Name
Affiliation
Papers
DANIELA OLIVEIRA
Bowdoin College
44
Collaborators
Citations 
PageRank 
141
75
16.75
Referers 
Referees 
References 
252
1016
445
Search Limit
1001000
Title
Citations
PageRank
Year
A Praise for Defensive Programming: Leveraging Uncertainty for Effective Malware Mitigation00.342022
FineDIFT: Fine-Grained Dynamic Information Flow Tracking for Data-Flow Integrity Using Coprocessor00.342022
Predicting Different Types of Subtle Toxicity in Unhealthy Online Conversations.00.342021
One Size Does Not Fit All: A Longitudinal Analysis of Brazilian Financial Malware00.342021
Steps Towards An Healthcare Information Model Based On Openehr00.342021
Challenges And Pitfalls In Malware Research10.412021
On polynomials xn − 1 over binary fields whose irreducible factors are binomials and trinomials00.342021
A Novel Criterion of Reconstruction-based Anomaly Detection for Sparse-binary Data.00.342020
An Openehr Adoption In A Portuguese Healthcare Facility00.342020
Management of a Pandemic Based on an openEHR approach.00.342020
RICDaM - Recommending Interoperable and Consistent Data Models.00.342020
ADOG - Annotating Data with Ontologies and Graphs.00.342019
Tracking the Capture of Tacit Knowledge in Product Lifecycle Management Implementation.00.342019
Leveraging Ontologies for Knowledge Graph Schemas.00.342019
A Dual-Task Interference Game-Based Experimental Framework for Comparing the Usability of Authentication Methods00.342019
The properties of property alignment on the semantic web.00.342018
New Approach to an openEHR Introduction in a Portuguese Healthcare Facility.00.342018
API Blindspots: Why Experienced Developers Write Vulnerable Code.10.352018
FAROS: Illuminating In-memory Injection Attacks via Provenance-Based Whole-System Dynamic Information Flow Tracking00.342018
Cybersecurity and Privacy Issues in Brazil: Back, Now, and Then [Guest Editors' Introduction]00.342018
Environmental Factors on Concept Maps Design.00.342018
Dissecting Spear Phishing Emails for Older vs Young Adults: On the Interplay of Weapons of Influence and Life Domains in Predicting Susceptibility to Phishing.140.612017
Improving Nursing Practice through Interoperability and Intelligence00.342017
Towards an Intelligent Systems to Predict Nosocomial Infections in Intensive Care00.342017
An Information Flow-Based Taxonomy To Understand The Nature Of Software Vulnerabilities00.342016
Compound matching of biomedical ontologies30.422015
AML results for OAEI 2015.30.372015
Towards Cloud Storage Services Characterization00.342015
Inferring logical definitions using compound ontology matching.10.362015
Understanding Cloud Storage Services Usage: A Practical Case Study.00.342015
[email protected] Interface and Multimedia Database30.492014
Vulnerabilities as Blind Spots in Developer's Heuristic-Based Decision-Making Processes30.402014
RIBS@UA: interface to collect and store respiratory data, a preliminary study.10.382014
Ianus: secure and holistic coexistence with kernel extensions - a immune system-inspired approach20.412014
It's the psychology stupid: how heuristics explain software vulnerabilities and how priming can illuminate developer's blind spots.90.622014
Cooperation and security isolation of library OSes for multi-process applications110.692014
Automatic Wheeze Detection and Lung Function Evaluation - A Preliminary Study.30.412013
Bridging the Semantic Gap to Mitigate Kernel-Level Keyloggers00.342012
Holographic vulnerability studies: vulnerabilities as fractures in interpretation as information flows across abstraction boundaries60.452012
Trustworthy opportunistic sensing: A Social Computing Paradigm10.352011
A Socially-Aware Operating System for Trustworthy Computing00.342011
Understanding Cancer-Based Networks in Twitter Using Social Network Analysis20.412011
Protecting Kernel Code and Data with a Virtualization-Aware Collaborative Operating System110.492009
The Glance of an Observer on the War of Brands of Food Products00.342004