Volgen
Diego Kreutz
Diego Kreutz
CyberLab @ UNIPAMPA
Geverifieerd e-mailadres voor acm.org
Titel
Geciteerd door
Geciteerd door
Jaar
Software-defined networking: A comprehensive survey
D Kreutz, FMV Ramos, PE Verissimo, CE Rothenberg, S Azodolmolky, ...
Proceedings of the IEEE 103 (1), 14-76, 2014
56222014
Towards secure and dependable software-defined networks
D Kreutz, FMV Ramos, P Verissimo
Proceedings of the second ACM SIGCOMM workshop on Hot topics in software …, 2013
9072013
On the feasibility of a consistent and fault-tolerant data store for SDNs
FA Botelho, FMV Ramos, D Kreutz, AN Bessani
2013 Second european workshop on software defined networks, 38-43, 2013
822013
Software-defined networks: On the road to the softwarization of networking
FMV Ramos, D Kreutz, P Verissimo
Cutter IT journal, 2015
292015
Vazamentos de Dados: Histórico, Impacto Socioeconô mico e as Novas Leis de Proteà § ã o de Dados
R Bisso, D Kreutz, G Rodrigues, G Paz
Revista Eletrônica Argentina-Brasil de Tecnologias da Informação e da …, 2020
252020
ANCHOR: Logically centralized security for software-defined networks
D Kreutz, J Yu, FMV Ramos, P Esteves-Verissimo
ACM Transactions on Privacy and Security (TOPS) 22 (2), 1-36, 2019
232019
Experiences with fault-injection in a byzantine fault-tolerant protocol
R Martins, R Gandhi, P Narasimhan, S Pertet, A Casimiro, D Kreutz, ...
Middleware 2013: ACM/IFIP/USENIX 14th International Middleware Conference …, 2013
202013
The kiss principle in software-defined networking: a framework for secure communications
D Kreutz, J Yu, P Esteves-Verissimo, C Magalhaes, FMV Ramos
IEEE Security & Privacy 16 (5), 60-70, 2018
192018
A cyber-resilient architecture for critical security services
D Kreutz, O Malichevskyy, E Feitosa, H Cunha, R da Rosa Righi, ...
Journal of Network and Computer Applications 63, 173-189, 2016
182016
Towards secure and dependable authentication and authorization infrastructures
D Kreutz, A Bessani, E Feitosa, H Cunha
2014 IEEE 20th Pacific Rim International Symposium on Dependable Computing …, 2014
182014
System design artifacts for resilient identification and authentication infrastructures
D Kreutz, O Malichevskyy, E Feitosa, KRS Barbosa, H Cunha
ICNS, 2014
142014
Towards cloud-based asynchronous elasticity for iterative HPC applications
R da Rosa Righi, VF Rodrigues, CA da Costa, D Kreutz, HU Heiss
Journal of Physics: Conference Series 649 (1), 012006, 2015
122015
Increasing the resilience and trustworthiness of openid identity providers for future networks and services
D Kreutz, E Feitosa, H Cunha, H Niedermayer, H Kinkelin
2014 Ninth International Conference on Availability, Reliability and …, 2014
122014
Identity Providers-as-a-Service built as Cloud-of-Clouds: challenges and opportunities.
D Kreutz, E Feitosa
FedCSIS (Position Papers), 101-108, 2014
112014
Trustworthy and resilient monitoring system for cloud infrastructures
S Padhy, D Kreutz, A Casimiro, M Pasin
Proceedings of the Workshop on Posters and Demos Track, 1-2, 2011
112011
Sec-mon: An architecture for monitoring and controlling security service level agreements
RR Righi, DL Kreutz, CB Westphall
XI Workshop on Managing and Operating Networks and Services, 73-84, 2006
112006
The KISS principle in software-defined networking: An architecture for keeping it simple and secure
D Kreutz, J Yu, P Esteves-Verissimo, C Magalhães, F Ramos
arXiv preprint arXiv:1702.04294, 2017
92017
Architecture components for resilient networks
D Kreutz, H Niedermayer, E Feitosa, J da Silva Fraga, O Malichevskyy
SecFuNet. eu, Tech. Rep, 2013
92013
Detecçao de malwares android: datasets e reprodutibilidade
T Soares, G Siqueira, L Barcellos, R Sayyed, L Vargas, G Rodrigues, ...
Anais da XIX Escola Regional de Redes de Computadores, 43-48, 2021
82021
FloodXMR: Low-cost transaction flooding attack with Monero’s bulletproof protocol
JOM Chervinski, D Kreutz, J Yu
Cryptology ePrint Archive, 2019
82019
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20