Rodrigo Sanches Miani

Learn More
Finding relevant metrics in information security is an important but difficult problem. In this paper, we propose to empirically investigate the relevance of different security metrics that could be derived from intrusion prevention system (IPS) alert events and computer security incident data. Based on the data provided by the University of Maryland, we(More)
This work proposes the development and application of specific security metrics for metropolitan broadband access networks that aim to measure the efficiency of security programs and support action planning against detected problems. The approach presented in this work show metrics developed for these networks and parameters for metrics definition. This(More)
A key challenge for the use of unmanned aerial vehicles (UAVs) is the security of their information during navigation to accomplish its task. Information security is a known issue, but it seems to be overlooked from a research perspective, that tends to focus on more classical and well-formulated problems. This paper addresses an experimental evaluation of(More)
The information and communications technology (ICT) governance seeks a better investment in technology resources to improve the organization's performance and its productivity. Organizations usually employ tested process and documents also called best practices of ICT. Due to the nature and way of management in public institutions, these type of(More)
There are currently no generally accepted metrics for information security issues. One reason is the lack of validation using empirical data. In this practical experience report, we investigate whether metrics obtained from security devices used to monitor network traffic can be employed as indicators of security incidents. If so, security experts can use(More)
The purpose of this work is to evaluate the quality of encrypted VoIP calls with different encryption algorithms through OpenVPN software, in order to identify differences in results between encryption algorithms and also differences between non-encrypted and encrypted calls. This evaluation will take into account the MOS (Mean Opinion Score), a method to(More)
The purpose of this work is to evaluate the quality of encrypted VoIP calls with different encryption algorithms through OpenVPN software, in order to identify differences in results between encryption algorithms and also differences between non-encrypted and encrypted calls. This evaluation will take into account the MOS (Mean Opinion Score), a method to(More)
—The increasing demand for latency sensitive services through the Internet imposes the development of networks capable of delivering quality of service. These networks require the use of enhanced traffic management tools. This paper performs an analysis of IP telephony or VoIP traffic considering Internet Protocol Detail Record (IPDRs). When a VoIP call(More)