DepSky: dependable and secure storage in a cloud-of-clouds A Bessani, M Correia, B Quaresma, F André, P Sousa ACM Transactions on Storage 9 (4), 1-33, 2013 | 1058 | 2013 |
State machine replication for the masses with BFT-SMaRt A Bessani, J Sousa, E Alchieri Dependable Systems & Networks (DSN), 2014 IEEE/IFIP 44th International …, 2014 | 821 | 2014 |
A Byzantine fault-tolerant ordering service for the hyperledger fabric blockchain platform J Sousa, A Bessani, M Vukolic 48th Annual IEEE/IFIP International Conference on Dependable Systems and …, 2018 | 565 | 2018 |
Efficient byzantine fault-tolerance GS Veronese, M Correia, AN Bessani, LC Lung, P Verissimo IEEE Transactions on Computers 62 (1), 16-30, 2011 | 503 | 2011 |
Spin one's wheels? Byzantine fault tolerance with a spinning primary GS Veronese, M Correia, AN Bessani, LC Lung 2009 28th IEEE International Symposium on Reliable Distributed Systems, 135-144, 2009 | 248 | 2009 |
Highly available intrusion-tolerant services with proactive-reactive recovery P Sousa, AN Bessani, M Correia, NF Neves, P Verissimo IEEE Transactions on Parallel and Distributed Systems 21 (4), 452-465, 2010 | 219 | 2010 |
SCFS: A Shared Cloud-backed File System A Bessani, R Mendes, T Oliveira, N Neves, M Correia, M Pasin, ... 2014 USENIX Annual Technical Conference (USENIX ATC'14), 169-180, 2014 | 182 | 2014 |
DepSpace: a Byzantine fault-tolerant coordination service AN Bessani, EP Alchieri, M Correia, JS Fraga Proceedings of the 3rd European Conference on Computer Systems, 163-176, 2008 | 177 | 2008 |
On the design of practical fault-tolerant SDN controllers F Botelho, A Bessani, FMV Ramos, P Ferreira 2014 third European workshop on software defined networks, 73-78, 2014 | 169* | 2014 |
Analysis of operating system diversity for intrusion tolerance M Garcia, A Bessani, I Gashi, N Neves, R Obelheiro Software: Practice and Experience 44 (6), 735-770, 2014 | 153 | 2014 |
OS diversity for intrusion tolerance: Myth or reality? M Garcia, A Bessani, I Gashi, N Neves, R Obelheiro Dependable Systems & Networks (DSN), 2011 IEEE/IFIP 41st International …, 2011 | 152 | 2011 |
From Byzantine consensus to BFT state machine replication: A latency-optimal transformation J Sousa, A Bessani 2012 Ninth European Dependable Computing Conference, 37-48, 2012 | 142 | 2012 |
Cyberthreat detection from twitter using deep neural networks N Dionísio, F Alves, PM Ferreira, A Bessani 2019 international joint conference on neural networks (IJCNN), 1-8, 2019 | 136 | 2019 |
The CRUTIAL way of critical infrastructure protection AN Bessani, P Sousa, M Correia, NF Neves, P Verissimo IEEE Security & Privacy 6 (6), 44-51, 2008 | 127 | 2008 |
EBAWA: Efficient Byzantine agreement for wide-area networks GS Veronese, M Correia, AN Bessani, LC Lung 2010 IEEE 12th International Symposium on High Assurance Systems Engineering …, 2010 | 126* | 2010 |
Resilient intrusion tolerance through proactive and reactive recovery P Sousa, AN Bessani, M Correia, NF Neves, P Verissimo 13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007 …, 2007 | 109 | 2007 |
BigFlow: Real-time and reliable anomaly-based intrusion detection for high-speed networks E Viegas, A Santin, A Bessani, N Neves Future Generation Computer Systems 93, 473-485, 2019 | 108 | 2019 |
On the Efficiency of Durable State Machine Replication A Bessani, M Santos, J Felix, N Neves, M Correia 2013 USENIX Annual Technical Conference, 169-180, 2013 | 105 | 2013 |
Separating the WHEAT from the chaff: An empirical design for geo-replicated state machines J Sousa, A Bessani 2015 IEEE 34th Symposium on Reliable Distributed Systems (SRDS), 146-155, 2015 | 88 | 2015 |
On the feasibility of a consistent and fault-tolerant data store for SDNs FA Botelho, FMV Ramos, D Kreutz, AN Bessani 2013 Second european workshop on software defined networks, 38-43, 2013 | 87 | 2013 |