default search action
Eleonora Losiouk
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [e5]Eleonora Losiouk, Alessandro Brighente, Mauro Conti, Yousra Aafer, Yanick Fratantonio:
The 27th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2024, Padua, Italy, 30 September 2024- 2 October 2024. ACM 2024, ISBN 979-8-4007-0959-3 [contents] - 2023
- [j11]Enkeleda Bardhi, Mauro Conti, Riccardo Lazzeretti, Eleonora Losiouk:
Security and Privacy of IP-ICN Coexistence: A Comprehensive Survey. IEEE Commun. Surv. Tutorials 25(4): 2427-2455 (2023) - [j10]Jennifer Bellizzi, Eleonora Losiouk, Mauro Conti, Christian Colombo, Mark Vella:
VEDRANDO: A Novel Way to Reveal Stealthy Attack Steps on Android through Memory Forensics. J. Cybersecur. Priv. 3(3): 364-395 (2023) - [c22]Andrea Agiollo, Enkeleda Bardhi, Mauro Conti, Riccardo Lazzeretti, Eleonora Losiouk, Andrea Omicini:
GNN4IFA: Interest Flooding Attack Detection With Graph Neural Networks. EuroS&P 2023: 615-630 - [c21]Marco Alecci, Luca Attanasio, Alessandro Brighente, Mauro Conti, Eleonora Losiouk, Hideki Ochiai, Federico Turrin:
Beware of Pickpockets: A Practical Attack against Blocking Cards. RAID 2023: 195-206 - [c20]Marco Casagrande, Riccardo Cestaro, Eleonora Losiouk, Mauro Conti, Daniele Antonioli:
E-Spoofer: Attacking and Defending Xiaomi Electric Scooter Ecosystem. WISEC 2023: 85-95 - [e4]Jianying Zhou, Lejla Batina, Zengpeng Li, Jingqiang Lin, Eleonora Losiouk, Suryadipta Majumdar, Daisuke Mashima, Weizhi Meng, Stjepan Picek, Mohammad Ashiqur Rahman, Jun Shao, Masaki Shimaoka, Ezekiel O. Soremekun, Chunhua Su, Je Sen Teh, Aleksei Udovenko, Cong Wang, Leo Yu Zhang, Yury Zhauniarovich:
Applied Cryptography and Network Security Workshops - ACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings. Lecture Notes in Computer Science 13907, Springer 2023, ISBN 978-3-031-41180-9 [contents] - [i6]Marco Alecci, Luca Attanasio, Alessandro Brighente, Mauro Conti, Eleonora Losiouk, Hideki Ochiai, Federico Turrin:
Beware of Pickpockets: A Practical Attack against Blocking Cards. CoRR abs/2302.08992 (2023) - 2022
- [j9]Mauro Conti, Eleonora Losiouk, Radha Poovendran, Riccardo Spolaor:
Side-channel attacks on mobile and IoT devices for Cyber-Physical systems. Comput. Networks 207: 108858 (2022) - [j8]Marco Casagrande, Eleonora Losiouk, Mauro Conti, Mathias Payer, Daniele Antonioli:
BreakMi: Reversing, Exploiting and Fixing Xiaomi Fitness Tracking Ecosystem. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(3): 330-366 (2022) - [c19]Enkeleda Bardhi, Mauro Conti, Riccardo Lazzeretti, Eleonora Losiouk, Ahmed Taffal:
Sim2Testbed Transfer: NDN Performance Evaluation. ARES 2022: 63:1-63:9 - [c18]Alessandro Visintin, Flavio Toffalini, Eleonora Losiouk, Mauro Conti, Jianying Zhou:
HolA: Holistic and Autonomous Attestation for IoT Networks. ACNS Workshops 2022: 277-296 - [c17]Mauro Conti, Eleonora Losiouk, Alessandro Visintin:
What you see is not what you get: a man-in-the-middle attack applied to video channels. SAC 2022: 1723-1726 - [c16]Pavan Srihari Darbha, Mauro Conti, Eleonora Losiouk, Rajib Ranjan Maiti:
Face Recognition Systems: Are you sure they only consider your face? SP (Workshops) 2022: 258-264 - [e3]Jianying Zhou, Sridhar Adepu, Cristina Alcaraz, Lejla Batina, Emiliano Casalicchio, Sudipta Chattopadhyay, Chenglu Jin, Jingqiang Lin, Eleonora Losiouk, Suryadipta Majumdar, Weizhi Meng, Stjepan Picek, Jun Shao, Chunhua Su, Cong Wang, Yury Zhauniarovich, Saman A. Zonouz:
Applied Cryptography and Network Security Workshops - ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Rome, Italy, June 20-23, 2022, Proceedings. Lecture Notes in Computer Science 13285, Springer 2022, ISBN 978-3-031-16814-7 [contents] - [i5]Enkeleda Bardhi, Mauro Conti, Riccardo Lazzeretti, Eleonora Losiouk:
Security and Privacy of IP-ICN Coexistence: A Comprehensive Survey. CoRR abs/2209.02835 (2022) - 2021
- [j7]Mohamed A. El-Zawawy, Eleonora Losiouk, Mauro Conti:
Vulnerabilities in Android webview objects: Still not the end! Comput. Secur. 109: 102395 (2021) - [j6]Mohamed A. El-Zawawy, Eleonora Losiouk, Mauro Conti:
Do not let Next-Intent Vulnerability be your next nightmare: type system-based approach to detect it in Android apps. Int. J. Inf. Sec. 20(1): 39-58 (2021) - [j5]Abdelmadjid Benarfa, Muhammad Hassan, Eleonora Losiouk, Alberto Compagno, Mohamed Bachir Yagoubi, Mauro Conti:
ChoKIFA+: an early detection and mitigation approach against interest flooding attacks in NDN. Int. J. Inf. Sec. 20(3): 269-285 (2021) - [c15]Antonio Ruggia, Eleonora Losiouk, Luca Verderame, Mauro Conti, Alessio Merlo:
Repack Me If You Can: An Anti-Repackaging Solution Based on Android Virtualization. ACSAC 2021: 970-981 - [c14]Marco Casagrande, Mauro Conti, Eleonora Losiouk:
Contact Tracing Made Un-relay-able. CODASPY 2021: 221-232 - [c13]Enkeleda Bardhi, Mauro Conti, Riccardo Lazzeretti, Eleonora Losiouk:
ICN PATTA: ICN Privacy Attack Through Traffic Analysis. LCN 2021: 443-446 - [e2]Jianying Zhou, Chuadhry Mujeeb Ahmed, Lejla Batina, Sudipta Chattopadhyay, Olga Gadyatskaya, Chenglu Jin, Jingqiang Lin, Eleonora Losiouk, Bo Luo, Suryadipta Majumdar, Mihalis Maniatakos, Daisuke Mashima, Weizhi Meng, Stjepan Picek, Masaki Shimaoka, Chunhua Su, Cong Wang:
Applied Cryptography and Network Security Workshops - ACNS 2021 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, and SiMLA, Kamakura, Japan, June 21-24, 2021, Proceedings. Lecture Notes in Computer Science 12809, Springer 2021, ISBN 978-3-030-81644-5 [contents] - 2020
- [j4]Mauro Conti, Ankit Gangwal, Muhammad Hassan, Chhagan Lal, Eleonora Losiouk:
The Road Ahead for Networking: A Survey on ICN-IP Coexistence Solutions. IEEE Commun. Surv. Tutorials 22(3): 2104-2129 (2020) - [j3]Marco Ferrante, Nicola Ferro, Eleonora Losiouk:
How do interval scales help us with better understanding IR evaluation measures? Inf. Retr. J. 23(3): 289-317 (2020) - [c12]Alberto Compagno, Mauro Conti, Eleonora Losiouk, Gene Tsudik, Sebastiano Valle:
A Proactive Cache Privacy Attack on NDN. NOMS 2020: 1-7 - [c11]Filippo Berto, Luca Calderoni, Mauro Conti, Eleonora Losiouk:
Spatial bloom filter in named data networking: a memory efficient solution. SAC 2020: 274-277 - [e1]Jianying Zhou, Mauro Conti, Chuadhry Mujeeb Ahmed, Man Ho Au, Lejla Batina, Zhou Li, Jingqiang Lin, Eleonora Losiouk, Bo Luo, Suryadipta Majumdar, Weizhi Meng, Martín Ochoa, Stjepan Picek, Georgios Portokalidis, Cong Wang, Kehuan Zhang:
Applied Cryptography and Network Security Workshops - ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings. Lecture Notes in Computer Science 12418, Springer 2020, ISBN 978-3-030-61637-3 [contents] - [i4]Marco Alecci, Riccardo Cestaro, Mauro Conti, Ketan Kanishka, Eleonora Losiouk:
Mascara: A Novel Attack Leveraging Android Virtualization. CoRR abs/2010.10639 (2020) - [i3]Marco Casagrande, Mauro Conti, Eleonora Losiouk:
Contact Tracing Made Un-relay-able. CoRR abs/2010.12641 (2020)
2010 – 2019
- 2019
- [c10]Marco Ferrante, Nicola Ferro, Eleonora Losiouk:
Stochastic Relevance for Crowdsourcing. ECIR (1) 2019: 755-762 - [c9]Marco Ferrante, Nicola Ferro, Eleonora Losiouk, Silvia Pontarollo:
Scales of Evaluation Measures: From Theory to Experimentation. IIR 2019: 10-11 - [c8]Flavio Toffalini, Eleonora Losiouk, Andrea Biondo, Jianying Zhou, Mauro Conti:
ScaRR: Scalable Runtime Remote Attestation for Complex Systems. RAID 2019: 121-134 - [c7]Anh Pham, Italo Dacosta, Eleonora Losiouk, John Stephan, Kévin Huguenin, Jean-Pierre Hubaux:
HideMyApp: Hiding the Presence of Sensitive Apps on Android. USENIX Security Symposium 2019: 711-728 - [c6]Abdelmadjid Benarfa, Muhammad Hassan, Alberto Compagno, Eleonora Losiouk, Mohamed Bachir Yagoubi, Mauro Conti:
ChoKIFA: A New Detection and Mitigation Approach Against Interest Flooding Attacks in NDN. WWIC 2019: 53-65 - [i2]Mauro Conti, Ankit Gangwal, Muhammad Hassan, Chhagan Lal, Eleonora Losiouk:
The Road Ahead for Networking: A Survey on ICN-IP Coexistence Solutions. CoRR abs/1903.07446 (2019) - 2018
- [j2]Enea Parimbelli, B. Bottalico, Eleonora Losiouk, M. Tomasi, Amedeo Santosuosso, Giordano Lanzola, Silvana Quaglini, Riccardo Bellazzi:
Trusting telemedicine: A discussion on risks, safety, legal implications and liability of involved stakeholders. Int. J. Medical Informatics 112: 90-98 (2018) - [i1]Flavio Toffalini, Andrea Biondo, Eleonora Losiouk, Jianying Zhou, Mauro Conti:
SCARR: A Novel Scalable Runtime Remote Attestation. CoRR abs/1807.08003 (2018) - 2017
- [c5]Giordano Lanzola, Rosangela Boninsegna, Eleonora Losiouk, Elisa Maria Zini, Silvana Quaglini, Virginia Ferretti, Alessandro Corso:
An mHealth app counseling patients and general practitioners about Multiple Myeloma. RTSI 2017: 1-6 - [c4]Eleonora Losiouk, Giordano Lanzola, Alfonso Galderisi, Daniele Trevisanuto, Garry M. Steil, Andrea Facchinetti, Claudio Cobelli:
A telemonitoring service supporting preterm newborns care in a neonatal intensive care unit. RTSI 2017: 1-6 - 2016
- [j1]Giordano Lanzola, Eleonora Losiouk, Simone Del Favero, Andrea Facchinetti, Alfonso Galderisi, Silvana Quaglini, Lalo Magni, Claudio Cobelli:
Remote Blood Glucose Monitoring in mHealth Scenarios: A Review. Sensors 16(12): 1983 (2016) - [c3]Eleonora Losiouk, Silvana Quaglini, Enrico Visetti, Francesca Perfetti, Giordano Lanzola:
Ambulance Protocols: A Mobile Solution. Nursing Informatics 2016: 520-524 - 2015
- [c2]Eleonora Losiouk, Giordano Lanzola, Enrico Visetti, Silvana Quaglini:
An environment for representing and using medical checklists on mobile devices. EMBC 2015: 7328-7331 - [c1]Eleonora Losiouk, Silvana Quaglini, Massimo Pesenti Campagnoni, Giordano Lanzola:
A Mobile Platform for Emergency Care. MIE 2015: 818-822
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint