Observable Non-Sybil Quorums Construction in One-Hop Wireless Ad Hoc Networks
Leveraging Honest Users: Stealth Command-and-Control of Botnets
ESORICS 2014: Local Password validation using Self-Organizing Maps
MultiPath TCP - The path to multipath
Bletchley
WiFiHop - mitigating the Evil twin attack through multi-hop detection
On the use of radio resource tests in wireless ad hoc networks
From 0 to 0xdeadbeef - security mistakes that will haunt your startup
PhD Thesis Diogo Mónica
Web Summit 2015 - Enterprise stage - Cloud, Open-Source, Security
Secure Software Distribution in an Adversarial World
MTLS in a Microservices World
Cloud conf keynote - Orchestrating Least Privilege
An IDS for browser hijacking