Name
Affiliation
Papers
MICHELE NOGUEIRA
Informatics Department, Federal University of Parana, Brazil
60
Collaborators
Citations 
PageRank 
135
131
23.46
Referers 
Referees 
References 
445
1925
654
Search Limit
1001000
Title
Citations
PageRank
Year
Learning From Network Data Changes for Unsupervised Botnet Detection00.342022
Performance Management on Multiple Communication Paths for Portable Assisted Living00.342021
Opportunistic Attribute Caching: Improving the Efficiency of ABAC in Fog-Based IoT Networks00.342021
Data-Driven C-RAN Optimization Exploiting Traffic and Mobility Dynamics of Mobile Users10.352021
A Defense Mechanism For Timing-Based Side-Channel Attacks On Iot Traffic00.342020
Social-based Cooperation of Vehicles for Data Dissemination of Critical Urban Events00.342020
Double Authentication Model based on PPG and ECG Signals.00.342020
GROWN: Local Data Compression in Real-Time To Support Energy Efficiency in WBAN00.342020
Traffic Model Based on Autoregression for PPG Signals in Wearable Networks10.372020
Detecting FDI Attack on Dense IoT Network with Distributed Filtering Collaboration and Consensus00.342020
Secure On-skin Biometric Signal Transmission using Galvanic Coupling00.342019
Context-aware network selection in heterogeneous wireless networks.10.352019
Clustering and reliability-driven mitigation of routing attacks in massive IoT systems10.362019
A Method for Identifying eHealth Applications Using Side-Channel Information.00.342019
Cryptographic Algorithms in Wearable Communications: An Empirical Analysis.00.342019
DEA - Anomaly Detection in Smart Environments using Artificial Intelligence.00.342019
A Continuous User Authentication System Based on Galvanic Coupling Communication for s-Health10.352019
MPTCP robustness against large-scale man-in-the-middle attacks.00.342019
A Self-Adaptable System for DDoS Attack Prediction Based on the Metastability Theory.00.342018
Microgrid Data Aggregation and Wireless Transfer Scheduling in the Presence of Time Sensitive Events.10.402018
The computer for the 21st century: present security & privacy challenges.10.382018
SPARTA: A survival performance degradation framework for identity federations.00.342017
Mapping critical illness early signs to priority alert transmission on wireless networks10.372017
Can MPTCP secure Internet communications from man-in-the-middle attacks?10.352017
CD-ASM: A new queuing paradigm to overcome bufferbloat effects in HetNets00.342017
A Survival Performance degrAdation fRamework for lArge-scale neTworked systems.00.342017
Corrigendum to "A framework for resilient and secure spectrum sensing on cognitive radio networks" [Computer Networks volume 79 (2015) 313-322].00.342017
A Stochastic Adaptive Model to Explore Mobile Botnet Dynamics00.342017
Self-Organized SDN Controller Cluster Conformations against DDoS Attacks Effects.00.342016
Offloading Cellular Networks Through V2v Communications - How To Select The Seed-Vehicles?20.372016
Avoiding Collisions by Time Slot Reduction Supporting Voice and Video in 802.11 Networks.00.342016
Non-Parametric Early Warning Signals from Volumetric DDoS Attacks.00.342016
Evaluation of Sybil attack detection approaches in the Internet of Things content dissemination20.402016
Virtual and unified address assignment for continuous communication in mobile networks00.342016
AoT: Authentication and Access Control for the Entire IoT Device Life-Cycle.150.942016
Anticipating Moves to Prevent Botnet Generated DDoS Flooding Attacks.00.342016
MAC Protocols for IEEE 802.11ax: Avoiding Collisions on Dense Networks.00.342016
A New Queue Discipline for Reducing Bufferbloat Effects in HetNet Concurrent Multipath Transfer.00.342016
Cognitive Radio Based Connectivity Management for Resilient End-to-End Communications in VANETs30.422016
Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things150.722015
Programmable Networks – From Software Defined Radio to Software Defined Networking190.712015
Data similarity aware dynamic node clustering in wireless sensor networks.70.452015
Mitigating DoS attacks in identity management systems through reorganizations30.392015
Aspirations, challenges, and open issues for software-based 5G networks in extremely dense and heterogeneous scenarios40.412015
Interoperability issues on heterogeneous wireless communication for smart cities.80.562015
Firefly-inspired and robust time synchronization for cognitive radio ad hoc networks30.422015
Connectivity management to support reliable communication on Cognitive vehicular networks10.352014
Interest-Based Forwarding for Satisfying User Preferences in Vehicular Networks.00.342014
Unwanted traffic characterization on IP networks by low interactive honeypot10.362014
A flexible multi-criteria scheme to detect primary user emulation attacks in CRAHNs00.342013
  • 1
  • 2