Vilc Rufino

ORCID: 0000-0001-5557-0519
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Software System Performance and Reliability
  • Advanced Software Engineering Methodologies
  • Network Security and Intrusion Detection
  • Cloud Computing and Resource Management
  • Complex Network Analysis Techniques
  • Education and Digital Technologies
  • Distributed systems and fault tolerance
  • Anomaly Detection Techniques and Applications
  • Opinion Dynamics and Social Influence
  • Complexity and Algorithms in Graphs
  • Terrorism, Counterterrorism, and Political Violence
  • Cryptography and Data Security
  • Cloud Data Security Solutions
  • Information Science and Libraries

Universidade Federal do Rio de Janeiro
2019-2020

Brazilian Naval School
2020

Instituto de Pesquisas da Marinha
2009

Microservices have emerged as an architectural style for developing distributed applications. Assessing the performance of architecture deployment configurations — e.g., with respect to alternatives is challenging and must be aligned system usage in production environment. In this paper, we introduce approach using operational profiles generate load tests automatically assess scalability pass/fail criteria microservice configuration alternatives. The provides a Domain-based metric each...

10.1016/j.jss.2020.110564 article EN cc-by Journal of Systems and Software 2020-02-24

It is mandatory to continuously assess software systems during development and operation, e.g., through testing monitoring, make sure that they meet their required level of performance. In our previous work, we have developed an approach the degree which configurations a system performance criteria based on domain metric obtained by considering operational profiles results from load test experiments. This paper presents PPTAM tooling infrastructure automates provides dashboard visualization results.

10.1145/3302541.3311961 article EN 2019-03-27

Herd immunity, one of the most fundamental concepts in network epidemics, occurs when a large fraction population devices is immune against virus or malware. The few individuals who have not taken countermeasures threat are assumed to very low chances infection, as they indirectly protected by rest network. Although fundamental, herd immunity does account for strategic attackers scanning vulnerable nodes. In face such attackers, nodes linger become easy targets, compromising cybersecurity....

10.1109/access.2020.2983652 article EN cc-by IEEE Access 2020-01-01

Anomaly detection systems aim to detect and report attacks or unexpected behavior in networked systems. Previous work has shown that anomalies have an impact on system performance, performance signatures can be effectively used for implementing IDS. In this paper, we present analytical experimental study the trade-off between anomaly based scalability. The proposed approach combines modeling load testing find optimal configurations signature-based We apply a heavy-tail bi-modal approach,...

10.1109/access.2020.3028571 article EN cc-by IEEE Access 2020-01-01

Mandt e Tan propuseram um esquema eficiente para acordo de chaves sem certificados, baseando-se na intratabilidade do Problema Computacional Diffie-Hellman. Apresentaram no mesmo trabalho uma versão estendida utilização com diferentes autoridades confiança. Neste artigo identificamos deficiência apresentamos possível solução. Também sugerimos correção outra vulnerabilidade já conhecida. Embora nossas soluções levam a protocolo final maior complexidade computacional, o resultado é útil...

10.5753/sbseg.2009.20626 article PT 2009-09-28
Coming Soon ...