 2013
- SOA-Scanner: An Integrated Tool to Detect Vulnerabilities in Service-Based InfrastructuresIn 2013 IEEE International Conference on Services Computing, Santa Clara, CA, USA, June 28 - July 3, 2013
- A Specific Encryption Solution for Data WarehousesIn Database Systems for Advanced Applications, 18th International Conference, DASFAA 2013, Wuhan, China, April 22-25, 2013. Proceedings, Part II, 2013
- An XML-Based Policy Model for Access Control in Web ApplicationsIn Database and Expert Systems Applications - 24th International Conference, DEXA 2013, Prague, Czech Republic, August 26-29, 2013. Proceedings, Part II, 2013
- SCoRe: An across-the-board metric for computer systems resilience benchmarkingIn 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, DSN Workshops 2013, Budapest, Hungary, June 24-27, 2013
- Towards evaluating the impact of data quality on service applicationsIn 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, DSN Workshops 2013, Budapest, Hungary, June 24-27, 2013
- A view on the past and future of fault injectionIn 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Budapest, Hungary, June 24-27, 2013
- Certification of embedded systems: Quantitative analysis and irrefutable evidencesIn IEEE 24th International Symposium on Software Reliability Engineering, ISSRE 2013, Pasadena, CA, USA, November 4-7, 2013 - Supplemental Proceedings, 2013
- A monitoring and testing framework for critical off-the-shelf applications and servicesIn IEEE 24th International Symposium on Software Reliability Engineering, ISSRE 2013, Pasadena, CA, USA, November 4-7, 2013 - Supplemental Proceedings, 2013
- Robustness Evaluation of Controllers in Self-Adaptive Software SystemsIn Sixth Latin-American Symposium on Dependable Computing, LADC 2013, Rio de Janeiro, Brazil, April 1-5, 2013
- The Time Dimension in Predicting Failures: A Case StudyIn Sixth Latin-American Symposium on Dependable Computing, LADC 2013, Rio de Janeiro, Brazil, April 1-5, 2013
- Assessing the Impact of Virtualization on the Generation of Failure Prediction DataIn Sixth Latin-American Symposium on Dependable Computing, LADC 2013, Rio de Janeiro, Brazil, April 1-5, 2013
- HLA Middleware Robustness and Scalability Evaluation in the Context of Satellite SimulatorsIn IEEE 19th Pacific Rim International Symposium on Dependable Computing, PRDC 2013, Vancouver, BC, Canada, December 2-4, 2013
2012
- Defending against Web Application VulnerabilitiesComputer, 2012
- A robustness testing approach for SOAP Web servicesJ. Internet Serv. Appl., 2012
- Experimental Evaluation of Web Service Frameworks in the Presence of Security AttacksIn 2012 IEEE Ninth International Conference on Services Computing, Honolulu, HI, USA, June 24-29, 2012
- Leveraging 24/7 Availability and Performance for Distributed Real-Time Data WarehousesIn 36th Annual IEEE Computer Software and Applications Conference, COMPSAC 2012, Izmir, Turkey, July 16-20, 2012
- Evaluating the Feasibility Issues of Data Confidentiality Solutions from a Data Warehousing PerspectiveIn Data Warehousing and Knowledge Discovery - 14th International Conference, DaWaK 2012, Vienna, Austria, September 3-6, 2012. Proceedings, 2012
- Changeloads for Resilience Benchmarking of Self-Adaptive Systems: A Risk-Based ApproachIn 2012 Ninth European Dependable Computing Conference, Sibiu, Romania, May 8-11, 2012
- Applying Data Mining for Detecting Anomalies in SatellitesIn 2012 Ninth European Dependable Computing Conference, Sibiu, Romania, May 8-11, 2012
- DBMS Application Layer Intrusion Detection for Data WarehousesIn Building Sustainable Information Systems, Proceedings of the 2012 International Conference on Information Systems Development, ISD 2012, Monash University Prato Centre, Prato, Italy, August 29-30, 2012, 2012
- Detecting Vulnerabilities in Service Oriented ArchitecturesIn 23rd IEEE International Symposium on Software Reliability Engineering Workshops, ISSRE Workshops, Dallas, TX, USA, November 27-30, 2012
- Evaluating and Improving Penetration Testing in Web ServicesIn 23rd IEEE International Symposium on Software Reliability Engineering, ISSRE 2012, Dallas, TX, USA, November 27-30, 2012
- Towards a Framework to Evaluate and Improve the Quality of Implementation of CMMI\textregistered PracticesIn Product-Focused Software Process Improvement - 13th International Conference, PROFES 2012, Madrid, Spain, June 13-15, 2012 Proceedings, 2012
- Lessons Learnt in the Implementation of CMMI Maturity Level 5In 8th International Conference on the Quality of Information and Communications Technology, QUATIC 2012, Lisbon, Portugal, 2-6 September 2012, Proceedings, 2012
- Changeloads: A Fundamental Piece on the SASO Systems Benchmarking PuzzleIn Sixth IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops, SASOW 2012, Lyon, France, September 10-14, 2012
- Incorporating Recovery from Failures into a Data Integration BenchmarkIn Selected Topics in Performance Evaluation and Benchmarking - 4th TPC Technology Conference, TPCTC 2012, Istanbul, Turkey, August 27, 2012, Revised Selected Papers, 2012
- Securing Data Warehouses from Web-Based IntrusionsIn Web Information Systems Engineering - WISE 2012 - 13th International Conference, Paphos, Cyprus, November 28-30, 2012. Proceedings, 2012
- Field Studies on Resilience: Measurements and RepositoriesIn Resilience Assessment and Evaluation of Computing Systems, 2012
- Fault InjectionIn Resilience Assessment and Evaluation of Computing Systems, 2012
- Resilience BenchmarkingIn Resilience Assessment and Evaluation of Computing Systems, 2012
- Robustness Testing Techniques and ToolsIn Resilience Assessment and Evaluation of Computing Systems, 2012
- Resilience Assessment and Evaluation of Computing Systems2012
- EDCC 2012 - Fast Abstracts & Student Forum ProceedingsCoRR, 2012
2011
- Selecting Secure Web Applications Using Trustworthiness BenchmarkingInt. J. Dependable Trust. Inf. Syst., 2011
- Security Gaps in Databases: A Comparison of Alternative Software Products for Web Applications SupportInt. J. Secur. Softw. Eng., 2011
- Selecting Software Packages for Secure Database InstallationsIn Sixth International Conference on Availability, Reliability and Security, ARES 2011, Vienna, Austria, August 22-26, 2011
- Trustworthiness Benchmarking of Web Applications Using Static Code AnalysisIn Sixth International Conference on Availability, Reliability and Security, ARES 2011, Vienna, Austria, August 22-26, 2011
- Enhancing Penetration Testing with Attack Signatures and Interface Monitoring for the Detection of Injection Vulnerabilities in Web ServicesIn IEEE International Conference on Services Computing, SCC 2011, Washington, DC, USA, 4-9 July, 2011
- A Composed Approach for Automatic Classification of Web Services RobustnessIn IEEE International Conference on Services Computing, SCC 2011, Washington, DC, USA, 4-9 July, 2011
- 24/7 Real-Time Data Warehousing: A Tool for Continuous Actionable KnowledgeIn Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, COMPSAC 2011, Munich, Germany, 18-22 July 2011, 2011
- TO BEnchmark or NOT TO BEnchmark security: That is the questionIn IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W 2011), Hong Kong, China, June 27-30, 2011
- A survey on data security in data warehousing: Issues, challenges and opportunitiesIn Proceedings of EUROCON 2011, International Conference on Computer as a Tool, 27-29 April 2011, Lisbon, Portugal, 2011
- Towards benchmarking the trustworthiness of web applications codeIn Proceedings of the 13th European Workshop on Dependable Computing, EWDC ’11, Pisa, Italy, May 11-12, 2011
- A Testing Service for Lifelong Validation of Dynamic SOAIn 13th IEEE International Symposium on High-Assurance Systems Engineering, HASE 2011, Boca Raton, FL, USA, November 10-12, 2011
- Application of SOA in Safety-Critical Embedded SystemsIn Convergence and Hybrid Information Technology - 5th International Conference, ICHIT 2011, Daejeon, Korea, September 22-24, 2011. Proceedings, 2011
- Benchmarking the resilience of self-adaptive software systems: perspectives and challengesIn 2011 ICSE Symposium on Software Engineering for Adaptive and Self-Managing Systems, SEAMS 2011, Waikiki, Honolulu , HI, USA, May 23-24, 2011
- A data masking technique for data warehousesIn 15th International Database Engineering and Applications Symposium (IDEAS 2011), September 21 - 27, 2011, Lisbon, Portugal, 2011
- A Service Discovery Approach for Testing Dynamic SOAsIn 14th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops, ISORC Workshops 2011, Newport Beach, CA, USA, March 28-31, 2011
- Implementing Software Effort Estimation in a Medium-sized CompanyIn 34th Annual IEEE Software Engineering Workshop, SEW 2011, Limerick, Ireland, June 20-21, 2011
- Integrating GQM and Data Warehousing for the Definition of Software Reuse MetricsIn 34th Annual IEEE Software Engineering Workshop, SEW 2011, Limerick, Ireland, June 20-21, 2011
- Balancing Security and Performance for Enhancing Data Privacy in Data WarehousesIn IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, Changsha, China, 16-18 November, 2011
2010
- Dependability Benchmarking for OLTP Systems - A Mandatory Path2010
- Benchmarking Untrustworthiness: An Alternative to Security MeasurementInt. J. Dependable Trust. Inf. Syst., 2010
- From Performance to Resilience BenchmarkingIn 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 21-25 June 2010, Genova, Italy, 2010
- Benchmarking Vulnerability Detection Tools for Web ServicesIn IEEE International Conference on Web Services, ICWS 2010, Miami, Florida, USA, July 5-10, 2010
- Errors on Space Software Requirements: A Field Study and Application ScenariosIn IEEE 21st International Symposium on Software Reliability Engineering, ISSRE 2010, San Jose, CA, USA, 1-4 November 2010, 2010
- Comparing SQL Injection Detection Tools Using Attack Injection: An Experimental StudyIn IEEE 21st International Symposium on Software Reliability Engineering, ISSRE 2010, San Jose, CA, USA, 1-4 November 2010, 2010
- The Web Attacker Perspective - A Field StudyIn IEEE 21st International Symposium on Software Reliability Engineering, ISSRE 2010, San Jose, CA, USA, 1-4 November 2010, 2010
- Towards Identifying the Best Variables for Failure Prediction Using Injection of Realistic Software FaultsIn 16th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2010, Tokyo, Japan, December 13-15, 2010
- A Learning-Based Approach to Secure Web Services from SQL/XPath Injection AttacksIn 16th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2010, Tokyo, Japan, December 13-15, 2010
- Benchmarking Software Requirements Documentation for Space ApplicationIn Computer Safety, Reliability, and Security, 29th International Conference, SAFECOMP 2010, Vienna, Austria, September 14-17, 2010. Proceedings, 2010
- Applying Text Classification Algorithms in Web Services Robustness TestingIn 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31 - November 3, 2010
- Benchmarking the Resilience of Self-Adaptive Systems: A New Research ChallengeIn 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31 - November 3, 2010
- How to Advance TPC Benchmarks with Dependability AspectsIn Performance Evaluation, Measurement and Characterization of Complex Systems - Second TPC Technology Conference, TPCTC 2010, Singapore, September 13-17, 2010. Revised Selected Papers, 2010
2009
- Effective Detection of SQL/XPath Injection Vulnerabilities in Web ServicesIn 2009 IEEE International Conference on Services Computing (SCC 2009), 21-25 September 2009, Bangalore, India, 2009
- Untrustworthiness: A trust-based security metricIn CRiSIS 2009, Post-Proceedings of the Fourth International Conference on Risks and Security of Internet and Systems, Toulouse, France, October 19-22, 2009
- Predicting Timing Failures in Web ServicesIn Database Systems for Advanced Applications, DASFAA 2009 International Workshops: BenchmarX, MCIS, WDPP, PPDA, MBC, PhD, Brisbane, Australia, April 20-23, 2009
- Protecting Database Centric Web Services against SQL/XPath Injection AttacksIn Database and Expert Systems Applications, 20th International Conference, DEXA 2009, Linz, Austria, August 31 - September 4, 2009. Proceedings, 2009
- Vulnerability & attack injection for web applicationsIn Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2009, Estoril, Lisbon, Portugal, June 29 - July 2, 2009
- Using web security scanners to detect vulnerabilities in web servicesIn Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2009, Estoril, Lisbon, Portugal, June 29 - July 2, 2009
- Student ForumIn Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2009, Estoril, Lisbon, Portugal, June 29 - July 2, 2009
- BIRF: Keeping Software Development under Control across the OrganizationIn The Fourth International Conference on Software Engineering Advances, ICSEA 2009, 20-25 September 2009, Porto, Portugal, 2009
- Improving Web Services RobustnessIn IEEE International Conference on Web Services, ICWS 2009, Los Angeles, CA, USA, 6-10 July 2009, 2009
- Looking at Web Security Vulnerabilities from the Programming Language Perspective: A Field StudyIn ISSRE 2009, 20th International Symposium on Software Reliability Engineering, Mysuru, Karnataka, India, 16-19 November 2009, 2009
- Benchmarking Untrustworthiness in DBMS ConfigurationsIn Fourth Latin-American Symposium on Dependable Computing, LADC 2009, João Pessoa, Brazil, 1-4 September 2009, 2009
- Detecting SQL Injection Vulnerabilities in Web ServicesIn Fourth Latin-American Symposium on Dependable Computing, LADC 2009, João Pessoa, Brazil, 1-4 September 2009, 2009
- Appraisals Based on Security Best Practices for Software ConfigurationsIn Fourth Latin-American Symposium on Dependable Computing, LADC 2009, João Pessoa, Brazil, 1-4 September 2009, 2009
- A Trust-Based Benchmark for DBMS ConfigurationsIn 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2009, Shanghai, China, 16-18 November 2009, 2009
- Comparing the Effectiveness of Penetration Testing and Static Code Analysis on the Detection of SQL Injection Vulnerabilities in Web ServicesIn 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2009, Shanghai, China, 16-18 November 2009, 2009
- From Performance to Dependability Benchmarking: A Mandatory PathIn Performance Evaluation and Benchmarking, First TPC Technology Conference, TPCTC 2009, Lyon, France, August 24-28, 2009, Revised Selected Papers, 2009
2008
- Deploying fault tolerant web service compositionsComput. Syst. Sci. Eng., 2008
- Experimental Robustness Evaluation of JMS MiddlewareIn 2008 IEEE International Conference on Services Computing (SCC 2008), 8-11 July 2008, Honolulu, Hawaii, USA, 2008
- wsrbench: An On-Line Tool for Robustness BenchmarkingIn 2008 IEEE International Conference on Services Computing (SCC 2008), 8-11 July 2008, Honolulu, Hawaii, USA, 2008
- Timing Failures Detection in Web ServicesIn Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008, Yilan, Taiwan, 9-12 December 2008, 2008
- Combining Energy and Wavelet Transform for Epileptic Seizure Prediction in an Advanced Computational SystemIn Proceedings of the 2008 International Conference on BioMedical Engineering and Informatics, BMEI 2008, May 28-30, 2008, Sanya, Hainan, China - Volume 2, 2008
- Redundant Array of Inexpensive Nodes for DWSIn Database Systems for Advanced Applications, 13th International Conference, DASFAA 2008, New Delhi, India, March 19-21, 2008. Proceedings, 2008
- RAIN: Always on Data WarehousingIn Database Systems for Advanced Applications, 13th International Conference, DASFAA 2008, New Delhi, India, March 19-21, 2008. Proceedings, 2008
- Efficient Data Distribution for DWSIn Data Warehousing and Knowledge Discovery, 10th International Conference, DaWaK 2008, Turin, Italy, September 2-5, 2008, Proceedings, 2008
- Towards assessing the security of DBMS configurationsIn The 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2008, June 24-27, 2008, Anchorage, Alaska, USA, Proceedings, 2008
- Mapping software faults with web security vulnerabilitiesIn The 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2008, June 24-27, 2008, Anchorage, Alaska, USA, Proceedings, 2008
- Supporting Fraud Analysis in Mobile Telecommunications Using Case-Based ReasoningIn Advances in Case-Based Reasoning, 9th European Conference, ECCBR 2008, Trier, Germany, September 1-4, 2008. Proceedings, 2008
- Robustness Validation in Service-Oriented ArchitecturesIn Architecting Dependable Systems VI, 2008
- An Application for Electroencephalogram Mining for Epileptic Seizure PredictionIn Advances in Data Mining. Medical Applications, E-Commerce, Marketing, and Theoretical Aspects, 8th Industrial Conference, ICDM 2008, Leipzig, Germany, July 16-18, 2008, Proceedings, 2008
- Training Security Assurance Teams Using Vulnerability InjectionIn 14th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2008, 15-17 December 2008, Taipei, Taiwan, 2008
- Assessing and Comparing Security of Web ServersIn 14th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2008, 15-17 December 2008, Taipei, Taiwan, 2008
- Online detection of malicious data access using DBMS auditingIn Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), Fortaleza, Ceara, Brazil, March 16-20, 2008
2007
- Towards Timely ACID Transactions in DBMSIn Advances in Databases: Concepts, Systems and Applications, 12th International Conference on Database Systems for Advanced Applications, DASFAA 2007, Bangkok, Thailand, April 9-12, 2007, Proceedings, 2007
- Assessing Robustness of Web-Services InfrastructuresIn The 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2007, 25-28 June 2007, Edinburgh, UK, Proceedings, 2007
- Comparing Web Services Performance and Recovery in the Presence of FaultsIn 2007 IEEE International Conference on Web Services (ICWS 2007), July 9-13, 2007, Salt Lake City, Utah, USA, 2007
- Integrated Intrusion Detection in DatabasesIn Dependable Computing, Third Latin-American Symposium, LADC 2007, Morella, Mexico, September 26-28, 2007, Proceedings, 2007
- Do You Know... How to Analyze and Share Results from Dependability Evaluation Experiments?In Dependable Computing, Third Latin-American Symposium, LADC 2007, Morella, Mexico, September 26-28, 2007, Proceedings, 2007
- Benchmarking the Robustness of Web ServicesIn 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2007), 17-19 December, 2007, Melbourne, Victoria, Australia, 2007
- Testing and Comparing Web Vulnerability Scanning Tools for SQL Injection and XSS AttacksIn 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2007), 17-19 December, 2007, Melbourne, Victoria, Australia, 2007
- Towards fault tolerance in web services compositionsIn Proceedings of the 2007 Workshop on Engineering Fault Tolerant Systems, EFTS 2007, Dubrovnik, Croatia, September 4, 2007
- Detecting Malicious SQLIn Trust, Privacy and Security in Digital Business, 4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007, Proceedings, 2007
2006
- Towards Timely ACID Transactions in DBMSIn 12th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2006), 18-20 December, 2006, University of California, Riverside, USA, 2006
- Monitoring Database Application Behavior for Intrusion DetectionIn 12th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2006), 18-20 December, 2006, University of California, Riverside, USA, 2006
2005
- Towards a Security Benchmark for Database Management SystemsIn 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June - 1 July 2005, Yokohama, Japan, Proceedings, 2005
- A Data Mining Approach to Identify Key Factors in Dependability ExperimentsIn Dependable Computing - EDCC-5, 5th European Dependable Computing Conference, Budapest, Hungary, April 20-22, 2005, Proceedings, 2005
- Detection of Malicious Transactions in DBMSIn 11th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2005), 12-14 December, 2005, Changsha, Hunan, China, 2005
2004
- Joint evaluation of recovery and performance of a COTS DBMS in the presence of operator faultsPerform. Evaluation, 2004
- Portable Faultloads Based on Operator Faults for DBMS Dependability BenchmarkingIn 28th International Computer Software and Applications Conference (COMPSAC 2004), Design and Assessment of Trustworthy Software-Based Systems, 27-30 September 2004, Hong Kong, China, Proceedings, 2004
- Dependability Benchmarking of Web-ServersIn Computer Safety, Reliability, and Security, 23rd International Conference, SAFECOMP 2004, Potsdam, Germany, September 21-24, 2004, Proceedings, 2004
2003
- The OLAP and Data Warehousing Approaches for Analysis and Sharing of Results from Dependability Evaluation ExperimentsIn 2003 International Conference on Dependable Systems and Networks (DSN 2003), 22-25 June 2003, San Francisco, CA, USA, Proceedings, 2003
- Benchmarking the Dependability of Different OLTP SystemsIn 2003 International Conference on Dependable Systems and Networks (DSN 2003), 22-25 June 2003, San Francisco, CA, USA, Proceedings, 2003
- Plug and Play Fault Injector for Dependability BenchmarkingIn Dependable Computing, First Latin-American Symposium, LADC 2003, Sao Paulo, Brazil, October 21-24, 2003, Proceedings, 2003
- Emulation of Software Faults: Representativeness and UsefulnessIn Dependable Computing, First Latin-American Symposium, LADC 2003, Sao Paulo, Brazil, October 21-24, 2003, Proceedings, 2003
- A Dependability Benchmark for OLTP Application EnvironmentsIn Proceedings of 29th International Conference on Very Large Data Bases, VLDB 2003, Berlin, Germany, September 9-12, 2003
2002
- Recovery and Performance Balance of a COTS DBMS in the Presence of Operator FaultsIn 2002 International Conference on Dependable Systems and Networks (DSN 2002), 23-26 June 2002, Bethesda, MD, USA, Proceedings, 2002
- Definition of Faultloads Based on Operator Faults for DMBS Recovery BenchmarkingIn 9th Pacific Rim International Symposium on Dependable Computing (PRDC 2002), 16-18 December 2002, Tsukuba-City, Ibarski, Japan, 2002
2001
- ESFFI - A Novel Technique for the Emulation of Coftware Faults in COTS ComponentsIn 8th IEEE International Conference on Engineering of Computer-Based Systems (ECBS 2001), 17-20 April 2001, Washington, DC, USA, 2001
2000
- On the Emulation of Software Faults by Software Fault InjectionIn 2000 International Conference on Dependable Systems and Networks (DSN 2000) (formerly FTCS-30 and DCCA-8), 25-28 June 2000, New York, NY, USA, 2000