Login / Signup
Elvis Pontes
Publication Activity (10 Years)
Years Active: 2009-2017
Publications (10 Years): 4
Top Topics
Rfid Systems
Intrusion Detection
Malicious Nodes
Polynomial Regression
Top Venues
LCN
ICDIM
EURFID
GLOBECOM
</>
Publications
</>
Anderson Aparecido Alves da Silva
,
Fen Zhou
,
Elvis Pontes
,
Marcos A. Simplício Jr.
,
Rui L. Aguiar
,
Adilson Eduardo Guelfi
,
Sergio Takeo Kofuji
Energy-efficient node position identification through payoff matrix and variability analysis.
Telecommun. Syst.
65 (3) (2017)
Wilson Bongiovanni
,
Adilson Eduardo Guelfi
,
Elvis Pontes
,
Anderson Aparecido Alves da Silva
,
Fen Zhou
,
Sergio Takeo Kofuji
Viterbi algorithm for detecting DDoS attacks.
LCN
(2015)
Anderson Aparecido Alves da Silva
,
Elvis Pontes
,
Adilson Eduardo Guelfi
,
I. Caproni
,
Rui L. Aguiar
,
Fen Zhou
,
Sergio Takeo Kofuji
Predicting model for identifying the malicious activity of nodes in MANETs.
ISCC
(2015)
Leandro Avanço
,
Adilson Eduardo Guelfi
,
Elvis Pontes
,
Anderson Aparecido Alves da Silva
,
Sérgio Takeo Kofuji
,
Fen Zhou
An effective intrusion detection approach for jamming attacks on RFID systems.
EURFID
(2015)
Anderson Aparecido Alves da Silva
,
Elvis Pontes
,
Fen Zhou
,
Adilson Eduardo Guelfi
,
Sergio Takeo Kofuji
PRBS/EWMA based model for predicting burst attacks (Brute Froce, DoS) in computer networks.
ICDIM
(2014)
Anderson Aparecido Alves da Silva
,
Elvis Pontes
,
Fen Zhou
,
Sergio Takeo Kofuji
Grey model and polynomial regression for identifying malicious nodes in MANETs.
GLOBECOM
(2014)
Elvis Pontes
,
Adilson Eduardo Guelfi
,
Sergio Takeo Kofuji
,
Anderson Aparecido Alves da Silva
Applying multi-correlation for improving forecasting in cyber security.
ICDIM
(2011)
Elvis Pontes
,
Wagner L. Zucchi
Fibonacci sequence and EWMA for intrusion forecasting system.
ICDIM
(2010)
Elvis Pontes
,
Adilson Eduardo Guelfi
IFS - Intrusion forecasting system based on collaborative architecture.
ICDIM
(2009)
Elvis Pontes
,
Adilson Eduardo Guelfi
IDS 3G - Third generation for intrusion detection: Applying forecasts and return on security investment to cope with unwanted traffic.
ICITST
(2009)