default search action
João Bosco M. Sobral
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c12]Fernando Moita, Marco Silva, Luís M. Roseiro, Nuno Lavado, João Bosco M. Sobral:
A smart face-shield with active defogging against coronaVirus. SmartNets 2022: 1-5 - 2020
- [j6]Cristiano Antonio de Souza, Carlos Becker Westphall, Renato B. Machado, João Bosco Mangueira Sobral, Gustavo dos Santos Vieira:
Hybrid approach to intrusion detection in fog-based IoT environments. Comput. Networks 180: 107417 (2020) - [j5]Kleber Vieira, Fernando Luiz Koch, João Bosco M. Sobral, Carlos Becker Westphall, Jorge Lopes de Souza Leao:
Autonomic Intrusion Detection and Response Using Big Data. IEEE Syst. J. 14(2): 1984-1991 (2020)
2010 – 2019
- 2018
- [i1]Kleber Vieira, Fernando Koch, João Bosco Mangueira Sobral, Carlos Becker Westphall, Jorge Lopes de Souza Leao:
Autonomic Intrusion Response in Distributed Computing using Big Data. CoRR abs/1811.05407 (2018) - 2015
- [j4]André Albino Pereira, João Bosco M. Sobral, Carla M. Westphall:
Towards Scalability for Federated Identity Systems for Cloud-Based Environments. CLEI Electron. J. 18(3): 2 (2015) - 2014
- [c11]André Pereira, João Bosco M. Sobral, Carla M. Westphall:
Towards Scalability for Federated Identity Systems for Cloud-Based Environments. NTMS 2014: 1-5 - 2011
- [j3]Lucas Guardalben, Luis Javier García-Villalba, Fábio Buiati, João Bosco Mangueira Sobral, Eduardo Camponogara:
Self-Configuration and Self-Optimization Process in Heterogeneous Wireless Networks. Sensors 11(1): 425-454 (2011)
2000 – 2009
- 2008
- [c10]Azzedine Boukerche, Lucas Guardalben, João Bosco M. Sobral, Mirela Sechi Moretti Annoni Notare:
A Self-X Approach for OLSR Routing Protocol in Large-Scale Wireless Mesh Networks. GLOBECOM 2008: 778-783 - [c9]Azzedine Boukerche, Lucas Guardalben, João Bosco M. Sobral, Mirela Sechi Moretti Annoni Notare:
A performance evaluation of OLSR and AODV routing protocols using a self-configuration mechanism for heterogeneous wireless mesh networks. LCN 2008: 697-704 - [c8]I. V. M. de Lima, Joelson A. Degaspari, João Bosco M. Sobral:
Intrusion detection through artificial neural networks. NOMS 2008: 867-870 - 2007
- [j2]Azzedine Boukerche, Renato B. Machado, Kathia Regina L. Jucá, João Bosco M. Sobral, Mirela Sechi Moretti Annoni Notare:
An agent based and biological inspired real-time intrusion detection and security model for computer network operations. Comput. Commun. 30(13): 2649-2660 (2007) - [c7]Rodrigo Campiolo, Vivian Cremer, João Bosco M. Sobral:
On modeling for pervasive computing environments. MSWiM 2007: 240-243 - 2005
- [c6]João Paulo Delgado Preti, Fernando M. B. M. de Castilho, João Bosco M. Sobral, Kathia Regina L. Jucá, Mirela Sechi Moretti Annoni Notare, Azzedine Boukerche:
On the Use of Fuzzy Logic to Enhance Mobile Agents in Distributed E-Commerce. ICPADS (2) 2005: 525-528 - [c5]Renato B. Machado, Azzedine Boukerche, João Bosco M. Sobral, Kathia Regina L. Jucá, Mirela Sechi Moretti Annoni Notare:
A Hybrid Artificial Immune and Mobile Agent Intrusion Detection Based Model for Computer Network Operations. IPDPS 2005 - [r1]Azzedine Boukerche, Kathia Regina Lemos Jucá, Mirela Sechi Moretti Annoni Notare, João Bosco Mangueira Sobral:
Biological Inspired Based Intrusion Detection Models for Mobile Telecommunication Systems. Handbook of Bioinspired Algorithms and Applications 2005 - 2004
- [j1]Azzedine Boukerche, Kathia Regina L. Jucá, João Bosco M. Sobral, Mirela Sechi Moretti Annoni Notare:
An artificial immune based intrusion detection model for computer and telecommunication systems. Parallel Comput. 30(5-6): 629-646 (2004) - 2003
- [c4]Joubert de Castro Lima, Tiago Garcia de Senna Carneiro, Rodrigo Martins Pagliares, Júlio César Ferreira, João Bosco M. Sobral, Edgar Toshiro Yano:
Archcollect: A Set of Components Towards Web Users' Interactions. ICEIS (4) 2003: 308-316 - [c3]Kathia Regina L. Jucá, Azzedine Boukerche, João Bosco M. Sobral, Mirela Sechi Moretti Annoni Notare:
Human Immune Anomaly and Misuse Based Detection for Computer System Operations: PART II. IPDPS 2003: 146 - 2002
- [c2]Kathia Regina L. Jucá, Azzedine Boukerche, João Bosco M. Sobral:
Intrusion Detection Based on the Immune Human System. IPDPS 2002
1990 – 1999
- 1999
- [c1]Vera Lúcia Lorenet, João Bosco M. Sobral, Carlos Becker Westphall:
TMN Distributed Management with CORBA: A Experience in Alarm Surveillance. PDPTA 1999: 2692-2698
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint