Intrusion-tolerant architectures: Concepts and design PE Veríssimo, NF Neves, MP Correia Architecting dependable systems, 3-36, 2003 | 273 | 2003 |
Adaptive recovery for mobile environments N Neves, WK Fuchs Proceedings. IEEE High-Assurance Systems Engineering Workshop (Cat. No …, 1996 | 178 | 1996 |
Highly available intrusion-tolerant services with proactive-reactive recovery P Sousa, AN Bessani, M Correia, NF Neves, P Verissimo IEEE Transactions on Parallel and Distributed Systems 21 (4), 452-465, 2009 | 164 | 2009 |
How to tolerate half less one Byzantine nodes in practical distributed systems M Correia, NF Neves, P Verissimo Proceedings of the 23rd IEEE International Symposium on Reliable Distributed …, 2004 | 163 | 2004 |
From consensus to atomic broadcast: Time-free Byzantine-resistant protocols without signatures M Correia, NF Neves, P Veríssimo The Computer Journal 49 (1), 82-96, 2006 | 140 | 2006 |
{SCFS}: A Shared Cloud-backed File System A Bessani, R Mendes, T Oliveira, N Neves, M Correia, M Pasin, ... 2014 {USENIX} Annual Technical Conference ({USENIX}{ATC} 14), 169-180, 2014 | 135 | 2014 |
OS diversity for intrusion tolerance: Myth or reality? M Garcia, A Bessani, I Gashi, N Neves, R Obelheiro 2011 IEEE/IFIP 41st International Conference on Dependable Systems …, 2011 | 115 | 2011 |
Intrusion-tolerant middleware: The road to automatic security PE Verissimo, NF Neves, C Cachin, J Poritz, D Powell, Y Deswarte, ... IEEE Security & Privacy 4 (4), 54-62, 2006 | 112 | 2006 |
The design of a COTS real-time distributed security kernel M Correia, P Verissimo, NF Neves European Dependable Computing Conference, 234-252, 2002 | 107 | 2002 |
Reverse engineering of protocols from network traces J Antunes, N Neves, P Verissimo 2011 18th Working Conference on Reverse Engineering, 169-178, 2011 | 98 | 2011 |
A checkpoint protocol for an entry consistent shared memory system N Neves, M Castro, P Guedes Proceedings of the thirteenth annual ACM symposium on Principles of …, 1994 | 96 | 1994 |
Resilient intrusion tolerance through proactive and reactive recovery P Sousa, AN Bessani, M Correia, NF Neves, P Verissimo 13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007 …, 2007 | 94 | 2007 |
The CRUTIAL way of critical infrastructure protection AN Bessani, P Sousa, M Correia, NF Neves, P Verissimo IEEE Security & Privacy 6 (6), 44-51, 2008 | 92 | 2008 |
Detecting and removing web application vulnerabilities with static analysis and data mining I Medeiros, N Neves, M Correia IEEE Transactions on Reliability 65 (1), 54-69, 2015 | 88 | 2015 |
Analysis of operating system diversity for intrusion tolerance M Garcia, A Bessani, I Gashi, N Neves, R Obelheiro Software: Practice and Experience 44 (6), 735-770, 2014 | 86 | 2014 |
Automatic detection and correction of web application vulnerabilities using data mining to predict false positives I Medeiros, NF Neves, M Correia Proceedings of the 23rd international conference on World wide web, 63-74, 2014 | 78 | 2014 |
Lightweight logging for lazy release consistent distributed shared memory M Costa, P Guedes, M Sequeira, N Neves, M Castro ACM SIGOPS Operating Systems Review 30 (si), 59-73, 1996 | 73 | 1996 |
Low complexity Byzantine-resilient consensus M Correia, NF Neves, LC Lung, P Veríssimo Distributed Computing 17 (3), 237-249, 2005 | 71 | 2005 |
Byzantine consensus in asynchronous message-passing systems: a survey M Correia, GS Veronese, NF Neves, P Verissimo International Journal of Critical Computer-Based Systems 2 (2), 141-161, 2011 | 69 | 2011 |
Efficient Byzantine-resilient reliable multicast on a hybrid failure model M Correia, LC Lung, NF Neves, P Veríssimo 21st IEEE Symposium on Reliable Distributed Systems, 2002. Proceedings., 2-11, 2002 | 68 | 2002 |