default search action
Carlos Maziero
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c51]Tiago Heinrich, Newton Carlos Will, Rafael R. Obelheiro, Carlos Alberto Maziero:
Anywhere on Earth: A Look at Regional Characteristics of DRDoS Attacks. ICISSP 2024: 21-29 - [c50]Tiago Heinrich, Newton Carlos Will, Rafael R. Obelheiro, Carlos Alberto Maziero:
A Categorical Data Approach for Anomaly Detection in WebAssembly Applications. ICISSP 2024: 275-284 - [c49]Newton Carlos Will, Carlos Alberto Maziero:
Enclave Management Models for Safe Execution of Software Components. ICISSP 2024: 474-485 - [c48]Anderson Aparecido do Carmo Frasão, Tiago Heinrich, Vinicius Fulber-Garcia, Newton Carlos Will, Rafael R. Obelheiro, Carlos Alberto Maziero:
I See Syscalls by the Seashore: An Anomaly-based IDS for Containers Leveraging Sysdig Data. ISCC 2024: 1-6 - [c47]Calebe Helpa, Tiago Heinrich, Marcus Botacin, Newton Carlos Will, Rafael R. Obelheiro, Carlos Alberto Maziero:
The Use of the DWARF Debugging Format for the Identification of Potentially Unwanted Applications (PUAs) in WebAssembly Binaries. SECRYPT 2024: 442-449 - 2023
- [j10]Newton Carlos Will, Carlos Alberto Maziero:
Intel Software Guard Extensions Applications: A Survey. ACM Comput. Surv. 55(14s): 322:1-322:38 (2023) - [c46]Rodrigo Lemos, Tiago Heinrich, Newton Carlos Will, Rafael R. Obelheiro, Carlos Alberto Maziero:
Inspecting Binder Transactions to Detect Anomalies in Android. SysCon 2023: 1-8 - 2022
- [c45]Tiago Heinrich, Carlos Alberto Maziero, Newton Carlos Will, Rafael R. Obelheiro:
How DRDoS attacks vary across the globe? IMC 2022: 760-761 - [c44]Amanda B. Viescinski, Tiago Heinrich, Newton Carlos Will, Carlos Maziero:
Behavior Modeling of a Distributed Application for Anomaly Detection. SECRYPT 2022: 333-340 - [c43]Rodrigo Lemos, Tiago Heinrich, Carlos Alberto Maziero, Newton Carlos Will:
Is It Safe? Identifying Malicious Apps Through the Use of Metadata and Inter-Process Communication. SysCon 2022: 1-8 - 2021
- [j9]Eduardo Viegas, Altair O. Santin, Juliana Bachtold, Darlan Segalin, Maicon Stihler, Arlindo L. Marcon Jr., Carlos Maziero:
Enhancing service maintainability by monitoring and auditing SLA in cloud computing. Clust. Comput. 24(3): 1659-1674 (2021) - [c42]Gabriel R. Castanhel, Tiago Heinrich, Fabrício Ceschin, Carlos Maziero:
Taking a Peek: An Evaluation of Anomaly Detection Using System calls for Containers. ISCC 2021: 1-6 - [c41]Tiago Heinrich, Rafael R. Obelheiro, Carlos Alberto Maziero:
New Kids on the DRDoS Block: Characterizing Multiprotocol and Carpet Bombing Attacks. PAM 2021: 269-283 - [c40]Newton Carlos Will, Tiago Heinrich, Amanda B. Viescinski, Carlos Alberto Maziero:
Trusted Inter-Process Communication Using Hardware Enclaves. SysCon 2021: 1-7 - 2020
- [c39]Newton Carlos Will, Carlos Alberto Maziero:
Using a Shared SGX Enclave in the UNIX PAM Authentication Service. SysCon 2020: 1-7
2010 – 2019
- 2019
- [j8]Elisa Mannes, Carlos Maziero:
Naming Content on the Network Layer: A Security Analysis of the Information-Centric Network Model. ACM Comput. Surv. 52(3): 44:1-44:28 (2019) - [c38]David Lanoë, Michel Hurfin, Eric Totel, Carlos Maziero:
An Efficient and Scalable Intrusion Detection System on Logs of Distributed Applications. SEC 2019: 49-63 - 2018
- [j7]Alessandro Kraemer, Carlos Maziero, Olivier Richard, Denis Trystram:
Reducing the number of response time service level objective violations by a cloud-HPC convergence scheduler. Concurr. Comput. Pract. Exp. 30(12) (2018) - [c37]Rafael C. R. Conde, Carlos Alberto Maziero, Newton Carlos Will:
Using Intel SGX to Protect Authentication Credentials in an Untrusted Operating System. ISCC 2018: 158-163 - [c36]Daniel Rezende, Carlos Maziero, Elisa Mannes:
A distributed online certificate status protocol for named data networks. SAC 2018: 2102-2108 - 2017
- [c35]Rodolfo Barriviera, Carlos Maziero:
A model for context-sensitive usage control in healthcare information systems. FedCSIS (Communication Papers) 2017: 199-205 - 2016
- [c34]Elisa Mannes, Carlos Maziero, Luiz Carlos Lassance, Fábio Borges:
Assessing the impact of cryptographic access control solutions on multimedia delivery in information-centric networks. NOMS 2016: 427-435 - [c33]Stephany Zanchi Dionysio, Luiz Nacamura, Carlos Alberto Maziero:
Improving Network I/O Performance in Virtual Machines through Workload Profile Clustering. SBESC 2016: 32-39 - [c32]Felipe Michels Fontoura, Carlos Alberto Maziero, Marco Aurélio Wehrmeister:
Cryptographic API for Embedded Applications. SBESC 2016: 174-179 - 2015
- [c31]Elisa Mannes, Carlos Maziero, Luiz Lassance, Fábio Borges:
Optimized access control enforcement over encrypted content in information-centric networks. ISCC 2015: 924-929 - 2013
- [j6]Carlos Maziero, Douglas dos Santos, Altair Olivo Santin:
Evaluation of desktop operating systems under thrashing conditions. J. Braz. Comput. Soc. 19(1): 29-42 (2013) - [c30]Gil Eduardo de Andrade, Luiz Augusto de Paula Lima, Alcides Calsavara, Carlos Alberto Maziero:
Routing Protocol Based on the Position, Velocity, and Direction of the Nodes. AINA Workshops 2013: 971-976 - 2012
- [c29]Diogo Olsen, Carlos Maziero:
A Context Manager for General-Purpose Operating Systems. SBESC 2012: 157-160 - 2011
- [j5]Rafael Teigao, Carlos Maziero, Altair Olivo Santin:
Applying a usage control model in an operating system kernel. J. Netw. Comput. Appl. 34(4): 1342-1352 (2011) - [c28]Priscila Vriesman Araujo, Carlos Alberto Maziero, Júlio César Nievola:
Automatic Classification of Processes in a General-Purpose Operating System. SBESC 2011: 33-38
2000 – 2009
- 2009
- [c27]Sérgio Raymundo Loest, Marcelo Cheminn Madruga, Carlos Alberto Maziero, Lau Cheuk Lung:
BackupIT: An Intrusion-Tolerant Cooperative Backup System. ACIS-ICIS 2009: 724-729 - [c26]Edemilson da Silva, Altair Olivo Santin, Edgard Jamhour, Carlos Maziero, Emir Toktar:
Applying quorum role in network management. Integrated Network Management 2009: 591-597 - [c25]Marcelo Cheminn Madruga, Sérgio Raymundo Loest, Carlos Maziero:
Using transparent files in a fault tolerant distributed file system. ISADS 2009: 109-114 - 2008
- [j4]Leonardo de Oliveira, Carlos Maziero:
A Trust Model for a Group of E-mail Servers. CLEI Electron. J. 11(2) (2008) - [j3]Altair Olivo Santin, Regivaldo G. Costa, Carlos Maziero:
A Three-Ballot-Based Secure Electronic Voting System. IEEE Secur. Priv. 6(3): 14-21 (2008) - [c24]Edson Kageyama, Carlos Maziero, Altair Olivo Santin:
An Experimental Peer-to-Peer E-mail System. CSE 2008: 203-208 - [c23]Leonardo de Oliveira, Carlos Maziero:
A Trust Model Applied to E-mail Servers. CSE 2008: 436-443 - [c22]Edson Kageyama, Carlos Maziero, Altair Olivo Santin:
A pull-based e-mail architecture. SAC 2008: 468-472 - [c21]Inez Raguenet, Carlos Maziero:
A Fuzzy Model for the Composition of Intrusion Detectors. SEC 2008: 237-251 - 2007
- [j2]Marcos Laureano, Carlos Maziero, Edgard Jamhour:
Protecting host-based intrusion detectors through virtual machines. Comput. Networks 51(5): 1275-1283 (2007) - [c20]Andre Gustavo Degraf Uchoa, Marcelo Eduardo Pellenz, Altair Olivo Santin, Carlos Alberto Maziero:
A Three-Pass Protocol for Cryptography Based on Padding for Wireless Networks. CCNC 2007: 287-291 - [c19]Rafael Teigao, Carlos Maziero, Altair Olivo Santin:
A Grammar for Specifying Usage Control Policies. ICC 2007: 1379-1384 - 2006
- [c18]Ricardo Nabhen, Carlos Maziero:
Some Experiences in Using Virtual Machines for Teaching Computer Networks. Education for the 21st Century 2006: 93-104 - 2005
- [e1]Carlos Alberto Maziero, João Gabriel Silva, Aline Maria Santos Andrade, Flávio Morais de Assis Silva:
Dependable Computing, Second Latin-American Symposium, LADC 2005, Salvador, Brazil, October 25-28, 2005, Proceedings. Lecture Notes in Computer Science 3747, Springer 2005, ISBN 3-540-29572-0 [contents] - 2004
- [c17]Cássio Ditzel Kropiwiec, Edgard Jamhour, Carlos Maziero:
A Framework for Protecting Web Sevices with IPsec. EUROMICRO 2004: 290-297 - [c16]Marcos Laureano, Carlos Maziero, Edgard Jamhour:
Intrusion Detection in Virtual Machine Environments. EUROMICRO 2004: 520-525 - [c15]Emir Toktar, Edgard Jamhour, Carlos Maziero:
A XML Policy-Based Approach for RSVP. ICT 2004: 1204-1209 - [c14]Cássio Ditzel Kropiwiec, Edgard Jamhour, Carlos Maziero:
A framework for protecting Web services with IPsec. ISCC 2004: 393-398 - [c13]Emir Toktar, Edgard Jamhour, Carlos Maziero:
RSVP Policy Control using XACML. POLICY 2004: 87- - 2003
- [j1]Edgard Jamhour, Simone Storoz, Carlos Maziero:
Global Mobile IPv6 Addressing using Transition Mechanisms. J. Braz. Comput. Soc. 8(3): 44-57 (2003) - [c12]Altair Olivo Santin, Joni da Silva Fraga, Carlos Maziero:
Extending the SDSI / SPKI Model through Federation Webs. Communications and Multimedia Security 2003: 132-145 - [c11]Ricardo Nabhen, Edgard Jamhour, Carlos Maziero:
A Policy-based Framework for RBAC. DSOM 2003: 181-193 - [c10]Ricardo Nabhen, Edgard Jamhour, Carlos Maziero:
A Policy Based Framework for Access Control. ICICS 2003: 47-59 - [c9]Mauro Borchardt, Carlos Maziero, Edgard Jamhour:
An Architecture for On-the-Fly File Integrity Checking. LADC 2003: 117-126 - [c8]Ricardo Nabhen, Edgard Jamhour, Carlos Maziero:
RBPIM: A PCIM-Based Framework for RBAC. LCN 2003: 52- - 2001
- [c7]Cristina Verçosa Pérez Barrios de Souza, Carlos Alberto Maziero:
Intercessão em Tempo de Implantação - uma Abordagem Reflexiva para a Plataforma J2EE™ -. SBES 2001: 286-301 - 2000
- [c6]Fernando Vardânega, Carlos Maziero:
A Generic Rollback Manager for Optimistic HLA Simulations. DS-RT 2000: 79-88
1990 – 1999
- 1999
- [c5]Fernando Vardânega, Carlos Maziero:
Using Computational Reflection in Optimistic Distributed Simulations. SCCC 1999: 1-8 - [c4]Lau Cheuk Lung, Joni da Silva Fraga, Carlos Maziero:
MetaFT-A Reflective Approach to Implement Replication Techniques in CORBA. SCCC 1999: 25-34 - 1997
- [c3]Joni da Silva Fraga, Carlos Maziero, Lau Cheuk Lung, Orlando Gomes Loques Filho:
Implementing replicated services in open systems using a reflective approach. ISADS 1997: 273-280 - 1992
- [c2]Philippe Ingels, Carlos Maziero, Michel Raynal:
A Distributed Kernel for Virtual Time Driven Applications. ICCI 1992: 457-460
1980 – 1989
- 1988
- [c1]Carlos Alberto Maziero, Jean-Marie Farines:
Ambiente de Concepção de Software para Sistemas Distribuídos, Baseado em Rede de Petri. SBES 1988: 150-157
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint