![[ICO]](/icons/blank.gif) | Name | Last modified | Size | Description |
|
![[PARENTDIR]](/icons/back.gif) | Parent Directory | | - | |
![[DIR]](/icons/folder.gif) | trabalhos-relacionados/ | 2018-03-01 19:52 | - | |
![[ ]](/icons/layout.gif) | 19990319-MSc-Christiane.Zim.Zapelini-SIMON-Sistema.de.Monitorizacao.de.Desempenho.em.Redes.UNIX.Usando.JAVA.pdf | 1999-06-24 18:08 | 411K | |
![[ ]](/icons/layout.gif) | 20060210-MSc-Guilherme.Cesar.Soares.Ruppert-NFS.Guard-Uma.solucao.de.seguranca.para.o.protocolo.NFS.pdf | 2006-07-14 16:48 | 426K | |
![[ ]](/icons/layout.gif) | 20050221-MP-Ronaldo.Compagno-Geracao.automatica.de.politicas.para.deteccao.de.intrusoes.baseada.em.evidencias.de.ataque.pdf | 2008-05-26 13:47 | 484K | |
![[ ]](/icons/layout.gif) | 20010913-MSc-Alessandro.Augusto-Automatizacao.de.administracao.e.seguranca.em.redes.Windows.NT.pdf | 2003-05-07 17:23 | 657K | |
![[ ]](/icons/layout.gif) | 20111006-MSc-Dario.Simoes.Fernandes.Filho-BehEMOT.sistema.hibrido.analise.malware.pdf | 2019-06-02 00:11 | 715K | |
![[ ]](/icons/layout.gif) | 20111006-MSc-Vitor.Monte.Afonso-analise.deteccao.ataques.navegador.web.pdf | 2019-06-02 00:03 | 724K | |
![[ ]](/icons/layout.gif) | 20020516-MSc-Jansen.Carlo.Sena-Um.modelo.para.protecao.do.trafego.de.servicos.baseado.em.niveis.de.seguranca.pdf | 2003-05-08 11:17 | 743K | |
![[ ]](/icons/layout.gif) | 20030226-MSc-Diego.de.Assis.Monteiro.Fernandes-Resposta.automatica.em.um.sistema.de.seguranca.imunologico.computacional.pdf | 2003-03-18 10:51 | 764K | |
![[ ]](/icons/layout.gif) | 20000904-MSc-Marcelo.Barbosa.Lima-Provisao.de.servicos.inseguros.usando.filtros.de.pacotes.com.estados.pdf | 2001-04-16 01:16 | 797K | |
![[ ]](/icons/layout.gif) | 20031211-MP-Marcus.Vinicius.La.Rocca.Macedo-Uma.proposta.de.aplicacao.da.metrica.de.pontos.de.funcao.em.aplicacoes.de.dispositivos.portateis.pdf | 2004-12-16 14:12 | 823K | |
![[ ]](/icons/layout.gif) | 20060623-MSc-Martim.dOrey.Posser.de.Andrade.Carbone-Framework.de.kernel.para.um.sistema.de.seguranca.imunologico.pdf | 2006-07-14 14:50 | 1.0M | |
![[ ]](/icons/layout.gif) | 20090227-MSc-Douglas.Gielo.Quinellato-Um.sistema.de.reputacao.para.redes.peer.to.peer.estruturado.baseado.na.reputacao.de.arquivos.com.verificacao.pela.reputacao.dos.nos.pdf | 2009-04-03 19:06 | 1.0M | |
![[ ]](/icons/layout.gif) | 20161219-PhD-Vitor.Monte.Afonso-Android.Security.Malware.Detection.Aut.Policy.pdf | 2017-01-31 17:29 | 1.1M | |
![[ ]](/icons/layout.gif) | 20050323-MSc-Diogo.Ditzel.Kropiwiec-Policy.Viewer-Ferramenta.para.visualizacao.de.politicas.de.seguranca.em.grafos.pdf | 2008-05-26 13:43 | 1.2M | |
![[ ]](/icons/layout.gif) | 20160926-MSc-Otavio.Augusto.Araujo.Silva-Prot.dados.sensiveis.isolamento.proc.Linux.pdf | 2017-01-05 15:24 | 1.4M | |
![[ ]](/icons/layout.gif) | 20030226-MSc-Marcelo.Abdalla.dos.Reis-Forense.computacional.e.sua.aplicacao.em.seguranca.imunologica.pdf | 2003-03-18 23:14 | 1.4M | |
![[ ]](/icons/layout.gif) | 20041217-MP-Dinailton.Jose.da.Silva-Analise.de.qualidade.de.servico.em.redes.corporativas.pdf | 2005-03-01 09:35 | 1.4M | |
![[ ]](/icons/layout.gif) | 20060210-MSc-Arthur.Bispo.de.Castro-Maquinas.virtuais.em.ambientes.seguros.pdf | 2008-05-30 22:52 | 1.4M | |
![[ ]](/icons/layout.gif) | 20130419-MSc-Anderson.Soares.Ferreira-arq.monit.seg.acordos.niveis.serv.nuvens.pdf | 2014-01-10 15:07 | 1.5M | |
![[ ]](/icons/layout.gif) | 19990208-MSc-Keesje.Duarte.Pouw-Seguranca.na.arquitetura.TCPIP-De.firewalls.a.canais.seguros.pdf | 1999-04-09 17:43 | 1.5M | |
![[ ]](/icons/layout.gif) | 20020411-MSc-Renato.Hirata-Otimizando.servidores.Web.de.alta.demanda.pdf | 2003-05-07 18:25 | 1.5M | |
![[ ]](/icons/layout.gif) | 19850719-MSc-Paulo.L.de.Geus-my.own-Arquitetura.microcomputador.controle.tempo.real.pdf | 2019-05-26 15:01 | 1.6M | |
![[ ]](/icons/layout.gif) | 20040713-PhD-Fabricio.Sergio.de.Paula-Uma.arquitetura.de.seguranca.computacional.inspirada.no.sistema.imunologico.pdf | 2004-08-18 21:55 | 1.6M | |
![[ ]](/icons/layout.gif) | 20130419-MSc-Andre.Augusto.da.Silva.Pereira-Framework.kernel.auto-protecao.sistema.imunologico.pdf | 2013-10-16 16:37 | 1.7M | |
![[ ]](/icons/layout.gif) | 20021121-MSc-Flavio.de.Souza.Oliveira-Resposta.a.incidentes.e.analise.forense.para.redes.baseadas.em.Windows.2000.pdf | 2003-05-07 18:32 | 1.7M | |
![[ ]](/icons/layout.gif) | 20041015-MP-Robledo.de.Andrade.e.Castro-Uma.analise.de.solucoes.VPN.em.redes.corporativas.de.alta.capilaridade.pdf | 2005-01-21 11:13 | 1.9M | |
![[ ]](/icons/layout.gif) | 20050215-MP-Recimero.Cesar.Fabre-Metodos.avancados.para.controle.de.Spam.pdf | 2005-05-12 23:11 | 1.9M | |
![[ ]](/icons/layout.gif) | 20170728-MSc-Marcus.Felipe.Botacin-Hardware.Assisted.Malware.Analysis.pdf | 2017-10-10 19:44 | 2.0M | |
![[ ]](/icons/layout.gif) | 20030730-MP-Eduardo.Santos.Kerr-Ketib.Um.processo.de.representacao.de.informacoes.para.textos.complexos.pdf | 2003-11-12 15:32 | 2.2M | |
![[ ]](/icons/layout.gif) | 20060524-PhD-Joao.Porto.de.Albuquerque.Pereira-Gerenciamento.baseado.em.modelos.da.configuracao.de.sistemas.de.seguranca.em.ambientes.de.redes.complexos.pdf | 2006-07-19 14:34 | 2.7M | |
![[ ]](/icons/layout.gif) | 20180625-MSc-Bruno.da.Silva.Melo-Robustness.Testing.CoAP.Fuzzing.pdf | 2019-12-02 22:17 | 2.8M | |
![[ ]](/icons/layout.gif) | 20100505-MSc-Gabriel.Dieterich.Cavalcante-Deteccao.e.recuperacao.de.intrusao.com.uso.de.controle.de.versao.pdf | 2012-12-20 13:11 | 2.8M | |
![[ ]](/icons/layout.gif) | 20040227-MSc-Edmar.Roberto.Santana.de.Rezende-Seguranca.no.acesso.remoto.VPN.pdf | 2004-07-05 10:22 | 2.8M | |
![[ ]](/icons/layout.gif) | 20110221-PhD-Fernando.Marques.Figueira.Filho-Conhecimento.e.Internet-Busca.exploracao.e.a.familiaridade.pdf | 2011-10-10 16:26 | 2.8M | |
![[ ]](/icons/layout.gif) | 20040227-MSc-Cleymone.Ribeiro.dos.Santos-Integracao.de.IPv6.em.um.ambiente.cooperativo.seguro.pdf | 2004-07-05 10:20 | 3.0M | |
![[ ]](/icons/layout.gif) | 20150925-PhD-Carlos.Alberto.da.Silva-Management.of.Cloud.Computing.using.security.criteria.pdf | 2015-12-14 17:12 | 3.4M | |
![[ ]](/icons/layout.gif) | 19980429-MSc-Eloisa.Bertini-Um.sistema.para.visualizacao.holografica.pdf | 2015-08-27 15:10 | 3.6M | |
![[ ]](/icons/layout.gif) | 20000925-MSc-Emilio.Tissato.Nakamura-Um.modelo.de.seguranca.de.redes.para.ambientes.cooperativos.pdf | 2001-04-12 11:33 | 4.2M | |
![[ ]](/icons/layout.gif) | 20121128-PhD-Andre.Ricardo.Abed.Gregio-Malware.behavior.pdf | 2014-01-14 19:41 | 4.9M | |
![[ ]](/icons/layout.gif) | 20211213-PhD-Marcus.Felipe.Botacin-malware.detection.challenges.approaches.pdf | 2021-12-03 21:47 | 4.9M | |
![[ ]](/icons/layout.gif) | 20040901-MP-Joao.Carlos.Curti-Analise.de.seguranca.em.aplicacoes.que.utilizam.plataformas.UNIX.e.MS.Windows.no.modelo.Cliente.Servidor.pdf | 2005-01-21 11:10 | 5.2M | |
![[ ]](/icons/layout.gif) | 20011210-MSc-Carlos.Alberto.da.Silva-Automatizacao.da.administracao.de.sistemas.Unix-scan.pdf | 2009-05-07 19:43 | 5.4M | |
![[ ]](/icons/layout.gif) | 20091221-MSc-Robson.Gomes.de.Melo-Proposta.de.um.modelo.de.ferramenta.para.auxilio.a.administracao.computacional.pdf | 2010-04-23 10:14 | 7.0M | |
![[ ]](/icons/layout.gif) | 19930519-MSc-Carlos.Antonio.Reinaldo.Costa-Tecnicas.de.compressao.de.sequencias.de.imagens.visando.transmissao.em.tempo.real-scan.pdf | 2009-10-15 13:47 | 7.8M | |
![[ ]](/icons/layout.gif) | 199005-PhD-Paulo.L.de.Geus-my.own-Live.Image.Transmission.pdf | 2019-12-25 12:47 | 75M | |
|