Search Results - "Sobral, Joao Bosco M."
-
1
An agent based and biological inspired real-time intrusion detection and security model for computer network operations
Published in Computer communications (26-09-2007)“…There is a strong correlation between the human immune system and a computer network security system. The human immune system protects the human body from…”
Get full text
Journal Article -
2
Autonomic Intrusion Detection and Response Using Big Data
Published in IEEE systems journal (01-06-2020)“…We present a method for autonomic intrusion detection and response to optimize processes of cybersecurity in large distributed systems. These environments are…”
Get full text
Journal Article -
3
Towards Scalability for Federated Identity Systems for Cloud-Based Environments
Published in CLEI electronic journal (01-12-2015)“…As multi-tenant authorization and federated identity management systems for cloud computing matures, the provisioning of services using this paradigm allows…”
Get full text
Journal Article -
4
Towards Scalability for Federated Identity Systems for Cloud-Based Environments
Published in 2014 6th International Conference on New Technologies, Mobility and Security (NTMS) (01-03-2014)“…As multi-tenant authorization and federated identity management systems for cloud computing matures, the provisioning of services using this paradigm allows…”
Get full text
Conference Proceeding -
5
On the use of fuzzy logic to enhance mobile agents in distributed e-commerce
Published in 11th International Conference on Parallel and Distributed Systems (ICPADS'05) (2005)“…In recent years, the sales of products throughout the Internet have increased significantly. However, experiences with client/server architectures applied to…”
Get full text
Conference Proceeding -
6
Intrusion detection based on the immune human system
Published in Proceedings 16th International Parallel and Distributed Processing Symposium (2002)Get full text
Conference Proceeding -
7
Human immune anomaly and misuse based detection for computer system operations: part II
Published in Proceedings International Parallel and Distributed Processing Symposium (2003)“…This paper is a follow up on our previous work on intrusion detection for computer systems. It is motivated by the accelerated growth of computer viruses in…”
Get full text
Conference Proceeding