Miguel Correia
Title
Cited by
Cited by
Year
DepSky: dependable and secure storage in a cloud-of-clouds
A Bessani, M Correia, B Quaresma, F André, P Sousa
Acm transactions on storage (tos) 9 (4), 1-33, 2013
8942013
Efficient byzantine fault-tolerance
GS Veronese, M Correia, AN Bessani, LC Lung, P Verissimo
IEEE Transactions on Computers 62 (1), 16-30, 2011
3022011
Intrusion-tolerant architectures: Concepts and design
PE Veríssimo, NF Neves, MP Correia
Architecting dependable systems, 3-36, 2003
2802003
Lucy in the sky without diamonds: Stealing confidential data in the cloud
F Rocha, M Correia
2011 IEEE/IFIP 41st International Conference on Dependable Systems and …, 2011
2302011
How to tolerate half less one Byzantine nodes in practical distributed systems
M Correia, NF Neves, P Verissimo
Proceedings of the 23rd IEEE International Symposium on Reliable Distributed …, 2004
1782004
Highly available intrusion-tolerant services with proactive-reactive recovery
P Sousa, AN Bessani, M Correia, NF Neves, P Verissimo
IEEE Transactions on Parallel and Distributed Systems 21 (4), 452-465, 2009
1732009
Spin one's wheels? Byzantine fault tolerance with a spinning primary
GS Veronese, M Correia, AN Bessani, LC Lung
2009 28th IEEE International Symposium on Reliable Distributed Systems, 135-144, 2009
1532009
SCFS: A Shared Cloud-backed File System
A Bessani, R Mendes, T Oliveira, N Neves, M Correia, M Pasin, ...
2014 USENIX Annual Technical Conference (USENIX ATC 14), 169-180, 2014
1472014
From consensus to atomic broadcast: Time-free Byzantine-resistant protocols without signatures
M Correia, NF Neves, P Veríssimo
The Computer Journal 49 (1), 82-96, 2006
1432006
DepSpace: a Byzantine fault-tolerant coordination service
AN Bessani, EP Alchieri, M Correia, JS Fraga
Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer …, 2008
1372008
The design of a COTS real-time distributed security kernel
M Correia, P Veríssimo, NF Neves
European Dependable Computing Conference, 234-252, 2002
1062002
Resilient intrusion tolerance through proactive and reactive recovery
P Sousa, AN Bessani, M Correia, NF Neves, P Verissimo
13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007 …, 2007
1032007
Detecting and removing web application vulnerabilities with static analysis and data mining
I Medeiros, N Neves, M Correia
IEEE Transactions on Reliability 65 (1), 54-69, 2015
1022015
The CRUTIAL way of critical infrastructure protection
AN Bessani, P Sousa, M Correia, NF Neves, P Verissimo
IEEE Security & Privacy 6 (6), 44-51, 2008
952008
Byzantine consensus in asynchronous message-passing systems: a survey
M Correia, GS Veronese, NF Neves, P Verissimo
International Journal of Critical Computer-Based Systems 2 (2), 141-161, 2011
902011
Automatic detection and correction of web application vulnerabilities using data mining to predict false positives
I Medeiros, NF Neves, M Correia
Proceedings of the 23rd international conference on World wide web, 63-74, 2014
872014
EBAWA: Efficient Byzantine agreement for wide-area networks
GS Veronese, M Correia, AN Bessani, LC Lung
2010 IEEE 12th International Symposium on High Assurance Systems Engineering …, 2010
772010
Practical hardening of crash-tolerant systems
M Correia, DG Ferro, FP Junqueira, M Serafini
2012 USENIX Annual Technical Conference (USENIX ATC 12), 453-466, 2012
742012
Anomaly-based intrusion detection in software as a service
G Nascimento, M Correia
2011 IEEE/IFIP 41st International Conference on Dependable Systems and …, 2011
722011
Using attack injection to discover new vulnerabilities
N Neves, J Antunes, M Correia, P Verissimo, R Neves
International Conference on Dependable Systems and Networks (DSN'06), 457-466, 2006
712006
The system can't perform the operation now. Try again later.
Articles 1–20