Eleonora Losiouk

Orcid: 0000-0002-2315-7823

According to our database1, Eleonora Losiouk authored at least 35 papers between 2015 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
VEDRANDO: A Novel Way to Reveal Stealthy Attack Steps on Android through Memory Forensics.
J. Cybersecur. Priv., July, 2023

Security and Privacy of IP-ICN Coexistence: A Comprehensive Survey.
IEEE Commun. Surv. Tutorials, 2023

E-Spoofer: Attacking and Defending Xiaomi Electric Scooter Ecosystem.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023

Beware of Pickpockets: A Practical Attack against Blocking Cards.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

GNN4IFA: Interest Flooding Attack Detection With Graph Neural Networks.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

2022
BreakMi: Reversing, Exploiting and Fixing Xiaomi Fitness Tracking Ecosystem.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

Side-channel attacks on mobile and IoT devices for Cyber-Physical systems.
Comput. Networks, 2022

Face Recognition Systems: Are you sure they only consider your face?
Proceedings of the 43rd IEEE Security and Privacy, 2022

What you see is not what you get: a man-in-the-middle attack applied to video channels.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022

HolA: Holistic and Autonomous Attestation for IoT Networks.
Proceedings of the Applied Cryptography and Network Security Workshops, 2022

Sim2Testbed Transfer: NDN Performance Evaluation.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Do not let Next-Intent Vulnerability be your next nightmare: type system-based approach to detect it in Android apps.
Int. J. Inf. Sec., 2021

ChoKIFA+: an early detection and mitigation approach against interest flooding attacks in NDN.
Int. J. Inf. Sec., 2021

Vulnerabilities in Android webview objects: Still not the end!
Comput. Secur., 2021

ICN PATTA: ICN Privacy Attack Through Traffic Analysis.
Proceedings of the 46th IEEE Conference on Local Computer Networks, 2021

Contact Tracing Made Un-relay-able.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

Repack Me If You Can: An Anti-Repackaging Solution Based on Android Virtualization.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
How do interval scales help us with better understanding IR evaluation measures?
Inf. Retr. J., 2020

Mascara: A Novel Attack Leveraging Android Virtualization.
CoRR, 2020

The Road Ahead for Networking: A Survey on ICN-IP Coexistence Solutions.
IEEE Commun. Surv. Tutorials, 2020

Spatial bloom filter in named data networking: a memory efficient solution.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

A Proactive Cache Privacy Attack on NDN.
Proceedings of the NOMS 2020, 2020

2019
ChoKIFA: A New Detection and Mitigation Approach Against Interest Flooding Attacks in NDN.
Proceedings of the Wired/Wireless Internet Communications, 2019

HideMyApp: Hiding the Presence of Sensitive Apps on Android.
Proceedings of the 28th USENIX Security Symposium, 2019

ScaRR: Scalable Runtime Remote Attestation for Complex Systems.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

Scales of Evaluation Measures: From Theory to Experimentation.
Proceedings of the 10th Italian Information Retrieval Workshop, 2019

Stochastic Relevance for Crowdsourcing.
Proceedings of the Advances in Information Retrieval, 2019

2018
Trusting telemedicine: A discussion on risks, safety, legal implications and liability of involved stakeholders.
Int. J. Medical Informatics, 2018

SCARR: A Novel Scalable Runtime Remote Attestation.
CoRR, 2018

2017
A telemonitoring service supporting preterm newborns care in a neonatal intensive care unit.
Proceedings of the 3rd IEEE International Forum on Research and Technologies for Society and Industry, 2017

An mHealth app counseling patients and general practitioners about Multiple Myeloma.
Proceedings of the 3rd IEEE International Forum on Research and Technologies for Society and Industry, 2017

2016
Remote Blood Glucose Monitoring in <i>mHealth</i> Scenarios: A Review.
Sensors, 2016

Ambulance Protocols: A Mobile Solution.
Proceedings of the Nursing Informatics 2016 - eHealth for All: Every Level Collaboration, 2016

2015
A Mobile Platform for Emergency Care.
Proceedings of the Digital Healthcare Empowering Europeans, 2015

An environment for representing and using medical checklists on mobile devices.
Proceedings of the 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2015


  Loading...