Author of the publication

BUCEPHALUS: a BUsiness CEntric cybersecurity Platform for proActive anaLysis Using visual analyticS.

, , , , , , and . VizSec, page 15-25. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-hop Byzantine reliable broadcast with honest dealer made practical., , and . J. Braz. Comput. Soc., 25 (1): 9:1-9:23 (2019)Emergent Semantics and Cooperation in Multi-knowledge Communities: the ESTEEM Approach., , , , , , , , , and 5 other author(s). World Wide Web, 13 (1-2): 3-31 (2010)B-CoC: A Blockchain-based Chain of Custody for Evidences Management in Digital Forensics., , and . CoRR, (2018)Implementing a Regular Register in an Eventually Synchronous Distributed System Prone to Continuous Churn., , and . IEEE Trans. Parallel Distributed Syst., 23 (1): 102-109 (2012)Virtual Tree: A robust architecture for interval valid queries in dynamic distributed systems., , , and . J. Parallel Distributed Comput., 73 (8): 1135-1145 (2013)Counting in Anonymous Dynamic Networks: An Experimental Perspective., , , and . ALGOSENSORS, volume 8243 of Lecture Notes in Computer Science, page 139-154. Springer, (2013)Context-Aware Trace Alignment with Automated Planning., , , , , and . ICPM, page 104-111. IEEE, (2022)Synchronous Byzantine Lattice Agreement in O(log(f) Rounds., , , and . ICDCS, page 146-156. IEEE, (2020)A Modular Approach for the Analysis of Blockchain Consensus Protocol Under Churn (Poster)., and . FAB, volume 101 of OASIcs, page 8:1-8:2. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2022)Building an emulation environment for cyber security analyses of complex networked systems., , , , and . ICDCN, page 203-212. ACM, (2019)