Linkedin

Member

Nuno Neves

Profile Picture of Nuno Neves

ONGOING

Acronym Title Funding Entity Start Date End Date
SMaRtChain Fast and Energy-efficient Distributed Consensus for Blockchains FCT 01/03/2023 28/02/2026

PAST

Acronym Title Funding Entity Start Date End Date
XIVT eXcellence In Variant Testing P2020 01/01/2020 30/06/2023
ThreatAdapt Adaptive Byzantine Fault and Intrusion Tolerance FCT 01/07/2019 30/06/2023
uPVN User-Centric Programmable Virtual Networks FCT 01/10/2018 30/09/2022
SEAL SEcurity progrAmming of web appLications FCT 01/08/2018 30/06/2022
IRCoC Intelligent Resilience for Cloud-of-Clouds Services FCT 01/07/2016 31/12/2019
DiSIEM Diversity Enhancements for SIEMs EU H2020 01/09/2016 31/08/2019
RSC Smart Grids Resilient Supervision and Control in Smart Grids FCT 01/03/2016 28/02/2018
SUPERCLOUD User-Centric Management of Security and Dependability in Clouds of Clouds EU H2020 01/02/2015 31/01/2018
SEGRID Security for smart Electricity GRIDs EU FP7 01/10/2014 31/12/2017
ParIS Strategic partnership in Information Security EU ERASMUS+ 01/10/2014 30/09/2017
Biobank Cloud Scalable, Secure Storage of Biobank Data EU FP7 01/12/2012 30/11/2015
SITAN SITAN - Services for Intrusion Tolerant Ad Hoc Networks FCT 01/04/2011 30/09/2014
MASSIF MASSIF - MAnagement of Security information and events in Service InFrastructures EU FP7 01/10/2010 30/09/2013
TClouds Trustworthy Clouds Privacy and Resilience for Internet-scale Critical Infrastructure EU FP7 01/10/2010 30/09/2013
REGENESYS Regeneration of Replicated Systems FCT 01/01/2010 31/12/2012
ReD Resilient Database Clusters FCT 01/04/2010 31/03/2012
DIVERSE Diversity for Intrusion Tolerant Systems FCT 01/01/2010 31/12/2011
ReSIST NoE ReSIST - Resilience for Survability in IST (Nework of Excellence) EU FP6 01/01/2006 31/03/2009
CRUTIAL CRitical UTility InfrastructurAL resilience EU FP6 01/01/2006 31/12/2008
to
Paulo AntunesIbéria MedeirosNuno NevesTowards PHP Vulnerability Detection at an Intermediate Language Level. In 2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume (DSN-S). IEEE, 2023 [Biblios]
Filipe RodriguesRodrigo SimõesNuno NevesFADO: A Federated Learning Attack and Defense Orchestrator. In 2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W). IEEE, 2023 [Biblios]
Nuno NevesTowards Fuzzing Target Lines. In 2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume (DSN-S). IEEE, 2022 [Biblios]
Iberia MedeirosNuno NevesMiguel CorreiaStatically Detecting Vulnerabilities by Processing Programming Languages as Natural Languages. IEEE Transactions on Reliability, 1-24, Institute of Electrical and Electronics Engineers (IEEE), 2022 [Biblios]
Ricardo MendesTiago OliveiraVinicius Vielmo CogoNuno Ferreira NevesAlysson Neves BessaniCHARON: A Secure Cloud-of-Clouds System for Storing and Sharing Big Data. IEEE Transactions on Cloud Computing, 9(4):1349-1361, Institute of Electrical and Electronics Engineers (IEEE), 2021 [Biblios]
Leyla Bilge Lorenzo CavallaroGiancarlo PellegrinoNuno NevesDetection of Intrusions and Malware, and Vulnerability Assessment, Springer International Publishing, Lecture Notes in Computer Science, 2021 [Biblios]
Francisco AraujoIberia MedeirosNuno NevesGenerating Tests for the Discovery of Security Flaws in Product Variants. In 2020 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW). IEEE, 2020 [Biblios]
Ana FidalgoIberia MedeirosPaulo AntunesNuno NevesTowards a Deep Learning Model for Vulnerability Detection on Web Application Variants. In 2020 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW). IEEE, 2020 [Biblios]
Iberia MedeirosNuno NevesEffect of Coding Styles in Detection of Web Application Vulnerabilities. In 2020 16th European Dependable Computing Conference (EDCC). IEEE, 2020 [Biblios]
Max AlalunaNuno NevesFernando M. V. RamosElastic Network Virtualization. In IEEE INFOCOM 2020 - IEEE Conference on Computer Communications. IEEE, 2020 [Biblios]
Clémentine MauriceLeyla BilgeGianluca StringhiniNuno NevesDetection of Intrusions and Malware, and Vulnerability Assessment, Springer International Publishing, Lecture Notes in Computer Science, 2020 [Biblios]
Pedro GomesNaercio MagaiaNuno NevesIndustrial and Artificial Internet of Things with Augmented Reality, In Internet of Things,Convergence of Artificial Intelligence and the Internet of Things, pages 323 - 346. Springer International Publishing, 2020 [Biblios]
Ricardo MorgadoIbéria MedeirosNuno NevesTowards Web Application Security by Automated Code Correction. In 15th International Conference on Evaluation of Novel Approaches to Software Engineering. SCITEPRESS - Science and Technology Publications, 2020 [Biblios]
Miguel GarciaAlysson BessaniNuno NevesLazarus: Automatic Management of Diversity in BFT Systems. In Proceedings of the 20th International Middleware Conference. ACM, 2019 [Biblios]
Iberia MedeirosMiguel BeatrizNuno NevesMiguel CorreiaSEPTIC: Detecting Injection Attacks and Vulnerabilities Inside the DBMS. IEEE Transactions on Reliability, 68(3):1168-1188, Institute of Electrical and Electronics Engineers (IEEE), 2019 [Biblios]
Wilson S. MeloAlysson BessaniNuno NevesAltair Olivo SantinLuiz F. Rust C. CarmoUsing Blockchains to Implement Distributed Measuring Systems. IEEE Transactions on Instrumentation and Measurement, 68(5):1503-1514, Institute of Electrical and Electronics Engineers (IEEE), 2019 [Biblios]
Paulo NunesIberia MedeirosJose C. FonsecaNuno NevesMiguel CorreiaMarco VieiraBenchmarking Static Analysis Tools for Web Security. IEEE Transactions on Reliability, 67(3):1159-1175, Institute of Electrical and Electronics Engineers (IEEE), 2018 [Biblios]
Ivo VacasIberia MedeirosNuno NevesDetecting Network Threats using OSINT Knowledge-Based IDS. In 2018 14th European Dependable Computing Conference (EDCC). IEEE, 2018 [Biblios]
Henrique MendesIberia MedeirosNuno NevesValidating and Securing DLMS/COSEM Implementations with the ValiDLMS Framework. In 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W). IEEE, 2018 [Biblios]
Andre NogueiraMiguel GarciaAlysson BessaniNuno NevesOn the Challenges of Building a BFT SCADA. In 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 2018 [Biblios]
Miguel GarciaNuno NevesAlysson BessaniSieveQ: A Layered BFT Protection System for Critical Services. IEEE Transactions on Dependable and Secure Computing, 15(3):511-525, Institute of Electrical and Electronics Engineers (IEEE), 2018 [Biblios]
Wilson MeloLuiz F. R. C. CarmoAlysson BessaniNuno NevesAltair SantinHow blockchains can improve measuring instruments regulation and control. In 2018 IEEE International Instrumentation and Measurement Technology Conference (I2MTC). IEEE, 2018 [Biblios]
Fabio PereiraNuno NevesFernando M. V. RamosSecure network monitoring using programmable data planes. In 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN). IEEE, 2017 [Biblios]
Iberia MedeirosMiguel BeatrizNuno NevesMiguel CorreiaDemonstrating a Tool for Injection Attack Prevention in MySQL. In 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 2017 [Biblios]
Bruno VavalaNuno NevesPeter SteenkisteSecure Tera-scale Data Crunching with a Small TCB. In 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 2017 [Biblios]
Max AlalunaEric VialNuno NevesFernando M. V. RamosSecure and Dependable Multi-Cloud Network Virtualization. In Proceedings of the 1st International Workshop on Security and Dependability of Multi-Domain Infrastructures - XDOMO'17. ACM Press, 2017 [Biblios]
Max AlalunaFernando M. V. RamosNuno Neves(Literally) Above the clouds: Virtualizing the network over multiple clouds. In 2016 IEEE NetSoft Conference and Workshops (NetSoft). IEEE, 2016 [Biblios]
Iberia MedeirosNuno NevesMiguel CorreiaEquipping WAP with WEAPONS to Detect Vulnerabilities: Practical Experience Report. In 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 2016 [Biblios]
Bruno VavalaNuno NevesPeter SteenkisteSecure Identification of Actively Executed Code on a Generic Trusted Component. In 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 2016 [Biblios]
Iberia MedeirosNuno NevesMiguel CorreiaDetecting and Removing Web Application Vulnerabilities with Static Analysis and Data Mining. IEEE Transactions on Reliability, 65(1):54-69, Institute of Electrical and Electronics Engineers (IEEE), 2016 [Biblios]
Ibéria MedeirosMiguel BeatrizNuno NevesMiguel CorreiaHacking the DBMS to Prevent Injection Attacks. In ACM Conference on Data and Applications Security and Privacy (CODASPY), 2016 [Biblios]
Ibéria MedeirosNuno NevesMiguel CorreiaDEKANT: a static analysis tool that learns to detect web application vulnerabilities. In Proceedings of the 25th International Symposium on Software Testing and Analysis - ISSTA 2016. ACM Press, 2016 [Biblios]
Bruno VavalaNuno NevesPeter SteenkisteSecuring Passive Replication Through Verification. In 2015 IEEE 34th Symposium on Reliable Distributed Systems (SRDS), pages 176-181, 2015 [Biblios]
Ibéria MedeirosNuno NevesMiguel CorreiaWeb Application Protection with the WAP Tool. In International Conference on Dependable Systems and Networks (DSN), 2014 [Biblios]
David MatosNuno NevesAlysson BessaniSITAN: Services for Ad Hoc Networks with Unknown Participants. In International Conference on Dependable Systems and Networks (DSN), 2014 [Biblios]
José LopesNuno NevesStopping a Rapid Tornado with a Puff. In IEEE Symposium on Security and Privacy, 2014 [Biblios]
José LopesNuno NevesRobustness of the RaptorQ FEC Code under Malicious Attacks. In 5th Simpósio de Informática (INFORUM), 2013 [Biblios]
Tiago CarvalhoHyong S. KimNuno NevesPACE Your Network: Fair and Controllable Multi-Tenant Data Center Networks. In IEEE International Conference on Communications (ICC), pages 3726-3731, 2013 [Biblios]
Miguel GarciaNuno NevesAlysson BessaniAn Intrusion-Tolerant Firewall Design for Protecting SIEM Systems. In WSR’13: Workshop on Systems Resilience (together with IEEE/IFIP DSN’13), 2013 [Biblios]
Manuel MendonçaNuno NevesIntercept: Profiling Windows Network Device Drivers. In 14th European Workshop on Dependable Computing (EWDC), 2013 [Biblios]
Ibéria MedeirosNuno NevesMiguel CorreiaSecuring Energy Metering Software with Automatic Source Code Correction. In IEEE International Conference on Industrial Informatics (INDIN), 2013 [Biblios]
Henrique MonizNuno NevesMiguel CorreiaByzantine Fault-Tolerant Consensus in Wireless Ad hoc Networks. IEEE TRANSACTIONS ON MOBILE COMPUTING, 12(12):2441-2454, 2013 [Biblios]
João AntunesNuno F. NevesAdaptive Monitoring to Detect Intrusions in Critical Servers. In International Conference on Dependable Systems and Networks (DSN), 2012 [Biblios]
João AntunesNuno F. NevesRecycling Test Cases to Detect Security Vulnerabilities. In 23nd Annual International Symposium on Software Reliability Engineering (ISSRE), 2012 [Biblios]
Miguel GarciaNuno NevesAlysson BessaniDIVERSYS: DIVErse Rejuvenation SYStem. In INFORUM - Simpósio de Informática, 2012 [Biblios]
João AntunesNuno NevesAutomatically Complementing Protocol Specifications From Network Traces. In 13th European Workshop on Dependable Computing, 2011 [Biblios]
Miguel GarciaAlysson Neves BessaniIlir GashiNuno Ferreira NevesRafael R. ObelheiroOS Diversity for Intrusion Tolerance: Myth or Reality?. In International Conference on Dependable Systems and Networks (DSN). IEEE, 2011 [Biblios]
João AntunesNuno NevesDiveInto: Supporting Diversity in Intrusion-Tolerant Systems. In 30th IEEE Symposium on Reliable Distributed Systems (SRDS), 2011 [Biblios]
João AntunesNuno NevesPaulo VerissimoReverse Engineering of Protocols from Network Traces. In 18th Working Conference on Reverse Engineering (WCRE), 2011 [Biblios]
João AntunesNuno NevesUsing Behavioral Profiles to Detect Software Flaws in Network Servers. In 2011 IEEE 22nd International Symposium on Software Reliability Engineering (ISSRE), pages 1-10. IEEE, 2011 [Biblios]
Henrique MonizNuno NevesMiguel CorreiaPaulo VerissimoRandomization Can Be a Healer: Consensus with Dynamic Omission Failures. DISTRIBUTED COMPUTING, 24(4):165-175, Springer Science and Business Media LLC, 2011 [Biblios]
Henrique MonizNuno Ferreira NevesMiguel CorreiaPaulo VeríssimoRITAS: Services for Randomized Intrusion Tolerance. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 8(1):122-136, 2011 [Biblios]
João AntunesNuno F. NevesPaulo VerissimoUsing Attack Injection on Closed Protocols. In Fast Abstract in Supplement of the International Conference on Dependable Systems and Networks (DSN’10), 2010 [Biblios]
Henrique MonizNuno F. NevesMiguel P. CorreiaTurquois: Byzantine Consensus in Wireless Ad hoc Networks. In In Proceedings of the International Conference on Dependable Systems and Networks (DSN), , 2010 [Biblios]
João AntunesNuno F. NevesMiguel P. CorreiaPaulo VeríssimoRui NevesVulnerability Discovery with Attack Injection. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 36(3):357-370, 2010 [Biblios]
Paulo SousaAlysson N. BessaniWagner S. DantasFabio SoutoMiguel CorreiaNuno F. NevesIntrusion-Tolerant Self-Healing Devices fror Critical Infrastructure Protection. In 39th IEEE International Conference on Dependable Systems and Networks (DSN 2009), 2009 [Biblios]
Henrique MonizNuno F. NevesMiguel CorreiaPaulo VerissimoRandomization Can Be a Healer: Consensus with Dynamic Omission Failures. In 23rd International Symposium on Distributed Computing (DISC). Springer Berlin Heidelberg, 2009 [Biblios]
Paulo VeríssimoNuno F. NevesMiguel CorreiaThe CRUTIAL Reference Critical Information Infrastructure Architecture: A Blueprint. INTERNATIONAL JOURNAL OF SYSTEM OF SYSTEMS ENGINEERING, 1(1-2):78-95, 2008 [Biblios]
Manuel MendonçaNuno Ferreira NevesFuzzing Wi-Fi Drivers to Locate Security Vulnerabilities. In European Dependable Computing Conference (EDCC), 2008 [Biblios]
João AntunesNuno Ferreira NevesPaulo VerissimoDetection and Prediction of Resource-Exhaustion Vulnerabilities. In IEEE International Symposium on Software Reliability Engineering (ISSRE), 2008 [Biblios]
Paulo VerissimoNuno F. NevesMiguel CorreiaThe CRUTIAL reference critical information infrastructure architecture: a blueprint. INTERNATIONAL JOURNAL OF SYSTEM OF SYSTEMS ENGINEERING, 1(1/2):78-95, 2008 [Biblios]
Paulo SousaNuno Ferreira NevesPaulo VeríssimoHidden Problems of Asynchronous Proactive Recovery. In Third Workshop on Hot Topics in System Dependability, 2007 [Biblios]
Manuel MendonçaNuno Ferreira NevesRobustness Testing of the Windows DDK. In International Conference on Dependable Systems and Networks , 2007 [Biblios]
Manuel MendonçaNuno Ferreira NevesFuzzing Wi-Fi Drivers to Locate Security Vulnerabilities. In 10th IEEE High Assurance Systems Engineering Symposium, 2007 [Biblios]
João AntunesNuno F. NevesPaulo VeríssimoFinding Local Resource Exhaustion Vulnerabilities. In International Symposium on Software Reliability Engineering, 2007 [Biblios]
Alysson Neves BessaniPaulo SousaMiguel CorreiaNuno F. NevesPaulo VeríssimoProtecting CRUTIAL Things. In 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007 [Biblios]
Veríssimo P.N. F. NevesM. CorreiaCRUTIAL: The Blueprint of a Reference Critical Information Infrastructure Architecture. In 1st International Workshop on Critical Information Infrastructures, 2006 [Biblios]
N. F. NevesJ. AntunesM. CorreiaP. VeríssimoR. NevesUsing Attack Injection to Discover New Vulnerabilities. In International Conference on Dependable Systems and Networks, 2006 [Biblios]
Moniz H.N. F. NevesM. CorreiaP. VeríssimoRandomized Intrusion-Tolerant Asynchronous Services. In International Conference on Dependable Systems and Networks, 2006 [Biblios]
Pan JiekeMiguel CorreiaNuno Ferreira NevesPaulo VeríssimoUm Núcleo de Segurança Distribuído para Suporte a Protocolos Tolerantes a Intrusões. In 1ª Conferência Nacional sobre Segurança Informática nas Organizações (SINO'2005), 2005 [Biblios]
José PascoalTiago JorgeMiguel CorreiaNuno Ferreira NevesPaulo VeríssimoFTP Tolerante a Intrusões. In 1ª Conferência Nacional sobre Segurança Informática nas Organizações (SINO'2005), 2005 [Biblios]
João AntunesNuno Ferreira NevesMiguel CorreiaPaulo VeríssimoRui NevesDiagnóstico de Vulnerabilidades através da Injecção de Ataques. In 1ª Conferência Nacional sobre Segurança Informática nas Organizações (SINO'2005), 2005 [Biblios]
Paulo SousaNuno Ferreira NevesPaulo VeríssimoA New Approach to Proactive Recovery. In Fifth European Dependable Computing Conference (EDCC-5), pages 35-40, 2005 [Biblios]
Paulo SousaNuno Ferreira NevesPaulo VeríssimoHow Resilient are Distributed f Fault/Intrusion-Tolerant Systems?. In International Conference on Dependable Systems and Networks (DSN'05), pages 98-107, 2005 [Biblios]
Paulo SousaNuno Ferreira NevesPaulo VeríssimoResilient State Machine Replication. In 11th Pacific Rim International Symposium on Dependable Computing (PRDC), pages 305-309, 2005 [Biblios]
Nuno Ferreira NevesMiguel CorreiaPaulo VeríssimoSolving Vector Consensus with a Wormhole. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 16(12):1120-1131, 2005 [Biblios]
Nuno Ferreira NevesMiguel CorreiaPaulo VeríssimoWormhole-Aware Byzantine Protocols. In The 2nd Bertinoro Workshop on Future Directions in Distributed Computing: Survivability – Ob-stacles and Solutions (FuDiCo: SOS), 2004 [Biblios]
Miguel CorreiaNuno Ferreira NevesPaulo VeríssimoHow to Tolerate Half Less One Byzantine Nodes in Practical Distributed Systems. In 23rd IEEE Symposium on Reliable Distributed Systems, pages 174-183, 2004 [Biblios]
Manuel MendonçaNuno Ferreira NevesApplication Updates on Point of Sale Devices. In IEEE first International Conference on E-business and Telecommunication (ICETE), 2004 [Biblios]
Manuel MendonçaNuno Ferreira NevesActualização Segura e Automática de Aplicações em Terminais de Venda. In 7ª Conferência sobre Redes de Computadores (CRC 2004), 2004 [Biblios]
Luis SardinhaNuno Ferreira NevesPaulo VeríssimoTolerating Intrusions in Grid Systems. In International Conference on Security and Management (SAM 2004), 2004 [Biblios]
Luis SardinhaNuno Ferreira NevesPaulo VeríssimoTolerância a Intrusões num Sistema em Grid. In 7ª Conferência sobre Redes de Computadores (CRC 2004), 2004 [Biblios]
Lau C. LungMiguel CorreiaNuno F. NevesPaulo VeríssimoA Simple Intrusion-Tolerant Reliable Multicast Protocol using the TTCB. In 21º Simpósio Brasileiro de Redes de Computadores, pages 649-663, 2003 [Biblios]
Paulo VeríssimoNuno Ferreira NevesMiguel CorreiaIntrusion-Tolerant Architectures: Concepts and Design, In Architecting Dependable Systems, pages 3 - 36. Springer-Verlag , 2003 [Biblios]
Miguel CorreiaPaulo VeríssimoNuno Ferreira NevesThe Design of a COTS Real-Time Distributed Security Kernel. In Fourth European Dependable Computing Conference (EDCC), 2002 [Biblios]
Miguel CorreiaPaulo VeríssimoNuno Ferreira NevesThe Architecture of a Secure Group Communication System based on Intrusion Tolerance. In IEEE International Workshop on Applied Reliable Group Communication (WARGC), 2001 [Biblios]
Paulo VeríssimoNuno F. NevesMiguel CorreiaThe Middleware Architecture of MAFTIA: A Blueprint. In IEEE Third Survivability Workshop (ISW), pages 157-161, 2000 [Biblios]