default search action
Newton Carlos Will
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c21]Tiago Heinrich, Newton Carlos Will, Rafael R. Obelheiro, Carlos Alberto Maziero:
Anywhere on Earth: A Look at Regional Characteristics of DRDoS Attacks. ICISSP 2024: 21-29 - [c20]Tiago Heinrich, Newton Carlos Will, Rafael R. Obelheiro, Carlos Alberto Maziero:
A Categorical Data Approach for Anomaly Detection in WebAssembly Applications. ICISSP 2024: 275-284 - [c19]Newton Carlos Will, Carlos Alberto Maziero:
Enclave Management Models for Safe Execution of Software Components. ICISSP 2024: 474-485 - [c18]Anderson Aparecido do Carmo Frasão, Tiago Heinrich, Vinicius Fulber-Garcia, Newton Carlos Will, Rafael R. Obelheiro, Carlos Alberto Maziero:
I See Syscalls by the Seashore: An Anomaly-based IDS for Containers Leveraging Sysdig Data. ISCC 2024: 1-6 - [c17]Calebe Helpa, Tiago Heinrich, Marcus Botacin, Newton Carlos Will, Rafael R. Obelheiro, Carlos Alberto Maziero:
The Use of the DWARF Debugging Format for the Identification of Potentially Unwanted Applications (PUAs) in WebAssembly Binaries. SECRYPT 2024: 442-449 - 2023
- [j3]Newton Carlos Will, Carlos Alberto Maziero:
Intel Software Guard Extensions Applications: A Survey. ACM Comput. Surv. 55(14s): 322:1-322:38 (2023) - [c16]Dalton Cézane Gomes Valadares, Alvaro Sobrinho, Newton Carlos Will, Kyller Costa Gorgônio, Angelo Perkusich:
Trusted and only Trusted. That is the Access! - Improving Access Control Allowing only Trusted Execution Environment Applications. AINA (3) 2023: 490-503 - [c15]Dalton Cézane Gomes Valadares, Newton Carlos Will, Álvaro Alvares de Carvalho César Sobrinho, Anna C. D. Lima, Igor S. Morais, Danilo F. S. Santos:
Security Challenges and Recommendations in 5G-IoT Scenarios. AINA (1) 2023: 558-573 - [c14]Rodrigo Lemos, Tiago Heinrich, Newton Carlos Will, Rafael R. Obelheiro, Carlos Alberto Maziero:
Inspecting Binder Transactions to Detect Anomalies in Android. SysCon 2023: 1-8 - 2022
- [j2]Dalton Cézane Gomes Valadares, Newton Carlos Will, Marco Aurélio Spohn, Danilo Freire de Souza Santos, Angelo Perkusich, Kyller Costa Gorgônio:
Confidential computing in cloud/fog-based Internet of Things scenarios. Internet Things 19: 100543 (2022) - [c13]Tiago Heinrich, Carlos Alberto Maziero, Newton Carlos Will, Rafael R. Obelheiro:
How DRDoS attacks vary across the globe? IMC 2022: 760-761 - [c12]Amanda B. Viescinski, Tiago Heinrich, Newton Carlos Will, Carlos Maziero:
Behavior Modeling of a Distributed Application for Anomaly Detection. SECRYPT 2022: 333-340 - [c11]Rodrigo Lemos, Tiago Heinrich, Carlos Alberto Maziero, Newton Carlos Will:
Is It Safe? Identifying Malicious Apps Through the Use of Metadata and Inter-Process Communication. SysCon 2022: 1-8 - [c10]Newton Carlos Will:
A Privacy-Preserving Data Aggregation Scheme for Fog/Cloud-Enhanced IoT Applications Using a Trusted Execution Environment. SysCon 2022: 1-5 - 2021
- [j1]Dalton Cézane Gomes Valadares, Newton Carlos Will, Jean Caminha, Mirko Barbosa Perkusich, Angelo Perkusich, Kyller Costa Gorgônio:
Systematic Literature Review on the Use of Trusted Execution Environments to Protect Cloud/Fog-Based Internet of Things Applications. IEEE Access 9: 80953-80969 (2021) - [c9]Dalton Cézane Gomes Valadares, Newton Carlos Will, Marco Aurélio Spohn, Danilo Freire de Souza Santos, Angelo Perkusich, Kyller Costa Gorgônio:
Trusted Execution Environments for Cloud/Fog-based Internet of Things Applications. CLOSER 2021: 111-121 - [c8]Newton Carlos Will, Dalton Cézane Gomes Valadares, Danilo Freire de Souza Santos, Angelo Perkusich:
Intel Software Guard Extensions in Internet of Things Scenarios: A Systematic Mapping Study. FiCloud 2021: 342-349 - [c7]Jessica Iara Pegorini, Alinne Cristinne Corrêa Souza, André Roberto Ortoncelli, Rodrigo Tomaz Pagno, Newton Carlos Will:
Security and Threats in the Brazilian e-Voting System: A Documentary Case Study Based on Public Security Tests. ICEGOV 2021: 157-164 - [c6]Newton Carlos Will, Tiago Heinrich, Amanda B. Viescinski, Carlos Alberto Maziero:
Trusted Inter-Process Communication Using Hardware Enclaves. SysCon 2021: 1-7 - 2020
- [c5]Marciano da Rocha, Dalton Cézane Gomes Valadares, Angelo Perkusich, Kyller Costa Gorgônio, Rodrigo Tomaz Pagno, Newton Carlos Will:
Trusted Client-Side Encryption for Cloud Storage. CLOSER (Selected Papers) 2020: 1-24 - [c4]Marciano da Rocha, Dalton Cézane Gomes Valadares, Angelo Perkusich, Kyller Costa Gorgônio, Rodrigo Tomaz Pagno, Newton Carlos Will:
Secure Cloud Storage with Client-side Encryption using a Trusted Execution Environment. CLOSER 2020: 31-43 - [c3]Newton Carlos Will, Carlos Alberto Maziero:
Using a Shared SGX Enclave in the UNIX PAM Authentication Service. SysCon 2020: 1-7 - [i1]Marciano da Rocha, Dalton Cézane Gomes Valadares, Angelo Perkusich, Kyller Costa Gorgônio, Rodrigo Tomaz Pagno, Newton Carlos Will:
Secure Cloud Storage with Client-Side Encryption Using a Trusted Execution Environment. CoRR abs/2003.04163 (2020)
2010 – 2019
- 2018
- [c2]Rafael C. R. Conde, Carlos Alberto Maziero, Newton Carlos Will:
Using Intel SGX to Protect Authentication Credentials in an Untrusted Operating System. ISCC 2018: 158-163 - 2012
- [c1]Newton Carlos Will, Rafael Cardoso:
Implementation of the IEEE Std 1459-2010 using Kalman filter for fundamental and harmonics detection. ISGT Europe 2012: 1-7
Coauthor Index
aka: Carlos Alberto Maziero
aka: Dalton Cézane Gomes Valadares
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint