Search Results - "de Aguiar, Leandro Pfleger"

  • Showing 1 - 10 results of 10
Refine Results
  1. 1

    A Statistical Relational Learning Approach Towards Products, Software Vulnerabilities and Exploits by Figueiredo, Caina, Lopes, Joao Gabriel, Azevedo, Rodrigo, Vieira, Daniel, Miranda, Lucas, Zaverucha, Gerson, de Aguiar, Leandro Pfleger, Menasche, Daniel Sadoc

    “…Data on software vulnerabilities, products, and exploits are typically collected from multiple non-structured sources. Valuable information, e.g., on which…”
    Get full text
    Journal Article
  2. 2

    Beyond Herd Immunity Against Strategic Attackers by Rufino, Vilc Queupe, Pfleger De Aguiar, Leandro, Sadoc Menasche, Daniel, Lima, Cabral, Cunha, Italo, Altman, Eitan, El-Azouzi, Rachid, De Pellegrini, Francesco, Avritzer, Alberto, Grottke, Michael

    Published in IEEE access (2020)
    “…Herd immunity, one of the most fundamental concepts in network epidemics, occurs when a large fraction of the population of devices is immune against a virus…”
    Get full text
    Journal Article
  3. 3

    On the Flow of Software Security Advisories by Miranda, Lucas, Vieira, Daniel, de Aguiar, Leandro Pfleger, Menasche, Daniel Sadoc, Bicudo, Miguel Angelo, Nogueira, Mateus Schulz, Martins, Matheus, Ventura, Leonardo, Senos, Lucas, Lovat, Enrico

    “…In this paper, we report results on a large scale measurement campaign to collect temporal information about events associated with software vulnerabilities…”
    Get full text
    Journal Article
  4. 4

    Rejuvenation and the Spread of Epidemics in General Topologies by Altman, Eitan, Avritzer, Alberto, El-Azouzi, Rachid, Menasche, Daniel S., Pfleger de Aguiar, Leandro

    “…Epidemic models have received significant attention in the past few decades to study the propagation of viruses, worms and ideas in computer and social…”
    Get full text
    Conference Proceeding
  5. 5

    Cream Skimming the Underground: Identifying Relevant Information Points from Online Forums by Moreno-Vera, Felipe, Nogueira, Mateus, Figueiredo, Caina, Menasche, Daniel S., Bicudo, Miguel, Woiwood, Ashton, Lovat, Enrico, Kocheturov, Anton, de Aguiar, Leandro Pfleger

    “…This paper proposes a machine learning-based approach for detecting the exploitation of vulnerabilities in the wild by monitoring underground hacking forums…”
    Get full text
    Conference Proceeding
  6. 6

    Software Vulnerabilities, Products and Exploits: A Statistical Relational Learning Approach by Figueiredo, Caina, Lopes, Joao Gabriel, Azevedo, Rodrigo, Zaverucha, Gerson, Menasche, Daniel Sadoc, Pfleger de Aguiar, Leandro

    “…Data on software vulnerabilities, products and exploits is typically collected from multiple non-structured sources. Valuable information, e.g., on which…”
    Get full text
    Conference Proceeding
  7. 7

    Is Vulnerability Report Confidence Redundant? Pitfalls Using Temporal Risk Scores by Boechat, Francois, Ribas, Gabriel, Senos, Lucas, Bicudo, Miguel, Nogueira, Mateus Schulz, Pfleger de Aguiar, Leandro, Menasche, Daniel Sadoc

    Published in IEEE security & privacy (01-07-2021)
    “…The Common Vulnerability Scoring System score is the de facto standard to assess risk of software vulnerabilities, with three temporal components:…”
    Get full text
    Magazine Article
  8. 8

    Cream Skimming the Underground: Identifying Relevant Information Points from Online Forums by Moreno-Vera, Felipe, Nogueira, Mateus, Figueiredo, Cainã, Menasché, Daniel Sadoc, Bicudo, Miguel, Woiwood, Ashton, Lovat, Enrico, Kocheturov, Anton, de Aguiar, Leandro Pfleger

    Published 03-08-2023
    “…This paper proposes a machine learning-based approach for detecting the exploitation of vulnerabilities in the wild by monitoring underground hacking forums…”
    Get full text
    Journal Article
  9. 9

    Detecting PLC control corruption via on-device runtime verification by Garcia, Luis, Zonouz, Saman, Dong Wei, de Aguiar, Leandro Pfleger

    Published in 2016 Resilience Week (RWS) (01-08-2016)
    “…With an increased emphasis on the cyber-physical security of safety-critical industrial control systems, programmable logic controllers have been targeted by…”
    Get full text
    Conference Proceeding
  10. 10

    Improving control system resilience by highly coupling security functions with control by Dong Wei, De Aguiar, Leandro Pfleger, Collar, Ben, Otto, Martin

    Published in 2015 Resilience Week (RWS) (01-08-2015)
    “…This paper presents an on-going research work to improve control system resilience by running control and cybersecurity side-by-side in a highly-coupled…”
    Get full text
    Conference Proceeding