default search action
Marcio Juliato
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [i3]Kaustubh Sridhar, Radoslav Ivanov, Vuk Lesi, Marcio Juliato, Manoj R. Sastry, Lily L. Yang, James Weimer, Oleg Sokolsky, Insup Lee:
A Framework for Checkpointing and Recovery of Hierarchical Cyber-Physical Systems. CoRR abs/2205.08650 (2022) - 2021
- [i2]Shabbir Ahmed, Marcio Juliato, Christopher Gutierrez, Manoj R. Sastry:
Two-Point Voltage Fingerprinting: Increasing Detectability of ECU Masquerading Attacks. CoRR abs/2102.10128 (2021) - [i1]Vuk Lesi, Marcio Juliato, Shabbir Ahmed, Christopher Gutierrez, Qian Wang, Manoj R. Sastry:
Intrusion Detection and Localization for Networked Embedded Control Systems. CoRR abs/2106.09826 (2021)
2010 – 2019
- 2019
- [c6]Christopher Gutierrez, Marcio Juliato, Shabbir Ahmed, Manoj R. Sastry:
Detecting Attacks Against Safety-Critical ADAS Based on In-Vehicle Network Message Patterns. DSN (Industry Track) 2019: 9-12 - 2017
- [c5]Huaxin Li, Li Zhao, Marcio Juliato, Shabbir Ahmed, Manoj R. Sastry, Lily L. Yang:
POSTER: Intrusion Detection System for In-vehicle Networks using Sensor Correlation and Integration. CCS 2017: 2531-2533 - 2013
- [j2]Marcio Juliato, Catherine H. Gebotys:
A Quantitative Analysis of a Novel SEU-Resistant SHA-2 and HMAC Architecture for Space Missions Security. IEEE Trans. Aerosp. Electron. Syst. 49(3): 1536-1554 (2013) - 2011
- [b1]Marcio Juliato:
Fault Tolerant Cryptographic Primitives for Space Applications. University of Waterloo, Ontario, Canada, 2011
2000 – 2009
- 2009
- [c4]Marcio Juliato, Catherine H. Gebotys:
Tailoring a Reconfigurable Platform to SHA-256 and HMAC through Custom Instructions and Peripherals. ReConFig 2009: 195-200 - 2008
- [c3]Marcio Juliato, Catherine H. Gebotys:
An Approach for Recovering Satellites and their Cryptographic Capabilities in the Presence of SEUs and Attacks. AHS 2008: 101-108 - 2007
- [j1]Marcio Juliato, Guido Araujo, Julio López, Ricardo Dahab:
A Custom Instruction Approach for Hardware and Software Implementations of Finite Field Arithmetic over F2163 using Gaussian Normal Bases. J. VLSI Signal Process. 47(1): 59-76 (2007) - 2005
- [c2]Marcio Juliato, Guido Araujo, Julio César López-Hernández, Ricardo Dahab:
A custom instruction approach for hardware and software implementations of finite field arithmetic over F263 using Gaussian normal bases. FPT 2005: 5-12 - 2004
- [c1]Sandro Rigo, Marcio Juliato, Rodolfo Azevedo, Guido Araujo, Paulo Centoducatte:
Teaching computer architecture using an architecture description language. WCAE 2004: 6
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-27 00:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint