Author image not provided
 Paulo Lício De Geus

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article0.69
Citation Count11
Publication count16
Publication years2005-2015
Available for download4
Average downloads per article213.50
Downloads (cumulative)854
Downloads (12 Months)158
Downloads (6 Weeks)39
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


17 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 17 of 17
Sort by:

1 published by ACM
January 2018 ACM Transactions on Privacy and Security (TOPS): Volume 21 Issue 1, January 2018
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 21,   Downloads (12 Months): 21,   Downloads (Overall): 21

Full text available: PDFPDF
Malware and code-reuse attacks are the most significant threats to current systems operation. Solutions developed to countermeasure them have their weaknesses exploited by attackers through sandbox evasion and antidebug crafting. To address such weaknesses, we propose a framework that relies on the modern processors’ branch monitor feature to allow us ...
Keywords: Malware, ROP, branch monitor, debug

2 published by ACM
October 2015 MEDES '15: Proceedings of the 7th International Conference on Management of computational and collective intElligence in Digital EcoSystems
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 6,   Downloads (12 Months): 74,   Downloads (Overall): 151

Full text available: PDFPDF
Cloud Computing has introduced a variety of models of service delivery and deployment for public clouds, hybrid and private, that changed enterprise computing. Several providers provide these services, and each uses different models and pricing solutions. One of the most complex tasks for IT governance team is to calculate the ...
Keywords: security metrics, ROSI, cloud computing security

3
June 2015 SERVICES '15: Proceedings of the 2015 IEEE World Congress on Services
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

A Web Service is a software system designed to support interoperable machine-to-machine interaction over a network, it also provides a standard means of interoperating between different software applications. However, Web Services have raised new challenges on information security, this technology is susceptible to XML Injection attacks, which would allow an ...
Keywords: Web Services, XML Injection, fault injection, WS-Security, UsernameToken

4
June 2014 WETICE '14: Proceedings of the 2014 IEEE 23rd International WETICE Conference
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

The ubiquity of Internet-connected devices motivates attackers to create malicious programs (malware) to exploit users and their systems. Malware detection requires a deep understanding of their possible behaviors, one that is detailed enough to tell apart suspicious programs from benign, legitimate ones. A step to effectively address the malware problem ...
Keywords: Malware, Ontology, Computer Security

5 published by ACM
March 2013 SAC '13: Proceedings of the 28th Annual ACM Symposium on Applied Computing
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 11,   Downloads (12 Months): 52,   Downloads (Overall): 340

Full text available: PDFPDF
"Bankers" are special types of malware whose targets are Internet banking users, mainly to obtain their credentials. Banker infections cause losses of billions of dollars worldwide. Thus, better understanding and detection of bankers is required. Due to their interactive nature, obtaining bankers' behaviors can be a difficult task for current ...
Keywords: internet banking security, malicious software

6
July 2012 DIMVA'12: Proceedings of the 9th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 1

Malicious code (malware) is used to steal sensitive data, to attack corporate networks, and to deliver spam. To silently compromise systems and maintain their access, malware developers usually apply obfuscation techniques that result in a massive amount of malware variants and that can render static analysis approaches ineffective. To address ...

7
June 2012 ICCSA'12: Proceedings of the 12th international conference on Computational Science and Its Applications - Volume Part IV
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 0

A security analyst plays a key role in tackling unusual incidents, which is an extenuating task to be properly done, a single service can generate a massive amount of log data in a single day. The analysis of such data is a challenge. Among several available techniques, parallel coordinates have ...

8
June 2012 ICCSA'12: Proceedings of the 12th international conference on Computational Science and Its Applications - Volume Part IV
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 0

Malicious software attacks can disrupt information systems, violating security principles of availability, confidentiality and integrity. Attackers use malware to gain control, steal data, keep access and cover traces left on the compromised systems. The dynamic analysis of malware is useful to obtain an execution trace that can be used to ...
Keywords: malware analysis, security data visualization

9
June 2012 ICCSA'12: Proceedings of the 12th international conference on Computational Science and Its Applications - Volume Part IV
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 0

Malicious programs pose a major threat to Internet-connected systems, increasing the importance of studying their behavior in order to fight against them. In this paper, we propose definitions to the different types of behavior that a program can present during its execution. Based on those definitions, we define suspicious behavior ...
Keywords: behavioral traces, malware analysis, computer security

10
March 2011 Software—Practice & Experience: Volume 41 Issue 3, March 2011
Publisher: John Wiley & Sons, Inc.
Bibliometrics:
Citation Count: 0

Security administrators face the challenge of designing, deploying and maintaining a variety of configuration files related to security systems, especially in large-scale networks. These files have heterogeneous syntaxes and follow differing semantic concepts. Nevertheless, they are interdependent due to security services having to cooperate and their configuration to be consistent ...
Keywords: network security policy, automated policy refinement, policy-based management

11 published by ACM
September 2010 SIGDOC '10: Proceedings of the 28th ACM International Conference on Design of Communication
Publisher: ACM
Bibliometrics:
Citation Count: 3
Downloads (6 Weeks): 1,   Downloads (12 Months): 6,   Downloads (Overall): 121

Full text available: PDFPDF
This paper presents results of an exploratory study which observed Linux novice users performing complex technical tasks using Google's search engine. In this study we observed that information triage is a difficult process for unexperienced users unless well structured information is provided which results in better satisfaction and search effectiveness. ...
Keywords: collaborative information seeking, hypertext, user study, interface prototype, social search

12
April 2010 International Journal of Information Security: Volume 9 Issue 2, April 2010
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 0

Policy hierarchies and automated policy refinement are powerful approaches to simplify administration of security services in complex network environments. A crucial issue for the practical use of these approaches is to ensure the validity of the policy hierarchy, i.e. since the policy sets for the lower levels are automatically derived ...
Keywords: Formal validation, Network security, Policy based management, Security policies, Model-based management

13
October 2008 IHC '08: Proceedings of the VIII Brazilian Symposium on Human Factors in Computing Systems
Publisher: Sociedade Brasileira de Computação
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1,   Downloads (12 Months): 6,   Downloads (Overall): 213

Full text available: PDFPDF
Social interaction mediated by information technology has been studied from several perspectives over the past years. This paper draws attention to the relevance of classification systems and categories as important mediation artifacts in human-computer interaction. In this sense, classification schemes provide meaning to information and mutual understanding between the parts ...
Keywords: classification systems, web collaborative systems, social web, communities of practice

14
January 2007 Proceedings of the 2007 4th IEEE Consumer Communications and Networking Conference
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

First Page of the Article

15
October 2006 MMNS'06: Proceedings of the 9th IFIP/IEEE international conference on Management of Multimedia and Mobile Networks and Services
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 0

Through the past years, several digital rights management (DRM) solutions for controlled dissemination of digital information have been developed using cryptography and other technologies. Within so many different solutions, however, interoperability problems arise, which increase the interest on integrated design and management of these technologies. Pursuing these goals, this paper ...

16
October 2005 DSOM'05: Proceedings of the 16th IFIP/IEEE Ambient Networks international conference on Distributed Systems: operations and Management
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 1

The security mechanisms employed in today's networked environments are increasingly complex and their configuration management has an important role for the protection of these environments. Especially in large scale networks, security administrators are faced with the challenge of designing, deploying, maintaining, and monitoring a huge number of mechanisms, most of ...

17
September 2005 ESORICS'05: Proceedings of the 10th European conference on Research in Computer Security
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 1

As the use of computers and data communication technologies spreads, network security systems are becoming increasingly complex, due to the incorporation of a variety of mechanisms necessary to fulfil the protection requirements of the upcoming scenarios. The integrated design and management of different security technologies and mechanisms are thus of ...



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us