Abstract is missing.
- A taxonomy on privacy and confidentialityJosé Bernardi S. Nunes, Andrey Brito. 1-10 [doi]
- Analysing and Modelling Inaccessibility in Dependable Real-Time Networks✱Jeferson L. R. Souza, Frank Siqueira. 11-20 [doi]
- Do dependable systems need good user interfaces?Andreia R. Casare, Celmar Guimarães da Silva, Regina Moraes. 21-28 [doi]
- Impact of failures in a MPSoC with shared coprocessors to extend the RISC-V ISAJorge Reis, Jarbas Silveira, César A. M. Marcon. 29-34 [doi]
- NHAM: An NFV High Availability Architecture for Building Fault-Tolerant Stateful Virtual Functions and ServicesGiovanni Venâncio, Elias P. Duarte Jr.. 35-44 [doi]
- On the Use of Deep Graph CNN to Detect Vulnerable C FunctionsJosé D'Abruzzo Pereira, Nuno Lourenço 0002, Marco Vieira. 45-50 [doi]
- Strengthening Atomic Multicast for Partitioned State Machine ReplicationLeandro Pacheco, Fernando Luís Dotti, Fernando Pedone. 51-60 [doi]
- A Leaderless Hierarchical Atomic Broadcast AlgorithmLucas V. Ruchel, Luiz Antonio Rodrigues, Rogério C. Turchetti, Luciana Arantes, Elias P. Duarte Jr., Edson Tavares De Camargo. 61-66 [doi]
- Compliance Evaluation of Cryptographic Security Requirements on IoT GatewaysEduardo F. Felix, Fernando Antônio Aires Lins, Obionor O. Nóbrega, Diego R. Gomes, Bruno A. Jesus, Marco Vieira. 67-72 [doi]
- Detecting DoS Attacks in Microservice Applications: Approach and Case StudyJessica Castro, Nuno Laranjeiro, Marco Vieira. 73-78 [doi]
- An Ontology for Context-aware Middleware for Dependable Medical SystemsJorsiele Cerqueira. 79-83 [doi]
- Efficient CRDT Synchronization at Scale using a Causal Multicast over a Virtual Hypercube OverlayLeonardo de Freitas Galesky, Luiz Antonio Rodrigues. 84-88 [doi]
- On the use of the TMA Framework to promote self-adaptation capabilities in TalkConnectJosé D'Abruzzo Pereira, João David Ribeiro, João Pires, Pedro Moita, Nuno Laranjeiro, Marco Vieira. 89-90 [doi]
- Evaluation of Security Techniques in Heterogeneous IoT DevicesEduardo E. P. Mosca, Silvio Ribeiro, Arthur Urbano, Danielle S. Silva, Rafael L. R. Gomes. 91-94 [doi]
- Searchable Symmetric Encryption for Private Data Protection in Cloud EnvironmentsMatheus M. Silveira, Danielle S. Silva, Sandra J. R. Rodriguez, Rafael L. R. Gomes. 95-98 [doi]
- Application of Concurrent Engineering for G.O.L.D.S Constellation as a Cyber-Physical System-of-SystemsMoisés Cirilo de Brito Souto, Lucas Rafael Leandro Silva, Andréa Zotovici, Larissa Martins, Maria de Fátima Mattiello-Francisco, Geilson Loureiro. 99-108 [doi]
- Evaluation of SMT solvers in abstraction-based software model checkingMihály Dobos-Kovács, András Vörös 0001. 109-116 [doi]
- Modeling attacker behavior in Cyber-Physical-SystemsSamuel Rodriguez Gonzalez, Juan Betancourt Osorio, Germán Pardo González, Daniel Cuellar, Camilo Gomez, Francesco Mariotti, Leonardo Montecchi, Paolo Lollini. 117-124 [doi]
- Simplifying Operational Scenario Simulation for CubeSat Mission Analysis PurposesPedro Ângelo Vaz De Carvalho, André A. S. Ivo, Guilherme Venticinque, Gustavo Vicari Duarte, Matheus Miranda, Fátima Mattiello-Francisco. 125-130 [doi]
- Design of a Federated Learning System for IT Security: Towards Secure Human Resource ManagementLisa Verlande, Ulrike Lechner, Steffi Rudel. 131-136 [doi]
- Combination of Models for Denial-Of-Service Classification over Different NetworksLeonardo H. de Melo, Gustavo de Carvalho Bertoli, Osamu Saotome, Marcelo F. Domingues, Lourenço Alves Pereira Jr.. 137-142 [doi]
- Sk-Greedy: A Heuristic Scheduling Algorithm for Wireless Networks under the SINR ModelVinicius Fulber Garcia, Fábio Engel De Camargo, Elias P. Duarte Jr.. 143-148 [doi]
- VCBP: A Reliable and Real-Time Group Communication Protocol for Vehicular Ad Hoc NetworksMarcela Alves Pereira, Alirio Santos de Sá. 149-154 [doi]