Search filters

List of works by Paulo Esteves Verissimo

Adaptare

Analysis of a Redundant Architecture for Critical Infrastructure Protection

article by Alessandro Daidone et al published 2008 in Lecture Notes in Computer Science

Applying Architectural Hybridization in Networked Embedded Systems

article by António Casimiro et al published 2009 in Lecture Notes in Computer Science

Architecting Robustness and Timeliness in a New Generation of Aerospace Systems

Architecture and Implementation of an Embedded Wormhole

Assumptions: The Trojan Horses of Secure Protocols

Building a Time- and Space-Partitioned Architecture for the Next Generation of Space Vehicle Avionics

Byzantine consensus in asynchronous message-passing systems: a survey

CRUTIAL: The Blueprint of a Reference Critical Information Infrastructure Architecture

article by Paulo Esteves Verissimo et al published 2006 in Lecture Notes in Computer Science

Detection and Prediction of Resource-Exhaustion Vulnerabilities

article

Development of generic multibody road vehicle models for crashworthiness

article

Efficient Byzantine Fault-Tolerance

Enforcing Dependability and Timeliness in Controller Area Networks

Experimental Comparison of Local and Shared Coin Randomized Consensus Protocols

Finite Memory: A Vulnerability of Intrusion-Tolerant Systems

From Consensus to Atomic Broadcast: Time-Free Byzantine-Resistant Protocols without Signatures

Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery

Information Assurance Technology Forecast 2008

Integrating Inaccessibility Control and Timer Management in CANELy

On Byzantine generals with alternative plans

On the Feasibility of Byzantine Fault-Tolerant MapReduce in Clouds-of-Clouds

Proactive Resilience Revisited: The Delicate Balance Between Resisting Intrusions and Remaining Available

article

RAVE: Replicated antivirus engine

RITAS: Services for Randomized Intrusion Tolerance

Randomization Can Be a Healer: Consensus with Dynamic Omission Failures

Randomization can be a healer: consensus with dynamic omission failures

Randomized Consensus in Wireless Environments: A Case Where More is Better

scholarly article published July 2010

Recursive virtual machines for advanced security mechanisms

Resilient and Secure System on Chip with Rejuvenation in the Wake of Persistent Attacks

scientific article published on 04 May 2023

Reverse Engineering of Protocols from Network Traces

TRONE: Trustworthy and Resilient Operations in a Network Environment

The CRUTIAL Architecture for Critical Information Infrastructures

The CRUTIAL reference critical information infrastructure architecture: a blueprint

article by Paulo Esteves Verissimo et al published 2008 in International Journal of System of Systems Engineering

The TClouds architecture: Open and resilient cloud-of-clouds computing

The Third International Workshop on Dependability of Clouds, Data Centers and Virtual Machine Technology DCDV 2013

Towards secure and dependable software-defined networks

scholarly article published 2013

Vulnerability Discovery with Attack Injection

Worm-IT – A wormhole-based intrusion-tolerant group communication system