Authorship Verification for Short Messages Using Stylometry ML Brocardo, I Traore, S Saad, I Woungang Conference on Computer, Information and Telecommunication Systems (CITS 2013), 2013 | 183 | 2013 |
Authorship verification using deep belief network systems ML Brocardo, I Traore, I Woungang, MS Obaidat International Journal of Communication Systems 30 (12), e3259, 2017 | 94 | 2017 |
Authorship verification of e-mail and tweet messages applied for continuous authentication ML Brocardo, I Traore, I Woungang Journal of Computer and System Sciences 81 (8), 1429-1440, 2015 | 92 | 2015 |
Toward a framework for continuous authentication using stylometry ML Brocardo, I Traore, I Woungang 2014 IEEE 28th international conference on advanced information networking …, 2014 | 49 | 2014 |
Secure personalized trust-based messages classification system and method I Traore, ML Brocardo US Patent 10,812,495, 2020 | 45 | 2020 |
Verifying online user identity using stylometric analysis for short messages ML Brocardo, I Traore, S Saad, I Woungang Journal of networks 9 (12), 3347, 2014 | 31 | 2014 |
Towards an infrastructure to support big data for a smart city project E Gomes, MAR Dantas, DDJ De Macedo, C De Rolt, ML Brocardo, ... 2016 IEEE 25th international conference on enabling technologies …, 2016 | 30 | 2016 |
Continuous authentication using writing style ML Brocardo, I Traore, I Woungang Biometric-based physical and cybersecurity systems, 211-232, 2019 | 21 | 2019 |
Continuous authentication using micro-messages ML Brocardo, I Traore 2014 Twelfth Annual International Conference on Privacy, Security and Trust …, 2014 | 15 | 2014 |
COLLEGA middleware for the management of participatory Mobile Health Communities CR De Rolt, R Montanari, ML Brocardo, L Foschini, J da Silva Dias 2016 IEEE Symposium on Computers and Communication (ISCC), 999-1005, 2016 | 13 | 2016 |
Privacy information in a positive credit system ML Brocardo, CRD Rolt, JDS Dias, RF Custodio, I Traore International Journal of Grid and Utility Computing 8 (1), 61-69, 2017 | 8 | 2017 |
Context-aware intrusion alerts verification approach S Saad, I Traore, ML Brocardo 2014 10th International Conference on Information Assurance and Security, 53-59, 2014 | 6 | 2014 |
Introdução à certificação digital: da criptografia ao carimbo de tempo ML Brocardo, CR De Rolt, R Fernandes Bry Tecnologia, Disponível em:< http://www. tj. sc. gov. br/encontro/2006 …, 2006 | 5 | 2006 |
Secure personalized trust-based messages classification system and method I Traore, ML Brocardo US Patent 11,516,223, 2022 | 3 | 2022 |
I2 AC: um protocolo criptográfico para análise segura de crédito ML Brocardo Universidade Federal de Santa Catarina, Centro Tecnológico. Programa de Pós …, 2001 | 3 | 2001 |
Continuous Authentication using Stylometry ML Brocardo | 2 | 2015 |
Identifying APT Attack Stages Using Anomaly Score Calibration OL Soh, I Traore, I Woungang, W Lu, ML Brocardo 2024 8th Cyber Security in Networking Conference (CSNet), 133-137, 2024 | | 2024 |
Ciência Cidada Baseada em Big Data Aplicada ao Planejamento Urbano E Gomes, MAR Dantas, DDJ de Macedo, J Dias, C De Rolt, M Brocardo, ... Anais do X Brazilian e-Science Workshop, 261-268, 2016 | | 2016 |
Sharing Privacy Information in Credit Analysis Environment ML Brocardo, RF Custodio, CR De Rolt, JDS Dias, I Traore 2015 Ninth International Conference on Complex, Intelligent, and Software …, 2015 | | 2015 |
Um Modelo de Segurança e Controle de Acesso ao Registro Eletrônico de Pacientes na Web ML Brocardo, FA Costa, C Tatara, R Andrade, J Wallauer, A Savaris, ... | | |