- Network Security and Intrusion Detection
- Advanced Malware Detection Techniques
- Software-Defined Networks and 5G
- Software System Performance and Reliability
- Cloud Computing and Resource Management
- Internet Traffic Analysis and Secure E-voting
- Software Engineering Research
- IoT and Edge/Fog Computing
- Distributed systems and fault tolerance
- Blockchain Technology Applications and Security
- IPv6, Mobility, Handover, Networks, Security
- Caching and Content Delivery
- Information and Cyber Security
- Security and Verification in Computing
- Spam and Phishing Detection
- Green IT and Sustainability
- Anomaly Detection Techniques and Applications
- User Authentication and Security Systems
- Digital and Cyber Forensics
- Software Testing and Debugging Techniques
- Advanced Data Storage Technologies
- Network Packet Processing and Optimization
- Interconnection Networks and Systems
- Parallel Computing and Optimization Techniques
- Advanced Optical Network Technologies
Universidade Federal do Pampa
2012-2024
Monash University
2023
Universidade Federal do Amazonas
2022
University of Luxembourg
2014-2020
Universidade Federal do Rio Grande do Sul
2003-2019
Universidade do Vale do Rio dos Sinos
2018
Institute of Electrical and Electronics Engineers
2018
Regional Municipality of Niagara
2018
IEEE Computer Society
2018
University of Lisbon
2011-2014
The Internet has led to the creation of a digital society, where (almost) everything is connected and accessible from anywhere.However, despite their widespread adoption, traditional IP networks are complex very hard manage.It both difficult configure network according predefined policies, reconfigure it respond faults, load changes.To make matters even more difficult, current also vertically integrated: control data planes bundled together.Software-Defined Networking (SDN) an emerging...
Software-defined networking empowers network operators with more flexibility to program their networks. With SDN, management moves from codifying functionality in terms of low-level device configurations building software that facilitates and debugging. By separating the complexity state distribution specification, SDN provides new ways solve long-standing problems --- routing, for instance while simultaneously allowing use security dependability techniques, such as access control or multi-path.
Maintaining a strongly consistent network view in Software Defined Network has been usually proclaimed as synonym of low performance. We disagree. To support our view, this paper we argue that with the use modern distributed systems techniques it is possible to build consistent, fault-tolerant SDN control framework achieves acceptable The central element architecture highly-available, data store. describe prototype implementation controller integrating Floodlight store implemented using...
With the increasing demand for communication between blockchains, improving performance of cross-chain protocols becomes an emerging challenge. We take a first step towards analyzing limitations by comprehensively evaluating Cosmos Network's Inter-Blockchain Communication Protocol. To achieve our goal we introduce novel framework to guide empirical evaluations protocols. implement instance as tool evaluate IBC protocol. Our findings highlight several challenges, such high transaction...
We provide a comprehensive and updated assessment of Docker versus in (DinD), evaluating its impact on CPU, memory, disk, network. Using different workloads, we evaluate DinD's performance across distinct hardware platforms GNU/Linux distributions cloud Infrastructure as Service (laaS) like Google Compute Engine (GCE) traditional server-based environments. developed an automated tools suite to achieve our goal. execute four well-known benchmarks nested-container variant. Our findings...
O último Plano Nacional de Educação (PNE 2014-2024) reitera ser estratégica a curricularização da extensão, em no mínimo 10% carga horária dos cursos graduação, como forma colaborar na ampliação matrículas Ensino Superior. Contudo, dois importantes fóruns discussões sobre educação Computação Sociedade Brasileira (SBC), ainda são poucos os relatos inserção extensão matriz curricular graduação país. Este artigo apresenta experiências Universidade Federal do Pampa (Unipampa). Ao fazê-lo,...
A MalSynGen é uma ferramenta que utiliza redes neurais artificiais para gerar dados sintéticos tabulares o domínio de malware Android. Para avaliar sua performance foram aumentados os dois datasets, considerando métricas fidelidade estat́ıstica e utilidade. Os resultados indicam capaz capturar padrões representativos aumento tabulares.
Este trabalho apresenta a ferramenta IWSHAP, que combina o algoritmo Iterative Wrapper Subset Selection (IWSS) com valores SHAP (SHapley Additive exPlanations) para encontrar melhor conjunto de características e maximizar desempenho algoritmos aprendizado máquina. Os resultados em um cenário detecção intrusões redes veiculares indicam é eficaz na redução datasets por meio da seleção características, alcançando taxas elevadas (e.g., 90%) mantendo altas métricas do modelo (acima 90%).
We use Explainable Artificial Intelligence (XAI) to understand and assess the decisions made by ML models in Android malware detection. To evaluate detection, we conducted experiments using seven datasets. Our findings indicate that it is possible accurately identify across multiple However, each dataset may have a different collection of features available. also discuss implications incorporating expert-dependent into detection procedure. Such potential increase model accuracy detecting...
The pace of adoption secure mechanisms in software-defined networking (SDN) has been slow, largely due to traditional solutions' performance overhead and their support infrastructure's complexity. To address these challenges, we propose KISS, a SDN control plane communications architecture that includes innovative solutions the context key distribution channel support.
The fast pace proliferation of Android malware continues to pose challenges cybersecurity research. To help reshape the future research, we introduce MH-100K, a dataset that provides holistic view through 101,975 APK samples, thousands diverse features and metadata. We use VirusTotal API ensure accurate threat evaluation, combining multiple detection methods for precision. Our findings suggest MH-100K is valuable resource providing new insights about landscape’s evolution.
We propose a resilience architecture for improving the security and dependability of authentication authorization infrastructures, in particular ones based on RADIUS OpenID. This employs intrusion-tolerant replication, trusted components entrusted gateways to provide survivable services ensuring compatibility with standard protocols. The was instantiated two prototypes, one implementing another These prototypes were evaluated fault-free executions, under faults, attack, diverse computing...
Software-defined networking (SDN) decouples the control and data planes of traditional networks, logically centralizing functional properties network in SDN controller. While this centralization brought advantages such as a faster pace innovation, it also disrupted some natural defenses architectures against different threats. The literature on has mostly been concerned with side, despite specific works concerning non-functional security or dependability. Though addressing latter an ad-hoc,...
Neste artigo apresentamos o framework MH-FSF, que reúne a reprodução e implementação de métodos seleção características forma integrada, modular extensível. Este é um esforço envolveu diversos pesquisadores ao longo dos últimos anos. Para uma avaliação da extensiva do implementamos disponibilizamos 17 características, agrupados em 11 clássicos 6 específicos domínios, para contexto detecção malware Android.
Interfaces de programação paralela como CUDA possibilitam explorar a concorrência em GPUs. Embora o poder processamento seja significativo neste tipo arquitetura, eficiência pode ser limitada aplicações recursivas, devido à necessidade comunicação entre GPU e CPU. Uma alternativa é utilizar extensão Dynamic Parallelism, também conhecida DP. Com objetivo investigar maior profundidade esta paralelismo, artigo avaliamos desempenho consumo energético recursivas usando OpenMP, Os resultados...
Context: The mass adoption of smartphones is reshaping the digital health market.
Monero was one of the first cryptocurrencies to address problem providing privacy-preserving digital asset trading. Currently, it has a market capitalization over 2.5 billion US dollars and is among 15 most valuable cryptocurrencies. This currency aims protect users' identities hide transaction information by using obfuscation mechanisms such as stealth addresses ring signatures. However, in spite efforts Monero's privacy, researchers have found ways identify true payment keys within...
We introduce a set of tools and techniques for increasing the resilience trustworthiness identity providers (IdPs) based on OpenID. To this purpose we propose an architecture specialized components capable fulfilling essential requirements ensuring high availability, integrity higher confidentiality guarantees sensitive data operations. Additionally, also discuss how trusted (e.g., TPMs, smart cards) can be used to provide remote attestation client server side, i.e., measure system. The...
Open Services for Lifecycle Collaboration (OSLC) is an open standard tool interoperability, which allows data federation throughout Software Engineering (SE) application lifecycles. The OSLC community has been active since 2008, and there still question: "What the state-of-the-art practice of integration in Application Management (ALM) environments?". Objective: To answer this question, our main goal to map on adoption SE Method: This paper presents a Systematic Mapping Study (SMS) by...
High-quality datasets are crucial for building realistic and high-performance supervised malware detection models. Currently, one of the major challenges machine learning-based solutions is scarcity that both representative high quality. To foster future research provide updated public data comprehensive evaluation comparison existing classifiers, we introduce MH-100K dataset [1], an extensive collection Android information comprising 101,975 samples. It encompasses a main CSV file with...
ADBuilder é uma ferramenta recente que permite a construção de datasets atualizados para detecção malwares Android. Entretanto, ela carece um fluxo mais rigoroso rotulação amostras e recursos adicionais explorar metadados construir ricos. Por esse motivo, apresentamos evolução da ADBuilder, resulta em duas novas ferramentas especializadas, AMGenerator AMExplorer. Enquanto implementa as etapas aquisição dados, extração caracteŕısticas robusta, AMExplorer especializada coleções completos...