The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Rafael Timóteo de Sousa Júnior: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Gilseno de Souza Nunes Ribeiro, Rafael Timóteo de Sousa Júnior
    Webquest: An Internet Based Collaborative Learning Environment. [Citation Graph (0, 0)][DBLP]
    ICWI, 2002, pp:759-762 [Conf]
  2. Robson de Oliveira Albuquerque, Fabio Buiati, L. Javier García-Villalba, Daniel Silva Almendra, Leonardo Lobo Pulcineli, Rafael Timóteo de Sousa Júnior, Cláudia J. Barenco Abbas
    Proposal of a System for Searching and Indexing Heterogeneous Vulnerabilities Databases. [Citation Graph (0, 0)][DBLP]
    ICCSA (5), 2006, pp:819-828 [Conf]
  3. Ricardo Staciarini Puttini, Jean-Marc Percher, Ludovic Mé, Olivier Camp, Rafael Timóteo de Sousa Júnior, Cláudia J. Barenco Abbas, L. Javier García-Villalba
    A Modular Architecture for Distributed IDS in MANET. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2003, pp:91-113 [Conf]
  4. Ricardo Staciarini Puttini, Ludovic Mé, Rafael Timóteo de Sousa Júnior
    Preventive and Corrective Protection for Mobile Ad Hoc Network Routing Protocols. [Citation Graph (0, 0)][DBLP]
    WONS, 2004, pp:213-226 [Conf]
  5. Robson de Oliveira Albuquerque, Daniel Silva Almendra, Leonardo Lobo Pulcineli, Rafael Timóteo de Sousa Júnior, Cláudia J. Barenco Abbas, Luis Javier García-Villalba
    SisBrAV - Brazilian Vulnerability Alert System. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2005, pp:67-76 [Conf]
  6. Robson de Oliveira Albuquerque, Maíra Hanashiro, Rafael Timóteo de Sousa Júnior, Cláudia J. Barenco Abbas, Luis Javier García-Villalba
    MANET - Auto Configuration with Distributed Certification Authority models Considering Routing Protocols Usage. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2005, pp:57-66 [Conf]

  7. Enhancing an Integer Challenge-Response Protocol. [Citation Graph (, )][DBLP]


  8. Model for Trust within Information Technology Management. [Citation Graph (, )][DBLP]


  9. Trust-Based Countermeasures for Securing OLSR Protocol. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002