Miguel Correia 0001
Person information
- affiliation: University of Lisbon, Portugal
Other persons with the same name
- Miguel Correia 0002
(aka: Miguel V. Correia, Miguel Velhote Correia) — University of Porto, Faculty of Engineering / INESC-TEC, Portugal
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
[j36]Paulo Jorge Costa Nunes, Ibéria Medeiros
, José Fonseca, Nuno Neves
, Miguel Correia, Marco Vieira
:
An empirical study on combining diverse static analysis tools for web security vulnerabilities based on development scenarios. Computing 101(2): 161-185 (2019)
[j35]Ibéria Medeiros
, Miguel Beatriz, Nuno Neves
, Miguel Correia
:
SEPTIC: Detecting Injection Attacks and Vulnerabilities Inside the DBMS. IEEE Trans. Reliability 68(3): 1168-1188 (2019)
[c97]Carlos Faria, Miguel Correia:
BlockSim: Blockchain Simulator. Blockchain 2019: 439-446
[c96]Erick Lavoie, Laurie J. Hendren, Frederic Desprez, Miguel Correia:
Pando: Personal Volunteer Computing in Browsers. Middleware 2019: 96-109
[c95]Luís Dias, Hélder Reia, Rui Neves
, Miguel Correia
:
OutGene: Detecting Undefined Network Attacks with Time Stretching and Genetic Zooms. NSS 2019: 199-220
[c94]Rafael Belchior, Miguel Correia, André Vasconcelos:
JusticeChain: Using Blockchain to Protect Justice Logs. OTM Conferences 2019: 318-325
[c93]Erick Lavoie, Laurie J. Hendren, Frédéric Desprez, Miguel Correia:
Genet: A Quickly Scalable Fat-Tree Overlay for Personal Volunteer Computing using WebRTC. SASO 2019: 117-126
[i4]Erick Lavoie, Laurie J. Hendren, Frédéric Desprez, Miguel Correia:
Genet: A Quickly Scalable Fat-Tree Overlay for Personal Volunteer Computing using WebRTC. CoRR abs/1904.11402 (2019)
[i3]Ibéria Medeiros, Nuno Neves, Miguel Correia:
Statically Detecting Vulnerabilities by Processing Programming Languages as Natural Languages. CoRR abs/1910.06826 (2019)- 2018
[j34]Paulo Jorge Costa Nunes, Iberia Medeiros
, José Fonseca
, Nuno Neves
, Miguel Correia
, Marco Vieira
:
Benchmarking Static Analysis Tools for Web Security. IEEE Trans. Reliability 67(3): 1159-1175 (2018)
[j33]Naércio Magaia
, Carlos Borrego, Paulo Rogério Pereira
, Miguel Correia
:
ePRIVO: An Enhanced PRIvacy-preserVing Opportunistic Routing Protocol for Vehicular Delay-Tolerant Networks. IEEE Trans. Vehicular Technology 67(11): 11154-11168 (2018)
[j32]Naércio Magaia
, Zhengguo Sheng, Paulo Rogério Pereira
, Miguel Correia:
REPSYS: A Robust and Distributed Incentive Scheme for Collaborative Caching and Dissemination in Content-Centric Cellular-Based Vehicular Delay-Tolerant Networks. IEEE Wireless Commun. 25(3): 65-71 (2018)
[c92]David R. Matos, Miguel L. Pardal, Pedro Adão, António Rito Silva
, Miguel P. Correia:
Securing Electronic Health Records in the Cloud. P2DS@EuroSys 2018: 1:1-1:6
[c91]Miguel Pupo Correia:
Storing Critical Data in the Cloud: Challenges and Solutions. ICETE (1) 2018: 147-185
[c90]Ray Neiheiser, Daniel Presser, Luciana Rech, Manuel Bravo, Luís E. T. Rodrigues, Miguel Correia:
Fireplug: Flexible and robust N-version geo-replication of graph databases. ICOIN 2018: 110-115
[c89]Miguel Pupo Correia:
Storing Critical Data in the Cloud: Challenges and Solutions. ICSOFT 2018: 11-49
[c88]Hylson Vescovi Netto, Aldelir Fernando Luiz, Miguel Correia, Luciana de Oliveira Rech, Caio Pereira Oliveira:
Koordinator: A Service Approach for Replicating Docker Containers in Kubernetes. ISCC 2018: 58-63
[c87]David R. Matos, Miguel L. Pardal, Georg Carle, Miguel Correia:
RockFS: Cloud-backed File System Resilience to Client-Side Attacks. Middleware 2018: 107-119
[c86]Nuno O. Duarte, Sileshi Demesie Yalew, Nuno Santos, Miguel Correia:
Leveraging ARM TrustZone and Verifiable Computing to Provide Auditable Mobile Functions. MobiQuitous 2018: 302-311
[c85]Miguel Guerra, Benjamin Taubmann, Hans P. Reiser, Sileshi Demesie Yalew, Miguel Correia:
Introspection for ARM TrustZone with the ITZ Library. QRS 2018: 123-134
[c84]Filipe Apolinario, Miguel L. Pardal, Miguel P. Correia:
S-Audit: Efficient Data Integrity Verification for Cloud Storage. TrustCom/BigDataSE 2018: 465-474
[c83]Luis Sacramento, Iberia Medeiros
, Joao Bota, Miguel Correia:
FlowHacker: Detecting Unknown Network Attacks in Big Traffic Data Using Network Flows. TrustCom/BigDataSE 2018: 567-572
[i2]Erick Lavoie, Laurie J. Hendren, Frederic Desprez, Miguel Correia:
Pando: a Volunteer Computing Platform for the Web. CoRR abs/1803.08426 (2018)- 2017
[j31]Pedro A. R. S. Costa
, Fernando M. V. Ramos
, Miguel Correia:
On the Design of Resilient Multicloud MapReduce. IEEE Cloud Computing 4(4): 74-82 (2017)
[j30]Hylson Vescovi Netto
, Lau Cheuk Lung, Miguel Correia
, Aldelir Fernando Luiz, Luciana Moreira Sá de Souza:
State machine replication in containers managed by Kubernetes. J. Syst. Archit. 73: 53-59 (2017)
[c82]Pedro A. R. S. Costa
, Fernando M. V. Ramos
, Miguel Correia:
Chrysaor: Fine-Grained, Fault-Tolerant Cloud-of-Clouds MapReduce. CCGrid 2017: 421-430
[c81]Iberia Medeiros
, Miguel Beatriz, Nuno Ferreira Neves
, Miguel Correia:
Demonstrating a Tool for Injection Attack Prevention in MySQL. DSN 2017: 551-558
[c80]Paulo Jorge Costa Nunes, Iberia Medeiros
, José Fonseca
, Nuno Ferreira Neves
, Miguel Correia, Marco Vieira
:
On Combining Diverse Static Analysis Tools for Web Security: An Empirical Study. EDCC 2017: 121-128
[c79]Arnaldo Gouveia, Miguel Correia:
A Systematic Approach for the Application of Restricted Boltzmann Machines in Network Intrusion Detection. IWANN (1) 2017: 432-446
[c78]David R. Matos, Miguel L. Pardal, Miguel Correia:
Rectify: black-box intrusion recovery in PaaS clouds. Middleware 2017: 209-221
[c77]Naércio Magaia
, Paulo Rogério Pereira
, Miguel Correia:
REPSYS: A Robust and Distributed Reputation System for Delay-Tolerant Networks. MSWiM 2017: 289-293
[c76]Sileshi Demesie Yalew, Gerald Q. Maguire Jr.
, Seif Haridi, Miguel Correia:
Hail to the Thief: Protecting data from mobile ransomware with ransomsafedroid. NCA 2017: 351-358
[c75]Naércio Magaia
, Carlos Borrego, Paulo Pereira
, Miguel Correia:
PRIVO: A privacy-preserving opportunistic routing protocol for delay tolerant networks. Networking 2017: 1-9
[c74]André Joaquim, Miguel L. Pardal, Miguel Correia:
Vulnerability-Tolerant Transport Layer Security. OPODIS 2017: 28:1-28:16
[c73]Erick Lavoie, Miguel Correia, Laurie J. Hendren:
Xor-Overlay Topology Management beyond Kademlia. SASO 2017: 51-60
[c72]Sileshi Demesie Yalew, Gerald Q. Maguire Jr.
, Seif Haridi, Miguel Correia:
T2Droid: A TrustZone-Based Dynamic Analyser for Android Applications. TrustCom/BigDataSE/ICESS 2017: 240-247
[c71]Sileshi Demesie Yalew, Gerald Q. Maguire Jr.
, Seif Haridi, Miguel Correia:
DroidPosture: A trusted posture assessment service for mobile devices. WiMob 2017: 1-8
[c70]Sileshi Demesie Yalew, Pedro Mendonca, Gerald Q. Maguire Jr.
, Seif Haridi, Miguel Correia:
TruApp: A TrustZone-based authenticity detection service for mobile apps. WiMob 2017: 1-9
[e2]Aris Gkoulalas-Divanis, Miguel P. Correia, Dimiter R. Avresky:
16th IEEE International Symposium on Network Computing and Applications, NCA 2017, Cambridge, MA, USA, October 30 - November 1, 2017. IEEE Computer Society 2017, ISBN 978-1-5386-1465-5 [contents]- 2016
[j29]Alysson Bessani
, Nuno Ferreira Neves
, Paulo Veríssimo, Wagner Saback Dantas, Alexandre Fonseca, Rui Silva, Pedro Luz, Miguel Correia
:
JITeR: Just-in-time application-layer routing. Comput. Networks 104: 122-136 (2016)
[j28]Iberia Medeiros
, Nuno Ferreira Neves
, Miguel Correia:
Detecting and Removing Web Application Vulnerabilities with Static Analysis and Data Mining. IEEE Trans. Reliability 65(1): 54-69 (2016)
[c69]Paulo R. Pinho Filho, Luciana de Oliveira Rech, Lau Cheuk Lung, Miguel Correia
, Lásaro Jonas Camargos:
Priority-Based State Machine Replication with PRaxos. AINA 2016: 540-547
[c68]Pedro A. R. S. Costa
, Xiao Bai, Fernando M. V. Ramos
, Miguel Correia
:
Medusa: An Efficient Cloud Fault-Tolerant MapReduce. CCGrid 2016: 443-452
[c67]Iberia Medeiros
, Miguel Beatriz, Nuno Ferreira Neves
, Miguel Correia
:
Hacking the DBMS to Prevent Injection Attacks. CODASPY 2016: 295-306
[c66]Iberia Medeiros
, Nuno Ferreira Neves
, Miguel Correia
:
Equipping WAP with WEAPONS to Detect Vulnerabilities: Practical Experience Report. DSN 2016: 630-637
[c65]Ibéria Medeiros
, Nuno Ferreira Neves
, Miguel Correia
:
DEKANT: a static analysis tool that learns to detect web application vulnerabilities. ISSTA 2016: 1-11
[c64]Sileshi Demesie Yalew, Gerald Q. Maguire Jr.
, Miguel Correia
:
Light-SPD: a platform to prototype secure mobile applications. PAMCO@MobiHoc 2016: 11-20
[c63]Eugenio A. Silva, Miguel Correia
:
Leveraging an homomorphic encryption library to implement a coordination service. NCA 2016: 39-42
[c62]Karan Balu, Miguel L. Pardal, Miguel Correia
:
DARSHANA: Detecting route hijacking for communication confidentiality. NCA 2016: 52-59
[c61]Diogo Raposo, Miguel L. Pardal, Luís E. T. Rodrigues, Miguel Correia
:
MACHETE: Multi-path communication for security. NCA 2016: 60-67
[c60]Arnaldo Gouveia, Miguel Correia
:
Feature set tuning in statistical learning network intrusion detection. NCA 2016: 68-75
[c59]David R. Matos, Miguel Correia
:
NoSQL Undo: Recovering NoSQL databases by undoing operations. NCA 2016: 191-198
[c58]André Joaquim, Miguel L. Pardal, Miguel Correia:
vtTLS: A vulnerability-tolerant communication protocol. NCA 2016: 212-215
[c57]Christine Blakemore, João Redol, Miguel Correia:
Fingerprinting for Web Applications: From Devices to Related Groups. Trustcom/BigDataSE/ISPA 2016: 144-151- 2015
[j27]Naércio Magaia
, Alexandre P. Francisco, Paulo Rogério Pereira
, Miguel Correia
:
Betweenness centrality in Delay Tolerant Networks: A survey. Ad Hoc Networks 33: 284-305 (2015)
[j26]Naércio Magaia
, Nuno Horta
, Rui Ferreira Neves
, Paulo Rogério Pereira
, Miguel Correia
:
A multi-objective routing algorithm for Wireless Multimedia Sensor Networks. Appl. Soft Comput. 30: 104-112 (2015)
[j25]Hylson Vescovi Netto, Lau Cheuk Lung, Tulio Alberton Ribeiro, Miguel Correia
, Aldelir Fernando Luiz:
Anticipating Requests to Improve Performance and Reduce Costs in Cloud Storage. SIGMETRICS Performance Evaluation Review 43(3): 21-24 (2015)
[c56]Daniel Presser, Lau Cheuk Lung, Miguel Correia
:
Greft: Arbitrary Fault-Tolerant Distributed Graph Processing. BigData Congress 2015: 452-459
[c55]Dario Nascimento, Miguel Correia
:
Shuttle: Intrusion Recovery for PaaS. ICDCS 2015: 653-663
[c54]Daniel Gonçalves, Joao Bota, Miguel Correia
:
Big Data Analytics for Detecting Host Misbehavior in Large Logs. TrustCom/BigDataSE/ISPA (1) 2015: 238-245
[i1]Pedro A. R. S. Costa
, Xiao Bai, Fernando M. V. Ramos, Miguel Correia:
Medusa: An Efficient Cloud Fault-Tolerant MapReduce. CoRR abs/1511.07185 (2015)- 2014
[j24]Aldelir Fernando Luiz, Lau Cheuk Lung, Miguel Correia
:
MITRA: byzantine fault-tolerant middleware for transaction processing on replicated databases. SIGMOD Record 43(1): 32-38 (2014)
[j23]Miguel Correia
, Neeraj Mittal:
Cloud Computing Dependability: Report and Extended Papers of the Second International Workshop on Dependability Issues in Cloud Computing. Operating Systems Review 48(2): 1-2 (2014)
[c53]Aldelir Fernando Luiz, Lau Cheuk Lung, Miguel Correia, Valdir Stumm Junior:
Non-blocking Atomic Commitment with Byzantine Faults. SBRC 2014: 156-164
[c52]Alysson Neves Bessani, Ricardo Mendes, Tiago Oliveira, Nuno Ferreira Neves, Miguel Correia, Marcelo Pasin, Paulo Veríssimo:
SCFS: A Shared Cloud-backed File System. USENIX Annual Technical Conference 2014: 169-180
[c51]Iberia Medeiros
, Nuno Ferreira Neves
, Miguel Correia
:
Automatic detection and correction of web application vulnerabilities using data mining to predict false positives. WWW 2014: 63-74- 2013
[j22]Miguel Correia
, Nuno Ferreira Neves
, Paulo Veríssimo
:
BFT-TO: Intrusion Tolerance with Less Replicas. Comput. J. 56(6): 693-715 (2013)
[j21]Miguel Correia, Neeraj Mittal:
Dependability issues in cloud computing: extended papers from the 1st international workshop on dependability issues in cloud computing - DISCCO. Operating Systems Review 47(2): 20-22 (2013)
[j20]Giuliana Santos Veronese, Miguel Correia
, Alysson Neves Bessani
, Lau Cheuk Lung, Paulo Veríssimo
:
Efficient Byzantine Fault-Tolerance. IEEE Trans. Computers 62(1): 16-30 (2013)
[j19]Pedro Costa, Marcelo Pasin, Alysson Neves Bessani
, Miguel P. Correia
:
On the Performance of Byzantine Fault-Tolerant MapReduce. IEEE Trans. Dependable Sec. Comput. 10(5): 301-313 (2013)
[j18]Henrique Moniz
, Nuno Ferreira Neves
, Miguel Correia
:
Byzantine Fault-Tolerant Consensus in Wireless Ad Hoc Networks. IEEE Trans. Mob. Comput. 12(12): 2441-2454 (2013)
[j17]Alysson Neves Bessani
, Miguel Correia
, Bruno Quaresma, Fernando André, Paulo Sousa
:
DepSky: Dependable and Secure Storage in a Cloud-of-Clouds. TOS 9(4): 12:1-12:33 (2013)
[c50]Miguel Correia
:
Clouds-of-Clouds for Dependability and Security: Geo-replication Meets the Cloud. Euro-Par Workshops 2013: 95-104
[c49]Naércio Magaia, Paulo Rogério Pereira, Miguel P. Correia:
Selfish and malicious behavior in Delay-Tolerant Networks. Future Network & Mobile Summit 2013: 1-10
[c48]Iberia Medeiros
, Nuno Ferreira Neves
, Miguel Correia
:
Securing energy metering software with automatic source code correction. INDIN 2013: 701-706
[c47]Fernando Dettoni, Lau Cheuk Lung, Miguel Correia
, Aldelir Fernando Luiz:
Byzantine fault-tolerant state machine replication with twin virtual machines. ISCC 2013: 398-403
[c46]Alysson Neves Bessani, Marcel Santos, João Felix, Nuno Ferreira Neves, Miguel Correia:
On the Efficiency of Durable State Machine Replication. USENIX Annual Technical Conference 2013: 169-180- 2012
[j16]Luciana Arantes, Alysson Neves Bessani, Vinicius V. Cogo, Miguel Correia, Pedro Costa, Jonathan Lejeune, M. Piffaretti, Olivier Marin, Marcelo Pasin, Pierre Sens, F. Silva, Julien Sopena:
Vers une plate-forme MapReduce tolérant les fautes byzantines. Technique et Science Informatiques 31(8-10): 1079-1099 (2012)
[c45]Miguel Correia
, Pedro A. R. S. Costa
, Marcelo Pasin, Alysson Neves Bessani
, Fernando M. V. Ramos
, Paulo Veríssimo
:
On the Feasibility of Byzantine Fault-Tolerant MapReduce in Clouds-of-Clouds. SRDS 2012: 448-453
[c44]Miguel Correia, Daniel Gómez Ferro, Flavio Paiva Junqueira, Marco Serafini:
Practical Hardening of Crash-Tolerant Systems. USENIX Annual Technical Conference 2012: 453-466
[e1]Cristian Constantinescu, Miguel P. Correia:
2012 Ninth European Dependable Computing Conference, Sibiu, Romania, May 8-11, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-0938-7 [contents]- 2011
[j15]Francisco Rocha, Salvador Abreu
, Miguel Correia
:
The Final Frontier: Confidentiality and Privacy in the Cloud. IEEE Computer 44(9): 44-50 (2011)
[j14]Henrique Moniz
, Nuno Ferreira Neves
, Miguel Correia
, Paulo Veríssimo
:
Randomization can be a healer: consensus with dynamic omission failures. Distributed Computing 24(3-4): 165-175 (2011)
[j13]Miguel Correia
, Giuliana Santos Veronese, Nuno Ferreira Neves
, Paulo Veríssimo
:
Byzantine consensus in asynchronous message-passing systems: a survey. IJCCBS 2(2): 141-161 (2011)
[j12]Henrique Moniz
, Nuno Ferreira Neves
, Miguel Correia
, Paulo Veríssimo
:
RITAS: Services for Randomized Intrusion Tolerance. IEEE Trans. Dependable Sec. Comput. 8(1): 122-136 (2011)
[c43]Pedro Costa, Marcelo Pasin, Alysson Neves Bessani
, Miguel Correia
:
Byzantine Fault-Tolerant MapReduce: Faults are Not Just Crashes. CloudCom 2011: 32-39
[c42]Gustavo Nascimento, Miguel Correia
:
Anomaly-based intrusion detection in software as a service. DSN Workshops 2011: 19-24
[c41]Francisco Rocha, Miguel Correia
:
Lucy in the sky without diamonds: Stealing confidential data in the cloud. DSN Workshops 2011: 129-134
[c40]Alysson Neves Bessani
, Miguel P. Correia
, Bruno Quaresma, Fernando André, Paulo Sousa
:
DepSky: dependable and secure storage in a cloud-of-clouds. EuroSys 2011: 31-46
[c39]Aldelir Fernando Luiz, Lau Cheuk Lung, Miguel Correia
:
Byzantine Fault-Tolerant Transaction Processing for Replicated Databases. NCA 2011: 83-90
[c38]Xavier Vilaça, João Leitão
, Miguel Correia
, Luís E. T. Rodrigues:
N-party BAR Transfer. OPODIS 2011: 392-408- 2010
[j11]Paulo Sousa
, Alysson Neves Bessani
, Miguel Correia
, Nuno Ferreira Neves
, Paulo Veríssimo
:
Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery. IEEE Trans. Parallel Distrib. Syst. 21(4): 452-465 (2010)
[j10]João Antunes, Nuno Ferreira Neves
, Miguel Correia
, Paulo Veríssimo
, Rui Ferreira Neves
:
Vulnerability Discovery with Attack Injection. IEEE Trans. Software Eng. 36(3): 357-370 (2010)
[c37]Valdir Stumm Jr., Lau Cheuk Lung, Miguel Correia
, Joni da Silva Fraga, Jim Lau:
Intrusion Tolerant Services Through Virtualization: A Shared Memory Approach. AINA 2010: 768-774
[c36]Henrique Moniz
, Nuno Ferreira Neves
, Miguel Correia
:
Turquois: Byzantine consensus in wireless ad hoc networks. DSN 2010: 537-546
[c35]Miguel Correia
, Partha P. Pal:
4th workshop on recent advances in intrusion-tolerant systems WRAITS 2010. DSN 2010: 621-622
[c34]Giuliana Santos Veronese, Miguel Correia
, Alysson Neves Bessani
, Lau Cheuk Lung:
EBAWA: Efficient Byzantine Agreement for Wide-Area Networks. HASE 2010: 10-19
[c33]Alysson Neves Bessani, Paulo Sousa, Miguel Correia:
Active Quorum Systems. HotDep 2010
[c32]Miguel Correia
, Giuliana Santos Veronese, Lau Cheuk Lung:
Asynchronous Byzantine consensus with 2f+1 processes. SAC 2010: 475-480
2000 – 2009
- 2009
[j9]Alysson Neves Bessani
, Miguel Correia
, Joni da Silva Fraga, Lau Cheuk Lung:
An Efficient Byzantine-Resilient Tuple Space. IEEE Trans. Computers 58(8): 1080-1094 (2009)
[j8]Alysson Neves Bessani
, Miguel Correia
, Joni da Silva Fraga, Lau Cheuk Lung:
Sharing Memory between Byzantine Processes Using Policy-Enforced Tuple Spaces. IEEE Trans. Parallel Distrib. Syst. 20(3): 419-432 (2009)
[c31]Paulo Sousa
, Alysson Neves Bessani
, Wagner Saback Dantas, Fabio Souto, Miguel Correia
, Nuno Ferreira Neves
:
Intrusion-tolerant self-healing devices for critical infrastructure protection. DSN 2009: 217-222
[c30]Saurabh Bagchi, Miguel Correia
, Partha P. Pal:
3rd Workshop on Recent Advances on Intrusion-Tolerant Systems WRAITS 2009. DSN 2009: 600-601
[c29]Paulo Veríssimo
, Alysson Neves Bessani
, Miguel Correia
, Nuno Ferreira Neves
, Paulo Sousa:
Designing Modular and Redundant Cyber Architectures for Process Control: Lessons learned. HICSS 2009: 1-8
[c28]Giuliana Santos Veronese, Miguel Correia
, Alysson Neves Bessani
, Lau Cheuk Lung:
Spin One's Wheels? Byzantine Fault Tolerance with a Spinning Primary. SRDS 2009: 135-144
[c27]Henrique Moniz
, Nuno Ferreira Neves
, Miguel Correia
, Paulo Veríssimo
:
Randomization Can Be a Healer: Consensus with Dynamic Omission Failures. DISC 2009: 63-77- 2008
[j7]Alysson Neves Bessani
, Paulo Sousa
, Miguel Correia
, Nuno Ferreira Neves
, Paulo Veríssimo:
The Crutial Way of Critical Infrastructure Protection. IEEE Security & Privacy 6(6): 44-51 (2008)
[j6]Miguel Correia
, Alysson Neves Bessani
, Paulo Veríssimo
:
On Byzantine generals with alternative plans. J. Parallel Distributed Comput. 68(9): 1291-1296 (2008)
[c26]Alysson Neves Bessani
, Eduardo Adílio Pelinson Alchieri, Miguel Correia
, Joni da Silva Fraga:
DepSpace: a byzantine fault-tolerant coordination service. EuroSys 2008: 163-176
[c25]Giuliana Santos Veronese, Miguel Correia
, Lau Cheuk Lung, Paulo Veríssimo
:
Finite Memory: A Vulnerability of Intrusion-Tolerant Systems. NCA 2008: 37-44- 2007
[j5]Miguel Correia
, Nuno Ferreira Neves
, Lau Cheuk Lung, Paulo Veríssimo
:
Worm-IT - A wormhole-based intrusion-tolerant group communication system. J. Syst. Softw. 80(2): 178-197 (2007)
[j4]Gunjan Khanna, Mike Yu Cheng, Padma Varadharajan, Saurabh Bagchi, Miguel P. Correia
, Paulo Veríssimo
:
Automated Rule-Based Diagnosis through a Distributed Monitor System. IEEE Trans. Dependable Sec. Comput. 4(4): 266-279 (2007)
[c24]Paulo Veríssimo
, Nuno Ferreira Neves
, Miguel Correia
, Yves Deswarte, Anas Abou El Kalam, Andrea Bondavalli
, Alessandro Daidone:
The CRUTIAL Architecture for Critical Information Infrastructures. WADS 2007: 1-27
[c23]Fábio Favarim, Joni da Silva Fraga, Lau Cheuk Lung, Miguel Correia
, João Felipe Santos
:
Exploiting Tuple Spaces to Provide Fault-Tolerant Scheduling on Computational Grids. ISORC 2007: 403-411
[c22]Fábio Favarim, Joni da Silva Fraga, Lau Cheuk Lung, Miguel Correia
:
GRIDTS: A New Approach for Fault-Tolerant Scheduling in Grid Computing. NCA 2007: 187-194
[c21]Alysson Neves Bessani
, Miguel Correia
, Joni da Silva Fraga, Lau Cheuk Lung:
Decoupled Quorum-Based Byzantine-Resilient Coordination in Open Distributed Systems. NCA 2007: 231-238
[c20]Henrique Moniz, Nuno Ferreira Neves, Miguel Correia, António Casimiro, Paulo Veríssimo:
Intrusion Tolerance in Wireless Environments: An Experimental Evaluation. PRDC 2007: 357-364
[c19]Paulo Sousa
, Alysson Neves Bessani, Miguel Correia, Nuno Ferreira Neves, Paulo Veríssimo:
Resilient Intrusion Tolerance through Proactive and Reactive Recovery. PRDC 2007: 373-380
[c18]Giuliana Santos Veronese, Miguel Correia, Lau Cheuk Lung, Paulo Veríssimo:
On the Effects of Finite Memory on Intrusion-Tolerant Systems. PRDC 2007: 401-404
[c17]Wagner Saback Dantas, Alysson Neves Bessani, Joni da Silva Fraga, Miguel Correia:
Evaluating Byzantine Quorum Systems. SRDS 2007: 253-264
[c16]Alysson Neves Bessani, Miguel Correia, Henrique Moniz, Nuno Ferreira Neves, Paulo Veríssimo:
When 3f+1 Is Not Enough: Tradeoffs for Decentralized Asynchronous Byzantine Consensus. DISC 2007: 480-481
[c15]Pan Jieke, João Redol, Miguel Correia:
Specification-based Intrusion Detection System for Carrier Ethernet. WEBIST (1) 2007: 426-429- 2006
[j3]Miguel Correia
, Nuno Ferreira Neves
, Paulo Veríssimo
:
From Consensus to Atomic Broadcast: Time-Free Byzantine-Resistant Protocols without Signatures. Comput. J. 49(1): 82-96 (2006)
[c14]Paulo Veríssimo
, Nuno Ferreira Neves
, Miguel Correia
:
CRUTIAL: The Blueprint of a Reference Critical Information Infrastructure Architecture. CRITIS 2006: 1-14
[c13]Nuno Ferreira Neves
, João Antunes, Miguel Correia
, Paulo Veríssimo
, Rui Ferreira Neves
:
Using Attack Injection to Discover New Vulnerabilities. DSN 2006: 457-466
[c12]Henrique Moniz
, Nuno Ferreira Neves
, Miguel Correia
, Paulo Veríssimo
:
Randomized Intrusion-Tolerant Asynchronous Services. DSN 2006: 568-577
[c11]Alysson Neves Bessani
, Joni da Silva Fraga, Miguel Correia
, Lau Cheuk Lung:
Sharing Memory between Byzantine Processes using Policy-Enforced Tuple Spaces. ICDCS 2006: 35
[c10]Lau Cheuk Lung, Fábio Favarim, Giuliana Teixeira Santos, Miguel Correia:
An Infrastructure for Adaptive Fault Tolerance on FT-CORBA. ISORC 2006: 504-511
[c9]Henrique Moniz
, Nuno Ferreira Neves
, Miguel Correia
, Paulo Veríssimo
:
Experimental Comparison of Local and Shared Coin Randomized Consensus Protocols. SRDS 2006: 235-244
[c8]Alysson Neves Bessani, Miguel Correia, Joni da Silva Fraga, Lau Cheuk Lung:
Brief Announcement: Decoupled Quorum-Based Byzantine-Resilient Coordination in Open Distributed Systems. DISC 2006: 554-556- 2005
[j2]Miguel Correia
, Nuno Ferreira Neves
, Lau Cheuk Lung, Paulo Veríssimo
:
Low complexity Byzantine-resilient consensus. Distributed Computing 17(3): 237-249 (2005)
[j1]Nuno Ferreira Neves
, Miguel Correia
, Paulo Veríssimo
:
Solving Vector Consensus with a Wormhole. IEEE Trans. Parallel Distrib. Syst. 16(12): 1120-1131 (2005)- 2004
[c7]Miguel Correia, Nuno Ferreira Neves, Paulo Veríssimo:
How to Tolerate Half Less One Byzantine Nodes in Practical Distributed Systems. SRDS 2004: 174-183- 2002
[c6]Miguel Correia, Paulo Veríssimo, Nuno Ferreira Neves:
The Design of a COTSReal-Time Distributed Security Kernel. EDCC 2002: 234-252
[c5]Paulo Veríssimo, Nuno Ferreira Neves, Miguel Correia:
Intrusion-Tolerant Architectures: Concepts and Design. WADS 2002: 3-36
[c4]Miguel Correia
, Lau Cheuk Lung, Nuno Ferreira Neves
, Paulo Veríssimo:
Efficient Byzantine-Resilient Reliable Multicast on a Hybrid Failure Model. SRDS 2002: 2-11- 2001
[c3]Miguel Correia
, Paulo Veríssimo, Nuno Ferreira Neves
:
The Architecture of a Secure Group Communication System Based on Intrusion Tolerance. ICDCS Workshops 2001: 17-24
1990 – 1999
- 1998
[c2]João Bom, Paulo Marques, Miguel Correia
, Paulo Pinto
:
Integrated Dymanic QoS Control for Multimedia Applications. SYBEN 1998: 384-394- 1995
[c1]Miguel Correia, Paulo Pinto:
Low-Level Multimedia Synchronization Algorithms on Broadband Networks. ACM Multimedia 1995: 423-434
Coauthor Index
aka: Alysson Bessani
aka: Ibéria Medeiros
aka: Nuno Ferreira Neves

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org and opencitations.net to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy.
Citation data
Add a list of citing articles from
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy.
Tweets on dblp homepage
Show tweets from
on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter accout. At the same time, Twitter will persitently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2020-03-04 01:25 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint



Google
Google Scholar
MS Academic
CiteSeerX
CORE
Semantic Scholar




