- Software System Performance and Reliability
- Advanced Software Engineering Methodologies
- Network Security and Intrusion Detection
- Cloud Computing and Resource Management
- Complex Network Analysis Techniques
- Education and Digital Technologies
- Distributed systems and fault tolerance
- Anomaly Detection Techniques and Applications
- Opinion Dynamics and Social Influence
- Complexity and Algorithms in Graphs
- Terrorism, Counterterrorism, and Political Violence
- Cryptography and Data Security
- Cloud Data Security Solutions
- Information Science and Libraries
Universidade Federal do Rio de Janeiro
2019-2020
Brazilian Naval School
2020
Instituto de Pesquisas da Marinha
2009
Microservices have emerged as an architectural style for developing distributed applications. Assessing the performance of architecture deployment configurations — e.g., with respect to alternatives is challenging and must be aligned system usage in production environment. In this paper, we introduce approach using operational profiles generate load tests automatically assess scalability pass/fail criteria microservice configuration alternatives. The provides a Domain-based metric each...
It is mandatory to continuously assess software systems during development and operation, e.g., through testing monitoring, make sure that they meet their required level of performance. In our previous work, we have developed an approach the degree which configurations a system performance criteria based on domain metric obtained by considering operational profiles results from load test experiments. This paper presents PPTAM tooling infrastructure automates provides dashboard visualization results.
Herd immunity, one of the most fundamental concepts in network epidemics, occurs when a large fraction population devices is immune against virus or malware. The few individuals who have not taken countermeasures threat are assumed to very low chances infection, as they indirectly protected by rest network. Although fundamental, herd immunity does account for strategic attackers scanning vulnerable nodes. In face such attackers, nodes linger become easy targets, compromising cybersecurity....
Anomaly detection systems aim to detect and report attacks or unexpected behavior in networked systems. Previous work has shown that anomalies have an impact on system performance, performance signatures can be effectively used for implementing IDS. In this paper, we present analytical experimental study the trade-off between anomaly based scalability. The proposed approach combines modeling load testing find optimal configurations signature-based We apply a heavy-tail bi-modal approach,...
Mandt e Tan propuseram um esquema eficiente para acordo de chaves sem certificados, baseando-se na intratabilidade do Problema Computacional Diffie-Hellman. Apresentaram no mesmo trabalho uma versão estendida utilização com diferentes autoridades confiança. Neste artigo identificamos deficiência apresentamos possível solução. Também sugerimos correção outra vulnerabilidade já conhecida. Embora nossas soluções levam a protocolo final maior complexidade computacional, o resultado é útil...