Search filters

List of works by Nuno Ferreira Neves

A Low-Power and SEU-Tolerant Switch Architecture for Network on Chips

Byzantine consensus in asynchronous message-passing systems: a survey

CRUTIAL: The Blueprint of a Reference Critical Information Infrastructure Architecture

article by Paulo Esteves Verissimo et al published 2006 in Lecture Notes in Computer Science

Charon: A Secure Cloud-of-Clouds System for Storing and Sharing Big Data

scientific article published in 2021

Designing Modular and Redundant Cyber Architectures for Process Control: Lessons learned

Detection and Prediction of Resource-Exhaustion Vulnerabilities

article

Experimental Comparison of Local and Shared Coin Randomized Consensus Protocols

From Consensus to Atomic Broadcast: Time-Free Byzantine-Resistant Protocols without Signatures

Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery

How Resilient are Distributed f Fault/Intrusion-Tolerant Systems?

article

Intrusion-tolerant middleware: the road to automatic security

Low complexity Byzantine-resilient consensus

Proactive Resilience Revisited: The Delicate Balance Between Resisting Intrusions and Remaining Available

article

Quantifying Software Maintainability Based on a Fault-Detection/Correction Model

RITAS: Services for Randomized Intrusion Tolerance

Randomization Can Be a Healer: Consensus with Dynamic Omission Failures

Randomization can be a healer: consensus with dynamic omission failures

Randomized Consensus in Wireless Environments: A Case Where More is Better

scholarly article published July 2010

Randomized Intrusion-Tolerant Asynchronous Services

Resilient State Machine Replication

Reverse Engineering of Protocols from Network Traces

Solving vector consensus with a wormhole

article

The CRUTIAL Architecture for Critical Information Infrastructures

The CRUTIAL reference critical information infrastructure architecture: a blueprint

article by Paulo Esteves Verissimo et al published 2008 in International Journal of System of Systems Engineering

Using Attack Injection to Discover New Vulnerabilities

Vulnerability Discovery with Attack Injection

Worm-IT – A wormhole-based intrusion-tolerant group communication system