Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New Approaches for XML Data Compression., , , , and . WEBIST, page 233-237. SciTePress, (2012)Metrics Application in Metropolitan Broadband Access Network Security Analysis., , , and . SECRYPT, page 473-476. INSTICC Press, (2008)A New Approach for Fuzzy Classification in Relational Databases., , , and . DEXA (2), volume 6861 of Lecture Notes in Computer Science, page 511-518. Springer, (2011)Time Series Segmentation Based on Stationarity Analysis to Improve New Samples Prediction., , , and . Sensors, 21 (21): 7333 (2021)Power Allocation in Multirate DS/CDMA Systems Based on Verhulst Equilibrium., , , , and . ICC, page 1-6. IEEE, (2010)Photovoltaic Generation Forecast: Model Training and Adversarial Attack Aspects., , , and . BRACIS (2), volume 12320 of Lecture Notes in Computer Science, page 634-649. Springer, (2020)Attack Detection in Smart Home IoT Networks using CluStream and Page-Hinkley Test., , and . LATINCOM, page 1-6. IEEE, (2021)Um estudo empírico sobre o uso de métricas de segurança em ambientes reais., , and . SBSI, page 699-710. (2014)Anomaly Detection Using DSNS and a Dependency Graph for SNMP Objects., , and . AICT, page 56-63. IEEE Computer Society, (2008)Investigando o Impacto de Amostras Adversárias na Detecção de Intrusões em um Sistema Ciberfísico., , and . SBRC, page 281-294. (2023)