Home

E
Timenetsky, KT., FM. de Freitas, RDS. Santos, DH. de Lacerda, P. Verissimo, D. Carnieli-Cazati, and RA. Caserta, "IS EARLY MOBILITY BEING DONE IN THE CLINIC AI PRACTICE?", INTENSIVE CARE MEDICINE, vol. 40: SPRINGER 233 SPRING ST, NEW YORK, NY 10013 USA, pp. S26–S26, 2014.
L
Verissimo, P., J. Rufino, and L. Rodrigues, "LAN-BASED PROTOCOLS", Distributed Computer Control Systems 1991: Towards Distributed Real-Time Systems with Predictable Timing Properties: Elsevier, pp. 75, 2014.
A
Dixit, M., A. Casimiro, P. Lollini, A. Bondavalli, and P. Verissimo, "Adaptare: Supporting automatic and dependable adaptation in dynamic environments", ACM Transactions on Autonomous and Adaptive Systems (TAAS), vol. 7, no. 2: ACM, pp. 18, 2012.
B
Correia, M., N. Ferreira Neves, and P. Verissimo, "BFT-TO: Intrusion tolerance with less replicas", The Computer Journal: Oxford University Press, pp. bxs148, 2012.
T
Verissimo, P., A. Neves Bessani, and M. Pasin, "The TClouds architecture: Open and resilient cloud-of-clouds computing", Dependable Systems and Networks Workshops (DSN-W), 2012 IEEE/IFIP 42nd International Conference on: IEEE, pp. 1–6, 2012.
Casimiro, A., P. Verissimo, D. Kreutz, F. Araujo, R. Barbosa, S. Neves, B. Sousa, M. Curado, C. Silva, R. Gandhi, et al., "TRONE: Trustworthy and resilient operations in a network environment", Dependable Systems and Networks Workshops (DSN-W), 2012 IEEE/IFIP 42nd International Conference on: IEEE, pp. 1–6, 2012.
B
Correia, M., G. Santos Veronese, N. Ferreira Neves, and P. Verissimo, "Byzantine consensus in asynchronous message-passing systems: a survey", International Journal of Critical Computer-Based Systems, vol. 2, no. 2: Inderscience Publishers, pp. 141–161, 2011.
R
Moniz, H., N. Ferreira Neves, M. Correia, and P. Verissimo, "Randomization can be a healer: consensus with dynamic omission failures", Distributed Computing, vol. 24, no. 3-4: Springer-Verlag, pp. 165–175, 2011.
Vavala, B., N. Ferreira Neves, H. Moniz, and P. Verissimo, "Randomized Consensus in Wireless Environments", International Journal On Advances in Intelligent Systems, vol. 4, no. 1 and 2, pp. 1–12, 2011.
Kauer, B., P. Verissimo, and A. Neves Bessani, "Recursive virtual machines for advanced security mechanisms", Dependable Systems and Networks Workshops (DSN-W), 2011 IEEE/IFIP 41st International Conference on: IEEE, pp. 117–122, 2011.
Goncalves, LHR., P. Verissimo, K. Timenetsky, T. Figueiredo, A. Yang, T. Andre, M. Nagano, C. Alexandre, A. Goedert, R. Caserta, et al., "Respiratory muscle weakness in acute heart failure patients", Critical Care, vol. 15, no. Suppl 2: BioMed Central Ltd, pp. P24, 2011.
Timenetsky, KT., T. Figueiredo, AS. Yang, TJ. Andre, MK. Nagano, C. Alexandre, C. Garcia, RA. Caserta, P. Verissimo, and E. Silva, "Respiratory Muscle Weakness In Acute Heart Failure Patients", Am J Respir Crit Care Med, vol. 183, pp. A4246, 2011.
Verissimo, P., KT. Timenetsky, T. Figueiredo, ASY. Yang, TJ. Andre, MK. Nagano, C. Alexandre, C. Garcia, RA. Caserta, and E. Silva, "Respiratory Muscle Weakness In Acute Heart Failure Patients", AMERICAN JOURNAL OF RESPIRATORY AND CRITICAL CARE MEDICINE, vol. 183: AMER THORACIC SOC 61 BROADWAY, FL 4, NEW YORK, NY 10006 USA, 2011.
Antunes, J., N. Ferreira Neves, and P. Verissimo, "Reverse engineering of protocols from network traces", Reverse Engineering (WCRE), 2011 18th Working Conference on: IEEE, pp. 169–178, 2011.
Antunes, J., N. Ferreira Neves, and P. Verissimo, ReverX: Reverse engineering of protocols, , 2011.
Moniz, H., N. Ferreira Neves, M. Correia, and P. Verissimo, "RITAS: Services for randomized intrusion tolerance", Dependable and Secure Computing, IEEE Transactions on, vol. 8, no. 1: IEEE, pp. 122–136, 2011.
A
Rufino, J., J. Craveiro, and P. Verissimo, "Architecting robustness and timeliness in a new generation of aerospace systems", Architecting dependable systems VII: Springer Berlin Heidelberg, pp. 146–170, 2010.
H
Sousa, P., A. Neves Bessani, M. Correia, N. Ferreira Neves, and P. Verissimo, "Highly available intrusion-tolerant services with proactive-reactive recovery", Parallel and Distributed Systems, IEEE Transactions on, vol. 21, no. 4: IEEE, pp. 452–465, 2010.
R
Vavala, B., N. Ferreira Neves, H. Moniz, and P. Verissimo, "Randomized consensus in wireless environments: a case where more is better", Dependability (DEPEND), 2010 Third International Conference on: IEEE, pp. 7–12, 2010.
Silva, C., P. Sousa, and P. Verissimo, "Rave: Replicated antivirus engine", Dependable Systems and Networks Workshops (DSN-W), 2010 International Conference on: IEEE, pp. 170–175, 2010.
V
Antunes, J., N. Ferreira Neves, M. Correia, P. Verissimo, and R. Neves, "Vulnerability discovery with attack injection", Software Engineering, IEEE Transactions on, vol. 36, no. 3: IEEE, pp. 357–370, 2010.
A
Casimiro, A., J. Rufino, L. Marques, M. Calha, and P. Verissimo, "Applying architectural hybridization in networked embedded systems", Software Technologies for Embedded and Ubiquitous Systems: Springer Berlin Heidelberg, pp. 264–275, 2009.
D
Verissimo, P., A. Neves Bessani, M. Correia, N. Ferreira Neves, and P. Sousa, "Designing modular and redundant cyber architectures for process control: Lessons learned", System Sciences, 2009. HICSS'09. 42nd Hawaii International Conference on: IEEE, pp. 1–8, 2009.
H
Couto, F., T. Grego, C. Pesquita, and P. Verissimo, Handling self-citations using Google Scholar, : International Journal of Scientometrics, Informetrics and Bibliometrics, 2009.
I
Verissimo, P., M. Correia, N. Ferreira Neves, and P. Sousa, "Intrusion-resilient middleware design and validation", Information Assurance, Security and Privacy Services, vol. 4, pp. 615–678, 2009.
A
Daidone, A., S. Chiaradonna, A. Bondavalli, and P. Verissimo, "Analysis of a redundant architecture for critical infrastructure protection", Architecting Dependable Systems V: Springer Berlin Heidelberg, pp. 78–100, 2008.
B
Correia, M., A. Neves Bessani, and P. Verissimo, "On Byzantine generals with alternative plans", Journal of Parallel and Distributed Computing, vol. 68, no. 9: Academic Press, pp. 1291–1296, 2008.
D
Antunes, J., N. Ferreira Neves, and P. Verissimo, "Detection and prediction of resource-exhaustion vulnerabilities", Software Reliability Engineering, 2008. ISSRE 2008. 19th International Symposium on: IEEE, pp. 87–96, 2008.
F
Veronese, G. Santos, M. Correia, C. L Lung, and P. Verissimo, "Finite Memory: a Vulnerability of Intrusion-Tolerant Systems", Network Computing and Applications, 2008. NCA'08. Seventh IEEE International Symposium on: IEEE, pp. 37–44, 2008.
Casimiro, A., P. Lollini, M. Dixit, A. Bondavalli, and P. Verissimo, "A framework for dependable QoS adaptation in probabilistic environments", Proceedings of the 2008 ACM symposium on Applied computing: ACM, pp. 2192–2196, 2008.
P
Neves, N. Ferreira, and P. Verissimo, Preliminary specification of services and protocols, : Department of Informatics, University of Lisbon, 2008.
T
Ortiz, H., P. Sousa, and P. Verissimo, Towards Intrusion-Tolerant Process Control Software, : SINO 2008-4ª Conferência Nacional sobre Segurança Informática nas Organizações, 2008.
A
Ortiz, H., A. Casimiro, and P. Verissimo, "Architecture and Implementation of an Embedded Wormhole", Industrial Embedded Systems, 2007. SIES'07. International Symposium on: IEEE, pp. 341–344, 2007.
Verissimo, P., "Assumptions: The Trojan Horses of Secure Protocols", Computer Network Security: Springer Berlin Heidelberg, pp. 34–41, 2007.
Khanna, G., M. Yu Cheng, P. Varadharajan, S. Bagchi, M. Correia, and P. Verissimo, "Automated rule-based diagnosis through a distributed monitor system", Dependable and Secure Computing, IEEE Transactions on, vol. 4, no. 4: IEEE, pp. 266–279, 2007.
G
Casimiro, A., J. Kaiser, and P. Verissimo, "Generic-Events Architecture: Integrating real-world aspects in event-based systems", Architecting dependable systems IV: Springer Berlin Heidelberg, pp. 287–315, 2007.
H
Sousa, P., N. Ferreira Neves, and P. Verissimo, "Hidden problems of asynchronous proactive recovery", Proceedings of the Workshop on Hot Topics in System Dependability, 2007.
P
Bessani, A. Neves, P. Sousa, M. Correia, N. Ferreira Neves, and P. Verissimo, Protecting CRUTIAL Things, : 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007.
R
Sousa, P., A. Neves Bessani, M. Correia, N. Ferreira Neves, and P. Verissimo, "Resilient intrusion tolerance through proactive and reactive recovery", Dependable Computing, 2007. PRDC 2007. 13th Pacific Rim International Symposium on: IEEE, pp. 373–380, 2007.
W
Bessani, A. Neves, M. Correia, H. Moniz, N. Ferreira Neves, and P. Verissimo, "When 3 f+ 1 Is Not Enough: Tradeoffs for Decentralized Asynchronous Byzantine Consensus", Brief Announcement, Proceedings of 21st International Symposium on Distributed Computing (DISC 07), Lemesos, Cyprus: Springer Berlin/Heidelberg, pp. 480–481, 2007.
Correia, M., N. Ferreira Neves, C. L Lung, and P. Verissimo, "Worm-IT–a wormhole-based intrusion-tolerant group communication system", Journal of Systems and Software, vol. 80, no. 2: Elsevier, pp. 178–197, 2007.
A
Dondossola, G., G. Deconinck, F. Di Giandomenico, S. Donatelli, M. Kaaniche, and P. Verissimo, "An approach to modelling and mitigating infrastructure interdependencies", Proceedings of (CRIS) The International Institute for Critical Infrastructures-3rd International Conference on Critical Infrastructures, pp. 4, 2006.
C
Rufino, J., P. Verissimo, G. Arroz, and C. Almeida, "Control of inaccessibility in CANELy", Proceedings of the 6th. International Workshop on Factory Communication Systems, pp. 35–44, 2006.
Verissimo, P., N. Ferreira Neves, and M. Correia, "CRUTIAL: The blueprint of a reference critical information infrastructure architecture", Critical Information Infrastructures Security: Springer Berlin Heidelberg, pp. 1–14, 2006.
E
Rufino, J., C. Almeida, P. Verissimo, and G. Arroz, "Enforcing dependability and timeliness in Controller Area Networks", IEEE Industrial Electronics, IECON 2006-32nd Annual Conference on: IEEE, pp. 3755–3760, 2006.
Moniz, H., N. Ferreira Neves, M. Correia, and P. Verissimo, "Experimental comparison of local and shared coin randomized consensus protocols", Reliable Distributed Systems, 2006. SRDS'06. 25th IEEE Symposium on: IEEE, pp. 235–244, 2006.

Pages