Raul Ceretta Nunes

ORCID: 0000-0003-3228-4071
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Distributed systems and fault tolerance
  • Advanced Malware Detection Techniques
  • Simulation Techniques and Applications
  • Anomaly Detection Techniques and Applications
  • Internet Traffic Analysis and Secure E-voting
  • Information and Cyber Security
  • Business and Management Studies
  • Software System Performance and Reliability
  • Opportunistic and Delay-Tolerant Networks
  • Big Data and Business Intelligence
  • IPv6, Mobility, Handover, Networks, Security
  • Software Engineering Research
  • Software-Defined Networks and 5G
  • Mobile Ad Hoc Networks
  • Multi-Agent Systems and Negotiation
  • Cloud Computing and Resource Management
  • Spam and Phishing Detection
  • Robotic Path Planning Algorithms
  • Caching and Content Delivery
  • Service-Oriented Architecture and Web Services
  • Energy Efficient Wireless Sensor Networks
  • Quality and Supply Management
  • Evasion and Academic Success Factors
  • Interactive and Immersive Displays

Universidade Federal de Santa Maria
2015-2024

Universidade do Estado do Rio de Janeiro
2023

Universidade Federal Fluminense
2023

Brazilian National Association of Graduate Programs in Communication
2016

Detector Technology (United States)
2014

Secretaria de Ciência, Tecnologia e Inovação
2014

Universidade Luterana do Brasil
2013

Secretaria da Segurança Pública
2009

Universidade Franciscana
2006

Contextual Change (United States)
2006

Unreliable failure detectors have been an important abstraction to build dependable distributed applications over asynchronous systems subject faults. Their implementations are commonly based on timeouts ensure algorithm termination. However, for built the Internet, it is hard estimate this time value due traffic variations. Thus, different types of predictors used model behavior and make predictions delays. In order increase quality service (QoS), self-tuned dynamically adapt their...

10.1109/dsn.2004.1311946 article EN 2004-01-01

Resumo A evasão no ensino superior representa uma preocupação na gestão e um campo fértil para estudos acadêmicos. No Brasil, o Ministério de Educação realiza anualmente Censo da Superior. As diferentes metodologias cálculo análises indicadores são muitas vezes consideradas imprecisas inconsistentes, fragilizando sua importância nas estratégias políticas públicas controle melhorias dos serviços educacionais âmbito das instituições superior. Este trabalho exploratório com abordagem...

10.1590/0104-530x-2852-19 article PT cc-by Gestão & Produção 2019-01-01

Distributed Denial of Service (DDoS) attacks become increasingly sophisticated and massive in traffic volume. These can be mainly classified as IP Spoofing or Real Source IP. In special, are characterized by the use malware-infected hosts to simulate real network traffic. Those constantly evolving, new infection methods always being employed attackers. To deal with such constant change, research community is searching for advanced approaches mitigate, even eliminate, those threats. One these...

10.1109/aina.2018.00115 article EN 2018-05-01

Traditional perimeter defense is typically being performed through dedicated firewall-based devices. However, it becomes necessary to decrease the surface and exposure cyber attacks by hiding infrastructure, applications access controls, as well increasing security levels. Software Defined Perimeter (SDP) brings new functionality Single Packet Authorization (SPA) first step. Through analysis of SDP protocol there were issues that need be improved or addressed. This work proposes adaptations...

10.1109/clei.2018.00090 article EN 2018-10-01

Intelligent computing techniques have a paramount importance to the treatment of cybersecurity incidents. In such Artificial Intelligence (AI) context, while most algorithms explored in domain aim present solutions intrusion detection problems, these seldom approach correction procedures that are resolution incident problems already took place. practice, knowledge regarding data and is being under-used development intelligent systems, sometimes even lost not used at all. this work proposes...

10.1142/s021819401940014x article EN International Journal of Software Engineering and Knowledge Engineering 2019-11-01

The design of dependable distributed applications is a hard task, mainly because the indefinable statistic behavior communication delays. Despite this feature, in practice, most system monitors make use timeouts (a maximum waiting time) to ensure some termination properties their protocols. To have better results, dynamically predict new timeout values based on observed delays improve performance and accuracy In last years, time series theory emerged computer science area as good tool...

10.1109/reldis.2002.1180197 article EN 2003-06-26

Summary Intrusion detection systems (IDSs) are a fundamental component of defense solutions. In particular, IDSs aim to detect malicious activities on computer and networks by relying data classification models built from training dataset. However, classifiers' performance can vary for each attack pattern. A common technique overcome this issue is use ensemble methods, where multiple classifiers employed final decision taken combining their outputs. Despite the potential advantages such an...

10.1002/nem.2111 article EN International Journal of Network Management 2020-06-25

To manage cybersecurity incidents, organizations maintain an incident response team to mitigate the incidents and avoid unavailability of services. Despite need generate fast correct responses these problems, only a few companies have ways learning from past problem-solving experiences. This work proposes knowledge-based framework for this problem. The paper specifies main tasks method case-based management resolution procedures. It shows that domain expert knowledge about problems routines...

10.1145/3615366.3615369 article EN 2023-10-16

Delay or Disruption Tolerant Networks (DTN) are characterized by long delays and intermittent connectivity, requiring efficient energy consumption for increasing the mobile nodes lifetime. The movements of modify network topology, changing number connection opportunities between nodes. This paper proposes a new technique saving on DTN using trajectory inference model powered machine learning techniques. objective this work is to reduce mobility prediction method. Experimental results...

10.1145/3167132.3167437 article EN 2018-04-09

The widespread use of the Internet comes accompanied with severe threats for web applications security. Intrusion Detection Systems (IDS) have been considered to deal diversity and complexity attacks. In this context, work proposes an algorithm attack detection, exploring ananomaly-based technique: wavelet transform. proposed analyzes anomalies within variations on characters frequencies in requests. Experimental results show high rates detection without false positive occurrences.Keywords:...

10.4013/jacr.2011.12.06 article EN cc-by Journal of Applied Computing Research 2012-02-07

Os provedores de serviço Internet (Internet Service Provider – ISPs) oferecem uma infraestrutura comunicação essencial para a realização tarefas cotidianas da sociedade através e o advento novas tecnologias em rede. Todavia, um desafio dos ISPs consiste reduzir taxa churn, qual engloba cancelamentos planos clientes. Apesar existirem esforços na literatura, os ISP permanecem com carência ferramentas identificar churn. Esse trabalho propõe ChurnSense, processo perfis clientes base técnicas...

10.5335/rbca.v16i2.15312 article PT cc-by Revista Brasileira de Computação Aplicada 2024-08-05

Distributed simulations aim to replicate real-world behavior viacomputer networks. Developing source code for such simulations, especiallywhile following standards like High-Level Architecture (HLA), is often error-prone due its complexity, prompting generators requiring abstractmodels. This work proposes a model-driven methodology that explores theObject-Process Methodology (OPM) modeling language in conjunction withUML generate accurate and readable high-level models DSEEP andtransform...

10.5753/sbgames.2024.241231 article EN 2024-09-30

Intelligent computing techniques have a paramount importance to the treatment of cybersecurity incidents.In such Artificial Intelligence (AI) context, while most algorithms explored in domain aim present solutions intrusion detection problems, these seldom approach correction procedures that are resolution incident problems already took place.In practice, knowledge regarding data and is being under-used development intelligent systems, sometimes even lost not used at all.In this work...

10.18293/seke2019-204 article EN Proceedings/Proceedings of the ... International Conference on Software Engineering and Knowledge Engineering 2019-07-10

O presente trabalho insere-se no debate sobre a gestao da seguranca informacao, caracterizando este processo nas empresas incubadas e graduadas Incubadora Tecnologica de Santa Maria (ITSM), salientando percepcao dos gestores das que tange importância utilizacao mecanismos para gerir forma segura suas informacoes. Assim, pesquisa foi dividida em duas etapas, sendo primeira exploratoria qualitativa segunda descritiva quantitativa. A amostra utilizada nesse estudo denominada probabilistica o...

10.7198/geintec.v3i2.118 article PT DOAJ (DOAJ: Directory of Open Access Journals) 2013-06-01

Proteger os recursos de informação tornou-se um grande desafio às organizações devido ao avanço das tecnologias informação, a integração entre essas e o fluxo constante informações que trafegam através redes comunicação. O estabelecimento uma Política Segurança da Informação – PSI pode resolver parte dos problemas relacionados à segurança, mas não resolvê-los integralmente, pois humanos, presentes no ambiente interno organizações, podem comprometer efetividade PSI. Dada relevância aspectos...

10.14488/1676-1901.v12i2.887 article PT cc-by Revista Produção Online 2012-06-13

The analysis of network traffic is a key area for the management fault-tolerant systems, since anomalies in can affect availability and quality service (QoS). This work proposes an intrusion detection tool based on two-dimensional wavelet transform to quickly effectively detect computer networks generated by denial (DoS). Experiments were performed using two databases: synthetic (DARPA) another one from data collected at Federal University Santa Maria (UFSM), allowing under different...

10.1109/clei.2012.6427250 article EN 2012-10-01

A Failure Detector (FD) is an essential building block to develop reliable applications on Mobile Ad-hoc NETworks (MANETs). To detect faulty nodes correctly the node mobility and disconnections are challenges that must be circumvented by FD. This paper presents FD algorithm detects efficiently in MANETs. approach explores signal power intensity receiving messages improve failure detector knowledge. The experimental results have shown improvements Quality of Service (QoS) when compared with...

10.1145/3019612.3019903 article EN 2017-04-03

Abstract Due to their fundamental role in the design of fault-tolerant distributed systems, consensus protocols have been widely studied. Most research this area has focused on providing ways for circumventing impossibility reaching a purely asynchronous system subject failures. Of particular interest are indulgent based upon weak failure detection oracles. Following first works that were more concerned with correctness such protocols, performance issues related them now topic gained...

10.1007/bf03192364 article EN cc-by Journal of the Brazilian Computer Society 2004-10-01
Coming Soon ...