marinho.barcellos
marinho.barcellos
Home
News
People
Service
Publications
Internet Security
Talks
Teaching
Contact
Marinho Barcellos
Latest
The Age of DDoScovery: An Empirical Comparison of Industry and Academic DDoS Assessments
Quantifying Privacy in Cooperative Awareness Services Through Trajectory Reconstruction
PoT-PolKA: Let the Edge Control the Proof-of-Transit in Path-Aware Networks
Analyzing Remote Peering Deployment and Its Implications for Internet Routing
DDoS2Vec: Flow-Level Characterisation of Volumetric DDoS Attacks at Scale
A Close Look at Remote Peering
Provable Non-Frameability for 5G Lawful Interception
Light, Camera, Actions: characterizing the usage of IXPs' action BGP communities
POSTER: No Doppelgänger: Advancing Mobile Networks Against Impersonation in Adversarial Scenarios
Shoehorn: Towards Portable P4 for Low Cost Hardware
On the Latency Impact of Remote Peering
Helix: Traffic Engineering for Multi-Controller SDN
Dynamic Property Enforcement in Programmable Data Planes
AS-Path Prepending: there is no rose without a thorn
Spoofed Traffic Inference at IXPs: Challenges, Methods and Analysis
A Survey on the Current Internet Interconnection Practices
Challenges in Inferring Spoofed Traffic at IXPs
Decentralized proof of location in vehicular Ad Hoc networks
Dynamic Property Enforcement in Programmable Data Planes
Mitigating Position Falsification Attacks in Vehicular Platooning
Dynam-IX: a dynamic interconnection eXchange
Verification of P4 programs in feasible time using assertions
Research in Security and Privacy in Brazil
Vouch: A Secure Proof-of-Location Scheme for VANETs
POSTER: Dynam-IX: a Dynamic Interconnection eXchange
Picking a Partner: A Fair Blockchain Based Scoring Protocol for Autonomous Systems
POSTER: Dynam-IX: a Dynamic Interconnection eXchange
Uncovering Bugs in P4 Programs with Assertion-based Verification
Effects of colluding Sybil nodes in message falsification attacks for vehicular platooning
Achieving minimum bandwidth guarantees and work-conservation in large-scale, SDN-based datacenter networks
POSTER: Finding vulnerabilities in P4 programs with assertion-based verification
Sandboxing Data Plane Programs for Fun and Profit
Exploiting parallelism in hierarchical content stores for high-speed ICN routers
NDNrel: A mechanism based on relations among objects to improve the performance of NDN
On the impact of sybil attacks in cooperative driving scenarios
Optimal Service Function Chain Composition in Network Functions Virtualization
Packer: Minimizing multi-resource fragmentation and performance interference in datacenters
PredCloud: Providing predictable network performance in large-scale OpenFlow-enabled cloud platforms through trust-based allocation of resources
ASTORIA: A framework for attack simulation and evaluation in smart grids
How physical network topologies affect virtual network embedding quality: A characterization study based on ISP and datacenter networks
A toolset for efficient privacy-oriented virtual network embedding and its instantiation on SDN/OpenFlow-based substrates
Providing producer mobility support in NDN through proactive data replication
Making puzzles green and useful for adaptive identity management in large-scale distributed systems
An Overview of the Brazilian Academic Security Landscape
Global Problems, Global Solutions: prospecting opportunities for joint research on Computer Security
Edge-centric Computing: Vision and Challenges
Opportunistic resilience embedding (ORE): Toward cost-efficient resilient virtual networks
Virtual network security: threats, countermeasures, and challenges
Piecing Together the NFV Provisioning Puzzle: Efficient Placement and Chaining of Virtual Network Functions
Predictor: Providing fine-grained management and predictability in multi-tenant datacenter networks
IoNCloud: exploring application affinity to improve utilization and predictability in datacenters
Off the Wire Control: Improving the Control Plane Resilience through Cellular Networks
CCNrel: Leveraging relations among objects to improve the performance of CCN
Hierarchical Content Stores in High-Speed ICN Routers
A heuristic-based algorithm for privacy-oriented virtual network embedding
HIPER: Heuristic-based infrastructure expansion through partition reconnection for efficient Virtual Network Embedding
Reconnecting Partitions on Physical Infrastructures: Towards an Expansion Strategy for Efficient Virtual Network Embedding
Slowing down to speed up: Protecting users against massive attacks in content distribution systems
Survivor: An enhanced controller placement strategy for improving SDN survivability.
Virtualized Networks for Cloud Computing: state-of-the art and open challenges
Trust-based Grouping for Cloud Datacenters: improving security in shared infrastructures
DoS-resilient virtual networks through multipath embedding and opportunistic recovery
Beyond pollution and taste: A tag-based strategy to increase download quality in P2P file sharing systems
Characterizing the impact of network substrate topologies on virtual network embedding
Exploring your neighborhood: Comparing connection strategies in swarming networks through evolving graphs
No more backups: Toward efficient embedding of survivable virtual networks
Slowing down to speed up: Mitigating collusion attacks in Content Distribution Systems
Workflow specification and scheduling with security constraints in hybrid clouds
Make it Green and Useful: Reshaping Puzzles for Identity Management in Large-scale Distributed Systems
Beyond network simulators: Fostering novel distributed applications and protocols through extendible design
Characterizing dissemination of illegal copies of content through monitoring of BitTorrent networks
Denial-of-service attacks and countermeasures on BitTorrent
Disconnecting to connect: Understanding optimistic disconnection in BitTorrent
Identity management based on adaptive puzzles to protect P2P systems from Sybil attacks
Security-aware optimal resource allocation for virtual network embedding
A conservative strategy to protect P2P file sharing systems from pollution attacks
Challenging the feasibility of authentication mechanisms for P2P live streaming
Funnel: Choking Polluters in BitTorrent File Sharing Communities
Observing the BitTorrent universe through Telescopes
Securing P2P systems from Sybil attacks through adaptive identity management
Flexible and secure service discovery in ubiquitous computing
Choking polluters in BitTorrent file sharing communities
AGRADC: An Architecture for Autonomous Deployment and Configuration of Grid Computing Applications
Protecting BitTorrent: Design and evaluation of effective countermeasures against DoS attacks
TorrentLab: Investigating BitTorrent through simulation and live experiments
Attacking a swarm with a band of liars: Evaluating the impact of attacks on BitTorrent
Flexible security in peer-to-peer applications: Enabling new opportunities beyond file sharing
Bridging the gap between simulation and experimental evaluation in computer networks
Flexible Security Configuration & Deployment in Peer-to-Peer Applications
Hybrid reliable multicast with TCP-XM
Congestion control with ECN support in poll-based multicast protocols
Evaluating high-throughput reliable multicast for grid applications in production networks
Policy-based access control in peer-to-peer grid systems
Reliable multicast for the Grid: a case study in experimental computer science
High-Performance Reliable Multicasting for Grid Applications
Towards a flexible security framework for peer-to-peer based grid computing
Simulating Group Communication Protocols Through an Object-Oriented Framework
Simmcast: a Simulation Tool for Multicast Protocol Evaluation
A Multicast Transport Protocol for Reliable Group Applications
An end-to-end reliable multicast protocol using polling for scaleability
PRMP: A Scaleable Polling-based Reliable Multicast Protocol
The HetNOS network operating system: a tool for writing distributed applications
Cite
×