Title and link to download the paper are
presented below:
GAIA-DRL: A Geoenvironmental Agent for Energy Optimization in
Batteryless IoT Networks with Ambient Backscatter. October 2025 – XLIII
BRAZILIAN SYMPOSIUM ON TELECOMMUNICATIONS AND SIGNAL PROCESSING - SBrT 2025.
HyVAW: A
hybrid vulnerability analysis workflow threat model methodology for complex
systems based on distributed components. October 2025 – Journal of Open Innovation Technology
Market and Complexity
Identifying fakes in social media text messages using
Stylometry. September 2025 – Simpósio Brasileiro de Cibersegurança (SBSeg 2025).
Challenges in GenAI and Authentication: a scoping review. July 2025 – ArXiv.
Qualitative Assessment of Low Power Wide Area Network
Protocols and their Security Aspect. July 2025 – ArXiv.
A tertiary review on quantum cryptography. May 2025 – ArXiv.
https://www.researchgate.net/publication/392371376_A_tertiary_review_on_quantum_cryptography
Security Aspects in an Intelligent Lighting System for Public
Squares using Fog Computing. May 2025 - IX Workshop de Computação
Urbana (CoUrb 2025) - 43ª edição
do SBRC (Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos).
Intelligent Monitoring of Water Consumption in Urban
Environments using Computing and FOG-SWM. May 2025 - IX Workshop de Computação
Urbana (CoUrb 2025) - 43ª edição
do SBRC (Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos).
Management of the Chain of Custody of Digital Evidence Using
Blockchain and Self-Sovereign Identities: A Systematic Literature Review. April 2025 - IEEE
Access.
Detecting attacks in Fog and cloud computing environments
using Deep Learning: A systematic literature review. March 2025 - Computer
Networks.
Blockchain-Based Chain of Custody for Digital Evidence with
Hyperledger Fabric. Jan 2025 - International Conference on Information
Networking (ICOIN). https://www.researchgate.net/publication/391761704_Blockchain-Based_Chain_of_Custody_for_Digital_Evidence_with_Hyperledger_Fabric
Tdeo: An
Algorithm for Throughput and Energy Efficiency Optimization in Batteryless Dense Iot Networks
Using Ambc. Jun 2025
- SSRN. https://www.researchgate.net/publication/392690162_Tdeo_An_Algorithm_for_Throughput_and_Energy_Efficiency_Optimization_in_Batteryless_Dense_Iot_Networks_Using_Ambc
Intensive care unit nursing workload estimation
in smart hospitals. August 2024 - Journal of
Health Organization and Management. https://www.researchgate.net/publication/382998117_Intensive_care_unit_nursing_workload_estimation_in_smart_hospitals
Distributed AgriFood Supply Chains. Journal of Network and
Systems Management 32(3):2024
https://www.researchgate.net/publication/381830338_Distributed_AgriFood_Supply_Chains
Hierarchical multistep approach for intrusion
detection and identification in IoT and
Fog computing-based environments. Ad Hoc Networks 161(4),
2024.
Performance
of security options for message protocols: A comparative analysis. International
Journal of Network Management, 2024.
“A
Formal Verification of a Reputation Multi-Factor Authentication Mechanism for
Constrained Devices and Low-Power Wide-Area Network Using Temporal Logic”, Sensors 23(15):6933, 2023.
“DNNET-Ensemble
approach to detecting and identifying attacks in IoT environments”, Conference: 41th Brazilian Symposium on Computer Networks and
Distributed Systems (SBRC 2023).
“Intrusion
detection with Machine Learning in Internet of Things and Fog Computing:
problems, solutions and research”, In book: Mini-course 3 of the 41th
Brazilian Symposium on Computer Networks and Distributed Systems (SBRC 2023)
(pp.1-50) Publisher: Brazilian Computer Society (SBC).
“Intrusion
detection and prevention in fog based IoT environments:
A systematic literature review”, Computer Networks Journal, 2022.
https://www.researchgate.net/publication/361850362_Intrusion_detection_and_prevention_in_fog_based_IoT_environments_A_systematic_literature_review
“Two-step ensemble approach for intrusion detection and
identification in IoT and fog computing
environments”, COMPUTERS & ELECTRICAL ENGINEERING,
2022.
“Autonomic energy management with Fog Computing”, COMPUTERS
& ELECTRICAL ENGINEERING, 2021.
https://www.researchgate.net/publication/352493943_Autonomic_energy_management_with_Fog_Computing
“Mutual Authentication with Multi-factor in IoT-Fog-Cloud
Environment”, Journal of Network and
Computer Applications, 2021.
“Comparison between LSTM and CLCNN in detecting
malicious requests in web attacks”, XXI
Brazilian Symposium on Information and Computational Systems Security (SBSeg 2021).
“Multiclass
decomposition and Artificial Neural Networks for intrusion detection and
identification in Internet of Things environments”, XXI Brazilian Symposium
on Information and Computational Systems Security (SBSeg 2021).
“Experiments
on energy optimization in smart residences”, 29th International Conference on Software,
Telecommunications and Computer Networks (SoftCOM 2021).
“Hybrid approach to intrusion detection in fog-based IoT environments”, Computer
Networks Journal, 2020.
“Models
of Computing as a Service and IoT: an analysis
of the current scenario with applications using LPWAN”, Revista de Sistemas de Informação da FSMA n. 25 (2020)
“Avaliação de desempenho de protocolos de mensagens com arquitetura publish/subscribe no ambiente de computação em nevoeiro:
um estudo sobre desempenho do MQTT, AMQP e STOMP”, SBRC 2020 – WPEIF (Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos -
Workshop de Pesquisa Experimental da
Internet do Futuro), 2020.
“Ambiente de experimentação para avaliação protocolos de mensagem para IoT na Fog", SBRC 2020 – WPEIF (Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos - Workshop de Pesquisa Experimental
da Internet do Futuro), 2020.
“Autonomic Intrusion Detection and Response Using
Big Data”, paper of IEEE Systems
Journal, 2020.
“Order@Cloud: An agnostic meta‐heuristic for VM provisioning, adaptation, and organisation”, paper of International
Journal of Network Management, 2019.
“DoS attack
detection and prevention in fog-based intelligent environments”, paper of
Brazilian Journal of Development, 2019.
“Mutual Authentication for IoT in the Context of Fog Computing”, paper
of IEEE COMSNETS 2019.
“Privacy Policies Model in Access Control”, paper
of 13th Annual IEEE International Systems Conference, 2019.
https://www.researchgate.net/publication/332522931_Privacy_Policies_Model_in_Access_Control
“Autonomic IoT Battery Management with Fog Computing”, paper of GPC 2019:
International Conference on Green, Pervasive, and Cloud Computing.
“Autonomic
Intrusion Response in Distributed Computing using Big Data”, paper of journal={arXiv preprint
cite as 1811.05407}, 2018.
*“Cloud
identity management: a survey on privacy strategies”, paper of ComNet Journal - Elsevier,
2017.
“Improving
cloud computing virtual machines balancing through hosts and virtual machines
similarities”, paper
of IEEE SERVICES 2017.
*“Preserving
Privacy with Fine-grained Authorization in an Identity Management System”, paper of ICN 2017.
*“A
Model for Managed Elements under Autonomic Cloud Computing Management”, International Journal on
Advances in Networks and Services, 2016.
” A Framework and Risk Assessment Approaches for Risk-based
Access Control in the Cloud”, paper of Elsevier JNCA
2016.
*”RACLOUDS - Model for Clouds Risk
Analysis in the Information Assets Context”, Revista de Sistemas de Informação da FSMA, 2016.
“Order@Cloud: A VM Organisation Framework Based
on Multi-Objectives Placement Ranking”, paper of IEEE NOMS 2016.
*“Towards
a Framework for VM organisation based
on Multi-Objectives”, paper of ICN 2016.
“A distributed autonomic management framework for cloud computing
orchestration”, paper of IEEE SERVICES 2016.
“Analyzing
the Strength of Pell’s RSA”, paper of IJPT 2016.
https://www.researchgate.net/publication/311669502_ANALYZING_THE_STRENGTH_OF_PELL%27S_RSA
*“C2LP: Modelling Load Propagation and Evaluation through the
Cloud Components”, paper of ICN 2016.
*“Towards
Privacy in Identity Management Dynamic Federations”, paper of ICN 2016.
*“Model
for Cloud Computing Risk Analysis”, paper of ICN 2015.
https://www.researchgate.net/publication/272892510_Model_for_Cloud_Computing_Risk_Analysis
- share
*“Decision-theoretic
model to support autonomic Cloud Computing”, paper of ICN 2015.
“Cloud
resource management: a survey on forecasting and profiling models”, in Journal of Network
and Computer Applications, 2015.
*“Providing
Response to Security Incidents in the Cloud Computing with Autonomic Systems
and Big Data”, in AICT 2015.
“An Approach to IdM
with Privacy in the Cloud” paper of IEEE
CIT/IUCC/DASC/PICOM 2015.
https://www.researchgate.net/publication/288725741_An_Approach_to_IdM_with_Privacy_in_the_Cloud
*
“Legacy Network Infrastructure Management Model for Green Cloud Validated
Through Simulations”, International Journal on Advances in Intelligent Systems,
2014.
“A dynamic risk-based access control architecture
for cloud computing”, in IEEE/IFIP NOMS, 2014.
“Panoptes: A monitoring architecture and framework for
supporting autonomic Clouds”, in IEEE/IFIP NOMS, 2014.
“A cyclical evaluation model of information
security maturity,” Journal of Information
Management & Computer Security, 2014.
* “Green Clouds
through Servers, Virtual Machines and Network Infrastructure Management,” book chapter in SBRC 2014.
*
“Operation, Management, Security and Sustainability for Cloud Computing”, Revista de Sistemas de Informação da FSMA, 2014.
*
“Provisioning, Resource Allocation, and DVFS in Green Clouds,” International Journal on
Advances in Networks and Services, 2014.
http://www.researchgate.net/publication/259913665_Provisioning_Resource_Allocation_and_DVFS_in_Green_Clouds (A best paper of ICN 2013).
*
“Current Issues in Cloud Computing Security and Management,” The Eighth International
Conference on Emerging Security Information, Systems and Technologies -
SECURWARE 2014.
“Privacy-preserving Identity Federations in the
Cloud - A Proof of Concept”, International
Journal of Security and Networks, 2014.
*
“Optimizing Green Clouds through Legacy Network Infrastructure Management,” In proceeding of:
Thirteenth International Conference on Networks - ICN 2014.
*
“Decision-Theoretic Planning for Cloud Computing”, In proceeding of:
Thirteenth International Conference on Networks - ICN 2014.
https://www.researchgate.net/publication/259399614_Decision-Theoretic_Planning_for_Cloud_Computing
*
“An Architecture for Risk Analysis in Cloud”, In proceeding of: Tenth
International Conference on Networking and Services - ICNS 2014.
http://www.researchgate.net/publication/260145977_An_Architecture_for_Risk_Analysis_in_Cloud
*
“Autonomic Intrusion Detection System in Cloud Computing with Big Data”, International Conference
on Security and Management - SAM 2014.
*
“Risk-based Dynamic Access Control for a Highly Scalable Cloud
Federation,” SECURWARE, 2013.
*
“Provisioning and Resource Allocation for Green Clouds,” in International
Conference on Networks, 2013.
*
“A Validation Model of Data Input for Web Services,” in International
Conference on Networks, 2013.
*
“Environment, Services and Network Management for Green Clouds,” in CLEI Electronic
Journal, 2012.
http://www.researchgate.net/publication/254263747_Environment_Services_and_Network_Management_for_Green_Clouds?ev=prf_pub (A best paper of CLEI
2011).
*
“Comparison of a Multi output Adaptative Neuro-Fuzzy Inference System (MANFIS) and Multi Layer Perceptron (MLP) in Cloud Computing
Provisioning,” in WCGA, 2012.
*
“Multi-Tenancy Authorization System with Federated Identity to Cloud
Environment Using Shibboleth,” in International Conference on Networks, 2012.
“Hybrid protocol for group key management and
transparent cluster interconnection in a secure wireless sensor network,” in
IEEE/IFIP NOMS, 2012.
“Proposal and development of the Web services
input validation model,” in IEEE/IFIP NOMS, 2012.
"Toward
an Architecture for Monitoring Private Clouds," in IEEE Communications
Magazine, 2011.
http://www.researchgate.net/publication/220144318_Toward_an_architecture_for_monitoring_private_clouds?ev=prf_pub
(First paper in
the December 2011 list of the ten most popular articles published in IEEE ComSoc periodicals viewed
online).
*
"Management and Security for Grid, Cloud and Cognitive
Networks," in Journal of Information Systems of the FSMA, 2011.
http://www.researchgate.net/publication/254200783_Management_and_Security_for_Grid_Cloud_and_Cognitive_Networks?ev=prf_pub (Paper with more than 12000 downloads).
"Simulator
Improvements to Validate the Green Cloud Computing Approach," in
IEEE/IFIP Latin American Network Operations and Management Symposium, 2011.
http://www.researchgate.net/publication/221430419_Simulator_improvements_to_validate_the_Green_Cloud_Computing_approach?ev=prf_pub
* "Customer Security Concerns in Cloud
Computing," in International
Conference on Networks. 2011.
http://www.researchgate.net/publication/228451862_Customer_Security_Concerns_in_Cloud_Computing
* "Experimental Assessment of Routing for Grid and
Cloud," in International Conference on Networks. 2011.
http://www.researchgate.net/publication/254347753_Experimental_Assessment_of_Routing_for_Grid_and_Cloud?ev=prf_pub
"Intrusion Detection for Grid and Cloud
Computing," in IEEE IT Professional
Magazine. 2010.
http://www.researchgate.net/publication/224587188_Intrusion_Detection_for_Grid_and_Cloud_Computing?ev=prf_pub
"A
Cloud Computing Solution for Patient's Data Collection in Health Care
Institutions," in Second International Conference on eHealth, Telemedicine, and Social Medicine. 2010.
http://www.researchgate.net/publication/221222788_A_Cloud_Computing_Solution_for_Patient%27s_Data_Collection_in_Health_Care_Institutions?ev=prf_pub
"SLA Perspective in Security Management for
Cloud Computing," in Sixth International
Conference on Networking and Services. 2010.
http://www.researchgate.net/publication/232631054_SLA_Perspective_in_Security_Management_for_Cloud_Computing?ev=prf_pub