A cloud computing solution for patient's data collection in health care institutions CO Rolim, FL Koch, CB Westphall, J Werner, A Fracalossi, GS Salvador Second International Conference on eHealth, Telemedicine, and Social …, 2010 | 588 | 2010 |
Intrusion detection for grid and cloud computing K Vieira, A Schulter, CB Westphall, CM Westphall IEEE IT Professional 12 (4), 38-43, 2010 | 433 | 2010 |
Toward an architecture for monitoring private clouds SA De Chaves, RB Uriarte, CB Westphall IEEE Communications Magazine 49 (12), 130-137, 2011 | 290 | 2011 |
Cloud resource management: A survey on forecasting and profiling models R Weingärtner, GB Bräscher, CB Westphall Journal of Network and Computer Applications 47, 99-106, 2015 | 144 | 2015 |
Sla perspective in security management for cloud computing SA de Chaves, CB Westphall, FR Lamin Sixth International Conference on Networking and Services (ICNS), 2010, 212-217, 2010 | 144 | 2010 |
Hybrid approach to intrusion detection in fog-based IoT environments CA De Souza, CB Westphall, RB Machado, JBM Sobral, ... Computer Networks 180, 107417, 2020 | 131 | 2020 |
Multi-tenancy authorization system with federated identity for cloud-based environments using shibboleth MAP Leandro, TJ Nascimento, DR dos Santos, CM Westphall, ... Proceedings of the Eleventh International Conference on Networks, 88-93, 2012 | 97 | 2012 |
A dynamic risk-based access control architecture for cloud computing DR Dos Santos, CM Westphall, CB Westphall 2014 IEEE network operations and management symposium (NOMS), 1-9, 2014 | 70 | 2014 |
A framework and risk assessment approaches for risk-based access control in the cloud DR dos Santos, R Marinho, GR Schmitt, CM Westphall, CB Westphall Journal of Network and Computer Applications 74, 86-97, 2016 | 64 | 2016 |
Cloud identity management: A survey on privacy strategies J Werner, CM Westphall, CB Westphall Computer Networks 122, 29-42, 2017 | 58 | 2017 |
Analyzing the strength of Pell’s RSA C Thirumalai, M Senthilkumar, R Silambarasan, CB Westphall IJPT 8 (4), 21869-21874, 2016 | 56 | 2016 |
Decentralized network management using distributed artificial intelligence FL Koch, CB Westphall Journal of Network and Systems Management 9 (4), 375-388, 2001 | 43 | 2001 |
Two-step ensemble approach for intrusion detection and identification in IoT and fog computing environments CA De Souza, CB Westphall, RB Machado Computers & Electrical Engineering 98, 107694, 2022 | 42 | 2022 |
Provisioning and resource allocation for green clouds GA Geronimo, J Werner, CB Westphall, CM Westphall, L Defenti 12th International Conference on Networks (ICN), 2013 | 40 | 2013 |
Analyzing the strength of Pell's RSA T Chandrasegar, M Senthilkumar, R Silambarasan, CB Westphall IJPT 8 (4), 21869-21874, 2016 | 38 | 2016 |
Performance evaluation for proactive network management AS Morales De Franceschi, LF Kormann, CB Westphall IEEE International Conference on Communications, 1996. ICC 96. 1, 22-26 vol. 1, 1996 | 38* | 1996 |
A cyclical evaluation model of information security maturity E Alencar Rigon, C Merkle Westphall, D Ricardo dos Santos, ... Information Management & Computer Security 22 (3), 265-278, 2014 | 36 | 2014 |
Customer Security Concerns in Cloud Computing SA Chaves, CB Westphall, CM Westphall, GA Geronimo ICN 2011, The Tenth International Conference on Networks, 7-11, 2011 | 36 | 2011 |
Grid-M: Middleware to integrate mobile devices, sensors and grid computing HA Franke, FL Koch, CO Rolim, CB Westphall, DO Balen International Conference on Wireless and Mobile Communications (ICWMC'07), 19-24, 2007 | 36 | 2007 |
Risk-based dynamic access control for a highly scalable cloud federation DR dos Santos, CM Westphall, CB Westphall Proc. Seventh Int. Conf. Emerg. Secur. Information, Syst. Technol …, 2013 | 33 | 2013 |