Journal Articles 2020(5 publications) [publication]Casaleiro, R. and Paulo Silva and Simões, P. and Boavida, F. and Edmundo Monteiro and Marilia Curado and Tiago Cruz and Nuno Antunes and Marco Vieira and Riccio, G.M. and Verzillo, M.P. and Marek, P. and Goncalves, L. and Bagnato, A. and Valentini, A. and Intonti, B. and Manzo, R. and Posta, V.D. and Zampolini, L. and Rooij, J.v. and Houf, R. and Rios, E. and Iturbe, E. and Gutierrez, I. and Anguita, S. and Gomez, C. and Echevarria, J. and Houf, H. and Nicoletti, L. and Lotti, R. and Natale, D. and Pizzo, L.d. and Pane, F. and Schiavo, F. , "Protection and control of personal identifiable information: The PoSeID-on approach", Journal of Data Protection & Privacy, vol. 3, 2020 [publication]Sousa, B. and Fonseca, V. and Cordeiro, L. and Flamigni, B. and Luca Foschini, . and Simões, P. and Uthayasankar Sivarajah, . and Vishanth Weerakkody, . , "EMPATIA a Multichannel Platform for Participatory Budgeting", International Journal of Electronic Government Research (IJEGR), vol. 15, 2020 [publication]João Henriques and Caldeira, F. and Tiago Cruz and Simões, P. , "Combining K-Means and XGBoost Models for Anomaly Detection Using Log Datasets", Electronics (ISSN 2079-9292). Special Issue "Advanced Cybersecurity Services Design", vol. 9, 2020 [publication]Lima, A. and Rosa, L. and Tiago Cruz and Simões, P. , "A Security Monitoring Framework for Mobile Devices", Electronics (ISSN 2079-9292), 2020 [publication]Paulo Silva and Casaleiro, R. and Simões, P. and Nuno Antunes and Marilia Curado and Edmundo Monteiro , "Risk Management and Privacy Violation Detection in the PoSeID-on Data Privacy Platform", SN Computer Science, vol. 1, 2020 2019(2 publications) [publication]João Henriques and Caldeira, F. and Tiago Cruz and Simões, P. , "On the Use of Ontology Data for Protecting Critical Infrastructures", Journal of Information Warfare - ISSN 1445-3312 (print) / ISSN 1445-3347 (online), vol. 17, pp. 38-55, 2019 [publication]Rosa, L. and Freitas, M.B.d. and Mazo, S. and Edmundo Monteiro and Tiago Cruz and Simões, P. , "A Comprehensive Security Analysis of a SCADA Protocol: from OSINT to Mitigation", IEEE Access (Open Access), 2019 [citation][year=2020]D. Pliatsios, P. Sarigiannidis, T. Lagkas and A. G. Sarigiannidis, "A Survey on SCADA Systems: Secure Protocols, Incidents, Threats and Tactics," in IEEE Communications Surveys & Tutorials. April 2020. DOI: 10.1109/COMST.2020.2987688 [citation][year=2019]Aghenta, L.O.; Iqbal, M.T. "Low-Cost, Open Source IoT-Based SCADA System Design Using Thinger.IO and ESP32 Thing" Electronics 2019, 8, 822. DOI: 10.3390/electronics8080822 [citation][year=2019]Tidrea, A.; Korodi, A.; Silea, I. Cryptographic Considerations for Automation and SCADA Systems Using Trusted Platform Modules. MDPI Sensors 2019, 19, 4191. DOI: 10.3390/s19194191 [citation][year=2019]Anass Sebbar, Karim Zkik, Mohammed Boulmalf, Mohamed Dafir Ech-Cherif El Kettani, New context-based node acceptance CBNA framework for MitM detection in SDN Architecture, Procedia Computer Science, Volume 160, 2019, Pages 825-830, ISSN 1877-0509, DOI: 10.1016/j.procs.2019.11.004 2018(5 publications) [publication]Barbatsalou, K. and Tiago Cruz and Simões, P. and Edmundo Monteiro , "Current and Future Trends in Mobile Device Forensics: A Survey", ACM Computing Surveys, vol. 51, pp. 46, 2018 [citation][year=2020]Dohyun Kim, Sangjin Lee, Study of identifying and managing the potential evidence for effective Android forensics, Forensic Science International: Digital Investigation, 2020, 200897, ISSN 2666-2817, https://doi.org/10.1016/j.fsidi.2019.200897. [citation][year=2019]Kruger, Jaco-Louis, and Hein Venter. "State of the art in Digital Forensics for the Internet of Things." International Conference on Cyber Warfare and Security. Academic Conferences International Limited, 2019. [citation][year=2019]S. Duarte, C. Paisner, A. Tian, J. Yuen, "Development of STC Corporate Mobile Application", Worcester Polytechnic Institute Digital WPI, BSc project. Available at: https://web.wpi.edu/Pubs/E-project/Available/E-project-022719-022919/ [citation][year=2019]Xiaolu Zhang, Kim-Kwang Raymond Choo, Nicole Lang Beebe, "How do I share my IoT forensic experience with the broader community? An automated knowledge sharing IoT forensic platform", IEEE Internet of Things Journal, 2019. DOI: 10.1109/JIOT.2019.2912118. [citation][year=2019]Zhang X., Yuen T.T., Choo KK.R. (2020) Experiential Learning in Digital Forensics. In: Zhang X., Choo KK. (eds) Digital Forensic Education. Studies in Big Data, vol 61. Springer, Cham, 25 july 2019. [citation][year=2019]Abdullahi Aminu Kazaure, Aman Jantan, Mohd Najwadi Yusoff, Aminu Maigari, Mohamad Khairi Ishak, Nor Rizuan Mar Noor, "Evidence Collection and Forensic Challenges in Cloud Environment", MACE Technical Journal, Vol.1(01), pp. 19-24, eISSN: 2710-6632, December 2019. [citation][year=2019]Yan Jiang, Youwen Zhu, Jian Wang, Yong Xiang, Efficient authentication protocol with anonymity and key protection for mobile Internet users, Journal of Parallel and Distributed Computing, Volume 137, 2020, Pages 179-191, ISSN 0743-7315, DOI: 10.1016/j.jpdc.2019.11.010. [citation][year=2018]Ibrar Yaqoob, Ibrahim Abaker Targio Hashem, Arif Ahmed, S.M. Ahsan Kazmi, Choong Seon Hong, Internet of things forensics: Recent advances, taxonomy, requirements, and open challenges, Future Generation Computer Systems, 2018, ISSN 0167-739X, https://doi.org/10.1016/j.future.2018.09.058. [citation][year=2018]Li, C.-Y., Huang, C.-C., Lai, F., Lee, S.-L., Wu, J., "A Comprehensive Overview of Government Hacking Worldwide", (2018) IEEE Access, 6, art. no. 8470931, pp. 55053-55073. DOI: 10.1109/ACCESS.2018.2871762 [citation][year=2018]Umair A., Nanda P., He X., Choo KK.R. (2018) User Relationship Classification of Facebook Messenger Mobile Data using WEKA. In: Au M. et al. (eds) Network and System Security. NSS 2018. Lecture Notes in Computer Science, vol 11058. Springer, Cham. DOI: 10.1007/978-3-030-02744-5_25 [citation][year=2018]Atkinson, Jamiella. "Mobile Device Forensics: Overview, Challenges, and Guideline Developmental Opportunities." MsC thesis, Utica College, ProQuest Dissertations Publishing, 2018. 13422253. Available at: https://search.proquest.com/openview/a88b32750ae71056cbd608202fa18f12 [publication]Barbatsalou, K. and Tiago Cruz and Simões, P. and Edmundo Monteiro , "Mobile Forensic Data Analysis: Suspicious Pattern Detection in Mobile Evidence", IEEE Access (Open Access), vol. 6, pp. 59705-59727, 2018 [publication]Graveto, V. and Rosa, L. and Tiago Cruz and Simões, P. , "A Stealth Monitoring Mechanism for Cyber-Physical Systems", International Journal of Critical Infrastructure Protection, 2018 [citation][year=2019]Abdul Wahid Mir, Ramkumar Ketti Ramachandran, (2019) "Security gaps assessment of smart grid based SCADA systems", Information & Computer Security, Vol. 27 Issue: 3, pp.434-452, DOI: 10.1108/ICS-12-2018-0146 [citation][year=2019]A. Giuseppi, A. Tortorelli, R. Germanà, F. Liberati and A. Fiaschetti, "Securing Cyber-Physical Systems: An Optimization Framework based on OSSTMM and Genetic Algorithms," 2019 27th Mediterranean Conference on Control and Automation (MED), Akko, Israel, 2019, pp. 50-56. DOI: 10.1109/MED.2019.8798506 [citation][year=2019]Natarajan, Jayapandian. "Cyber Secure Man-in-the-Middle Attack Intrusion Detection Using Machine Learning Algorithms." AI and Big Data’s Potential for Disruptive Innovation. IGI Global, 2020. 291-316. Web. 9 Sep. 2019. doi:10.4018/978-1-5225-9687-5.ch011 [citation][year=2019]Raposo, Duarte & Rodrigues, André & Sinche, Soraya & Sá Silva, Jorge & Boavida, Fernando. (2019). Security and Fault Detection in In-node components of IIoT Constrained Devices, in Proc of Local Computer Networks Conference (LCN), October 2019 [publication]Paulo Silva and Basso, T. and Nuno Antunes and Moraes, R. and Marco Vieira and Simões, P. and Edmundo Monteiro , "A Europe-Brazil Context for Secure Data Analytics in the Cloud", IEEE Security & Privacy, vol. 16, pp. 52-60, 2018 [publication]J. Proenca and Simões, P. and Tiago Cruz and Edmundo Monteiro , "Virtualization of Residential Gateways: A Comprehensive Survey", IEEE Communications Surveys Tutorials, vol. 21, pp. 1462-1482, 2018 [citation][year=2019]Daniel Temp and Rodrigo Mansilha and Deivid Rodrigues and Diego Kreutz, Rumo á Delegação Escalável e Segura de Gerenciamento de LANs para ISPs, 17ª Escola Regional de Redes de Computadores, 16-19 setembro, 2019. Alegrete-RS, Brasil. Available at: http://errc.sbc.org.br/2019/papers/temp2019rumo.pdf [citation][year=2019]Ben Azzouz, Lamia, and Intissar Jamai. "SDN, slicing, and NFV paradigms for a smart home: A comprehensive survey." Transactions on Emerging Telecommunications Technologies, 2019. DOI: 10.1002/ett.3744 2017(1 publication) [publication]Stewart, B. and Rosa, L. and Maglaras, L. and Tiago Cruz and Ferrag, M.A. and Simões, P. and Janicke, H. , "A Novel Intrusion Detection Mechanism for SCADA systems that Automatically Adapts to Changes in Network Topology", EAI Transactions in Industrial Networks and Intelligent Systems (INISCOM 2016 Special Edition with extended papers), 2017 [citation][year=2019]Mohiuddin, Ghulam. (2019). Modeling Network Intrusion Detection System Using Feed-Forward Neural Network using UNSW-NB15 Dataset, in Proc of Smart Energy Grid Engineering, Canada, [citation][year=2019]L. Zhiqiang, G. Mohi-Ud-Din, L. Bing, L. Jianchao, Z. Ye and L. Zhijun, "Modeling Network Intrusion Detection System Using Feed-Forward Neural Network Using UNSW-NB15 Dataset," 2019 IEEE 7th International Conference on Smart Energy Grid Engineering (SEGE), Oshawa, ON, Canada, 2019, pp. 299-303. DOI: 10.1109/SEGE.2019.8859773 [citation][year=2019]Yin, Xiaochun & Liu, Zeng & Nkenyereye, Lewis & Ndibanje, Bruce. (2019). Toward an Applied Cyber Security Solution in IoT-Based Smart Grids: An Intrusion Detection System Approach. Sensors. 19. 4952. 10.3390/s19224952. [citation][year=2019]Muna Al-Hawawreh, Elena Sitnikova, and Frank den Hartog. 2019. An Efficient Intrusion Detection Model for Edge System in Brownfield Industrial Internet of Things. In Proceedings of the 3rd International Conference on Big Data and Internet of Things (BDIOT 2019). ACM, New York, NY, USA, 83-87. DOI: https://doi.org/10.1145/3361758.3361762 [citation][year=2018]Ibrar Yaqoob, Ibrahim Abaker Targio Hashem, Arif Ahmed, S.M. Ahsan Kazmi, Choong Seon Hong, Internet of things forensics: Recent advances, taxonomy, requirements, and open challenges, Future Generation Computer Systems, 2018, ISSN 0167-739X, https://doi.org/10.1016/j.future.2018.09.058. [citation][year=2018]Al-Hawawreh, Muna & Moustafa, Nour & Sitnikova, Elena. (2018). Identification of malicious activities in industrial internet of things based on deep learning models. Journal of Information Security and Applications. 41. 10.1016/j.jisa.2018.05.002. [citation][year=2017]M. Al-Zewairi, S. Almajali and A. Awajan, "Experimental Evaluation of a Multi-layer Feed-Forward Artificial Neural Network Classifier for Network Intrusion Detection System," 2017 International Conference on New Trends in Computing Sciences (ICTCS), Amman, 2017, pp. 167-172. 2016(5 publications) [publication]A. S. Gomes and Sousa, B. and D. Palma and Fonseca, V. and Zhao, Z. and Edmundo Monteiro and Braun, T. and Simões, P. and Cordeiro, L. , "Edge Caching with Mobility Prediction in Virtualized LTE Mobile Networks", Future Generation Computer Systems, 2016 [citation][year=2019]Yan, M., Chan, C., Gygax, A., Yan, J., Campbell, L., Nirmalathas, A. and Leckie, C., 2019. Modeling the Total Energy Consumption of Mobile Network Services and Applications. Energies, 12(1), p.184. [citation][year=2018]X. Zhao, P. Yuan, H. Li and S. Tang, "Collaborative edge caching in context-aware D2D networks," in IEEE Transactions on Vehicular Technology. doi: 10.1109/TVT.2018.2858254 [citation][year=2018]Tang, Yayuan, Kehua Guo, Jianhua Ma, Yutong Shen, and Tao Chi. "A smart caching mechanism for mobile multimedia in information centric networking with edge computing." Future Generation Computer Systems (2018). [citation][year=2018]Toczé, K. and Nadjm-Tehrani, S., 2018. A Taxonomy for Management and Optimization of Multiple Resources in Edge Computing. arXiv preprint arXiv:1801.05610. [citation][year=2018]C. Wang, Y. He, F. R. Yu, Q. Chen and L. Tang, "Integration of Networking, Caching, and Computing in Wireless Systems: A Survey, Some Research Issues, and Challenges," in IEEE Communications Surveys & Tutorials, vol. 20, no. 1, pp. 7-38, Firstquarter 2018. doi: 10.1109/COMST.2017.2758763 [citation][year=2018]Chang, C., Srirama, S. N., & Buyya, R. Internet of Things (IoT) and New Computing Paradigms. Wiley STM / Editor Buyya, Srirama: Fog and Edge Computing: Principles and Paradigms, Chapter 1, 2018. [citation][year=2018]D. Ren, X. Gui, W. Lu, J. An, H. Dai and X. Liang, "GHCC: Grouping-based and hierarchical collaborative caching for mobile edge computing," 2018 16th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt), Shanghai, China, 2018, pp. 1-6. doi: 10.23919/WIOPT.2018.8362881 [citation][year=2018]Qian, Peng. "Accelerating mobile web downloading through context-aware and cross-layer intelligence." PhD diss., University of Surrey, 2018. http://doi.org/10.15126/thesis.00849895 [citation][year=2018]Pedro Batista, Ivanes Araújo, Neiva Linder, Kim Laraqui, Aldebaro Klautau, Testbed for ICN Media Distribution over LTE Radio Access Networks, Computer Networks, 2018, ISSN 1389-1286, https://doi.org/10.1016/j.comnet.2018.12.013. [citation][year=2017]Alireza Farshin , Saeed Sharifian , A Chaotic Grey Wolf Controller Allocator for Software Defined Mobile Network (SDMN) for 5th Generation of Cloud-based Cellular Systems (5G), Computer Communications (2017), doi: 10.1016/j.comcom.2017.05.003 [citation][year=2017]S. Wang, X. Zhang, Y. Zhang, L. Wang, J. Yang and W. Wang, "A Survey on Mobile Edge Networks: Convergence of Computing, Caching and Communications," in IEEE Access, vol. 5, pp. 6757-6779, 2017. doi: 10.1109/ACCESS.2017.2685434 [citation][year=2017]Y. Mao, C. You, J. Zhang, K. Huang and K. B. Letaief, "A Survey on Mobile Edge Computing: The Communication Perspective," in IEEE Communications Surveys & Tutorials, vol. 19, no. 4, pp. 2322-2358, Fourthquarter 2017. doi: 10.1109/COMST.2017.2745201 [citation][year=2017]Vasilakos, Xenofon. "Mobility-based Proactive Caching Models for Addressing Niche Mobile Demand and Scalable ICN Name Resolution Designs." PhD dissertation, Athens University of Economics and Business, March 2017 [citation][year=2017]O. Semiari, W. Saad, and M. Bennis, “Caching Meets Millimeter Wave Communications for Enhanced Mobility Management in 5G Networks“, arXiv preprint arXiv:1701.05125, 2017, Available at https://arxiv.org/pdf/1701.05125.pdf [citation][year=2016]Ejaz Ahmed, Mubashir Husain Rehmani, Mobile Edge Computing: Opportunities, solutions, and challenges, Future Generation Computer Systems, Available online 30 September 2016, ISSN 0167-739X, http://dx.doi.org/10.1016/j.future.2016.09.015. [publication]Sousa, B. and Cordeiro, L. and Simões, P. and Edmonds, A. and Ruiz, S. and Corici, M. and Nikaein, N. and A. S. Gomes and Schiller, E. and Braun, T. and Thomas Michael Bohnert , "Towards a Fully Cloudified Mobile Network Infrastructure", Transactions on Network and Service Management, 2016 [citation][year=2018]M. Jin, H. Luo, S. Gao, J. Li, Y. Zhang and S. K. Das, "An Approach to Pre-schedule Traffic in Time-Dependent Pricing Systems," in IEEE Transactions on Network and Service Management. doi: 10.1109/TNSM.2018.2875549 [publication]Tiago Cruz and Rosa, L. and J. Proenca and Maglaras, L. and Aubigny, M. and Lev, L. and Jiang, J. and Simões, P. , "A Cyber Security Detection Framework for Supervisory Control and Data Acquisition Systems", IEEE Transactions on Industrial Informatics, ISSN (print): 1551-3203, ISSN (electronic): 1941-0050, vol. 12, pp. 1-11, 2016 [citation][year=2020]M. Bahrami, M. Fotuhi-Firuzabad and H. Farzin, "Reliability Evaluation of Power Grids Considering Integrity Attacks Against Substation Protective IEDs," in IEEE Transactions on Industrial Informatics, vol. 16, no. 2, pp. 1035-1044, Feb. 2020. DOI: 10.1109/TII.2019.2926557 [citation][year=2020]Z. Han, X. Li, G. Xu, N. Xiong, E. Merlo and E. Stroulia, "An Effective Evolutionary Analysis Scheme for Industrial Software Access Control Models," in IEEE Transactions on Industrial Informatics, vol. 16, no. 2, pp. 1024-1034, Feb. 2020. doi: 10.1109/TII.2019.2925422 [citation][year=2020]LUO, Junzhou & HE, Yuan & ZHANG, Lan & LIU, Liang & SUN, Maojie & XIONG, Runqun & DONG, Fang. (2020). The architecture and key technologies for an industrial Internet with synergy between the cloud and clients. SCIENTIA SINICA Informationis. 50. 195-220. DOI: 10.1360/N112019-00005. [citation][year=2020]Soumya Ray*, Kamta Nath Mishra and Sandip Dutta, “Big Data Security Issues from the Perspective of IoT and Cloud Computing: A Review”, Recent Advances in Computer Science and Communications (2020) 13: 1. https://doi.org/10.2174/2666255813666200224092717 [citation][year=2020]Abdullah Al-Noman Patwary, Anmin Fu, Ranesh Kumar Naha, Sudheer Kumar Battula, Saurabh Garg, Md Anwarul Kaium Patwary, Erfan Aghasian, "Authentication, Access Control, Privacy, Threats and Trust Management Towards Securing Fog Computing Environments: A Review", arXiv:2003.00395v1, March 2020 [citation][year=2020]Claudio Zunino, Adriano Valenzano, Roman Obermaisser, Stig Petersen, Factory Communications at the Dawn of the Fourth Industrial Revolution, Computer Standards & Interfaces, Volume 71, 2020, ISSN 0920-5489, DOI: 10.1016/j.csi.2020.103433. [citation][year=2020]L. Ding, Q. Han, B. Ning and D. Yue, "Distributed Resilient Finite-Time Secondary Control for Heterogeneous Battery Energy Storage Systems Under Denial-of-Service Attacks," in IEEE Transactions on Industrial Informatics, vol. 16, no. 7, pp. 4909-4919, July 2020. [citation][year=2020]Jakapan Suaboot, Adil Fahad, Zahir Tari, John Grundy, Abdun Naser Mahmood, Abdulmohsen Almalawi, Albert Y. Zomaya, and Khalil Drira. 2020. A Taxonomy of Supervised Learning for IDSs in SCADA Environments. ACM Comput. Surv. 53, 2, Article 40 (April 2020), 37 pages. https://doi.org/10.1145/3379499 [citation][year=2019]Lin, L.; Wang, B.; Qi, J.; Wang, D.; Huang, N. Bearing Fault Diagnosis Considering the Effect of Imbalance Training Sample. Entropy 2019, 21, 386. DOI: 10.3390/e21040386 [citation][year=2019]Will Serrano, Erol Gelenbe, "Deep Learning Clusters in the Cognitive Packet Network", Neurocomputing, 2019, ISSN 0925-2312. DOI: 10.1016/j.neucom.2018.07.101. [citation][year=2019]Jiwoong Kang, Taein Kim, Jaehyun Park, "FPGA-based Real-time Abnormal Packet Detector for Critical Industrial Network", in Proc. of 2019 Workshop on Communications in Critical Embedded Systems (as part of IEEE ISCC 2019), june 30, 2019, Barcelona, Spain. DOI: 10.1109/ISCC47284.2019.8969630 [citation][year=2019]Venkataramanan, Venkatesh & Srivastava, Anurag & Hahn, Adam. (2019). CyPhyR: A Cyber-Physical Analysis Tool for Measuring and Enabling Resiliency in Microgrids. IET Cyber-Physical Systems: Theory & Applications. DOI: 10.1049/iet-cps.2018.5069. [citation][year=2019]Z. Han, X. Li, G. Xu, N. Xiong, E. Merlo and E. Stroulia, "An Effective Evolutionary Analysis Scheme for Industrial Software Access Control Models," in IEEE Transactions on Industrial Informatics, 2019. doi: 10.1109/TII.2019.2925422 [citation][year=2019]J. Yang, C. Zhou, Y. Tian and S. Yang, "A Software-defined Security Approach for Securing Field Zones in Industrial Control Systems," in IEEE Access, 2019. doi: 10.1109/ACCESS.2019.2924800 [citation][year=2019]Qi Min, "Research on the Importance of Maintaining Network Ideology Security in the Context of Globalization", in Proc. of 2019 4th International Social Sciences and Education Conference (ISSEC 2019) , Xiamen, China, 27-28 june 2019. Available at: https://www.webofproceedings.org/proceedings_series/ESSP/ISSEC 2019/ISSEC19040.pdf [citation][year=2019]M. Bahrami, M. Fotuhi-Firuzabad and H. Farzin, "Reliability Evaluation of Power Grids Considering Integrity Attacks against Substation Protective IEDs," in IEEE Transactions on Industrial Informatics. doi: 10.1109/TII.2019.2926557 [citation][year=2019]D. Sun, G. Zhang and S. Gao, "Data Management across Geographically-Distributed Autonomous Systems: Architecture, Implementation, and Performance Evaluation," in IEEE Transactions on Industrial Informatics ,2019. DOI: 10.1109/TII.2019.2936298 [citation][year=2019]Y. Liu, A. Liu, X. Liu and M. Ma, "A Trust-based Active Detection for Cyber-physical Security in Industrial Environments," in IEEE Transactions on Industrial Informatics, 2019. doi: 10.1109/TII.2019.2931394 [citation][year=2019]D. A. Noby and A. Khattab, "A Survey of Blockchain Applications in IoT Systems," 2019 14th International Conference on Computer Engineering and Systems (ICCES), Cairo, Egypt, 2019, pp. 83-87. DOI: 10.1109/ICCES48960.2019.9068170 [citation][year=2019]H. F. M. de Figueiredo, M. K. Ferst and G. W. Denardin, "An Overview About Detection of Cyber-Attacks on Power SCADA Systems," 2019 IEEE 15th Brazilian Power Electronics Conference and 5th IEEE Southern Power Electronics Conference (COBEP/SPEC), Santos, Brazil, 2019, pp. 1-6. DOI: 10.1109/COBEP/SPEC44138.2019.9065353 [citation][year=2019]D. Sun, G. Zhang and S. Gao, "Data Management across Geographically Distributed Autonomous Systems: Architecture, Implementation, and Performance Evaluation," 2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS), Zhangjiajie, China, 2019, pp. 2284-2292. DOI: 10.1109/HPCC/SmartCity/DSS.2019.00317 [citation][year=2019]Henry Hui , Peter Maynard , Kieran McLaughlin, "ICS Interaction Testbed: A Platform for Cyber-Physical Security Research", in proc of 6th International Symposium for ICS & SCADA Cyber Security Research 2019 (ICS-CSR), September 2019. DOI: 10.14236/ewic/icscsr19.12 [citation][year=2019]A. Li et al., "BCRAM: A Social-Network-Inspired Breast Cancer Risk Assessment Model," in IEEE Transactions on Industrial Informatics, vol. 15, no. 1, pp. 366-376, Jan. 2019. doi: 10.1109/TII.2018.2825345 [citation][year=2019]L. Lu, H. J. Liu, H. Zhu and C. Chu, "Intrusion Detection in Distributed Frequency Control of Isolated Microgrids," in IEEE Transactions on Smart Grid, vol. 10, no. 6, pp. 6502-6515, Nov. 2019. doi: 10.1109/TSG.2019.2906573 [citation][year=2019]Yin, Xiaochun & Liu, Zeng & Nkenyereye, Lewis & Ndibanje, Bruce. (2019). Toward an Applied Cyber Security Solution in IoT-Based Smart Grids: An Intrusion Detection System Approach. Sensors. 19. 4952. 10.3390/s19224952. [citation][year=2019]Hongwen Hui, Xingshuo An, Haoyu Wang, Weijia Ju, Huixuan Yang, Hongjie Gao, and Fuhong Lin, “Survey on Blockchain for Internet of Things”, Journal of Internet Services and Information Security (JISIS), 9(2): 1-30, May 2019, DOI: 10.22667/JISIS.2019.05.31.001 [citation][year=2019]Yong Chen, A Survey on Industrial Information Integration 2016-2019, in Journal of Industrial Integration and Management, DOI: 10.1142/S2424862219500167 [citation][year=2018]P. M. Nasr and A. Yazdian-Varjani, "Toward Operator Access Management in SCADA System: Deontological Threat Mitigation," in IEEE Transactions on Industrial Informatics, vol. 14, no. 8, pp. 3314-3324, Aug. 2018. doi: 10.1109/TII.2017.2781285 [citation][year=2018]X. Li, C. Zhou, Y. Tian and Y. Qin, "A Dynamic Decision-Making Approach for Intrusion Response in Industrial Control Systems," in IEEE Transactions on Industrial Informatics, August 2018. doi: 10.1109/TII.2018.2866445 [citation][year=2018]Zeng P., Zhou P. (2018) Intrusion Detection in SCADA System: A Survey. In: Li K., Fei M., Du D., Yang Z., Yang D. (eds) Intelligent Computing and Internet of Things. ICSEE 2018, IMIOT 2018. Communications in Computer and Information Science, vol 924. Springer, Singapore. DOI: 10.1007/978-981-13-2384-3_32 [citation][year=2018]Ming Wan, Yan Song, Yuan Jing, and Junlu Wang, “Function-Aware Anomaly Detection Based on Wavelet Neural Network for Industrial Control Communication,” Security and Communication Networks, vol. 2018, Article ID 5103270, 11 pages, 2018. https://doi.org/10.1155/2018/5103270. [citation][year=2018]Will Serrano."Deep Learning Cluster Structures for Management Decisions: The Digital CEO". Sensors. 18. 3327. DOI: 10.3390/s18103327. 2018. [citation][year=2018]Amin Mansouri, Babak Majidi & Abdolah Shamisa (2018) Metaheuristic neural networks for anomaly recognition in industrial sensor networks with packet latency and jitter for smart infrastructures, International Journal of Computers and Applications, DOI: 10.1080/1206212X.2018.1533613 [citation][year=2018]Serrano W. (2019) The Cognitive Packet Network with QoS and Cybersecurity Deep Learning Clusters. In: Arai K., Kapoor S., Bhatia R. (eds) Intelligent Systems and Applications. IntelliSys 2018. Advances in Intelligent Systems and Computing, vol 868. Springer, Cham. Volume 1. 62-85. DOI: 10.1007/978-3-030-01054-6_5. [citation][year=2018]Mohamed Najeh Lakhoua, "Cyber Security of SCADA Network in Thermal Power Plants", in Proc of Conference: 2018 International Conference on Smart Communications and Networking (SmartNets), November 2018. DOI: 10.1109/SMARTNETS.2018.8707398 [citation][year=2018]Weize Li, Lun Xie, and Zhiliang Wang, “A Novel Covert Agent for Stealthy Attacks on Industrial Control Systems Using Least Squares Support Vector Regression,” Journal of Electrical and Computer Engineering, vol. 2018, Article ID 7204939, 14 pages, 2018. doi:10.1155/2018/7204939 [citation][year=2018]Kim, Junsik, and Jaehyun Park. "FPGA-based network intrusion detection for IEC 61850-based industrial network." ICT Express (2018). DOI: 10.1016/j.icte.2018.01.002 [citation][year=2018]Shama N. Islam, M.A. Mahmud, A.M.T. Oo, Impact of optimal false data injection attacks on local energy trading in a residential microgrid, ICT Express, Available online 21 February 2018, ISSN 2405-9595, https://doi.org/10.1016/j.icte.2018.01.015. [citation][year=2018]Li X., Wang G., Ali S., He Q. (2018) Android Malware Detection Using Category-Based Permission Vectors. In: Vaidya J., Li J. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2018. Lecture Notes in Computer Science, vol 11337. Springer, Cham. DOI: 10.1007/978-3-030-05063-4_31 [citation][year=2018]J. Li, L. Sun, Q. Yan, Z. Li, W. Srisa-an and H. Ye, "Significant Permission Identification for Machine-Learning-Based Android Malware Detection," in IEEE Transactions on Industrial Informatics, vol. 14, no. 7, pp. 3216-3225, July 2018. doi: 10.1109/TII.2017.2789219 [citation][year=2018]Varun Mohta, Zhipeng Zhao, Michael Sylvester Pukish, "Real-time anomaly detection in a network using state transitions", Patent Grant US-10050987-B1. Publication date: 2018/08/14. Available at: https://patents.google.com/patent/US10050987B1/en [citation][year=2017]Yufei Liu, De-Chang Pi, and Cui Lin, Mining Community-level Influence in Microblogging Network: A Case Study on Sina Weibo, Hindawi/Wiley Complexity, Received 7 June 2017; Accepted 12 November 2017. Availablle at: https://www.hindawi.com/journals/complexity/aip/4783159/ [citation][year=2017]Q. Niyaz, W. Sun, A. Javaid, "A Deep Learning Based DDoS Detection System in Software-Defined Networking (SDN)", EAI Endorsed Transactions on Security and Safety 17(12): e2, published on the 28 dez 2017. DOI: 10.4108/eai.28-12-2017.153515 [citation][year=2017]Mohamed Najeh, Lakhoua, "Review on SCADA Cybersecurity for Critical Infrastructures". Journal of Computer Science & Control Systems. May2017, Vol. 10 Issue 1, p15-18. 4p. [citation][year=2017]Lamba, Anil & Singh, Satinderjeet & Singh, Balvinder & Dutta, Natasha & Sai, Sivakumar & Muni, Rela. (2017). MITIGATING CYBER SECURITY THREATS OF INDUSTRIAL CONTROL SYSTEMS (SCADA & DCS), International Journal For Technological Research In Engineering, Proc. of 3rd International Conference on Emerging Technologies in Engineering, Biomedical, Medical and Science(ETEBMS), July 2017. Available at: https://www.ijtre.com/images/scripts/16214.pdf [citation][year=2017]Lei Yang, Fengjun Li, Securing Smart Grid In-Network Aggregation through False Data Detection, EAI Endorsed Transactions on Industrial Networks and Intelligent Systems 17(10): e5, EAI, 2017, DOI: 10.4108/eai.1-2-2017.152156. [publication]Tiago Cruz and Simões, P. and Edmundo Monteiro , "Virtualizing Programmable Logic Controllers: towards a convergent approach", IEEE Embedded Systems Letters, ISSN (print): 1943-0663, ISSN (Electronic): 1943-0671 , 2016 [citation][year=2019]Mohammadreza Barzegaran, Anton Cervin, and Paul Pop. Towards quality-of-control-aware scheduling of industrial applications on fog computing platforms. In Proceedings of the Workshop on Fog Computing and the IoT (IoT-Fog '19). ACM, New York, NY, USA, 1-5. 2019. DOI: https://doi.org/10.1145/3313150.3313217 [citation][year=2019]Lee, Sang-Hun et al. “Virtualization of Industrial Real-Time Networks for Containerized Controllers.” Sensors (Basel, Switzerland) vol. 19,20 4405. 11 Oct. 2019, doi:10.3390/s19204405 [citation][year=2019]T. Taleb, I. Afolabi and M. Bagaa, "Orchestrating 5G Network Slices to Support Industrial Internet and to Shape Next-Generation Smart Factories," in IEEE Network. DOI: 10.1109/MNET.2018.1800129 [citation][year=2017]Wafaa Ait-Cheik-Bihi, Denis Chalon, "Digital Twin based virtualization of Programmable Logic Controllers", November. 2017. available at: https://www.researchgate.net/publication/321134316_Digital_Twin_based_virtualization_of_Programmable_Logic_Controllers [publication]Tiago Cruz and Queiroz, R. and J. Proenca and Simões, P. and Edmundo Monteiro , "Leveraging Virtualization Technologies to Improve SCADA ICS Security", Journal of Information Warfare. Vol. 15, No. 3 (2016), pp. 81-100 - ISSN 1445-3312 (print)/ISSN 1445-334, vol. 15, 2016 [citation][year=2017]Hallman, R., Bryan, J., Palavicini, G., Divita, J. and Romero-Mariona, J., "IoDDoS — The Internet of Distributed Denial of Sevice Attacks - A Case Study of the Mirai Malware and IoT-Based Botnets.", In Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security (IoTBDS 2017), pages 47-58, ISBN: 978-989-758-245-5 2015(3 publications) [publication]Tiago Cruz and J. Proenca and Simões, P. and Aubigny, M. and Ouedrago, M. and Graziano, A. and Yasakhetu, L. , " Improving Cyber-Security Awareness on Industrial Control Systems: The CockpitCI Approach", Journal of Information Warfare, Vol. 13, No. 4 (2014), pp. 27-41 - ISSN 1445 3347 (online) / ISSN 445-3312 (printed), vol. 13, 2015 [citation][year=2020]Sufang, W. An adaptive ensemble classification framework for real-time data streams by distributed control systems. Neural Comput & Applic (2020). https://doi.org/10.1007/s00521-020-04759-0 [citation][year=2019]F. Januário, A. Cardoso and P. Gil, "A Distributed Multi-Agent Framework for Resilience Enhancement in Cyber-Physical Systems," in IEEE Access. March 2019. doi: 10.1109/ACCESS.2019.2903629 [citation][year=2019]Konstantinos Demertzis, Lazaros Iliadis, Panayiotis Kikiras, Nikos Tziritas (2019). Cyber-Typhon: An Online Multi-task Anomaly Detection Framework. in book: Artificial Intelligence Applications and Innovations, 15th IFIP WG 12.5 International Conference, AIAI 2019, Hersonissos, Crete, Greece, May 24–26, 2019, Proceedings. DOI: 10.1007/978-3-030-19823-7_2 [citation][year=2019]F. Januário, A. Cardoso and P. Gil, "A Multi-Agent Middleware for Resilience Enhancement in Heterogeneous Control Systems," 2019 IEEE International Conference on Industrial Technology (ICIT), Melbourne, Australia, 2019, pp. 988-993. DOI: 10.1109/ICIT.2019.8755011 [citation][year=2018]Uchenna D. Ani, Nneka Daniel, Francisca Oladipo & Sunday E. Adewumi (2018) Securing industrial control system environments: the missing piece, Journal of Cyber Security Technology, 2:3-4, 131-163, DOI: 10.1080/23742917.2018.1554985 [citation][year=2018]Uchenna D. Ani, Nneka Daniel, Francisca Oladipo & Sunday E. Adewumi (2018) Securing industrial control system environments: the missing piece, Journal of Cyber Security Technology, 2:3-4, 131-163, DOI: 10.1080/23742917.2018.1554985 [citation][year=2017]Jacek Jarmakiewicz, Krzysztof Parobczak, Krzysztof Ma?lanka, Cybersecurity protection for power grid control infrastructures, International Journal of Critical Infrastructure Protection, Available online 20 July 2017, ISSN 1874-5482, https://doi.org/10.1016/j.ijcip.2017.07.002. (http://www.sciencedirect.com/science/article/pii/S1874548216300324) [citation][year=2016]F. Januário, C. Carvalho, A. Cardoso and P. Gil, "Security challenges in SCADA systems over Wireless Sensor and Actuator Networks," 2016 8th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), Lisbon, Portugal, 2016, pp. 363-368. doi: 10.1109/ICUMT.2016.7765386 [publication]Matos, F. and Matos, A. and Simões, P. and Edmundo Monteiro , "Provisioning of inter-domain QoS-aware services", Journal of Computer Science and Technology, vol. 30, pp. 404-420, 2015 [citation][year=2016]S. V. B. Rakas and M. D. Stojanovi?, "A policy-based approach to E2E service negotiation via third party agent," 2016 24th Telecommunications Forum (TELFOR), Belgrade, Serbia, 2016, pp. 1-4. doi: 10.1109/TELFOR.2016.7818933 [publication]Tiago Cruz and Simões, P. and Edmundo Monteiro and Bastos, F. and Laranjeira, A. , "Cooperative security management for broadband network environments", Wiley Security and Communication Networks (ISSN 1939-0122), 2015 [citation][year=2018]Di Mauro, Mario, and Cesario Di Sarno. "Improving SIEM capabilities through an enhanced probe for encrypted Skype traffic detection." Journal of Information Security and Applications 38 (2018): 85-95. [citation][year=2018]Pecorella, T.; Pierucci, L.; Nizzi, F. “Network Sentiment” Framework to Improve Security and Privacy for Smart Home, Future Internet, Vol 10, Issue 12, pp125, December 2018. DOI: 10.3390/fi10120125 [citation][year=2018]Norbert Nthala, Ivan Flechais, "Rethinking Home Network Security", in Proc. of Conference: European Workshop on Usable Security (EuroUSEC), London, England, April 2018. DOI: 10.14722/eurousec.2018.23011 [citation][year=2016]K. M. Lee, W. G. Teng and T. W. Hou, "DRASE: A Dynamic Rescheduling and Self-Adaptive Estimation Technique to Enhance ACS Throughputs in CWMP," in IEEE Communications Letters, vol. 20, no. 11, pp. 2161-2164, Nov. 2016. doi: 10.1109/LCOMM.2016.2602198 [citation][year=2016]Li Kunmin, Toward Optimizing System Capabilities in a CWMP Network, PhD. Thesis, Cheng Kung University Engineering Science degree thesis, 2016 (http://www.airitilibrary.com/Publication/alDetailedMesh?docid=U0026-2706201617101000) 2014(1 publication) [publication]Tiago Cruz and J. Proenca and Simões, P. and Aubigny, M. and Ouedrago, M. and Graziano, A. and Maglaras, L. , "A Distributed IDS for Industrial Control Systems", International Journal of Cyber Warfare and Terrorism, vol. 4, pp. 1-22, 2014 [citation][year=2017]Jacek Jarmakiewicz, Krzysztof Parobczak, Krzysztof Maslanka, Cyberse- ´ curity protection for power grid control infrastructures, International Journal of Critical Infrastructure Protection (2017), doi: 10.1016/j.ijcip.2017.07.002 [citation][year=2017]Lamba, Anil & Singh, Satinderjeet & Singh, Balvinder & Dutta, Natasha & Sai, Sivakumar & Muni, Rela. (2017). MITIGATING CYBER SECURITY THREATS OF INDUSTRIAL CONTROL SYSTEMS (SCADA & DCS), International Journal For Technological Research In Engineering, Proc. of 3rd International Conference on Emerging Technologies in Engineering, Biomedical, Medical and Science(ETEBMS), July 2017. Available at: https://www.ijtre.com/images/scripts/16214.pdf 2013(2 publications) [publication]Tiago Cruz and Simões, P. and Edmundo Monteiro and Bastos, F. and Laranjeira, A. , "A Framework for Internet Media Services Delivery to the Home Environment", Journal of Network and Systems Management, vol. 21, pp. 99-127, 2013 [citation][year=2019]Maxweel Carmo, Felipe S. Dantas Silva, Augusto Venâncio Neto, Daniel Corujo, and Rui Aguiar, “Network-Cloud Slicing Definitions for Wi-Fi Sharing Systems to Enhance 5G Ultra Dense Network Capabilities,” Wireless Communications and Mobile Computing, vol. 2019, Article ID 8015274, 17 pages, 2019. https://doi.org/10.1155/2019/8015274. [citation][year=2015]Chien-Cheng Lai - ID 665452, "IP multimedia in home networks – DLNA and UPnP", Melbourne School of Engineering The University of Melbourne - Multimedia Content Delivery (ELEN90014) Project. Available at: https://www.slideshare.net/JamesLai10/upnp-and-dlna-in-the-home-network-v2 [citation][year=2014]Abhishek Kasana, Niharika Mittal, Ratika Sharma, Vartika Aggarwal, Analyzing the Best Communication Media for Physical Layer: A Critical Study, International Journal of Scientific Research Engineering & Technology (IJSRET), Vol. 2 Issue 11 pp 798-801 February 2014 www.ijsret.org ISSN 2278 – 0882 [citation][year=2013]Yun Cui, Myoungjin Kim, and Hanku Lee, “Cloud-based Home Media System Model: Providing a Novel Media Streaming Service using UPnP Technology in a Home Environment”, Int. Journal of Software Engineering and Its Applications, Vol. 7, No. 4, pp. 127-136, July, 2013. [citation][year=2012]S Pablo Garcáa Sánchez, Juan Julián Merelo, Pedro Castillo, A. M. Mora, Rubén H. García, Miguel Angel López, María Isabel López, “Servidor de Aplicaciones MHP para TDT”, in Proc. of Jornadas Sarteco, 19-21 Setembro 2012, Elx (http:// http://www.jornadassarteco.org/) [publication]Caldeira, F. and Schaberreiter, T. and Varrete, S. and Edmundo Monteiro and Simões, P. and Bouvry, P. and Khadraoui@tudor.lu, D. , "Trust based interdependency weighting for online risk monitoring in interdependent critical infrastructures", International Journal of Secure Software Engineering (IJSSE), vol. 4, 2013 [citation][year=2019]T. Schaberreiter, V. Kupfersberger, K. Rantos, A. Spyros, A. Papanikolaou, C. Ilioudis, and G. Quirchmayr. 2019. A Quantitative Evaluation of Trust in the Quality of Cyber Threat Intelligence Sources. In Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES '19). ACM, New York, NY, USA, Article 83, 10 pages. DOI: https://doi.org/10.1145/3339252.3342112 2012(1 publication) [publication]Castrucci, M. and Neri, A. and Caldeira, F. and Aubert, J. and Khadraoui@tudor.lu, D. and Aubigny, M. and Harpes, C. and Simões, P. and Suraci, V. and Capodieci, P. , "Design and implementation of a mediation system enabling secure communication among Critical Infrastructures", International Journal of Critical Infrastructure Protection, vol. 5, pp. 86-97, 2012 [citation][year=2018]Talha, M., Malik, M., Hamza, A., Batool, K. and Akram, M., 2018. Hawk eye security-security IOT deveices from cyber attacks. MCS. (BSc Thesis, http://111.68.101.240/xmlui/bitstream/handle/123456789/1153/HAWK EYE SECURITY.pdf?sequence=1) [citation][year=2016]O. A. Alsulami, Strategies and Prospects of Information and Knowledge Security, International Journal of Humanities and Cultural Studies (ISSN 2356-5926), Special Issue August 2016, pp.337-348, 2016. [citation][year=2015]Ercan Nurcan Yilmaz, Halil ?brahim Ulus, Serkan Gonen, Bilgi Toplumuna Geçi? Ve Siber Güvenlik, International Journal of Informatics Technicalogies, V.8, N.3, 2015, http://dx.doi.org/10.17671/btd.87028 [citation][year=2014]M. Leo, F. Battisti, M. Carli, A. Neri, A federated architecture approach for Internet of Things security, Proc. of Euro Med Telco Conference 2014 (EMTC), Naples, Italy, Nov. 2014. [citation][year=2013]Thomas Schaberreiter, A Bayesian Network Based On-line Risk Prediction Framework for Interdependent Critical Infrastructures, PhD Thesis, University of Oulu, Finland, October 2013. 2011(1 publication) [publication]Cardoso, A. and Simões, P. , "Aplicabilidade Da Governança De Ti Ao Paradigma Da Computação Em Nuvem", Revista do Departamento Inovação, Ciência e Tecnologia (DICT) da Universidade Portucalense., pp. 9-16, 2011 2010(1 publication) [publication]Caldeira, F. and Edmundo Monteiro and Simões, P. , "Trust and reputation management for critical infrastructure protection", Int. J. Electronic Security and Digital Forensics, 2010 [citation][year=2014]Sahli Nabil, Benmohammed Mohamed, El–Bay Bourennane, “Ontology and protocol secure for SCADA”, International Journal of Metadata, Semantics and Ontologies, vol. 9(2), pp. 114-127, 2014. 2008(1 publication) [publication]Thomas Michael Bohnert and Castrucci, M. and Ciulli, N. and Landi, G. and Nardini, C. and Sousa, B. and Neves, P. and Simões, P. , "QoS management and control for an all-IP WiMAX network architecture: Design, implementation and evaluation", Journal of Mobile Information Systems (ISSN: 1574-017x), vol. 4, pp. 253-271, 2008 [citation][year=2014]Louta, M., et al. "RLAM: A dynamic and efficient reinforcement learning-based adaptive mapping scheme in mobile WiMAX networks." Mobile Information Systems 10.2 (2014): 173-196. [citation][year=2013]M. Louta, P. Sarigiannidis, S. Misra, P. Nicopolitidis, G. Papadimitriou, RLAM: A dynamic and efficient reinforcement learning-based adaptive mapping scheme in mobile WiMAX networks, Journal of Mobile Information Systems, IOS Press, 2013. DOI: 10.3233/MIS-130177. [citation][year=2012]E Apostol, V Cristea, "Mobility management for multimedia services in heterogeneous environments", International Journal of Web and Grid Services [citation][year=2011]Rafidah Md. Noor and Christopher Edwards, A Comparative Performance Analysis on NEMO-QoS and MIPv6-QoS in Heterogeneous Environments, Journal of Applied Sciences, 2011, Vol. 11, N. 17, pp. 3130-3141, DOI: 10.3923/jas.2011.3130.3141 [citation][year=2011]Ines Houidi, Wajdi Louati, Walid Ben Ameur, Djamal Zeghlache, Virtual network provisioning across multiple substrate networks, Computer Networks, Volume 55, Issue 4, 10 March 2011, Pages 1011-1023, ISSN 1389-1286, 10.1016/j.comnet.2010.12.011. [citation][year=2011]Yi-Fu Ciou, Fang-Yie Leu, Yi-Li Huang, Kangbin Yim, A handover security mechanism employing the Diffie-Hellman key exchange approach for the IEEE802. 16e wireless networks, Mobile Information Systems, Vo.7 N.3 pp. 241-269, IOS Press, September 2011. DOI: 10.3233/MIS-2011-0120. [citation][year=2009]H. Dong, F. K. Hussain, E. Chang, “A QoS-based service retrieval methodology for digital ecosystems”, International Journal of Web and Grid Services, Vol. 5, N. 3 / 2009, pp. 261 – 283, Inderscience. [citation][year=2009]Vilmos Simon, László Bokor, and Sándor Imre. 2009. A hierarchical network design solution for mobile IPv6. J. Mob. Multimed. 5, 4 (December 2009), 317-332. Conference Articles 2020(3 publications) [publication]Casaleiro, R. and Paulo Silva and Simões, P. and Nuno Antunes and Marilia Curado and Edmundo Monteiro and Boavida, F. , "Gestão e Análise de Riscos na Plataforma de Proteção de Dados Pessoais Poseidon", in 9º Congresso Luso-Moçambicano de Engenharia, 2020 [publication]Freitas, M.B.d. and Quitério, P. and Rosa, L. and Tiago Cruz and Simões, P. , "SDN-assisted containerized security and monitoring components", in IEEE/IFIP Network Operations and Management Symposium (NOMS) 2020, 2020 [publication]Tiago Cruz and Simões, P. , "Fostering cybersecurity awareness among computing science undergraduate students: motivating by example", in 19th European Conference on Cyber Warfare and Security (ECCWS 2020), Chester, UK, 2020 2019(1 publication) [publication]Craveiro, A. and Oliveira, A. and Proença, J. and Tiago Cruz and Simões, P. , "A Framework for Improved Home Network Security", in 18th European Conference on Cyber Warfare and Security (ECCWS 2019), Coimbra, Portugal, 4-5 July 2019, 2019 2018(3 publications) [publication]João Henriques and Caldeira, F. and Tiago Cruz and Simões, P. , "On the Use of Ontology Data for Protecting Critical Infrastructures", in in Proc. of ECCWS 2018 - 17th European Conference on Cyber Warfare and Security (Publishers: ACPI, UK). ISBN: 978-1-911218-85-2, 2018 [publication]Frazão, I. and Pedro Henriques Abreu and Tiago Cruz and Araújo, H. and Simões, P. , "Denial of Service Attacks: Detecting the frailties of machine learning algorithms in the Classication Process", in 13th International Conference on Critical Information Infrastructures Security (CRITIS 2018), ed. Springer, Kaunas, Lithuania, September 24-26, 2018, Springer series on Security and Cryptology , 2018 [citation][year=2020]Abiodun Ayodeji, Yong-kuo Liu , "Machine Learning -based process control monitoring and cyber security: Similarities, conflicts and limitations", in Proc. of International Conference on Nuclear Security 2020, Vienna, Austria, February 2020. [citation][year=2020]Anthi, E., Williams, L., Rhode, M., Burnap, P., & Wedgbury, A. (2020). Adversarial Attacks on Machine Learning Cybersecurity Defences in Industrial Control Systems. arXiv preprint arXiv:2004.05005. [citation][year=2019]A. Giuseppi, A. Tortorelli, R. Germanà, F. Liberati and A. Fiaschetti, "Securing Cyber-Physical Systems: An Optimization Framework based on OSSTMM and Genetic Algorithms," 2019 27th Mediterranean Conference on Control and Automation (MED), Akko, Israel, 2019, pp. 50-56. DOI: 10.1109/MED.2019.8798506 [publication]Freitas, M. and Rosa, L. and Tiago Cruz and Simões, P. , "SDN-enabled virtual data diode", in 4th ESORICS Workshop On The Security Of Industrial Control Systems & Of Cyber-Physical Systems (CyberICPS 2018) , 2018 [citation][year=2020]D. Pliatsios, P. Sarigiannidis, T. Lagkas and A. G. Sarigiannidis, "A Survey on SCADA Systems: Secure Protocols, Incidents, Threats and Tactics," in IEEE Communications Surveys & Tutorials. April 2020. DOI: 10.1109/COMST.2020.2987688 [citation][year=2019]Aasen, Øyvind, "Using Bi-directional Data Diodes to Limit Propagation of Network Attacks", MSc Thesis, Norwegian University of Science and Technology, Faculty of Information Technology and Electrical Engineering - Department of Information Security and Communication Technology. July 2019. Available at: http://hdl.handle.net/11250/2617747 2017(8 publications) [publication]J. Proenca and Tiago Cruz and Simões, P. and Gaspar, G. and Parreira, B. and Laranjeira, A. and Bastos, F. , "Building an NFV-Based vRGW: lessons learned", in 14th IEEE Consumer Communications and Networking Conference (CCNC 2017), 2017 [citation][year=2019]Ben Azzouz, Lamia, and Intissar Jamai. "SDN, slicing, and NFV paradigms for a smart home: A comprehensive survey." Transactions on Emerging Telecommunications Technologies, 2019. DOI: 10.1002/ett.3744 [citation][year=2018]P. Wang, F. Ye, X. Chen and Y. Qian, "DataNet: Deep Learning based Encrypted Network Traffic Classification in SDN Home Gateway," in IEEE Access, October 2018. doi: 10.1109/ACCESS.2018.2872430 [publication]Rosa, L. and Tiago Cruz and Simões, P. and Edmundo Monteiro and Lev, L. , "Attacking SCADA systems: a practical perspective", in IFIP/IEEE International Symposium on Integrated Network Management 2017, 2017 [citation][year=2019]Tidrea, A.; Korodi, A.; Silea, I. Cryptographic Considerations for Automation and SCADA Systems Using Trusted Platform Modules. MDPI Sensors 2019, 19, 4191. DOI: 10.3390/s19194191 [citation][year=2019]Dutta N., Jadav N., Dutiya N., Joshi D. (2020) Using Honeypots for ICS Threats Evaluation. In: Pricop E., Fattahi J., Dutta N., Ibrahim M. (eds) Recent Developments on Industrial Control Systems Resilience. Studies in Systems, Decision and Control, vol 255. Springer, Cham. DOI: 10.1007/978-3-030-31328-9_9 [citation][year=2018]Teixeira, Marcio & Salman, Tara & Zolanvari, Maede & Jain, Raj. (2018). SCADA System Testbed for Cybersecurity Research Using Machine Learning Approach. Future Internet. 10. DOI: 10.3390/fi10080076 [citation][year=2018]Syed Hazrat, Pooja Khatri, Muheet Butt, Majid Zaman, "Review of SCADA systems for Photovoltaic Power Plants", International Journal of Creative Research Thoughts, Volume 6, Issue 2 April 2018. ISSN: 2320-2882. Available at: http://www.ijcrt.org/viewfull.php?&p_id=IJCRT1892239 [publication]Lima, A. and Tiago Cruz and Sousa, B. and Simões, P. , "Security monitoring for mobile device assets: a survey", in In Proc. of 12th International Conference on Cyber Warfare and Security - ICCWS 2017. ISBN: 978-1-911218-26-5, 2017 [citation][year=2020]Thomas N Cooke, Metadata, Jailbreaking, and the Cybernetic Governmentality of iOS: Or, the Need to Distinguish Digital Privacy from digital privacy, Surveillance & Society, Vol 18 No 1 (2020): Open Issue. DOI: 10.24908/ss.v18i1.13118 [citation][year=2017]Yang Hu, John C.S. Lui, Wenjun Hu, Xiaobo Ma, Jianfeng Li, Xiao Liang, Taming energy cost of disk encryption software on data-intensive mobile devices, In Future Generation Computer Systems, 2017, , ISSN 0167-739X, https://doi.org/10.1016/j.future.2017.09.025. [publication]Rosa, L. and J. Proenca and João Henriques and Graveto, V. and Tiago Cruz and Simões, P. and Caldeira, F. and Edmundo Monteiro , "An evolved security architecture for distributed Industrial Automation and Control Systems", in In Proc. of 16th European Conference on Cyber Warfare and Security (ECCWS 2017). ISBN: 978-1-911218-43-2, 2017 [citation][year=2018]Raposo, Duarte & Rodrigues, André & Sinche, Soraya & Sá Silva, Jorge & Boavida, Fernando. (2018). Securing WirelessHART: Monitoring, Exploring and Detecting New Vulnerabilities. 1-9. 10.1109/NCA.2018.8548060. [publication]Konstantia Barbatsalou, Konstantia Barmpatsalou and Tiago Cruz and Edmundo Monteiro and Simões, P. , "Fuzzy System-based Suspicious Pattern Detection in Mobile Forensic Evidence ", in Digital Forensics and Cyber Crime. 9th EAI International Conference on Digital Forensics & Cyber Crime, ICDF2C 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, , 2017 [citation][year=2020]Faruk Süleyman BERBER, Ecir Ugur Kucuksille. Rating Of The Relationship Between Users Using The Data From The Implemented Mobile Forensic Software. Pamukkale Univ Muh Bilim Derg. 2020; 26(2): 359-370. DOI: 10.5505/pajes.2019.29599 : [citation][year=2019]Faruk Süleyman Berber, Ecir Ugur Kucuksille, Rating Of The Relationship Between Users Using The Data From The Implemented Mobile Forensic Software, in Pamukkale University Journal of Engineering Sciences, DOI: 10.5505/pajes.2019.29599 [citation][year=2018]Y. Hu, H. Lu, C. Guo, X. Liu, R. Wang and H. Chen, "Robust Stability for Nonlinear Fuzzy Network Control Systems with Time Varying Delay," 2018 IEEE 7th Data Driven Control and Learning Systems Conference (DDCLS), Enshi, 2018, pp. 1095-1100. DOI: 10.1109/DDCLS.2018.8516077 [publication]Borges, P. and Ferreira, L. and Saghezchi, F. and Mantas, G. and Ribeiro, J. and Rodriguez, J. and Cordeiro, L. and Simões, P. and Sousa, B. , "Towards a Hybrid Intrusion Detection System for Android-based PPDR Terminals", in Integrated Network and Service Management (IM), 2017 [citation][year=2019]Ribeiro, J., Saghezchi, F.B., Mantas, G. et al. Mobile Netw Appl (2019). https://doi.org/10.1007/s11036-019-01220-y [citation][year=2018]Pedhadiya, M.K., Jha, R.K., Bhatt, H.G., Device to device communication: A survey, Journal of Network and Computer Applications (2018), doi: https://doi.org/10.1016/j.jnca.2018.10.012. [publication]Sousa, B. and Fonseca, V. and Simões, P. and Cordeiro, L. , "Evaluation of scalable, on-demand DNS-as-a-Service", in IM2017: 2017 IFIP/IEEE Symposium on Integrated Network and Service Management, 2017 [publication]Sousa, B. and Marques, H. and Cordeiro, L. and Edmundo Monteiro and Rodriguez, J. and Simões, P. , "Sistemas de Comunicação de Próxima Geração para Segurança Pública", in CLME2017/VCEM, 8º Congresso Luso-Moçambicano de Engenharia / V Congresso de Engenharia de Moçambique, 2017 2016(5 publications) [publication]A. S. Gomes and Fonseca, V. and Sousa, B. and D. Palma and Simões, P. and Edmundo Monteiro and Cordeiro, L. , "A Mobile Follow-Me Cloud Content Caching Model", in IEEE/IFIP Network Operations and Management Symposium (NOMS 2016), 2016 [citation][year=2018]W. Junior et al., A systematic mapping study on mobility mechanisms for cloud service provisioning in mobile cloud ecosystems, Computers and Electrical Engineering (2018), DOI: 10.1016/j.compeleceng.2018.01.030 [citation][year=2017]Hao Jin, Dan Xu, Chenglin Zhao, Dong Liang, Information-centric mobile caching network frameworks and caching optimization: a survey, EURASIP Journal on Wireless Communications and Networking, 2017, DOI: 10.1186/s13638-017-0806-6 [publication]Tiago Cruz and Simões, P. and Edmundo Monteiro , "Security implications of SCADA ICS virtualization: survey and future trends", in In Proc. of ECCWS 2016 - 15th European Conference on Cyber Warfare and Security. ISBN: 978-1-5108-2544-4 , 2016 [citation][year=2020]F. Wang, W. Qi and T. Qian, "A Dynamic Cybersecurity Protection Method based on Software-defined Networking for Industrial Control Systems," 2019 Chinese Automation Congress (CAC), Hangzhou, China, 2019, pp. 1831-1834. doi: 10.1109/CAC48633.2019.8996244 [citation][year=2020]D. Pliatsios, P. Sarigiannidis, T. Lagkas and A. G. Sarigiannidis, "A Survey on SCADA Systems: Secure Protocols, Incidents, Threats and Tactics," in IEEE Communications Surveys & Tutorials. April 2020. DOI: 10.1109/COMST.2020.2987688 [citation][year=2019]F. Wang, W. Qi and T. Qian, "A Dynamic Cybersecurity Protection Method based on Software-defined Networking for Industrial Control Systems," 2019 Chinese Automation Congress (CAC), Hangzhou, China, 2019, pp. 1831-1834. [citation][year=2018]Ferruzola-Gómez E., Duchimaza-Supliguicha J., Bermeo-Almeida O., Pérez-Espinoza C., Samaniego-Cobo T., Bazán-Vera W. (2018), "Risk Analysis of Implanted Electronic Devices in Human Beings", In: Botto-Tobar M., Esparza-Cruz N., León-Acurio J., Crespo-Torres N., Beltrán-Mora M. (eds) Technology Trends. CITT 2017. Communications in Computer and Information Science, vol 798. Springer, Cham. DOI: 10.1007/978-3-319-72727-1_7 [citation][year=2017]Hallman, R., Bryan, J., Palavicini, G., Divita, J. and Romero-Mariona, J., “IoDDoS — The Internet of Distributed Denial of Sevice Attacks - A Case Study of the Mirai Malware and IoT-Based Botnets“, Proc. of the 2nd Int. Conf. on Internet of Things, Big Data and Security (IoTBDS 2017), pp. 47-58. ISBN: 978-989-758-245-5 [publication]Dalmazo, B.L. and João P. Vilela and Simões, P. and Marilia Curado , "Expedite feature extraction for enhanced cloud anomaly detection", in NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium, 2016 [citation][year=2017]A. S. Saljoughi, M. Mehvarz, H. Mirvaziri, Attacks and Intrusion Detection in Cloud Computing Using Neural Networks and Particle Swarm Optimization Algorithms, Emerging Science Journal, Vol. 1, No. 4, December, 2017, DOI: http://dx.doi.org/10.28991/ijse-01120 [publication]Stewart, B. and Rosa, L. and Maglaras, L. and Tiago Cruz and Simões, P. and Janicke, H. , "Effect of Network Architecture Changes on OCSVM based Intrusion Detection System", in 2nd International Conference on Industrial Networks and Intelligent Systems (INISCOM 2016), Leicester, United Kingdom - Springer International Publishing, Lecture Notes of the Institute for Computer Sciences, 2016 [citation][year=2019]L. N. Tidjon, M. Frappier and A. Mammar, "Intrusion Detection Systems: A Cross-Domain Overview," in IEEE Communications Surveys & Tutorials, vol. 21, no. 4, pp. 3639-3681, Fourthquarter 2019. doi: 10.1109/COMST.2019.2922584 [citation][year=2018]H. Jiao, J. Li and T. Jiang, "The Cloud Resource Load Security Detection Based on Wavelet Packet Transform and Grey Wolf Algorithm," 2018 15th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP), Chengdu, China, 2018, pp. 1-5. doi: 10.1109/ICCWAMTIP.2018.8632600 [publication]Sousa, B. and Zhao, Z. and Karimzadeh, M. and D. Palma and Fonseca, V. and Simões, P. and Braun, T. and Berg, H.v.d. and Pras, A. and Cordeiro, L. , "Enabling a Mobility Prediction-Aware Follow-Me Cloud Model", in IEEE 41st Conference on Local Computer Networks (LCN 2016), 2016 [citation][year=2018]Shekhar, Shashank. "Algorithms and Techniques for Dynamic Resource Management across Cloud-Edge Resource Spectrum." PhD diss., Vanderbilt University, 2018. [citation][year=2016]Mayzaud, Anthéa, Daphné Tuncer, Anna Sperotto, Gabi Dreo, Marinos Charalambides, Rashid Mijumbi, Joan Serrat et al. Flamingo H2020 Project, "D6. 4—Fourth Year Report on Automated Configuration and Repair." Communications (2016). 2015(4 publications) [publication]Rosa, L. and Alves, P. and Tiago Cruz and Simões, P. and Edmundo Monteiro , "A Comparative Study of Correlation Engines for Security Event Management", in In Proc. of 10th Int. Conf. on Cyber Warfare and Security (ICCWS-2015). ISBN: 978-1-910309-98-8 ISSN: 2048-9897, 2015 [citation][year=2020]M. Bahrami, M. Fotuhi-Firuzabad and H. Farzin, "Reliability Evaluation of Power Grids Considering Integrity Attacks Against Substation Protective IEDs," in IEEE Transactions on Industrial Informatics, vol. 16, no. 2, pp. 1035-1044, Feb. 2020. doi: 10.1109/TII.2019.2926557 [citation][year=2020]Z. Han, X. Li, G. Xu, N. Xiong, E. Merlo and E. Stroulia, "An Effective Evolutionary Analysis Scheme for Industrial Software Access Control Models," in IEEE Transactions on Industrial Informatics, vol. 16, no. 2, pp. 1024-1034, Feb. 2020. doi: 10.1109/TII.2019.2925422 [citation][year=2019]Veeramany A, Hutton WJ, III, Sridhar S, Gourisetti S, Coles G, Skare P. A Framework for Development of Risk-Informed Autonomous Adaptive Cyber Controller. ASME. J. Comput. Inf. Sci. Eng. 2019;():1-31. DOI:10.1115/1.4043040 [citation][year=2017]Sandeep Sekharan, S & Kandasamy, Kamalanathan. (2017). Profiling SIEM tools and correlation engines for security analytics. in Proc of Conference: 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), 717-721. DOI: 10.1109/WiSPNET.2017.8299855. [citation][year=2017]VICTOR W. GITUKU, "A LOW COST SYSTEM FOR LOGON ANOMALY DETECTION BASED ON TIME AND LOCATION OF USERS ", MSc Thesis, UNITED STATES INTERNATIONAL UNIVERSITY - AFRICA, summer 2017. Available at: http://usiuservicedesk.usiu.ac.ke/bitstream/handle/11732/3533/VICTOR W GITUKU MSC 2017.pdf?sequence=1&isAllowed=y [citation][year=2017]Olivier Wang. Adaptive Rules Model : Statistical Learning for Rule-Based Systems. Machine Learning [cs.LG]. Université Paris-Saclay, 2017. English. . , PhD Thesis [citation][year=2016]Steinegger, RH, Hintz, N., Hippchen, B., Binder, G., Roeser, F., & Abeck, S. (2016, April). Log analysis with open source tools. In software technologies and processes: open source software in the industry, SMEs and the university environment 5. Conference STEP, 3.5. 2016 Furtwangen (p. 7). Walter de Gruyter GmbH & Co KG. [citation][year=2016]C. Suh-Lee, Ju-Yeon Jo and Yoohwan Kim, "Text mining for security threat detection discovering hidden information in unstructured log messages," 2016 IEEE Conference on Communications and Network Security (CNS), Philadelphia, PA, 2016, pp. 252-260. doi: 10.1109/CNS.2016.7860492 [citation][year=2016]Underwood, M. (2016) Big Data Complex Event Processing for Internet of Things Provenance: Benefits for Audit, Forensics, and Safety, in Cyber-Assurance for the Internet of Things (ed T. T. Brooks), John Wiley & Sons, Inc., Hoboken, NJ, USA. doi: 10.1002/9781119193784.ch8 [citation][year=2016]A. Awad, S. Kadry, B. Lee, G. Maddodi and E. O'Meara, "Integrity Assurance in the Cloud by Combined PBA and Provenance," 2016 10th International Conference on Next Generation Mobile Applications, Security and Technologies (NGMAST), Cardiff, UK, 2016, pp. 127-132.doi: 10.1109/NGMAST.2016.15 [citation][year=2015]Gianfranco Cerullo, Luigi Coppolino, Salvatore D’Antonio, Valerio Formicola, Gaetano Papale, Bruno Ragucci, “Enabling Convergence of Physical and Logical Security Through Intelligent Event Correlation“, in Proc. of the 9th Int. Symposium on Intelligent Distributed Computing – IDC'2015, Guimarães, Portugal, October 2015, Springer Studies in Computational Intelligence V. 616, pp 427-437, October 2015. DOI: 10.1007/978-3-319-25017-5_40. [publication]Tiago Cruz and Barrigas, J. and J. Proenca and Graziano, A. and Panzieri, S. and Lev, L. and Simões, P. , "Improving Network Security Monitoring for Industrial Control Systems", in 14th IFIP/IEEE Int. Symposium on Integrated Management (IM 2015), 2015 [citation][year=2020]Lijuan Xu, Bailing Wang, Lianhai Wang, Dawei Zhao, Xiaohui Han, Shumian Yang, PLC-SEIFF: A programmable logic controller security incident forensics framework based on automatic construction of security constraints, Computers & Security, Volume 92, 2020, 101749, ISSN 0167-4048, https://doi.org/10.1016/j.cose.2020.101749. [citation][year=2020]Pranshu Bajpai, Richard Enbody, and Betty H.C. Cheng. 2020. Ransomware Targeting Automobiles. In Proceedings of the Second ACM Workshop on Automotive and Aerial Vehicle Security (AutoSec ’20). Association for Computing Machinery, New York, NY, USA, 23–29. DOI:https://doi.org/10.1145/3375706.3380558 [citation][year=2019]Handa A, Sharma A, Shukla SK. Machine learning in cybersecurity: A review. Wiley WIREs - Data Mining and Knowledge Discovery. 2019; DOI:10.1002/widm.1306 [citation][year=2019]T. Abdelghani, "Industrial control systems (ics) security in power transmission network," 2019 Algerian Large Electrical Network Conference (CAGRE), Algiers, Algeria, 2019, pp. 1-4. DOI: 10.1109/CAGRE.2019.8713289 [citation][year=2019]D. Zegzhda, D. Lavrova, and M. Poltavtseva, "Multifractal Security Analysis of Cyberphysical Systems", in NONLINEAR PHENOMENA IN COMPLEX SYSTEMS, Vol.22, No.2, pp.196 - 204, 2019. [citation][year=2019]Khaoula Es-Salhi. Segmentation and segregation mechanisms and models to secure the integration of Industrial control Systems (ICS) with corporate system. Systems and Control [cs.SY]. Ecole nationale supérieure Mines-Télécom Atlantique, 2019. English. ffNNT : 2019IMTA0143ff. fftel-02298847f. URL: https://tel.archives-ouvertes.fr/tel-02298847/document [citation][year=2019]Muhammad Rizwan Asghar, Qinwen Hu, Sherali Zeadally, Cybersecurity in industrial control systems: Issues, technologies, and challenges, Computer Networks, Volume 165, 2019, ISSN 1389-1286. DOI: 10.1016/j.comnet.2019.106946. [citation][year=2019]H. Gao, J. Li and J. Cheng, "Industrial Control Network Security Analysis and Decision-Making by Reasoning Method Based on Strong Relevant Logic," 2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), Fukuoka, Japan, 2019, pp. 289-294. doi: 10.1109/DASC/PiCom/CBDCom/CyberSciTech.2019.00060 [citation][year=2018]Yau K., Chow KP., Yiu SM. (2018) A Forensic Logging System for Siemens Programmable Logic Controllers. In: Peterson G., Shenoi S. (eds) Advances in Digital Forensics XIV. DigitalForensics 2018. IFIP Advances in Information and Communication Technology, vol 532. Springer, Cham. DOI: 10.1007/978-3-319-99277-8_18 [citation][year=2018]P. Palaniswamy and B. McMillin, "Cyber-Physical Security of an Electric Microgrid," 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC), Taipei, Taiwan, 2018, pp. 74-83. doi: 10.1109/PRDC.2018.00018 [citation][year=2018]S. S. Patlolla, B. McMillin, S. Adepu and A. Mathur, "An Approach for Formal Analysis of the Security of a Water Treatment Testbed," 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC), Taipei, Taiwan, 2018, pp. 115-124. doi: 10.1109/PRDC.2018.00022 [citation][year=2018]Julius C AgumaBruce McMillin, "Introduction of a Hybrid Monitor to Cyber-Physical Systems", May 2018. arXiv:1805.01975 [citation][year=2018]T. Terzimehic, S. Voss and M. Wenger, "Using Design Space Exploration to Calculate Deployment Configurations of IEC 61499-based Systems," 2018 IEEE 14th International Conference on Automation Science and Engineering (CASE), Munich, Germany, 2018, pp. 881-886. DOI: 10.1109/COASE.2018.8560591. [citation][year=2018]Patlolla, Sai Sidharth, "An approach for formal analysis of the security of a water treatment testbed" (2018). Master's Thesis, Missouri University of Science and Technology. http://scholarsmine.mst.edu/masters_theses/7778 [citation][year=2017]Palavicini Jr G., Bryan J., Sheets E., Kline M. and San Miguel J. (2017). Towards Firmware Analysis of Industrial Internet of Things (IIoT) - Applying Symbolic Analysis to IIoT Firmware Vetting.In Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security, ISBN 978-989-758-245-5, pages 470-477. Jan 2017, Porto, Portugal. DOI: 10.5220/0006393704700477 [citation][year=2017]Stergiou, C., Psannis, K., Plageras, A., Kokkonis, G., Ishibashi, Y, "Architecture for security monitoring in IoT environments", in Proc. of 26th IEEE International Symposium on Industrial Electronics, 19-21 June 2017 Edinburgh, Scotland, UK, At Edinburgh, Scotland, UK. [citation][year=2017]P. R. Dunaka and B. McMillin, "Cyber-Physical Security of a Chemical Plant," 2017 IEEE 18th International Symposium on High Assurance Systems Engineering (HASE), Singapore, 2017, pp. 33-40. doi: 10.1109/HASE.2017.23 [citation][year=2017]Eden, Peter and Blyth, Andrew and Jones, Kevin and Soulsby, Hugh and Burnap, Pete and Cherdantseva, Yulia and Stoddart, Kristan, "SCADA System Forensic Analysis Within IIoT", in Cybersecurity for Industry 4.0: Analysis for Design and Manufacturing, pp73-101, ed. Thames, Lane and Schaefer, Dirk, Springer International Publishing, April 2017.. doi:10.1007/978-3-319-50660-9_4. [citation][year=2017]A. Gharaibeh et al., "Smart Cities: A Survey on Data Management, Security, and Enabling Technologies," in IEEE Communications Surveys & Tutorials, vol. 19, no. 4, pp. 2456-2501, Fourthquarter 2017. doi: 10.1109/COMST.2017.2736886 [citation][year=2017]Dunaka, Prakash Rao, "Cyber-physical security of a chemical plant" (2017). M.Sc. Thesis in Computer Science, Missouri University of Science an Technology. Available at: http://scholarsmine.mst.edu/masters_theses/7638 [citation][year=2017]Korkmaz E., Davis M., Dolgikh A., Skormin V. (2017) Detection and Mitigation of Time Delay Injection Attacks on Industrial Control Systems with PLCs. In: Rak J., Bay J., Kotenko I., Popyack L., Skormin V., Szczypiorski K. (eds) Computer Network Security. MMM-ACNS 2017. Lecture Notes in Computer Science, vol 10446. Springer, DOI: 10.1007/978-3-319-65127-9_6 [citation][year=2017]Romero-Mariona J. et al. (2017) An Approach to Organizational Cybersecurity. In: Chang V., Ramachandran M., Walters R., Wills G. (eds) Enterprise Security. Lecture Notes in Computer Science, vol 10131. Springer, Cham, DOI: 10.1007/978-3-319-54380-2_9 [citation][year=2016]Hallman, R., Kerr, L., et al., "TMT: Technology Matching Tool for SCADA Network Security", in Proc. of Cybersecurity Symposium 2016, Coeur d’Alene, Idaho, 18-20 April 2016, pp. 38-43. DOI: 10.1109/CYBERSEC.2016.014 [citation][year=2016]Daniel Cunningham, Geancarlo Palavicini Jr., Jose Romero-Mariona, Towards Effective Cybersecurity for Modular, Open Architecture Satellite Systems, Proceedings of the AIAA/USU Conference on Small Satellites, SSC16-IV-6, 2016. http://digitalcommons.usu.edu/smallsat/2016/TS4AdvTech1/6/ [citation][year=2015]P. Eden, A. Blyth, P. Burnap, K. Jones & K. Stoddart, “A Forensic Taxonomy of SCADA Systems and Approach to Incident Response“, Proc. of the 3rd Int. Symposium for ICS & SCADA Cyber Security Research 2015 (ICS-CSR 2015), 17-18 Sept. 2015, University of Applied Sciences Ingolstadt, Germany, DOI: 10.14236/ewic/ICS2015.5. [publication]J. Proenca and Tiago Cruz and Simões, P. and Edmundo Monteiro , "How to use Software-Defined Networking to Improve Security – a Survey", in In Proc. of 14th European Conference on Cyber Warfare and Security (ECCWS 2015). ISBN: 978-1-910810-28-6 ISSN: 2048-8602, 2015 [citation][year=2019]Marzuqi, Oki; Virgono, Agus; Negara, Ridha Muldina. "Implementation model architecture software defined network using raspberry Pi: a review paper" TELKOMNIKA Telecommunication, Computing, Electronics and Control; Yogyakarta Vol. 17, Iss. 3, (Jun 2019): 1136-1141. DOI:10.12928/TELKOMNIKA.v17i3.8859 [citation][year=2019]Soua, Ridha et al. (2019). Softwarization of SCADA: Lightweight Statistical SDN-Agents for Anomaly Detection, in Proc. of Network of The Future (NoF) conference, Rome, Italy, September 2019. [citation][year=2016]C. Trois; M. D. Didonet Del Fabro; L. C. E. de Bona; M. Martinello, "A Survey on SDN Programming Languages: Towards a Taxonomy," in IEEE Communications Surveys & Tutorials. doi: 10.1109/COMST.2016.2553778 [publication]Sousa, B. and Simões, P. and Konstantia Barbatsalou, Konstantia Barmpatsalou and Edmundo Monteiro , "Mobile Forensics for PPDR Communications: How and why?", in Iccws 2015-The Proceedings of the 10th International Conference on Cyber Warfare and Security, 2015 2014(10 publications) [publication]Cardoso, A. and Moreira, F. and Simões, P. , "A Survey Of Cloud Computing Migration Issues And Frameworks", in 2014 World Conference on Information Systems and Technologies (WorldCIST'14), 2014 [citation][year=2018]E. Espinoza, Sofia & S. Brooks, Joan & Araujo, John. (2018). Implementing an Information System Strategy: A Cost, Benefit, and Risk Analysis Framework for Evaluating Viable IT Alternatives in the US Federal Government. International Journal of Communications, Network and System Sciences. 11. 105-132. 10.4236/ijcns.2018.116007. [citation][year=2017]Anastasija Efremovska and Patricia Lago, Chapter 9 - From Legacy to Cloud: Risks and Benefits in Software Cloud Migration, In Software Architecture for Big Data and the Cloud, Morgan Kaufmann, Boston, 2017, Pages 147-165, ISBN 9780128054673, https://doi.org/10.1016/B978-0-12-805467-3.00009-0. [citation][year=2015]Cai, Zhengong; Zhao, Liping; Wang, Xinyu; Yang, Xiaohu; Qin, Juntao; Yin, Keting, "A Pattern-Based Code Transformation Approach for Cloud Application Migration," Cloud Computing (CLOUD), 2015 IEEE 8th International Conference on, pp.33-40, June 27 2015-July 2 2015. doi: 10.1109/CLOUD.2015.15 [publication]Tiago Cruz and J. Proenca and Simões, P. and Aubigny, M. and Ouedrago, M. and Graziano, A. and Yasakhetu, L. , "Improving cyber-security awareness on Industrial Control Systems: the CockpitCI approach", in In Proc. of 13th European Conference on Information Warfare and Security ECCWS 2014. ISBN: 978-1-63266-831-8 , 2014 [citation][year=2019]Josephine Lamp, Carlos E. Rubio-Medrano, Ziming Zhao and Gail-Joon Ahn, "ExSol: Collaboratively Assessing Cybersecurity Risks for Protecting Energy Delivery Systems", in Proc. of 7th IEEE Workshop on Modeling and Simulation of Cyber-Physical Energy Systems (MSCPES 2019), Montreal, Canada, 15 April 2019. [citation][year=2017]Palavicini Jr G., Bryan J., Sheets E., Kline M. and San Miguel J. (2017). Towards Firmware Analysis of Industrial Internet of Things (IIoT) - Applying Symbolic Analysis to IIoT Firmware Vetting.In Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security, ISBN 978-989-758-245-5, pages 470-477. Jan 2017, Porto, Portugal. DOI: 10.5220/0006393704700477 [citation][year=2015]P. Eden, A. Blyth, P. Burnap, K. Jones & K. Stoddart, “A Forensic Taxonomy of SCADA Systems and Approach to Incident Response“, Proc. of the 3rd Int. Symposium for ICS & SCADA Cyber Security Research 2015 (ICS-CSR 2015), 17-18 Sept. 2015, University of Applied Sciences Ingolstadt, Germany, DOI: 10.14236/ewic/ICS2015.5. [citation][year=2015]Gimwoonyeon, yisuyeon, "Foreign industrial control system security technology research and development trends", The Information Security Journal 25, No. 5, 2015.10, 5-11 (7 pages), ISSN : 1598-3978(Print). [publication]Andre Riker and Tiago Cruz and Marques, B. and Marilia Curado and Simões, P. and Edmundo Monteiro , "Efficient and Secure M2M Communications for Smart Metering", in ETFA 2014 (19th IEEE Int. Conference on Emerging Technology & Factory Automation), 2014 [citation][year=2020]Bana, S. "A Priority-based Fair Queuing (PFQ) Model for Wireless Healthcare System", PhD. Thesis, University of Westminster, January 2020. URL: https://westminsterresearch.westminster.ac.uk/download/1d125f4ecda41c992a200a27188dd9ed7b3743463d47f8f584dbcd58539c7e3f/4793957/A Priority-based Fair Queuing (PFQ) Model for Wireless Healthcare System.pdf [citation][year=2019]Ouaissa, Mariya & ab, Rhattoy. (2019). A Secure Model for Machine to Machine Device Domain Based Group in a Smart City Architecture. International Journal of Intelligent Engineering and Systems. Vol 12. DOI: 10.22266/ijies2019.0228.1 [citation][year=2017]Ahmad, Rami Haidar and Al-Sakib Khan Pathan. "A Study on M2M (Machine to Machine) System and Communication: Its Security, Threats, and Intrusion Detection System." The Internet of Things: Breakthroughs in Research and Practice. IGI Global, 2017. 205-240. Web. 17 Aug. 2017. doi:10.4018/978-1-5225-1832-7.ch010 [citation][year=2015]Lucic, Drazen; Caric, Antun; Lovrek, Ignac, "Standardisation and regulatory context of machine-to-machine communication," in Telecommunications (ConTEL), 2015 13th International Conference on, pp.1-7, 13-15 July 2015 doi: 10.1109/ConTEL.2015.7231216 [publication]Ouedrago, M. and Kuo, C. and Tjoa, S. and Preston, D. and Dubois, E. and Simões, P. and Tiago Cruz , "Keeping an Eye on Your Security Through Assurance Indicators", in SECRYPT’2014 (11th International Conference on Security and Criptography), 2014 [citation][year=2019]Katt, Basel and Nishu Prasher. "Quantitative Security Assurance." In Exploring Security in Software Architecture and Design, ed. Michael Felderer and Riccardo Scandariato, 15-46 (2019). doi:10.4018/978-1-5225-6313-6.ch002 [citation][year=2018]Katt, B., Prasher, N., Quantitative security assurance metrics: REST API case studies. In Proceedings of the 12th European Conference on Software Architecture (ECSA): Companion Proceedings, Madrid, Spain — September 24 - 28, 2018. DOI: 10.1145/3241403.3241464. [citation][year=2018]Kuo, Chien-Ting, et al. "SFaaS: Keeping an eye on IoT fusion environment with security fusion as a service." Future Generation Computer Systems (2018). DOI: 10.1016/j.future.2017.12.069. [citation][year=2015]Lan, Yuqing, and Tao Han. "SADP: Security assurance development process for building reliable Linux-based operating system." Computer and Communications (ICCC), 2015 IEEE International Conference on. IEEE, 2015. [publication]Fonseca, H. and Tiago Cruz and Simões, P. and Edmundo Monteiro and Silva, J. and Centeio, N. and Gomes, P. , "A comparison of classification techniques for detection of VoIP traffic", in NGMAST’2014 (8th International Conference on Next Generation Mobile Apps, Services and Technologies), 2014 [citation][year=2016]AL-NAYMAT, G., et al. "CLASSIFICATION OF VOIP AND NON-VOIP TRAFFIC USING MACHINE LEARNING APPROACHES." Journal of Theoretical & Applied Information Technology (2016). [citation][year=2015]Sz?szo?, K. and Ciosmak, J.., "Metody hybrydowe identyfikacji ruchu Voip w transmisji szyfrowanej", Logistyka, Vol 4, pp: 6002--6008, CD 2, Instytut Logistyki i Magazynowania, 2015 - Available at: https://www.infona.pl/resource/bwmeta1.element.baztech-b84fed80-4a97-4ec8-a7cd-de03a7b3527b/tab/summary?&locale=en [publication]Konstantia Barbatsalou, Konstantia Barmpatsalou and Edmundo Monteiro and Simões, P. , "Mobile Forensics: Evidence Collection and Malicious Activity Identification in PPDR Systems", in ISDF'2014 - International Conference in Information Security and Digital Forensics, 2014 [citation][year=2018]Kouwena, A., Scanlonb, M., Chooc, K. K. R., & Le-Khacb, N. A. (2018). Digital Forensic Investigation of Two-Way Radio Communication Equipment and Services. Digital Investigation, 26(1). [citation][year=2017]Fysarakis, K., Askoxylakis, I., Katos, V., Ioannidis, S., & Marinos, L. (2017). SECURITY CONCERNS IN CO-OPERATIVE INTELLIGENT TRANSPORTATION SYSTEMS. In Intrusion Detection and Prevention for Mobile Ecosystems (pp. 487-522). CRC Press. [publication]Mueller, J. and D. Palma and Landi, G. and Soares, J.M. and Parreira, B. and Metsch, T. and Gray, P. and Georgiev, A. and Hl-hazmi, Y. and Magedanz, T. and Simões, P. , "Monitoring as a service for cloud environments", in 2014 IEEE Fifth International Conference on Communications and Electronics (ICCE), 2014 [citation][year=2016]M. Calzarossa, M.L. Della Vedova, L. Massari, D. Petcu, M.I.M. Tabash and D. Tessera. Workloads in the Clouds. In L. Fiondella and A. Puliafito, editors, Principles of Performance and Reliability Modeling and Evaluation, Springer Series in Reliability Engineering, Springer, 2016 [publication]D. Palma and Gonçalves, J. and Sousa, B. and Cordeiro, L. and Simões, P. and Sharma, S. and Staessens, D. , "The QueuePusher: Enabling Queue Management in OpenFlow", in EWSDN 2014 – Third European Workshop on Software Defined Networks, 2014 [citation][year=2019]Jain, Vanita, Vivek Yatri, and Chaitanya Kapoor. "Software defined networking: State-of-the-art." Journal of High Speed Networks 25, no. 1 (2019): 1-40. DOI: 10.3233/JHS-190601 [citation][year=2018]Alharbi, Faisal. "SDN-BASED MECHANISMS FOR PROVISIONING QUALITY OF SERVICE TO SELECTED NETWORK FLOWS." (2018). University of Kentucky, doi: 10.13023/etd.2018.317 [citation][year=2018]Karakus, Murat. "A framework for economic analysis of network architectures." PhD diss., 2018. Purdue University, http://hdl.handle.net/1805/17915 [citation][year=2018]Gonçalo Paiva Dias, Smart cities research in Portugal and Spain: An exploratory bibliometric analysis, Proc. of the 13th Iberian Conference on Information Systems and Technologies (CISTI), 2018. doi: 10.23919/CISTI.2018.8399295 [citation][year=2018]Sahrish Khan Tayyaba, Munam Ali Shah, Resource allocation in SDN based 5G cellular networks, in Peer-to-Peer Network Applications (2018). https://doi.org/10.1007/s12083-018-0651-3 [citation][year=2018]Bagci, Kadir & Tekalp, A. (2018). Dynamic Resource Allocation by Batch-Optimization for Value-Added Video Services over SDN. IEEE Transactions on Multimedia. PP. 1-1. 10.1109/TMM.2018.2823907. [citation][year=2017]Felipe Volpato, Marcio Castro, Mario A. R. Dantas, “Proposta de um Modelo de Abstração da Camada de Gerenciamento de Dispositivos com Enfase em QoS e Suporte a OpenFlow“, Fórum de Pós-Graduação – Anais da 17ª Escola Regional de Alto Desempenho do Estado do Rio Grande do Sul (ERAD/RS 2017), pp. 169-170, SBC, 5-7 de Abril de 2017, ISSN 2177-0085. [citation][year=2017]AlSous A., Marx Gómez J. (2017) QoS in NaaS (Network-as-a-Service) Using Software Defined Networking. In: Marx Gómez J., Mora M., Raisinghani M., Nebel W., O'Connor R. (eds) Engineering and Management of Data Centers. Service Science: Research and Innovations in the Service Economy. Springer, Cham, DOI https://doi.org/10.1007/978-3-319-65082-1_6 [citation][year=2017]K. T. Bagci, K. E. Sahin and A. M. Tekalp, "Compete or Collaborate: Architectures for Collaborative DASH Video Over Future Networks," in IEEE Transactions on Multimedia, vol. 19, no. 10, pp. 2152-2165, Oct. 2017. doi: 10.1109/TMM.2017.2736638 [citation][year=2017]A. Mendiola, J. Astorga, E. Jacob and M. Higuero, "A Survey on the Contributions of Software-Defined Networking to Traffic Engineering," in IEEE Communications Surveys & Tutorials, vol. 19, no. 2, pp. 918-953, Secondquarter 2017. doi: 10.1109/COMST.2016.2633579 [citation][year=2017]Cesar Alonso Irizar, Caridad Anías Calderon, Propuesta para la Evaluación de Parâmetros de QoS en SDN, Revista Telem@tica. Vol. 16. No. 2, mayo-agosto, 2017, p.12- 24 ISSN 1729-3804. [citation][year=2017]Samani, Abolfazl. "Flow Maximization for Multimedia Streaming Service in SDN Networks." MSc Dissertation., University of Calgary, 2017. [citation][year=2017]F. Volpato, M. P. Da Silva, A. L. Gonçalves and M. A. R. Dantas, "An Autonomic QoS management architecture for Software-Defined Networking environments," 2017 IEEE Symposium on Computers and Communications (ISCC), Heraklion, Greece, 2017, pp. 418-423. doi: 10.1109/ISCC.2017.8024565 [citation][year=2017]H. Gharakheili, Dynamic Fast Lanes with Two-Sided Control, in The Role of SDN in Broadband Networks", Springer, pp. 61-85, 2017, doi: 10.1007/978-981-10-3479-4_5 [citation][year=2016]A. Gopalasingham et al., "Software-Defined mobile backhaul for future Train to ground Communication services," 2016 9th IFIP Wireless and Mobile Networking Conference (WMNC), Colmar, 2016, pp. 161-167. doi: 10.1109/WMNC.2016.7543984 [citation][year=2016]D. Caixinha, P. Kathiravelu and L. Veiga, "ViTeNA: An SDN-based virtual network embedding algorithm for multi-tenant data centers," 2016 IEEE 15th International Symposium on Network Computing and Applications (NCA), Cambridge, MA, 2016, pp. 140-147. doi: 10.1109/NCA.2016.7778608 [citation][year=2016]KT Bagci, KE Sahin, AM Tekalp, Queue-allocation optimization for adaptive video streaming over software defined networks with multiple service-levels, 2016 IEEE International Conference on Image Processing, pp. 1519-1523, Phoenix, AZ, US, Sept. 2016 [citation][year=2016]H. Habibi Gharakheili; V. Sivaraman; A. Vishwanath; L. Exton; J. Matthews; C. Russell, "SDN APIs and Models for Two-Sided Resource Management in Broadband Access Networks," in IEEE Transactions on Network and Service Management , vol.PP, no.99, pp.1-1, doi: 10.1109/TNSM.2016.2615067 [citation][year=2016]M. Karakus, A. Durresi, Quality of Service (QoS) in Software Defined Networking (SDN): A Survey. Journal of Network and Computer Applications, 2016, http://dx.doi.org/10.1016/j.jnca.2016.12.019 [citation][year=2015]Kreutz, D.; Ramos, F.M.V.; Esteves Verissimo, P.; Esteve Rothenberg, C.; Azodolmolky, S.; Uhlig, S., "Software-Defined Networking: A Comprehensive Survey," Proceedings of the IEEE , vol.103, no.1, pp.14-76, Jan. 2015, doi: 10.1109/JPROC.2014.2371999 [citation][year=2015]Atanas Mirchev, “Survey of Concepts for QoS improvements via SDN“, Seminars FI / IITM SS 15, Network Architectures and Services, pp. 33-40, September 2015, doi: 10.2313/NET-2015-09-1_05 [citation][year=2015]C. Caba and J. Soler, "APIs for QoS configuration in Software Defined Networks," Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft), London, 2015, pp. 1-5. doi: 10.1109/NETSOFT.2015.7116157 [citation][year=2015]N. Zilberman, P. Watts, C. Rotsos, A. Moore, "Reconfigurable Network Systems and Software-Defined Networking," Proc. of the IEEE, v.103, no.7, pp.1102-1124, July 2015. doi: 10.1109/JPROC.2015.2435732 [publication]Gonçalves, J. and D. Palma and Cordeiro, L. and Sharma, S. and Cole, D. and Carter, A. and Simões, P. , "Software-Defined Networking: Guidelines for Experimentation and Validation in Large-Scale Real World Scenarios", in 10th IFIP WG 12.5 Internation Conference on Artificial Intelligence Applications and Innovations (AIAI 2014), 2014 [publication]Sousa, B. and Marques, C. and D. Palma and Gonçalves, J. and Simões, P. and Thomas Michael Bohnert and Cordeiro, L. , "Towards a High Performance DNSaaS Deployment", in 6th International Conference on Mobile Networks and Management (MONAMI’2014), 2014 [citation][year=2017]I.M. Alsmadi and M. Zarour, Empirical Evidences in Software-Defined Network Security: A Systematic Literature Review", in Information Fusion for Cyber-Security Analytics, Springer International Publishing, pp. 253-295, doi: 10.1007/978-3-319-44257-0_11, 2017 2013(10 publications) [publication]Tiago Cruz and Simões, P. and Rodrigues, J. and Edmundo Monteiro and Bastos, F. and Laranjeira, A. , "Managed Hybrid Storage for Home and SOHO Environments", in IM 2013 (IFIP/IEEE International Symposium on Integrated Network Management), 2013 [citation][year=2014]Michael K. Bugenhagen, Auto file locker, US Patent US8631236 B2, January 2014. [publication]Tiago Cruz and Simões, P. and Reis, N. and Edmundo Monteiro and Bastos, F. and Laranjeira, A. , "An Architecture for Virtualized Home Gateways ", in IM 2013 (IFIP/IEEE International Symposium on Integrated Network Management), 2013 [citation][year=2019]Maxweel Carmo, Felipe S. Dantas Silva, Augusto Venâncio Neto, Daniel Corujo, and Rui Aguiar, “Network-Cloud Slicing Definitions for Wi-Fi Sharing Systems to Enhance 5G Ultra Dense Network Capabilities,” Wireless Communications and Mobile Computing, vol. 2019, Article ID 8015274, 17 pages, 2019. https://doi.org/10.1155/2019/8015274. [citation][year=2019]Georgescu, T.-M.; Iancu, B.; Zurini, M. Named-Entity-Recognition-Based Automated System for Diagnosing Cybersecurity Situations in IoT Networks. Sensors 2019, 19, 3380. DOI: 10.3390/s19153380 [citation][year=2017]Flores Moyano R, Fernández D, Bellido L, González C. A software-defined networking approach to improve service provision in residential networks. Int J Network Mgmt. 2017;e1984. https://doi.org/10.1002/nem.1984 [citation][year=2017]Ricardo Flores Moyano, David Fernández Cambronero, Luis Bellido Triana, A User-Centric SDN Management Architecture for NFV-based Residential Networks, Computer Standards & Interfaces, Available online 27 January 2017, ISSN 0920-5489, http://dx.doi.org/10.1016/j.csi.2017.01.010. [citation][year=2016]Apostolos Papageorgiou, Roberto Bifulco, Ernö Kovacs, Hans-Jörg Kolbe. Dynamic M2M Device Attachment and Redirection in Virtual Home Gateway Environments. IEEE International Conference on Communications (ICC '16). IEEE, May 2016. ISBN: 978-1-4799-6664-6 [citation][year=2016]Cardoso, I. D., Barraca, J. P., Gonçalves, C., and Aguiar, R. L. (2016) Seamless integration of cloud and fog networks. Int. J. Network Mgmt, doi: 10.1002/nem.1944. [citation][year=2016]D. Modig and J. Ding, "Performance impacts on container based virtualization in virtualized residential gateways," 2016 39th International Conference on Telecommunications and Signal Processing (TSP), Vienna, Austria, 2016, pp. 27-32. doi: 10.1109/TSP.2016.7760823 [citation][year=2016]R. Bonafiglia, S. Miano, S. Nuccio, F. Risso and A. Sapio, "Enabling NFV Services on Resource-Constrained CPEs," 2016 5th IEEE International Conference on Cloud Networking (Cloudnet), Pisa, Italy, 2016, pp. 83-88. doi: 10.1109/CloudNet.2016.24 [citation][year=2015]Niwa, Tomonobu; Miyazawa, Masanori; Hayashi, Michiaki; Stadler, Rolf, "Universal fault detection for NFV using SOM-based clustering," in Network Operations and Management Symposium (APNOMS), 2015 17th Asia-Pacific , vol., no., pp.315-320, 19-21 Aug. 2015. doi: 10.1109/APNOMS.2015.7275446 [citation][year=2015]Herbaut, N.; Negru, D.; Xilouris, G.; Yiping Chen, "Migrating to a NFV-based Home Gateway: Introducing a Surrogate vNF approach," in Network of the Future (NOF), 2015 6th International Conference on the , vol., no., pp.1-7, Sept. 30 2015-Oct. 2 2015 [citation][year=2015]Cardoso, Igor Duarte; Barraca, Joao Paulo; Goncalves, Carlos; Aguiar, Rui L., "Seamless integration of Cloud and Fog networks," Network Softwarization (NetSoft), 2015 1st IEEE Conference on , vol., no., pp.1,9, 13-17 April 2015. doi: 10.1109/NETSOFT.2015.7116140 [citation][year=2014]Cardoso, Igor Duarte, "Network infrastructure control for virtual campuses", MSc. Thesis, University of Aveiro, 2014. Available at: http://ria.ua.pt/handle/10773/14707 [citation][year=2014]M. Boussard, D. T. Bui, R. Douville, N. Le Sauze, L. Noirie, P. Peloso, R. Varloot, M. Vigoureux, The Majord'Home: a SDN Approach to Let ISPs Manage and Extend Their Customers' Home Networks, Proc. of 10th CNSM and Workshop – ManSDN/NFV Short Paper, pp.430-434, ISBN 978-3-901882-67-8. [publication]Tiago Cruz and Simões, P. , "A Management Framework for Residential Broadband Environment", in IM 2013 (IFIP/IEEE International Symposium on Integrated Network Management), 2013 [publication]Fiorese, A. and Simões, P. and Boavida, F. , "Fiorese, A. ; Simoes, P. ; Boavida, F.; “Approach for service search and peer selection in P2P service overlays”, Proceedings of ICOIN 2013 – International Conference on Information Networking, Bangkok, Thailand, 28 – 30 Jan 2013.", in ICOIN 2013: 27th International Conference on Information Networking, 2013 [citation][year=2017]Nicholas Hays. 2017. Reducing the Download Time in Stochastic P2P Content Delivery Networks by Improving Peer Selection. Doctoral dissertation. Nova Southeastern University. Retrieved from NSUWorks, College of Engineering and Computing. (1007). http://nsuworks.nova.edu/gscis_etd/1007. [citation][year=2015]Ramon Hugo De Souza, Mário Antônio Ribeiro Dantas, “Mapping QoE through QoS in an Approach to DDB Architectures: Research Analysis and Conceptualization”, ACM Computing Surveys (CSUR) Journal, Volume 48 Issue 2, Article No. 31, November 2015. [citation][year=2014]Wang Zhen, Peng Lai-xian, Zhao Wen-dong, Data Link Information Distribution System and Its Service Discovery Approach, Journal of Communications Technology, 2014(1), China, DOI: 10.3969/j.issn.1002-0802.2014.01.008. [publication]Simões, P. and Tiago Cruz and J. Proenca and Edmundo Monteiro , "On the use of Honeypots for Detecting Cyber Attacks on Industrial Control Networks", in In Proc. of 12th European Conference on Information Warfare and Security (ECIW 2013). ISBN: 978-1-909507-34-0 ISSN: 2048-8602, 2013 [citation][year=2020]Cifranic, Nicholas & Romero-Mariona, Jose & Souza, Brian & Hallman, Roger. (2020). Decepti-SCADA: A Framework for Actively Defending Networked Critical Infrastructures, in Proc of 5th International Conference on Internet of Things, Big Data and Security (IoTBDS 2020)At: Prague, Czech Republic. May 2020 [citation][year=2019]Amine Belqruch and Abdelilah Maach. "SCADA security using SSH honeypot". In Proceedings of the 2nd International Conference on Networking, Information Systems & Security (NISS19). ACM, New York, NY, USA, Article 2, 5 pages. DOI: https://doi.org/10.1145/3320326.3320328 [citation][year=2019]Maglaras L., Ferrag M.A., Derhab A., Mukherjee M., Janicke H. (2019) Cyber Security: From Regulations and Policies to Practice. In: Kavoura A., Kefallonitis E., Giovanis A. (eds) Strategic Innovative Marketing and Tourism. Springer Proceedings in Business and Economics. Springer, Cham. DOI: 10.1007/978-3-030-12453-3_88 [citation][year=2019]William Hofer, Thomas Edgar, Draguna Vrabie, Katy Nowak “Model-driven Deception for Control System Environments”, in Proc of 2019 IEEE International Symposium onTechnologies for Homeland Security, November 5 - 6, 2019 Woburn, MA USA [citation][year=2018]Maglaras, Leandros & Ferrag, Mohamed Amine & Derhab, Abdelouahid & Mukherjee, Mithun & Janicke, Helge. (2018). Threats, Countermeasures and Attribution of Cyber Attacks on Critical Infrastructures. Security and Safety. [citation][year=2018]Palleti, V.R., Tan, Y.C., Samavedham, L., A mechanistic fault detection and isolation approach using Kalman filter to improve the security of cyber physical systems, (2018) Journal of Process Control, 68, pp. 160-170. DOI: 10.1016/j.jprocont.2018.05.005 [citation][year=2018]Adam Rose, Noah Miller, Jonathan Eyer, Joshua Banks, (2018). Economic Effectiveness of Mitigation and Resilience. 315-351. 10.1007/978-3-319-77492-3_14. May 2018. [citation][year=2017]Angséus, J., Ekbom, R., "Network-based Intrusion Detection Systems for Industrial Control Systems", Master’s thesis in Computer Systems and Networks (MPCSN), Department of Computer Science and Engineering. CHALMERS UNIVERSITY OF TECHNOLOGY/UNIVERSITY OF GOTHENBURG, Gothenburg, Sweden 2017 [citation][year=2017]Ibraheem Frieslaar and Barry Irwin. 2017. Investigating the effects various compilers have on the electromagnetic signature of a cryptographic executable. In Proceedings of the South African Institute of Computer Scientists and Information Technologists (SAICSIT '17). ACM, New York, NY, USA, Article 15, 10 pages. DOI: https://doi.org/10.1145/3129416.3129436 [citation][year=2016]Jaehee Lee, Jinhyeok Jeon, Changyeob Lee, Junbeom Lee, Jaebin Cho, An implementation of log visualization system combined SCADA Honeypot, Proc. of the Int. Conf. on Advanced Communications Technology (ICACT2016), pp. 441-444, Phoenix Park, South Korea, Jan 31 – Feb 03, 2016 [citation][year=2016]J. Nurmi, J. Kannisto and M. Vajaranta, "Observing Hidden Service Directory Spying with a Private Hidden Service Honeynet," 2016 11th Asia Joint Conference on Information Security (AsiaJCIS), Fukuoka, Japan, 2016, pp. 55-59. doi: 10.1109/AsiaJCIS.2016.31 [citation][year=2015]Kamil Koltys and Robert Gajewski, SHaPe: A Honeypot for Electric Power Substation, Journal of Telecommunications and Information Technology, 2015, vol. 4, pp. 37-43. [publication]D. Palma and Gonçalves, J. and Cordeiro, L. and Simões, P. and Edmundo Monteiro and Chochliouros, I. and Magdalinos, P. , "Tutamen: An Integrated Personal Mobile and Adaptable Video Platform for Health and Protection", in 9th IFIP WG 12.5 International Conference on Artificial Intelligence Applications and Innovations (AIAI 2013), 2013 [citation][year=2018]Metelmann, C. and Metelmann, B., 2019. Live Video Communication in Prehospital Emergency Medicine. In Strategic Management and Innovative Applications of E-Government (pp. 26-50). IGI Global. [citation][year=2018]G. P. Dias, "Smart cities research in Portugal and Spain: An exploratory biliometric analysis," 2018 13th Iberian Conference on Information Systems and Technologies (CISTI), Cáceres, Spain, 2018, pp. 1-6. doi: 10.23919/CISTI.2018.8399295 [citation][year=2017]Galay, Remil & Hernandez, Emmanuel & Kusakisako, Kodai & Talactac, Melbourne & Fujisaki, K & Tanaka, Tetsuya. (2017). Ticks' antioxidant complex: A defense stronghold and a potential target for their control. Advances in Medicine and Biology. V.116, Nova Publishers, ISBN 978-1-63482-002-8, pp. 231-255. [citation][year=2016]Metelmann, B., Metelmann, C., "Medical simulation center as a model for testing mHealth concepts in prehospital emergency medicine", Proceedings of the Federated Conference on Computer Science and Information Systems pp. 1423–1426, DOI: 10.15439/2016F540ACSIS, Vol. 8. ISSN 2300-5963 [citation][year=2016]Metelmann, Bibiana, and Camilla Metelmann. "M-Health in Prehospital Emergency Medicine: Experiences from the EU." M-Health Innovations for Patient-Centered Care (2016): 197. [citation][year=2015]Metelmann, Bibiana, and Camilla Metelmann. "Aus der Klinik und Poliklinik für Anästhesiologie, Anästhesie, Intensiv-, Notfall-und Schmerzmedizin (Direktor Univ.-Prof. Dr. med. Klaus Hahnenkamp) der Universitätsmedizin der Ernst-Moritz-Arndt-Universität Greifswald." (Dr. Med Dissertation Thesis, Greiswald University, Germnay, 2015) [citation][year=2014]Chochliouros, Ioannis P., et al. "Modern Video-to-Video Communications to Enhance Citizens’ Quality of Life and Create Opportunities for Growth in “Smart” European Cities." Artificial Intelligence Applications and Innovations. Springer Berlin Heidelberg, 2014. 1-12. [citation][year=2014]Z. Irani, V. Weerakkody, A. Molnar, H. Lee, N. Hindi, I. Osman, "A User Satisfaction Study of the NHS Online Prescription Prepayment Certificate", Health Policy and Technology, Available online 12 June 2014, ISSN 2211-8837, http://dx.doi.org/10.1016/j.hlpt.2014.05.003 [citation][year=2014]Linya Zhong, Xu Min, et al., Application of Video-to-Video Visualization in 120 Pre-hospital Emergency System, China Digital Medicine Journal, 2014(8), doi: 10.3969/j.issn.1673-7571.2014.08.014 [citation][year=2014]Metelmann, C., Metelmann, B., Wendt, M., Meissner, K., & von der Heyden, M. (2014). LiveCity: The Impact of Video Communication on Emergency Medicine. International Journal of Electronic Government Research (IJEGR), 10(3), 47-65. DOI: 10.4018/ijegr.2014070104 [publication]Simões, P. and Tiago Cruz and J. Proenca and Edmundo Monteiro , "Honeypots especializados para Redes de Controlo Industrial", in In Proc. of CIBSI 2013 (Congreso Iberoamericano de Seguridad Informática). ISBN: 978-9962-676-43-0, 2013 [citation][year=2019]Kamlofsky, Jorge & Abdel Masih, Samira & Colombo, Hugo & Milio, Claudio & Hecht, Juan Pedro. (2019). Ciberseguridad en los Sistemas de Control Industrial: Clave para la Ciberdefensa de las Infraestructuras Críticas, in Proc of XXI Workshop de Investigadores en Ciencias de la ComputaciónAt: San Juan, Argentina, maio 2019. [citation][year=2017]J Kamlofsky, SA Masih, H Colombo, D Veiga, E Costa, "Seguridad en Redes las Industriales: Clave para la Ciberdefensa de las Infraestructuras Críticas", in Proc of WICC 2017 - XIX Workshop de Investigadores en Ciencias de la Computación, 27-28 April 2017, Instituto Tecnológico de Buenos Aires (ITBA), Buenos Aires, Argentina. Available at: http://wicc.it.itba.edu.ar/pdf/Libro_WICC_2017_ISBN_978-987-42-5143-5.pdf [citation][year=2016]Kamlofsky, Jorge, et al. "Ciberdefensa en redes industriales." XVIII Workshop de Investigadores en Ciencias de la Computación (WICC 2016, Entre Ríos, Argentina). 2016. [citation][year=2015]Kamlofsky, Jorge, et al. "Ciberdefensa de infraestructuras industriales." XVII Workshop de Investigadores en Ciencias de la Computación (Salta, 2015). 2015. [citation][year=2015]Jorge Kamlofsky, Hugo Colombo, Matías Sliafertas, Juan Pedernera (2015). “Un Enfoque para Disminuir los Efectos de los Ciber-ataques a las Infraestructuras Críticas”. Libro: 3er. Congreso Nacional de Ingeniería Informática / Sistemas de Información CoNaIISI 2015. Organizado por la red de carreras de Ingeniería Informática / Sistemas de Información (RIISIC) perteneciente al CONFEDI. 19 y 20 de Noviembre. UTN, Facultad Regional Buenos Aires. Institución de origen: Facultad de Informática, UNLP. ISBN: 978-987-1896-47-9. [publication]Tiago Cruz and Simões, P. and Cabaço, P. and A. S. Gomes and Edmundo Monteiro and Bastos, F. and Laranjeira, A. , "On the Use of Thin-client Set-Top Boxes for IPTV Services", in 38th Annual IEEE Conf. on Local Computer Networks (LCN 2013), 2013 [citation][year=2017]Anton Dahlin, Enabling Pro-active Problem Management by Predictive Modelling: Data mining and statistical analysis of past problems to enable pro-active actions for Internet Protocol Television, Independent thesis Advanced level (professional degree), KTH School of Information and Communication Technology (ICT), UK, 2017. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-210636 [citation][year=2016]E. S. Jung, J. Bang, Y. T. Lee and W. Ryu, "Power saving with passive standby mode using bitmap-based activity logs for energy-efficient set-top box," in IEEE Transactions on Consumer Electronics, vol. 62, no. 1, pp. 62-68, February 2016. doi: 10.1109/TCE.2016.7448564 [citation][year=2016]Irena Battelino ,"EVOLUTION OF TV CONTENT DELIVERY AND ON-DEMAND VIDEO DELIVERY TO THE END-USER", (Master Thesis), University of Ljubljana, advisor: Dr. Matej Zajc, 2016, https://repozitorij.uni-lj.si/IzpisGradiva.php?id=85504 [citation][year=2015]Suksomboon, Kalika, Masaki Fukushima, and Michiaki Hayashi. "Optimal virtualization of functionality for customer premise equipment." Communications (ICC), 2015 IEEE International Conference on. IEEE, 2015. [publication]Fonseca, H. and Tiago Cruz and Simões, P. and Edmundo Monteiro and Silva, J. and Gomes, P. and Centeio, N. , "Técnicas de classificação e detecção de tráfego para Voice over Internet Protocol (VoIP) (short paper)", in CRC'13, 13ª Conferência sobre Redes de Computadores, 2013 [publication]Francisco, N. and Cabaço, R. and Amilcar Cardoso and Simões, P. , "Application of the Open Archives Initiative protocols in Scientific Articles Databases", in 2013 8th Iberian Conference on Information Systems and Technologies (CISTI), 2013 2012(5 publications) [publication]Henriques, J. and Vitor Bernardo and Simões, P. and Marilia Curado , "VoIP performance over Mobile WiMAX: An Urban Deployment Analysis", in 2nd Baltic Conference on Future Internet and Communications (BCFIC 2012), 25-27 April 2012, Vilnius, Lithuania, 2012 [citation][year=2016]S. Muhi-Aldean, A. Babiker, QoS of VoIP over WiMAX: Compression Review. International Journal of Recent Trends in Engineering & Research (IJRTER), Vol. 02, Issue 09; September 2016 [ISSN: 2455-1457] [citation][year=2016]A. Mohamed Abdalla, A. Babiker Nabi, A. Osman, A QoS Oriented Analysis of ertPS and UGS flows in voice application over WIMAX, Int. Journal of Recent Trends in Engineering & Research (IJRTER), Vol. 02, Issue 08; August 2016 [ISSN: 2455-1457] [citation][year=2014]Morioka, Kazuyuki; Kanada, Naoki; Futatsumori, Shunichi; Kohmura, Akiko; Yonemoto, Naruto; Sumiya, Yasuto; Asano, David, "Experiments of VoIP using WiMAX system and fading simulator with two-path models for aeronautical scenarios," Integrated Communications, Navigation and Surveillance Conference (ICNS), 2014, pp.W2-1,W2-8, 8-10 April 2014, doi: 10.1109/ICNSurv.2014.6820024 [citation][year=2014]P. Singh and R. Kaur, “VOIP Over Wimax: A Comprehensive Review”, International Journal of Computer Science and Information Technologies (IJCSIT), Vol. 5 (4), 2014, 5533-5535. ISSN 0975-9646. [citation][year=2013]Easwaramoorthy, Shalini; Sundararajan, T.V.P., "Enhancing QoS parameters of group mobility model in WiMAX networks for military applications," Computing, Communications and Networking Technologies (ICCCNT), 2013 Fourth Int. pp.1-8, 4-6 July 2013. doi: 10.1109/ICCCNT.2013.6726714 [citation][year=2012]Raghavendra Ganiga, Balachandra Muniyal and Pradeep, "Characteristic Analysis of VoIP Traffic for Wireless Networks in Comparison with CBR using QualNet Network Simulator". International Journal of Computer Applications 50(11):25-31, July 2012. Published by Foundation of Computer Science, New York, USA [publication]Tiago Cruz and Simões, P. and Rodrigues, J. and Edmundo Monteiro and Bastos, F. and Laranjeira, A. , "Using UPnP-CWMP Integration for Operator-assisted Management of Domestic LANs", in IEEE Consumer Communications and Networking Conference - CCNC 2012, 2012 [citation][year=2014]Tsung-Cheng Hou, "Design and Implementation of a Smart Power Meter Control System for Android-based Mobile Devices", Department of Computer Science and Information Engineering, Tamron University, M.Sc Thesis. available at: http://www.airitilibrary.com/Publication/alDetailedMesh?docid=U0002-3006201416173800 [citation][year=2013]Eun-Seo Lee, Hark-Jin Lee, Kwangil Lee, and Jun-Hee Park, “Automating Configuration System and Protocol for Next-Generation Home Appliances”, ETRI Journal, Volume 35, Number 6, December 2013, http://dx.doi.org/10.4218/etrij.13.0113.0216 [publication]Cardoso, A. and Simões, P. , "Cloud Computing and Security", in 11th European Conference on Information Warfare and Security (ECIW'2012), 2012 [citation][year=2014]E. Sitnikova and M. Asgarkhani, "A strategic framework for managing internet security," 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), Xiamen, 2014, pp. 947-955. doi: 10.1109/FSKD.2014.6980967 [publication]Fiorese, A. and Simões, P. and Boavida, F. , "Peer Selection in P2P Service Overlays Using Geographical Location Criteria", in 12th Int. Conf. on Computational Science and Its Applications (ICCSA’2012), 2012 [citation][year=2018]Stefano Sebastio, Michele Amoretti, Alberto Lluch Lafuente, and Antonio Scala. 2018. A Holistic Approach for Collaborative Workload Execution in Volunteer Clouds. ACM Trans. Model. Comput. Simul. 28, 2, Article 14 (March 2018), 27 pages. DOI: https://doi.org/10.1145/3155336 [citation][year=2017]Mahamadou Toure, Fabien Gandon, Kaladzavi Guidedi, Christophe Guéret, Moussa Lô, et al.. Comparaison des Modèles et Architectures pour un Accès Mobile Restreint et Local au Web de Données: Un état de l’art des architectures et solutions envisageables. [Rapport de recherche] RR-9121, INRIA. [citation][year=2015]Ramon Hugo De Souza and Mário Antônio Ribeiro Dantas. 2015. Mapping QoE through QoS in an Approach to DDB Architectures: Research Analysis and Conceptualization. ACM Comput. Surv. 48, 2, Article 31 (November 2015), 41 pages. DOI=http://dx.doi.org/10.1145/2828994 [citation][year=2013]????????? ?????????? (Streaming media data cache based on local supply and demand balance of P2P), ??? (Zheng Weiping), Journal of South China Normal University (Natural Science Edition), Vol. 45, N. 4, July 2013. doi:10.6054/j.jscnun.2013.06.014 [publication]Cardoso, A. and Simões, P. , "Cloud Computing: Concepts, Technologies and Challenges", in Virtual and Networked Organizations, Emergent Technologies and Tools (Springer CCIS 248), 2012 [citation][year=2019]Hayyolalam, V., Pourghebleh, B., Pourhaji Kazem, A.A. et al. Int J Adv Manuf Technol (2019). https://doi.org/10.1007/s00170-019-04213-z [citation][year=2018]Ibtissam M’rhaoaurh, Chafik Okar, Abdelwahed Namir, Nadia Chafiq, Challenges of cloud computing use: A systematic literature review, MATEC Web Conf. (2018) DOI: 10.1051/matecconf/201820000007 [citation][year=2018]Monjur Ahmed & Alan T. Litchfield (2018) Taxonomy for Identification of Security Issues in Cloud Computing Environments, Journal of Computer Information Systems, 58:1, 79-88, DOI: 10.1080/08874417.2016.1192520 [citation][year=2018]Ferrer B., Quelopana A. (2018) Classifying Cloud Computing Challenges: A Taxonomy Proposal. In: Rocha Á., Adeli H., Reis L.P., Costanzo S. (eds) Trends and Advances in Information Systems and Technologies. WorldCIST'18 2018. Advances in Intelligent Systems and Computing, vol 745. Springer, Cham. DOI: 10.1007/978-3-319-77703-0_85 [citation][year=2018]Singh S., Misra S.C. (2019) Challenges to Cloud PLM Adoption. In: Panigrahi C., Pujari A., Misra S., Pati B., Li KC. (eds) Progress in Advanced Computing and Intelligent Engineering. Advances in Intelligent Systems and Computing, vol 714. Springer, Singapore [citation][year=2017]Ramkrushna C. Maheshwar, Bailappa Bhovi, Sagar Jaikar, Software Development Tracking Using Eucalyptus Cloud, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), Volume 6, Issue 11, November 2017, ISSN: 2278 – 1323. [citation][year=2017]Yaghub Pourasad, Zahra Rajab, Zabihollah Jistan, Applications and Challenges of Cloud Computing and check its status in Iran, Bulletin de la Société Royale des Sciences de Liège, Vol. 86, special edition, 2017, pp. 484-493 [citation][year=2016]Radhakrishnan, A., and V. Kavitha. "Energy conservation in cloud data centers by minimizing virtual machines migration through artificial neural network." Computing 98, no. 11 (2016): 1185-1202. doi: 10.1080/08874417.2016.1192520 [citation][year=2016]Ali, Omar Massoud Salim Hassan. "The perceived benefits of cloud computing technology for regional municipal governments and barriers to adoption." PhD diss., University of Southern Queensland, 2016. [citation][year=2016]Ahmed, Monjur, and Alan T. Litchfield. "Taxonomy for identification of security issues in cloud computing environments." Journal of Computer Information Systems (2016): 1-10. [citation][year=2016]Ali, Omar, Jeffrey Soar, Jianming Yong, and Xiaohui Tao. "Factors to be considered in cloud computing adoption." In Web Intelligence, vol. 14, no. 4, pp. 309-323. IOS Press, 2016. DOI: 10.3233/WEB-160347 [citation][year=2015]Omar Ali, Jeffrey Soar, Jianming Yong, An investigation of the challenges and issues influencing the adoption of cloud computing in Australian regional municipal governments, Journal of Information Security and Applications, Available online 11 December 2015, ISSN 2214-2126, http://dx.doi.org/10.1016/j.jisa.2015.11.006. [citation][year=2015]Omar Ali, Jeffrey Soar, Jianming Yong, An Investigation of the Main Factors to be Considered in Cloud Computing Adoption in Australian Regional Local Councils, Journal of Contemporary Issues in Business and Government, Vol 21, No 1 (2015), pp.72-93, http://dx.doi.org/10.7790/cibg.v21i1.23 [citation][year=2012]Yaser Ghanam, Jennifer Ferreira, Frank Maurer, Emerging Issues & Challenges in Cloud Computing— A Hybrid Approach, Journal of Software Engineering and Applications, 2012, 5, 923-937, doi:10.4236/jsea.2012.531107 2011(9 publications) [publication]Matos, F. and Matos, A. and Simões, P. and Edmundo Monteiro , "QoS Adaptation in Inter-Domain Services", in Management of Service Oriented Architectures (ManSOA) - IFIP/IEEE International Symposium on Integrated Network Management (IM), 2011 [citation][year=2013]J Seppänen, M Varela, A Sgora, “Journal of Visual Communication and Image Representation”, Journal of Visual Communication and Image Representation, Wiley, Published online December 2013. http://dx.doi.org/10.1016/j.jvcir.2013.11.010 [citation][year=2013]Quadros, C.; Cerqueira, E.; Neto, A.; Pescape, A.; Riker, A.; Immich, R.; Curado, M., "A quality of experience handover system for heterogeneous multimedia wireless networks," Computing, Networking and Communications (ICNC), 2013 International Conference on , vol., no., pp.1064,1068, 28-31 Jan. 2013. doi: 10.1109/ICCNC.2013.6504239 [citation][year=2013]D. Rosário, E. Cerqueira, A. Neto, Augusto, A. Riker, R. Immich, M. Curado, “A QoE handover architecture for converged heterogeneous wireless networks”, Wireless Networks, pp. 1-16, April 2013. Springer. DOI: 10.1007/s11276-013-0584-y [publication]Fiorese, A. and Simões, P. and Boavida, F. , "Performance Evaluation of Service Searching using Aggregation in Peer-to-Peer Service Overlay Networks", in IFIP/IEEE International Symposium on Integrated Network Management (IM 2011), 2011 [citation][year=2017]J. Nobre, C. Melchiors, C. Marquezan, L. Tarouco, L. Granville, A Survey on the Use of P2P Technology for Network Management, Journal of Network and Systems Management, 2017, doi: 10.1007/s10922-017-9413-4 [publication]Tiago Cruz and Simões, P. and Almeida, J. and Rodrigues, J. and Edmundo Monteiro and Bastos, F. and Laranjeira, A. , "How to Provision and Manage Off-the-Shelf SIP Phones in Domestic and SOHO Environments", in IEEE LCN 2011 (The 35th IEEE Conf. on Local Computer Networks), 2011 [citation][year=2016]OULAHAL, Nordine ; OTT, Jean-Didier , "METHOD FOR ADMINISTERING A PLURALITY OF LOCAL DEVICES", Application EP-3053305-A1. Publication date 2016/08/10. Pending patent request. Available at: https://patents.google.com/patent/EP3053305A1/en [citation][year=2016]OULAHAL, Nordine ; OTT, "METHOD FOR ADMINISTERING A PLURALITY OF LOCAL DEVICES", Patent Application US-20160248621-A1. Publication date 2016/08/25. Available at: https://patents.google.com/patent/US20160248621/ko [citation][year=2015]OULAHAL, Nordine ; OTT, Jean-Didier , "METHOD FOR ADMINISTERING A PLURALITY OF LOCAL DEVICES" , Patent No. WO2015044600, https://patentscope.wipo.int/search/docservicepdf_pct/id00000028663012/PAMPH/WO2015044600.pdf, April 2015. Available at: https://patents.google.com/patent/WO2015044600A1/en [citation][year=2015]OULAHAL, Nordine ; OTT, "METHOD FOR ADMINISTERING A PLURALITY OF LOCAL DEVICES", Patent application FR3011419A1. Publication date 2015/04/03. Pending patent request. Available at: https://patents.google.com/patent/FR3011419A1/en?oq=FR-3011419-A1 [citation][year=2013]Ram?nas Dzindzalieta, "Development of a system for monitoring of the moving objects by using the session initiation protocol", PhD Thesis, Vilnius University, 2013. Available at: https://epublications.vu.lt/object/elaba:2056654/ [publication]Tiago Cruz and Simões, P. and Rodrigues, J. and Edmundo Monteiro and Bastos, F. and Laranjeira, A. , "Outsourced management of home and SOHO desktops", in 7th International Conference on Network and Services Management (CNSM 2011), 2011 [citation][year=2014]44. VAN DE POEL, Dirk; DUMET, Sylvain, "SYSTEM COMPRISING AN END-USER DEVICE AND A SERVICE PROVIDER NETWORK COUPLED VIA A BROADBAND CONNECTION, AND RESPECTIVE END-USER DEVICE", Patent No. WO2014057040, April 2014. [publication]Fiorese, A. and Boavida, F. and Simões, P. , "On the Dimensioning of an Aggregation Service for P2P Service Overlay Networks", in 5th International Conference on Autonomous Infrastructure, Management and Security (AIMS 2011), 2011 [publication]Fiorese, A. and Boavida, F. and Simões, P. , "An Approach to Peer Selection in Service Overlays", in 7th International Conference on Network and Services Management (CNSM 2011), 2011 [citation][year=2015]Mohanjeet Singh, “Divide and Conquer Scheme for Efficient Load Balancing in P2P network”, International Journal of Innovations in Engineering and Technology (IJIET), Volume 6, Issue 2, December 2015. [citation][year=2015]Ramon Hugo De Souza and Mário Antônio Ribeiro Dantas. 2015. Mapping QoE through QoS in an Approach to DDB Architectures: Research Analysis and Conceptualization. ACM Comput. Surv. 48, 2, Article 31 (November 2015), 41 pages. DOI=http://dx.doi.org/10.1145/2828994 [citation][year=2013]Mohanjeet Singh, D.S Dhaliwal, Neeraj Garg, “Multimedia Streaming in Peer-to-Peer: Approaches and Challenges”, International Journal of Emerging Technologies in Computational and Applied Sciences, 3(1), Dec.12-Feb.13, pp. 103-106. [publication]Fiorese, A. and Boavida, F. and Simões, P. , "Selecção de pares em redes de sobreposição usando critérios de localização geográfica", in 11a Conferência Sobre Redes de Computadores (CRC 2010), 2011 [publication]Caldeira, F. and Schaberreiter, T. and Edmundo Monteiro and Aubert, J. and Simões, P. and Khadraoui@tudor.lu, D. , "Trust based interdependency weighting for on-line risk monitoring in interdependent critical infrastructures", in 6th International Conference on Risk and Security of Internet and Systems (CRiSIS), 2011, 2011 [citation][year=2017]R. C. Cardoso, “Enhancing Trustability in MMOGs Environments”, PhD Thesis, Universidade da Beira Interior, Covilhã-Portugal, January 2017 [citation][year=2016]R. C. Cardoso; A. J. P. Gomes; M. M. Freire, "A User Trust System for Online Games – Part I: An Activity Theory Approach for Trust Representation," in IEEE Transactions on Computational Intelligence and AI in Games , vol.PP, no.99, pp.1-1, doi: 10.1109/TCIAIG.2016.2592965 [citation][year=2015]C. Alippi, R. Camplani, A. Marullo, M. Roveri, “Algorithms and Tools for Intelligent Monitoring of Critical Infrastructure Systems”, in Intelligent Monitoring, Control, and Security of Critical Infrastructure Systems, E. Kyriakides, M. Polycarpou (Eds.), pp 167-184, Springer Studies in Computational Intelligence 565, 2015 doi: 10.1007/978-3-662-44160-2_6 [publication]Schaberreiter, T. and Caldeira, F. and Aubert, J. and Edmundo Monteiro and Khadraoui@tudor.lu, D. and Simões, P. , "Assurance and trust indicators to evaluate accuracy of on-line risk in critical infrastructures", in 6th Int. Conf. on Critical Infrastructures Information Security (CRITIS 2011), 2011 2010(15 publications) [publication]Matos, F. and Matos, A. and Simões, P. and Edmundo Monteiro , "A QoS Model for Business Layers", in International Conference on Information Networking (ICOIN), 2010 [publication]Fiorese, A. and Simões, P. and Boavida, F. , "Service Searching Based on P2P Aggregation", in 24th International Conference on Information Networking (ICOIN 2010), 2010 [citation][year=2011]Y. Qiao, and G. Bochmann, “Using Diffusive Load Balancing to Improve Performance of Peer-to-Peer Systems for Hosting Services”, in Managing the Dynamics of Networks and Services (Proceedings of AIMS 2011), LNCS 6734, pp. 124-135, Nancy, France, June 2011, Doi: 10.1007/978-3-642-21484-4_15 [publication]Fiorese, A. and Simões, P. and Boavida, F. , "OMAN - A Management Architecture for P2P Service Ovelay Networks", in 4th International Conference on Autonomous Infrastructure, Management and Security (AIMS 2010), 2010 [citation][year=2017]Mahamadou Toure, Fabien Gandon, Kaladzavi Guidedi, Christophe Guéret, Moussa Lô, et al.. Comparaison des Modèles et Architectures pour un Accès Mobile Restreint et Local au Web de Données: Un état de l’art des architectures et solutions envisageables. [Rapport de recherche] RR-9121, INRIA. [citation][year=2017]J. Nobre, C. Melchiors, C. Marquezan, L. Tarouco, L. Granville, A Survey on the Use of P2P Technology for Network Management, Journal of Network and Systems Management, 2017, doi: 10.1007/s10922-017-9413-4 [citation][year=2011]Al-oqily, I.; Alshtnawi, A.; Al-Aubidy, K.M.; "Towards self-configurable overlay networks," Systems, Signals and Devices (SSD), 2011 8th International Multi-Conference on, vol., no., pp.1-6, 22-25 March 2011, doi: 10.1109/SSD.2011.5767490 [publication]Simões, P. and Capodieci, P. and Minichino, M. and Ciancamerla, E. and Panzieri, S. and Castrucci, M. and Lev, L. , "An Alerting System for Interdependent Critical Infrastructures", in 9th European Conference on Information Warfare and Security (ECIW 2010), 2010 [citation][year=2013]Thomas Schaberreiter, A Bayesian Network Based On-line Risk Prediction Framework for Interdependent Critical Infrastructures, PhD Thesis, University of Oulu, Finland, October 2013. [publication]Caldeira, F. and Castrucci, M. and Aubigny, M. and Macone, D. and Edmundo Monteiro and Rente, F.N. and Simões, P. and Suraci, V. , "Secure Mediation Gateway Architecture Enabling the Communication Among Critical Infrastructures", in Future Network and MobileSummit 2010 Conference, 2010 [citation][year=2017]A. Di Giorgio, A. Giuseppi, F. Liberali, A. Ornatelli, A. Rabezzano and L. R. Celsi, "On the optimization of energy storage system placement for protecting power transmission grids against dynamic load altering attacks," 2017 25th Mediterranean Conference on Control and Automation (MED), Valletta, Malta, 2017, pp. 986-992. doi: 10.1109/MED.2017.7984247 [citation][year=2017]A. Di Giorgio, A. Giuseppi, F. Liberati and A. Pietrabissa, "Controlled electricity distribution network black start with energy storage system support," 2017 25th Mediterranean Conference on Control and Automation (MED), Valletta, Malta, 2017, pp. 781-786. doi: 10.1109/MED.2017.7984213 [citation][year=2016]Titus Okathe, Shahram Shah Heydari, Vijay Sood, Orane Cole and Khalil El-Khatib, Miffleware for Smart Heterogeneous Critical Infrastructure Networks Intercommunication, International Journal on Smart Sensing and Intelligent Systems, pp. 1261-1286, V.9, N.3, September 2016 [citation][year=2014]Titus Okathe, Publish-subscribe based Middleware for Heterogeneous Critical Infrastructure Systems Communication, PhD Thesis, University of Ontario Institute of Technology, July 2014. [citation][year=2014]Okathe, Titus; Heydari, Shahram Shah; Sood, Vijay; El-Khatib, Khalil, "Unified multi-critical infrastructure communication architecture," Communications (QBSC), 2014 27th Biennial Symposium on, vol., no., pp.178,183, 1-4 June 2014, doi: 10.1109/QBSC.2014.6841209 [citation][year=2013]Pingal Raj Sapkota, “Security Evaluation of Substation Network Architectures, MSc Thesis, Michigan Technological University, 2013. http://digitalcommons.mtu.edu/etds/647/ [publication]Matos, F. and Matos, A. and Simões, P. and Edmundo Monteiro , "A Service Composition Approach for Inter-Domain Provisioning", in 6th International Conference on Network and Services Management (CNSM), 2010 [publication]Fiorese, A. and Simões, P. and Boavida, F. , "An Aggregation Scheme for the Optimisation of Service Search in Peer-to-Peer Overlays", in 6th International Conference on Network and Services Management (CNSM 2010), 2010 [publication]Fiorese, A. and Simões, P. and Boavida, F. , "Avaliação de Desempenho da Busca de Serviços usando Agregação em P2P Service Overlay Networks", in 10a Conferência sobre Redes de Computadores (CRC 2010), 2010 [publication]Simões, P. and Capodieci, P. and Minichino, M. and Panzieri, S. and Castrucci, M. and Lev, L. , "MICIE: An Alerting Framework for Interdependent Critical Infrastructures", in Towards a Service-Based Internet (3rd European Conf. ServiceWave 2010), 2010 [publication]Tiago Cruz and Simões, P. and Batista, P. and Almeida, J. and Edmundo Monteiro and Bastos, F. , "Gestão de Redes Domésticas com Agentes CWMP Extensíveis", in 10ª Conferência sobre Redes de Computadores (CRC 2010), 2010 [publication]Tiago Cruz and Simões, P. and Batista, P. and Almeida, J. and Edmundo Monteiro and Bastos, F. , "CWMP Extensions for Enhanced Management of Domestic Network Services", in IEEE LCN 2010 (The 35th IEEE Conf. on Local Computer Networks), 2010 [citation][year=2018]Jian-Hong Wang, Chi-Chun Chen, Hsing-Wen Wang, Grouping and time-series notifying of periodic data in a real-time streaming system for smart toy claw machine, Journal of Systems Architecture, 2018, https://doi.org/10.1016/j.sysarc.2018.08.009. [citation][year=2016]Kuen-Min, L., "Toward Optimizing System Capabilities in a CWMP Network", PhD Thesis, Department of Engineering Science, Kung University, China, 2016, Available at: http://www.airitilibrary.com/searchdetail.aspx?DocIDs=U0026-2706201617101000 [citation][year=2015]Chien-Cheng Lai - ID 665452, "IP multimedia in home networks – DLNA and UPnP", Melbourne School of Engineering The University of Melbourne - Multimedia Content Delivery (ELEN90014) Project. Available at: https://www.slideshare.net/JamesLai10/upnp-and-dlna-in-the-home-network-v2 [citation][year=2014]Ivana Savic, Milan S. Savic, Gordana Velikic, “Implementation of TR-069 connection request mechanism”, X International Symposyum on Industrial Electronics INDEL 2014, Banja Luka, Nov. 2014. [citation][year=2014]Nie, Hua; Zhou, Xue; Ni, Yalu; Yang, Xiaojun; Long, Keping, "Design and Implementation of a Virtualized Storage Fabric for Cloud Server," Networking, Architecture, and Storage (NAS), 2014 9th IEEE International Conference on , vol., no., pp.103,107, 6-8 Aug. 2014, doi: 10.1109/NAS.2014.23 [citation][year=2014]K.M. Lee; H. Chu; J. Chu; Y. Lin; C. Hsiao; T.W. Hou, “ACS management capacity enhancement mechanism in CWMP”, Institution of Engineering and Technology, Electronics Letters, available online 08 January 2014, DOI: 10.1049/el.2013.1385 [citation][year=2014]Milan Z. Bjelica, Istvan Papp, Nikola Teslic, Diagnostic CWMP Client for Set-Top Box Devices, Proc. of 2014 IEEE Int. Conf. on Consumer Electronics (ICCE), pp. 464-465, DOI: 10.1109/ICCE.2014.6776088. [citation][year=2014]Matheus, Christopher & Boran, Aidan & Carr, Dominic & Collier, Rem & Kroon, Barnard & Murdoch, Olga & Lillis, David & O'Hare, Gregory & O’Grady, Michael. (2014). "Semantic Network Management for Next Generation Networks". Computational Intelligence. 10.1111/coin.12180. [citation][year=2013]Bjelica, Milan Z.; Papp, Istvan; Draskovic, Svetozar; Perisic, Stevan; Maksovic, Vladimir, "Digital TV device extensions for remote monitoring, configuration and diagnostics," Telecommunications Forum (TELFOR), 2013 21st , vol., no., pp.987,990, 26-28 Nov. 2013. doi: 10.1109/TELFOR.2013.6716397 [citation][year=2013]Savic, Milan; Papp, Istvan; Resetar, Ivan; Majstorovic, Dusan; Spasojevic, Danijel, "Implementation of server push mechanism based on TR-069 and TR-111 protocols for network device management," Telecommunications Forum (TELFOR), 2013 21st , vol., no., pp.361,364, 26-28 Nov. 2013. doi: 10.1109/TELFOR.2013.6716244 [citation][year=2012]Christopher J. Matheus, Aidan Boran, Dominic Carr, Rem Collier, Barnard Kroon, Olga Murdoch, Gregory M. P. O’Hare, Michael O’Grady,” Semantic Network Monitoring and Control over Heterogeneous Network Models and Protocols”, Active Media Technology (Proceedings of the 8th International Conference, AMT 2012, Macau, China, December 4-7, 2012), Springer LNCS 2012, pp.433-444, December 2012, DOI: 10.1007/978-3-642-35236-2_43 [publication]Tiago Cruz and Simões, P. and Bastos, F. and Edmundo Monteiro , "Integration of PXE-based Desktop Solutions into Broadband Access Networks", in 6th International Conference on Network and Services Management (CNSM), 2010 [citation][year=2018]Wu, D., Wang, L., Chen, G."A linux cluster automatic deployment method under x86 architecture" (2018), in Proc. of 2nd International Conference on Computer Science and Application Engineering (CSAE 2018), Hohhot, China, 22 -24 October 2018, art. no. 126, ACM International Conference Proceeding Series. DOI: 10.1145/3207677.3278096 [citation][year=2017]Wang Xuefei, Yu Haiying, Wu Hongbing, "Research on Data Erasing System Based on PXE and Its Application in Military Field", "Microcomputer and Application" 2017, No. 2 1-4, Available at: http://www.cqvip.com/QK/95939X/201702/671103819.html. [citation][year=2017]Xiong, Yonghua and She, Jinhua and Jiang, Keyuan, "A Lightweight Approach to Access to Wireless Network without Operating System Support", in Intelligent Automation & Soft Computing, pp 1-9, Taylor & Francis, February 2017. ISBN:1079-8587; DOI: 10.1080/10798587.2017.1280262 [citation][year=2016]Demis Gomes, Nichene Verçosa, Victor Medeiros e Glauco Gonçalves, "Plataforma de áreas de trabalho virtuais escalável para nuvens privadas", Anais do XIV Workshop de Computação em Clouds e Aplicações (WCCA’2016, co-located with SBRC’2016); Porto Alegre, Brazil, SBC, 2016 [citation][year=2016]Jiang; Jiaping, "Protection method and system for computer security ", Celestica Technology Consultancy, US Patent 9,230,093, available at: http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=/netahtml/PTO/srchnum.htm&r=1&f=G&l=50&s1=9230093.PN.&OS=PN/9230093 [citation][year=2014]24. VAN DE POEL, Dirk; DUMET, Sylvain, "SYSTEM COMPRISING AN END-USER DEVICE AND A SERVICE PROVIDER NETWORK COUPLED VIA A BROADBAND CONNECTION, AND RESPECTIVE END-USER DEVICE" , Patent No. WO2014057040, April 2014. [citation][year=2014]Nie, Hua; Zhou, Xue; Ni, Yalu; Yang, Xiaojun; Long, Keping "Design and Implementation of a Virtualized Storage Fabric for Cloud Server", Networking, Architecture, and Storage (NAS), 2014 9th IEEE International Conference on, On page(s): 103 - 107 [citation][year=2012]A. Ravi, R. Venkatakrishnan, and B. Kannan, Cloud Based Remote Infrastructure Management, International Journal of Computer Theory and Engineering, Vol. 4, No. 6, December 2012, [citation][year=2012]Peng Ren-ming, Li Min, “Remote Data Sanitization System Based on PXE Network”, Journal of Chongqing Normal University, Vol. 29, Issue: 6, pp. 59-63, ISSN 16726693, 2012. [citation][year=2012]A. Ravi, R. Venkatakrishnam, “Multi-level Kick Start Server”, International Journal of Computer Theory and Engineering, Vol.5 N.2, pp. 197-200, April 2013, DOI: 10.7763/IJCTE.2013.V5.677. [citation][year=2011]Schmelzer, Sebastian; von Suchodoletz, Dirk; Schneider, Gerhard; Weingaertner, Daniel; de Bona, Luis Carlos E.; Carvalho, Carlos, "Universal remote boot and administration service," Network Operations and Management Symposium (LANOMS), 2011 7th Latin American, vol., no., pp.1-6, 10-11 Oct. 2011. [citation][year=2011]Chun-Wei Chen, Remote Computer Automatic Installation Management System?Take Computer Classrooms Management as an Example, MSc Thesis. Information Management Institute, Shih Hsin University, Taiwan, 2011. [publication]Caldeira, F. and Edmundo Monteiro and Simões, P. , "Trust and Reputation Management for Critical Infrastructure Protection", in Proc. of the 6th Int. Conf. on Global Security, Safety and Sustainability (ICG3S 2010), 2010 [citation][year=2015]M. Asad, C. A. Le Dantec, Illegitimate Civic Participation: Supporting Community Activists on the Ground, CSCW '15, March 14 – 18, 2015, Vancouver, BC, Canada. DOI: 10.1145/2675133.2675212 [publication]Caldeira, F. and Edmundo Monteiro and Simões, P. , "Trust and Reputation for Information Exchange in Critical Infrastructures", in Proc. of the 5th Int. Conf. on Critical Information Infrastructure Security (CRITIS 2010), 2010 [citation][year=2019]Thomas Schaberreiter, Veronika Kupfersberger, Konstantinos Rantos, Arnolnt Spyros, Alexandros Papanikolaou, Christos Ilioudis, and Gerald Quirchmayr. 2019. A Quantitative Evaluation of Trust in the Quality of Cyber Threat Intelligence Sources. In Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES '19). ACM, New York, NY, USA, Article 83, 10 pages. DOI: https://doi.org/10.1145/3339252.3342112 [citation][year=2019]Asad, Mariam. "Sculpting reality from our dreams: prefigurative design for civic engagement." PhD diss., Georgia Institute of Technology, 2019. [citation][year=2015]Mariam Asad and Christopher A. Le Dantec. 2015. Illegitimate Civic Participation: Supporting Community Activists on the Ground. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW '15). ACM, New York, NY, USA, 1694-1703. DOI=http://dx.doi.org/10.1145/2675133.2675156 [publication]Capodieci, P. and Ciancamerla, E. and Minichino, M. and Landi, G. and Lev, L. and Castrucci, M. and Simões, P. and Panzieri, S. and Caldeira, F. , "Improved Resilience of Interdependent Critical Infrastructures via on-line Alerting System", in Proceedings of COMPENG 2010 - Complexity in Engineering, 2010 [citation][year=2018]Giuseppi, Alessandro & Germanà, Roberto & Di Giorgio, Alessandro. (2018). Risk Adverse Virtual Power Plant Control in Unsecure Power Systems. 1-9. 10.1109/MED.2018.8442768. [citation][year=2017]A. Di Giorgio, A. Giuseppi, F. Liberali, A. Ornatelli, A. Rabezzano and L. R. Celsi, "On the optimization of energy storage system placement for protecting power transmission grids against dynamic load altering attacks," 2017 25th Mediterranean Conference on Control and Automation (MED), Valletta, Malta, 2017, pp. 986-992. doi: 10.1109/MED.2017.7984247 [citation][year=2017]A. Di Giorgio, A. Giuseppi, F. Liberati and A. Pietrabissa, "Controlled electricity distribution network black start with energy storage system support," 2017 25th Mediterranean Conference on Control and Automation (MED), Valletta, Malta, 2017, pp. 781-786. doi: 10.1109/MED.2017.7984213 [citation][year=2016]Titus Okathe, Shahram Shah Heydari, Vijay Sood, Orane Cole and Khalil El-Khatib, Miffleware for Smart Heterogeneous Critical Infrastructure Networks Intercommunication, International Journal on Smart Sensing and Intelligent Systems, pp. 1261-1286, V.9, N.3, September 2016 [citation][year=2015]A. Fiaschetti, A. Lanna, M. Panfili, S. Mignanti, A. Pietrabissa, F. Delli Priscoli, R. Cusani, G. Scarano, A. Morgagni, “Attack-Surface metrics, OSSTMM and Common Criteria based approach to Composable Security in Complex Systems”, WSEAS Transactions on Systems, Vol. 14, 2015, pp. 187-202, E-ISSN: 2224-2678. [citation][year=2015]S. Battilotti, F. Delli Priscoli, C. Gori Giorgi, A. Pietrabissa, S. Monaco, M. Panfili, S. Canale, V. Suraci, Approaches for Future Internet architecture design and Quality of Experience (QoE) Control, WSEAS Transactions on Communications, Vol.14, pp. 62-73, 2015. E-ISSN: 2224-2864. [citation][year=2015]Gambuti, Raffaele; Canale, Silvia; Facchinei, Francisco; Lanna, Andrea; Giorgio, Alessandro Di, "Electric vehicle trip planning integrating range constraints and charging facilities," Control and Automation (MED), 2015 23th Mediterranean Conference on, vol., no., pp.472-479, 16-19 June 2015 doi: 10.1109/MED.2015.7158793 [citation][year=2014]Titus Okathe, Publish-subscribe based Middleware for Heterogeneous Critical Infrastructure Systems Communication, PhD Thesis, University of Ontario Institute of Technology, July 2014. [citation][year=2014]Okathe, T.; Heydari, S.S.; Sood, V.; El-Khatib, K., "Unified multi-critical infrastructure communication architecture," Communications (QBSC), 2014 27th Biennial Symposium on , vol., no., pp.178,183, 1-4 June 2014 doi: 10.1109/QBSC.2014.6841209 [citation][year=2013]Jianmin Jiang, Lasith Yasakethu, Intelligent risk detection and analysis tools for critical infrastructure protection, EUROCON, 2013 IEEE, pp.52-59, 1-4 July 2013, doi: 10.1109/EUROCON.2013.6624965 [citation][year=2013]Jianmin Jiang, Lasith Yasakethu, Computerized risk detection towards Critical Infrastructure Protection: An Introduction of CockpitCI Project, Proc. of the 1st Global Virtual Conference, pp. 602-606, Fyr, Macedonia, 8-12 April 2013, ISBN 978-80-554-0649-7 [citation][year=2010]Michael Kennedy, David Llewellyn-Jones, Qi Shi, Madjid Merabti, "System-of-Systems Security: A Survey", The 11th Annual Conference on the Convergence of Telecommunications, Networking & Broadcasting (PGNet 2010), Liverpool, UK, 21-22 June 2010 2009(9 publications) [publication]Fiorese, A. and Simões, P. and Boavida, F. , "A P2P-based Approach to Cross-Domain Network and Service Management", in 3rd International Conference on Autonomous Infrastructure, Management and Security (AIMS 2009), 2009 [citation][year=2017]J. Nobre, C. Melchiors, C. Marquezan, L. Tarouco, L. Granville, A Survey on the Use of P2P Technology for Network Management, Journal of Network and Systems Management, 2017, doi: 10.1007/s10922-017-9413-4 [citation][year=2012]Byungjoon Lee, Youhyeon Jeong, Hoyoung Song, and Youngseok Lee, “An NMS Architecture for Large-scale Networks”, Proceedings of SoftTech 2012 - 1st International Conference on Software Technology, Cebu, Philippines, May 29-31, 2012. [citation][year=2012]Clarissa Cassales Marquezan, Lisandro Zambenedetti Granville, Self-* and P2P for Network Management: Design Principles and Case Studies, Springer (2012), DOI: 10.1007/978-1-4471-4201-0. [citation][year=2011]Patrik Moravek, Dan Komosnya, Radim Burgeta, Jaroslav Svedaa, Tomas Handla, and Lucie Jarosovaa, Study and performance of localization methods in IP based networks: Vivaldi algorithm, Journal of Network and Computer Applications, Volume 34, Issue 1, January 2011, Pages 351-367. [citation][year=2011]Duarte, P.A.P.R.; Nobre, J.C.; Granville, L.Z.; Tarouco, L.M.R.;, "A P2P-Based self-healing service for network maintenance," Integrated Network Management (IM), 2011 IFIP/IEEE International Symposium on , vol., no., pp.313-320, 23-27 May 2011. [citation][year=2010]Nobre, Jéferson Campos. "Manutenção da consistência do estado dos dados de gerenciamento em sistemas de gerenciamento autonômico baseados em infraestruturas peer-to-peer." Tese de Mestrado, Universidade Federal de Rio Grande do Sul, Brasil (2010). [citation][year=2010]Kálmán György Graffi: Monitoring and Management of Peer-to-Peer Systems. Technische Universität Darmstadt (Ph.D. Thesis), 2010. [citation][year=2010]Patrik Morávek et al., LOKALIZAČNÍ METODY V IP SÍTÍCH: ALGORTIMUS VIVALDI V SYSTÉMU 2D S VÝŠKOU, ElektroRevu 2010/4, ISSN 1213-1539, Janeiro de 2010. [citation][year=2010]B. Lee, Y. Jeong, H. Song Y. Lee, A Scalable and Highly Available Network Management Architecture on Consistent Hashing, Proceedings of Globecom 2010, IEEE Press. [publication]Tiago Cruz and Leite, T. and Batista, P. and Vilão, R. and Simões, P. and Bastos, F. and Edmundo Monteiro , "How to Cooperatively Improve Broadband Security", in In Proc. of European Conference on Information Warfare and Security (ECIW 2009). ISBN: 978-1-906638-35-1, 2009 [publication]Matos, A. and Matos, F. and Simões, P. and Edmundo Monteiro , "An IPSec Mediation Approach for Safe Establishment of Inter-domain VPNs", 2009 [publication]Tiago Cruz and Leite, T. and Batista, P. and Vilão, R. and Simões, P. and Bastos, F. and Edmundo Monteiro , "Um IDS Cooperativo para Redes de Acesso de Banda Larga", in in Proc. of CIBSI 2009 (Congreso Iberoamericano de Seguridad Informática), Montevideo, Uruguai. ISBN: 978-9974-0-0593-8., 2009 [publication]Capodieci, P. and Lev, L. and Shneck, Y. and Ciancamerla, E. and Minichino, M. and Diblasi, S. and C.Foglietta, . and Panzieri, S. and Deporcellinis, S. and Lefevre, D. and Castrucci, M. and Suraci, V. and Simões, P. , "From heterogeneous modeling and analysis to an on line prediction tool to improve QoS of interdependent networks", 2009 [publication]Vilão, R. and Simões, P. and Tiago Cruz and Bastos, F. and Edmundo Monteiro , "Avaliação Empírica de um IDS Distribuído para Redes de Acesso de Banda Larga", in Actas da 9ª ConfeRência sobre Redes de Computadores (CRC-2009) - AR:60%, 2009 [publication]Leite, T. and Tiago Cruz and Simões, P. and Bastos, F. and Edmundo Monteiro , "Uma Plataforma para Gestão de Configurações em Redes de Banda Larga", in Actas da 9ª Conferência sobre Redes de Computadores (CRC-2009) - AR:60%, 2009 [publication]Fiorese, A. and Simões, P. and Boavida, F. , "Um Serviço de Agregação baseado em P2P para a Gestão de Redes e Serviços", in 9a Conferência sobre Redes de Computadores (CRC 2009), 2009 [publication]Tiago Cruz and Leite, T. and Batista, P. and Vilão, R. and Simões, P. and Bastos, F. and Edmundo Monteiro , "Scalable Approach to Data Collection in Broadband Access Networks", in in Proc. of 8th International Conference on Decision Support for Telecommunications and Information Society (DSTIS), ISBN: 9781622760046, 2009 2008(5 publications) [publication]Matos, A. and Matos, F. and Simões, P. and Edmundo Monteiro , "A Framework for the establishment of inter-domain, on-demand VPNs", in IEEE/IFIP Network Operations and Management Symposium (NOMS 08), 2008 [citation][year=2011]Ines Houidi, Wajdi Louati, Walid Ben Ameur, Djamal Zeghlache, Virtual network provisioning across multiple substrate networks, Computer Networks, Volume 55, Issue 4, 10 March 2011, pp. 1011-1023, ISSN 1389-1286, 10.1016/j.comnet.2010.12.011. [citation][year=2009]Gilles Bertrand, Mécanismes de routage inter-domaine multi-critère. Vers des services inter-opérateurs à performances garanties. Thése Presenté à L"Ecole Nationale Supérieure des Télécommunications de Bretagne Pour Obtenir le grade de Docteur, 8 Décembre 2009. [citation][year=2009]R. Ravi and S. Veeramani, PROVISIONING RESTORABLE ALGORITHM WITH QOS IN VIRTUAL PRIVATE NETWORKS USING GLP TOPOLOGY GENERATION MODEL OF WIRED NETWORKS, Proceedings of 1st Geomatrix National conference on Geospatial (GeoMatrix 2009), February 28th - March 1st, 2009, IIT Bombay, India. [publication]Simões, P. and Neves, P. and Castellano, M. and Tamea, G. and Landi, G. and Marchetti, I. and Pentikousis, K. and Mignanti, S. and Cimmino, A. and Andreotti, F. and Spada, M.R. , "WEIRD Testbeds with fixed and mobile WiMAX technology for user applications, telemedicine and monitoring of impervious areas", in 4th International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TRIDENTCOM), 2008 [citation][year=2017]Muhammad Imran Tariq, On Experimental Assessment of Wireless Network Technologies, PhD Thesis, School of Information Science, Japan Advanced Institute of Science and Technology, March 2017, http://hdl.handle.net/10119/14250. [citation][year=2015]R. Beuran, M. I. Tariq, S. Miwa and Y. Shinoda, Wireless Network Performance Evaluation through Emulation: WiMAX Case Study, Proc. of 29th Int. Conf. on Information Networking (ICON’2015), pp. 265-270, January 2015, [citation][year=2014]Kalpana Chaudhari, P.T. Karule, How to Improve Role of Information and Communication Technology for Health Care in Maharashtra State, International Journal of Advanced Research in Science, Engineering and Technology, Vol. 1, Issue 3, October 2014, ISSN: 2350-0328 [citation][year=2014]M. I. Tarik, R. Beuran and Y. Shinoda, Ns-3 Based WiMAX Emulation System, Proc. of APWiMob 2014, pp. 346-352, Bali, 28-30 August 2014, 978-1-4799-3711-0/14 [citation][year=2013]Elechi Onyekachi O. and Eze Elias C., Investigating the QoS of Voice over IP using WiMAX Access Networks in a Campus Network, Computer Engineering and Intelligent Systems, Vol.4, No.5, 2013. [citation][year=2012]Borraz, Fernando. Las tecnologías de la información y el cambio climático en países en desarrollo. No. 010334. UNIVERSIDAD NACIONAL DE COLOMBIA SEDE MEDELLIN, 2012. [citation][year=2011]Karanasios, S. T. A. N. "New & emergent ICTs and climate change in developing countries." Center for Development Informatics. Institute for Development Policy and Managment, SED. University of Manchester (2011). [citation][year=2011]Uludag, S., Imboden, T. and Akkaya, K. (2011), A taxonomy and evaluation for developing 802.11-based wireless mesh network testbeds. International Journal of Communication Systems. July 2011, doi: 10.1002/dac.1299. [citation][year=2011]O. Font-Bach, N. Bartzoudis, A. Pascual-Iserte, D. López Bueno, A real-time MIMO-OFDM mobile WiMAX receiver: Architecture, design and FPGA implementation, Computer Networks, Volume 55, Issue 16, 10 November 2011, Pages 3634-3647, ISSN 1389-1286, 10.1016/j.comnet.2011.02.018. [citation][year=2010]Shie-Yuan Wang; Lin, C.C.; Koo, P.H.; Huang, Y.M.; Jen-Shun Yang; , "NCTUns emulation testbed for evaluating real-life applications over WiMAX networks," Personal Indoor and Mobile Radio Communications (PIMRC), 2010 IEEE 21st International Symposium on , vol., no., pp.2030-2034, 26-30 Sept. 2010. doi: 10.1109/PIMRC.2010.5671582 [citation][year=2010]Elankayer Sithirasenan and Nasser Almahdouri.. “Using WiMAX for effective business continuity during and after disaster”. In Proc. of the 6th Int. Wireless Communications and Mobile Computing Conference (IWCMC'10). ACM, NY, USA, 494-498. DOI=10.1145/1815396.1815511 [citation][year=2010]Krichene, N. and Boudriga, N. (2010) QoS in Mobile WiMAX, in WiMAX Security and Quality of Service: AN End-to-End Perspective (eds S.-Y. Tang, P. Müller and H. R. Sharif), John Wiley & Sons, Ltd, Chichester, UK. doi: 10.1002/9780470665749.ch6 [citation][year=2010]O. Font, N. Bartzoudis, A. Pascual-Iserte, D. López, “Design, Implementation and Testing of a Real-Time Mobile WiMAX Testbed Featuring MIMO Technology”, TridentCom 2010, 18-20 May 2010, Berlin, Germany [citation][year=2009]Seruffo, M. C. R. ; Machado, V. A. ; Silva, M. S. ; Cardoso, D. L. ; Frances, C. R. L. ; Costa, João . Wi-MAX como Canal de Interatividade para o Sistema Brasileiro de TV Digital na Amazônia, 2009, Bauru - SP. 1o Simpósio Internacional de Televisão Digital, 2009. [publication]Martufi, G. and Katz, M. and Neves, P. and Marilia Curado and Castrucci, M. and Simões, P. and Pentikousis, K. and Piri, E. , "Extending WiMAX to New Scenarios: Key Results on System Architecture and Test-beds of the WEIRD Project", in 2nd European Symposium on Mobile Media Delivery (EUMOB), 2008 [citation][year=2015]L. Iacobelli, G. Panza et al., “An architecture for m-health services: The CONCERTO project solution", 2015 European Conf. on Networks and Communications (EuCNC), pp.118-122, June 29-July 2 2015. doi: 10.1109/EuCNC.2015.7194052 [citation][year=2015]Anita Mishra, NehaMarria, Harsukhpreet Singh, Performance Evaluation of WIMAX Network with High QOS Services Incorporating Different Physical & Mac Layer Standards, Int. Journal of Application or Innovation in Engineering & Management (IJAIEM), Vol. 4, Issue 4, April 2015, ISSN 2319-4847. [citation][year=2013]Ibrahim A. Lawal, Abas Md Said and Abubakar Aminu Mu’azu, Simulation Model to Improve QoS Performance over Fixed WiMAX using OPNET, Research Journal of Applied Sciences, Engineering and Technology 6(21): 3933-3945, 2013, ISSN: 2040-7459 [citation][year=2012]Syuhada, Aini, Md Zain, Abid Yahya, Mohd Fareq Abd Malek, and Normaliza Omar. "3GPP Long Term Evolution and its application for healthcare services." In Computer and Communication Engineering (ICCCE), 2012 International Conference on, pp. 239-243. IEEE, 2012. [citation][year=2010]Maria G. Martini and Chaminda T. E. R. Hewage, Flexible Macroblock Ordering for Context-Aware Ultrasound Video Transmission over Mobile WiMAX, International Journal of Telemedicine and Applications, Volume 2010 (2010), Article ID 127519 (doi:10.1155/2010/127519) [citation][year=2010]Elankayer Sithirasenan and Nasser Almahdouri.. “Using WiMAX for effective business continuity during and after disaster”. In Proc. of the 6th Int. Wireless Communications and Mobile Computing Conference (IWCMC'10). ACM, NY, USA, 494-498. DOI=10.1145/1815396.1815511 [citation][year=2009]D Ladeira, LM Correia, S Sweet, "Strategic Applications Agenda?, Report of the eMobility Working Group, July, 2009. [citation][year=2008]Maria G. Martini, "Wireless Broadband Multimedia Health Services: Current Status and Emerging Concepts?, in Proc. IEEE Personal Indoor and Mobile Radio Communications (PIMRC), Cannes, France, September, 2008. [publication]Marilia Curado and Sousa, B. and Ribeiro, L.M. and Jorge Sá Silva and Simões, P. and Boavida, F. and Edmundo Monteiro and Viegas, D.X. , "Utilização da Tecnologia WIMAX na Prevenção de Incêndios", in 5º Congresso Luso-Moçambicano de Engenharia, 2008 [publication]Tiago Cruz and Leite, T. and Batista, P. and Vilão, R. and Bastos, F. and Simões, P. and Edmundo Monteiro , "Segurança em Redes de Acesso Triple-Play", in 4ª Conferência Nacional sobre Segurança Informática nas Organizações (SINO 2008), 2008 2007(2 publications) [publication]Neves, P. and Simões, P. and Gomes, Á. and Ribeiro, L.M. and Sargento, S. and Fontes, F. and Edmundo Monteiro and Thomas Michael Bohnert , "WiMAX for Emergency Services: An Empirical Evaluation", in 1st Broadband Wirless Access Workshop, 2007 [citation][year=2016]Juwita Mohd Sultan, “Hybrid Wireless Broadband Networks”, PhD Thesis, Lancaster University 2016. [citation][year=2015]Roberto Magana-Rodriguez, Salvador Villarreal-Reyes, Alejandro Galaviz-Mosqueda, Raul Rivera-Rodriguez, Roberto Conte-Galvan, “Telemedicine Services over Rural Broadband Wireless Access Technologies: IEEE 802.22/WRAN and IEEE 802.16 WiMAX”, Mobile Health, Springer Series in Bio-/Neuroinformatics Volume 5, 2015, pp 743-769, doi: 10.1007/978-3-319-12817-7_32 [citation][year=2015]SC Lubobya, ME Dlodlo, G de Jagar, A Zulu, “Performance Evaluation of WiMAX-Wi-Fi Video Surveillance System”, Global Summit and Expo on Multimedia & Application, UK, March 2015. [citation][year=2015]Theophilus Anafo, Link Level Performance Evaluation of Relay-based WiMAX Network, MSc Thesis, KWAME NKRUMAH UNIVERSITY OF SCIENCE AND TECHNOLOGY, Kumasi, Ghana, June 2015. [citation][year=2014]Wechtaisong, Chitapong; Sutthitep, Teeraphant; Prommak, Chutima, "Multi-objective planning and optimization for base station placement in WiMAX network," Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON), 2014 11th International Conference on , vol., no., pp.1,4, 14-17 May 2014. doi: 10.1109/ECTICon.2014.6839801 [citation][year=2012]Chutima Prommak and Chitapong Wechtaison, Network Planning and Optimization for Multi-Hop Relay Placement in WiMAX Networks, Journal of Computer Science 8 (9): 1414-1421, 2012, ISSN 1549-3636. [citation][year=2011]Hai Dang Nguyen, Deployment & Scheduling in Wimax with Relays - IEEE802.16j, PhD Thesis, Université d'Evry Val-d'Essonne, July 2011. [citation][year=2011]Qadeer, A.; Khan, K. "Pre-Coordination mechanism for self configuration of neighborhood cells in mobile Wi-Max", Application of Information and Communication Technologies (AICT), 2011 5th International Conference on, 10.1109/ICAICT.2011.6110976 [citation][year=2011]Chutima Prommak and Chitapong Wechtaison, “On the Quality of Service Optimization for WiMAX Networks Using Multi-hop Relay Stations”, V. Snasel, J. Platos and E. El-Qawasmeh (Eds.): ICDIPC 2011, Part II, Springer-Verlag CCIS 189, pp. 93-106, 2011. [citation][year=2010]Ali Mohammed Al-Sharafi, Adham M.Jaffar, Abdullah Ali Salem and Abdussalam Mahyob ghaleb, Simulation of WIMAX Emergency Backup Communication Network Using NS2, Proc. of The International Arab Conference on Information Technology (ACIT’2010), Benghazi, Lybia, December 2010. [citation][year=2010]Chutima Prommak, Chitapong Wechtaison, WiMAX Network Design and Optimization Using Multi-hop Relay Stations, Proceedings of the 10th WSEAS Conference (ISBN: 978-960-474-216-5). [citation][year=2010]P. Delannoy, H.D. Nguyen, M. Marot, N. Agoulmine, M. Becker, WiMax quality-of-service estimations and measurement, Computer Communications, Volume 33, Supplement 1, Special Issue: Heterogeneous Networks: Traffic Engineering and Performance Evaluation, 15 November 2010, Pages S71-S77, ISSN 0140-3664, DOI: 10.1016/j.comcom.2010.07.004. [citation][year=2010]Chutima Prommak and Chitapong Wechtaison, WiMAX Network Design for Cost Minimization and Access Data Rate Guarantee Using Multi-hop Relay Stations, Int. Journal of Communications, Issue 2, Volume 4, 2010. [citation][year=2010]Elankayer Sithirasenan and Nasser Almahdouri.. “Using WiMAX for effective business continuity during and after disaster”. In Proc. of the 6th Int. Wireless Communications and Mobile Computing Conference (IWCMC'10). ACM, NY, USA, 494-498. DOI=10.1145/1815396.1815511 [citation][year=2010]Chutima Prommak, Chitapong Wechtaison, “WiMAX Network Design and Optimization Using Multi-hop Relay Stations”, New Aspects of Applied Informatics, Biomedical Electronics & Informatics and Communications, ISSN: 1792-460x, 2010. [citation][year=2009]P. Delannoy, M. Marot and M. Becker, WiMax Quality­of­Service Estimations and Measurement, Proceedings of the First International Conference on WiRELESS ViTAE'09, Aalborg, Denmark, May 2009. [citation][year=2009]P. Latkoski and B. Popovski, Communication Protocol Engineering and Optimization of Network Entry Process in IEEE 802.16 Based Systems, International Journal of Multimedia and Ubiquitous Engineering, Vol. 4, No. 2, April 2009. [citation][year=2009]Abdulrahman Yarali, Babak Ahsant, Saifur Rahman, Wireless Mesh Networking: A Key Solution for Emergency & Rural Applications, 2009 Second International Conference on Advances in Mesh Networks, pp. 143-149, Greece, June 2009, ISBN: 978-0-7695-3667-5. [citation][year=2009]Paul Boone, Improving Access in Next-Generation Broadband Wireless Networks, Thesis submitted to the Faculty of Graduate Studies and Research in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY School of Computer Science at CARLETON UNIVERSITY, Ottawa, Ontario, 2009. [citation][year=2009]Pentikousis, K., Piri, E., Pinola, J. and Harjula, I. (2009) WiMAX Performance in Practice, in WiMAX Evolution: Emerging Technologies and Applications (eds M. D. Katz and F. H. Fitzek), John Wiley & Sons, Ltd, Chichester, UK. doi: 10.1002/9780470740118.ch2 [citation][year=2008]M. Nakamura et al., Development of Long-Range and High-Speed Wireless LAN for the Transmission of Telemedicine from Disaster Areas, EURASIP Journal on Wireless Communications and Networking, Volume 2008 (2008), Article ID 724010. [citation][year=2008]K. Pentikousis, E. Piri, J. Pinola, F. Fitzek, T. Nissilä, I. Harjula, Empirical evaluation of VoIP aggregation over a fixed WiMAX testbed, Proceedings of the 4th International Conference on Testbeds and research infrastructures for the development of networks & communities table of contents, Innsbruck, Austria, 2008, ISBN:978-963-9799-24-0 [citation][year=2008]Pero Latkoski, Borislav Popovski, Analysis and Optimization of Network Entry Delay in WiMax Networks, fgcn, vol. 1, pp.144-147, 2008 Second International Conference on Future Generation Communication and Networking, 2008. [publication]Fiorese, A. and Simões, P. and Boavida, F. , "A Middleware for the Support of Autonomic Behaviour of Home Networking Communities", in Sixth Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net 2007), 2007 [citation][year=2009]Hassan, S.; Al-Jumeily, D.; Hussain, A.J., "Autonomic Computing Paradigm to Support System's Development," Developments in eSystems Engineering (DESE), 2009 Second International Conference on, vol., no., pp.273,278, 14-16 Dec. 2009. 2006(1 publication) [publication]Carmo, M. and Carvalho, B. and Jorge Sá Silva and Edmundo Monteiro and Simões, P. and Marilia Curado and Boavida, F. , "NSIS-based Quality of Service and Resource Allocation in Ethernet Networks", in 4th International Conference on Wired/Wireless Internet Communications, 2006 [citation][year=2015]Octavian Stefan, Toma-Leonida Dragomir, A Control-aware QoS Adaptation Co-design Method for Networked Control Systems, Studies in Informatics and Control, ISSN 1220-1766, vol. 24 (1), pp. 33-42, 2015 [citation][year=2013]D. Silva, A. Pontes, E. Maravalho Avelar, K. Dias, Uma Arquitetura para o Aprovisionamento de QoS Interdomínios em Redes Virtuais baseadas no OpenFlow, in 31º Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos (SBRC 2013), pp. 893-906, Brasília, Brasil, 2013. [citation][year=2008]T. Braun, T. Staub, "End-to-End Quality of Service Over Heterogeneous Networks?, Book, ISBN 3540791191, 9783540791195, Springer 2008 [citation][year=2008]Michael Jaroci?ski, Piotr Gajowniczek, Przegl?d modeli segmentu dost?powego, brzegowego i rdzeniowego sieci opartych na technologii Ethernet, Relatório Técnico PBZ-MNiSW-02/II/2007, Institute of Telecommunications at Warsa University of Technology, Varsóvia, 2008. [citation][year=2008]Wojciech Burakowski, Andrzej B?ben, Halina Tarasiuk, Jaros?aw ?liwi?ski, Robert Janowski, Jordi Mongay Batalla, and Piotr Krawiec, "Provision of end-to-end QoS in heterogeneous multi-domain networks?, in Annals of Telecommunicaations, Vol 63, Springer, pp. 559"577, 2008. [citation][year=2008]Laurent Dairaine, Mathieu Gineste, and Herve Thalmensy, "Network Emulation Focusing on QoS-Oriented Satellite Communication?, in End-to-End Quality of Service Over Heterogeneous Networks, Apendix B, Springer, August, 2008. 2005(3 publications) [publication]Carmo, M. and Jorge Sá Silva and Edmundo Monteiro and Simões, P. and Boavida, F. , "Ethernet QoS Modeling in Emerging Scenarios", in 3rd International Workshop on Internet Performance, Simulation, Monitoring and Measurements (IPS-MoMe 2005), 2005 [citation][year=2016]Islam, N., Bawn, C.C., Hasan, J., Swapna, A.I. and Rahman, M.S. (2016) Quality of Service Analysis of Ethernet Network Based on Packet Size. Journal of Computer and Communications, 4, 63-72. http://dx.doi.org/10.4236/jcc.2016.44006 [publication]Carmo, M. and Jorge Sá Silva and Edmundo Monteiro and Simões, P. and Marilia Curado and Boavida, F. , "Avaliação da QoS em redes Ethernet", in CRCâ??2005 â?? 8ª Conferência sobre Redes de Computadores, 2005 [publication]Edmundo Monteiro and Boavida, F. and Simões, P. and Jorge Sá Silva and Cordeiro, L. and Carmo, M. , "The use of COPS and NSIS in the EuQoS Project", in NetConâ??05 - Network Control and Engineering for QoS, Security and Mobility Conference, IFIP TC6, France Télécom R&D, Lannion, France, 14-18 November 2005, 2005 [citation][year=2009]J. Barakovic, H. Bajric, M. Kos, "Priority Transmission of SIP Signaling Flows in Case of Link Failure?, in Proceedings of ConTEL 2009 - 10th International Conference on Telecommunications, Zagreb, Croatia, 8-10 June 2009 2004(2 publications) [publication]Pinto, L. and Edmundo Monteiro and Simões, P. , "An Integrated Firewall Management Platform", 2004 [publication]Simões, P. and Edmundo Monteiro and Pinto, L. and Colaço, B. , "Mecanismos de Gestão Integrada para Firewall Appliances", in CRC'2004, 7ª Conferência sobre Redes de Computadores, 2004 2003(3 publications) [publication]Tiago Cruz and Simões, P. , "Enabling PreOS Desktop Management", in IM'2003 (IFIP/IEEE International Symposium on Integrated Network Management), 2003 [citation][year=2017]Patent Assignee: Hewlett-Packard Development Company, L.P. "System and method for booting a computer system using preboot data" - SS Azam, Z Beyabani - US Patent 9,665,379, 2017 [citation][year=2015]Kohn, Rodolfo ; Kinzhalin, Arzhan ; Lombard David ; Morin Ricardo , "Platform discovery in a pre-boot environment using web services" , Patent No. EP2172840, Dec. 2015., https://worldwide.espacenet.com/publicationDetails/originalDocument?FT=D&date=20151202&DB=&locale=en_EP&CC=EP&NR=2172840B1&KC=B1&ND=1 [citation][year=2013]Kuen-Min Lee, Wei-Guang Teng, Jin-Neng Wu, Kuo-Ming Huang, Yao-Hsing Ko, Ting-Wei Hou, Multicast and customized deployment of large-scale operating systems, Automated Software Engineering, Springer, December 2013. Doi: 10.1007/s10515-013-0139-6 [citation][year=2012]Kinzhalin, Arzhan, Rodolfo Kohn, David Lombard, and Ricardo Morin. "Platform discovery, asset inventory, configuration, and provisioning in a pre-boot environment using web services." U.S. Patent 8,312,116, issued November 13, 2012. [citation][year=2011]Kohn, Rodolfo, Arzhan Kinzhalin, David Lombard, and Ricardo Morin. "Platform discovery, asset inventory, configuration, and provisioning in a pre-boot environment using web services." U.S. Patent 8,041,794, issued October 18, 2011. [publication]Tiago Cruz and Simões, P. , "Gestão de PCs com Recurso a Mecanismos PreOS", in CRC'2003 (6ª Conf. sobre Redes de Computadores), 2003 [citation][year=2006]Ricardo, Vilton Wronski. "Elementos de custo para o cálculo do custo total de propriedade em tecnologia de informação." (2006). [publication]Pinto, L. and Edmundo Monteiro and Simões, P. , "Towards Integrated Management of Firewall Appliances", in CNIS'2003 (The IASTED International Conference on Communication, Network, and Information Security), 2003 [citation][year=2006]å®?宁ï¼? å?æ?«å?¸ï¼? 梁德ç??ï¼? æ?±èµ?å?ï¼? å¼ ç??è?³ï¼? é?¬ç?²ä»?â?¦, å?ºäº? LDAP ç??信息ç½?ç»?管ç?解å?³æ?¹æ¡?, ?????? …, 2006 [citation][year=2006]Song Ning, Bu Feng Xiao, Liang Desheng, Zhu Chan Hua, Zhang Ruifang, Wu Ling Qian, Qian Pan, Long Chigo, Dai Heping, Xue Zhigang, Xia Kun, Xia Jiahui, LDAP-based information network management solutions, CHINESE TECHNOLOGY OF HOSPITAL ADMINISTRATION, 2006 Vol.22 No.12 P.850-852 2002(4 publications) [publication]Simões, P. and Rodrigues, J. and Silva, L. and Boavida, F. , "Distributed Retrieval of Management Information: Is it About Mobility, Locality or Distribution?", 2002 [citation][year=2006]SILVA, Fabrício Aguiar ; BRAGA, Thais Regina de Moura ; RUIZ, Linnyer Beatriz ; NOGUEIRA, J. M. Avaliação de abordagens de coleta e processamento de dados em redes de sensores sem fio. In: WGRS, 2006, Curitiba. XI Workshop de Gerência de Redes e Serviços/Simpósio Brasileiro de Redes de Computadores, 2006. [citation][year=2006]KL Calvert, J Griffioen, S Wen, Scalable Network Management Using Lightweight Programmable Network Services, Journal of Network and Systems Management, Springer, Volume 14, Number 1, March, 2006. [citation][year=2006]Fabrício Aguiar Silva, Avaliação de Abordagens de Gerenciamento para Redes de Sensores Sem Fio, Dissertação de Mestrado (Ciência da Computação), Universidade Federal de Minas Gerais, Brasil, Agosto de 2006. [citation][year=2004]Herbert Bos, Willem de Bruijn, Jon Moore, "Splash: SNMP Plus a Lightweight API for SNAP Handling?, Proceedings of the Proceedings of the 2004 IEEE/IFIP Network Operations and Management Symposium (NOMS'2004), Seoul, Korea, Abril de 2004. [citation][year=2004]Emmanuel Reuter, Agents Mobiles: Itinéraires pour l"administration système et réseau, PhD thesis, Université de Nice Sophia Antipolis, May 2004. [citation][year=2003]Rui Pedro Lopes, "Gestão Distribuída em SNMP?, Tese de Doutoramento, Universidade de Aveiro, 2003. [citation][year=2003]Bohoris C., Pavlou G., Liotta A., "Mobile Agent-based Performance Management for the Virtual Home Environment?, Journal of Network and System Management, Vol. 11, No. 2, Junho de 2003. [citation][year=2003]Christos Bohoris, "Network Performance Management Using Mobile Software Agents?, PhD Thesis, University of Surrey, Junho de 2003. [citation][year=2002]Bohoris C., Pavlou G., Liotta A., "A Hybrid Approach to Network Performance Monitoring Based on Mobile Agents and CORBAâ?, Proceedings of the IEEE/ACM International Workshop on Mobile Agents for Telecommunication Applications (MATA'02), Barcelona, Spain, Springer, pp. 151-162, October 2002. [citation][year=2002]E. Reuter, F. Baude, "A mobile-agent and SNMP based management platform built with the java ProActive library", Proceedings of the 2002 IEEE Workshop on IP Operations and Management (IPOM 2002), October 2002, Dallas, pp. 140-145. [publication]Simões, P. and Rodrigues, J. and Silva, L. and Boavida, F. , "Modelos de Distribuição para Recolha de Informação de Gestão (Models for the Distribution and Collection of Management Information)", 2002 [publication]Marques, P. and Fonseca, R. and Simões, P. and Silva, L. and Silva, J.G. , "A Component-Based Approach for Integrating Mobile Agents Into the Existing Web Infrastructure", 2002 [citation][year=2015]M. M. Nasr, "A proposed paradigm for tracing the effect of security threats in various mobile agent systems," 2015 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW), Riyadh, 2015, pp. 1-8. doi: 10.1109/NSITNSW.2015.7176428 [citation][year=2013]Mauro Dragone, Building Self-adaptive Software Systems with Component, Services & Agents Technologies: Self-OSGi, Agents and Artificial Intelligence, Communications in Computer and Information Science Volume 358, 2013, pp 300-316, http://dx.doi.org/10.1007/978-3-642-36907-0_20 [citation][year=2010]Qusay H. Mahmoud and Leslie Yu, Integrating the Havana agent platform into the existing web infrastructure, International Journal of Wireless and Mobile Computing, Volume 4, Number 4 / 2010, pp. 290–304, Indescience. [citation][year=2009]Oscar Urra, Sergio Ilarri, Raquel Trillo and Eduardo Mena, Mobile Agents and Mobile Devices: Friendship or Difficult Relationship?, Journal of Physical Agents, Vol. 3 No. 2 May 2009. [citation][year=2008]Tong-Seng Quah, Chye-Huang Leow, Linking Business for Competitive Advantage: a Mobile Agent-Based Approach. In Electronic Business: Concepts, Methodologies, Tools, and Applications, I. Lee (Ed.), pp. 117-141, Idea Group Inc (IGI), 2008. [citation][year=2007]WANG Xiaohu, WU Jianbin, Research of an Agent platform based on Web services, Journal of Zheijiang Normal University (Natural Sciences), 2007 (30)2, 10.3969/j.issn.1001-5051.2007.02.014 [citation][year=2007]1. I.E. Foukarakis, A.I. Kostaridis, C.G. Biniaris, D.I. Kaklamani, and I.S. Venieris; "Webmages: An agent platform based on web services"; in Computer Communications, Volume 30, Issue 3, February 2007 [citation][year=2005]Mona Nasr, A Simulation-based Model for Tracing the Effect of Masquerading Security Threat in Mobile Agent Systems; In Proc the 13th Int. Conf. on Artificial Applications, ICAIA’05, American University in Cairo (AUC), Egypt, February 2005. [citation][year=2005]1. M. Eid, H. Artail, A. Kayssi, and A. Chehab, "Trends in Mobile Agent Applications", in Journal of Research and Practice in Information Technology, Vol. 37, No. 4, November 2005 [citation][year=2004]V. Tan, "Interaction Tracing for Mobile Agent Security", PhD Thesis, University of Southampton, Southampton, UK, March 2004 [citation][year=2003]I.E. Foukarakis, A.I. Kostaridis, C.G. Biniaris, D.I. Kaklamani, I.S. Venieris, "Implementation of a Mobile Agent Platform Based on Web Services", Proc. Mobile Agents for Telecommunication Applications MATA-03, Lecture Notes in Computer Science, Volume 2881 / 2003, Springer-Verlag Heidelberg. [citation][year=2003]Odysseas Papapetrou, Location Aware Web-Crawling With the Use of Migrating Crawlers, Master Thesis, University of Cyprus, Department of Computer Science, December 2003. [publication]Tiago Cruz and Simões, P. , "Rethinking Desktop Management", in Asia-Pacific Network Operations and Management Symposium (APNOMS 2002) , 2002 [citation][year=2016]Dunbar, Daniel Robert, "IMPLEMENTING A MANAGED DESKTOP IN HIGHER EDUCATION", MSc Thesis, The College of St. Scholastica, Duluth, Minnesota. Available at: https://search.proquest.com/docview/1807952731 2001(4 publications) [publication]Marques, P. and Simões, P. and Silva, L. and Silva, J.G. and Boavida, F. , "Towards Manageable Mobile Agent Infrastructures", 2001 [citation][year=2004]Emmanuel Reuter, Agents Mobiles: Itinéraires pour l"administration système et réseau, PhD thesis, Université de Nice Sophia Antipolis, May 2004. [citation][year=2003]1. Rui Pedro Lopes, José Luis Oliveira, "A Mobile Agent Manager", Proc. MATA-2003, Mobile Agents for Telecommunication Applications, Oct 2003, Lecture Notes in Computer Science, Volume 2881 / 2003, Springer-Verlag [publication]Marques, P. and Simões, P. and Silva, L. and Boavida, F. and Silva, J.G. , "Providing Applications With Mobile Agent Technology", 2001 [citation][year=2016]Muhammad Saleh Kaukab, Sabih Khan Afridi, Yaqoob Wani and Khalid Hussain, A Comprehensive Analysis of Agent Based Backup Management System, International Journal of Scientific & Engineering Research, Volume 7, Issue 3, pp. 530-536, March-2016, ISSN 2229-5518 [citation][year=2015]Nai-Ching Chao, A Research on the Implementation of Enterprise BOYD Policy, These for Master of Business Administration – Department of Information Management, Tatung University, January 2015. [citation][year=2014]Miada Al-masre, Fathy Alburi. Manager Architecture for Mobile Cloud Computing-Cloudlet based. Asian Journal of Computer and Information Systems (ISSN: 2321 – 5658), Vol. 02 – Issue 01, February 2014. [citation][year=2013]Atul Srivastava, Manpreet Singh, Mamta Sharma and Manali Aggarwal, Mobile Agents and their Application in Distributed Crawling, Proceedings of the 2nd National Conference on Recent Trends in Computer Science and Information Technology (RTCSIT-2013), Excel India Publishers, pp. 68-70, October 2013. [citation][year=2012]Bhattacharya, A., Mobile agent based elastic executor service, Computer Science and Software Engineering (JCSSE), 2012 Int. Joint Conf. on, 2012, pp. 351-356, DOI: 10.1109/JCSSE.2012.6261978 [citation][year=2010]Mohammad Hasan Samadani and Mehdi Shajari. 2010. Path reduction in complex grid service provision. In Proceedings of the 12th International Conference on Electronic Commerce: Roadmap for the Future of Electronic Business (ICEC '10). ACM, New York, NY, USA, 88-93. DOI=10.1145/2389376.2389388 http://doi.acm.org/10.1145/2389376.2389388 [citation][year=2010]Saifur Rahman, Manisa Pipattanasomporn, Modeling and Simulation of a Distributed Generation-Integrated Intelligent Microgrid, SERDP Project SI-1650 (Final Report), Virginia Tech, February 2010. [citation][year=2009]Zhiqiang Wei; Yewei Feng, "A Mobile Agent Sub-optimal Migration Algorithm Based on Probability," Web Information Systems and Mining, 2009. WISM 2009. International Conference on, vol., no., pp.413,417, 7-8 Nov. 2009, doi: 10.1109/WISM.2009.90 [citation][year=2009]Hassan Feroze, "Multi-Agent Systems in Microgrids: Design and Implementation?, Masters thesis in Electrical Engineering, Faculty of the Virginia Polytechnic Institute and State University, USA, August 2009. [citation][year=2009]B. Molina, S.F. Pileggi, M. Esteve, C.E. Palau, "A negotiation framework for content distribution in mobile transient networks?, Journal of Network and Computer Applications, Volume 32, Issue 5, September 2009. [citation][year=2009]Daniele Puccinelli (editor), Specification of the ADULT-Haggle, Haggle Deliverable D1.4, European Union FP6 Project 027918, http://www.haggleproject.org/, September 2009. [citation][year=2008]Molina, B., Pileggi, S. F., Palau, C. E., and Esteve, M. 2008. A social framework for content distribution in mobile transient networks. In Proceedings of the Third international Workshop on Use of P2p, Grid and Agents For the Development of Content Networks (Boston, MA, USA, June 23 - 23, 2008). UPGRADE '08. ACM, New York, NY, 29-36. DOI= http://doi.acm.org/10.1145/1384209.1384216. [citation][year=2008]Shamila Makki, Subbarao Wunnava, Next Generation Networks and Code Mobility. ISAST Transactions on Communications and Networking, No.1 Vol. 2, 2008. [citation][year=2007]Liam Cragg, Huosheng Hu and Norbert Voelker, Modularity and Mobility of Distributed Control Software for Networked Mobile Robots, Software Engineering for Experimental Robotics, Springer Tracts in Advanced Robotics, 2007, Volume 30/2007, 459-484, DOI: 10.1007/978-3-540-68951-5_26 [citation][year=2006]Jinghao Ju; Dong Wang; Huanye Sheng. RFID Data Collection and Integration Based on Mobile Agent," IEEE Conference on Cybernetics and Intelligent Systems (ICCIS 2006), June 2006 [citation][year=2006]D. Gavalas, C. Politi, Low-Cost Itineraries for Multi-Hop Agents Designed for Scalable Monitoring of Multiple Subnets, Computer Networks, Elsevier Science , 50(16), pp. 2937-2952, November 2006. [citation][year=2006]Xi-Cheng Tan and Fu-Ling Bian, "P2P and Agent Service Based On-Line 3DGIS�?�, Lecture Notes in Computer Science Volume 4295/2006 Book Web and Wireless Geographical Information Systems ISBN978-3-540-49466-9, 2006. [citation][year=2005]1. J Ko, BD Gerardo, J Lee, JJ Hwang, The Information Search System Using Neural Network and Fuzzy Clustering Based on Mobile Agent, in O. Gervasi et al. (Eds.): ICCSA 2005, LNCS 3481, pp. 205"214, Springer-Verlag Berlin Heidelberg 2005. [citation][year=2005]2. X Wang, A Jiang, S Wang; Mobile agent based wireless sensor network for intelligent maintenance, in DS Huang, XP Zhang, GB Huang (Eds.): Advances in Intelligent Computing, International Conference on Intelligent Computing, ICIC 2005, Hefei, China, August 23-26, 2005, Part II, LNCS 3645, pp. 316"325, Springer-Verlag Berlin Heidelberg 2005. [citation][year=2005]3. Christophe Cubat Dit Cros, Agents Mobiles Coopérants pour les Environnements Dynamiques, PhD thesis, Institut National Polytechnique de Toulouse, France, December 2005. [citation][year=2005]4. W. Buchanan, J. Graves, L. Saliou, H. Al Sebea, N. Migas, Agent-based Forensic Investigations with an Integrated Framework, Proc. of the Proceedings of the 5th European Conference on Information Warfare and Security (ECIW 2005), Academic Conferences, 2005. [citation][year=2005]5. C. Diaz, SWAM: Un lengua je para la programacíon de agentes móviles inteligentes en la Web Semántica, Tesis sometida a evaluacíon como requisito parcial para la obtencíon del grado de Magister en Ingeniería de Sistemas, Universidad Nacional Del Centro de la Provincia de Buenos Aires, Argentina, 2005. [citation][year=2004]1. Aneiba, J. Rees, "Mobile Agent Technology and Mobility?, in Proc. of the 5th Annual Postgraduate Symposium on the Convergence of Telecommunications (PGNet 2004), Networking and Broadcasting, pp. 14-20, Liverpool, June 2004 [citation][year=2004]2. S. S. Manvi, P. Venkataram: "Applications of agent technology in communications: a review". Computer Communications 27(15): 1493-1508 (2004) [citation][year=2004]3. Damianos Gavalas, "Network Management Itineraries for Mobile Agents?, Proceedings of the 2nd Internation Working Conference on Performance Modelling and Evaluation of Heterogeneous Networks (HET-NETs"04), Ilkley, West Yorkshire, UK, 26-28 July, 2004. [citation][year=2003]L. Cragg, P. Tsui, and H. Hu, "Building a Fault Tolerant Architecture for Internet Robots Using Mobile Agentsâ?, in Proc. 1st British Workshop on Internet and Online Robots (IORW"03), Reading, UK, 2003 [citation][year=2003]C. Hsu, H. Hsu, D. Yang, and F. Wang, "Constructing a Multiple Mobile-BDI Agent Systemâ?, in Proc. of 14th Workshop on Object-Oriented Technology and Applications (OOTA'2003), 2003. [citation][year=2003]M. Chuang and W. Chang, "Performance Monitoring Web Applications via a Mobile-Agent Approachâ?, in Tunghai Science Journal, Vol. 5, pp. 21-41, July 2003 [citation][year=2003]A. Boulis, C.-C. Han, and M.B. Srivastava, "Design and Implementation of a Framework for Efficient and Programmable Sensor Networks", in Proceedings of First International Conference on Mobile Systems, Applications, and Services (MobiSys), May 2003. [citation][year=2002]A. Boulis and M. B. Srivastava, "A Framework for Efficient and Programmable Sensor Networksâ?, in Proc. 5th IEEE International Conference on Open Architectures and Network Programming (OpenArch'02), IEEE Computer Press, New York, June, 2002 [citation][year=2002]Required reading in the graduate course "Desenvolvimento de Software Baseado em Agentes Móveisâ?, of the Universidade Federal de Campina Grande, Brazil. 2002. (http://www.dsc.ufcg.edu.br/~patricia/ma/) [citation][year=2001]Damianos Gavalas, Mobile Software Agents for Network Monitoring and Performance Management, PhD Thesis, University of Essex, UK, 2001. [publication]Simões, P. and Silva, L. and Boavida, F. , "Mobile Agent Infrastructures: a Solution for Management or a Problem to Manage?", 2001 [citation][year=2010]Micha? Komorowski. 2010. Configuration management of mobile agents based on SNMP. In Proceedings of the 7th international conference on Rough sets and current trends in computing (RSCTC'10), Marcin Szczuka, Marzena Kryszkiewicz, Sheela Ramanna, Richard Jensen, and Qinghua Hu (Eds.). Springer-Verlag, Berlin, Heidelberg, 456-465. [citation][year=2003]Rui Pedro Lopes, "Gestão Distribuída em SNMP?, Tese de Doutoramento, Universidade de Aveiro, 2003. [citation][year=2002]White T., Pagurek B. and Deugo D., "Management of Mobile Agent Systems using Social Insect Metaphorsâ?. In Proceedings of the International Workshop on Self-Repairing and Self-Configurable Distributed Systems (RCDS 2002), Osaka Japan, October 2002. [citation][year=2002]T. White, B. Pagurek, and D. Deugo, "Management of Mobile Agent Systems: Learning from the Antsâ?. In Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA 2002), Las Vegas, June 24-27 2002. [citation][year=2002]R. P. Lopes and J. L. Oliveira, "Multi-Management Schemes for MAF Platformsâ?, in International Workshop on Mobile Agents for Telecommunications Applications (MATA'2002), Barcelona, Spain, 2002. [publication]Marques, P. and Fonseca, R. and Simões, P. and Silva, L. and Silva, J.G. , "Integrating Mobile Agents into Off-the-Shelf Web Servers: The M&M Approach", in Munich, Germany, 2001 [citation][year=2005]R.D.G Jayarathne, Dynamic Server Access by Mobile Agents Using Attribute Certificates, 7th International Information Technology Conference (IITC), Sri Lanka, 9-10 November 2005. [citation][year=2005]1. Qusay H. Mahmoud, Leslie Yu, "An Architecture and Business Model for Making Software Agents Commercially Viable", in Proc. of the 38th Hawaii International Conference on System Sciences, 2005 [citation][year=2004]Q. Mahmoud, L. Yu, "Havana: a mobile agent platform for seamless integration with the existing Web infrastructure", in Proc. of the 2004 Canadian Conference on Electrical and Computer Engineering, Niagara Falls, Ontario, Canada, May 2004. [citation][year=2002]S. Arumugam, A. Helal, A. Nalla, "aZIMAs: Web Mobile Agent System", in Proceedings of the 6th IEEE International Conference on Mobile Agents (MA'02), Barcelona, Spain, October, 2002 [citation][year=2002]Subramanian Arumugam, "aZIMAS: Web Mobile Agent Systemâ?, MsC Thesis, Science University of Florida, 2002. 2000(4 publications) [publication]Simões, P. and Silva, L. and Boavida, F. , "A Generic Management Model for Mobile Agent Infrastructures", 2000 [citation][year=2016]Muhammad Saleh Kaukab, Sabih Khan Afridi, Yaqoob Wani and Khalid Hussain, A Comprehensive Analysis of Agent Based Backup Management System, International Journal of Scientific & Engineering Research, Volume 7, Issue 3, pp. 530-536, March-2016, ISSN 2229-5518 [citation][year=2004]Emmanuel Reuter, Agents Mobiles : Itinéraires pour l"administration système et réseau, PhD thesis, Université de Nice Sophia Antipolis, May 2004. [citation][year=2003]Michael Sievert, "Managing Communication Resources?, MsC Thesis, Mälardalen University, Sweden, 2003. [publication]Simões, P. and Lourenço, E. and Pereira, P. and Pereira, P. and Silva, L. and Boavida, F. , "J.AgentX: Uma Ferramenta Para Extensão Dinâmica de Agentes SNMP", 2000 [citation][year=2000]Frank Straus, Jurgen Schonwalder, Sven Mertens, JAX " A Java Agent X Subagent Toolkit, Proceedings of IPOM"2000 " IEEE Workshop on IP-oriented Operations & Management, Cracow, Poland, September 2-4, 2000. [publication]Simões, P. and Lourenço, E. and Pereira, P. and Pereira, P. and Silva, L. and Boavida, F. , "J.AgentX: a Tool for Dynamic Deployment of Open Management Services", 2000 [citation][year=2000]Frank Straus, Jurgen Schonwalder, Sven Mertens, "JAX " A Java Agent X Subagent Toolkit?, Proceedings of IPOM"2000 " IEEE Workshop on IP-oriented Operations & Management, Cracow, Poland, September 2-4, 2000. [publication]Marques, P. and Simões, P. and Silva, L. and Boavida, F. and Silva, J.G. , "Mobile Agent Systems: From Technology to Applications", in OOPSLA'2000 Workshop on Experiences with Autonomous Mobile Objects and Agent Based Systems, 2000 [citation][year=2003]1. M. Bisignano, G. Di Modica, and O. Tomarchio, "Mobile Agent Location Management: a Comparison Between CORBA and P2P Based Systems?, in Proc. 8th IEEE International Symposium on Computers and Communication (ISCC"2003), KEMER, TURKEY, June 2003. [citation][year=2001]1. O. Tomarchio, L. Vita, A. Puliafito, "Mobile Agents and Legacy Systems: How to Integrate Alternative Communication Paradigms?. in Proceedings of the 3rd International Workshop on Mobile Agents for Telecommunication Applications (MATA2001), Montreal (Canada), August 2001. 1999(5 publications) [publication]Reis, R. and Simões, P. and Silva, L. and Boavida, F. , "Desenvolvimento e Integracao de Serviços SNMP numa Plataforma de Agentes Móveis", 1999 [publication]Silva, L. and Simões, P. and Silva, J. and Silva, J. and Renato, C. and Rebham, J. and Monteiro, P. and Almeida, L. and Stohr, N. , "Using Mobile Agents for the Management of Telecommunication Networks", 1999 [citation][year=2004]A. Pashalidis, M. Fleury, "Secure Network Management within an Open-source Mobile Agent Framework?, Journal of Network and Systems Management, Vol. 12, No. 1, 2004. [publication]Silva, L. and Simões, P. and Soares, G. and Martins, P. and Batista, V. and Renato, C. and Almeida, L. and Stohr, N. , "JAMES: A Platform of Mobile Agents for the Management of Telecommunication Networks", 1999 [citation][year=2015]Abderrahim Siam, Approche basée Agents Mobiles et Composants pour développer des applications ouvertes et adaptables, PhD Thesis, Université Constantine 2 Mahri Abdelhamid, Feb. 2015. [citation][year=2014]Naveen Kumar Ghondi, Mobile Agent based Intelligent System for Autonomic Network Management, PhD Thesis, Kumaun University, India, 2014 (http://shodhganga.inflibnet.ac.in/handle/10603/20760). [citation][year=2014]Neelam Dayal, Lalit Kumar Aswathi, Solutions for Security in Mobile Agent System, Proc. of Int. Conf. on Internet Computing and Information Communications Advances in Intelligent Systems and Computing, Vol. 216, 2014, pp. 103-110, Springer. http://dx.doi.org/10.1007/978-81-322-1299-7_10 [citation][year=2014]Xie Guang-qiang, Zhang-Yun, Li Yang, Tian Jian-Feng, Zeng An, “Research of Visual Simulation Platform for Consensus Protocol of Multiagent System”, J. of Computer Science, Vol. 41, N. 1 pp. 146-151, January 2014, ISSN: 1002-137X. [citation][year=2013]Bassey Echeng Isong and Eyaye Bekele, “A systematic review of fault tolerance in mobile agents”, American Journal of Software Engineering and Applications, 2013; 2(5): 111-124 [citation][year=2012]Al-Shrouf, Faiz; Turani, Aiman, “ANALYSIS OF MOBILE AGENT SYSTEMS PERFORMANCE USING LINEAR PREDICTION MODEL”, International Journal of Reviews in Computing. December 2012, Vol. 12, p38-43. [citation][year=2012]Prakash V. Rajguru and Sushant B. Deshmukh, “Current trends and analysis of mobile agent application”, World Journal of Science and Technology 2012, 2(3):01-06. [citation][year=2010]Cucurull, J., Navarro-Arribas, G., Martí, R., Robles, S. and Borrell, J. (2010), An efficient and secure agent code distribution service. Software: Practice and Experience, 40: 363–386. doi: 10.1002/spe.963 [citation][year=2010]SungJin Choi, MaengSoon Baik, HongSoo Kim, EunJoung Byun, Hyunseung Choo, "A Reliable Communication Protocol for Multiregion Mobile Agent Environments," IEEE Transactions on Parallel and Distributed Systems, vol. 21, no. 1, pp. 72-85, Jan. 2010, doi:10.1109/TPDS.2009.48 [citation][year=2009]Dewi Agushinta R., Adang Suhendra, Addien Febrinata, Anne Yuliyanti, "Secure Mobile Agent System in Peer-to-Peer Networks: A Review of Security Mechanisms Based on Several Security Issues," wcse, vol. 1, pp.212-216, World Congress on Software Engineering, 2009 [citation][year=2009]SungJin Choi, Hyunseung Choo, MaengSoon Baik, HongSoo Kim and EunJoung Byun, “ODDUGI: Ubiquitous Mobile Agent System”, Computational Science and Its Applications – ICCSA 2009, Springer LNCS 5593, pp. 393-407, 2009. [citation][year=2009]Wu Jiehong, Liu Cheng, and Gao Fuxiang. 2009. Study of MA protection technology of extending inheritance hierarchy trees in IDC network management. In Proceedings of the 21st annual international conference on Chinese Control and Decision Conference (CCDC'09). IEEE Press, 616-619. [citation][year=2009]Wu Jiehong, and Gao Fuxiang. 2009. Study of MA protection technology of extending inheritance hierarchy trees in IDC network management. In Proc. of Int. Conf. on Management and Service Science, (MASS '09), . [citation][year=2009]SungJin Choi, MaengSoon Baik, HongSoo Kim, EunJoung Byun, Hyunseung Choo, "A Reliable Communication Protocol for Multiregion Mobile Agent Environments," IEEE Transactions on Parallel and Distributed Systems, vol. 21, no. 1, pp. 72-85, Jan. 2010, doi:10.1109/TPDS.2009.48 [citation][year=2008]Alla Talal Yassin, Naeem Th Yousir AL-Rubaie, Employing Mobile Agents (MAs) In the Internet services, Baghdad College of Economic sciences University, ISSN: 2072778X, 2008 V. 16, pp. 339-361 [citation][year=2007]A. Genco (Ed.), Mobile Agents: Principles of Operation and Applications (Advances in Management Information), pp. 139-180, WIT Press, 2007. ISBN 978-1845640606. [citation][year=2006]Hon F. Li, Zunce Wei, Dhrubajyoti Goswami, "Quasi-atomic recovery for distributed agents?, Parallel Computing Volume 32 , Issue 10, Pages: 733-758, November 2006 [citation][year=2006]Dow, C.-R. Li, Y.-H. Bai, J.-Y., "A Virtual Laboratory for Digital Signal Processing?, INTERNATIONAL JOURNAL OF DISTANCE EDUCATION TECHNOLOGIES, VOL 4; NUMB 2, pages 31-43, 2006. [citation][year=2005]Mohamad Eid, Hassan Artail, Ayman Kayssi, and Ali Chehab, Trends in Mobile Agent Applications, Journal of Research and Practice in Information Technology, Vol. 37, No. 4, pp. 323-351, November 2005. [citation][year=2005]Alexandru Suna, CLAIM et SyMPA : Un environnement pour la programmation d'agents intelligents et mobiles, PhD Thesis, LIP6 " Université Paris 6 - Pierre et Marie Curie, December 2005. [citation][year=2004]Pauline P.L. Siu, N. Belaramani, C.L. Wang, and F.C.M. Lau, Context-Aware State Management for Ubiquitous Applications. LNCS 3207 (EUC2004), pp. 776-785, Springer 2004. [citation][year=2004]Yuk Chow, Wenzhang Zhu, Cho-Li Wang, Francis C. M. Lau, State-On-Demand Execution for Adaptive Component-based Mobile Agent Systems. 10th International Conference on Parallel and Distributed Systems (ICPADS'04), pp.46, IEEE, 2004. [citation][year=2004]Jin Ho Ahn, Decentralized Inter-agent Message Forwarding Protocols for Mobile Agent Systems. Springer LNCS 3045 (Computational Science and its Applications, ICCSA 2004, Vol. III) pp. 376-386, Springer 2004. [citation][year=2004]Sergio Pozo, Rafael. M. Gasca, and María Teresa Gómez, Securing Mobile Agent Based Tele-Assistance Systems. Proceedings of the 1st International Workshop on Tele-Care and Collaborative Virtual Communities in Elderly Care, TELECARE 2004 (In conjunction with ICEIS 2004). April 2004. ISBN: 972-8865-10-4. [citation][year=2004]Pere Vilá, Dynamic Management and Restoration of Virtual Paths in Broadband Networks based on Distributed Software Agents. PhD Thesis, Universitat de Girona, 2004. [citation][year=2004]Sergio Pozo Hidalgo, Técnicas Automáticas para la Diagnosis de Consistencia y Conformidad en Políticas de Control de Acceso, PhD Thesis, University of Sevilla, 2004. [citation][year=2003]Michael Sievert, Managing Communication Resources, MsC Thesis, Mälardalen University, Sweden, 2003. [citation][year=2003]Jonathan Lefebvre, Steven Chamberland and Samuel Pierre, A Network Management Framework Using Mobile Agents, Journal of Computer Science 2 (8): 646-659, 2006, ISSN 1549-3636, Science Publications (also appears on Canadian Conference on Electrical and Computer Engineering, 2003. IEEE CCECE 2003, Vol. 2, pp- 737-740). [citation][year=2002]Sandhya Sriraman, "An Annotated Bibliography of Mobile Agents in Networks?, Thesis Prepared for the Degree of Master Science, University of North Texas, Dezembro de 2002. [citation][year=2002]Steffen Lipperts, Mobile Agent Support Services. PhD Thesis, Rheinisch-Westfälischen Technischen Hochschule Aachen, 2002. [citation][year=2001]Marcelo Gonçalves Rubinstein, Avaliação do Desempenho do Desempenho de Agentes Móveis no Gerenciamento de Redes, Tese de Doutoramento, Universidade Federal do Rio de Janeiro, Março de 2001. [citation][year=2001]Kenneth, Andrews, Network node management system and method using proxy by extensible agents, Patent EP1158720, November 2001. [citation][year=2001]Friedrich van Megen, Mobile Agenten im Internet Infrastruktur und Interaktion, Universität Kaiserslautern, (Interner Bericht 314/2001), Outubro de 2001. [citation][year=2001]Vikram Jamwal, Mobile agents for distance evaluation, MsC Thesis, IIT Bombay, 2001. [citation][year=2001]Damianos Gavalas, Mobile Software Agents for Network Monitoring and Performance Management, PhD Thesis, University of Essex, UK, 2001. [citation][year=2000]P. Rivalta, "Mobile Agent Management?, MsC Thesis, Carleton University, Outubro de 2000. [publication]Simões, P. and Silva, L. and Boavida, F. , "Integrating SNMP into a Mobile Agent Infrastructure", 1999 [citation][year=2014]Naveen Kumar Ghondi, Mobile Agent based Intelligent System for Autonomic Network Management, PhD Thesis, Kumaun University, India, 2014 (http://shodhganga.inflibnet.ac.in/handle/10603/20760). [citation][year=2006]Shamila Makki, Subbarao V. Wunnava, "Application of Mobile Agents in Managing the Traffic in the Network and Improving the Reliability and Quality of Service?, IAENG International Journal of Computer Science, Volume 32, Issue 4, 12 November 2006. [citation][year=2004]Herbert Bos, Willem de Bruijn, Jon Moore, "Splash: SNMP Plus a Lightweight API for SNAP Handling?, Proceedings of the Proceedings of the 2004 IEEE/IFIP Network Operations and Management Symposium (NOMS'2004), Seoul, Korea, Abril de 2004. [citation][year=2004]Emmanuel Reuter, Agents Mobiles: Itinéraires pour l"administration système et réseau, PhD thesis, Université de Nice Sophia Antipolis, Maio de 2004. [citation][year=2003]Suchindra Katageri, Standards-based Infrastructure for Dynamic Extension of Network Management Services Using Mobile Code, MSc Thesis, University of Florida, 2003. [citation][year=2003]Rui Pedro Lopes, "Gestão Distribuída em SNMP�?�, Tese de Doutoramento, Universidade de Aveiro, 2003. [citation][year=2003]R. P. Lopes and J. L. Oliveira, "A Mobile Agent Navigation Manager�?�, in 5th International Workshop on Mobile Agents for Telecomunication Applications (MATA'2003), Marrakech, Morocco, LNCS vol. 2881, pp. 220-229, ISBN 3-540-20298-6, 2003. [citation][year=2003]Michael Sievert, "Managing Communication Resources�?�, MsC Thesis, Mälardalen University, Sweden, 2003. [citation][year=2002]M.-S. Su, K. Thulasiraman, and A. Das, "A Scalable On-Line and Multi-Level Distributed Fault Detection/Monitoring System based on the SNMP Protocolâ?, IEEE GlobeCom2002, Novembro de 2002, Taipei, Taiwan. [citation][year=2002]Jonathan T. Moore, Jessica Kornblum Moore, and Scott Nettles, "Predictable, Lightweight Management Agentsâ?, Proceedings of the IFIP-TC6 Fourth International Working Conference (IWAN"02), Dezembro de 2002. [citation][year=2002]Sandhya Sriraman, "An Annotated Bibliography of Mobile Agents in Networksâ?, Thesis Prepared for the Degree of Master Science, University of North Texas, Dezembro de 2002. [citation][year=2002]R. P. Lopes and J. L. Oliveira, "Multi-Management Schemes for MAF Platformsâ?, in International Workshop on Mobile Agents for Telecommunications Applications (MATA'2002), Barcelona, Spain, 2002. [citation][year=2001]Damianos Gavalas, Mobile Software Agents for Network Monitoring and Performance Management, PhD Thesis, University of Essex, UK, 2001. [citation][year=2001]J. Kornblum, D. Raz, Y. Shavitt, "The active process interaction with its environment?, Computer Networks 36 (2001), pp. 21-34, Elsevier Science. [citation][year=2001]C. Huang, C. Pattinsion, "Using Mobile Agent Techniques for Distributed Manufacturing Network Management?, Proceedings of the PGNET"2001 Symposium, Junho de 2001. [citation][year=2001]Jonathan T. Moore, Jessica Kornblum Moore, and Scott Nettles. "Scalable Distributed Management with Lightweight Active Packets? Technical Report MS-CIS-01-26, Department of Computer and Information Science, University of Pennsylvania, September, 2001. [citation][year=2001]Juliana Amaral Arantes, Agentes Móveis versus SNMP – uma avaliação de desempenho analítica, Dissertação submetida à Universidade Federal de Santa Catarina como parte dos requisitos para a obtenção do grau de Mestre em Ciência da Computação, Florianópolis, Novembro de 2001. [citation][year=2000]B. Pagurek, Y. Wang, T. White, "Integration of Mobile Agents With SNMP: Why and How?, Proceedings of NOMS"2000, IEEE Press. [citation][year=2000]P. Rivalta, "Mobile Agent Management?, MsC Thesis, Carleton University, Outubro de 2000. [publication]Simões, P. and Reis, R. and Silva, L. and Boavida, F. , "Enabling Mobile Agent Technology for Legacy Network Management Frameworks", 1999 [citation][year=2017]Wafa Ghonaim, Ahmed Al-Ghamdi, A Smart Multi-Agent Controller Model for Large Scale Network Management, Proc. of the Int'l Conf. Internet Computing and Internet of Things (ICOMP'17), pp. 65-71, ISBN: 1-60132-461-8, CSREA Press. [citation][year=2012]Stanic, M. Mitic, D. Lebl, A., A Mobile Agents Framework for Integration of Legacy Telecommunications Network Management Systems, Przeglad Elektrotechniczny, 2012, R. 88, N. 6, pp 337-341, ISSN 0033-2097. [citation][year=2011]Praveena Chaturvedi, Nipu, Mobile Agent Cloning: An Application to Network Management, Pragyaan: Journal of Information Technology", Vol. 9, N. 1, June 2011. ISSN: 0974-5513. [citation][year=2006]Feng Lu and Kris Bubendorfer. 2006. A JMX toolkit for merging network management systems. In Proceedings of the 29th Australasian Computer Science Conference - Volume 48 (ACSC '06), Vladimir Estivill-Castro and Gillian Dobbie (Eds.), Vol. 48. Australian Computer Society, Inc., Darlinghurst, Australia, Australia, 147-156. [citation][year=2006]H. M. Kelash, H. M. Faheem, and M. Amoon, A Multiagent System for Distributed Systems Management, Proceedings of World Academy of Science, Engineering and Technology, Volume 11, ISSN 1307-6884, February 2006. [citation][year=2005]Feng Lu, Integration of Mobile Agents with JMX, MSc Thesis, Victoria University of Wellington, 2005. [citation][year=2005]M. Eid, H. Artail, A. Kayssi, A. Chehab, Trends in Mobile Agent Applications, Journal of Research and Practice in Information Technology. Vol. 37, no. 4, pp. 323-351. November 2005. [citation][year=2005]H. M. Kelash, M Amoon, G. M. Ali, H. M. Faheem, "A Social Agent Interface for Resource Management in Distributed Systems," cimca,pp.390-395, International Conference on Computational Intelligence for Modelling, Control and Automation and International Conference on Intelligent Agents, Web Technologies and Internet Commerce Vol-2 (CIMCA-IAWTIC'05), 2005. [citation][year=2004]Emmanuel Reuter, Agents Mobiles : Itinéraires pour l"administration système et réseau, PhD thesis, Université de Nice Sophia Antipolis, May 2004. [citation][year=2003]Suchindra Katageri, Standards-based Infrastructure for Dynamic Extension of Network Management Services Using Mobile Code, MSc Thesis, University of Florida, 2003. [citation][year=2003]Michael Sievert, "Managing Communication Resources?, MsC Thesis, Mälardalen University, Sweden, 2003. [citation][year=2002]E. Reuter, F. Baude, "System and Network Management Itineraries for Mobile Agents?, Proceedings of the 4th International Workshop on Mobile Agents for Telecommunications Applications, MATA 2002, Barcelona, Spain. LNCS vol. 2521, pp. 227-238, October 2002. [citation][year=2002]Sandhya Sriraman, "An Annotated Bibliography of Mobile Agents in Networks?, Thesis Prepared for the Degree of Master Science, University of North Texas, Dezembro de 2002. [citation][year=2002]Steffen Lipperts, Mobile Agent Support Services. PhD Thesis, Rheinisch-Westfälischen Technischen Hochschule Aachen, 2002. [citation][year=2001]Kenneth, Andrews, Network node management system and method using proxy by extensible agents, Patent EP1158720, November 2001. [citation][year=2000]B. Pagurek, Y. Wang, T. White, "Integration of Mobile Agents With SNMP: Why and How?, Proceedings of NOMS"2000, IEEE Press. [citation][year=2000]P. Rivalta, "Mobile Agent Management?, MsC Thesis, Carleton University, Outubro de 2000. 1998(2 publications) [publication]Santos, L.E. and Santos, L.E. and Costa, P. and Simões, P. , "NetTrouble: a TTS for Network Management", 1998 [citation][year=2009]Ha Manh Tran, Christoph Lange, Georgi Chulkov, Jürgen Schönwälder, and Michael Kohlhase. 2009. Applying Semantic Techniques to Search and Analyze Bug Tracking Data. J. Netw. Syst. Manage. 17, 3 (September 2009), 285-308. DOI=10.1007/s10922-009-9134-4 [citation][year=2008]Ha Manh Tran, Georgi Chulkov, and Jürgen Schönwälder. Crawling Bug Tracker for Semantic Bug Search. DSOM, volume 5273 of Lecture Notes in Computer Science, page 55-68. Springer, (2008), DOI:10.1007/978-3-540-87353-2_5 [citation][year=2003]C Kühne, D Pauer, C Rautenstrauch, Ein Helpdesk-System zur Bearbeitung von Anliegen Studierender am Beispiel der VGU, Wirtschaftsinformatik 2003/Band I, pp. 893-900, 2003, Springer, Germany, DOI:10.1007/978-3-642-57444-3_46 [publication]Abrunhosa, J. and Graça, A. and Simões, P. , "Serviços Telemáticos: o caso da Biblioteca Nacional", 1998 1997(2 publications) [publication]Santos, L.E. and Santos, L.E. and Costa, P. and Simões, P. , "NetTrouble: um TTS flexível, distribuído e aberto", in Workshop, 1997 [publication]Mendonça, H. and Santos, O. and Rendall, P. and Simões, P. , "SNMP**", in Workshop, 1997 1994(2 publications) [publication]Brites, A. and Simões, P. and Leitão, P. and Edmundo Monteiro and Boavida, F. , "A High-level Notation for the Specification of Network Management Applications", vol. 2, 1994 [citation][year=2005]Bruno Dias, "An Entity Access Control Model for Network Services Management?, actas da CRC2005 " 8ª Conferência sobre Redes de Computadores, FCCN, Instituto Politécnico de Portalegre, 29-30 de Setembro de 2005. [citation][year=2003]Michael Sievert, "Managing Communication Resources?, MsC Thesis, Mälardalen University, Sweden, 2003 [citation][year=2003]Paulo Pereira, "Políticas activas para gestão de redes?, Dissertação de Doutoramento em Engenharia Electrotécnica e de Computadores, Universidade Técnica de Lisboa, Instituto Superior Técnico, 2003. [citation][year=2003]PRBA Pereira, POLÍTICAS ACTIVAS PARA GESTÃO DE REDES, Publication/NA, 2003 [citation][year=2002]B Dias, A Santos, F Boavida, Internet network services management framework, Networks, 2002. ICON 2002. …, 2002 [citation][year=2002]M Sievert, Managing Communication Resources, Department of Computer Science and Engineering, …, 2002 [citation][year=2001]Paulo Veríssimo, Luís Rodrigues, "Distributed Systems For System Architects?, Kluwer Academic Publishers, January 2001 [citation][year=2000]Freire, R. D., Sauvé, J. P., "Um Framework Baseado em Componentes de Software para Aplicações de Gerência de Falhas em Redes de Computadores?, Simpósio Brasileiro de Redes de Computadores, Belo Horizonte, 2000. [citation][year=2000]Freire, R. D., "Especificação de um framework baseado em componentes de software reutilizáveis para aplicações de gerência de faltas em redes de computadores?, Dissertação de Mestrado, Departamento de Sistemas e Computação da Universidade Federal de Campina Grande, Abril 2000 [citation][year=1999]Paulo Pereira, Pedro Pessoa, Luís Agostinho, "Gestão de Sistemas e Redes por Scripts?, Actas da CRC"99, Outubro de 1999, FCCN [citation][year=1999]Rui Pedro Lopes, José Luís Oliveira, "Implementação e Avaliação de Gestão Remota Sobre DISMAN?, Actas da CRC"99, Outubro de 1999, FCCN [citation][year=1996]M. R. Siegl and G. Trausmuth, "Hierarchical Network Management: A Concept and its Prototype in SNMPv2?, Computer Networks and ISDN Systems, Vol. 28, No. 4, Feb. 1996, pp. 141-152. [citation][year=1995]Manfred Siegl, George Trausmuth, "Hierarchical network management: A concept and its prototype in SNMPv2?, Proceedings of the 6th Joint European Networking Conference, Tel Aviv, May 15-18, 1995 [publication]Brites, A. and Simões, P. and Leitão, P. and Edmundo Monteiro and Boavida, F. , "A Protocol-independent Notation for the Specification of Operations and Management Applications", 1994 [citation][year=2002]Nelson dos Santos, Flávio Miguel Varejão, Orivaldo de Lira Tavares, "Multi-agent Systems and Network Management - A Positive Experience on Unix Environments?, in Proceedings of the 8th Ibero-American Conference on AI (IBERAMIA"2002), Seville, Spain, November 12-15, 2002. [citation][year=2000]R. P. Lopes, J. L. Oliveira, "On the use of Mobility in Distributed Network Management?, Proceedings of the 33rd Hawaii International Conference on System Sciences, IEEE Press, 2000. [citation][year=1999]Rui Lopes, José Luís Oliveira, "Implementação e Avaliação de Gestão Remota sobre DISMAN", in Actas da CRC"99, ÿvora, Outubro de 1999. [citation][year=1999]José Oliveira, Rui Lopes, "Distributed Management Based on Mobile Agents", in Proceedings of MATA"99 " Mobile Agents for Telecommunications Applications, Ottawa, Canada, October 1999. [citation][year=1995]José Luís Guimarães Oliveira, "Arquitectura para Desenvolvimento e Integração de Aplicações de Gestão?, Tese de Doutoramento, Departamento de Electrónica e Telecomunicações da Universidade de Aveiro, Setembro de 1995, pg. 123. Edited Books 2019(1 publication) [publication]Tiago Cruz and Simões, P. ,Proceedings of the 18th European Conference on Cyber Warfare and Security (ECCWS 2019) , "Proceedings of the 18th European Conference on Cyber Warfare and Security (ECCWS 2019)", vol. 1, 2019 2017(1 publication) [publication]Chemouil, P. and Edmundo Monteiro and Charalambides, M. and Simões, P. and Madeira, E. and Secci, S. and Gaspary, L.P. and Santos, C.R.P.d. ,Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM) Conference , "Proceedings of the IM 2017 - 2017 IFIP/IEEE International Symposium on Integrated Network Management", vol. 1, 2017 2011(1 publication) [publication]Boavida, F. and Jorge Sá Silva and Marilia Curado and Simões, P. and Edmundo Monteiro ,Proceedings of the CRC 2011 , "CRC 2011", vol. 1, 2011 2008(1 publication) [publication]Simões, P. and Edmundo Monteiro , "Actas da 4ª Conferência Nacional sobre Segurança Informática nas Organizações (SINO 2008)", vol. n/a, 2008 2007(1 publication) [publication]Simões, P. and Borcocci, E. , "Proceedings of the First WEIRD Workshop on WiMAX, Wireless and Mobility", 2007 Book Chapters 2020(1 publication) [publication]Rosa, L. and Freitas, M.B.d. and João Henriques and Quitério, P. and Caldeira, F. and Tiago Cruz and Simões, P. , "Evolving the Security Paradigm for Industrial IoT Environments", in Cyber Security of Industrial Control Systems in the Future Internet Environment (upcoming), ISBN13: 9781799829102, ISBN10: 1799829103, EISBN13: 9781799829126, DOI: 10.4018/978-1-7998-2910-2, vol. N/A, 2020 2018(1 publication) [publication]Lima, A. and Borges, P. and Sousa, B. and Simões, P. and Tiago Cruz , "An Introduction to Mobile Device Security", in Mobile Apps Engineering - ISBN 9781138054356, vol. 1, pp. 1-34, 2018 2017(1 publication) [publication]Konstantia Barbatsalou, Konstantia Barmpatsalou and Tiago Cruz and Edmundo Monteiro and Simões, P. , "From fuzziness to criminal investigation: An inference system for Mobile Forensics.", in Intrusion Detection and Prevention for Mobile Ecosystems, vol. 1, pp. 117-133, 2017 2015(5 publications) [publication]Simões, P. and Tiago Cruz and J. Proenca and Edmundo Monteiro , "Specialized Honeypots for SCADA Systems, in Cyber Security Analytics", in Cyber Security Analytics, Technology and Automation, vol. 1, pp. 251-269, 2015 [citation][year=2020]Cifranic, Nicholas & Romero-Mariona, Jose & Souza, Brian & Hallman, Roger. (2020). Decepti-SCADA: A Framework for Actively Defending Networked Critical Infrastructures, in Proc of 5th International Conference on Internet of Things, Big Data and Security (IoTBDS 2020)At: Prague, Czech Republic. May 2020 [citation][year=2020]You J., Lv S., Hao Y., Feng X., Zhou M., Sun L. (2020) Characterizing Internet-Scale ICS Automated Attacks Through Long-Term Honeypot Data. In: Zhou J., Luo X., Shen Q., Xu Z. (eds) Information and Communications Security. ICICS 2019. Lecture Notes in Computer Science, vol 11999. Springer, Cham. DOI: 10.1007/978-3-030-41579-2_5 [citation][year=2019]C. Dalamagkas, P. Sarigiannidis, D. Ioannidis, E. Iturbe, O. Nikolis, F. Ramos, E. Rios, A. Sarigiannidis and D. Tzovaras, "A Survey On Honeypots, Honeynets And Their Applications On Smart Grid", 1st International Workshop on Cyber-Security Threats, Trust and Privacy Management in Software-defined and Virtualized Infrastructures, Paris, France, 2019. [citation][year=2019]D. Pliatsios, P. Sarigiannidis, T. Liatifis, K. Rompolos and I. Siniosoglou, "A Novel and Interactive Industrial Control System Honeypot for Critical Smart Grid Infrastructure," 2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Limassol, Cyprus, 2019, pp. 1-6. doi: 10.1109/CAMAD.2019.8858431 [citation][year=2017]Dewar, Robert Scott (2017) Cyber security in the European Union: an historical institutionalist analysis of a 21st century security concern. PhD thesis, University of Glasgow. URL: http://theses.gla.ac.uk/8188/ [citation][year=2016]Jose Romero-Mariona, Roger Hallman, Megan Kline, John San Miguel, Maxine Majorand Lawrence Kerr, Security in the Industrial Internet of ThingsTheC-SECApproach, Proc. of the Int. Conf. on Internet of Things and Big Data (IoTBD 2016), pp. 413-420, ISBN: 978-989-758-183-0, 2016, SCITEPRESS [citation][year=2016]Jaehee Lee, Jinhyeok Jeon, Changyeob Lee, Junbeom Lee, Jaebin Cho, An implementation of log visualization system combined SCADA Honeypot, Proc. of the Int. Conf. on Advanced Communications Technology (ICACT2016), pp. 441-444, Phoenix Park, South Korea, Jan 31 – Feb 03, 2016 [publication]Tiago Cruz and Simões, P. and Edmundo Monteiro , "Optimizing the Delivery of Services Supported by Residential Gateways: Virtualized Residential Gateways", in Redesigning the Future of Internet Architectures, vol. 1, pp. 431-473, 2015 [publication]Caldeira, F. and Tiago Cruz and Simões, P. and Edmundo Monteiro , "Towards protecting critical infrastructures ", in Cybersecurity Policies and Strategies for Cyberwarfare Prevention, vol. 1, pp. 123-169, 2015 [citation][year=2019]van Niekerk, Brett. "Economic Information Warfare: Classifying Cyber-Attacks Against Commodity Value Chains." International Conference on Cyber Warfare and Security. Academic Conferences International Limited, 2019. [citation][year=2019]Sö?üt, Esra & Erdem, Ayhan. (2019). A Review of Research Studies on Cyber Terror. In book: Applying Methods of Scientific Inquiry Into Intelligence, Security, and Counterterrorism. DOI: 10.4018/978-1-5225-8976-1.ch008 [citation][year=2018]Piero Siroli, Gian. (2018). Considerations on the Cyber Domain as the New Worldwide Battlefield. The International Spectator. 53. 111-123. DOI:10.1080/03932729.2018.1453583. [citation][year=2018]Yu-Min Joo & Teck-Boon Tan (2018) Smart Cities: A New Age of Digital Insecurity, Survival, 60:2, 91-106, DOI: 10.1080/00396338.2018.1448577. URL (full paper): http://scholarbank.nus.sg/bitstream/10635/141601/1/10.108000396338.2018.1448577.pdf [citation][year=2017]Roger A. Hallman, Jose Romero-Mariona, et al., "Standardized and Repeatable Technology Evaluation for Cybersecurity Acquisition", SPAWAR Systems Pacific Technical Document 3316, February 2017. Available at: https://www.researchgate.net/profile/Roger_Hallman2/publication/316976845_Standardized_and_Repeatable_Technology_Evaluation_for_Cybersecurity_Acquisition/links/591b3e214585153b614fa208/Standardized-and-Repeatable-Technology-Evaluation-for-Cybersecurity-Acquisition.pdf [citation][year=2017]Kasemsap, K. "Robotics: Theory and Applications." In Cybersecurity Breaches and Issues Surrounding Online Threat Protection, pp. 311-345. IGI Global, 2017. DOI: 10.4018/978-1-5225-1941-6.ch013 [publication]Cardoso, A. and Moreira, F. and Simões, P. , "A Support Framework for Migration of e-Government Services to the Cloud", in Cloud Computing Technologies for Connected Government,, vol. 1, pp. 124-162, 2015 [publication]Sousa, B. and Simões, P. and Edmundo Monteiro and Konstantia Barbatsalou, Konstantia Barmpatsalou and Pereira, L. and Rodriguez, J. and Fonseca, H. and D. Palma and Nyanyo, A. and Wickson, P. and Bouwers, B. and Olcan, D. and Zerzib, D. and Brouet, J. and Lasserre, P. and Ladas, A. and Trcek, D. and Mueller, W. and Marques, H. , "Next-Generation Communication Systems for PPDR: the SALUS Perspective", in Wireless Public Safety Networks 1 – Overview and Challenges, vol. 1, pp. 49-94, 2015 2014(1 publication) [publication]Tiago Cruz and Simões, P. and Edmundo Monteiro , "Cloud-based Content Delivery to Home Ecosystems", in Advanced Content Delivery and Streaming in the Cloud, vol. 1, pp. 119-149, 2014 2009(1 publication) [publication]Neves, P. and Pentikousis, K. and Sargento, S. and Marilia Curado and Simões, P. and Fontes, F. , "Novel WiMAX Scenarios for Future Broadband Wireless Access Networks", in WiMAX Evolution: Emerging Technologies and Applications, pp. 45-67, 2009 [citation][year=2012]Borraz, Fernando. Las tecnologías de la información y el cambio climático en países en desarrollo. No. 010334. UNIVERSIDAD NACIONAL DE COLOMBIA SEDE MEDELLIN, 2012. [citation][year=2011]Karanasios, S. T. A. N. "New & emergent ICTs and climate change in developing countries." Center for Development Informatics. Institute for Development Policy and Managment, SED. University of Manchester (2011). [citation][year=2010]Stan Karanasios; David Allen, WiMAX for development, Information Technology for Development, Vol.16 Issue 4, 2010, pp. 320 – 328, DOI: 10.1080/02681102.2010.487046 Tech Report 2009(1 publication) [publication]Matos, F. and Simões, P. and Edmundo Monteiro , "State of the Art in Service Management and QoS on Inter-Domain Service Provisioning", 2009 2008(2 publications) [publication]Matos, F. and Matos, A. and Simões, P. and Edmundo Monteiro , "Inter-domain, on-demand VPNs mediated by a Business Layer (Technical Report)", 2008 [publication]Matos, F. and Matos, A. and Simões, P. and Edmundo Monteiro , "Managing Dynamic Inter-Domain Services (Technical Report)", 2008 2007(2 publications) [publication]Matos, A. and Matos, F. and Simões, P. and Edmundo Monteiro , "Global Business Layer Framework - Deliverable 5.0 (Technical Report)", 2007 [publication]Matos, A. and Matos, F. and Simões, P. and Edmundo Monteiro , "Global Business Layer Framework: Deliverable 4.0 (Technical Report)", 2007