Abstract is missing.
- Automation of Security Controls for Continuous Compliance in Vulnerability ManagementRaiff Silva, Andrey Brito, Jan Paulo de Lima Filho. 1-10 [doi]
- Mining Vulnerability and Code Repositories to Study Software SecurityJoão Rafael Henriques, José D'Abruzzo Pereira, Marco Vieira. 11-16 [doi]
- How Context Impacts Vulnerability Severity: An Analysis of Product-Specific CVSS ScoresLucas Senos Coutinho, Daniel S. Menasché, Lucas Miranda 0001, Enrico Lovat, Srivastava Gaurav Kumar, Abhishek Ramchandran, Anton Kocheturov, Tobias Limmer. 17-27 [doi]
- An Approach Toward Enhancing OT and IoT SecurityGustavo Almeida, Patrick Taraborelli, Hebert Silva. 28-29 [doi]
- Consent validation for personal data access control using ABACMaria Molina, Gustavo Betarte, Carlos Daniel Luna. 30-31 [doi]
- Risk Aggregation Using the Poisson Shot Noise Model: What is the Impact of the Window Size?Miguel Angelo Santos Bicudo, Daniel Sadoc Menasché. 32-37 [doi]
- Modeling Availability in Softwarized MEC: Integrating a Fault Injection Tool for Effective ValidationErick Nascimento, Eduardo Antonio Guimarães Tavares, Jamilson Dantas, Paulo Romero Martins Maciel. 38-48 [doi]
- Practical Challenges and Pitfalls of Bluetooth Mesh Data Collection Experiments with ESP32 MicrocontrollersMarcelo Paulon J. V., Bruno José Olivieri de Souza, Thiago de Souza Lamenza, Markus Endler. 49-54 [doi]
- Using Vehicular Protection Mechanisms to Enable Fault-Aware Safety Verification of Autonomous VehiclesJosé Luis Conradi Hoffmann, Antônio Augusto Fröhlich, Marcus Völp, Paolo Milazzo. 55-64 [doi]
- Stochastic Petri Nets for Drone Surveillance: Modeling Availability and ReliabilityLuan Lins, Erick Nascimento, Jamilson Dantas, Jean Araujo 0001, Paulo Romero Martins Maciel. 65-74 [doi]
- Allocating ECC parity bits into BF16-encoded CNN parameters: A practical experience reportJoaquin Gracia-Moran, Juan Carlos Ruiz 0001, David de Andrés, Luis J. Saiz-Adalid. 75-80 [doi]
- Generic MulticastJosé Augusto Bolina, Pierre Sutra, Douglas Antunes Rocha, Lásaro J. Camargos. 81-90 [doi]
- Deep-TEMPEST: Using Deep Learning to Eavesdrop on HDMI from its Unintended Electromagnetic EmanationsSantiago Fernández, Emilio Martínez, Jorge Varela, Pablo Musé, Federico Larroca. 91-100 [doi]
- Supporting continuous vulnerability compliance through automated identity provisioningDiego Gama, Andrey Brito, André Martin, Christof Fetzer. 101-110 [doi]
- MQTT-VET: Exploring MQTT Protocol VulnerabilitiesAna Vitoria Freitas, Silvio Romero de Araújo Júnior, Hebert Silva. 111-113 [doi]
- Reincarnation Daemon: improving dependability on LinuxAlexandre Beletti Ferreira, Caio Augusto R. Dos Santos, Fabricio Guerra da Silva. 114-115 [doi]
- Selecting Blockchain Consensus Algorithms Integrations for IoT-based EnviromentsAnderson Melo de Morais, Fernando Antônio Aires Lins, Nelson Souto Rosa. 116-125 [doi]
- Adversary-Augmented Simulation to evaluate order-fairness on HyperLedger FabricErwan Mahe, Rouwaida Abdallah, Sara Tucci Piergiovanni, Pierre-Yves Piriou. 126-135 [doi]
- A Hierarchical Adaptive Leader Election Algorithm for Crash-Recovery Distributed SystemsLuiz Antonio Rodrigues, Allan Edgard Silva Freitas, Elias Procópio Duarte Jr., Vinicius Fulber Garcia. 136-145 [doi]
- Assessment of Availability and Reliability of a Textile Manufacturing 4.0 Using Stochastic ModelsEdson Moura Silva, Rafael Melo Macieira, Danilo Ricardo Barbosa de Araújo, Ermeson Carneiro de Andrade. 146-152 [doi]
- Capturing the security expert knowledge in feature selection for web application attack detectionAmanda Riverol, Gustavo Betarte, Rodrigo Martínez, Alvaro Pardo. 153-158 [doi]
- Comparision of Machine Learning Algorithms for Detecting Software Aging in SQL ServerMaria Gizele Nascimento, Rafael José Moura, Fumio Machida, Emerson Andrade. 159-164 [doi]
- Stochastic Petri Net Models for Availability and Performance Evaluation of Nextcloud Service hosted in Apache CloudstackWenderson de Souza Leonardo, Thiago Valentim Bezerra, Gustavo Callou. 165-170 [doi]
- A Flexible Framework for Evaluating Cyber Security Maturity and Risks in Electric Power Generation OrganizationsMilton de Lima, Geraldo da Cruz Junior, David da Cunha, Jimmy Paul Souza Barreto. 171-174 [doi]
- Assessing Satellite Resilience: SPN and CTMC Models for Availability EvaluationEsau Bermudez, Paulo Maciel 0001. 175-178 [doi]
- Automated Severity Driven Patch ManagementCarlos Eduardo De Schuller Banjar, Miguel Angelo Santos Bicudo, Lucas Miranda 0001, Cainã Figueiredo Pereira, Lucas Senos Coutinho, Daniel Sadoc Menasché, Gaurav Kumar Srivastava, Enrico Lovat, Anton Kocheturov, Matheus Martins, Leandro Pfleger de Aguiar. 179-183 [doi]
- Empirical observation of Execution Throttling as MQTT Broker defense against Memory Denial of Service AttacksMatheus F. Torquato, Bruno Jesus, Francisco Airton Silva, Eduardo Cerqueira. 184-187 [doi]
- Impact of Data Anonymization in Machine Learning ModelsIvo A. Pimenta, Douglas Silva, Evellin S. Moura, Matheus Monteiro Silveira, Rafael Lopes Gomes. 188-191 [doi]
- Post-Quantum Algorithms on ARM Trusted Execution Environment (TEE): findings of this industrial challengeEwerton R. Andrade, Cristiano Coimbra Goes, Janislley Oliveira de Sousa. 192-195 [doi]
- The Role of TCP Congestion Control in the Throughput ForecastingAriel L. C. Portela, Maria Melo Linhares, Francisco Valderlan Jorge Nobre, Rafael A. Menezes, Maria C. Mesquita, Rafael Lopes Gomes. 196-199 [doi]
- Disaster-FD: A Failure Detector for Disaster-Prone EnvironmentsAbadio de Paulo Silva, Anubis Graciela de Moraes Rossetto, Pierre Sens 0001, Luciana Arantes, Rafael Pasquini, Paulo R. S. L. Coelho. 200-209 [doi]
- A Stochastic Petri Net-Based Approach for Evaluating the Performability of Internet of Medical ThingsThiago Valentim Bezerra, Gustavo Callou, Cleunio França, Eduardo Antonio Guimarães Tavares. 210-219 [doi]
- nMatrix: A New Decoding Algorithm for the Matrix ECCDavid C. C. Freitas, Lirida Alves de Barros Naviner, João Cesar Moura Mota, Jarbas Silveira, César A. M. Marcon, David Freitas Moura Mota, Alexandre Coelho. 220-230 [doi]
- Extending State Machine Replication through CompositionCaroline Martins Alves, Thaís Bardini Idalino, Odorico Mendizabal. 231-240 [doi]
- Multi-Platform and Vault-Free Attestation of Confidential VMsDavi Pontes, Fernando Silva, Anderson Melo, Asm Asadujjaman, Eduardo De Lucena Falcão, Andrey Brito, Carlos Filho. 241-251 [doi]
- IT-SPIRE: Improving the Resilience of the SPIFFE/SPIRE Architecture with an Intrusion-Tolerant ServerBeatriz Michelson Reichert, Rafael R. Obelheiro. 252-261 [doi]
- Availability and Performance Analysis of Cloud ServicesGustavo Callou, Marco Vieira. 262-271 [doi]