Minicursos do XXXVII Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos
Sinopse
O Livro de Minicursos do XXXVII Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos (SBRC 2019) aborda temas atuais e de interesse da comunidade, como blockchains, virtualização de redes, computação urbana, processamento de pacotes, redes sem fio, criptografia e ciência de dados.
No primeiro capítulo, intitulado “Segurança na Internet do Futuro: Provendo Confiança Distribuída através de Correntes de Blocos na Virtualização de Funções de Rede” os autores discutem os principais fundamentos de corrente de blocos (blockchain), e relacionam estes conceitos aos desafios de pesquisa em segurança nas redes de nova geração.
No segundo capítulo, “Computação Urbana da Teoria à Prática: Fundamentos, Aplicações e Desafios”, os autores discutem o conceito de Computação Urbana, que correlaciona o sensoriamento urbano, gerenciamento de dados e sua análise para fornecer serviços com o potencial de melhorar a qualidade da vida dos habitantes de grandes centros urbanos, e apresentam os passos necessários para desenvolver uma aplicação nessa área.
No terceiro capítulo, “Processamento Rápido de Pacotes com eBPF e XDP”, os autores têm como objetivo apresentar o Extended Berkeley Packet Filter (eBPF), que é utilizado para o processamento rápido de pacotes de redes.
No quarto capítulo, “Análise de Dados em Redes Sem Fio de Grande Porte: Processamento em Fluxo em Tempo Real, Tendências e Desafios”, os autores apresentam os principais métodos de amostragem, coleta de dados e monitoramento de redes sem fio, e caracterizam a extração do conhecimento como um problema de aprendizado de máquina em processamento de grandes volumes de dados.
No quinto capítulo, “Introdução à Criptografia para Administradores de Sistemas com TLS, OpenSSL e Apache mod_ssl”, os autores abordam a utilização de criptografia por estudantes e profissionais de tecnologia da informação com pouca experiência em segurança e criptografia.
No sexto e último capítulo, “Introdução à Ciência de Dados: Uma Visão Pragmática utilizando Python, Aplicações e Oportunidades em Redes de Computadores”, os autores apresentam, através da linguagem Python e de bibliotecas específicas, os métodos mais utilizados para manipular e analisar dados e extrair informações, aplicando-os na resolução de problemas da área de redes de computadores.
Os seis capítulos abordam de forma ampla temas atuais da comunidade, sendo uma obra útil para pesquisadores e profissionais da área de redes de computadores e sistemas distribuídos.
Capítulos:
Downloads
Referências
(2012). The CRIME attack: netifera.com. URL: http://netifera.com.
(2013). The BREACH attack: SSL GONE IN 30 SECONDS. URL: http://breachattack.com.
(2016). The logjam attack and weak diffie-hellman. URL: https://weakdh.org.
Aaron, B., Tamir, D. E., Rishe, N. D. e Kandel, A. (2014). Dynamic incremental k-means clustering. Em 2014 International Conference on Computational Science and Computational Intelligence, volume 1, p. 308–313.
Abdelsalam, A., Clad, F., Filsfils, C., Salsano, S., Siracusano, G., and Veltri, L. (2017). Implementation of virtual network function chaining through segment routing in a linux-based NFV infrastructure. In 2017 IEEE Conference on Network Softwarization: Softwarization Sustaining a Hyper-Connected World: en Route to 5G, NetSoft 2017, pages 1–5. IEEE.
Acer, U. G., Boran, A., Forlivesi, C., Liekens, W., Pérez-cruz, F. e Kawsar, F. (2015). Sensing wi network for personal IoT analytics. Em 5th International Conference on the Internet of Things, p. 104–111.
Acer, U. G., Vanderhulst, G., Masshadi, A., Boran, A., Forlivesi, C., Scholl, P. M. e Kawsar, F. (2016). Capturing personal and crowd behavior with wianalytics. Em 3rd International Workshop on Physical Analytics, p. 43–48. ACM.
Adrian, D., Bhargavan, K., Durumeric, Z., Gaudry, P., Green,M., Halderman, J. A., Heninger, N., Springall, D., Thomé, E., Valenta, L., and Others (2015). Imperfect forward secrecy: How Diffie-Hellman fails in practice. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pages 5–17. ACM.
Afanasyev, M., Chen, T., Voelker, G. M. e Snoeren, A. C. (2010). Usage patterns in an urban wi network. IEEE/ACM Transactions on Networking (ToN), 18(5):1359–1372.
Ahmed, Z., Alizai, M. H., and Syed, A. A. (2016). Inkev: Inkernel distributed network virtualization for dcn. ACM SIGCOMM Computer Communication Review, 46(3).
Akabane, A. T., Immich, R., Madeira, E. R., and Villas, L. A. (2018a). imob: An intelligent urban mobility management system based on vehicular social networks. In 2018 IEEE Vehicular Networking Conference (VNC), pages 1–8. IEEE.
Akabane, A. T., Immich, R., Pazzi, R. W., Madeira, E. R., and Villas, L. A. (2018b). Trusted: A distributed system for information management and knowledge distribution in vanets. In 2018 IEEE Symposium on Computers and Communications (ISCC), pages 1–6. IEEE.
Alchieri, E. A. P., Bessani, A., Greve, F., and d. S. Fraga, J. (2018). Knowledge Connectivity Requirements for Solving Byzantine Consensus with Unknown Participants. IEEE Transactions on Dependable and Secure Computing, 15(2):246–259.
Alessandrini, A., Gioia, C., Sermi, F., Sofos, I., Tarchi, D. e Vespe, M. (2017). Wi positioning and big data to monitor ows of people on a wide scale. Em 2017 European Navigation Conference (ENC), p. 322–328.
AlFardan, N. J., Bernstein, D. J., Paterson, K. G., Poettering, B., and Schuldt, J. C. N. (2013). On the security of rc4 in tls. In Proceedings of the 22Nd USENIX Conference on Security, SEC’13, pages 305–320, Berkeley, CA, USA. USENIX Association.
Ali, M., Nelson, J. C., Shea, R., and Freedman, M. J. (2016). Blockstack: a Global Naming and Storage System Secured by Blockchains. In USENIX Annual Technical Conference, pages 181–194.
Alkemade, T. (2013). Mitigating the beast attack on tls. URL: https://blog.thijsalkema.de/blog/2013/10/08/piercing-through-whatsapp-s-encryption.
Alsheikh, M. A., Niyato, D., Lin, S., Tan, H.-P. e Han, Z. (2016). IEEE Network, Mobile big data analytics using deep learning and apache spark. 30(3):22–29.
Alvarenga, I. D. (2018). Securing Configuration, Management and Migration of Virtual Network Functions using Blockchain. Master Science Thesis, Universidade Federal do Rio de Janeiro, Brasil.
Alvarenga, I. D., Rebello, G. A. F., and Duarte, O. C. M. B. (2018). Securing management, configuration, and migration of virtual network functions using blockchain. In IEEE/IFIP NOMS.
Andreoni Lopez, M., Lobato, A. G. P. e Duarte, O. C. M. B. (2016). A performance comparison of open-source stream processing platforms. Em 2016 IEEE Global Communications Conference (GLOBECOM), p. 1–6. IEEE.
Andreoni Lopez, M., Mattos, D. M. F., Duarte, O. C. M. B. e Pujolle, G. (2019). A fast unsupervised preprocessing method for network monitoring. Annals of Telecommunications, 74.
Andreoni Lopez, M., Sanz, I. J., Lobato, A. G. P., Mattos, D. M. F. e Duarte, O. C. M. B. (2018). Aprendizado de máquina em plataformas de processamento distribuído de uxo: Análise e detecção de ameaças em tempo real. Minicursos do Simpósio Brasileiro de Redes de Computadores-SBRC, 2018:150–206.
Androulaki, E., Barger, A., Bortnikov, V., Cachin, C., Christidis, K., De Caro, A., Enyeart, D., Ferris, C., Laventman, G., Manevich, Y., Muralidharan, S., Murthy, C., Nguyen, B., Sethi, M., Singh, G., Smith, K., Sorniotti, A., Stathakopoulou, C., Vukoli´c, M., Cocco, S. W., and Yellick, J. (2018). Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains. In Proceedings of the Thirteenth EuroSys Conference, EuroSys ’18, pages 30:1–30:15, New York, NY, USA. ACM.
Angelis, S. D., Aniello, L., Baldoni, R., Lombardi, F., Margheri, A., and Sassone, V. (2018). PBFT vs proof-of-authority: applying the CAP theorem to permissioned blockchain. In Italian Conference on Cyber Security (06/02/18).
Apache Software Foundation (2019). Apache HTTP Server Project. URL: http://httpd.apache.org.
Armbrust, M., Xin, R. S., Lian, C., Huai, Y., Liu, D., Bradley, J. K., Meng, X., Kaftan, T., Franklin, M. J., Ghodsi, A. et al. (2015). Spark sql: Relational data processing in spark. Em Proceedings of the 2015 ACM SIGMOD international conference on management of data, p. 1383–1394. ACM.
Arnott, M., Owen, P., Buckland, E., and Ranken, M. (2016). IoT global forecast analysis 2015-2025. Technical report, Machina Research. https://machinaresearch.com/login/?next=/report/iot-global-forecast-analysis-2015-25/. Acessado em 09 de abril de 2019.
Asanovic, K., Bodik, R., Catanzaro, B. C., Gebis, J. J., Husbands, P., Keutzer, K., Patterson, D. A., Plishker, W. L., Shalf, J., Williams, S. W., et al. (2006). The landscape of parallel computing research: A view from berkeley. Technical report, Technical Report UCB/EECS-2006-183, EECS Department, University of California, Berkeley.
Aviram, N., Schinzel, S., Somorovsky, J., Heninger, N., Dankel,M., Steube, J., Valenta, L., Adrian, D., Halderman, J. A., Dukhovni, V., Käsper, E., Cohney, S., Engels, S., Paar, C., and Shavitt, Y. (2016). DROWN: Breaking TLS using SSLv2. Proceedings of the 25th USENIX Security Symposium, (August):1–18.
Azaria, A., Ekblaw, A., Vieira, T., and Lippman, A. (2016). Medrec: Using blockchain for medical data access and permission management. In Open and Big Data (OBD), International Conference on, pages 25–30. IEEE.
Back, A. (2002). Hashcash - a denial of service counter-measure. http://www.hashcash.org/papers/hashcash.pdf. Acessado em 9 de abril de 2019.
Baidya, S., Chen, Y., and Levorato, M. (2018). ebpf-based content and computation-aware communication for real-time edge computing. In IEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WORKSHOPS), pages 865–870.
Balbi, H., Fernandes, N., Souza, F., Carrano, R., Albuquerque, C., Muchaluat-Saade, D. e Magalhaes, L. (2012). Centralized channel allocation algorithm for ieee 802.11 networks. Em 2012 Global Information Infrastructure and Networking Symposium (GIIS), p. 1–7.
Barata, J., Roque, L., and Immich, R. (2018). Springer International Publishing.
Barnaghi, P., Wang, W., Henson, C., and Taylor, K. (2012). Semantics for the internet of things: Early progress and back to the future. Int. J. Semant. Web Inf. Syst., 8(1):1–21.
BCC (2019a). BPF Compiler Collection. https://github.com/iovisor/bcc.
BCC (2019b). BPF program types. https://github.com/iovisor/bcc/blob/master/docs/kernel-versions.md#program-types.
BCC (2019c). Compiling P4 to EBPF. https://github.com/iovisor/bcc/tree/master/src/cc/frontends/p4.
BCC (2019d). XDP compatible drivers. https://github.com/iovisor/bcc/blob/master/docs/kernel-versions.md#xdp.
Beckett, D., Joubert, J., and Horman, S. (2018). Host dataplane acceleration (hda).
Bellavista, P. and Zanni, A. (2017). Feasibility of fog computing deployment based on docker containerization over raspberrypi. In Proceedings of the 18th International Conference on Distributed Computing and Networking, ICDCN ’17, pages 16:1–16:10, New York, NY, USA. ACM.
Benson, T., Anand, A., Akella, A., and Zhang, M. (2010). Understanding data center traffic characteristics. SIGCOMM Comput. Commun. Rev., 40(1):92–99.
Bernstein, D. J. (2006). Curve25519: new diffie-hellman speed records. In International Workshop on Public Key Cryptography, pages 207–228. Springer.
Bernstein, D. J., Lange, T., et al. (2013). Safecurves: choosing safe curves for elliptic-curve cryptography. URL: http://safecurves.cr.yp.to.
Bertin, G. (2017). Xdp in practice: integrating xdp into our ddos mitigation pipeline. In Technical Conference on Linux Networking, Netdev, volume 2.
Bertrone, M., Miano, S., Risso, F., and Tumolo, M. (2018). Accelerating Linux Security with eBPF Iptables. In Proceedings of the ACM SIGCOMM 2018 Conference on Posters and Demos, SIGCOMM ’18, pages 108–110, New York, NY, USA. ACM.
Bessani, A., Sousa, J., and Alchieri, E. E. P. (2014). State Machine Replication for the Masses with BFT-SMART. In 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, pages 355–362.
Bhamare, D., Jain, R., Samaka, M., and Erbad, A. (2016). A survey on service function chaining. Journal of Network and Computer Applications, 75:138–155.
Birari, S. M. and Iyer, S. (2005). Mitigating the reader collision problem in rd networks with mobile readers. In 2005 13th IEEE International Conference on Networks Jointly held with the 2005 IEEE 7th Malaysia International Conf on Communic, volume 1, pages 6–pp. IEEE.
Bittencourt, L. F., Lopes, M. M., Petri, I., and Rana, O. F. (2015). In 2015 10th International Towards virtual machine migration in fog computing. Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), pages 1–8.
Bittencourt, L., Immich, R., Sakellariou, R., Fonseca, N., Madeira, E., Curado, M., Villas, L., da Silva, L., Lee, C., and Rana, O. (2018). The internet of things, fog and cloud continuum: Integration and challenges. Internet of Things.
Blei, D. M. e Smyth, P. (2017). Science and data science. Procee dings of the National Academy of Sciences, 114(33):8689–8692.
Bleichenbacher, D. (1998). Chosen ciphertext attacks against protocols based on the rsa encryption standard pkcs# 1. In Annual International Cryptology Conference, pages 1–12. Springer.
Bloom, B. H. (1970). Space/time trade-offs in hash coding with allowable errors. Communications of the ACM, 13(7):422–426.
BlueKrypt. Cryptographic Key Length Recommendation. URL: http://www.keylength.com.
Bosshart, P., Daly, D., Gibb, G., Izzard, M., McKeown, N., Rexford, J., Schlesinger, C., Talayco, D., Vahdat, A., Varghese, G., and Walker, D. (2014). P4: Programming protocol-independent packet processors. SIGCOMM Comput. Commun. Rev., 44(3):87–95.
Bouras, C., Kollia, A., and Papazois, A. (2017). SDN & NFV in 5G: Advancements and challenges. In 2017 20th Conference on Innovations in Clouds, Internet and Networks (ICIN), pages 107–111.
Boutaba, R., Salahuddin, M. A., Limam, N., Ayoubi, S., Shahriar, N., Estrada-Solano, F. e Caicedo, O. M. (2018). A comprehensive survey on machine learning for networking: evolution, applications and research opportunities. Journal of Internet Services and Applications, 9(1):16.
Boutaba, R., Salahuddin, M. A., Limam, N., Ayoubi, S., Shahriar, N., Estrada-Solano, F., and Caicedo, O. M. (2018). A comprehensive survey on machine learning for networking: evolution, applications and research opportunities. Journal of Internet Services and Applications, 9(1):16.
Bozic, N., Pujolle, G., and Secci, S. (2017). Securing Virtual Machine Orchestration with Blockchains. In 2017 1st Cyber Security in Networking Conference.
Bozkurt, S., Elibol, G., Gunal, S. e Yayan, U. (2015). A comparative study on machine learning algorithms for indoor positioning. Em 2015 International Symposium on Innovations in Intelligent SysTems and Applications (INISTA), p. 1–8. IEEE.
bpftool, A. (2018). Manual bpftool. https://elixir.bootlin.com/linux/v4.18-rc1/source/tools/bpf/bpftool/Documentation/bpftool.rst.
bpftrace (2019). High-level tracing language for Linux eBPF. https://github.com/iovisor/bpftrace.
Braga, A. and Dahab, R. (2015). Introdução à Criptografia para Programadores: Evitando Maus Usos da Criptografia em Sistemas de Software. In Caderno de minicursos do XV Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais—SBSeg 2015, pages 1–50. Sociedade Brasileira de Computação.
Braga, A. and Dahab, R. (2018). Criptografia assimétrica para programadores - evitando outros maus usos da criptografia em sistemas de software. In Caderno de minicursos do XVIII Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais—SBSeg 2018, pages 1–50. Sociedade Brasileira de Computação.
Brewer, E. A. (2000). Towards Robust Distributed Systems. In Proceedings of the Nineteenth Annual ACM Symposium on Principles of Distributed Computing, New York, NY, USA. ACM.
Buchman, E. (2016). Tendermint: byzantine fault tolerance in the age of blockchains. PhD thesis, The University of Guelph.
Budiu, M. (2015). Compiling p4 to ebpf.
Bujlow, T., Carela-Español, V., and Barlet-Ros, P. (2013). Comparison of deep packet inspection (dpi) tools for traffic classification. Technical report, Universitat Politècnica de Catalunya.
Byers, C. C. (2017). Architectural imperatives for fog computing: Use cases, requirements, and architectural techniques for fog-enabled iot networks. IEEE Communications Magazine, 55(8):14–20.
Cachin, C. and Vukolic, M. (2017). Blockchain consensus protocols in the wild. arXiv preprint arXiv:1707.01873.
Calvo, R. (2018). The true cost of certificate authority trials: Can you trust them? URL: https://www.isc2.org/News-and-Events/Infosecurity-Professional-Insights.
Carbone, P., Fóra, G., Ewen, S., Haridi, S. e Tzoumas, K. (2015a). Lightweight asynchronous snapshots for distributed dataows. arXiv preprint arXiv:1506.08603.
Carbone, P., Katsifodimos, A., Ewen, S., Markl, V., Haridi†, S. e Tzoumas, K. (2015b). Apache ink: Stream and batch processing in a single engine. Bulletin of the IEEE Computer Society Technical Committee on Data Engineering, 4(34):28–38.
Carvalho, T., Junior, Marcos Simplicio, R. F. R. M., and Magri, D. (2014). Dmz científica: Desafios e modelos de gerenciamento de aplicações de alto volume de dados no contexto de e-ciência. In SBRC 2014 - Minicursos.
Castanho, M. S., Dominicini, C. K., and Vieira, M. A. M. (2019). Cadeia-Aberta: Arquitetura para SFC em Kernel usando eBPF. In Anais do XXXVII Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos (SBRC), Porto Alegre, RS, Brasil. SBC.
Celes, C., De Oliveira Nunes, I., Borges, J., Silva, F., De Abreu COtta, L., Vaz de Melo, P., Ramos, H., Andrade, R., and Loureiro, A. (2017). Big Data Analytics no Projeto de Redes Móveis: Modelos, Protocolos e Aplicações, pages 1–58.
Celes, C., Silva, F. A., Boukerche, A., d. C. Andrade, R. M., and Loureiro, A. A. F. (2017). Improving vanet simulation with calibrated vehicular mobility traces. IEEE Transactions on Mobile Computing, 16(12):3376–3389.
Chainalysis (2019). Crypto Crime Report: Decoding increasingly sophisticated hacks, darknet markets, and scams. Technical report, Chainalysis Inc.
Chaining (SFC) architecture. RFC 7665, RFC Editor. http://www.rfc-editor.org/rfc/rfc7665.txt. Acessado em 9 de abril de 2019.
Chandra, P.,Messier,M., and Viega, J. (2002). Network security with OpenSSL. O’Reily.
Chaum, D. (1983). Blind signatures for untraceable payments. In Advances in cryptology, pages 199–203. Springer, Hong-Ning.
Chen, N., Chen, Y., You, Y., Ling, H., Liang, P., and Zimmermann, R. (2016). Dynamic urban surveillance video stream processing using fog computing. In 2016 IEEE second international conference on multimedia big data (BigMM), pages 105–112. IEEE.
Chen, X. e Lin, X. (2014). Big data deep learning: Challenges and perspectives. IEEE Access, 2:514–525.
Chen, Y., Guizani, M., Zhang, Y., Wang, L., Crespi, N., Lee, G. M. e Wu, T. (2018). When trafc ow prediction and wireless big data analytics meet. IEEE Network.
Chen, Z. e Qiu, R. C. (2011). Cooperative spectrum sensing using q-learning with experimental validation. Em 2011 Proceedings of IEEE Southeastcon, p. 405–408.
Chicarino, V. R. L., Jesus, E. F., de Albuquerque, C. V. N., and de A. Rocha, A. A. (2017). Uso de Blockchain para Privacidade e Segurança em Internet das Coisas. In Minicursos do SBSeg’2017, pages 149–200.
Chilipirea, C., Petre, A., Dobre, C. e van Steen, M. (2016). Presumably simple: Monitoring crowds using wi. Em Proceedings of the 17th IEEE International Conference on Mobile Data Management (MDM), volume 1, p. 220– 225.
Chintapalli, S., Dagit, D., Evans, B., Farivar, R., Graves, T., Holderbaugh, M., Liu, Z., Nusbaum, K., Patil, K., Peng, B. J. et al. (2016). Benchmarking streaming computation engines: Storm, ink and spark streaming. Em 2016 IEEE international parallel and distributed processing symposium workshops (IPDPSW), p. 1789–1792. IEEE.
Christidis, K. and Devetsikiotis, M. (2016). Blockchains and smart contracts for the Internet of Things. IEEE Access, 4:2292–2303.
Cici, B., Gjoka, M., Markopoulou, A. e Butts, C. T. (2015). On the decomposition of cell phone activity patterns and their connection with urban ecology. Em Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc ’15, p. 317–326.
Cilium (2018). Cilium 1.0: Bringing the BPF Revolution to Kubernetes Networking and Security. https://cilium.io/blog/2018/04/24/cilium-10/.
Cisco, V. N. I. (2017). Global mobile data trafc forecast update, 2016– 2021 white paper. Document ID, 1454457600805266.
Confais, B., Lebre, A., and Parrein, B. (2017). Performance Analysis of Object Store Systems in a Fog and Edge Computing Infrastructure, pages 40–79. Springer Berlin Heidelberg, Berlin, Heidelberg.
Cormode, G. and Muthukrishnan, S. (2005). An improved data stream summary: the count-min sketch and its applications. Journal of Algorithms, 55(1):58–75.
Costa, L. H. M. K., de Amorim, M. D., Campista, M. E. M., Rubinstein, M., Florissi, P. e Duarte, O. C. M. B. (2012). Grandes Massas de Dados na Nuvem: Desaos e Técnicas para Inovação. Em SBRC 2012 Minicursos.
Cunha, F., Maia, G., Celes, C., Guidoni, D., de Souza, F., Ramos, H., and Villas, L. (2017). Sistemas de transporte inteligentes: Conceitos, aplicações desaos. Livro de Minicursos do Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos (SBRC’17).
Curado, M., Madeira, H., da Cunha, P. R., Cabral, B., Abreu, D. P., Internet of Things, pages 381–401.
Dai, W. (1998). B-money. http://www.weidai.com/bmoney.txt. Acessado em 9 de abril de 2019.
Dargahi, T., Caponi, A., Ambrosin, M., Bianchi, G., and Conti, M. (2017). A survey on the security of stateful sdn data planes. IEEE Communications Surveys & Tutorials, 19(3):1701–1725.
De Souza, A. M., Brennand, C. A., Yokoyama, R. S., Donato, E. A., Madeira, E. R., and Villas, L. A. (2017). Trafc management systems: A classication, review, challenges, and future perspectives. International Journal of Distributed Sensor Networks, 13(4):1550147716683612.
de Souza, A. M., Pedrosa, L. L. C., Botega, L. C., and Villas, L. (2018). Itssafe: An Intelligent Transportation System for Improving Safety and Trafc Efciency. In 2018 IEEE 87th Vehicular Technology Conference (VTC Spring), pages 1–7. IEEE.
Dean, J. e Ghemawat, S. (2008). Mapreduce: simplied data processing on large clusters. Communications of the ACM, 51(1):107–113.
Decker, C., Seidel, J., and Wattenhofer, R. (2016). Bitcoin meets strong consistency. In Proceedings of the 17th International Conference on Distributed Computing and Networking, page 13. ACM.
Deng, L. (2014). A tutorial survey of architectures, algorithms, and applications for deep learning. APSIPA Transactions on Signal and Information Processing, 3:e2.
Deng, L. e Yu, D. (2014). Deep learning: Methods and applications. Foundations and Trends in Signal Processing, 7(3–4):197–387.
Dib, O., Manier, M.-A., and Caminada, A. (2015). Memetic algorithm for computing shortest paths in multimodal transportation networks. Transportation Research Procedia, 10:745–755.
Diffie, W. and Hellman, M. (1976). New directions in cryptography. IEEE transactions on Information Theory, 22(6):644–654.
Digiconomist (2019). Bitcoin Energy Consumption Index. https://digiconomist.net/bitcoin-energy-consumption. Acessado em 9 de abril de 2019.
Dinh, T. T. A., Wang, J., Chen, G., Liu, R., Ooi, B. C., and Tan, K.-L. (2017). Blockbench: A framework for analyzing private blockchains. In Proceedings of the 2017 ACM International Conference on Management of Data, pages 1085–1100. ACM.
Divgi, G. e Chlebus, E. (2013). Characterization of user activity and trafc in a commercial nationwide wihotspot network: global and individual metrics. Wireless Networks, 19(7):1783–1805.
Dolev, D. (1982). The Byzantine generals strike again. Journal of Algorithms, 3(1):14 – 30.
Dolev, D. and Yao, A. (1983). On the security of public key protocols. IEEE Transactions on Information Theory, 29(2):198–208.
Douceur, J. R. (2002). The Sybil Attack. In Revised Papers from the First International Workshop on Peer-to-Peer Systems, IPTPS ’01, pages 251–260, London, UK, UK. Springer-Verlag.
Duan, S., Reiter, M. K., and Zhang, H. (2018). BEAT: Asynchronous BFT made practical. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pages 2028–2041. ACM.
Duchene, F., Jadin, M., and Bonaventure, O. (2018). Exploring various use cases for ipv6 segment routing. In Proceedings of the ACM SIGCOMM 2018 Conference on Posters and Demos, SIGCOMM ’18, pages 129–131, New York, NY, USA. ACM.
Dumazet, E. (2011). A jit for packet filters. https://lwn.net/Articles/437981/.
Duque, D., Lozano, L., and Medaglia, A. L. (2015). An exact method for the biobjective shortest path problem for large-scale road networks. European Journal of Operational Research, 242(3):788–797.
Dwork, C., Lynch, N., and Stockmeyer, L. (1988). Consensus in the presence of partial synchrony. Journal of the ACM (JACM), 35(2):288–323.
Eerman, J., Mahanti, A., and Arlitt, M. (2006). Internet traffic identification using machine learning techniques. In Proc. of the 49th IEEE Global Telecomm. Conf.(GLOBECOM), pages 1–6.
Eldewahi, A. E.W., Sharfi, T.M. H.,Mansor, A. A.,Mohamed, N. A. F., and Alwahbani, S. M. H. (2015). Ssl/tls attacks: Analysis and evaluation. In 2015 International Conference on Computing, Control, Networking, Electronics and Embedded Systems Engineering (ICCNEEE), pages 203–208.
Estrin, D., Chandy, K. M., Young, R. M., Smarr, L., Odlyzko, A., Clark, D., Reding, V., Ishida, T., Sharma, S., Cerf, V. G., HA˜ lzle, U., Barroso, L. A., Mulligan, G., Hooke, A., and Elliott, C. (2010). Participatory sensing: applications and architecture [internet predictions]. IEEE Internet Computing, 14(1):12–42.
ETSI (2014). ETSI GS NFV-MAN 001: Network Functions Virtualisation; Management and Orchestration.
Eyal, I. and Sirer, E. G. (2018). Majority is not enough: Bitcoin mining is vulnerable. Communications of the ACM, 61(7):95–102.
Eyal, I., Gencer, A. E., Sirer, E. G., and Van Renesse, R. (2016). Bitcoin-ng: A scalable blockchain protocol. In 13th fUSENIXg Symposium on Networked Systems Design and Implementation (fNSDIg 16), pages 45–59.
Facebook (2018). Katran source code repository. https://github.com/facebookincubator/katran.
Fahad, A., Tari, Z., Khalil, I., Almalawi, A., and Zomaya, A. Y. (2014). An optimal and stable feature selection approach for traffic classification based on multi-criterion fusion. Future Generation Computer Systems, 36:156–169.
Fan, Y., Chen, Y., Tung, K., Wu, K. e Chen, A. L. P. (2016). A framework for enabling user preference proling through wilogs. IEEE Transactions on Knowledge and Data Engineering, 28(3):592–603.
Fardan, N. A. and Paterson, K. (2013). Lucky thirteen: Breaking the TLS and DTLS record protocols. Security and Privacy (SP), 2013 IEEE Symposium on (2013).
Feamster, N., Rexford, J., and Zegura, E. (2014). The road to sdn: an intellectual history of programmable networks. ACM SIGCOMM Computer Communication Review, 44(2):87–98.
Filho, G. P. R., Ueyama, J., Villas, L., and Seraphini, A. P. S. (2013). Nodepm: Um sistema de monitoramento remoto do consumo de energia eletrica via redes de sensores sem o. In sociedade Brasileira de Computacao (SBC), editor, Simposio Brasileiro de Redes de Computadores e Sistemas Distribuidos (SBRC), volume 31, pages 17–30.
Filho, G. P. R., Villas, L. A., Freitas, H., Valejo, A., Guidoni, D. L., and Ueyama, J. (2018). Residi: Towards a smarter smart home system for decision-making using wireless sensors and actuators. Computer Networks, 135:54 – 69.
Filho, G. P., Villas, L. A., Gonçalves, V. P., Pessin, G., Loureiro, A. A., and Ueyama, J. (2019). Energy-efcient smart home systems: Infrastructure and decision-making process. Internet of Things, 5:153 – 167.
Filsfils, C., Previdi, S., Ginsberg, L., Decraene, B., Litkowski, S., and Shakir, R. (2018). Segment routing architecture. RFC 8402, RFC Editor.
Finney, H. (2005). RPOW: Reusable proofs of work. http://nakamotoinstitute.org/finney/rpow/theory.html. Acessado em 9 de abril de 2019.
Fischer, M. J., Lynch, N. A., and Paterson, M. S. (1985). Impossibility of Distributed Consensus with One Faulty Process. Journal of the ACM, 32(2):374– 382.
Flajolet, P. and Martin, G. N. (1985). Probabilistic counting algorithms for data base applications. J. Comput. Syst. Sci., 31(2):182–209.
Forgy, E. W. (1965). Cluster Analysis of Multivariate Data: Efficiency Versus Interpretability of Classifications. Biometrics, 21:768–769.
Frantz, C. K. and Nowostawski, M. (2016). From institutions to code: Towards automated generation of smart contracts. In 2016 IEEE 1st International Workshops on Foundations and Applications of Self* Systems (FAS* W), pages 210–215. IEEE.
Gaber, M. M. (2012). Advances in data stream mining. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 2(1):79–85.
Gama, J., Žliobaite, I., Bifet, A., Pechenizkiy, M. e Bouchachia, A. (2014). A survey on concept drift adaptation. ACM computing surveys (CSUR), 46(4):44.
García, S., Ramírez-Gallego, S., Luengo, J., Benítez, J. M. e Herrera, F. (2016). Big data preprocessing: methods and prospects. Big Data Analytics, 1(1):9.
Garofalakis, M., Gehrke, J. e Rastogi, R. (2016). Data Stream Management: Processing High-Speed Data Streams. Springer.
Geraldo Filho, P., Neto, J. R. T., Valejo, A., Meneguette, R. I., Villas, L. A., and Ueyama, J. (2018). Um sistema de controle neuro-fog para In Anais do XXXVI Simpósio infraestruturas residenciais via objetos inteligentes. Brasileiro de Redes de Computadores e Sistemas Distribuídos. SBC.
Gluck, Y., Harris, N., and Angel, A. (2013). BREACH: Reviving the CRIME Attack. In Black Hat Conference.
gobpf (2019). Go bindings for creating BPF programs. https://github.com/iovisor/gobpf.
Godec, M., Leistner, C., Saffari, A. e Bischof, H. (2010). On-line random naive bayes for tracking. Em 2010 20th Int. Conference on Pattern Recognition, p. 3545–3548.
Goel, U., Wittie, M. P., Claffy, K. C. e Le, A. (2015). Survey of end-toend mobile network measurement testbeds, tools, and services. IEEE Communications Surveys & Tutorials.
Golestan, K., Sattar, F., Karray, F., Kamel, M., and Seifzadeh, S. (2015). Localization in vehicular ad hoc networks using data fusion and v2v communication. Computer Communications, 71:61–72.
Gonzalez, J. E., Xin, R. S., Dave, A., Crankshaw, D., Franklin, M. J. e Stoica, I. (2014). GraphX: Graph processing in a distributed dataow framework. Em 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI 14), p. 599–613.
Google (2014). Speeding up and strengthening HTTPS connections for Chrome on Android. https://security.googleblog.com/2014/04/speeding-up-and-strengthening-https.html.
Greve, F., Sampaio, L., Abijaude, J., Coutinho, A. A. R., Brito, I. V. S., and Queiroz, S. (2018). Blockchain e a Revolução do Consenso sob Demanda. In Minicursos do SBRC’2018, volume 36.
Group, O. C. A. W. et al. (2017). Openfog reference architecture for fog computing. OPFRA001, 20817:162.
Guo, C., Jensen, C. S., and Yang, B. (2014). Towards total trafc awareness. SIGMOD Record, 43(3):18–23.
Guo, J., Tan, Z.-H., Cho, S. H. e Zhang, G. (2018). Wireless personal communications: Machine learning for big data processing in mobile internet. Wireless Personal Communications, 102(3):2093–2098.
Hadi, M. S., Lawey, A. Q., El-Gorashi, T. E. e Elmirghani, J. M. (2018). Big data analytics for wireless and wired network design: A survey. Computer Networks, 132:180–199.
Halpern, J. and Pignataro, C. (2015). Service function chaining (SFC) architecture. RFC 7665, IETF.
Halpern, J. and Pignataro, C. (2015). Service Function
Ham, Y. J. e Lee, H.-W. (2014). Big data preprocessing mechanism for analytics of mobile web log. International Journal of Advances in Soft Computing & Its Applications, 6(1).
Han, B., Gopalakrishnan, V., Ji, L., and Lee, S. (2015). Network function virtualization: Challenges and opportunities for innovations. IEEE Communications Magazine, 53(2):90–97.
Han, J., Pei, J. e Kamber, M. (2011). Data mining: concepts and techniques. Elsevier.
Han, R., Gramoli, V., and Xu, X. (2018). Evaluating blockchains for iot. In 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), pages 1–5.
Hankerson, D., Vanstone, S., and Menezes, A. (2004). Guide to elliptic curve cryptography.
Harari, Y. N. (2016). Homo Deus: A brief history of tomorrow. Random House.
Hawlitschek, F., Notheisen, B., and Teubner, T. (2018). The limits of trust-free systems: A literature review on blockchain technology and trust in the sharing economy. Electronic commerce research and applications, 29:50–63.
Heintz, B., Chandra, A., Sitaraman, R. K., and Weissman, J. (2016). End-to-end optimization for geo-distributed mapreduce. IEEE Transactions on Cloud Computing, 4(3):293–306.
Heuveline, V. and Latt, J. (2007). The openlb project: an open source and object oriented implementation of lattice boltzmann methods. International Journal of Modern Physics C, 18(04):627–634.
Hofstede, R., Celeda, P., Trammell, B., Drago, I., Sadre, R., Sperotto, A. e Pras, A. (2014). Flow monitoring explained: From packet capture to IEEE Communications Surveys & Tutorials, data analysis with netow and ipx. 16(4):2037–2064.
Høiland-Jørgensen, T., Brouer, J. D., Borkmann, D., Fastabend, J., Herbert, T., Ahern, D., and Miller, D. (2018). The express data path: Fast programmable packet processing in the operating system kernel. In Proceedings of the 14th International Conference on Emerging Networking EXperiments and Technologies, CoNEXT ’18, pages 54–66, New York, NY, USA. ACM.
Hu, H., Wen, Y., Chua, T. e Li, X. (2014). Toward scalable systems for big data analytics: A technology tutorial. IEEE Access, 2:652–687.
Huang, H., Cai, Y. e Yu, H. (2016). Distributed-neuron-network based machine learning on smart-gateway network towards real-time indoor data analytics. Em Proceedings of the 2016 Conference on Design, Automation & Test in Europe, DATE ’16, p. 720–725.
Huang, W., Chen, Z., Dong, W., Li, H., Cao, B. e Cao, J. (2014). Mobile internet big data platform in china unicom. Tsinghua Science and Technology, 19(1):95–101.
Huh, S., Cho, S., and Kim, S. (2017). Managing IoT devices using blockchain platform. In Advanced Communication Technology (ICACT), 19th International Conference on, pages 464–467. IEEE.
Hung, C.-C., Golubchik, L., and Yu, M. (2015). Scheduling jobs across geo-distributed datacenters. In Proceedings of the Sixth ACM Symposium on Cloud Computing, SoCC ’15, pages 111–124, New York, NY, USA. ACM.
Idri, A., Oukar, M., Boulmakoul, A., Zeitouni, K., and Masri, A. (2017). A new time-dependent shortest path algorithm for multimodal transportation network. Procedia Computer Science, 109:692–697.
IOvisor (2019). Iovisor project. www.iovisor.org. Disponível em 29/03/2019.
Iqbal, M. H. e Soomro, T. R. (2015). Big data analysis: Apache storm perspective. Int. journal of computer trends and technology, 19(1):9–14.
IRTF (2017). Decentralized Internet Infrastructure Research Group. https://trac.ietf.org/trac/irtf/wiki/blockchain-federation. Acessado em 9 abril de 2019.
Isard, M., Budiu, M., Yu, Y., Birrell, A. e Fetterly, D. (2007). Dryad: distributed data-parallel programs from sequential building blocks. ACM SIGOPS operating systems review, 41(3):59–72.
ISO/TC 307 (2016). Blockchain and distributed ledger technologies. https://www.iso.org/committee/6266604.html. Acessado em 9 de abril de 2019.
Issarny, V., Bouloukakis, G., Georgantas, N., Sailhan, F., and Texier, G. (2018). When service-oriented computing meets the iot: A use case in the context of urban mobile crowdsensing. In European Conference on Service-Oriented and Cloud Computing, pages 1–16. Springer.
ITU-T FG DLT (2017). Focus Group on Application of Distributed Ledger Technology. https://itu.int/en/ITU-T/focusgroups/dlt/Pages/default.aspx. Acessado em 9 de abril de 2019.
Jang, R., Cho, D., Noh, Y. e Nyang, D. (2017). Row+: An sdn-based wlan monitoring and management framework. Em IEEE INFOCOM 2017 IEEE Conference on Computer Communications, p. 1–9.
Ji, S., Mittal, P., and Beyah, R. (2017). Graph data anonymization, deanonymization attacks, and de-anonymizability quantication: A survey. IEEE Communications Surveys Tutorials, 19(2):1305–1326.
Jiang, C., Zhang, H., Ren, Y., Han, Z., Chen, K.-C. e Hanzo, L. IEEE (2017). Machine learning paradigms for next-generation wireless networks. Wireless Communications, 24(2):98–105.
Jonsson, J. and Burt Kaliski (2003). RSA Laboratories Public-Key Cryptography Standards (PKCS)#1: RSA Cryptography Specifications Version 2.1. URL: https://tools.ietf.org/html/rfc3447.
Jordaney, R., Sharad, K., Dash, S. K., Wang, Z., Papini, D., Nouretdinov, I. e Cavallaro, L. (2017). Transcend: Detecting concept drift in malware classication models. Em PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM, p. 625–642. USENIX Association.
Jouet, S. and Pezaros, D. P. (2017a). Bpfabric: Data plane programmability for software defined networks. In Proceedings of the Symposium on Architectures for Networking and Communications Systems, ANCS ’17, pages 38–48, Piscataway, NJ, USA. IEEE Press.
Jouet, S. and Pezaros, D. P. (2017b). BPFabric implementations. https://github.com/UofG-netlab/BPFabric.
Jouet, S., Cziva, R., and Pezaros, D. P. (2015). Arbitrary packet matching in openflow. In 2015 IEEE 16th International Conference on High Performance Switching and Routing (HPSR), pages 1–6.
Khatoun, R. and Zeadally, S. (2016). Smart Cities: Concepts, Architectures, Research Opportunities. Commun. ACM, 59(8):46–57.
Kiayias, A., Russell, A., David, B., and Oliynykov, R. (2017). Ouroboros: A provably secure proof-of-stake blockchain protocol. In Annual International Cryptology Conference, pages 357–388. Springer.
Kim, S. (2015). How Foursquare and Other Apps Guess What You Want to Eat. Eater.com. https://goo.gl/icFBrH.
Kim, S. K., McMahon, P. L. e Olukotun, K. (2010). A large-scale architecture for restricted boltzmann machines. Em 18th IEEE Annual International Symposium on Field-Programmable Custom Computing Machines, p. 201–208.
Knight, S., Nguyen, H. X., Falkner, N., Bowden, R., and Roughan, M. (2011). The internet topology zoo. IEEE Journal on Selected Areas in Communications, 29(9):1765–1775.
Koblitz, N. (1987). Elliptic curve cryptosystems. Mathematics of computation, 48(177):203–209.
Krasnogor, N. and Smith, J. (2005). A tutorial for competent IEEE Transactions on memetic algorithms: model, taxonomy, and design issues. Evolutionary Computation, 9(5):474–488.
Krishnamurthy, B., Sen, S., Zhang, Y., and Chen, Y. (2003). Sketch-based change detection: Methods, evaluation, and applications. In Proceedings of the 3rd ACM SIGCOMM Conference on Internet Measurement, IMC ’03, pages 234–247, New York, NY, USA. ACM.
Kurzweil, R. (2010). The singularity is near. Gerald Duckworth & Co.
Kwon, D., Kim, H., Kim, J., Suh, S. C., Kim, I. e Kim, K. J. (2017). A survey of deep learning-based network anomaly detection. Cluster Computing.
Lakhina, A., Crovella, M., and Diot, C. (2005). Mining anomalies using traffic feature distributions. SIGCOMM Comput. Commun. Rev., 35(4):217–228.
Lamport, L. (1998). The Part-time Parliament. ACM Transactions on Computer Systems, 16(2):133–169.
Lamport, L., Shostak, R., and Pease, M. (1982). The Byzantine Generals Problem. ACM Transactions on Programming Languages and Systems, 4(3):382–401.
Lee, G. M., Liu, H., Yoon, Y. e Zhang, Y. (2005). Improving sketch reconstruction accuracy using linear least squares method. Em Proceedings of the 5th ACM SIGCOMM Conference on Internet Measurement, IMC ’05, p. 24–24, Berkeley, CA, USA. USENIX Association.
Lee, K., James, J. I., Ejeta, T. G., and Kim, H. J. (2016). Electronic voting service using block-chain. Journal of Digital Forensics, Security and Law, 11(2):8.
Leung, K. K. e Kim, B. J. (2003). Frequency assignment for IEEE 802.11 wireless networks. Em 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484), volume 3, p. 1422–1426 Vol.3.
Li, B., Springer, J., Bebis, G. e Hadi Gunes, M. (2013). Review: A survey of network ow applications. Journal of Network and Computer Applications, 36(2):567–581.
Li, Y. (2018). Deep Reinforcement Learning. arXiv e-prints, p. ar-Xiv:1810.06339.
Li, Y. and Chen, M. (2015). Software-Defined Network Function Virtualization: A Survey. IEEE Access, 3:2542–2553.
libbpf, A. (2018). libbpf source code. https://elixir.bootlin.com/linux/v4.18-rc1/source/tools/lib/bpf.
Liebchen, G., Twala, B., Shepperd, M., Cartwright, M. e Stephens, M. (2007). Filtering, robust ltering, polishing: Techniques for addressing quality in software data. Em First International Symposium on Empirical Software Engineering and Measurement (ESEM 2007), p. 99–106. IEEE.
Lin, F. Y. S., Wen, Y. F., Fang, L. W. e Hsiao, C. H. (2017). Resource allocation and multisession routing algorithms in coordinated multipoint wireless communication networks. IEEE Systems Journal, PP(99):1–12.
Liu, Y. e Yoo, S. (2017). Dynamic resource allocation using reinforcement learning for lte-u and wi in the unlicensed spectrum. Em 2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN), p. 471–475.
Lobato, A. G. P., Andreoni Lopez, M., Sanz, I. J., Cardenas, A. A., Duarte, O. C. M. B. e Pujolle, G. (2018). An adaptive real-time architecture for zeroday threat detection. Em 2018 IEEE International Conference on Communications (ICC), p. 1–6.
Low, Y., Bickson, D., Gonzalez, J., Guestrin, C., Kyrola, A. e Hellerstein, J. M. (2012). Distributed graphlab: a framework for machine learning and data mining in the cloud. Proceedings of the VLDB Endowment, 5(8):716–727.
Low, Y., Gonzalez, J. E., Kyrola, A., Bickson, D., Guestrin, C. E. e Hellerstein, J. (2014). Graphlab: A new framework for parallel machine learning. arXiv preprint arXiv:1408.2041.
Luiz, T. A., Freitas, A. R. e Guimarães, F. G. (2015). A new perspective on channel allocation in wlan: Considering the total marginal utility of the connections for the users. Em Proceedings of the 2015 Annual Conference on Genetic and Evolutionary Computation, GECCO ’15, p. 879–886, New York, NY, USA. ACM.
Magalhães, L. C. S. e Mattos, D. M. F. (2018). Caracterização do uso de uma rede sem o de grande porte distribuída por uma ampla Área. XVII Workshop em Desempenho de Sistemas Computacionais e de Comunicação (WPerformance CSBC 2018), 17(1/2018).
Maguire, A. (2019). Notes on bpf (1) - a tour of progam types. https://blogs.oracle.com/linux/notes-on-bpf-1.
Malewicz, G., Austern, M. H., Bik, A. J., Dehnert, J. C., Horn, I., Leiser, N. e Czajkowski, G. (2010). Pregel: a system for large-scale graph processing. Em Proceedings of the 2010 ACM SIGMOD International Conference on Management of data, p. 135–146. ACM.
Mattos, D. M. F. et al. (2018). Blockchain para Segurança em Redes Elétricas Inteligentes: Aplicações, Tendências e Desafios. In Minicursos do SBSeg’ 2018, pages 140–194.
Mattos, D. M. F., Velloso, P. B. e Duarte, O. C. M. B. (2018). Uma infraestrutura Ágil e efetiva de virtualização de funções de rede para a internet das coisas. Em XXXVI Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos SBRC’2018.
Maturi, F., Gringoli, F. e Cigno, R. L. (2017). A dynamic and autonomous channel selection strategy for interference avoidance in 802.11. Em 2017 13th Annual Conference on Wireless On-demand Network Systems and Services(WONS), p. 1–8.
McCanne, S. and Jacobson, V. (1993). The bsd packet filter: A new architecture for user-level packet capture. In Proceedings of the USENIX Winter 1993 Conference Proceedings on USENIX Winter 1993 Conference Proceedings, USENIX’93, pages 2–2, Berkeley, CA, USA. USENIX Association.
McKeown, N., Anderson, T., Balakrishnan, H., Parulkar, G., Peterson, L., Rexford, J., Shenker, S., and Turner, J. (2008). Openflow: enabling innovation in campus networks. ACM SIGCOMM Computer Communication Review, 38(2):69–74.
McKinney, W. (2013). Python for Data Analysis: Data Wrangling with Pandas, NumPy, and IPython. O’Reilly, Beijing, first edition.
Medhat, A. M., Taleb, T., Elmangoush, A., Carella, G. A., Covaci, S., and Magedanz, T. (2017). Service Function Chaining in Next Generation Networks: State of the Art and Research Challenges. IEEE Communications Magazine, 55(2):216–223.
Mello, A. M., Marino, F. C. H., and Santos, R. R. (2017). Segurança de Aplicações Blockchain Além das Criptomoedas. In Minicursos do SBSeg’2017, pages 99–148.
Meneguette, R. I., Geraldo Filho, P., Guidoni, D. L., Pessin, G., Villas, L. A., and Ueyama, J. (2016b). Increasing intelligence in inter-vehicle communications to reduce trafc congestions: experiments in urban and highway environments. PLoS one, 11(8):e0159110.
Meneguette, R., Fillho, G., Bittencourt, L., Ueyama, J., and Villas, L. (2016a). A solution for detection and control for congested roads using vehicular networks. IEEE Latin America Transactions, 14(4):1849–1855.
Meng, X., Bradley, J., Yavuz, B., Sparks, E., Venkataraman, S., Liu, D., Freeman, J., Tsai, D., Amde, M., Owen, S. et al. (2016). Mllib: Machine learning in apache spark. The Journal of Machine Learning Research, 17(1):1235–1241.
Metsis, V., Androutsopoulos, I., and Paliouras, G. (2006). Spam filtering with naive bayes-which naive bayes?
Miano, S., Bertrone, M., Risso, F., Tumolo, M., Bernal, M. V., and Tumolo, M. (2018). Creating Complex Network Services with eBPF: Experience and Lessons Learned. High Performance Switching and Routing (HPSR). IEEE, pages 1–8.
Mijumbi, R., Serrat, J., Gorricho, J. L., Bouten, N., De Turck, F., and Boutaba, R. (2016). Network function virtualization: State-of-the-art and research challenges. IEEE Communications Surveys and Tutorials, 18(1):236–262.
Mijumbi, R., Serrat, J., Gorricho, J., Bouten, N., De Turck, F., and Boutaba, R. (2016). Network Function Virtualization: State-of-the-Art and Research Challenges. IEEE Communications Surveys Tutorials, 18(1):236–262.
Miller, A., Xia, Y., Croman, K., Shi, E., and Song, D. (2016). The Honey Badger of BFT Protocols. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS ’16, pages 31–42, New York, NY, USA. ACM.
Miller, V. S. (1985). Use of elliptic curves in cryptography. In Conference on the theory and application of cryptographic techniques, pages 417–426. Springer.
Mingxiao, D., Xiaofeng, M., Zhe, Z., Xiangwei, W., and Qijun, C. (2017). A review on consensus algorithm of blockchain. In 2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pages 2567–2572. IEEE.
mod_ssl (2019). mod_ssl:the apache interface to openssl. URL: http://www.modssl.org.
Möller, B., Duong, T., and Kotowicz, K. (2014). The POODLE attack. URL: https://www.openssl.org/ bodo/ssl-poodle.pdf.
Monnet, Q. (2019). Rust virtual machine and JIT compiler for eBPF programs. https://github.com/qmonnet/rbpf.
Monteiro, A., Souto, E., Pazzi, R. e Kiljander, J. (2016). Atribuição dinâmica de canais em redes sem o não coordenadas ieee 802.11, baseada em fatores de sobreposição e intensidade de sinal. Em XXXIV Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos SBRC’2016.
Moura, D. L., Cabral, R. S., Sales, T., and Aquino, A. L. (2018). An evolutionary algorithm for roadside unit deployment with betweenness centrality preprocessing. Future Generation Computer Systems, 88:776 – 784.
Moura, H. D., Macedo, D. F. e Vieira, M. A. M. (2019). Automatic quality of experience management for wlan networks using multi-armed bandit. Em IFIP / IEEE International Symposium on Integrated Network Management, p. 1–10. IEEE/IFIP.
mozilla (2018). Mozilla’s server side tls guidelines. URL: https://wiki.mozilla.org/Security/Server_Side_TLS.
mozilla (2019). Http and ssl observatory. URL: https://observatory.mozilla.org.
Mueller, W., Silva, T. H., Almeida, J. M., and Loureiro, A. A. (2017). Gender matters! analyzing global cultural gender preferences for venues using social sensing. EPJ Data Science, 6(1):5.
Naboulsi, D. and Fiore, M. (2013). On the instantaneous topology of a large-scale urban vehicular network: the cologne case. In Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing, pages 167–176. ACM.
Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system. http://bitcoin.org/bitcoin.pdf. Acessado em 9 de abril de 2019.
Nascimento, P., Kimura, B., Guidoni, D., and Villas, L. (2018). An integrated dead reckoning with cooperative positioning solution to assist gps nlos using vehicular communications. Sensors, 18(9):2895.
Netronome (2019). Sample bpf offload apps. https://github.com/Netronome/bpf-samples.
Ning, Z., Huang, J., and Wang, X. (2019). Vehicular fog computing: Enabling real-time trafc management for smart cities. IEEE Wireless Communications, 26(1):87–93.
Nir, Y. and Langley, A. (2018). ChaCha20 and Poly1305 for IETF Protocols. RFC 8439.
NIST (2001). Recommendation for block cipher modes of operation. NIST SP 800-38A URL: http:csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf.
NIST (2007). Recommendation for block cipher modes of operation: Galois/counter mode (gcm) and gmac. NIST SP 800-38D URL: http://csrc.nist.gov/publications/nistpubs/800-38D/SP-800-38D.pdf.
NIST (2012). Recommendation for Key Management – Part 1: General (Revision 3). URL: http://csrc.nist.gov/publications/nistpubs/800-57/sp800-57_part1_rev3_general.pdf.
NIST (2013). Digital Signature Standard (DSS).
Olson, K., Bowman, M., Mitchell, J., Amundson, S., Middleton, D., and Montgomery, C. (2018). Sawtooth: An Introduction. The Linux Foundation, Jan.
Ongaro, D. and Ousterhout, J. (2014). In Search of an Understandable Consensus Algorithm. In Proceedings of the 2014 USENIX Conference on USENIX Annual Technical Conference, USENIX ATC’14, pages 305–320, Berkeley, CA, USA. USENIX Association.
OpenSSL.org. OpenSSL Cryptography and SSL/TLS toolkit. URL: OpenSSL.org.
OWASP (2015). OWASP Testing Project v4. URL: https://www.owasp.org/index.php/OWASP_Testing_Project.
Pacífico, R. D. G., Coelho, G. R., Vieira, M. A. M., and Nacif, J. A. M. (2018). Roteador SDN em hardware independente de protocolo com análise, casamento e ações dinâmicas. In Anais do XXXVI Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos (SBRC), Porto Alegre, RS, Brasil. SBC.
Pattaranantakul, M., He, R., Meddahi, A., and Zhang, Z. (2016). SecMANO: Towards Network Functions Virtualization (NFV) Based Security MANagement and Orchestration. In IEEE Trustcom/BigDataSE/ISPA, pages 598–605.
Paul, G., Sarkar, P., and Mukherjee, S. (2014). Towards a More Democratic Mining in Bitcoins. In International Conference on Information Systems Security, pages 185–203. Springer International Publishing.
PayPal (2019). Paypal Holdings, Inc. (PYPL) SEC Filing 10-K Annual report for the fiscal year ending Monday, December 31, 2018. https://filings.last10k.com/sec-filings/1633917/000163391719000043/pypl201810-k.htm.pdf. Acessado em 09 de Abril de 2019.
Pereira Rocha Filho, G., Yukio Mano, L., Demetrius Baria Valejo, A., Aparecido Villas, L., and Ueyama, J. (2018). A low-cost smart home automation to enhance decision-making based on fog computing and computational intelligence. IEEE Latin America Transactions, 16(1):186–191.
ply (2019). Dynamic Tracing in Linux. https://github.com/iovisor/ply.
Popov, S. (2016). The Tangle. https://iota.org/ IOTAWhitepaper.pdf. Acessado em 9 de abril de 2019.
Pornin, T. (2017). Testsslserver. URL: https://www.bolet.org/TestSSLServer.
Qiu, J., Wu, Q., Ding, G., Xu, Y. e Feng, S. (2016). A survey of machine learning for big data processing. EURASIP Journal on Advances in Signal Processing, 2016(1):67.
Qualys, I. (2019). Qualys ssl labs. URL: https://www.ssllabs.com.
Quinn, P., Elzur, U., and Pignataro, C. (2018). Network service header (NSH). RFC 8300, IETF.
Radford, D. (2016). Europe Blockchain Working Group. Standard, The International Securities Association for Institutional Trade Communication. https: //isitc-europe.com/isitc-europe-blockchain-working-group. Acessado em 9 de abril de 2019.
Raman, L. (1998). OSI systems and network management. IEEE Communications Magazine, 36(3):46–53.
rbsec (2019). Sslscan. URL: https://github.com/rbsec/sslscan.
Rebello, G. A. F. (2019). Encadeamento Seguro de Funções Virtuais de Rede Baseado em Correntes de Blocos. Projeto Final de Graduação, Universidade Federal do Rio de Janeiro, Brasil.
Rebello, G. A. F., Alvarenga, I. D., Sanz, I. J., and Duarte, O. C. M. B. (2018). SINFONIA: Gerenciamento Seguro de Funções Virtualizadas de Rede através de Corrente de Blocos. In I Workshop em Blockchain: Teoria, Tecnologias e Aplicações (WBlockchain - SBRC 2018), Campos do Jordão, SP, Brasil. SBC.
Rebello, G. A. F., Alvarenga, I. D., Sanz, I. J., and Duarte, O. C. M. B. (2019a). BSec-NFVO: A Blockchain-based Security for Network Function Virtualization Orchestration. In IEEE International Conference on Communications (ICC). A ser publicado.
Rebello, G. A. F., Camilo, G. F., Silva, L. G. C., Guimarães, L. C. B., de Souza, L. A. C., Alvarenga, I. D., and Duarte, O. C. M. B. (2019b). Provendo uma infraestrutura de software fatiada, isolada e segura de funções virtuais através da tecnologia de corrente de blocos. Technical report, Grupo de Teleinformática e Automação (GTA/COPPE/UFRJ).
Rescorla, E. (2018). The transport layer security (tls) protocol version 1.3. URL: https://tools.ietf.org/html/rfc8446.
Ribeiro, A. I. J. a. T., Silva, T. H., Duarte-Figueiredo, F., and Loureiro, A. A. (2014). Studying trafc conditions by analyzing foursquare and instagram data. In Proceedings of the 11th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, & 38; Ubiquitous Networks, PE-WASUN ’14, pages 17–24, New York, NY, USA. ACM.
Ristic, I. (2011). Mitigating the beast attack on tls. URL: https://blog.qualys.com/ssllabs/2011/10/17/mitigating-the-beast-attack-on-tls.
Ristic, I. (2015). OpenSSL cookbook (Version 2.1-draft, June 2018). Feisty Duck, 2nd. edition.
Riveiro, M., Lebram, M., and Elmer, M. (2017). Anomaly detection IEEE Transactions on Intelligent for road trafc: A visual analytics framework. Transportation Systems, 18(8):2260–2270.
Rivest, R. L., Shamir, A., and Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120–126.
Rodrigues, D. O., Boukerche, A., Silva, T. H., Loureiro, A. A., and Villas, L. A. (2018). Combining taxi and social media data to explore urban mobility issues. Computer Communications, 132:111 – 125.
Rodrigues, D. O., Fernandes, J. T., Curado, M., and Villas, L. A. (2018). Hybrid context-aware multimodal routing. In 2018 21st International Conference on Intelligent Transportation Systems (ITSC), pages 2250–2255.
Roy, O. and Vetterli, M. (2007). The effective rank: A measure of effective dimensionality. In 2007 15th European Signal Processing Conference, pages 606–610.
S. Gama, E., Immich, R., and F. Bittencourt, L. (2018). Towards a multi-tier fog/cloud architecture for video streaming. In 2018 IEEE/ACM International Conference on Utility and Cloud Computing Companion (UCC Companion), pages 13–14.
Sakr, S., Liu, A., Batista, D. M., and Alomari, M. (2011). A survey of large scale data management approaches in cloud environments. IEEE Communications Surveys Tutorials, 13(3):311–336.
Santana, E. F. Z., Chaves, A. P., Gerosa, M. A., Kon, F., and Milojicic, D. S. (2018). Software platforms for smart cities: Concepts, requirements, challenges, and a unied reference architecture. ACM Computing Surveys (CSUR), 50(6):78.
Santos, E. R. S., Câmara Júnior, E. P. M., and Vieira (2019a). Bpfabric implementing sketches. https://github.com/elerson/BPFabric.
Santos, E. R. S., Câmara Júnior, E. P. M., Vieira, M. A. M., and Vieira, L. F. M. (2019b). Aplicações de monitoramento de tráfego utilizando redes programáveis eBPF. In Anais do XXXVII Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos (SBRC), Porto Alegre, RS, Brasil. SBC.
Santos, F. A., Silva, T. H., , Loureiro, A. A. F., and Villas, L. A. (2018). Uncovering the Perception of Urban Outdoor Areas Expressed in Social Media. In Proc. of IEEE ACM International Conference on Web Intelligence (WI), Santiago, Chile.
Santos, F. A., Silva, T. H., Braun, T., Loureiro, A. A., and Villas, L. A. (2017). Towards a sustainable people-centric sensing. In 2017 IEEE International Conference on Communications (ICC), pages 1–6. IEEE.
Santos, N. and Schiper, A. (2012). Tuning Paxos for Highthroughput with Batching and Pipelining. In Proceedings of the 13th International Conference on Distributed Computing and Networking, ICDCN’12, pages 153–167, Berlin, Heidelberg. Springer-Verlag.
Schneider, F. B. (1993). chapter Replication Management Using the State-machine Approach. In Mullender, S., editor, Distributed Systems (2Nd Ed.), pages 169–197. ACM Press/Addison-Wesley Publishing Co., New York, NY, USA.
Schulist, J., Borkmann, D., and Starovoitov, A. (2019). Linux socket filtering aka berkeley packet filter (bpf). www.kernel.org/doc/Documentation/networking/filter.txt. Disponível em 17/03/2019.
Schwartz, D., Youngs, N., and Britto, A. (2014). The Ripple Protocol Consensus Algorithm. Ripple Labs Inc White Paper, 5.
SEC, S. (2000). Sec 2: Recommended elliptic curve domain parameters, version 1. Standards for Efficient Cryptography Group, Certicom Corp (http://www.secg.org/).
SEC, S. (2010). Sec 2: Recommended elliptic curve domain parameters, version 2. Standards for Efficient Cryptography Group, Certicom Corp ()http://www.secg.org/.
Sedeno-Noda, A. and Raith, A. (2015). A dijkstra-like method computing all extreme supported non-dominated solutions of the biobjective shortest path problem. Computers & Operations Research, 57:83–94.
Sekar, V., Egi, N., Ratnasamy, S., Reiter, M. K., and Shi, G. (2012). Design and Implementation of a Consolidated Middlebox Architecture. In 9th Symposium on Networked Systems Design and Implementation (NSDI), pages 323–336, San Jose, CA. USENIX.
Sharma, N. K., Kaufmann, A., Anderson, T. E., Krishnamurthy, A., Nelson, J., and Peter, S. (2017). Evaluating the power of flexible packet processing for network resource allocation. In NSDI, pages 67–82.
Shi, W., Cao, J., Zhang, Q., Li, Y., and Xu, L. (2016). Edge computing: Vision and challenges. IEEE Internet of Things Journal, 3(5):637–646.
Shin, M., Mishra, A. e Arbaugh, W. A. (2004). Improving the latency of 802.11 hand-offs using neighbor graphs. Em Proceedings of the 2nd International Conference on Mobile Systems, Applications, and Services, MobiSys ’04, p. 70–83, New York, NY, USA. ACM.
Silva, T H., d. M. P. N. J. I. A. d. R. C. M. V. d. C. F. F. A. A. J. L. A. (2016). Users in the urban sensing process: Challenges and research opportunities. In Pervasive Computing: Next Generation Platforms for Intelligent Data Collection, pages 45–95. Academic Press.
Silva, T. H., Vaz de Melo, P. O. S., Almeida, J. M., Salles, J., and Loureiro, A. A. F. (2014). Revealing the city that we cannot see. ACM Trans. Internet Technol., 14(4):26:1–26:23.
Silva, T. H., Vaz de Melo, P. O. S., Viana, A., Almeida, J. M., Salles, J., and Loureiro, A. A. F. (2013). Trafc Condition is more than Colored Lines on a Map: Characterization of Waze Alerts. In Proc. of the International Conference on Social Informatics (SocInfo’13), Kyoto, Japan.
Silva, T., Viana, A., Benevenuto, F., Villas, L., Salles, J., Loureiro, A., and Quercia, D. (2018). Urban Computing Leveraging Location-Based Social Network Data: a Survey. ACM Computing Surveys.
Smolensk, M. (2018). Lightstreams White Paper. https://s3.amazonaws.com/lightstreams/lightstreams_whitepaper.pdf.Acessadoem9deabrilde2019.
Song, C., Qu, Z., Blumm, N. e Barabási, A.-L. (2010). Limits of predictability in human mobility. Science, 327(5968):1018–1021.
Song, C., Qu, Z., Blumm, N., and Barabási, A.-L. (2010). Limits of predictability in human mobility. Science, 327(5968):1018–1021.
Song, H. (2013). Protocol-oblivious forwarding: Unleash the power of sdn through a future-proof forwarding plane. In Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking, pages 127–132. ACM.
Song, X., Zhang, Q., Sekimoto, Y., Horanont, T., Ueyama, S., and Shibasaki, R. (2013). Modeling and probabilistic reasoning of population evacuation during large-scale disaster. In Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 1231–1239. ACM.
Sousa, J., Bessani, A., and Vukolic, M. (2018). A Byzantine Fault- Tolerant Ordering Service for the Hyperledger Fabric Blockchain Platform. In 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pages 51–58.
Srivastava, G., Singh, M., Kumar, P., and Singh, J. (2016). Internet traffic classification: A survey. In Recent Advances in Mathematics, Statistics and Computer Science, pages 611–620. World Scientific.
SSL Labs (2019). Ssl and tls deployment best practices. URL: https://github.com/ssllabs/research/wiki/SSL-and-TLS-Deployment-Best-Practices.
Stallings,W. (2003). Cryptography and network security, principles and practices.
Statista (2018). Internet of Things - number of connected devices worldwide. Technical report, Statista. https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/. Acessado em 9 de abril de 2019.
SteadieSei, M., Dellaert, N. P., Nuijten, W., Van Woensel, T., and Raou, R. (2014). Multimodal freight transportation planning: A literature review. European journal of operational research, 233(1):1–15.
Storj Labs, I. (2018). Storj: A Decentralized Cloud Storage Network Framework. https://storj.io/storjv3.pdf. Acessado em 9 de abril de 2019.
Sullivan, N. (2018). A detailed look at rfc 8446 (a.k.a. tls 1.3). URL: https://blog.cloudflare.com/rfc-8446-aka-tls-1-3.
Sun, Y., Peng, M., Zhou, Y., Huang, Y. e Mao, S. (2018). Application of machine learning in wireless networks: Key techniques and open issues. Relatório técnico, arXiv preprint arXiv:1809.08707. Online. https://arxiv.org/abs/1809.08707. Acessado em 22/03/2019.
Synopsys (2014). The Heartbleed Bug. URL: http://heartbleed.com.
Sze, V., Chen, Y., Yang, T. e Emer, J. S. (2017). Efcient processing of deep neural networks: A tutorial and survey. Proceedings of the IEEE, 105(12):2295– 2329.
Tabrizi, H., Farhadi, G. e Ciof, J. (2011). A learning-based network selection method in heterogeneous wireless systems. Em 2011 IEEE Global Telecommunications Conference GLOBECOM 2011, p. 1–5.
Talari, S., Shafie-khah, M., Siano, P., Loia, V., Tommasetti, A., and Catalão, J. P. S. (2017). A Review of Smart Cities Based on the Internet of Things Concept. Energies, 10(4).
Taleb, T., Dutta, S., Ksentini, A., Iqbal, M., and Flinck, H. (2017a). Mobile edge computing potential in making cities smarter. Comm. Mag., 55(3):38–43.
Taleb, T., Ksentini, A., and Frangoudis, P. (2017b). Follow-me cloud: When cloud services follow mobile users. IEEE Transactions on Cloud Computing, pages 1–1.
Tannahill, B. K. e Jamshidi, M. (2014). System of systems and big data analytics–bridging the gap. Computers & Electrical Engineering, 40(1):2–15.
Tesauro, G. (2007). Reinforcement learning in autonomic computing: A manifesto and case studies. IEEE Internet Computing, 11(1):22–30.
Tikhomirov, S. (2018). Ethereum: State of Knowledge and Research Perspectives. In Foundations and Practice of Security, pages 206–221. Springer International Publishing.
Toch, E., Lerner, B., Ben-Zion, E. e Ben-Gal, I. (2018). Analyzing large-scale human mobility data: a survey of machine learning methods and applications. Knowledge and Information Systems, p. 1–23.
Traynor, D. and Curran, K. (2012). Location-based social networks. From Government to E-Governance: Public Administration in the Digital Age, page 243.
Trois, C., Bona, L. C., Oliveira, L. S., Martinello, M., Harewood-Gill, D., Fabro, M. D. D., Nejabati, R., Simeonidou, D., Lima, J. C. D., and Stein, B. (2018). Exploring textures in traffic matrices to classify data center communications. In 2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA), pages 1123–1130.
Trois, C., Fabro, M. D. D., de Bona, L. C. E., and Martinello, M. (2016). A survey on sdn programming languages: Toward a taxonomy. IEEE Communications Surveys Tutorials, 18(4):2687–2712.
Tsai, C.-W., Lai, C.-F., Chao, H.-C. e Vasilakos, A. V. (2015). Big data analytics: a survey. Journal of Big Data, 2(1):21.
Tseng, L. (2017). Bitcoin’s Consistency Property. In 2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing (PRDC), pages 219–220.
Tu, C., Stringer, J., and Pettit, J. (2017). Building an extensible open vswitch datapath. SIGOPS Oper. Syst. Rev., 51(1):72–77.
Turgut, Z., Üstebay, S., Zeynep Gürka¸s Aydn, G. e Sertba¸s, A. (2019). Deep learning in indoor localization using WiFi. Em Boyaci, A., Ekti, A. R., Aydin, M. A. e Yarkan, S., editors, International Telecommunications Conference, p. 101–110, Singapore. Springer.
ubpf (2019). Userspace eBPF VM. https://github.com/iovisor/ubpf.
United Nations, D. o. E. and Affairs, S. (2018). World Urbanization Prospects: The 2018 Revision, Highlights. United Nations.
Vaquero, L. M. and Rodero-Merino, L. (2014). Finding your way in the fog: Towards a comprehensive denition of fog computing. SIGCOMM Comput. Commun. Rev., 44(5):27–32.
Vasin, P. (2014). Blackcoin’s Proof-of-Stake Protocol v2. URL: https://blackcoin.co/blackcoin-pos-protocol-v2-whitepaper.pdf, 71.
Vieira, M. A. M., Pacífico, R. D. G., Castanho, M. S., Santos, E. R. S., Câmara Júnior, E. P. M., and Vieira, L. F. M. (2019). Tutorial eBPF. https://github.com/mscastanho/bpf-tutorial.
Visa (2019). About VisaNet. https://usa.visa.com/about-visa/visanet.html. Acessado em 9 de Abril de 2019.
VMWare (2018). p4c-xdp. https://github.com/vmware/p4c-xdp.
Vukolic, M. (2016). The Quest for Scalable Blockchain Fabric: Proof-of-Work vs. BFT Replication, pages 112–125. Springer International Publishing, Cham.
W3C (2016). Blockchain Community Group. https://www.w3.org/community/blockchain. Acessado em 9 de abril de 2019.
Wang, F., Gong, W., Liu, J. e Wu, K. (2018). Channel selective activity recognition with WiFi: A deep learning approach exploring wideband information. IEEE Transactions on Network Science and Engineering, p. 1–1.
Wang, H., Soulé, R., Dang, H. T., Lee, K. S., Shrivastav, V., Foster, N., and Weatherspoon, H. (2017). P4fpga: A rapid prototyping framework for p4. In Proceedings of the Symposium on SDN Research, pages 122–135. ACM.
Wang, H., Wen, H., Yi, F., Zhu, H., and Sun, L. (2017). Road trafc anomaly detection via collaborative path inference from gps snippets. Sensors, 17(3):550.
Wang, S., Minku, L. L., Ghezzi, D., Caltabiano, D., Tino, P. e Yao, X. (2013). Concept drift detection for online class imbalance learning. Em The 2013 Int. Joint Conference on Neural Networks (IJCNN), p. 1–10.
Wang, T., Yang, Q., Tan, K., Zhang, J., Liew, S. C. e Zhang, S. (2018). Dcap: Improving the capacity of wi networks with distributed cooperative access points. IEEE Transactions on Mobile Computing, 17(2):320–333.
Wang, X., Gao, L. e Mao, S. (2017). BiLoc: Bi-Modal Deep Learning for Indoor Localization With Commodity 5GHz WiFi. IEEE Access, 5:4209–4220.
Wang, X., Ning, Z., Hu, X., Ngai, E. C.-H., Wang, L., Hu, B., and Kwok, R. Y. (2018). A city-wide real-time trafc management system: Enabling crowdsensing in social internet of vehicles. IEEE Communications Magazine, 56(9):19– 25.
Wang, X., Wang, X. e Mao, S. (2018). RF sensing in the internet IEEE Communications Magazine, of things: A general deep learning framework. 56(9):62–67.
Wang, Y., Xiang, Y., and Yu, S. Z. (2010). Automatic application signature construction from unknown traffic. In 2010 24th IEEE International Conference on Advanced Information Networking and Applications, pages 1115–1120.
Warneke, D. e Kao, O. (2009). Nephele: efcient parallel data processing in the cloud. Em Proceedings of the 2nd workshop on many-task computing on grids and supercomputers, p. 8. ACM.
Wen, Z., Yang, R., Garraghan, P., Lin, T., Xu, J., and Rovatsos, M. (2017). Fog orchestration for internet of things services. IEEE Internet Computing, 21(2):16–24.
Wiki, B. (2019). Bitcoin Scalability. https://en.bitcoin.it/wiki/Scalability. Acessado em 9 de abril de 2019.
Wikipedia (2018). Netscape. URL: https://en.wikipedia.org/wiki/Netscape.
Wilkinson, S., Boshevski, T., Brandoff, J., and Buterin, V. (2014). Storj: a Peer-to-Peer Cloud Storage Network. https://storj.io/storj2014.pdf. Acessado em 9 de abril de 2019.
Wood, G. (2014). Ethereum: A secure decentralised generalised transaction ledger. http://gavwood.com/paper.pdf. Acessado em 9 de abril de 2019.
Wüst, K. and Gervais, A. (2018). Do you Need a Blockchain? In 2018 Crypto Valley Conference on Blockchain Technology (CVCBT), pages 45–54.
Xin, R. S., Rosen, J., Zaharia, M., Franklin, M. J., Shenker, S. e Stoica, I. (2013). Shark: SQL and rich analytics at scale. Em Proceedings of the 2013 ACM SIGMOD International Conference on Management of data, p. 13–24. ACM.
Xu, G., Gao, S., Daneshmand, M., Wang, C. e Liu, Y. (2017). A survey for mobility big data analytics for geolocation prediction. IEEE Wireless Communications, 24(1):111–119.
Xu, H. and Li, B. (2013). Joint request mapping and response routing for geo-distributed cloud services. In 2013 Proceedings IEEE INFOCOM, pages 854–862.
Xu, L. D., He, W., and Li, S. (2014). Internet of things in industries: A survey. IEEE Transactions on Industrial Informatics, 10(4):2233–2243.
Xu, X., Weber, I., Staples, M., Zhu, L., Bosch, J., Bass, L., Pautasso, C., and Rimba, P. (2017). A Taxonomy of Blockchain-Based Systems for Architecture Design. In 2017 IEEE International Conference on Software Architecture (ICSA), pages 243–252.
Yabe, T., Tsubouchi, K., Sudo, A., and Sekimoto, Y. (2016). A framework for evacuation hotspot detection after large scale disasters using location data from smartphones: case study of kumamoto earthquake. In Proceedings of the 24th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, page 44. ACM.
Yang, C., Huang, Q., Li, Z., Liu, K., and Hu, F. (2017). Big data and cloud computing: innovation opportunities and challenges. International Journal of Digital Earth, 10(1):13–53.
Yi, S., Hao, Z., Qin, Z., and Li, Q. (2015). Fog computing: Platform and applications. In 2015 Third IEEE Workshop on Hot Topics in Web Systems and Technologies (HotWeb), pages 73–78. IEEE.
Yu, M., Jose, L., and Miao, R. (2013). Software defined traffic measurement with opensketch. In NSDI, volume 13, pages 29–42.
Zaharia, M., Chowdhury, M., Das, T., Dave, A., Ma, J., McCauley, M., Franklin, M. J., Shenker, S. e Stoica, I. (2012a). Resilient distributed datasets: A fault-tolerant abstraction for in-memory cluster computing. Em Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation, p. 2–2. USENIX Association.
Zaharia, M., Das, T., Li, H., Hunter, T., Shenker, S. e Stoica, I. (2013). Discretized streams: Fault-tolerant streaming computation at scale. Em XXIV ACM Symposium on Operating Systems Principles, p. 423–438. ACM.
Zaharia, M., Das, T., Li, H., Shenker, S. e Stoica, I. (2012b). Discretized streams: an efcient and fault-tolerant model for stream processing on large clusters. Proceedings of the 4th USENIX conference on Hot Topics in Cloud Ccomputing, p. 10–10.
Zaki, M. J. and Jr, W. M. (2014). Data Mining and Analysis: Fundamental Concepts and Algorithms. Cambridge University Press, New York, NY, USA.
Zeng, Y., Pathak, P. H. e Mohapatra, P. (2015). Analyzing shopper’s behavior through wi signals. Em Proceedings of the 2Nd Workshop on Physical Analytics, WPA ’15, p. 13–18.
Zeng, Y., Pathak, P. H. e Mohapatra, P. (2016). Wiwho: Wi-based person identication in smart spaces. Em Proceedings of the 15th International Conference on Information Processing in Sensor Networks, IPSN ’16, p. 4:1–4:12.
Zhang, H., Lu, G., Qassrawi, M. T., Zhang, Y., and Yu, X. (2012). Feature selection for optimizing traffic classification. Computer Communications, 35(12):1457–1471.
Zhang, K., Mao, Y., Leng, S., He, Y., and Zhang, Y. (2017). Mobile-edge computing for vehicular networks: A promising network paradigm with predictive off-loading. IEEE Vehicular Technology Magazine, 12(2):36–44.
Zhang, P., Schmidt, D. C., White, J., and Lenz, G. (2018). Chapter One - Blockchain Technology Use Cases in Healthcare. In Raj, P. and Deka, G. C., editors, Blockchain Technology: Platforms, Tools and Use Cases, volume 111 of Advances in Computers, pages 1 – 41. Elsevier.
Zhang, X., Wang, C., Li, Z., Zhu, J., Shi, W. e Wang, Q. (2016). Exploring the sequential usage patterns of mobile internet services based on markov models. Electronic Commerce Research and Applications, 17:1 – 11.
Zheng, K., Zheng, Q., Chatzimisios, P., Xiang, W., and Zhou, Y. (2015). Heterogeneous vehicular networking: a survey on architecture, challenges, and solutions. IEEE communications surveys & tutorials, 17(4):2377–2396.
Zheng, Y. (2011). Location-Based Social Networks: Users, pages 243–276. Springer New York, New York, NY.
Zheng, Y. (2012). Tutorial on Location-Based Social Networks. In Proc. of WWW’12, Lyon, France.
Zheng, Y. (2015). Methodologies for cross-domain data fusion: An overview. IEEE Transactions on Big Data, 1(1):16–34.
Zheng, Y., Capra, L., Wolfson, O., and Yang, H. (2014). Urban computing: concepts, methodologies, and applications. ACM Transactions on Intelligent Systems and Technology (TIST), 5(3):38.
Zheng, Z., Xie, S., Dai, H.-N., Chen, X., and Wang, H. (2018). Blockchain Challenges and Opportunities: A Survey. International Journal of Web and Grid Services, 14(4):352–375.
Zhu, L., Yu, F. R., Wang, Y., Ning, B., and Tang, T. (2018). Big data analytics in intelligent transportation systems: a survey. IEEE Transactions on Intelligent Transportation Systems, 20(1):1–16.
Zilberman, N., Watts, P. M., Rotsos, C., and Moore, A. W. (2015). Reconfigurable network systems and software-defined networking. Proceedings of the IEEE, 103(7):1102–1124.
Zografos, K. G. and Androutsopoulos, K. N. (2008). Algorithms for itinerary planning in multimodal transportation networks. IEEE Transactions on Intelligent Transportation Systems, 9(1):175–184.
Detalhes sobre o formato disponível para publicação: Volume Completo
© O(s) autor(es), 2019.

Esse trabalho foi publicado de acordo com os termos da licença Creative Commons Attribution 4.0 International License
.