Publicações por docente

Adriana Moreira Silva

  1. CHEN, H. et al. Using twitter to predict when vulnerabilities will be exploited. In:Proceedings of the 25th ACM SIGKDD International Conference on Knowledge DiscoveryData Mining. New York, NY, USA: Association for Computing Machinery, 2019. (KDD’19).
  2. NAPPA, A. et al. The attack of the clones: A study of the impact of shared code onvulnerability patching. In: IEEE.2015 IEEE symposium on security and privacy. [S.l.],2015

Alex Goncalves Correia*

  1. XIAO, C. et al. From patching delays to infection symptoms: Using risk profiles foran early discovery of vulnerabilities exploited in the wild. In:27th USENIX SecuritySymposium (USENIX Security 18)

Ana Elvira Wuo

  1. CHEN, H. et al. Using twitter to predict when vulnerabilities will be exploited. In:Proceedings of the 25th ACM SIGKDD International Conference on Knowledge DiscoveryData Mining. New York, NY, USA: Association for Computing Machinery, 2019. (KDD’19).

Ana Helena da Silva Delfino Duarte

  1. asdfkjasd asdf asdf asdf asdf asdfas dfa
  2. CHEN, H. et al. Using twitter to predict when vulnerabilities will be exploited. In:Proceedings of the 25th ACM SIGKDD International Conference on Knowledge DiscoveryData Mining. New York, NY, USA: Association for Computing Machinery, 2019. (KDD’19).
  3. XIAO, C. et al. From patching delays to infection symptoms: Using risk profiles foran early discovery of vulnerabilities exploited in the wild. In:27th USENIX SecuritySymposium (USENIX Security 18)
  4. NAPPA, A. et al. The attack of the clones: A study of the impact of shared code onvulnerability patching. In: IEEE.2015 IEEE symposium on security and privacy. [S.l.],2015

Emerson Ricardo Pansarin

  1. XIAO, C. et al. From patching delays to infection symptoms: Using risk profiles foran early discovery of vulnerabilities exploited in the wild. In:27th USENIX SecuritySymposium (USENIX Security 18)