Zobrazeno 1 - 10
of 24
pro vyhledávání: '"Joaquim Celestino Júnior"'
Autor:
Thayanne F. da Silva, Gustavo Augusto Lima de Campos, Matheus Santos Araújo, João P. B. Andrade, Joaquim Celestino Júnior, Raimundo Juracy Campos Ferro Junior, Leonardo Ferreira da Costa
Publikováno v:
COMPSAC
The Cooperative Targets Observation (CTO) problem consists of two groups of agents: observers and targets. The observer agents aim to maximize the Average Number of Observed Targets (ANOT) in environments where there are more targets than observers.
Autor:
Jens Myrup Pedersen, Joaquim Celestino Júnior, Hitham Alhussian, Sokratis K. Katsikas, Bouchaib Bounabat, Ahmed Patel
Publikováno v:
Patel, A, Alhussian, H, Pedersen, J M, Bounabat, B, Celestino Júnior, J & Katsikas, S 2016, ' A nifty collaborative intrusion detection and prevention architecture for Smart Grid ecosystems ', Computers & Security, vol. 63, 8, pp. 92-109 . https://doi.org/10.1016/j.cose.2016.07.002
Precise review of Intrusion Detection and Prevention Systems for Smart Grid (SG)Presents the salient requirements for Collaborative Smart-IDPS (CSIDPS) for SGDefines a fully distributed management framework and architecture for SGs with CSIDPSSpecifi
Autor:
Matheus Magalhães de Carvalho, Joaquim Celestino Júnior, Francisco Mardônio Vieira, Filipe Fernandes dos Santos de Matos, Rafael L. Gomes
Publikováno v:
Workshop em Clouds e Aplicações.
Cloud Computing represents a paradigm that provides computing resources on virtual machines that are grouped and allocated according to customer requests. The increasing seeking for this type of service caused an increasing demand for electric energy
Publikováno v:
Workshop de Computação Urbana (CoUrb).
A indústria de cuidados médicos vem evoluindo a sua prestação de serviços, focando na qualidade do atendimento ao paciente. Tem-se então a necessidade de uma infraestrutura para monitoramento da saúde dos pacientes a partir da análise dos dad
Autor:
Lucas Leite, Joaquim Celestino Júnior, Ahmed Patel, Miguel F. Mariano, José Neuman de Souza, Jefferson Rodrigo A. Cavalcante, Alex F R Trajano
Publikováno v:
PIMRC
With the increasing number of devices connected to the internet and scarcity of IPv4 addresses, the IPv6 protocol was designed to address various of the limitations of IPv4 networks, supporting 128-bit addresses, deploying a fragmentation mechanism a
Publikováno v:
Computer Standards & Interfaces. 44:54-62
Indexing the Web is becoming a laborious task for search engines as the Web exponentially grows in size and distribution. Presently, the most effective known approach to overcome this problem is the use of focused crawlers. A focused crawler employs
Publikováno v:
Anais do XVII Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg 2017).
Botnets são uma das principais ameaças na Internet, capazes de auxiliar na realização de atividades maliciosas. Ao infectar um hospedeiro, um bot tenta comunicar-se com o servidor de comando e controle. Neste ponto, bots recentes utilizam Algorit
Publikováno v:
AINA
Wireless Sensor Networks (WSN) consist in a set ofsensor nodes that collect data in the environment and send it to a Base Station that processes the final data. Some challenges may be found, such as minimizing energy consumption and maximize the netw
Autor:
Damian Ledziński, Joaquim Celestino Júnior, Bozydar Dubalski, Tahir Riaz, Jens Myrup Pedersen, Ahmed Patel
Publikováno v:
Concurrency and Computation: Practice and Experience. 25:2488-2500
Many globally distributed cloud computing (CC) applications and services running over the Internet, between globally dispersed clients and servers, will require certain levels of QoS in order to deliver and give a sufficiently smooth user experience.
Publikováno v:
Journal of Network and Computer Applications. 36:25-41
The distributed and open structure of cloud computing and services becomes an attractive target for potential cyber-attacks by intruders. The traditional Intrusion Detection and Prevention Systems (IDPS) are largely inefficient to be deployed in clou