default search action
Eduardo Feitosa
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Andrey Antonio Rodrigues, Maria Lúcia Bento Villela, Eduardo Feitosa:
A Systematic Mapping Study on Social Network Privacy: Threats and Solutions. ACM Comput. Surv. 56(7): 182:1-182:29 (2024) - 2023
- [j8]Andrey Antonio Rodrigues, Maria Lúcia Bento Villela, Eduardo Luzeiro Feitosa:
Privacy Threat MOdeling Language. IEEE Access 11: 24448-24471 (2023) - [j7]Andrey Antonio Rodrigues, Maria Lúcia Bento Villela, Eduardo Feitosa:
Exploring how experienced and unexperienced professionals use a privacy threat modeling methodology. J. Interact. Syst. 14(1): 274-291 (2023) - 2022
- [j6]Carlo Marcelo Revoredo da Silva, Bruno José Torres Fernandes, Eduardo Luzeiro Feitosa, Vinicius Cardoso Garcia:
Piracema.io: A rules-based tree model for phishing prediction. Expert Syst. Appl. 191: 116239 (2022) - [c16]José Cezar de Souza Filho, Andréia Libório Sampaio, Eduardo Luzeiro Feitosa:
Hidden things and implicit interaction: looking back on how invisibility evolved as a quality-in-use attribute. IHC 2022: 19:1-19:11 - [c15]Andrey Antonio Rodrigues, Maria Lúcia Bento Villela, Eduardo Feitosa:
PTMOL: a suitable approach for modeling privacy threats in online social networks. IHC 2022: 25:1-25:12 - 2021
- [c14]Maurício M. Fiorenza, Diego Kreutz, Rodrigo B. Mansilha, Douglas D. J. de Macedo, Eduardo Feitosa, Roger Immich:
Representação e Aplicação de Políticas de Segurança em Firewalls de Redes Híbridas. SBRC 2021: 490-503 - 2020
- [j5]Carlo Marcelo Revoredo da Silva, Eduardo Luzeiro Feitosa, Vinicius Cardoso Garcia:
Heuristic-based strategy for Phishing prediction: A survey of URL-based approach. Comput. Secur. 88 (2020)
2010 – 2019
- 2019
- [j4]Jordan S. Queiroz, Eduardo Feitosa:
A Web Browser Fingerprinting Method Based on the Web Audio API. Comput. J. 62(8): 1106-1120 (2019) - [c13]Andrey Antonio Rodrigues, Eduardo Feitosa, Maria Lúcia Bento Villela, Natasha M. Costa Valentim:
Evaluating PIT-OSN 1 in inspecting the privacy levels of an online social network. IHC 2019: 25:1-25:11 - 2018
- [c12]Andrey Antonio Rodrigues, Natasha M. Costa Valentim, Eduardo Feitosa:
A Set of Privacy Inspection Techniques for Online Social Networks. IHC 2018: 3:1-3:11 - 2017
- [c11]Rodrigo Melo, Rafael Roque Aschoff, Djamel Sadok, Eduardo Feitosa:
Remote Routing Approach to Restricted Devices in MANETs. SBRC 2017 - 2016
- [j3]Diego Kreutz, Oleksandr Malichevskyy, Eduardo Feitosa, Hugo Cunha, Rodrigo da Rosa Righi, Douglas D. J. de Macedo:
A cyber-resilient architecture for critical security services. J. Netw. Comput. Appl. 63: 173-189 (2016) - [c10]Karla Susiane Pereira, Eduardo Feitosa, Tayana Conte:
A Taxonomy to Classify Risk End-User Profile in Interaction with the Computing Environment. HCI (20) 2016: 268-276 - 2015
- [c9]Kaio R. S. Barbosa, Eduardo Souto, Eduardo Feitosa, Khalil El-Khatib:
Identifying and Classifying Suspicious Network Behavior Using Passive DNS Analysis. CIT/IUCC/DASC/PICom 2015: 160-167 - [c8]Gabriela Coutinho, Judith Kelner, Rafael Aschoff, Eduardo Feitosa:
A role-based routing solution for MANET to support hierarchical rescue teams in emergency scenarios. ICOIN 2015: 13-18 - 2014
- [c7]Diego Kreutz, Eduardo Feitosa, Hugo Cunha, Heiko Niedermayer, Holger Kinkelin:
Increasing the Resilience and Trustworthiness of OpenID Identity Providers for Future Networks and Services. ARES 2014: 317-324 - [c6]Josias Lima Jr., Thiago Rodrigues, Rodrigo Melo, Gregório Correia, Djamel Fawzi Hadj Sadok, Judith Kelner, Eduardo Feitosa:
A Multipath Extension for the Heterogeneous Technology Routing Protocol. ADHOC-NOW 2014: 15-28 - [c5]Diego Kreutz, Eduardo Feitosa:
Identity Providers-as-a-Service built as Cloud-of-Clouds: challenges and opportunities. FedCSIS (Position Papers) 2014: 101-108 - [c4]Diego Kreutz, Alysson Neves Bessani, Eduardo Feitosa, Hugo Cunha:
Towards Secure and Dependable Authentication and Authorization Infrastructures. PRDC 2014: 43-52 - 2013
- [c3]Luciano Barreto, Frank Siqueira, Joni da Silva Fraga, Eduardo Feitosa:
An Intrusion Tolerant Identity Management Infrastructure for Cloud Computing Services. ICWS 2013: 155-162 - [c2]Josias Lima Junior, Thiago Rodrigues, Rodrigo Melo, Gregório Correia, Judith Kelner, Eduardo Feitosa:
On the tuning of wireless heterogeneous routing. PIMRC 2013: 3391-3396 - 2012
- [j2]Eduardo Feitosa, Eduardo Souto, Djamel Fawzi Hadj Sadok:
An orchestration approach for unwanted Internet traffic identification. Comput. Networks 56(12): 2805-2831 (2012) - [c1]Angelo Eduardo Nunan, Eduardo Souto, Eulanda Miranda dos Santos, Eduardo Feitosa:
Automatic classification of cross-site scripting in web pages using document-based and URL-based features. ISCC 2012: 702-707
2000 – 2009
- 2009
- [j1]Djamel Fawzi Hadj Sadok, Eduardo Souto, Eduardo Feitosa, Judith Kelner, Lars Westberg:
RIP - A robust IP access architecture. Comput. Secur. 28(6): 359-380 (2009)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-03 00:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint