A Praise for Defensive Programming: Leveraging Uncertainty for Effective Malware Mitigation | 0 | 0.34 | 2022 |
FineDIFT: Fine-Grained Dynamic Information Flow Tracking for Data-Flow Integrity Using Coprocessor | 0 | 0.34 | 2022 |
Predicting Different Types of Subtle Toxicity in Unhealthy Online Conversations. | 0 | 0.34 | 2021 |
One Size Does Not Fit All: A Longitudinal Analysis of Brazilian Financial Malware | 0 | 0.34 | 2021 |
Steps Towards An Healthcare Information Model Based On Openehr | 0 | 0.34 | 2021 |
Challenges And Pitfalls In Malware Research | 1 | 0.41 | 2021 |
On polynomials xn − 1 over binary fields whose irreducible factors are binomials and trinomials | 0 | 0.34 | 2021 |
A Novel Criterion of Reconstruction-based Anomaly Detection for Sparse-binary Data. | 0 | 0.34 | 2020 |
An Openehr Adoption In A Portuguese Healthcare Facility | 0 | 0.34 | 2020 |
Management of a Pandemic Based on an openEHR approach. | 0 | 0.34 | 2020 |
RICDaM - Recommending Interoperable and Consistent Data Models. | 0 | 0.34 | 2020 |
ADOG - Annotating Data with Ontologies and Graphs. | 0 | 0.34 | 2019 |
Tracking the Capture of Tacit Knowledge in Product Lifecycle Management Implementation. | 0 | 0.34 | 2019 |
Leveraging Ontologies for Knowledge Graph Schemas. | 0 | 0.34 | 2019 |
A Dual-Task Interference Game-Based Experimental Framework for Comparing the Usability of Authentication Methods | 0 | 0.34 | 2019 |
The properties of property alignment on the semantic web. | 0 | 0.34 | 2018 |
New Approach to an openEHR Introduction in a Portuguese Healthcare Facility. | 0 | 0.34 | 2018 |
API Blindspots: Why Experienced Developers Write Vulnerable Code. | 1 | 0.35 | 2018 |
FAROS: Illuminating In-memory Injection Attacks via Provenance-Based Whole-System Dynamic Information Flow Tracking | 0 | 0.34 | 2018 |
Cybersecurity and Privacy Issues in Brazil: Back, Now, and Then [Guest Editors' Introduction] | 0 | 0.34 | 2018 |
Environmental Factors on Concept Maps Design. | 0 | 0.34 | 2018 |
Dissecting Spear Phishing Emails for Older vs Young Adults: On the Interplay of Weapons of Influence and Life Domains in Predicting Susceptibility to Phishing. | 14 | 0.61 | 2017 |
Improving Nursing Practice through Interoperability and Intelligence | 0 | 0.34 | 2017 |
Towards an Intelligent Systems to Predict Nosocomial Infections in Intensive Care | 0 | 0.34 | 2017 |
An Information Flow-Based Taxonomy To Understand The Nature Of Software Vulnerabilities | 0 | 0.34 | 2016 |
Compound matching of biomedical ontologies | 3 | 0.42 | 2015 |
AML results for OAEI 2015. | 3 | 0.37 | 2015 |
Towards Cloud Storage Services Characterization | 0 | 0.34 | 2015 |
Inferring logical definitions using compound ontology matching. | 1 | 0.36 | 2015 |
Understanding Cloud Storage Services Usage: A Practical Case Study. | 0 | 0.34 | 2015 |
[email protected] Interface and Multimedia Database | 3 | 0.49 | 2014 |
Vulnerabilities as Blind Spots in Developer's Heuristic-Based Decision-Making Processes | 3 | 0.40 | 2014 |
RIBS@UA: interface to collect and store respiratory data, a preliminary study. | 1 | 0.38 | 2014 |
Ianus: secure and holistic coexistence with kernel extensions - a immune system-inspired approach | 2 | 0.41 | 2014 |
It's the psychology stupid: how heuristics explain software vulnerabilities and how priming can illuminate developer's blind spots. | 9 | 0.62 | 2014 |
Cooperation and security isolation of library OSes for multi-process applications | 11 | 0.69 | 2014 |
Automatic Wheeze Detection and Lung Function Evaluation - A Preliminary Study. | 3 | 0.41 | 2013 |
Bridging the Semantic Gap to Mitigate Kernel-Level Keyloggers | 0 | 0.34 | 2012 |
Holographic vulnerability studies: vulnerabilities as fractures in interpretation as information flows across abstraction boundaries | 6 | 0.45 | 2012 |
Trustworthy opportunistic sensing: A Social Computing Paradigm | 1 | 0.35 | 2011 |
A Socially-Aware Operating System for Trustworthy Computing | 0 | 0.34 | 2011 |
Understanding Cancer-Based Networks in Twitter Using Social Network Analysis | 2 | 0.41 | 2011 |
Protecting Kernel Code and Data with a Virtualization-Aware Collaborative Operating System | 11 | 0.49 | 2009 |
The Glance of an Observer on the War of Brands of Food Products | 0 | 0.34 | 2004 |