Minicursos do SBRC 2025

Autores

Alex Borges Vieira (ed)
UFJF
https://orcid.org/0000-0003-0821-126X
Jussara Almeida (ed)
UFMG
https://orcid.org/0000-0001-9142-2919
Everton Cavalcante (ed)
UFRN
https://orcid.org/0000-0002-2475-5075
Roger Kreutz Immich (ed)
UFRN
https://orcid.org/0000-0003-2483-6382

Palavras-chave:

Processamento de Pacotes, GPUs, Fine-tuning Federado, LLMs, Programação no Plano de Dados, Linguagem P4, P4Docker, Cross-Site Scripting, Governança em Cibersegurança, Privacidade dos Dados, Cidades Inteligentes, Sensoriamento Wireless, Monitoramento de Baixo Custo, IoT

Sinopse

Este livro apresenta a seleção de Minicursos da 43ª edição do Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos (SBRC), realizado em Natal, de 19 a 23 de maio de 2025. O Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos (SBRC) é o fórum mais importante da comunidade de pesquisa e desenvolvimento em redes de computadores e sistemas distribuídos no Brasil. Dentre as principais atividades do SBRC, encontram-se os minicursos. Eles permitem à comunidade a oportunidade de atualização em temas que, normalmente, não são cobertos por estruturas curriculares ou que despertam grande interesse entre acadêmicos e profissionais. Em 2025, 18 propostas de minicursos foram submetidas, um número expressivo que demonstra a importância deste evento no panorama nacional de pesquisa. Destas, 6 propostas foram selecionadas para publicação e apresentação, representando assim uma taxa de aceitação de aproximadamente 33%. O comitê de avaliação dos minicursos foi composto por 17 renomados pesquisadores para a elaboração dos pareceres. Cada proposta recebeu ao menos 3 pareceres. Além disto, inúmeras mensagens foram trocadas entre os membros do comitê durante a fase de discussão. Como Coordenadores dos Minicursos, gostaríamos de expressar os nossos agradecimentos aos membros do Comitê de Programa por terem aceitado participar voluntariamente dessa empreitada e pelo excelente trabalho que fizeram no processo de avaliação e seleção dos minicursos. Gostaríamos de também agradecer aos coordenadores gerais do SBRC 2025, Everton Cavalcante (UFRN) e Roger Kreutz Immich (UFRN), pela disponibilidade e suporte providos ao longo de todo o processo e pela confiança depositada em mim para coordenar estes minicursos. Finalmente, gostaria de agradecer as autores por terem prestigiado este evento ao submeterem suas propostas de minicursos.

Capítulos

  • 1. Processamento de Pacotes Baseado em GPU
    André G. Vieira, Gustavo Pantuza, João V. Soares, Filipe Pirola, Gustavo Viveiros, Marcos A. M. Vieira, Luiz F. M. Vieira
  • 2. Fine-tuning Federado de Modelos de Linguagem na Era da Comunicação
    Allan M. de Souza, Joahannes B. D. da Costa, Daniel Guidoni, Gabriel Talasso, Filipe Maciel, Luis F. G. Gonzalez, Eduardo Cerqueira, Luiz F. Bittencourt, Antonio A. F. Loureiro, Leandro A. Villas
  • 3. 10 Anos de P4: Explorando a Programação no Plano de Dados
    Dener Edson Ottolini Guedes da Silva, Lucas Trombeta, Bruna Cunha de Carvalho, Alexandre Heideker, Felipe Augusto Anon da Silva, Marcelo Antonio Marotta, João Henrique Kleinschmidt, Lisandro Zambenedetti Granville, Carlos Alberto Kamienski
  • 4. Cross-Site Scripting: Ataques, Detecção e Contramedidas
    Ian Vilar Bastos, Bianca Domingos Guarizi, Isabela Maira Mendite Alves, Júlia Abbud Fernandez e Souza, Guilherme Oliveira Pimentel, João André Campos Watanabe, Dalbert Matos Mascarenhas, Marcelo Gonçalves Rubinstein, Igor Monteiro Moraes
  • 5. Governança da Cibersegurança e Privacidade dos Dados sob a Perspectiva das Cidades Inteligentes
    Radames Giona, Fernando Nakayama, Edson T. de Camargo, Michele Nogueira
  • 6. Wireless sensing: Low-cost monitoring using Wi-Fi signals and IoT devices
    Samuel Vieira Ducca, Henrique Freire da Silva, Artur Jordao Lima Correia, Cintia Borges Margi

Downloads

Não há dados estatísticos.

Referências

(2022). Ieee standard for ethernet. IEEE Std 802.3-2022 (Revision of IEEE Std 802.3-2018), pages 1–7025.

A. Liu, Z. Huang, M. Li, Y.Wan,W. Li, T. X. Han, C. Liu, R. Du, D. K. P. Tan, J. Lu, Y. Shen, F. Colone, and K. Chetty, “A survey on fundamental limits of integrated sensing and communication,” IEEE Communications Surveys and Tutorials, vol. 24, 2022.

Abdi, H. eWilliams, L. J. (2010). Principal component analysis. Wiley Interdisciplinary Reviews: Computational Statistics, 2(4):433–459.

Abie, H. (2000). An overview of firewall technologies. Telektronikk, 96(3):47–52.

Aghajanyan, A., Zettlemoyer, L., and Gupta, S. (2020). Intrinsic dimensionality explains the effectiveness of language model fine-tuning.

Ahmadi-Assalemi, G., Al-Khateeb, H., Epiphaniou, G., and Maple, C. (2020). Cyber resilience and incident response in smart cities: A systematic literature review. Smart Cities, 3(3):894–927.

Ali, A. and Yousaf, M. M. (2020). Novel three-tier intrusion detection and prevention system in software defined network. IEEE Access, 8:109662– 109676.

Alkrush, A. A., Salem, M. S., Abdelrehim, O., and Hegazi, A. (2024). Data centers cooling: A critical review of techniques, challenges, and energy saving solutions. International Journal of Refrigeration, 160:246–262.

Allouah, Y., El Mrini, A., Guerraoui, R., Gupta, N., and Pinot, R. (2024). Fine-tuning personalization in federated learning to mitigate adversarial clients. In Globerson, A., Mackey, L., Belgrave, D., Fan, A., Paquet, U., Tomczak, J., and Zhang, C., editors, Advances in Neural Information Processing Systems, volume 37, pages 100816–100844. Curran Associates, Inc.

Alsaeedi, M., Mohamad, M. M., and Al-Roubaiey, A. A. (2019). Toward adaptive and scalable openflow-sdn flow control: A survey. IEEE Access, 7:107346–107379.

Ammendola, R., Biagioni, A., Deri, L., Fiorini, M., Frezza, O., Lamanna, G., Cicero, F. L., Lonardo, A., Messina, A., Sozzi, M., et al. (2014). Gpus for real-time processing in hep trigger systems. In Journal of Physics: Conference Series, volume 523, page 012007. IOP Publishing.

Association, I. S. et al. (1997). Ieee standard for wireless lan medium access control (mac) and physical layer (phy) specifications. IEEE Std 802.11- 1997, pages 1–445.

B. Cancela, V. Bolón-Canedo, and A. Alonso-Betanzos, “E2E-FS: an end-to-end feature selection method for neural networks,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 45, no. 7, pp. 8311–8323, 2023.

B. Tan, Q. Chen, K. Chetty, K. Woodbridge, W. Li, and R. Piechocki, “Exploiting wifi channel state information for residential healthcare informatics,” IEEE Communications Magazine, vol. 56, no. 5, pp. 130–137, 2018.

B. Yu, Y. Wang, K. Niu, Y. Zeng, T. Gu, L. Wang, C. Guan, and D. Zhang, “WiFi- Sleep: Sleep Stage Monitoring Using Commodity Wi-Fi Devices,” IEEE Internet of Things Journal, vol. 8, pp. 13900–13913, Sept. 2021.

Bai, J., Chen, D., Qian, B., Yao, L., and Li, Y. (2024). Federated finetuning of large language models under heterogeneous language tasks and client resources. arXiv e-prints, pages arXiv–2402.

Bal, S., Han, Z., Handagala, S., Cevik, M., Zink, M., and Leeser, M. (2024). P4-based in-network telemetry for fpgas in the open cloud testbed and fabric. In IEEE INFOCOM 2024 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pages 1–6.

Barney, B. et al. (2010). Introduction to parallel computing. Lawrence Livermore National Laboratory, 6(13):10.

BBC (2018). British Airways faces record £183m fine for data breach. Disponível em [link] (09/01/2025).

Belkhiri, A. and Dagenais, M. (2024). Analyzing gpu performance in virtualized environments: A case study. Future Internet, 16(3).

Berde, P. et al. (2014). Onos: towards an open, distributed sdn os. In Proceedings of the third workshop on Hot topics in software defined networking, pages 1–6.

Berners-Lee, T., Fielding, R. T. e Masinter, L. (2005). RFC 3986: Uniform Resource Identifier (URI): Generic Syntax. Disponível em [link] (23/04/2025).

Bernstein, A. J. (1966). Analysis of programs for parallel processing. IEEE Transactions on Electronic Computers, EC-15(5):757–763.

Beutel, D. J., Topal, T., Mathur, A., Qiu, X., Fernandez-Marques, J., Gao, Y., Sani, L., Kwing, H. L., Parcollet, T., Gusm˜ao, P. P. d., and Lane, N. D. (2020). Flower: A friendly federated learning research framework. arXiv preprint arXiv:2007.14390.

Bhushan, B., Khamparia, A., Sagayam, K. M., Sharma, S. K., Ahad, M. A., and Debnath, N. C. (2020). Blockchain for smart cities: A review of architectures, integration trends and future research directions. Sustainable Cities and Society, 61:102360.

Bingham, E. e Mannila, H. (2001). Random projection in dimensionality reduction: applications to image and text data. Em Proceedings of the Seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, p. 245–250.

Bird, S., Klein, E. e Loper, E. (2009). Natural Language Processing with Python: Analyzing Text with the Natural Language Toolkit. O’Reilly Media.

Blanco, B., Fajardo, J. O., Giannoulakis, I., Kafetzakis, E., Peng, S., Pérez-Romero, J., Trajkovska, I., Khodashenas, P. S., Goratti, L., Paolino, M., Sfakianakis, E., Liberal, F., and Xilouris, G. (2017). Technology pillars in the architecture of future 5g mobile networks: Nfv, mec and sdn. Computer Standards Interfaces, 54:216–228. SI: Standardization SDNNFV.

Bluetooth Special Interest Group, “Bluetooth Core Specification Version 5.1.” [link], 2019. Accessed: 2025-04-10.

Bohara, R., VV, A., Jaiswal, D. J., Nikhil, M., Pandey, B., Raghav, U. et al. (2022). A Survey Paper On Cross-Site Scripting (XSS). Em Proceedings of the International Conference on Innovative Computing & Communication (ICICC).

Bonola, M., Belocchi, G., Tulumello, A., Brunella, M. S., Siracusano, G., Bianchi, G., and Bifulco, R. (2022). Faster software packet processing on FPGA NICs with eBPF program warping. In 2022 USENIX Annual Technical Conference (USENIX ATC 22), pages 987–1004, Carlsbad, CA. USENIX Association.

Bosshart, P., Daly, D., Gibb, G., Izzard, M., McKeown, N., Rexford, J., Schlesinger, C., Talayco, D., Vahdat, A., Varghese, G., and Walker, D. (2014). P4: Programming protocol-independent packet processors. ACM SIGCOMM Computer Communication Review, 44(3):87–95.

Braun, W. and Menth, M. (2014). Software-defined networking using openflow: Protocols, applications and architectural design choices. Future Internet, 6(2):302–336.

Brave (2015). O navegador que coloca vocˆe em primeiro lugar — Brave — brave.com. [link]. [Accessed 07-04-2025].

Brezolin, U., Nakayama, F., and Nogueira, M. (2024). Detecçao de varreduras de portas pela análise inteligente de tráfego de rede IoT. In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg), pages 271–286. SBC.

Brito, D., de Neira, A. B., Borges, L. F., and Nogueira, M. (2023). An autonomous system for predicting DDoS attacks on local area networks and the Internet. In 2023 IEEE LATINCOM, pages 1–6, Panama. IEEE.

Brunella, M. S., Belocchi, G., Bonola, M., Pontarelli, S., Siracusano, G., Bianchi, G., Cammarano, A., Palumbo, A., Petrucci, L., and Bifulco, R. (2022). hxdp: Efficient software packet processing on fpga nics. Communications of the ACM, 65(8):92–100.

Buckwald, J. M. and Marchant, G. E. (2021). Improving soft law governance of the internet of things. IEEE Technology and Society Magazine, 40(4):101–114.

Burstein, I. (2021). Nvidia data center processing unit (dpu) architecture. In 2021 IEEE Hot Chips 33 Symposium (HCS). IEEE.

C. B. Barneto, M. Turunen, S. D. Liyanaarachchi, L. Anttila, A. Brihuega, T. Riihonen, and M. Valkama, “High-accuracy radio sensing in 5g new radio networks: Prospects and self-interference challenge,” in Conference Record - Asilomar Conference on Signals, Systems and Computers, vol. 2019-November, 2019.

C. Chen, H. Song, Q. Li, F. Meneghello, F. Restuccia, and C. Cordeiro, “Wi-fi sensing based on ieee 802.11bf,” IEEE Communications Magazine, vol. 61, p. 121–127, Jan. 2023.

C. Huang, S. Hu, G. C. Alexandropoulos, A. Zappone, C. Yuen, R. Zhang, M. D. Renzo, and M. Debbah, “Holographic mimo surfaces for 6g wireless networks: Opportunities, challenges, and trends,” IEEE Wireless Communications, vol. 27, no. 5, pp. 118–125, 2020.

C. Shi, T. Zhao, Y. Xie, T. Zhang, Y. Wang, X. Guo, and Y. Chen, “Environment independent in-baggage object identification using wifi signals,” in Proceedings - 2021 IEEE 18th International Conference on Mobile Ad Hoc and Smart Systems, MASS 2021, IEEE, 2021.

C. Zakaria, G. Yilmaz, P. M. Mammen, M. Chee, P. Shenoy, and R. Balan, “Sleepmore: Inferring sleep duration at scale via multi-device wifi sensing,” Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., vol. 6, Jan. 2023.

Camargo, E. T., Martins, L. D., and Fonseca, K. V. O. (2024). Smart sensors for smart environment, chapter Chapter 5, pages 67–89.

Camargo, E. T., Spanhol, F. A., and Castro e Souza, A. R. (2021). Deployment of a lorawan network and evaluation of tracking devices in the context of smart cities. Journal of Information Security and Applications, 12(8):1–24.

Capanema, C. G. S., de Souza, A. M., da Costa, J. B. D., Silva, F. A., Villas, L. A., and Loureiro, A. A. F. (2025). A novel prediction technique for federated learning. IEEE Transactions on Emerging Topics in Computing, 13(1):5–21.

Carvalho, B. (2024). Um gateway iot programável com p4 para interoperabilidade e processamento inteligente de tráfego. Dissertação de mestrado, Universidade Federal do ABC (UFABC), Santo André, SP. Disponível mediante solicitação ou repositório institucional da UFABC.

Cerović, D., Del Piccolo, V., Amamou, A., Haddadou, K., and Pujolle, G. (2018). Fast packet processing: A survey. IEEE Communications Surveys & Tutorials, 20(4):3645–3676.

Chandrashekar, G. e Sahin, F. (2014). A survey on feature selection methods. Computers & Electrical Engineering, 40(1):16–28.

Chansuwath, W. e Senivongse, T. (2016). A modeldriven development of web applications using AngularJS framework. Em 2016 IEEE/ ACIS 15th International Conference on Computer and Information Science (ICIS), p. 1–6. IEEE.

Chawla, N. V., Bowyer, K. W., Hall, L. O. e Kegelmeyer, W. P. (2002). SMOTE: Synthetic Minority Over-sampling TEchnique. Journal of Artificial Intelligence Research, 16:321–357.

Chen, G., Hu, Z., and Jin, D. (2023). Enhancing fidelity of p4-based network emulation with a lightweight virtual time system. In Proceedings of the 2023 ACM SIGSIM Conference on Principles of Advanced Discrete Simulation, SIGSIMPADS ’23, page 34–43, New York, NY, USA. Association for Computing Machinery.

Chen, X., Zhang, Q., Zhai, Z. J., and Ma, X. (2019). Potential of ventilation systems with thermal energy storage using pcms applied to air conditioned buildings. Renewable Energy, 138:39–53.

Consortium, P. L. (2023). P4runtime specification. [link].

Consortium, P. L. (2024). BMV2: Behavioral Model version 2 (P4 Runtime environment). Git repository.

CyCognito (2023). Web Apps are Leaving PII Exposed State of External Exposure Management Report. Relatório técnico, CyCognito.

D. Hendrycks and T. Dietterich, “Benchmarking neural network robustness to common corruptions and perturbations,” in 7th International Conference on Learning Representations, ICLR 2019, (New Orleans, United States), ICLR, 2019.

da República, P. (2018). Lei geral de proteção de dados. [link]. [Accessed 07-04-2025].

Dagum, L. and Menon, R. (1998). Openmp: an industry standard api for shared-memory programming. IEEE Computational Science and Engineering, 5(1):46–55.

Dai, W. and Wang, F. (2019). Study on processing performance of a dpdk and gpu combined pulsar data reduction system. International Journal of Mechatronics and Applied Mechanics, (6):213–224.

Damoun, F., Seba, H., and State, R. (2025). Federated learningbased tokenizer for domain-specific language models in finance. In Aiello, L. M., Chakraborty, T., and Gaito, S., editors, Social Networks Analysis and Mining, pages 3–20, Cham. Springer Nature Switzerland.

Day, J. D. and Zimmermann, H. (1983). The osi reference model. Proceedings of the IEEE, 71(12):1334–1340.

Dayarathna, M., Wen, Y., and Fan, R. (2016). Data center energy consumption modeling: A survey. IEEE Communications Surveys & Tutorials, 18(1):732–794.

de Neira, A. B., Araujo, A. M., and Nogueira, M. (2020). Early botnet detection for the Internet and the Internet of Things by autonomous machine learning. In Proceedings of the 16th International Conference on Mobile Ad Hoc and Sensor Networks (MSN), pages 516–523, Japan.

de Souza, A. M., Maciel, F., da Costa, J. B., Bittencourt, L. F., Cerqueira, E., Loureiro, A. A., and Villas, L. A. (2024). Adaptive client selection with personalization for communication efficient federated learning. Ad Hoc Networks, 157:103462.

Demidov, R., Zegzhda, P. D., and Kalinin, M. O. (2018). Threat analysis of cyber security in wireless adhoc networks using hybrid neural network model. Automatic Control and Computer Sciences, 52:971–976.

Deri, L. et al. (2004). Improving passive packet capture: Beyond device polling. In Proceedings of SANE, volume 2004, pages 85–93. Amsterdam, Netherlands.

Dettmers, T., Pagnoni, A., Holtzman, A., and Zettlemoyer, L. (2023). Qlora: Efficient finetuning of quantized llms.

Devlin, J., Chang, M.-W., Lee, K., and Toutanova, K. (2019). Bert: Pre-training of deep bidirectional transformers for language understanding.

Dijkstra, E. W. (1965). Cooperating sequential processes, technical report ewd-123. Technical report.

Ding, D., Savi, M., Pederzolli, F., and Siracusa, D. (2022). Design and development of network monitoring strategies in p4-enabled programmable switches. In NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium, pages 1–6.

DOMPurify (2025). DOMPurify. Disponível em [link] (07/03/2025).

dos Reis Fontes, R. and Rothenberg, C. E. (2015). Mininet-wifi: Emulating software-defined wireless networks. In 2015 11th International Conference on Network and Service Management (CNSM), pages 384–389.

DPDK Project (2024). About DPDK. Accessed: 2025-04-09.

Du, Y., Chang, K., Shi, J., Zhou, Y., and Liu, M. (2023a). A survey on mechanisms for fast network packet processing. In Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things, pages 57– 66.

Du, Y., Chang, K., Shi, J., Zhou, Y., and Liu, M. (2023b). A survey on mechanisms for fast network packet processing. In Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things, CNIOT ’23, page 57–66, New York, NY, USA. Association for Computing Machinery.

Elmaghraby, A. S. and Losavio, M. M. (2014). Cyber security challenges in smart cities: Safety, security and privacy. Journal of Advanced Research, 5(4):491–497.

F. D. Abra, M. P. Huijser, M. Magioli, A. A. A. Bovo, and K. M. P. M. de Barros Ferraz, “An estimate of wild mammal roadkill in são paulo state, brazil,” Heliyon, vol. 7, 2021.

F. H. A. (FHWA), Wildlife-Vehicle Collision Reduction Study: Report To Congress. U.S. Department of Transportation (FHWA-HRT-08-034). Federal Highway Administration (FHWA), 2008.

F. Österlind, A. Dunkels, J. Eriksson, N. Finne, and T. Voigt, “Cross-level sensor network simulation with cooja,” in Proceedings - Conference on Local Computer Networks, LCN, (Tampa, Florida), IEEE, 2006.

F. Viani, A. Polo, E. Giarola, F. Robol, G. Benedetti, and S. Zanetti, “Performance assessment of a smart road management system for the wireless detection of wildlife road-crossing,” in IEEE 2nd International Smart Cities Conference: Improving the Citizens Quality of Life, ISC2 2016 - Proceedings, (Trento, Italy), IEEE, 2016.

Faceli, K., Lorena, A. C., Gama, J., Almeida, T. A. d., and Carvalho, A. C. P. d. L. F. d. (2021). Inteligˆencia artificial: uma abordagem de aprendizado de máquina. LTC.

Fang, Y., Li, Y., Liu, L. e Huang, C. (2018). DeepXSS: Cross site scripting detection based on deep learning. Em Proceedings of the 2018 International Conference on Computing and Artificial Intelligence, p. 47–51.

Filho, R. R., Alberts, E., Gerostathopoulos, I., Porter, B., and Costa, F. M. (2022). Emergent web server: An exemplar to explore online learning in compositional self-adaptive systems. In 2022 International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS), pages 36–42.

Flynn, M. (1966). Very high-speed computing systems. Proceedings of the IEEE, 54(12):1901–1909.

Forouzan, B. A. and Fegan, S. C. (2006). TCP/IP Protocol Suite. McGraw-Hill Higher Education, 3nd edition.

Franco, D., Ollora Zaballa, E., Zang, M., Atutxa, A., Sasiain, J., Pruski, A., Rojas, E., Higuero, M., and Jacob, E. (2024). A comprehensive latency profiling study of the tofino p4 programmable asic-based hardware. Computer Communications, 218:14–30.

Frandell, A. and Feeney, M. (2022). Cybersecurity threats in local government: A sociotechnical perspective. The American Review of Public Administration, 52(8):558–572.

Friha, O., Amine Ferrag, M., Kantarci, B., Cakmak, B., Ozgun, A., and Ghoualmi-Zine, N. (2024). Llm-based edge intelligence: A comprehensive survey on architectures, applications, security and trustworthiness. IEEE Open Journal of the Communications Society, 5:5799–5856.

Fu, B., Saini, A., and Gelsinger, P. P. (1989). Performance and microarchitecture of the i486 processor. In Proceedings 1989 IEEE International Conference on Computer Design: VLSI in Computers and Processors, pages 182–183. IEEE Computer Society.

Fu, L., Zhang, H., Gao, G., Zhang, M., and Liu, X. (2023). Client selection in federated learning: Principles, challenges, and opportunities. IEEE Internet of Things Journal, 10(24):21811–21819.

G. Forbes, CSIKit: Python CSI processing and visualisation tools for commercial off-the-shelf hardware., 2021.

G. Iannizzotto, M. Milici, A. Nucita, and L. L. Bello, “A perspective on passive human sensing with bluetooth,” Sensors, vol. 22, 5 2022.

G. Maus and D. Brückmann, “A non-intrusive, single-sided car traffic monitoring system based on low-cost ble devices,” in 2020 IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1–5, 2020.

Gao, S., Handley, M., and Vissicchio, S. (2021). Stats 101 in p4: Towards in-switch anomaly detection. In Proceedings of the 20th ACM Workshop on Hot Topics in Networks, HotNets ’21, page 84–90, New York, NY, USA. Association for Computing Machinery.

Geer, D. (2005). Chip makers turn to multicore processors. Computer, 38(5):11–13.

Geetha, R. e Thilagam, T. (2021). A review on the effectiveness of machine learning and deep learning algorithms for cyber security. Archives of Computational Methods in Engineering, 28(4):2861–2879.

Go, Y., Jamshed, M. A., Moon, Y., Hwang, C., and Park, K. (2017). {APUNet}: Revitalizing {GPU} as packet processing accelerator. In 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17), pages 83– 96.

Google (2023). Organize your Google Photos library with these two updates — blog.google. [link]. [Accessed 07-04-2025].

Google Chrome Developers (2024). Trusted Types: Prevent DOM XSS by default. Disponível em [link] (23/04/2025).

Goswami, B., Kulkarni, M., and Paulose, J. (2023). A survey on p4 challenges in software defined networks: P4 programming. IEEE Access, 11:54373– 54387.

Gottlieb, Grishman, Kruskal, McAuliffe, Rudolph, and Snir (1983). The nyu ultracomputer—designing an mimd shared memory parallel computer. IEEE Transactions on computers, 100(2):175–189.

Gouda, M. and Liu, A. (2005). A model of stateful firewalls and its properties. In 2005 International Conference on Dependable Systems and Networks (DSN’05), pages 128–137.

Goumopoulos, C. (2024). Smart city middleware: A survey and a conceptual framework. IEEE Access, 12:4015–4047.

Gracias, J. S., Parnell, G. S., Specking, E., Pohl, E. A., and Buchanan, R. (2023). Smart cities—a structured literature review. Smart Cities, 6(4):1719– 1743.

Grossman, J., Hansen, R., Petkov, P., Rager, A. e Fogie, S. (2007). XSS attacks: Cross Site Scripting exploits and defense. Syngress.

Guarizi, B. D., Alves, I. M. M., Fernandez, J. A., Souza, G. O. P., Watanabe, J. A. C., Mascarenhas, D. M., Bastos, I. V., Rubinstein, M. G. e Moraes, I. M. (2024). EXSS: Um Emulador Educativo de Ataques Cross-Site Scripting. Em Anais do XXIV Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais.

Guo, L., Zhang, K., and Wang, X. S. (2022). Gaviss : Boosting the performance of gpu-accelerated nfv systems via data sharing. IEEE Transactions on Parallel and Distributed Systems, 33(12):4472–4483.

Guo, S., Wang, Y., Feng, B., and Feng, C. (2025). Large Language Modelx2010;Assisted Semantic Communication Systems, pages 163–182.

Guo, T., Guo, S., and Wang, J. (2023). pfedprompt: Learning personalized prompt for vision-language models in federated learning. In Proceedings of the ACM Web Conference 2023, WWW ’23, page 1364–1374, New York, NY, USA. Association for Computing Machinery.

Gupta, B. B. e Chaudhary, P. (2020). Cross-site scripting attacks: classification, attack, and countermeasures. CRC Press.

Gupta, S. e Gupta, B. B. (2017). Cross-Site Scripting (XSS) attacks and defense mechanisms: classification and state-of-the-art. International Journal of System Assurance Engineering and Management, 8:512–530.

H. Cheng, M. Zhang, and J. Q. Shi, “A survey on deep neural network pruning: Taxonomy, comparison, analysis, and recommendations,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 46, no. 12, pp. 10558–10578, 2024.

H. Leijnse, R. Uijlenhoet, and J. N. M. Stricker, “Rainfall measurement using radio links from cellular communication networks,” Water Resources Research, vol. 43, no. 3, 2007.

Halaas, A., Svingen, B., Nedland, M., Saetrom, P., Snove, O., and Birkeland, O. (2004). A recursive misd architecture for pattern matching. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 12(7):727–734.

Ham, J. V. D. (2021). Toward a better understanding of “cybersecurity”. Digital Threats: Research and Practice, 2(3):1–3.

Han, J., Kamber, M. e Pei, J. (2022). Data Mining: Concepts and Techniques. Morgan Kaufmann.

Han, S., Jang, K., Park, K., and Moon, S. (2010). Packetshader: a gpu-accelerated software router. ACM SIGCOMM Computer Communication Review, 40(4):195–206.

Han, Z., Gao, C., Liu, J., Zhang, J., and Zhang, S. Q. (2024). Parameterefficient fine-tuning for large models: A comprehensive survey.

Hannousse, A., Yahiouche, S. e Nait-Hamoud, M. C. (2024). Twenty-two years since revealing cross-site scripting attacks: A systematic mapping and a comprehensive survey. Computer Science Review, 52:100634.

Hatcher, W., Meares, W. L., and Heslen, J. (2020). The cybersecurity of municipalities in the united states: An exploratory survey of policies and practices. Journal of Cyber Policy, 5(2):302–325.

Hedrick, C. L. (1988). Rfc1058: Routing information protocol.

Heideker, A., Silva, D., Kamienski, C. A., and Trotta, A. (2025). Achieving seamless iot interoperability through data plane programmability. In 2025 IEEE 22st Consumer Communications Networking Conference (CCNC), pages 1–6.

Heideker, A., Silva, D., Kleinschmidt, J., and Kamienski, C. (2023). Otimização de tráfego iot-lorawan usando programação de plano de dados em p4. In Anais do XLI Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos, pages 239–252, Porto Alegre, RS, Brasil. SBC.

Heiderich, M., Schwenk, J., Frosch, T., Magazinius, J. e Yang, E. Z. (2013). MXSS attacks: Attacking well-secured web-applications by using innerhtml mutations. Em Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, p. 777–788.

Hidayat, A. (2025). Esprima. Disponível em [link] (21/04/2025).

Hillis, W. D. and Steele, G. L. (1986). Data parallel algorithms. Commun. ACM, 29(12):1170–1183.

Hofstede, R., Čeleda, P., Trammell, B., Drago, I., Sadre, R., Sperotto, A., and Pras, A. (2014). Flow monitoring explained: From packet capture to data analysis with netflow and ipfix. IEEE Communications Surveys & Tutorials, 16(4):2037–2064.

Hong, C.-H., Spence, I., and Nikolopoulos, D. S. (2017). Gpu virtualization and scheduling methods: A comprehensive survey. 50(3).

Hossain, S. T., Yigitcanlar, T., Nguyen, K., and Xu, Y. (2024). Understanding local government cybersecurity policy: A concept map and framework. Information, 15(6):342.

Hosseini Shirvani, M., Rahmani, A. M., and Sahafi, A. (2020). A survey study on virtual machine migration and server consolidation techniques in dvfs-enabled cloud datacenter: Taxonomy and challenges. Journal of King Saud University - Computer and Information Sciences, 32(3):267–286.

Hu, E. J., Shen, Y., Wallis, P., Allen-Zhu, Z., Li, Y., Wang, S., Wang, L., and Chen, W. (2021). Lora: Low-rank adaptation of large language models. arXiv preprint arXiv:2106.09685.

Hu, S., Bai, W., Chen, K., Tian, C., Zhang, Y., and Wu, H. (2021). Providing bandwidth guarantees, work conservation and low latency simultaneously in the cloud. IEEE Transactions on Cloud Computing, 9(2):763–776.

Huang, C.-C., Jin, G., and Li, J. (2020). Swapadvisor: Pushing deep learning beyond the gpu memory limit via smart swapping. In Proceedings of the Twenty-Fifth International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS ’20, page 1341–1355, New York, NY, USA. Association for Computing Machinery.

Huang, Y., Cheng, Y., Bapna, A., Firat, O., Chen, D., Chen, M., Lee, H., Ngiam, J., Le, Q. V., Wu, Y., et al. (2019). Gpipe: Efficient training of giant neural networks using pipeline parallelism. Advances in neural information processing systems, 32.

Hwang, K. and Briggs, F. A. (1990). Computer Architecture and Parallel Processing. McGraw-Hill, Inc., USA, 1st edition.

I. Ahmad, A. Ullah, and W. Choi, “Wifi-based human sensing with deep learning: Recent advances, challenges, and opportunities,” IEEE Open Journal of the Communications Society, vol. 5, pp. 3595–3623, 2024.

Ibanez, S., Brebner, G., McKeown, N., and Zilberman, N. (2019). The P4→NetFPGA workflow for line-rate packet processing. In Proceedings of the 2019 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays (FPGA), pages 1–9.

IEEE, “Ieee standard for information technology–telecommunications and information exchange between systems - local and metropolitan area networks–specific requirements - part 11: Wireless lan medium access control (mac) and physical layer (phy) specifications,” IEEE Std 802.11-2020 (Revision of IEEE Std 802.11-2016), pp. 1–4379, 2021.

Information Systems Audit and Control Association (2018). COBIT® 2019 Framework: Governance and Management Objectives. ISACA.

Intel (2022). Intel® tofino™ series. [link].

Ion, M., Scholz, S., and Dumitrescu, C. (2020). Programming the network data plane with p4runtime: Concepts and tools. In Proceedings of the 2020 International Conference on Embedded Wireless Systems and Networks, pages 155–160.

J. C. H. Soto, I. Galdino, E. Caballero, V. Ferreira, D. Muchaluat-Saade, and C. Albuquerque, Minicursos do XL Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos, ch. 5 - Monitoramento de Sinais Vitais Utilizando Redes Wi-Fi. Porto Alegre, RS, Brazil: Sociedade Brasileira de Computação, 2022.

J. Chen, H. Xu, J.Wu, R. Yue, C. Yuan, and L.Wang, “Deer crossing road detection with roadside lidar sensor,” IEEE Access, vol. 7, 2019.

J. Geng, D. Huang, and F. D. la Torre, “Densepose from wifi,” 2022.

J. P. Cunningham and Z. Ghahramani, “Linear dimensionality reduction: Survey, insights, and generalizations,” Journal of Machine Learning Research, vol. 16, no. 89, pp. 2859–2900, 2015.

J. Song, R. He, Z. Zhang, M. Yang, B. Ai, H. Zhang, and R. Chen, “3d environment reconstruction based on isac channels,” in 2024 International Conference on Ubiquitous Communication (Ucom), pp. 487–491, 2024.

J. Zhang, R. Xi, Y. He, Y. Sun, X. Guo,W.Wang, X. Na, Y. Liu, Z. Shi, and T. Gu, “A survey of mmwave-based human sensing: Technology, platforms and applications,” IEEE Communications Surveys and Tutorials, vol. 25, 2023.

Jacob, N. and Brodley, C. (2006). Offloading ids computation to the gpu. In 2006 22nd Annual Computer Security Applications Conference (ACSAC’ 06), pages 371–380.

Jarczewski, R. O., Cerqueira, E., Bittencourt, L. F., Loureiro, A. A. F., Villas, L. A., and de Souza, A. M. (2024). Let’s federate - effective communication strategy for dynamic client participation. In 2024 International Conference on Machine Learning and Applications (ICMLA), pages 361–368.

Jia, N., Qu, Z., Ye, B., Wang, Y., Hu, S., and Guo, S. (2025). A comprehensive survey on communication-efficient federated learning in mobile edge environments. IEEE Communications Surveys & Tutorials, pages 1–1.

Jin, C., Wang, H., and Shin, K. G. (2003). Hop-count filtering: an effective defense against spoofed ddos traffic. In Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS ’03, page 30–41, New York, NY, USA. Association for Computing Machinery.

K. P. Hunt, J. J. Niemeier, L. K. da Cunha, and A. Kruger, “Using cellular network signal strength to monitor vegetation characteristics,” IEEE Geoscience and Remote Sensing Letters, vol. 8, no. 2, pp. 346–349, 2011.

Kalita, A. (2024). Large language models (llms) for semantic communication in edge-based iot networks. arXiv preprint arXiv:2407.20970.

Kallin, J. e Valbuena, I. L. (2013). Excess XSS - a comprehensive tutorial on cross-site scripting. Disponível em [link] (07/03/2025).

Kanbur, B. B., Wu, C., Fan, S., Tong, W., and Duan, F. (2020). Two-phase liquid-immersion data center cooling system: Experimental performance and thermoeconomic analysis. International Journal of Refrigeration, 118:290–301.

Kassab,W. and Darabkh, K. A. (2020). A–z survey of internet of things: Architectures, protocols, applications, recent advances, future directions and recommendations. Journal of Network and Computer Applications, 163:102663.

Kassakian, J., Schmalensee, R., Desgroseilliers, G., Heidel, T., Afridi, K., Farid, A., Grochow, J., Hogan, W., Jacoby, H., Kirtley, J., Michaels, H., Perez-Arriaga, I., Perreault, D., Rose, N., and Wilson, G. (2011). The future of the electric grid: An interdisciplinary mit study.

Kaur, A., Rama Krishna, C., and Patil, N. V. (2025). A comprehensive review on software-defined networking (sdn) and ddos attacks: Ecosystem, taxonomy, traffic engineering, challenges and research directions. Computer Science Review, 55:100692.

Kaur, J., Garg, U. e Bathla, G. (2023). Detection of Cross-Site Scripting (XSS) attacks using machine learning techniques: a review. Artificial Intelligence Review, 56(11):12725–12769.

Kaur, R., Gabrijelčič, D., and Klobučar, T. (2023). Artificial intelligence for cybersecurity: Literature review and future research directions. Information Fusion, 97:101804.

Ke, C.-H. and Hsu, S.-J. (2020). Load balancing using p4 in softwaredefined networks. Journal of Internet Technology, 21(6):1671–1679.

Keras (2025). Keras: Deep learning for humans. Disponível em [link] (07/04/2025).

Keskin, S., Erdogan, H. T., and Kocak, T. (2016). Graphics processing unit based next generation ddos prevention system. In 2016 4th International Symposium on Digital Forensic and Security (ISDFS), pages 59–62.

Kfoury, E. F., Choueiri, S., Mazloum, A., AlSabeh, A., Gomez, J., and Crichigno, J. (2024). A comprehensive survey on smartnics: Architectures, development models, applications, and research directions. IEEE Access, 12:107297–107336.

Kfoury, E. F., Crichigno, J., and Bou-Harb, E. (2021b). An exhaustive survey on p4 programmable data plane switches: Taxonomy, applications, challenges, and future trends. IEEE Access, 9:87094–87155.

Kfoury, E., Elgendy, I., and Jararweh, Y. (2021a). P4 in iot: A survey on data plane programmability and applications. Computer Networks, 190:107930.

Kim, H. et al. (2021). Experience-driven research on programmable networks. ACM SIGCOMM Computer Communication Review, 51(1):10–17.

Kim, K. and Park, M.-j. (2024). Present and future, challenges of high bandwith memory (hbm). In 2024 IEEE International Memory Workshop (IMW), pages 1–4.

Kourtis, M.-A., Xilouris, G., Riccobene, V., McGrath, M. J., Petralia, G., Koumaras, H., Gardikis, G., and Liberal, F. (2015). Enhancing vnf performance by exploiting sr-iov and dpdk packet processing acceleration. In 2015 IEEE Conference on Network Function Virtualization and Software Defined Network (NFV-SDN), pages 74–78.

Kuang, W., Qian, B., Li, Z., Chen, D., Gao, D., Pan, X., Xie, Y., Li, Y., Ding, B., and Zhou, J. (2024). Federatedscope-llm: A comprehensive package for fine-tuning large language models in federated learning. In Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, pages 5260– 5271.

Kulkarni, M., Goswami, B., and Paulose, J. (2022). P4 based load balancing strategies for large scale software-defined networks. In 2022 Second International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT), pages 1–7.

Kumar, J. H. e Ponsam, J. G. (2023). Cross Site Scripting (XSS) vulnerability detection using machine learning and statistical analysis. Em 2023 International Conference on Computer Communication and Informatics (ICCCI), p. 1–9. IEEE.

Kumar, V., Rao, R., and Kim, Y. (2023). Optimizing inline packet processing using dpdk and gpudev with gpus. Accessed: 2025-04-09.

Laki, S., Kis, Z., Keresztesi, R., Horpácsi, D., and Szabó, R. (2021). P4pi: P4 on raspberry pi for flexible home and iot networking. In IEEE/IFIP Network Operations and Management Symposium (NOMS).

Lala, S. K., Kumar, A. et al. (2021). Secure Web development using OWASP guidelines. Em 2021 5th International Conference on Intelligent Computing and Control Systems (ICICCS), p. 323–332. IEEE.

Lamport, L. (2019). Time, clocks, and the ordering of events in a distributed system, page 179–196. Association for Computing Machinery, New York, NY, USA.

Lan, G., Liu, X.-Y., Zhang, Y., and Wang, X. (2023). Communicationefficient federated learning for resource-constrained edge devices. IEEE Transactions on Machine Learning in Communications and Networking, 1:210–224.

Langa, L., Ramine, A., Sneddon, S., Nikulin, I. e Sivonen, H. (2025). html5lib . github. Disponível em [link] (21/04/2025).

Lantz, B., Heller, B., and McKeown, N. (2010). A network in a laptop: Rapid prototyping for software-defined networks. In Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks, pages 1–6.

Laprie, J.-C., Randell, B., and Landwehr, C. (2004). Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing, 1(1):11–33.

Latest Cyber Security News (2019). Fortnite hack could have compromised many gamers accounts. Disponível em [link] (08/01/2025).

Latest Cyber Security News (2020). Vulnerabilities in event service meetup.com could allow group takeovers. Disponível em [link] (08/01/2025).

Lazuardy, M. F. S. e Anggraini, D. (2022). Modern frontend web architectures with react.js and next.js. Research Journal of Advanced Engineering and Science, 7(1):132–141.

Le, Q. e Mikolov, T. (2014). Distributed representations of sentences and documents. Em Proceedings of the 31st International Conference on Machine Learning, Proceedings of Machine Learning Research, p. 1188–1196, Bejing, China. PMLR.

Lee, C.-L., Lin, Y.-S., and Chen, Y.-C. (2015). A hybrid cpu/gpu pattern-matching algorithm for deep packet inspection. PloS one, 10(10):e0139301.

Lee, E., Seo, Y.-D., Oh, S.-R., and Kim, Y.-G. (2021). A survey on standards for interoperability and security in the internet of things. IEEE Communications Surveys & Tutorials, 23(2):1020–1047.

Li, A., Song, S. L., Chen, J., Li, J., Liu, X., Tallent, N. R., and Barker, K. J. (2020). Evaluating modern gpu interconnect: Pcie, nvlink, nv-sli, nvswitch and gpudirect. IEEE Transactions on Parallel and Distributed Systems, 31(1):94–110.

Li, J., Sangalay, A., Cheng, C., Tian, Y., and Yang, J. (2024). Fine tuning large language model for secure code generation. In Proceedings of the 2024 IEEE/ACM First International Conference on AI Foundation Models and Software Engineering, FORGE ’24, page 86–90, New York, NY, USA. Association for Computing Machinery.

Li, Q., Lyu, S., and Wen, J. (2025). Optimal client selection of federated learning based on compressed sensing. IEEE Transactions on Information Forensics and Security.

Li, Y., Zhang, D., Liu, A. X., and Zheng, J. (2013). Gamt: A fast and scalable ip lookup engine for gpu-based software routers. In Architectures for Networking and Communications Systems, pages 1–12.

Lin, Y.-S., Lee, C.-L., and Chen, Y.-C. (2016). Length-bounded hybrid cpu/gpu pattern matching algorithm for deep packet inspection. In Proceedings of the Fifth International Conference on Network, Communication and Computing, pages 63–67.

Lin, Z., Liang, H., Fanti, G. e Sekar, V. (2022). Raregan: Generating samples for rare classes. Em Proceedings of the AAAI Conference on Artificial Intelligence, p. 7506–7515.

Lipner, S. and Anderson, R. (2018). CIA history. Personal commun.

Lira, O. G., Caicedo, O. M., and Fonseca, N. L. S. d. (2024). Large language models for zero touch network configuration management. IEEE Communications Magazine, pages 1–8.

Liu, M., Zhang, B., Chen, W. e Zhang, X. (2019). A survey of exploitation and detection methods of XSS vulnerabilities. IEEE Access, 7:182004–182016.

Liu, Y., Schmidt, B., and Maskell, D. L. (2010). Cudasw++ 2.0: enhanced smith-waterman protein database search on cuda-enabled gpus based on simt and virtualized simd abstractions. BMC research notes, 3:1–12.

Liu, Z., Fang, Y., Huang, C. e Han, J. (2021). GraphXSS: an efficient XSS payload detection approach based on graph convolutional network. Computers & Security, 114:102597.

Liu, Z., Fang, Y., Huang, C. e Xu, Y. (2022). GAXSS: effective payload generation method to detect XSS vulnerabilities based on genetic algorithm. Security and Communication Networks, 2022:1–15.

Llama-Team (2024). The llama 3 herd of models.

Lo, S. K., Lu, Q., Paik, H.-Y., and Zhu, L. (2021). Flra: A reference architecture for federated learning systems. In Biffl, S., Navarro, E., Löwe,W., Sirjani, M., Mirandola, R., andWeyns, D., editors, Software Architecture, pages 83–98, Cham. Springer International Publishing.

Lo, S. K., Lu, Q., Zhu, L., Paik, H.-Y., Xu, X., and Wang, C. (2022). Architectural patterns for the design of federated learning systems. J. Syst. Softw., 191(C).

LoRa Alliance, “LoRaWAN® specification v1.1.” [link], October 2017. Available online: [link] (accessed April 10, 2025).

Lu, J., Wei, Z., Qin, Z., Chang, Y. e Zhang, S. (2022). Resolving Cross- Site Scripting attacks through fusion verification and machine learning. Mathematics, 10(20):3787.

Lu, Z., Pan, H., Dai, Y., Si, X., and Zhang, Y. (2024). Federated learning with non-iid data: A survey. IEEE Internet of Things Journal, 11(11):19188–19209.

Luizelli, M. C., Vogt, F., de Matos, G. M. V., Cordeiro, W., Schaeffer Filho, A. E., RNP, M. S., Verdi, F. L., and Rothenberg, C. E. (2024)). Smartnics: The next leap in networking. In Minicursos do 42. Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos (SBRC 2024).

Luo,W., Keung, J.W., Yang, B., Ye, H., Goues, C. L., Bissyandé, T. F., Tian, H., and Le, B. (2024). When fine-tuning llms meets data privacy: An empirical study of federated learning in llm-based program repair.

M. Danneberg, R. Bomfin, A. Nimr, Z. Li, and G. Fettweis, “Usrp-based platform for 26/28 ghz mmwave experimentation,” in 2020 IEEE Wireless Communications and Networking Conference Workshops, WCNCW 2020 - Proceedings, 2020.

M. Duff, “Como o wi-fi sensing se tornou uma tecnologia funcional,” MIT Technology Review Brasil, May 2024. Accessed: 2025-04-13.

M. I. Skolnik, Introduction to Radar Systems. McGraw-Hill, 3rd ed., 2001.

M. Kotaru, K. Joshi, D. Bharadia, and S. Katti, “SpotFi: Decimeter Level Localization Using WiFi,” in Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, (London United Kingdom), pp. 269–282, ACM, Aug. 2015.

M. Münch and F.-M. Schleif, “Device-free passive human counting with bluetooth low energy beacons,” in Advances in Computational Intelligence (I. Rojas, G. Joya, and A. Catala, eds.), (Cham), pp. 799–810, Springer International Publishing, 2019.

M. Škiljo, T. Perković, Z. Blažević, and P. Šolić, “Performance analysis of antennabased soil sensing,” IEEE Journal of Radio Frequency Identification, vol. 8, pp. 68– 75, 2024.

M. Tan and Q. V. Le, “Efficientnet: Rethinking model scaling for convolutional neural networks,” in International Conference on Machine Learning (ICML), vol. 97, pp. 6105–6114, 2019.

M. Won, S. Sahu, and K. J. Park, “Deepwitraffic: Low cost wifi-based traffic monitoring system using deep learning,” in Proceedings - 2019 IEEE 16th International Conference on Mobile Ad Hoc and Smart Systems, MASS 2019, (Monterey, USA), IEEE, 2019.

Maciel, F., de Souza, A. M., Bittencourt, L. F., Villas, L. A., and Braun, T. (2024). Federated learning energy saving through client selection. Pervasive and Mobile Computing, 103:101948.

Makde, R. R. and Laxkar, P. R. (2024). A comprehensive introduction to sdn architectural foundations. International Journal of Science and Research (IJSR), 13(2).

Mani, S. K., Zhou, Y., Hsieh, K., Segarra, S., Eberl, T., Azulai, E., Frizler, I., Chandra, R., and Kandula, S. (2023). Enhancing network management using code generated by large language models. HotNets ’23, page 196–204, New York, NY, USA. Association for Computing Machinery.

Martins, B. S., Souza, A. M., Rosário, D., Astudillo, C. A., Cerqueira, E., and Villas, L. (2024). Partial training mechanism to handle the impact of stragglers in federated learning with heterogeneous clients. In 2024 IEEE Symposium on Computers and Communications (ISCC), pages 1–6.

Maziero, C. A. (2014). Sistemas operacionais: conceitos e mecanismos. Livro aberto.

McKeown, N., Anderson, T., Balakrishnan, H., Parulkar, G., Peterson, L., Rexford, J., Shenker, S., and Turner, J. (2008). Openflow: enabling innovation in campus networks. ACM SIGCOMM computer communication review, 38(2):69–74.

McMahan, B., Moore, E., Ramage, D., Hampson, S., and Arcas, B. A. y. (2017). Communication-Efficient Learning of Deep Networks from Decentralized Data. In Singh, A. and Zhu, J., editors, Proceedings of the 20th International Conference on Artificial Intelligence and Statistics, volume 54 of Proceedings of Machine Learning Research, pages 1273–1282. PMLR.

Melaku, H. M. (2023). A dynamic and adaptive cybersecurity governance framework. Journal of Cybersecurity and Privacy, 3(3):327–350.

Meneghello, F., Calore, M., Zucchetto, D., Polese, M., and Zanella, A. (2019). Iot: Internet of threats? a survey of practical security vulnerabilities in real iot devices. IEEE Internet of Things Journal, 6(5):8182–8201.

Merlano, C. (2024). Enhancing cyber security through artificial intelligence and machine learning: A literature review. Journal of Cyber Security, 6.

Microsoft (2023). Sonic: Software for open networking in the cloud.

Mikolov, T., Chen, K., Corrado, G., and Dean, J. (2013). Efficient estimation of word representations in vector space.

Mikolov, T., Corrado, G., Chen, K. e Dean, J. (2013). Efficient estimation of word representations in vector space. Em Proceedings of the International Conference on Learning Representations (ICLR 2013).

Mininet (2023). Mininet: An instant virtual network on your laptop (or other pc). [Online; accessed 14-January-2024].

Mokbal, F. M. M. (2022). Cross-Site Scripting attacks: A comprehensive dataset for AI techniques usage. Disponível em [link] (01/04/2025).

Mokbal, F. M. M., Dan, W., Imran, A., Jiuchuan, L., Akhtar, F. e Xiaoxi,W. (2019). MLPXSS: an integrated XSS-based attack detection scheme in web applications using multilayer perceptron technique. IEEE Access, 7:100567–100580.

Mokbal, F. M. M., Dan, W., Xiaoxi, W., Wenbin, Z. e Lihua, F. (2021). XGBXSS: an extreme gradient boosting detection framework for cross-site scripting attacks based on hybrid feature selection approach and parameters optimization. Journal of Information Security and Applications, 58:102813.

Mokbal, F. M. M., Wang, D., Wang, X. e Fu, L. (2020). Data augmentation-based conditional Wasserstein generative adversarial network-gradient penalty for XSS attack detection system. PeerJ Computer Science, 6:e328.

Moore, G. (1965). Moore’s law. Electronics Magazine, 38(8):114.

Moskowitz, I. S., Baldine, I., Nikolich, A., Ruth, P., Liu, J., and Chase, J. (2023). Fabric: A national-scale programmable research infrastructure. In Proceedings of the 2023 ACM SIGCOMM Conference, pages 37–44.

Mozilla (2017). The directory of the web. Disponível em [link] (07/04/2025).

N. Agafonovs, A. Skageris, G. Strazdins, and A. Mednis, “Imilepost: Embedded solution for dangerous road situation warnings,” in Proceedings - 1st International Conference on Artificial Intelligence, Modelling and Simulation, AIMS 2013, (Kota Kinabalu, Malaysia), IEEE, 2014.

N. David, P. Alpert, and H. Messer, “Novel method for water vapour monitoring using wireless communication networks measurements,” Atmospheric chemistry and physics, vol. 9, no. 7, pp. 2413–2418, 2009.

N. González-Prelcic, M. Furkan Keskin, O. Kaltiokallio, M. Valkama, D. Dardari, X. Shen, Y. Shen, M. Bayraktar, and H. Wymeersch, “The integrated sensing and communication revolution for 6g: Vision, techniques, and applications,” Proceedings of the IEEE, vol. 112, no. 7, pp. 676–723, 2024.

N. Maslej, L. Fattorini, R. Perrault, V. Parli, A. Reuel, E. Brynjolfsson, J. Etchemendy, K. Ligett, T. Lyons, J. Manyika, J. C. Niebles, Y. Shoham, R. Wald, and J. Clark, “Artificial intelligence index report 2024,” 2024.

N. Sharma and R. D. Garg, “Real-time computer vision for transportation safety using deep learning and iot,” in 8th International Conference on Engineering and Emerging Technologies, ICEET 2022, (Kuala Lumpur, Malasya), IEEE, 2022.

Nanayakkara, S. I., Pokhrel, S. R., and Li, G. (2024). Understanding global aggregation and optimization of federated learning. Future Generation Computer Systems, 159:114–133.

Nguyen, L. X., Le, H. Q., Tun, Y. L., Aung, P. S., Tun, Y. K., Han, Z., and Hong, C. S. (2024). An efficient federated learning framework for training semantic communication systems. IEEE Transactions on Vehicular Technology, 73(10):15872–15877.

Nogueira, M. (2022). Governança e regulamentações do mercado de sistemas em nuvem. Technical Report RT.DCC.003/2022, Universidade Federal de Minas Gerais e Huawei Brasil.

Nogueira, M., Borges, L. F., and Nakayama, F. (2021). Das redes vestíveis aos sistemas ciber-humanos: Uma perspectiva na comunicação e privacidade dos dados. SBRC, Sociedade Brasileira de Computação.

Nogueira, M., Borges, L. F., de Neira, A. B., Albano, L., and Coelho, K. K. (2024). Ciência de dados aplicada à cibersegurança: Teoria e prática. Minicursos do Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos, pages 1–50.

NTOP (2018). PF_RING. [link]. Acesso em: 11 abr. 2025.

ntop (2025). PF_RING - GitHub Repository. [link] ntop/PF_RING. Acesso em: 11 abr. 2025.

NVIDIA Corporation (2022). NVIDIA DOCA Core Programming Guide v1.5.2. NVIDIA. [link].

NVIDIA Corporation (2023). NVIDIA Aerial SDK - Product Brief. [link]. Acesso em: abr. 2025.

NVIDIA Corporation (2024a). Cuda c++ programming guide. Accessed on 2024.

NVIDIA Corporation (2024b). Cuda zone. Accessed on 2024.

NVIDIA Corporation (2024c). DOCA GPUNetIO SDK Guide. [link]. Acesso em: abr. 2025.

Ometov, A., Bezzateev, S., Voloshina, N., Masek, P., and Komarov, M. (2019). Environmental monitoring with distributed mesh networks: An overview and practical implementation perspective for urban scenario. Sensors, 19(24):5548.

Omnet++ discrete event simulator. [link], 2024.

OpenAI (2024). Gpt-4 technical report.

OpenBugBounty (2024). Free bug bounty program and coordinated vulnerability disclosure | open bug bounty. Disponível em [link] (01/04/2025).

Openthread border router example. [link], 2024.

Osama, M. (2022). GPU load balancing. University of California, Davis.

Osama, M., Porumbescu, S. D., and Owens, J. D. (2023). A programming model for gpu load balancing. In Proceedings of the 28th ACM SIGPLAN Annual Symposium on Principles and Practice of Parallel Programming, pages 79–91.

OWASP (2019). XSS Filter Evasion Cheat Sheet. Disponível em [link] (05/04/2025).

OWASP (2021). OWASP Top 10. Disponível em [link] (09/01/2025).

OWASP (2022). OWASP AntiSamy | OWASP Foundation. Disponível em [link] (22/04/2025).

OWASP (2024). Cross Site Scripting (XSS) | OWASP foundation. Disponível em [link] (09/01/2025).

OWASP (2025). Zed Attack Proxy (ZAP) – alert 40012: Cross-site scripting. [link] (20/04/2025).

OWASP Foundation (2025). OWASP Enterprise Security API (ESAPI). Disponível em [link] (23/04/2025).

P. K. Singh, K. N. Singh, M. K. Choudhury, J. Bharadwaj, R. J. Das, and D. Gogoi, “Advanced warning mechanism to reduce man animal conflict on roads using renewable energy,” in 2022 IEEE International Power and Renewable Energy Conference (IPRECON), (Kerala , India), pp. 1–4, IEEE, 2022.

P. Tosi, M. Henninger, L. G. De Oliveira, and S. Mandelli, “Feasibility of non-lineof- sight integrated sensing and communication at mmwave,” in IEEE Workshop on Signal Processing Advances in Wireless Communications, SPAWC, p. 331 – 335, 2024.

P4 Language Consortium (2022). The p4 language specification. [link]. Version 1.2.3.

P4 Language Consortium (2024). P4 language specifications. [link]. Accessed: 2024-07-11.

Pambudi, N. A., Sarifudin, A., Firdaus, R. A., Ulfa, D. K., Gandidi, I. M., and Romadhon, R. (2022). The immersion cooling technology: Current and future development in energy saving. Alexandria Engineering Journal, 61(12):9509– 9527.

Pantuza, G., Bleme, L. A. C., Vieira, M. A. M., and Vieira, L. F. M. (2021a). Danian: tail latency reduction of networking application through an o(1) scheduler. In 2021 IEEE Symposium on Computers and Communications (ISCC), pages 1–6.

Pantuza, G., Sampaio, F., Vieira, L. F. M., Guedes, D., and Vieira, M. A. M. (2014). Network management through graphs in software defined networks. In 10th International Conference on Network and Service Management (CNSM) and Workshop, pages 400–405.

Pantuza, G., Vieira, M. A. M., and Vieira, L. F. M. (2021b). equic gateway: Maximizing quic throughput using a gateway service based on ebpf + xdp. In 2021 IEEE Symposium on Computers and Communications (ISCC), pages 1–6.

Pardini, D. J., Heinisch, A. M. C., and Parreiras, F. S. (2017). Cyber security governance and management for smart grids in brazilian energy utilities. JISTEM-Journal of Information Systems and Technology Management, 14:385–400.

Pascoe, C. E. (2023). Public draft: The nist cybersecurity framework 2.0. National Institute of Standards and Technology.

Pastório, A., Rodrigues, L., and de Camargo, E. (2020). Uma revisão sistemática da literatura sobre tolerância a falhas em internet das coisas. In Anais Estendidos do X Simpósio Brasileiro de Engenharia de Sistemas Computacionais, pages 57–64, Porto Alegre, RS, Brasil. SBC.

Pastório, J. a., Castro e Souza, A. R., Spanhol, F., Huff, A., and De Camargo, E. T. (2023). Alr-lorawan: An application-level retransmission management algorithm for lorawan networks. Latin-American Symposium on Dependable and Secure Computing (LADC) ’23, page 11–20, New York, NY, USA. ACM.

Pavlenko, E. and Zegzhda, D. (2018). Sustainability of cyber-physical systems in the context of targeted destructive influences. In 2018 IEEE Industrial Cyber-Physical Systems (ICPS), pages 830–834. IEEE.

Penedo, G., Kydlíček, H., allal, L. B., Lozhkov, A., Mitchell, M., Raffel, C.,Werra, L. V., and Wolf, T. (2024). The fineweb datasets: Decanting the web for the finest text data at scale.

Peng, L., Luo, G., Zhou, S., Chen, J., Xu, Z., Sun, J., and Zhang, R. (2024). An in-depth evaluation of federated learning on biomedical natural language processing for information extraction. npj Digital Medicine, 7(1):127.

Perez, A. (1983). Byte-wise crc calculations. IEEE Micro, 3(3):40–50.

Piccialli, F., Chiaro, D., Qi, P., Bellandi, V., and Damiani, E. (2025). Federated and edge learning for large language models. Information Fusion, 117:102840.

Plante, J., Gratadour, D., Matias, L., Viou, C., and Agostini, E. (2022). A high-performance data acquisition on cots hardware for astronomical instrumentation. In Software and Cyberinfrastructure for Astronomy VII, volume 12189, pages 328–337. SPIE.

PortSwigger (2024). Cross-Site Scripting (XSS) cheat sheet. Disponível em [link] (05/04/2025).

PortSwigger (2025). Using Burp to find Cross-Site Scripting issues. Disponível em [link] (20/04/2025).

Puppala, S., Hossain, I., Alam, M. J., and Talukder, S. (2024). Scan: A healthcare personalized chatbot with federated learning based gpt. In 2024 IEEE 48th Annual Computers, Software, and Applications Conference (COMPSAC), pages 1945–1951.

Q. Bu, X. Ming, J. Hu, T. Zhang, J. Feng, and J. Zhang, “Transfersense: towards environment independent and one-shot wifi sensing,” Personal and Ubiquitous Computing, vol. 26, 2022.

Qiyang Zhao, Hang Zou, M. B. M. D. (2024). Semantic communications. In Mohammad A. Matin, Sotirios K. Goudos, G. K. K., editor, Artificial Intelligence for Future Networks, pages 131–149. Wiley.

R. Tavasoli, S. Sur, and S. Nelakuditi, “Sugarwave: A non-destructive estimation of fruit sugar content using millimeter-wave sensing,” in Proceedings - 2023 IEEE 20th International Conference on Mobile Ad Hoc and Smart Systems, MASS 2023, 2023.

r2c, Inc. (2025). Ruleset “XSS” – semgrep registry. Disponível em [link] (20/04/2025).

Radford, A., Wu, J., Child, R., Luan, D., Amodei, D., Sutskever, I., et al. (2019). Language models are unsupervised multitask learners. OpenAI blog, 1(8):9.

Rahman, M., Islam, M., Calhoun, J., and Chowdhury, M. (2019). Real-time pedestrian detection approach with an efficient data communication bandwidth strategy. Transportation research record, 2673(6):129–139.

Ramachandran, R. (2024). Five key priorities for governance practitioners in 2025. Accessed: 2025-04-06.

Rani, S., Mishra, R. K., Usman, M., Kataria, A., Kumar, P., Bhambri, P., and Mishra, A. K. (2021). Amalgamation of advanced technologies for sustainable development of smart city environment: A review. IEEE Access, 9:150060–150087.

Rao, P. M. and Deebak, B. D. (2023). Security and privacy issues in smart cities/industries: technologies, applications, and challenges. Journal of Ambient Intelligence and Humanized Computing, 14(8):10517–10553.

Ribeiro, A. V., Nakayama, F., and Nogueira, M. (2023). Um panorama dos serviços de saúde avançados: Conectividade e segurança em sistemas de vida assistida. Minicursos do Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos, pages 1–50.

Richardson, L. (2025). Beautiful Soup: We called him Tortoise because he taught us. Disponível em [link] (21/04/2025).

Riedel, P., Schick, L., von Schwerin, R., Reichert, M., Schaudt, D., and Hafner, A. (2024). Comparative analysis of open-source federated learning frameworks - a literature-based survey and review. International Journal of Machine Learning and Cybernetics, 15(11):5257–5278.

Rodriguez, A., Gatrell, J., and Peschke, R. (2001). TCP/IP Tutorial and Technical Overview. Prentice-Hall, Inc., USA, 7th edition.

Rodríguez, G. E., Torres, J. G., Flores, P. e Benavides, D. E. (2020). Cross-Site Scripting (XSS) attacks and mitigation: A survey. Computer Networks, 166:106960.

Rubio, D. (2017). Beginning django. Springer.

S. Blandino, T. Ropitault, C. R. D. Silva, A. Sahoo, and N. Golmie, “Ieee 802.11bf dmg sensing: Enabling high-resolution mmwave wi-fi sensing,” IEEE Open Journal of Vehicular Technology, vol. 4, 2023.

S. Ducca, “Dataset: Channel state information data of animal crossings on rural roads.” DOI: 10.21227/0t6t-8s40, 2025.

S. M. Hernandez and E. Bulut, “Adversarial occupancy monitoring using one-sided through-wall wifi sensing,” in ICC 2021 - IEEE International Conference on Communications, pp. 1–6, 2021.

S. M. Hernandez and E. Bulut, “Lightweight and Standalone IoT Based WiFi Sensing for Active Repositioning and Mobility,” in 21st International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM) (WoWMoM 2020), (Cork, Ireland), June 2020.

S. M. Hernandez and E. Bulut, “Scheduled spatial sensing against adversarial wifi sensing,” in 2023 IEEE International Conference on Pervasive Computing and Communications (PerCom), pp. 91–100, 2023.

S. M. Hernandez and E. Bulut, “Wifi sensing on the edge: Signal processing techniques and challenges for real-world systems,” IEEE Communications Surveys & Tutorials, vol. 25, no. 1, pp. 46–76, 2023.

S. Tan, L. Zhang, and J. Yang, “Sensing fruit ripeness using wireless signals,” in 2018 27th International Conference on Computer Communication and Networks (ICCCN), (Hangzhou,China), pp. 1–9, IEEE, 2018.

S. Tan, L. Zhang, and J. Yang, “Sensing fruit ripeness using wireless signals,” in 2018 27th International Conference on Computer Communication and Networks (ICCCN), pp. 1–9, 2018.

S. V. Ducca and C. B. Margi, “Performance trade offs in iot-based traffic monitoring and incident detection systems,” in 2022 Symposium on Internet of Things (SIoT), (São Paulo, Brazil), pp. 1–4, IEEE, 2022.

S. V. Ducca, “Dataset: Animal crossing wifi csi.” DOI: 10.5281/zenodo.8266462, Aug 2023.

S. V. Ducca, A. Jordão, and C. B. Margi, “Detection and classification of animal crossings on roads using iot-based wifi sensing,” in 2023 IEEE Latin-American Conference on Communications (LATINCOM), (Panama City, Panama), pp. 1–6, IEEE, 2023.

S. V. Ducca, C. B. Margi, and A. J. L. Correia, “Low-cost animal and pedestrian crossing detection in rural roads using wifi sensing and deep learning,” Master’s thesis, Universidade de São Paulo, 2024.

S. Yousefi, H. Narui, S. Dayal, S. Ermon, and S. Valaee, “A survey on behavior recognition using wifi channel state information,” IEEE Communications Magazine, vol. 55, no. 10, pp. 98–104, 2017.

S. Zhou, W. Zhang, D. Peng, Y. Liu, X. Liao, and H. Jiang, “Adversarial wifi sensing for privacy preservation of human behaviors,” IEEE Communications Letters, vol. 24, no. 2, pp. 259–263, 2020.

Sahoo, A. K., Das, A., and Tiwary, M. (2014). Firewall engine based on graphics processing unit. In 2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies, pages 758–763.

Salim, J. H. (2005). When napi comes to town. In Linux 2005 Conf. Citeseer.

Sanders, J. and Kandrot, E. (2010). CUDA by example: an introduction to general-purpose GPU programming. Addison-Wesley Professional.

Santos, J., Costa, M., and Almeida, F. (2021). P4 and iot: A survey on data plane programmability for smart systems. Journal of Network and Systems Management, 29(4):1–24.

Sarker, I. H., Furhad, M. H., and Nowrozy, R. (2021). Ai-driven cybersecurity: an overview, security intelligence modeling and research directions. SN Computer Science, 2(3):173.

Sarmah, U., Bhattacharyya, D. e Kalita, J. K. (2018). A survey of detection methods for XSS attacks. Journal of Network and Computer Applications, 118:113–143.

Sarwar, S. M. (2024). Fedmentalcare: Towards privacy-preserving finetuned llms to analyze mental health status using federated learning framework.

Sato, M., Ishikawa, Y., Tomita, H., Kodama, Y., Odajima, T., Tsuji, M., Yashiro, H., Aoki, M., Shida, N., Miyoshi, I., Hirai, K., Furuya, A., Asato, A., Morita, K., and Shimizu, T. (2020). Co-design for a64fx manycore processor and ”fugaku”. In SC20: International Conference for High Performance Computing, Networking, Storage and Analysis, pages 1–15.

Sedrati, A., Ouaddah, A., Mezrioui, A., and Bellaj, B. (2022). Iotgov: an iot governance framework using the blockchain. Computing, 104(10):2307– 2345.

Seiler, G. (2018). Faster avx2 optimized ntt multiplication for ring-lwe lattice cryptography. Cryptology ePrint Archive.

Sennrich, R., Haddow, B., and Birch, A. (2016). Neural machine translation of rare words with subword units.

Serrano, M., Griffor, E., Wollman, D., Dunaway, M., Burns, M., Rhee, S., and Greer, C. (2022). Smart cities and communities: A key performance indicators framework. NIST Special Publication, 1900:206.

Shah, S. S. H. (2020). Cross Site Scripting XSS dataset for Deep Learning. Disponível em [link] (01/04/2025).

Shanmugalingam, S., Ksentini, A., and Bertin, P. (2016). Dpdk open vswitch performance validation with mirroring feature. In 2016 23rd International Conference on Telecommunications (ICT), pages 1–6.

Sharma, J. and Singh, M. (2015). Cuda based rabin-karp pattern matching for deep packet inspection on a multicore gpu. International Journal of Computer Network and Information Security, 7(10):70–77.

Siddiqui, S., Hameed, S., Shah, S. A., Arshad, J., Ahmed, Y., and Draheim, D. (2024). A smart-contract-based adaptive security governance architecture for smart city service interoperations. Sustainable Cities and Society, 113:105717.

Sidhu, D., Fu, T., Abdallah, S., Nair, R., and Coltun, R. (1993). Open shortest path first (ospf) routing protocol simulation. ACM SIGCOMM Computer Communication Review, 23(4):53–62.

Signal (2013). Signal Messenger: Speak Freely — signal.org. [link]. [Accessed 07-04-2025].

Silva, D., Heideker, A., Trombeta, L., Carvalho, B., Kleinschmidt, J., and Kamienski, C. (2024). P4docker: Enabling efficient p4 switch testbeds with docker integration. In Anais Estendidos do XLII Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos, pages 1–8, Porto Alegre, RS, Brasil. SBC.

Singh, N. and Adhikari, M. (2025). Selffed: Self-adaptive federated learning with non-iid data on heterogeneous edge devices for bias mitigation and enhance training efficiency. Information Fusion, 118:102932.

Slongo, J., Lindino, C., Martins, L. D., Spanhol, F. A., Carneiro, E., and Camargo, E. T. (2024). Evaluation of low-cost sensors to integrate in a water quality monitor for real-time measurements. Environmental Monitoring and Assessment, 196(8):716.

Smith, V., Chiang, C.-K., Sanjabi, M., and Talwalkar, A. (2017). Federated multi-task learning. In Proceedings of the 31st International Conference on Neural Information Processing Systems, NIPS’17, page 4427–4437, Red Hook, NY, USA. Curran Associates Inc.

Smyth, D., Scott-Hayward, S., Cionca, V., McSweeney, S., and O’Shea, D. (2023). Secap switch—defeating topology poisoning attacks using p4 data planes. Journal of Network and Systems Management, 31(1):28.

Soltani, B., Zhou, Y., Haghighi, V., and Lui, J. C. S. (2023). A survey of federated evaluation in federated learning. In Elkind, E., editor, Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, IJCAI-23, pages 6769–6777. International Joint Conferences on Artificial Intelligence Organization. Survey Track.

Sonai, V., Bharathi, I., and Noor Mahammad, S. (2023). A perspective of ip lookup approach using graphical processing unit (gpu). In Molla, A. R., Sharma, G., Kumar, P., and Rawat, S., editors, Distributed Computing and Intelligent Technology, pages 98–103, Cham. Springer Nature Switzerland.

SonarSource (2021). S5131 – Endpoints should not be vulnerable to reflected XSS. Disponível em [link] (20/04/2025).

Souza, A., Bittencourt, L., Cerqueira, E., Loureiro, A., and Villas, L. (2023). Dispositivos, eu escolho vocˆes: Seleção de clientes adaptativa para comunicação eficiente em aprendizado federado. In Anais do XLI Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos, pages 1–14, Porto Alegre, RS, Brasil. SBC.

Souza, J., Oliveira, M., and Silva, P. (2024). P7: Patch panel programável com p4. Projeto apresentado no Workshop de Ferramentas do SBRC.

Stenback, J. e Heninger, A. (2004). Document Object Model (DOM) level 3 load and save specification version 1.0. Disponível em [link] (12/04/2025).

Stolfo, S., Fan, W., Lee, W., Prodromidis, A., and Chan, P. (1999). Kdd cup 1999 data. [link]. Accessed: 2025-04-13.

Sun, H., Tian, H., Ni, W., Zheng, J., Niyato, D., and Zhang, P. (2025). Federated low-rank adaptation for large models fine-tuning over wireless networks. IEEE Transactions on Wireless Communications, 24(1):659–675.

Sun, W. and Ricci, R. (2013). Fast and flexible: Parallel packet processing with gpus and click. ANCS 2013 - Proceedings of the 9th ACM/IEEE Symposium on Architectures for Networking and Communications Systems, pages 25–35.

T. Ropitault, C. R. D. Silva, S. Blandino, A. Sahoo, N. Golmie, K. Yoon, C. Aldana, and C. Hu, “Ieee 802.11bf wlan sensing procedure: Enabling the widespread adoption of wifi sensing,” IEEE Communications Standards Magazine, vol. 8, 2024.

Tahirkheli, A. I., Shiraz, M., Hayat, B., Idrees, M., Sajid, A., Ullah, R., Ayub, N., and Kim, K.-I. (2021). A survey on modern cloud computing security over smart city networks: Threats, vulnerabilities, consequences, countermeasures, and challenges. Electronics, 10(15):1811.

Takkouche, B. and Norman, G. (2011). Prisma statement. Epidemiology, 22(1):128.

Talasso, G. U., de Souza, A. M., Bittencourt, L. F., Cerqueira, E., Loureiro, A. A. F., and Villas, L. A. (2024). Fedsccs: Hierarchical clustering with multiple models for federated learning. In ICC 2024 - IEEE International Conference on Communications, pages 3280–3285.

Tam, K., Tian, C., Li, L., Zhao, H., and Xu, C. (2024). Fedhybrid: Breaking the memory wall of federated learning via hybrid tensor management. In Proceedings of the 22nd ACM Conference on Embedded Networked Sensor Systems, pages 394–408.

Tanenbaum, A. S. and Wetherall, D. J. (2010). Computer Networks. Prentice Hall Press, USA, 5th edition.

Tang, Y. and Deng, Y. (2024). Current research and prospects of federated language large models in the medical field. In Piccaluga, P. P. and Baloch, Z., editors, Third International Conference on Biomedical and Intelligent Systems (IC-BIS 2024), volume 13208, page 1320838. International Society for Optics and Photonics, SPIE.

Tao, Y., Yang, R., Zeng, K., Yin, C., Lu, Y., Lu, W., Shi, Y., Wang, B., and Huang, B. (2025). Flft: A large-scale pre-training model distributed fine-tuning method that integrates federated learning strategies. IEEE Access.

Team, G. S. (2021). Open redirects — defense in depth. Disponível em [link] (23/04/2025).

TensorFlow (2025). Tensorflow. Disponível em [link] (07/04/2025).

Thajeel, I. K., Samsudin, K., Hashim, S. J. e Hashim, F. (2023a). Dynamic feature selection model for adaptive Cross Site Scripting attack detection using developed multi-agent deep Q learning model. Journal of King Saud University - Computer and Information Sciences, 35(6):101490.

Thajeel, I. K., Samsudin, K., Hashim, S. J. e Hashim, F. (2023b). Machine and deep learning-based XSS detection approaches: A systematic literature review. Journal of King Saud University - Computer and Information Sciences, 35(7):101628.

Thanh Van, N. T. and Thinh, T. N. (2015). Accelerating anomaly-based ids using neural network on gpu. In 2015 International Conference on Advanced Computing and Applications (ACOMP), pages 67–74.

The Khronos Group Inc. (2024). OpenCL. Accessed on 2024.

Thomas, R., Mark, B., Johnson, T., and Croall, J. (2003). Netbouncer: client-legitimacy-based high-performance ddos filtering. In Proceedings DARPA Information Survivability Conference and Exposition, volume 1, pages 14–25 vol.1.

Trombeta, L., Da Silva, D. E. O. G., Carvalho, B. C., Anon Da Silva, F. A., Kleinschmidt, J. H., and Kamienski, C. A. (2024). P4Checkers: Exploring Modern Network Concepts Through a Classic Game . In 2024 IEEE Frontiers in Education Conference (FIE), pages 1–8, Los Alamitos, CA, USA. IEEE Computer Society.

Ujjan, R. M. A., Pervez, Z., Dahal, K., Bashir, A. K., Mumtaz, R., and González, J. (2020). Towards sflow and adaptive polling sampling for deep learning based ddos detection in sdn. Future Generation Computer Systems, 111:763–779.

Uto, N. e Melo, S. (2009). Vulnerabilidades em aplicações web e mecanismos de proteção. Minicursos SBSeg, p. 237–283.

Van Hauwaert, R., Vanliefde, M., and Barbette, T. (2024). Gpu-based packet processing.

Van Nguyen, C., Shen, X., Aponte, R., Xia, Y., Basu, S., Hu, Z., Chen, J., Parmar, M., Kunapuli, S., Barrow, J., et al. (2024). A survey of small language models. arXiv preprint arXiv:2410.20011.

Vasiliadis, G., Antonatos, S., Polychronakis, M., Markatos, E. P., and Ioannidis, S. (2008). Gnort: High performance network intrusion detection using graphics processors. In Recent Advances in Intrusion Detection: 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings 11, pages 116–134. Springer.

Vaswani, A. (2017). Attention is all you need. Advances in Neural Information Processing Systems.

Vice (2015). The MySpace Worm that Changed the Internet Forever. Disponível em [link] (09/01/2025).

Vieira, M. A., Castanho, M. S., Pacífico, R. D., Santos, E. R., Júnior, E. P. C., and Vieira, L. F. (2020). Fast packet processing with ebpf and xdp: Concepts, code, challenges, and applications. ACM Computing Surveys (CSUR), 53(1):1–36.

Vluymans, S. (2019). Learning from Imbalanced Data, p. 81–110. Springer International Publishing, Cham.

Voigtländer, F., Ramadan, A., Eichinger, J., Lenz, C., Pensky, D., and Knoll, A. (2017). 5g for robotics: Ultra-low latency control of distributed robotic systems. In 2017 International Symposium on Computer Science and Intelligent Controls (ISCSIC), pages 69–72.

Vuckovic, P., Santic, J., and Tomašić, D. (2021). Integrating p4runtime with onos for real-time sdn control. In IEEE Conference on Network Softwarization (NetSoft), pages 127–134.

W. Chen, K. Niu, D. Zhao, R. Zheng, D.Wu,W.Wang, L.Wang, and D. Zhang, “Robust dynamic hand gesture interaction using lte terminals,” in 2020 19th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN), pp. 109–120, 2020.

W. H. O. (WHO), Global status report on road safety 2018: summary. (WHO/NMH/NVI/18.20). Geneva: World Health Organization, 2018.

W. Yang, E. Shen, X.Wang, S. Mao, Y. Gong, and P. Hu, “Wi-wheat+: Contact-free wheat moisture sensing with commodity wifi based on entropy,” Digital Communications and Networks, vol. 9, no. 3, pp. 698–709, 2023.

W. Yang, X. Wang, A. Song, and S. Mao, “Wi-wheat: Contact-free wheat moisture detection with commodity wifi,” in 2018 IEEE International Conference on Communications (ICC), (Kansas City, USA), pp. 1–6, IEEE, 2018.

Walker, D. W. and Dongarra, J. J. (1996). Mpi: a standard message passing interface. Supercomputer, 12:56–68.

Wang, D., Kim, D., Jin, B., Zhao, X., Fu, T., Yang, S., and Liu, X.-Y. (2024). Finlora: Finetuning quantized financial large language models using low-rank adaptation.

Wang, H., Soulé, R., Dang, H. T., Lee, K. S., Shrivastav, V., Foster, N., and Weatherspoon, H. (2017). P4FPGA: A rapid prototyping framework for P4. In Proceedings of the Symposium on SDN Research (SOSR), pages 122–135.

Wang, L., Huang, Y.-z., Chen, X., and Zhang, C.-y. (2008). Task scheduling of parallel processing in cpu-gpu collaborative environment. In 2008 International Conference on Computer Science and Information Technology, pages 228–232.

Wang, Q., Li, C., Wang, D., Yuan, L., Pan, G., Cheng, Y., Hu, M. e Ren, Y. (2024). IGXSS: XSS payload detection model based on inductive GCN. International Journal of Network Management, e2264.

Weamie, S. J. (2022). Cross-Site Scripting attacks and defensive techniques: A comprehensive survey. International Journal of Communications, Network and System Sciences, 15(8):126–148.

Webb, J. and Hume, D. (2018). Campus iot collaboration and governance using the nist cybersecurity framework. In Living in the Internet of Things: Cybersecurity of the IoT-2018, pages 1–7. IET.

West, M. e Sartori, A. (2025). Content Security Policy level 3. Disponível em [link] (18/04/2025).

Weyssow, M., Zhou, X., Kim, K., Lo, D., and Sahraoui, H. (2025). Exploring parameter-efficient fine-tuning techniques for code generation with large language models. ACM Trans. Softw. Eng. Methodol. Just Accepted.

Wilkins, A. W. and Mifsud, D. (2024). What is governance? projects, objects and analytics in education. Journal of Education Policy, 39(3):349– 365.

Woisetschläger, H., Erben, A., Wang, S., Mayer, R., and Jacobsen, H.-A. (2024). Federated fine-tuning of llms on the very edge: The good, the bad, the ugly. In Proceedings of the Eighth Workshop on Data Management for Endto- End Machine Learning, DEEM ’24, page 39–50, New York, NY, USA. Association for Computing Machinery.

Wu, E. and Liu, Y. (2008). Emerging technology about gpgpu. In APCCAS 2008 - 2008 IEEE Asia Pacific Conference on Circuits and Systems, pages 618–622.

Wu, F., Li, Z., Li, Y., Ding, B., and Gao, J. (2024a). Fedbiot: Llm local fine-tuning in federated learning without full model. In Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, pages 3345–3355.

Wu, F., Liu, X., Wang, H., Wang, X., Su, L., and Gao, J. (2025a). Towards federated RLHF with aggregated client preference for LLMs. In The Thirteenth International Conference on Learning Representations.

Wu, J., Dong, F., Leung, H., Zhu, Z., Zhou, J., and Drew, S. (2024b). Topology-aware federated learning in edge computing: A comprehensive survey. ACM Comput. Surv., 56(10).

Wu, Y., Tian, C., Li, J., Sun, H., Tam, K., Li, L., and Xu, C. (2025b). A survey on federated fine-tuning of large language models. arXiv preprint ar- Xiv:2503.12016.

X. Zeng, B. Wang, C. Wu, S. Deepika Regani, and K. J. Ray Liu, “Intelligent wifi based child presence detection system,” in ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), (Singapore), pp. 11–15, IEEE, 2022.

Xagoraris, L., Kogias, D., and Karkazis, P. (2023). A review of zero trust security framework (ztf) for sustainable and resilient smart cities. In Proceedings of the 27th Pan-Hellenic Conference on Progress in Computing and Informatics, pages 269–273.

Xie, Y., Wang, Z., Gao, D., Chen, D., Yao, L., Kuang, W., Li, Y., Ding, B., and Zhou, J. (2023). Federatedscope: A flexible federated learning platform for heterogeneity. Proceedings of the VLDB Endowment, 16(5):1059–1072.

XSSed (2015). XSSed | Cross Site Scripting (XSS) attacks information and archive. Disponível em [link] (01/04/2025).

Y. Bengio, S. Mindermann, D. Privitera, T. Besiroglu, R. Bommasani, S. Casper, Y. Choi, P. Fox, B. Garfinkel, D. Goldfarb, H. Heidari, A. Ho, S. Kapoor, L. Khalatbari, S. Longpre, S. Manning, V. Mavroudis, M. Mazeika, J. Michael, J. Newman, K. Y. Ng, C. T. Okolo, D. Raji, G. Sastry, E. Seger, T. Skeadas, T. South, E. Strubell, F. Tramèr, L. Velasco, N. Wheeler, D. Acemoglu, O. Adekanmbi, D. Dalrymple, T. G. Dietterich, E. W. Felten, P. Fung, P.-O. Gourinchas, F. Heintz, G. Hinton, N. Jennings, A. Krause, S. Leavy, P. Liang, T. Ludermir, V. Marda, H. Margetts, J. McDermid, J. Munga, A. Narayanan, A. Nelson, C. Neppel, A. Oh, G. Ramchurn, S. Russell, M. Schaake, B. Schölkopf, D. Song, A. Soto, L. Tiedrich, G. Varoquaux, A. Yao, Y.-Q. Zhang, F. Albalawi, M. Alserkal, O. Ajala, G. Avrin, C. Busch, A. C. P. de Leon Ferreira de Carvalho, B. Fox, A. S. Gill, A. H. Hatip, J. Heikkilä, G. Jolly, Z. Katzir, H. Kitano, A. Krüger, C. Johnson, S. M. Khan, K. M. Lee, D. V. Ligot, O. Molchanovskyi, A. Monti, N. Mwamanzi, M. Nemer, N. Oliver, J. R. L. Portillo, B. Ravindran, R. P. Rivera, H. Riza, C. Rugege, C. Seoighe, J. Sheehan, H. Sheikh, D. Wong, and Y. Zeng, “International AI safety report,” 2025.

Y. Chen, J. Zhang, W. Feng, and M. S. Alouini, “Radio sensing using 5g signals: Concepts, state of the art, and challenges,” IEEE Internet of Things Journal, vol. 9, 2022.

Y. Ge, W. Li, M. Farooq, A. Qayyum, J. Wang, Z. Chen, J. Cooper, M. A. Imran, and Q. H. Abbasi, “Logait: Lora sensing system of human gait recognition using dynamic time warping,” IEEE Sensors Journal, vol. 23, no. 18, pp. 21687–21697, 2023.

Y. He and L. Xiao, “Structured pruning for deep convolutional neural networks: A survey,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 46, no. 5, pp. 2900–2919, 2024.

Y. Liu, Z. Tan, H. Hu, L. J. Cimini, and G. Y. Li, “Channel estimation for ofdm,” IEEE Communications Surveys & Tutorials, vol. 16, no. 4, pp. 1891–1908, 2014.

Yaar, A., Perrig, A., and Song, D. (2004). Siff: a stateless internet flow filter to mitigate ddos flooding attacks. In IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, pages 130–143.

Yan, N., Su, Y., Deng, Y., and Schober, R. (2025). Federated finetuning of llms: Framework comparison and research directions. arXiv preprint ar- Xiv:2501.04436.

Yang, F.-E., Wang, C.-Y., and Wang, Y.-C. F. (2023). Efficient Model Personalization in Federated Learning via Client-Specific Prompt Generation . In 2023 IEEE/CVF International Conference on Computer Vision (ICCV), pages 19102–19111, Los Alamitos, CA, USA. IEEE Computer Society.

Ye, M., Fang, X., Du, B., Yuen, P. C., and Tao, D. (2023). Heterogeneous federated learning: State-of-the-art and research challenges. ACM Comput. Surv., 56(3).

Yuliana, R. and Hasibuan, Z. A. (2022). Best practice framework for information technology security governance in indonesian government. International Journal of Electrical and Computer Engineering, 12(6):6522.

Yusif, S. and Hafeez-Baig, A. (2021). A conceptual model for cybersecurity governance. Journal of applied security research, 16(4):490–513.

Z. Gao, Y. Gao, S.Wang, D. Li, and Y. Xu, “Crisloc: Reconstructable csi fingerprinting for indoor smartphone localization,” IEEE Internet of Things Journal, vol. 8, no. 5, pp. 3422–3437, 2021.

Z. Wang, K. Jiang, Y. Hou, Z. Huang, W. Dou, C. Zhang, and Y. Guo, “A survey on csi-based human behavior recognition in through-the-wall scenario,” IEEE Access, vol. 7, pp. 78772–78793, 2019.

Zeng, J., Chen, B., Deng, Y., Chen, W., Mao, Y., and Li, J. (2024). Fine-tuning of financial large language model and application at edge device. In Proceedings of the 3rd International Conference on Computer, Artificial Intelligence and Control Engineering, CAICE ’24, page 42–47, New York, NY, USA. Association for Computing Machinery.

Zhang, K., He, B., Hu, J., Wang, Z., Hua, B., Meng, J., and Yang, L. (2018). {G-NET}: Effective {GPU} sharing in {NFV} systems. In 15th USENIX Symposium on networked systems design and implementation (NSDI 18), pages 187– 200.

Zhang, Y. and You, Y. (2024). Speedloader: An i/o efficient scheme for heterogeneous and distributed llm operation. Advances in Neural Information Processing Systems, 37:34637–34655.

Zhao, W. X., Zhou, K., Li, J., Tang, T., Wang, X., Hou, Y., Min, Y., Zhang, B., Zhang, J., Dong, Z., et al. (2023). A survey of large language models. arXiv preprint arXiv:2303.18223.

Zhao, Y., Yue, Y., Hou, S., Cheng, B., and Huang, Y. (2024). Lamosc: Large language model-driven semantic communication system for visual transmission. IEEE Transactions on Cognitive Communications and Networking, 10(6):2005–2018.

Zhou, S., Singapura, S. G., and Prasanna, V. K. (2014). Highperformance packet classification on gpu. In 2014 IEEE High Performance Extreme Computing Conference (HPEC), pages 1–6.

Zhu, H., Xu, J., Liu, S., and Jin, Y. (2021). Federated learning on noniid data: A survey. Neurocomputing, 465:371–390.

Zhuang, W., Gan, X., Wen, Y., and Zhang, S. (2022). Easyfl: A low-code federated learning platform for dummies. IEEE Internet of Things Journal.

Data de publicação

19/05/2025

Licença

Creative Commons License
Este trabalho está licenciado sob uma licença Creative Commons Attribution 4.0 International License.

Detalhes sobre o formato disponível para publicação: Volume Completo

Volume Completo

ISBN-13 (15)

978-85-7669-662-9