Júlio Mendonça

Júlio Mendonça
University of Luxembourg · Interdisciplinary Centre for Security, Reliability and Trust

PhD in Computer Science
Research Associate @ Interdisciplinary Centre for Security, Reliability and Trust, University of Luxembourg

About

18
Publications
986
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
48
Citations
Additional affiliations
July 2019 - July 2021
Instituto Federal de Alagoas (IFAL)
Position
  • Lecturer
Description
  • Courses taught: Computer Network, Database administration, Introduction to Informatics, Computers Maintenance
September 2018 - March 2019
University of Canterbury
Position
  • Visiting Scholar
Description
  • I was a visiting scholar at the Cyber Security Laboratory at the University of Canterbury, where I developed stochastic models to evaluate Moving Target Defense systems regarding performance and availability aspects. In addition, I collaborated in a research project to analyze availability-related metrics on dynamic network environments.
Education
August 2015 - October 2020
Federal University of Pernambuco
Field of study
  • Computer Science
March 2013 - July 2015
Federal University of Pernambuco
Field of study
  • Computer Science

Publications

Publications (18)
Article
Context: Organizations are spending an unprecedented amount of money towards the cost of keeping Information Technology (IT) systems operational. Hence, these systems need to be designed using effective fault-tolerant techniques like Disaster Recovery (DR) solutions. Even though research has been done in the DR field, it is necessary to assess the...
Article
Full-text available
Moodle Virtual Learning Environments (VLEs) represent tools of a pedagogical dimension where the teacher uses various resources to stimulate student learning. Content presented in hypertext, audio or vídeo formats can be adopted as a means to facilitate the learning. These platforms tend to produce high processing rates on servers, large volumes of...
Article
Full-text available
The dynamicity of today’s networks has created uncertainties for security administrators about the defense options to deploy. In this paper, we consider the administrator’s challenge of selecting and deploying the best set of heterogeneous security hardening solutions for dynamic networks given multiple constraints (such as fixed budget, availabili...
Conference Paper
Full-text available
A computação distribuída permite a comunicação entre vários computadores, possibilitando, por exemplo, a distribuição de dados entre eles. No entanto, essa tecnologia traz alguns problemas, como, por exemplo, a consistência dos dados. A consistência dos dados replicados entre os diferentes computadores visa garantir que o mesmo dado seja acessado e...
Conference Paper
Full-text available
Modern networks are dynamic with configuration changes that introduces a set of challenge to the network administrator in terms of security and availability. Here, the major challenge faced by the administrator is the increasing number of vulnerabilities with the uncertainties related to defense deployment options and how these options affect the n...
Article
Moving target defense (MTD) is a promising proactive defense technique to enhance system or network security. One caveat in developing a time-based MTD-enabled system is the potential performance degradation due to MTD operations being triggered periodically. In this work, we present our developed stochastic models based on deterministic stochastic...
Conference Paper
Full-text available
Com o alto crescimento do número de dispositivos conectados à Internet das Coisas (IoT), a segurança digital tornou-se um dos principais pontos a serem tratados. Muitos desses dispositivos utilizam tecnologias defasadas, as quais criam vulnerabilidades que podem ser exploradas por criminosos. Novas técnicas de segurança surgem através da utilização...
Conference Paper
Distributed Denial-of-Service (DDoS) attacks can occur anytime, everywhere, and most normally occur with little or no warning. Most small and medium businesses (SMBs) usually are not prepared to deal with this type of attack. The companies must have at least a bandwidth higher than the attack, an infrastructure with redundant components, regular ba...
Conference Paper
Full-text available
IT systems are essential for the operations of any modern business. Such systems must support the operations of their corresponding company under any conditions. Disaster Recovery (DR) strategies have been implemented to help organizations mitigate unexpected failures and reduce unnecessary expenses. However, to the best of our knowledge, no other...
Article
Systems outages can have disastrous effects on businesses such as data loss, customer dissatisfaction, and subsequent revenue loss. Disaster recovery (DR) solutions have been adopted by companies to minimise the effects of these outages. However, the selection of an optimal DR solution is difficult since there does not exist a single solution that...
Conference Paper
Moving target defense (MTD) has been developed as an emerging technology to enhance system/network security by randomly and continuously changing attack surface. Despite the significant progress of recent efforts in analyzing the security effectiveness of MTD mechanisms, critical gaps still exist in terms of the impact of running MTD mechanisms on...
Conference Paper
The consequences for a company losing its data or having its IT system disrupted are severe and can impact negatively on business operations. It can also cause customer dissatisfaction and subsequent revenue loss. In a competitive global market, companies have been adopting disaster recovery (DR) strategies as an attempt to keep IT systems operatio...
Article
Full-text available
Energy consumption, execution time, and availability are common terms in discussions on application development for mobile devices. Mobile applications executing in a mobile cloud computing (MCC) environment must consider several issues, such as Internet connections problems and CPU performance. Misconceptions during the design phase can have a sig...
Conference Paper
Nos ambientes modernos, falhas dos sistemas de Tecnologia da informação e comunicação (TIC) podem ter consequências graves para os negócios, como perda de dados, insatisfação do cliente e perda de receita. Soluções de recuperação de desastres (DR) vêm sendo adotadas por empresas como forma de evitar a perda de dados e garantir a continuidade dos ne...
Conference Paper
Relational databases are the most popular database system worldwide. The occurrence of failures in these systems may produce severe consequences for the business, such as data loss, customer dissatisfaction, and subsequent revenue loss. Consequently, many organizations have adopted disaster recovery (DR) solutions as an attempt to prevent data loss...
Conference Paper
Systems unavailability may produce severe consequences for modern business such as data loss, customer dissatisfaction, and subsequent revenue loss. Disaster recovery (DR) solutions have been adopted by many organizations as an attempt to prevent data loss and ensure business continuity. With the cloud computing expansion, different cloud providers...
Conference Paper
The Information Technology (IT) systems of most organizations must support their operations 24 hours a day, 7 days a week. Systems unavailability may have serious consequences such as data loss, customer dissatisfaction, and subsequent revenue loss. With the popularity of cloud computing, the adoption of cloud-based disaster recovery (DR) solutions...
Conference Paper
The demand for mobile devices and applications through the marketplaces has increased dramatically in recent years. Mobile applications take on even greater prominence and importance in the IT industry. Along with the growth of mobile technology, battery lifetime has become one of the most relevant challenges for this kind of device in the last few...

Network

Cited By