DepSky: dependable and secure storage in a cloud-of-clouds A Bessani, M Correia, B Quaresma, F André, P Sousa Acm transactions on storage (tos) 9 (4), 1-33, 2013 | 1039 | 2013 |
A survey on blockchain interoperability: Past, present, and future trends R Belchior, A Vasconcelos, S Guerreiro, M Correia ACM Computing Surveys (CSUR) 54 (8), 1-41, 2021 | 534 | 2021 |
Efficient byzantine fault-tolerance GS Veronese, M Correia, AN Bessani, LC Lung, P Verissimo IEEE Transactions on Computers 62 (1), 16-30, 2011 | 473 | 2011 |
Intrusion-tolerant architectures: Concepts and design PE Veríssimo, NF Neves, MP Correia Architecting dependable systems, 3-36, 2007 | 306 | 2007 |
Lucy in the sky without diamonds: Stealing confidential data in the cloud F Rocha, M Correia 2011 IEEE/IFIP 41st International Conference on Dependable Systems and …, 2011 | 263 | 2011 |
Spin one's wheels? Byzantine fault tolerance with a spinning primary GS Veronese, M Correia, AN Bessani, LC Lung 2009 28th IEEE International Symposium on Reliable Distributed Systems, 135-144, 2009 | 235 | 2009 |
How to tolerate half less one Byzantine nodes in practical distributed systems M Correia, NF Neves, P Verissimo Proceedings of the 23rd IEEE International Symposium on Reliable Distributed …, 2004 | 212 | 2004 |
Highly available intrusion-tolerant services with proactive-reactive recovery P Sousa, AN Bessani, M Correia, NF Neves, P Verissimo IEEE Transactions on Parallel and Distributed Systems 21 (4), 452-465, 2009 | 210 | 2009 |
From consensus to atomic broadcast: Time-free Byzantine-resistant protocols without signatures M Correia, NF Neves, P Veríssimo The Computer Journal 49 (1), 82-96, 2006 | 189 | 2006 |
Detecting and removing web application vulnerabilities with static analysis and data mining I Medeiros, N Neves, M Correia IEEE Transactions on Reliability 65 (1), 54-69, 2015 | 180 | 2015 |
SCFS: A Shared Cloud-backed File System A Bessani, R Mendes, T Oliveira, N Neves, M Correia, M Pasin, ... 2014 USENIX Annual Technical Conference (USENIX ATC 14), 169-180, 2014 | 177 | 2014 |
DepSpace: a Byzantine fault-tolerant coordination service AN Bessani, EP Alchieri, M Correia, JS Fraga Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer …, 2008 | 167 | 2008 |
Byzantine consensus in asynchronous message-passing systems: a survey M Correia, GS Veronese, NF Neves, P Verissimo International Journal of Critical Computer-Based Systems 2 (2), 141-161, 2011 | 127 | 2011 |
Automatic detection and correction of web application vulnerabilities using data mining to predict false positives I Medeiros, NF Neves, M Correia Proceedings of the 23rd international conference on World wide web, 63-74, 2014 | 124 | 2014 |
The CRUTIAL way of critical infrastructure protection AN Bessani, P Sousa, M Correia, NF Neves, P Verissimo IEEE Security & Privacy 6 (6), 44-51, 2008 | 123 | 2008 |
The design of a COTS real-time distributed security kernel M Correia, P Veríssimo, NF Neves European Dependable Computing Conference, 234-252, 2002 | 116 | 2002 |
BlockSim: blockchain simulator C Faria, M Correia 2019 IEEE International Conference on Blockchain (Blockchain), 439-446, 2019 | 110 | 2019 |
Resilient intrusion tolerance through proactive and reactive recovery P Sousa, AN Bessani, M Correia, NF Neves, P Verissimo 13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007 …, 2007 | 109 | 2007 |
EBAWA: Efficient Byzantine agreement for wide-area networks GS Veronese, M Correia, AN Bessani, LC Lung 2010 IEEE 12th International Symposium on High Assurance Systems Engineering …, 2010 | 108 | 2010 |
State machine replication in containers managed by Kubernetes HV Netto, LC Lung, M Correia, AF Luiz, LMS de Souza Journal of Systems Architecture 73, 53-59, 2017 | 101 | 2017 |