Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Bessani, Alysson
add a person with the name Bessani, Alysson
 

Other publications of authors with the same name

On the Challenges of Building a BFT SCADA., , , and . DSN, page 163-170. IEEE Computer Society, (2018)Efficient and Modular Consensus-Free Reconfiguration for Fault-Tolerant Storage., , , and . OPODIS, volume 95 of LIPIcs, page 26:1-26:17. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, (2017)How Can Photo Sharing Inspire Sharing Genomes?, , , , , and . PACBB, volume 616 of Advances in Intelligent Systems and Computing, page 74-82. Springer, (2017)An intrusion-tolerant firewall design for protecting SIEM systems., , and . DSN Workshops, page 1-7. IEEE Computer Society, (2013)Detecting Malicious Web Scraping Activity: A Study with Diverse Detectors., , , , , , and . PRDC, page 269-278. IEEE, (2018)A Resilient Stream Learning Intrusion Detection Mechanism for Real-Time Analysis of Network Traffic., , , , and . GLOBECOM, page 1-6. IEEE, (2017)A Byzantine Fault-Tolerant Ordering Service for the Hyperledger Fabric Blockchain Platform., , and . DSN, page 51-58. IEEE Computer Society, (2018)A High-Throughput Method to Detect Privacy-Sensitive Human Genomic Data., , , and . WPES@CCS, page 101-110. ACM, (2015)Using Blockchains to Implement Distributed Measuring Systems., , , , and . IEEE Trans. Instrumentation and Measurement, 68 (5): 1503-1514 (2019)JITeR: Just-in-time application-layer routing., , , , , , , and . Computer Networks, (2016)