Title and link to download the paper are presented below:
Intensive care unit nursing workload
estimation in smart hospitals. August 2024 - Journal of Health Organization and
Management. https://www.researchgate.net/publication/382998117_Intensive_care_unit_nursing_workload_estimation_in_smart_hospitals
Distributed AgriFood
Supply Chains. Journal of Network and Systems Management
32(3):2024
https://www.researchgate.net/publication/381830338_Distributed_AgriFood_Supply_Chains
Hierarchical multistep approach for
intrusion detection and identification in IoT and Fog
computing-based environments. Ad Hoc Networks 161(4), 2024.
Performance of security options for
message protocols: A comparative analysis. International Journal of Network Management, 2024.
A Formal Verification of a Reputation
Multi-Factor Authentication Mechanism for Constrained Devices and Low-Power
Wide-Area Network Using Temporal Logic, Sensors
23(15):6933, 2023.
DNNET-Ensemble approach to detecting
and identifying attacks in IoT environments, Conference: 41th Brazilian Symposium on Computer
Networks and Distributed Systems (SBRC 2023).
Intrusion detection with Machine
Learning in Internet of Things and Fog Computing: problems, solutions and
research, In book: Mini-course 3 of the 41th
Brazilian Symposium on Computer Networks and Distributed Systems (SBRC 2023)
(pp.1-50) Publisher: Brazilian Computer Society (SBC).
Intrusion detection and prevention in
fog based IoT environments: A systematic literature
review, Computer Networks Journal, 2022.
https://www.researchgate.net/publication/361850362_Intrusion_detection_and_prevention_in_fog_based_IoT_environments_A_systematic_literature_review
Two-step
ensemble approach for intrusion detection and identification in IoT and fog computing environments, COMPUTERS & ELECTRICAL
ENGINEERING, 2022.
Autonomic energy management with Fog
Computing, COMPUTERS & ELECTRICAL
ENGINEERING, 2021.
https://www.researchgate.net/publication/352493943_Autonomic_energy_management_with_Fog_Computing
Mutual Authentication with
Multi-factor in IoT-Fog-Cloud Environment, Journal of Network and Computer Applications,
2021.
Comparison between LSTM and CLCNN in
detecting malicious requests in web attacks, XXI
Brazilian Symposium on Information and Computational Systems Security (SBSeg 2021).
Multiclass decomposition and
Artificial Neural Networks for intrusion detection and identification in Internet
of Things environments, XXI
Brazilian Symposium on Information and Computational Systems Security (SBSeg 2021).
Experiments on energy optimization in
smart residences, 29th International Conference on
Software, Telecommunications and Computer Networks (SoftCOM
2021).
Hybrid approach to
intrusion detection in fog-based IoT environments, Computer Networks Journal, 2020.
Models of Computing as a Service and IoT: an analysis of the current scenario with applications
using LPWAN, Revista de Sistemas
de Informao da FSMA n. 25 (2020)
Avaliao
de desempenho de protocolos
de mensagens com arquitetura publish/subscribe no ambiente
de computao em nevoeiro: um estudo sobre desempenho do MQTT, AMQP e
STOMP, SBRC 2020 – WPEIF (Simpsio Brasileiro de Redes de Computadores e Sistemas Distribudos - Workshop
de Pesquisa Experimental da Internet do Futuro), 2020.
Ambiente de
experimentao para avaliao protocolos de mensagem para IoT
na
Fog", SBRC 2020
– WPEIF (Simpsio Brasileiro
de Redes de Computadores e Sistemas Distribudos - Workshop
de Pesquisa Experimental da Internet do Futuro), 2020.
Autonomic Intrusion Detection and
Response Using Big Data,
paper of IEEE Systems Journal, 2020.
Order@Cloud:
An agnostic meta‐heuristic for VM provisioning,
adaptation, and organisation, paper of International Journal of
Network Management, 2019.
DoS attack
detection and prevention in fog-based intelligent environments, paper of Brazilian Journal of
Development, 2019.
Mutual
Authentication for IoT in the Context of Fog
Computing, paper of IEEE COMSNETS 2019.
Privacy Policies Model in Access
Control, paper of 13th
Annual IEEE International Systems Conference, 2019.
https://www.researchgate.net/publication/332522931_Privacy_Policies_Model_in_Access_Control
Autonomic IoT
Battery Management with Fog Computing, paper of GPC 2019: International Conference on
Green, Pervasive, and Cloud Computing.
Autonomic Intrusion Response in
Distributed Computing using Big Data, paper of journal={arXiv
preprint cite as 1811.05407}, 2018.
*Cloud identity management: a survey
on privacy strategies,
paper of ComNet
Journal - Elsevier, 2017.
Improving cloud computing virtual
machines balancing through hosts and virtual machines similarities, paper of IEEE SERVICES 2017.
*Preserving Privacy with Fine-grained
Authorization in an Identity Management System, paper of ICN 2017.
*A Model for Managed Elements under Autonomic
Cloud Computing Management, International
Journal on Advances in Networks and Services, 2016.
A Framework and Risk Assessment
Approaches for Risk-based Access Control in the Cloud, paper
of Elsevier JNCA 2016.
*RACLOUDS - Model for Clouds Risk
Analysis in the Information Assets Context, Revista de Sistemas
de Informao da FSMA, 2016.
Order@Cloud:
A VM Organisation Framework Based on Multi-Objectives
Placement Ranking, paper of IEEE NOMS 2016.
*Towards a Framework for VM organisation based on Multi-Objectives, paper of ICN 2016.
A distributed autonomic management framework
for cloud computing orchestration, paper of IEEE SERVICES
2016.
Analyzing the Strength of Pells
RSA, paper of IJPT 2016.
https://www.researchgate.net/publication/311669502_ANALYZING_THE_STRENGTH_OF_PELL%27S_RSA
*C2LP: Modelling
Load Propagation and Evaluation through the Cloud Components, paper of ICN 2016.
*Towards Privacy in Identity
Management Dynamic Federations, paper
of ICN 2016.
*Model for Cloud Computing Risk
Analysis, paper of ICN 2015.
https://www.researchgate.net/publication/272892510_Model_for_Cloud_Computing_Risk_Analysis
- share
*Decision-theoretic model to support
autonomic Cloud Computing, paper of ICN 2015.
Cloud
resource management: a survey on forecasting and profiling models, in Journal of Network and Computer
Applications, 2015.
*Providing Response to Security
Incidents in the Cloud Computing with Autonomic Systems and Big Data, in AICT 2015.
An Approach to IdM with Privacy in
the Cloud paper of IEEE
CIT/IUCC/DASC/PICOM 2015.
https://www.researchgate.net/publication/288725741_An_Approach_to_IdM_with_Privacy_in_the_Cloud
* Legacy
Network Infrastructure Management Model for Green Cloud Validated Through
Simulations, International
Journal on Advances in Intelligent Systems, 2014.
A dynamic risk-based access control
architecture for cloud computing, in IEEE/IFIP NOMS, 2014.
Panoptes: A
monitoring architecture and framework for supporting autonomic Clouds, in IEEE/IFIP NOMS, 2014.
A cyclical evaluation model of
information security maturity, Journal
of Information Management & Computer Security, 2014.
* Green
Clouds through Servers, Virtual Machines and Network Infrastructure
Management, book chapter in SBRC 2014.
* Operation, Management, Security and
Sustainability for Cloud Computing, Revista de Sistemas
de Informao da FSMA, 2014.
* Provisioning, Resource Allocation, and DVFS in Green Clouds, International Journal on Advances in
Networks and Services, 2014.
http://www.researchgate.net/publication/259913665_Provisioning_Resource_Allocation_and_DVFS_in_Green_Clouds (A best paper of ICN 2013).
* Current Issues in Cloud Computing Security and
Management, The Eighth International Conference on Emerging
Security Information, Systems and Technologies - SECURWARE 2014.
Privacy-preserving Identity Federations in the
Cloud - A Proof of Concept, International
Journal of Security and Networks, 2014.
* Optimizing
Green Clouds through Legacy Network Infrastructure Management, In proceeding of:
Thirteenth International Conference on Networks - ICN 2014.
* Decision-Theoretic
Planning for Cloud Computing,
In proceeding of: Thirteenth International Conference on Networks - ICN
2014.
https://www.researchgate.net/publication/259399614_Decision-Theoretic_Planning_for_Cloud_Computing
* An Architecture for Risk Analysis
in Cloud, In proceeding of: Tenth International Conference on
Networking and Services - ICNS 2014.
http://www.researchgate.net/publication/260145977_An_Architecture_for_Risk_Analysis_in_Cloud
* Autonomic Intrusion Detection System in Cloud
Computing with Big Data, International
Conference on Security and Management - SAM 2014.
* Risk-based Dynamic Access Control
for a Highly Scalable Cloud Federation, SECURWARE, 2013.
* Provisioning and Resource
Allocation for Green Clouds, in International Conference on Networks, 2013.
* A Validation Model of Data Input for
Web Services, in International
Conference on Networks, 2013.
* Environment, Services and Network
Management for Green Clouds, in CLEI Electronic Journal, 2012.
http://www.researchgate.net/publication/254263747_Environment_Services_and_Network_Management_for_Green_Clouds?ev=prf_pub (A best paper of CLEI 2011).
* Comparison of a Multi output Adaptative Neuro-Fuzzy Inference
System (MANFIS) and Multi Layer Perceptron (MLP) in Cloud Computing
Provisioning, in WCGA, 2012.
* Multi-Tenancy Authorization System
with Federated Identity to Cloud Environment Using Shibboleth, in
International Conference
on Networks, 2012.
Hybrid protocol for group key
management and transparent cluster interconnection in a secure wireless sensor
network, in IEEE/IFIP NOMS,
2012.
Proposal and development of the Web
services input validation model, in IEEE/IFIP NOMS, 2012.
"Toward an Architecture for
Monitoring Private Clouds," in IEEE Communications Magazine, 2011.
http://www.researchgate.net/publication/220144318_Toward_an_architecture_for_monitoring_private_clouds?ev=prf_pub
(First paper in the December 2011
list of the ten most popular articles published in IEEE ComSoc
periodicals viewed online).
* "Management and Security for Grid, Cloud
and Cognitive Networks," in Journal of Information Systems of the FSMA,
2011.
http://www.researchgate.net/publication/254200783_Management_and_Security_for_Grid_Cloud_and_Cognitive_Networks?ev=prf_pub
(Paper with more than 12000 downloads).
"Simulator Improvements to Validate the Green Cloud Computing
Approach," in IEEE/IFIP Latin American Network Operations and
Management Symposium, 2011.
http://www.researchgate.net/publication/221430419_Simulator_improvements_to_validate_the_Green_Cloud_Computing_approach?ev=prf_pub
*
"Customer Security Concerns in Cloud Computing," in International Conference on Networks. 2011.
http://www.researchgate.net/publication/228451862_Customer_Security_Concerns_in_Cloud_Computing
* "Experimental Assessment of
Routing for Grid and Cloud," in International Conference on
Networks. 2011.
http://www.researchgate.net/publication/254347753_Experimental_Assessment_of_Routing_for_Grid_and_Cloud?ev=prf_pub
"Intrusion
Detection for Grid and Cloud Computing," in IEEE IT
Professional Magazine. 2010.
http://www.researchgate.net/publication/224587188_Intrusion_Detection_for_Grid_and_Cloud_Computing?ev=prf_pub
"A Cloud Computing Solution for Patient's
Data Collection in Health Care Institutions," in Second International Conference on eHealth, Telemedicine, and Social Medicine. 2010.
http://www.researchgate.net/publication/221222788_A_Cloud_Computing_Solution_for_Patient%27s_Data_Collection_in_Health_Care_Institutions?ev=prf_pub
"SLA Perspective in Security
Management for Cloud Computing," in Sixth International Conference on Networking
and Services. 2010.
http://www.researchgate.net/publication/232631054_SLA_Perspective_in_Security_Management_for_Cloud_Computing?ev=prf_pub