Home

2014
Timenetsky, KT., FM. de Freitas, RDS. Santos, DH. de Lacerda, P. Verissimo, D. Carnieli-Cazati, and RA. Caserta, "IS EARLY MOBILITY BEING DONE IN THE CLINIC AI PRACTICE?", INTENSIVE CARE MEDICINE, vol. 40: SPRINGER 233 SPRING ST, NEW YORK, NY 10013 USA, pp. S26–S26, 2014.
Verissimo, P., KT. Timenetsky, E. Colucci, TJ. Andre, LHR. Goncalves, CIC. Garcia, ASY. Yang, and RA. Caserta, "IMPACT OF A SPECIFIC INSPIRATORY MUSCLE TRAINING IN EXERCISE CAPACITY AND INSPIRATORY MUSCLE FORCE IN HOSPITALIZED ACUTE HEART FAILURE PATIENTS: PILOT STUDY", INTENSIVE CARE MEDICINE, vol. 40: SPRINGER 233 SPRING ST, NEW YORK, NY 10013 USA, pp. S29–S30, 2014.
Verissimo, P., J. Rufino, and L. Rodrigues, "LAN-BASED PROTOCOLS", Distributed Computer Control Systems 1991: Towards Distributed Real-Time Systems with Predictable Timing Properties: Elsevier, pp. 75, 2014.
Verissimo, P., KT. Timenetsky, E. Colucci, LHG. Rodrigues, DM. May, and RA. Caserta, "NONINVASIVE VENTILATION INSIDE THE CATH LAB CAN BE AN EFFECTIVE AND SAFE ALTERNATIVE FOR PATIENTS WITH ACUTE RESPIRATORY FAILURE", INTENSIVE CARE MEDICINE, vol. 40: SPRINGER 233 SPRING ST, NEW YORK, NY 10013 USA, pp. S72–S72, 2014.
Verissimo, P., Optimisation de la Réponse aux menaces basée sur les coûts dans des systèmes pour la Sécurité de l'Information et la Gestion des Evénements (SIEMs), : Télécom SudParis, 2014.
Bessani, A. Neves, R. Mendes, T. Oliveira, N. Ferreira Neves, M. Correia, M. Pasin, and P. Verissimo, "SCFS: a shared cloud-backed file system", Usenix ATC, 2014.
Verissimo, P., "Security Made, Not Perfect, But Automatic", Security Protocols XVIII: Springer Berlin Heidelberg, pp. 217–223, 2014.
Verissimo, P., "Security Made, Not Perfect, But Automatic (Transcript of Discussion)", Security Protocols XVIII: Springer Berlin Heidelberg, pp. 224–232, 2014.
2012
Dixit, M., A. Casimiro, P. Lollini, A. Bondavalli, and P. Verissimo, "Adaptare: Supporting automatic and dependable adaptation in dynamic environments", ACM Transactions on Autonomous and Adaptive Systems (TAAS), vol. 7, no. 2: ACM, pp. 18, 2012.
Correia, M., N. Ferreira Neves, and P. Verissimo, "BFT-TO: Intrusion tolerance with less replicas", The Computer Journal: Oxford University Press, pp. bxs148, 2012.
Dondossola, G., G. Deconinck, F. Di Giandomenico, S. Donatelli, M. Kaaniche, and P. Verissimo, "Critical utility infrastructural resilience", arXiv preprint arXiv:1211.5736, 2012.
Bessani, A. Neves, E. Vial, M. Garcia, R. Fonseca, H. Rouhani, and P. Verissimo, D5. 1.3-Proof-of-concept Prototype of Defense Mechanisms, , 2012.
Correia, M., P. Costa, M. Pasin, A. Neves Bessani, F. M. V. Ramos, and P. Verissimo, On the Feasibility of Byzantine Fault-Tolerant MapReduce in Clouds-of-Clouds, , 2012.
Correia, M., P. Costa, M. Pasin, A. Bessani, F. Ramos, and P. Verissimo, "On the Feasibility of Byzantine Fault-Tolerant MapReduce in Clouds-of-Clouds", IEEE Symposium on Reliable Distributed Systems, pp. 448-453, 2012.
Correia, M., P. Costa, M. Pasin, A. Neves Bessani, F. M. V. Ramos, and P. Verissimo, "On the Feasibility of Byzantine Fault-Tolerant MapReduce in Clouds-of-Clouds.", SRDS, pp. 448–453, 2012.
Colucci, E., DR. Alves, DHR. Goncalves, KT. Timenetsky, RAC. Eid, and P. Verissimo, "Noninvasive Ventilation Inside The Cath Lab Can Be An Effective And Safe Alternative For Patients With Acute Respiratory Failure", Am J Respir Crit Care Med, vol. 185, pp. A3115, 2012.
Verissimo, P., A. Neves Bessani, and M. Pasin, "The TClouds architecture: Open and resilient cloud-of-clouds computing", Dependable Systems and Networks Workshops (DSN-W), 2012 IEEE/IFIP 42nd International Conference on: IEEE, pp. 1–6, 2012.
Casimiro, A., P. Verissimo, D. Kreutz, F. Araujo, R. Barbosa, S. Neves, B. Sousa, M. Curado, C. Silva, R. Gandhi, et al., "TRONE: Trustworthy and resilient operations in a network environment", Dependable Systems and Networks Workshops (DSN-W), 2012 IEEE/IFIP 42nd International Conference on: IEEE, pp. 1–6, 2012.
2011
Correia, M., G. Santos Veronese, N. Ferreira Neves, and P. Verissimo, "Byzantine consensus in asynchronous message-passing systems: a survey", International Journal of Critical Computer-Based Systems, vol. 2, no. 2: Inderscience Publishers, pp. 141–161, 2011.
Costa, A., A. Neves Bessani, and P. Verissimo, D5. 1.1-Preliminary Resilient Framework Architecture, , 2011.
Di Sarno, C., N. Kuntze, P. Verissimo, R. Fonseca, and R. Rieke, D5. 1.2-Preliminary Defense Services and Protocols, , 2011.
Di Sarno, C., A. Mazzeo, N. Mazzocca, R. Rieke, P. Rodrigues, L. Romano, P. Verissimo, and E. Vial, D5. 1.4-Resilient SIEM Framework Architecture, Services and Protocols, , 2011.
Moniz, H., N. Ferreira Neves, M. Correia, and P. Verissimo, "Randomization can be a healer: consensus with dynamic omission failures", Distributed Computing, vol. 24, no. 3-4: Springer-Verlag, pp. 165–175, 2011.
Vavala, B., N. Ferreira Neves, H. Moniz, and P. Verissimo, "Randomized Consensus in Wireless Environments", International Journal On Advances in Intelligent Systems, vol. 4, no. 1 and 2, pp. 1–12, 2011.
Kauer, B., P. Verissimo, and A. Neves Bessani, "Recursive virtual machines for advanced security mechanisms", Dependable Systems and Networks Workshops (DSN-W), 2011 IEEE/IFIP 41st International Conference on: IEEE, pp. 117–122, 2011.
Timenetsky, KT., T. Figueiredo, AS. Yang, TJ. Andre, MK. Nagano, C. Alexandre, C. Garcia, RA. Caserta, P. Verissimo, and E. Silva, "Respiratory Muscle Weakness In Acute Heart Failure Patients", Am J Respir Crit Care Med, vol. 183, pp. A4246, 2011.
Verissimo, P., KT. Timenetsky, T. Figueiredo, ASY. Yang, TJ. Andre, MK. Nagano, C. Alexandre, C. Garcia, RA. Caserta, and E. Silva, "Respiratory Muscle Weakness In Acute Heart Failure Patients", AMERICAN JOURNAL OF RESPIRATORY AND CRITICAL CARE MEDICINE, vol. 183: AMER THORACIC SOC 61 BROADWAY, FL 4, NEW YORK, NY 10006 USA, 2011.
Goncalves, LHR., P. Verissimo, K. Timenetsky, T. Figueiredo, A. Yang, T. Andre, M. Nagano, C. Alexandre, A. Goedert, R. Caserta, et al., "Respiratory muscle weakness in acute heart failure patients", Critical Care, vol. 15, no. Suppl 2: BioMed Central Ltd, pp. P24, 2011.
Antunes, J., N. Ferreira Neves, and P. Verissimo, "Reverse engineering of protocols from network traces", Reverse Engineering (WCRE), 2011 18th Working Conference on: IEEE, pp. 169–178, 2011.
Antunes, J., N. Ferreira Neves, and P. Verissimo, ReverX: Reverse engineering of protocols, , 2011.
Moniz, H., N. Ferreira Neves, M. Correia, and P. Verissimo, "RITAS: Services for randomized intrusion tolerance", Dependable and Secure Computing, IEEE Transactions on, vol. 8, no. 1: IEEE, pp. 122–136, 2011.
2010
Rufino, J., J. Craveiro, and P. Verissimo, "Architecting robustness and timeliness in a new generation of aerospace systems", Architecting dependable systems VII: Springer Berlin Heidelberg, pp. 146–170, 2010.
Couto, F., I. Andrade, P. Gonçalves, and P. Verissimo, Benchmarking some Portuguese S&T system research units, , 2010.
Rufino, J., J. Craveiro, and P. Verissimo, "Building a time-and space-partitioned architecture for the next generation of space vehicle avionics", Software Technologies for Embedded and Ubiquitous Systems: Springer Berlin Heidelberg, pp. 179–190, 2010.
Sousa, P., A. Neves Bessani, M. Correia, N. Ferreira Neves, and P. Verissimo, "Highly available intrusion-tolerant services with proactive-reactive recovery", Parallel and Distributed Systems, IEEE Transactions on, vol. 21, no. 4: IEEE, pp. 452–465, 2010.
Vavala, B., N. Ferreira Neves, H. Moniz, and P. Verissimo, "Randomized consensus in wireless environments: a case where more is better", Dependability (DEPEND), 2010 Third International Conference on: IEEE, pp. 7–12, 2010.
Silva, C., P. Sousa, and P. Verissimo, "Rave: Replicated antivirus engine", Dependable Systems and Networks Workshops (DSN-W), 2010 International Conference on: IEEE, pp. 170–175, 2010.
Antunes, J., N. Ferreira Neves, M. Correia, P. Verissimo, and R. Neves, "Vulnerability discovery with attack injection", Software Engineering, IEEE Transactions on, vol. 36, no. 3: IEEE, pp. 357–370, 2010.
2009
Casimiro, A., J. Rufino, L. Marques, M. Calha, and P. Verissimo, "Applying architectural hybridization in networked embedded systems", Software Technologies for Embedded and Ubiquitous Systems: Springer Berlin Heidelberg, pp. 264–275, 2009.
Bessani, A. Neves, P. Sousa, M. Correia, N. Ferreira Neves, and P. Verissimo, "Cheap intrusion-tolerant protection for crutial things", Technical Report DI-FCUL TR-2009-14, 2009.
Correia, M., A. Neves Bessani, N. Ferreira Neves, P. Verissimo, and P. Sousa, Cheap Intrusion-Tolerant Protection for CRUTIAL Things, , 2009.
Verissimo, P., A. Neves Bessani, M. Correia, N. Ferreira Neves, and P. Sousa, "Designing modular and redundant cyber architectures for process control: Lessons learned", System Sciences, 2009. HICSS'09. 42nd Hawaii International Conference on: IEEE, pp. 1–8, 2009.
Couto, F., T. Grego, C. Pesquita, and P. Verissimo, Handling self-citations using Google Scholar, : International Journal of Scientometrics, Informetrics and Bibliometrics, 2009.
Verissimo, P., M. Correia, N. Ferreira Neves, and P. Sousa, "Intrusion-resilient middleware design and validation", Information Assurance, Security and Privacy Services, vol. 4, pp. 615–678, 2009.
Veronese, G. Santos, M. Correia, A. Neves Bessani, C. L Lung, and P. Verissimo, Minimal Byzantine fault tolerance: Algorithm and evaluation, , 2009.
Dixit, M., A. Casimiro, and P. Verissimo, Probabilistic Adaptive Time-Aware Consensus, : Eurosys, 2009.
Areias, M., P. Moniz, and P. Verissimo, "Security and reliability of critical utility infrastructures", Europe, vol. 1, no. 2, pp. 5–6, 2009.
2008
Daidone, A., S. Chiaradonna, A. Bondavalli, and P. Verissimo, "Analysis of a redundant architecture for critical infrastructure protection", Architecting Dependable Systems V: Springer Berlin Heidelberg, pp. 78–100, 2008.
Correia, M., A. Neves Bessani, and P. Verissimo, "On Byzantine generals with alternative plans", Journal of Parallel and Distributed Computing, vol. 68, no. 9: Academic Press, pp. 1291–1296, 2008.
Correia, M., A. Neves Bessani, P. Sousa, N. Ferreira Neves, and P. Verissimo, Critical Infrastructure Protection: the CRUTIAL Project, , 2008.
Verissimo, P., N. Ferreira Neves, M. Correia, Y. Deswarte, A. Abou El Kalan, A. Bondavalli, and A. Daidone, "The CRUTIAL architecture for critical information infrastructures", Architecting Dependable Systems V: Springer Berlin Heidelberg, pp. 1–27, 2008.
Verissimo, P., N. Ferreira Neves, M. Correia, Y. Deswarte, A. Abou El Kalan, A. Bondavalli, and A. Daidone, The CRUTIAL Architecture for Critical Information Infrastructures, Architecting Dependable Systems V, : Springer-Verlag, Berlin, Heidelberg, 2008.
Verissimo, P., N. Ferreira Neves, and M. Correia, "The CRUTIAL reference critical information infrastructure architecture: a blueprint", International Journal of System of Systems Engineering, vol. 1, no. 1: Inderscience, pp. 78–95, 2008.
Bessani, A. Neves, P. Sousa, M. Correia, N. Ferreira Neves, and P. Verissimo, "The CRUTIAL way of critical infrastructure protection", Security & Privacy, IEEE, vol. 6, no. 6: IEEE, pp. 44–51, 2008.
Antunes, J., N. Ferreira Neves, and P. Verissimo, "Detection and prediction of resource-exhaustion vulnerabilities", Software Reliability Engineering, 2008. ISSRE 2008. 19th International Symposium on: IEEE, pp. 87–96, 2008.
Donatelli, S., E. Alata, J. Antunes, M. Kaaniche, N. Ferreira Neves, and P. Verissimo, Experimental validation of architectural solutions, : Department of Informatics, University of Lisbon, 2008.
Donatelli, S., E. Alata, J. Antunes, M. Kaaniche, N. Ferreira Neves, and P. Verissimo, Experimental validation of architectural solutions (I), : Department of Informatics, University of Lisbon, 2008.
Veronese, G. Santos, M. Correia, C. L Lung, and P. Verissimo, "Finite Memory: a Vulnerability of Intrusion-Tolerant Systems", Network Computing and Applications, 2008. NCA'08. Seventh IEEE International Symposium on: IEEE, pp. 37–44, 2008.
Casimiro, A., P. Lollini, M. Dixit, A. Bondavalli, and P. Verissimo, "A framework for dependable QoS adaptation in probabilistic environments", Proceedings of the 2008 ACM symposium on Applied computing: ACM, pp. 2192–2196, 2008.
Casimiro, A., and P. Verissimo, HIDENETS–Highly Dependable IP-based Networks and Services, , 2008.
Bellovin, S. M., T. V. Benzel, B. Blakley, D. E. Denning, W. Diffie, J. Epstein, and P. Verissimo, "Information assurance technology forecast 2008", IEEE Security & Privacy, no. 1: IEEE, pp. 16–23, 2008.
Neves, N. Ferreira, and P. Verissimo, Preliminary specification of services and protocols, : Department of Informatics, University of Lisbon, 2008.
Verissimo, P., Security and Dependability Risks of Critical Information Infrastructures, , 2008.
Ortiz, H., P. Sousa, and P. Verissimo, Towards Intrusion-Tolerant Process Control Software, : SINO 2008-4ª Conferência Nacional sobre Segurança Informática nas Organizações, 2008.
2007
Ortiz, H., A. Casimiro, and P. Verissimo, "Architecture and Implementation of an Embedded Wormhole", Industrial Embedded Systems, 2007. SIES'07. International Symposium on: IEEE, pp. 341–344, 2007.
Verissimo, P., "Assumptions: The Trojan Horses of Secure Protocols", Computer Network Security: Springer Berlin Heidelberg, pp. 34–41, 2007.
Khanna, G., M. Yu Cheng, P. Varadharajan, S. Bagchi, M. Correia, and P. Verissimo, "Automated rule-based diagnosis through a distributed monitor system", Dependable and Secure Computing, IEEE Transactions on, vol. 4, no. 4: IEEE, pp. 266–279, 2007.
Veronese, G. Santos, M. Correia, C. L Lung, and P. Verissimo, "On the effects of finite memory on intrusion-tolerant systems", Dependable Computing, 2007. PRDC 2007. 13th Pacific Rim International Symposium on: IEEE, pp. 401–404, 2007.
Veronese, G. Santos, V. Miguel, C. Lau, C. L Lung, and P. Verissimo, On the Effects of Finite Memory on Intrusion-Tolerant Systems*, , 2007.
Antunes, J., N. Ferreira Neves, and P. Verissimo, Finding Local Resource Exhaustion Vulnerabilities, : International Symposium on Software Reliability Engineering, 2007.
Casimiro, A., P. Lolinni, M. Dixit, A. Bondavalli, and P. Verissimo, A framework for dependable adaptation in probabilistic environments, : Department of Informatics, University of Lisbon, 2007.
Casimiro, A., J. Kaiser, and P. Verissimo, "Generic-Events Architecture: Integrating real-world aspects in event-based systems", Architecting dependable systems IV: Springer Berlin Heidelberg, pp. 287–315, 2007.
Sousa, P., N. Ferreira Neves, and P. Verissimo, "Hidden problems of asynchronous proactive recovery", Proceedings of the Workshop on Hot Topics in System Dependability, 2007.
Verissimo, P., J. Gomes Almeida, P. Antunes, R. Bravo, J. Pina Miranda, P. Verdelho, and A. Zúquete, A Identidade Digital1, , 2007.
Moniz, H., N. Ferreira Neves, M. Correia, A. Casimiro, and P. Verissimo, "Intrusion tolerance in wireless environments: An experimental evaluation", Dependable Computing, 2007. PRDC 2007. 13th Pacific Rim International Symposium on: IEEE, pp. 357–364, 2007.
Bessani, A. Neves, P. Sousa, M. Correia, N. Ferreira Neves, and P. Verissimo, Intrusion-tolerant protection for critical infrastructures, : Department of Informatics, University of Lisbon, 2007.
Bessani, A. Neves, P. Sousa, M. Correia, N. Ferreira Neves, and P. Verissimo, Protecting CRUTIAL Things, : 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007.
Sousa, P., A. Neves Bessani, M. Correia, N. Ferreira Neves, and P. Verissimo, "Resilient intrusion tolerance through proactive and reactive recovery", Dependable Computing, 2007. PRDC 2007. 13th Pacific Rim International Symposium on: IEEE, pp. 373–380, 2007.
Bessani, A. Neves, M. Correia, H. Moniz, N. Ferreira Neves, and P. Verissimo, "When 3 f+ 1 Is Not Enough: Tradeoffs for Decentralized Asynchronous Byzantine Consensus", Brief Announcement, Proceedings of 21st International Symposium on Distributed Computing (DISC 07), Lemesos, Cyprus: Springer Berlin/Heidelberg, pp. 480–481, 2007.
Correia, M., N. Ferreira Neves, C. L Lung, and P. Verissimo, "Worm-IT–a wormhole-based intrusion-tolerant group communication system", Journal of Systems and Software, vol. 80, no. 2: Elsevier, pp. 178–197, 2007.
2006
Dondossola, G., G. Deconinck, F. Di Giandomenico, S. Donatelli, M. Kaaniche, and P. Verissimo, "An approach to modelling and mitigating infrastructure interdependencies", Proceedings of (CRIS) The International Institute for Critical Infrastructures-3rd International Conference on Critical Infrastructures, pp. 4, 2006.
Rufino, J., P. Verissimo, G. Arroz, and C. Almeida, "Control of inaccessibility in CANELy", Proceedings of the 6th. International Workshop on Factory Communication Systems, pp. 35–44, 2006.
Verissimo, P., N. Ferreira Neves, and M. Correia, "CRUTIAL: The blueprint of a reference critical information infrastructure architecture", Critical Information Infrastructures Security: Springer Berlin Heidelberg, pp. 1–14, 2006.
Casimiro, A., O. Mendizabal, and P. Verissimo, On the development of dependable embedded applications using specialized wormholes, : 3rd International Workshop on Dependable Embedded Systems, 2006.
Rufino, J., C. Almeida, P. Verissimo, and G. Arroz, "Enforcing dependability and timeliness in Controller Area Networks", IEEE Industrial Electronics, IECON 2006-32nd Annual Conference on: IEEE, pp. 3755–3760, 2006.
Moniz, H., N. Ferreira Neves, M. Correia, and P. Verissimo, "Experimental comparison of local and shared coin randomized consensus protocols", Reliable Distributed Systems, 2006. SRDS'06. 25th IEEE Symposium on: IEEE, pp. 235–244, 2006.
Correia, M., N. Ferreira Neves, and P. Verissimo, "From consensus to atomic broadcast: Time-free Byzantine-resistant protocols without signatures", The Computer Journal, vol. 49, no. 1: Br Computer Soc, pp. 82–96, 2006.
Verissimo, P., J. Arlat, A. Bondavalli, and B. Haverkort, "Guest Editorial for the Special Issue on the 2005 IEEE/IFIP Conference on Dependable Systems and Networks, including the Dependable Computing and Communications and Performance and Dependability Symposia", IEEE Transactions on Dependable and Secure Computing, vol. 3, no. 3: IEEE Computer Society, pp. 0169–171, 2006.
Arlat, J., A. Bondavalli, BRHM. Haverkort, and P. Verissimo, IEEE Transactions on Dependable and Secure Computing, : IEEE Computer Society, 2006.
Rufino, J., P. Verissimo, C. Almeida, and G. Arroz, "Integrating inaccessibility control and timer management in canely", Emerging Technologies and Factory Automation, 2006. ETFA'06. IEEE Conference on: IEEE, pp. 348–355, 2006.
Verissimo, P., N. Ferreira Neves, C. Cachin, J. Poritz, D. Powell, Y. Deswarte, R. Stroud, and I. Welch, "Intrusion-tolerant middleware: The road to automatic security", Security & Privacy, IEEE, vol. 4, no. 4: IEEE, pp. 54–62, 2006.

Pages