Abstract is missing.
- Attesting AMD SEV-SNP Virtual Machines with SPIREDavi Pontes, Fernando Silva, Eduardo De Lucena Falcão, Andrey Brito. 1-10 [doi]
- ALR-LoRaWAN: An Application-Level Retransmission Management Algorithm for LoRaWAN NetworksJoão Pastório, Álvaro Ricieri Castro e Souza, Fabio A. Spanhol, Alexandre Huff, Edson Tavares De Camargo. 11-20 [doi]
- Using Formal Methods for On-The-Fly Time Series VerificationJosé Luis Conradi Hoffmann, Leonardo Passig Horstmann, Antônio Augusto Fröhlich. 21-29 [doi]
- Loom: A Closed-Box Disaggregated Database SystemFábio Coelho, Ana Nunes Alonso, Luís Meruje Ferreira, José Pereira 0001, Rui Oliveira 0001. 30-39 [doi]
- Diamond-P-vCube: An Eventually Perfect Hierarchical Failure Detector for Asynchronous Distributed SystemsGabriela Stein, Luiz Antonio Rodrigues, Elias Procópio Duarte Jr., Luciana Arantes. 40-49 [doi]
- Efficient Synchronization of CRDTs using VCube-PSLeonardo de Freitas Galesky, Luiz Antonio Rodrigues, Elias Procópio Duarte Jr., Luciana Arantes. 50-59 [doi]
- Generating Realistic Attack Data for Microservices: Framework and Case StudyJessica Castro, Nuno Laranjeiro, Marco Vieira. 60-69 [doi]
- Leveraging Time Series Autocorrelation Through Numerical Differentiation for Improving Failure PredictionJoão R. Campos, Rodrigo Machado, Marco Vieira. 70-79 [doi]
- Third-Party Trackers in COVID-19 Mobile Applications Can Enable Privacy LeaksNicolás Serrano, Gustavo Betarte, Juan Diego Campo. 80-89 [doi]
- Joining Parallel and Partitioned State Machine Replication Models for Enhanced Shared Logging PerformanceJoão Lucas Scharf, Luiz Gustavo Coutinho Xavier, Odorico M. Mendizabal. 90-99 [doi]
- A Time-Phased Partitioned Checkpoint Approach to Reduce State Snapshot OverheadEveraldo Gomes Junior, Eduardo Alchieri, Fernando Luís Dotti, Odorico Machado Mendizabal. 100-109 [doi]
- Parallel Execution of Transactions Based on Dynamic and Self-Verifiable Conflict AnalysisJefferson Pereira da Silva, Eduardo Alchieri, Fernando Luís Dotti, Fernando Pedone. 110-119 [doi]
- Exploring the Impact of Homomorphic Encryption on the Performance of Machine Learning AlgorithmsClayton Matias, Naghmeh Ivaki, Regina Moraes. 120-125 [doi]
- Evaluation of Machine Learning for Intrusion Detection in Microservice ApplicationsIury Araújo, Nuno Antunes, Marco Vieira. 126-135 [doi]
- An Artificial Intelligence Framework for the Representation and Reuse of Cybersecurity Incident Resolution KnowledgePatrick Andrei Caron Guerra, Fabio André Barcelos, Raul Ceretta Nunes, Edison Pignaton de Freitas, Luís Alvaro de Lima Silva. 136-145 [doi]
- Discovering attacker profiles using process mining and the MITRE ATT&CK taxonomyMarcelo Rodríguez, Gustavo Betarte, Daniel Calegari. 146-155 [doi]
- Enhancing Malware Family Classification in the Microsoft Challenge Dataset via Transfer LearningMarcelo Invert Palma Salas, Paulo L. de Geus, Marcus Botacin. 156-163 [doi]
- Context-aware monitoring for IoT: an approach based on Agents, and Federated LearningHerminio Paucar, Júlio Cezar Estrella. 164-165 [doi]
- On Design Autonomic Behavior for Blockchain platformsAllan Edgard Silva Freitas. 166-167 [doi]
- A distributed software architecture based on reactive microservices for the Smart Building contextGustavo Freire, Herminio Paucar, Júlio Cezar Estrella. 168-169 [doi]
- Towards a Novel Model for Availability as a ServiceJosé Wilson Vieira Flauzino, Elias Procópio Duarte Jr.. 170-175 [doi]
- Intrusion Detection and Tolerance for Microservice ApplicationsIury Araújo, Nuno Antunes, Marco Vieira. 176-181 [doi]
- Advanced Machine Learning for Runtime Data GenerationBukhtawar Zamir, João R. Campos, Marco Vieira. 182-187 [doi]
- A case study on the development of an ontology for maintenance services of heavy machinery electronic componentsLuiza Bartels Oliveira, Marco Antônio Araújo, Mário Antônio Dantas. 188-191 [doi]
- Identification of High Delay Links in Internet Service ProvidersFrancisco Valderlan Nobre, Danielle Santos, Silvio Ribeiro, Maria C. Mesquita, Rafael Lopes Gomes, Thelmo P. de Araujo. 192-195 [doi]
- MonTh: A Tool for Automated Monitoring of ThreatsArthur Urbano, Douglas Silva, Maria C. Mesquita, Yago Melo Costa, Mariana Cirino, Rafael Lopes Gomes. 196-199 [doi]
- Optimization of Heterogeneous Data in Sensor Networks to Industrial InternetJanine Kniess. 200-203 [doi]
- Using IoT Mesh Networks to Extend Wireless Coverage in Industrial EnvironmentsCarlos A. Aquino, Antonio M. Neto, Vanessa C. Lima, Evellin S. Moura, Yanne A. Oliveira, Rafael Lopes Gomes. 204-207 [doi]
- Systematic Situation Coverage versus Random Situation Coverage for Safety Testing in an Autonomous Car SimulationNawshin Mannan Proma, Rob Alexander. 208-213 [doi]
- An Anonymization Service for Privacy in Data MiningMatheus M. Silveira, Danielle Santos, Michael S. Souza, Douglas Silva, Maria C. Mesquita, Jonas Neto, Rafael Lopes Gome. 214-219 [doi]
- Scalable Detection of SQL Injection in Cyber Physical SystemsMichael Silva, Silvio Ribeiro, Vanessa Carvalho, Francisco Cardoso, Rafael Lopes Gomes. 220-225 [doi]
- Software defined wireless networks with real-time constraintsAndrés Llinás, Matias Micheletto, Rodrigo M. Santos, Sergio F. Ochoa. 226-229 [doi]