Fault-Tolerant Precision Time Protocol for Smart Grids. Proceedings of the 7th Simposio de Informatica (INFORUM).(2015).
Securing Passive Replication Through Verification. Proceedings of the 34th Symposium on Reliable Distributed Systems (SRDS).(2015).
Analysis of operating system diversity for intrusion tolerance. Software: Practice and Experience. 44, 735–770.(2014).
Automatic detection and correction of web application vulnerabilities using data mining to predict false positives. Proceedings of the 23rd international conference on World wide web. 63–74.(2014).
SCFS: a shared cloud-backed file system. Usenix ATC.(2014).
Stopping a Rapid Tornado with a Puff. Security and Privacy (SP), 2014 IEEE Symposium on. 509–523.(2014).
Byzantine fault-tolerant consensus in wireless ad hoc networks. Mobile Computing, IEEE Transactions on. 12, 2441–2454.(2013).
On the Efficiency of Durable State Machine Replication.. USENIX Annual Technical Conference. 169–180.(2013).
Intercept: Profiling Windows Network Device Drivers. Dependable Computing. 61–75.(2013).
An intrusion-tolerant firewall design for protecting SIEM systems. 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W). 1–7.(2013).
PACE your network: Fair and controllable multi-tenant data center networks. Communications (ICC), 2013 IEEE International Conference on. 3726–3731.(2013).
Securing energy metering software with automatic source code correction. Industrial Informatics (INDIN), 2013 11th IEEE International Conference on. 701–706.(2013).
BFT-TO: Intrusion tolerance with less replicas. The Computer Journal. bxs148.(2012).
Diversys: Diverse rejuvenation system. Proceedings of the INFORUM-Simpósio de Informática.(2012).
LaSIGE, Univ. of Lisbon, Lisbon, Portugal. Reliable Distributed Systems (SRDS), 2012 IEEE 31st Symposium on. 161–170.(2012).
Recycling test cases to detect security vulnerabilities. Software Reliability Engineering (ISSRE), 2012 IEEE 23rd International Symposium on. 231–240.(2012).
Automatically complementing protocol specifications from network traces. Proceedings of the 13th European Workshop on Dependable Computing. 87–92.(2011).
Byzantine consensus in asynchronous message-passing systems: a survey. International Journal of Critical Computer-Based Systems. 2, 141–161.(2011).
Diveinto: Supporting diversity in intrusion-tolerant systems. Reliable Distributed Systems (SRDS), 2011 30th IEEE Symposium on. 137–146.(2011).
Diverse OS Rejuvenation for Intrusion Tolerance. Supplement of the International Conference on Dependable Systems and Networks (DSN).(2011).
OS diversity for intrusion tolerance: Myth or reality?. Dependable Systems & Networks (DSN), 2011 IEEE/IFIP 41st International Conference on. 383–394.(2011).