Search Results - "Sobral, Joao Bosco M."

  • Showing 1 - 7 results of 7
Refine Results
  1. 1

    An agent based and biological inspired real-time intrusion detection and security model for computer network operations by Boukerche, Azzedine, Machado, Renato B., Jucá, Kathia R.L., Sobral, João Bosco M., Notare, Mirela S.M.A.

    Published in Computer communications (26-09-2007)
    “…There is a strong correlation between the human immune system and a computer network security system. The human immune system protects the human body from…”
    Get full text
    Journal Article
  2. 2

    Autonomic Intrusion Detection and Response Using Big Data by Vieira, Kleber, Koch, Fernando L., Sobral, Joao Bosco M., Westphall, Carlos Becker, Leao, Jorge Lopes de Souza

    Published in IEEE systems journal (01-06-2020)
    “…We present a method for autonomic intrusion detection and response to optimize processes of cybersecurity in large distributed systems. These environments are…”
    Get full text
    Journal Article
  3. 3

    Towards Scalability for Federated Identity Systems for Cloud-Based Environments by Pereira, André Albino, Sobral, João Bosco M., Westphall, Carla M.

    Published in CLEI electronic journal (01-12-2015)
    “…As multi-tenant authorization and federated identity management systems for cloud computing matures, the provisioning of services using this paradigm allows…”
    Get full text
    Journal Article
  4. 4

    Towards Scalability for Federated Identity Systems for Cloud-Based Environments by Albino Pereira, Andre, Bosco M. Sobral, Joao, Merkle Westphall, Carla

    “…As multi-tenant authorization and federated identity management systems for cloud computing matures, the provisioning of services using this paradigm allows…”
    Get full text
    Conference Proceeding
  5. 5

    On the use of fuzzy logic to enhance mobile agents in distributed e-commerce by Preti, J.P.D., de Castilho, F.M.B.M., Sobral, J.B.M., Juca, K., Notare, M.M.A.N., Boukerche, A.

    “…In recent years, the sales of products throughout the Internet have increased significantly. However, experiences with client/server architectures applied to…”
    Get full text
    Conference Proceeding
  6. 6
  7. 7

    Human immune anomaly and misuse based detection for computer system operations: part II by Juca, K.R.L., Boukerche, A., Sobral, J.B.M., Notare, M.S.M.A.

    “…This paper is a follow up on our previous work on intrusion detection for computer systems. It is motivated by the accelerated growth of computer viruses in…”
    Get full text
    Conference Proceeding