Home

Conference Paper
Cogo, V., A. Bessani, F. Couto, and P. Verissimo, "A High-Throughput Method to Detect Privacy-Sensitive Human Genomic Data", Workshop on Privacy in the Electronic Society (WPES), 2015.
Journal Article
Verissimo, P., J. Rufino, and L. Rodrigues, "LAN-BASED PROTOCOLS", Distributed Computer Control Systems 1991: Towards Distributed Real-Time Systems with Predictable Timing Properties: Elsevier, pp. 75, 2014.
Book Chapter
Verissimo, P., "Security Made, Not Perfect, But Automatic", Security Protocols XVIII: Springer Berlin Heidelberg, pp. 217–223, 2014.
Verissimo, P., "Security Made, Not Perfect, But Automatic (Transcript of Discussion)", Security Protocols XVIII: Springer Berlin Heidelberg, pp. 224–232, 2014.
Conference Paper
Kreutz, D., F. M. V. Ramos, and P. Verissimo, "Towards secure and dependable software-defined networks", Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking: ACM, pp. 55–60, 2013.
Conference Paper
Verissimo, P., A. Neves Bessani, and M. Pasin, "The TClouds architecture: Open and resilient cloud-of-clouds computing", Dependable Systems and Networks Workshops (DSN-W), 2012 IEEE/IFIP 42nd International Conference on: IEEE, pp. 1–6, 2012.
Casimiro, A., P. Verissimo, D. Kreutz, F. Araujo, R. Barbosa, S. Neves, B. Sousa, M. Curado, C. Silva, R. Gandhi, et al., "TRONE: Trustworthy and resilient operations in a network environment", Dependable Systems and Networks Workshops (DSN-W), 2012 IEEE/IFIP 42nd International Conference on: IEEE, pp. 1–6, 2012.
Conference Paper
Kauer, B., P. Verissimo, and A. Neves Bessani, "Recursive virtual machines for advanced security mechanisms", Dependable Systems and Networks Workshops (DSN-W), 2011 IEEE/IFIP 41st International Conference on: IEEE, pp. 117–122, 2011.
Verissimo, P., KT. Timenetsky, T. Figueiredo, ASY. Yang, TJ. Andre, MK. Nagano, C. Alexandre, C. Garcia, RA. Caserta, and E. Silva, "Respiratory Muscle Weakness In Acute Heart Failure Patients", AMERICAN JOURNAL OF RESPIRATORY AND CRITICAL CARE MEDICINE, vol. 183: AMER THORACIC SOC 61 BROADWAY, FL 4, NEW YORK, NY 10006 USA, 2011.
Conference Paper
Antunes, J., N. Ferreira Neves, and P. Verissimo, "Reverse engineering of protocols from network traces", Reverse Engineering (WCRE), 2011 18th Working Conference on: IEEE, pp. 169–178, 2011.
Journal Article
Antunes, J., N. Ferreira Neves, and P. Verissimo, ReverX: Reverse engineering of protocols, , 2011.
Moniz, H., N. Ferreira Neves, M. Correia, and P. Verissimo, "RITAS: Services for randomized intrusion tolerance", Dependable and Secure Computing, IEEE Transactions on, vol. 8, no. 1: IEEE, pp. 122–136, 2011.
Book Chapter
Rufino, J., J. Craveiro, and P. Verissimo, "Architecting robustness and timeliness in a new generation of aerospace systems", Architecting dependable systems VII: Springer Berlin Heidelberg, pp. 146–170, 2010.
Book Chapter
Rufino, J., J. Craveiro, and P. Verissimo, "Building a time-and space-partitioned architecture for the next generation of space vehicle avionics", Software Technologies for Embedded and Ubiquitous Systems: Springer Berlin Heidelberg, pp. 179–190, 2010.
Journal Article
Sousa, P., A. Neves Bessani, M. Correia, N. Ferreira Neves, and P. Verissimo, "Highly available intrusion-tolerant services with proactive-reactive recovery", Parallel and Distributed Systems, IEEE Transactions on, vol. 21, no. 4: IEEE, pp. 452–465, 2010.
Conference Paper
Vavala, B., N. Ferreira Neves, H. Moniz, and P. Verissimo, "Randomized consensus in wireless environments: a case where more is better", Dependability (DEPEND), 2010 Third International Conference on: IEEE, pp. 7–12, 2010.
Silva, C., P. Sousa, and P. Verissimo, "Rave: Replicated antivirus engine", Dependable Systems and Networks Workshops (DSN-W), 2010 International Conference on: IEEE, pp. 170–175, 2010.
Journal Article
Antunes, J., N. Ferreira Neves, M. Correia, P. Verissimo, and R. Neves, "Vulnerability discovery with attack injection", Software Engineering, IEEE Transactions on, vol. 36, no. 3: IEEE, pp. 357–370, 2010.
Book Chapter
Casimiro, A., J. Rufino, L. Marques, M. Calha, and P. Verissimo, "Applying architectural hybridization in networked embedded systems", Software Technologies for Embedded and Ubiquitous Systems: Springer Berlin Heidelberg, pp. 264–275, 2009.
Conference Paper
Verissimo, P., A. Neves Bessani, M. Correia, N. Ferreira Neves, and P. Sousa, "Designing modular and redundant cyber architectures for process control: Lessons learned", System Sciences, 2009. HICSS'09. 42nd Hawaii International Conference on: IEEE, pp. 1–8, 2009.
Book Chapter
Daidone, A., S. Chiaradonna, A. Bondavalli, and P. Verissimo, "Analysis of a redundant architecture for critical infrastructure protection", Architecting Dependable Systems V: Springer Berlin Heidelberg, pp. 78–100, 2008.
Book Chapter
Verissimo, P., N. Ferreira Neves, M. Correia, Y. Deswarte, A. Abou El Kalan, A. Bondavalli, and A. Daidone, "The CRUTIAL architecture for critical information infrastructures", Architecting Dependable Systems V: Springer Berlin Heidelberg, pp. 1–27, 2008.
Journal Article
Verissimo, P., N. Ferreira Neves, and M. Correia, "The CRUTIAL reference critical information infrastructure architecture: a blueprint", International Journal of System of Systems Engineering, vol. 1, no. 1: Inderscience, pp. 78–95, 2008.
Bessani, A. Neves, P. Sousa, M. Correia, N. Ferreira Neves, and P. Verissimo, "The CRUTIAL way of critical infrastructure protection", Security & Privacy, IEEE, vol. 6, no. 6: IEEE, pp. 44–51, 2008.
Conference Paper
Antunes, J., N. Ferreira Neves, and P. Verissimo, "Detection and prediction of resource-exhaustion vulnerabilities", Software Reliability Engineering, 2008. ISSRE 2008. 19th International Symposium on: IEEE, pp. 87–96, 2008.
Conference Paper
Veronese, G. Santos, M. Correia, C. L Lung, and P. Verissimo, "Finite Memory: a Vulnerability of Intrusion-Tolerant Systems", Network Computing and Applications, 2008. NCA'08. Seventh IEEE International Symposium on: IEEE, pp. 37–44, 2008.
Casimiro, A., P. Lollini, M. Dixit, A. Bondavalli, and P. Verissimo, "A framework for dependable QoS adaptation in probabilistic environments", Proceedings of the 2008 ACM symposium on Applied computing: ACM, pp. 2192–2196, 2008.
Conference Paper
Ortiz, H., A. Casimiro, and P. Verissimo, "Architecture and Implementation of an Embedded Wormhole", Industrial Embedded Systems, 2007. SIES'07. International Symposium on: IEEE, pp. 341–344, 2007.
Book Chapter
Verissimo, P., "Assumptions: The Trojan Horses of Secure Protocols", Computer Network Security: Springer Berlin Heidelberg, pp. 34–41, 2007.
Conference Paper
Veronese, G. Santos, M. Correia, C. L Lung, and P. Verissimo, "On the effects of finite memory on intrusion-tolerant systems", Dependable Computing, 2007. PRDC 2007. 13th Pacific Rim International Symposium on: IEEE, pp. 401–404, 2007.
Journal Article
Antunes, J., N. Ferreira Neves, and P. Verissimo, Finding Local Resource Exhaustion Vulnerabilities, : International Symposium on Software Reliability Engineering, 2007.
Casimiro, A., P. Lolinni, M. Dixit, A. Bondavalli, and P. Verissimo, A framework for dependable adaptation in probabilistic environments, : Department of Informatics, University of Lisbon, 2007.
Book Chapter
Casimiro, A., J. Kaiser, and P. Verissimo, "Generic-Events Architecture: Integrating real-world aspects in event-based systems", Architecting dependable systems IV: Springer Berlin Heidelberg, pp. 287–315, 2007.
Conference Paper
Moniz, H., N. Ferreira Neves, M. Correia, A. Casimiro, and P. Verissimo, "Intrusion tolerance in wireless environments: An experimental evaluation", Dependable Computing, 2007. PRDC 2007. 13th Pacific Rim International Symposium on: IEEE, pp. 357–364, 2007.
Journal Article
Bessani, A. Neves, P. Sousa, M. Correia, N. Ferreira Neves, and P. Verissimo, Intrusion-tolerant protection for critical infrastructures, : Department of Informatics, University of Lisbon, 2007.
Bessani, A. Neves, P. Sousa, M. Correia, N. Ferreira Neves, and P. Verissimo, Protecting CRUTIAL Things, : 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007.
Conference Paper
Sousa, P., A. Neves Bessani, M. Correia, N. Ferreira Neves, and P. Verissimo, "Resilient intrusion tolerance through proactive and reactive recovery", Dependable Computing, 2007. PRDC 2007. 13th Pacific Rim International Symposium on: IEEE, pp. 373–380, 2007.
Bessani, A. Neves, M. Correia, H. Moniz, N. Ferreira Neves, and P. Verissimo, "When 3 f+ 1 Is Not Enough: Tradeoffs for Decentralized Asynchronous Byzantine Consensus", Brief Announcement, Proceedings of 21st International Symposium on Distributed Computing (DISC 07), Lemesos, Cyprus: Springer Berlin/Heidelberg, pp. 480–481, 2007.
Journal Article
Correia, M., N. Ferreira Neves, C. L Lung, and P. Verissimo, "Worm-IT–a wormhole-based intrusion-tolerant group communication system", Journal of Systems and Software, vol. 80, no. 2: Elsevier, pp. 178–197, 2007.
Dondossola, G., G. Deconinck, F. Di Giandomenico, S. Donatelli, M. Kaaniche, and P. Verissimo, "An approach to modelling and mitigating infrastructure interdependencies", Proceedings of (CRIS) The International Institute for Critical Infrastructures-3rd International Conference on Critical Infrastructures, pp. 4, 2006.
Rufino, J., P. Verissimo, G. Arroz, and C. Almeida, "Control of inaccessibility in CANELy", Proceedings of the 6th. International Workshop on Factory Communication Systems, pp. 35–44, 2006.
Book Chapter
Verissimo, P., N. Ferreira Neves, and M. Correia, "CRUTIAL: The blueprint of a reference critical information infrastructure architecture", Critical Information Infrastructures Security: Springer Berlin Heidelberg, pp. 1–14, 2006.
Journal Article
Casimiro, A., O. Mendizabal, and P. Verissimo, On the development of dependable embedded applications using specialized wormholes, : 3rd International Workshop on Dependable Embedded Systems, 2006.
Conference Paper
Rufino, J., C. Almeida, P. Verissimo, and G. Arroz, "Enforcing dependability and timeliness in Controller Area Networks", IEEE Industrial Electronics, IECON 2006-32nd Annual Conference on: IEEE, pp. 3755–3760, 2006.
Moniz, H., N. Ferreira Neves, M. Correia, and P. Verissimo, "Experimental comparison of local and shared coin randomized consensus protocols", Reliable Distributed Systems, 2006. SRDS'06. 25th IEEE Symposium on: IEEE, pp. 235–244, 2006.
Conference Paper
Rufino, J., P. Verissimo, C. Almeida, and G. Arroz, "Integrating inaccessibility control and timer management in canely", Emerging Technologies and Factory Automation, 2006. ETFA'06. IEEE Conference on: IEEE, pp. 348–355, 2006.

Pages