1. C. Bailey, L. Montrieux, R. de Lemos, Y. Yu, and M. Wermelinger. 2014. RunTime Generation, Transformation, and Verification of Access Control Models for Self-Protection. In Proceedings of the 9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (Hyderabad, India) (SEAMS 2014). Association for Computing Machinery, New York, NY, USA, 135--144.
2. R. Ball, J. Grant, J. So, V. Spurrett, and R. de Lemos. 2007. Dependable and Secure Distributed Storage System for Ad Hoc Networks. In Ad-Hoc, Mobile, and Wireless Networks, 6th International Conference, ADHOC-NOW 2007, Morelia, Mexico, September 24--26, 2007, Proceeedings (Lecture Notes in Computer Science, Vol. 4686), Evangelos Kranakis and Jaroslav Opatrny (Eds.). Springer, 142--152.
3. P. J. Bentley. 2007. Digital Biology: How Nature Is Transforming Our Technology and Our Lives. Simon & Schuster.
4. Are Machine Learning Models for Malware Detection Ready for Prime Time;Cavallaro L.;IEEE Security & Privacy,2023
5. R. de Lemos. 2005. The Conflict between Self-* Capabilities and Predictability. Springer-Verlag, Berlin, Heidelberg, 219--228.