Atividade de Pesquisa, Ensino e Extensão
Publicado em 12/06/2019 às 8:13
O LRG (Laboratório de Redes e Gerência) da UFSC realiza atividades de Pesquisa, Ensino e Extensão, principalmente, em “Gerência, Segurança e Sustentabilidade para Internet of Things (IoT), incluindo Cloud Computing, Fog, Edge… e usando Inteligência Artificial (IA), Blockchain, IDS, Gerenciamento de Identidade…
“Da natureza dos seus pensamentos depende a força do seu corpo, o vigor da sua inteligência, o sucesso do seu negócio e a alegria que as suas relações comunicam aos outros homens.”
Latin America Top 10.000 Scientists. “AD Scientific Index 2021 Version 1”
(From left to right – Professors Carlos and Carla; PhD students Leandro, Johann, Cristiano and Wesley).
“Deixe os outros pensarem como quiserem e serem o que quiserem. Só não permita que te dominem e decidam no mundo que é só seu.”
Networks and Management Laboratory
Publicado em 12/06/2019 às 8:00
³ Who shall ascend the mountain of the Lord, or who shall stand in his holy place?
⁴ He who has clean hands and a pure heart, who does not give up his soul to vanity, nor swear deceitfully.
⁵ He will receive blessing from the Lord and righteousness from the God of his salvation.
Presentation at UbiSec 2022, in Zhangjiajie, China. (https://www.youtube.com/watch?v=gKEj5XF1hUE)
“Happy are those conscious of their spiritual need, since the Kingdom of the heavens belongs to them” (Matthew 5:3).
“With the grace of God, we are always better at everything with wisdom, health, peace, love, prosperity, well-being, happiness… contributing to the universe”.
Recent “papers” , “slides” , “videos” , “others” , and links with more information.
MAIDAM in IoT/Fog/Cloud – Mutual Authentication, Intrusion Detection and Autonomic Management in IoT/Fog/Cloud Environments and AutoManSec 4 CloudIoT – Autonomic Management and Security for Cloud and IoT
A Formal Verification of a Reputation Multi-Factor Authentication Mechanism for Constrained Devices and Low-Power Wide-Area Network Using Temporal Logic
DNNET-Ensemble approach to detecting and identifying attacks in IoT environments
Intrusion detection with Machine Learning in Internet of Things and Fog Computing: problems, solutions and research
Two-step ensemble approach for intrusion detection and identification in IoT and fog computing environments
Autonomic energy management with Fog Computing
Mutual authentication with multi-factor in IoT-Fog-Cloud environment
Blockchain incentivized data forwarding in MANETs: Strategies and challenges
Hybrid approach to intrusion detection in fog-based IoT environments
Autonomic Intrusion Detection and Response Using Big Data
Order@Cloud: An agnostic meta‐heuristic for VM provisioning, adaptation, and organisation
Mutual Authentication for IoT in the Context of Fog Computing
Privacy Policies Model in Access Control
Cloud identity management: a survey on privacy strategies
Improving cloud computing virtual machines balancing through hosts and virtual machines similarities
Preserving Privacy with Fine-grained Authorization in an Identity Management System
A Framework and Risk Assessment Approaches for Risk-based Access Control in the Cloud
Order@Cloud: A VM Organisation Framework Based on Multi-Objectives Placement Ranking
A Model for Managed Elements under Autonomic Cloud Computing Management
A distributed autonomic management framework for cloud computing orchestration
RACLOUDS – Model for Clouds Risk Analysis in the Information Assets Context
Cloud resource management: a survey on forecasting and profiling models
Legacy Network Infrastructure Management Model for Green Cloud Validated Through Simulations
Operation, Management, Security and Sustainability for Cloud Computing
Green Clouds through Servers, Virtual Machines and Network Infrastructure Management
– “Provisioning, Resource Allocation, and DVFS in Green Clouds
– “Environment, Services and Network Management for Green Clouds
– ”Toward an Architecture for Monitoring Private Clouds”
– “Intrusion Detection for Grid and Cloud Computing”
Photos at Fórum RNP: