2022 - Research.com Computer Science in Portugal Leader Award
His primary scientific interests are in Distributed computing, Computer security, Intrusion tolerance, Byzantine fault tolerance and Server. His biological study spans a wide range of topics, including Computer network, Protocol and Dependability. His research in Computer security intersects with topics in Web application and Cloud computing.
His study in Cloud computing is interdisciplinary in nature, drawing from both Confidentiality, Insider and Internet privacy. His Intrusion tolerance study combines topics from a wide range of disciplines, such as Firewall, System deployment, Asynchronous communication and Software development. His Byzantine fault tolerance research includes elements of Time complexity and Cryptography.
His primary areas of investigation include Distributed computing, Computer security, Computer network, Byzantine fault tolerance and Fault tolerance. The concepts of his Distributed computing study are interwoven with issues in Dependability, Server and Intrusion tolerance. His Computer security study incorporates themes from Web application, Cloud computing, The Internet and Resilience.
His Cloud computing research is multidisciplinary, incorporating perspectives in Confidentiality and Scalability, Database. His Computer network study frequently draws connections to adjacent fields such as Cryptography. His Byzantine fault tolerance research includes themes of Distributed algorithm and Asynchronous communication.
His main research concerns Computer security, Blockchain, Computer network, Cloud computing and Network intrusion detection. His Computer security research integrates issues from Service provider and Diversity. His studies in Computer network integrate themes in fields like Scheme, End user and Dissemination.
Miguel Correia interconnects File system and Latency in the investigation of issues within Cloud computing. His Implementation study combines topics in areas such as Fault tolerance, N-version programming and Dependability. His studies deal with areas such as Byzantine fault tolerance, Graph database, Distributed computing and Robustness as well as Software.
Blockchain, Computer security, Computer network, Audit and Data science are his primary areas of study. Miguel Correia has included themes like Block and Simulation in his Blockchain study. His work on Secret sharing as part of general Computer security study is frequently connected to Erasure code, therefore bridging the gap between diverse disciplines of science and establishing a new relationship between them.
The study incorporates disciplines such as Scheme, False accusation, Unsupervised learning and JavaScript in addition to Computer network. His study explores the link between Data science and topics such as Big data that cross with problems in Intrusion detection system. The Network intrusion detection research Miguel Correia does as part of his general Intrusion detection system study is frequently linked to other disciplines of science, such as Payload, therefore creating a link between diverse domains of science.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
DepSky: Dependable and Secure Storage in a Cloud-of-Clouds
Alysson Bessani;Miguel Correia;Bruno Quaresma;Fernando André.
ACM Transactions on Storage (2013)
DepSky: dependable and secure storage in a cloud-of-clouds
Alysson Bessani;Miguel Correia;Bruno Quaresma;Fernando André.
european conference on computer systems (2011)
Efficient Byzantine Fault-Tolerance
G. S. Veronese;M. Correia;A. N. Bessani;Lau Cheuk Lung.
IEEE Transactions on Computers (2013)
Black holes, gravitational waves and fundamental physics: a roadmap.
Leor Barack;Vitor Cardoso;Samaya Nissanke;Thomas P. Sotiriou.
arXiv: General Relativity and Quantum Cosmology (2018)
Black holes, gravitational waves and fundamental physics: a roadmap
Leor Barack;Vitor Cardoso;Vitor Cardoso;Samaya Nissanke;Samaya Nissanke;Samaya Nissanke;Thomas P. Sotiriou.
Classical and Quantum Gravity (2019)
Intrusion-tolerant architectures: concepts and design
Paulo Esteves Veríssimo;Nuno Ferreira Neves;Miguel Pupo Correia.
Lecture Notes in Computer Science (2003)
Lucy in the sky without diamonds: Stealing confidential data in the cloud
Francisco Rocha;Miguel Correia.
dependable systems and networks (2011)
How to tolerate half less one Byzantine nodes in practical distributed systems
M. Correia;N.F. Neves;P. Verissimo.
symposium on reliable distributed systems (2004)
Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery
P. Sousa;A.N. Bessani;M. Correia;N.F. Neves.
IEEE Transactions on Parallel and Distributed Systems (2010)
Spin One's Wheels? Byzantine Fault Tolerance with a Spinning Primary
Giuliana Santos Veronese;Miguel Correia;Alysson Neves Bessani;Lau Cheuk Lung.
symposium on reliable distributed systems (2009)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
University of Lisbon
King Abdullah University of Science and Technology
University of Lisbon
McGill University
KTH Royal Institute of Technology
Purdue University West Lafayette
University of Bern
KTH Royal Institute of Technology
Instituto Superior Técnico
Paul Sabatier University
California Institute of Technology
University of Nottingham
University of Turku
Texas A&M University
Sun Yat-sen University
KU Leuven
Tsinghua University
Paul Scherrer Institute
Stanford University
St. Jude Children's Research Hospital
University of Brescia
National University of Ireland, Galway
Concordia University
University of Erlangen-Nuremberg
University of Arkansas at Fayetteville
University of Connecticut