Enrico Lovat

According to our database1, Enrico Lovat authored at least 16 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Learning When to Say Goodbye: What Should be the Shelf Life of an Indicator of Compromise?
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

Cream Skimming the Underground: Identifying Relevant Information Points from Online Forums.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

2021
On the Flow of Software Security Advisories.
IEEE Trans. Netw. Serv. Manag., 2021

2020
Measuring and Modeling Software Vulnerability Security Advisory Platforms.
Proceedings of the Risks and Security of Internet and Systems, 2020

2016
Generating behavior-based malware detection models with genetic programming.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Sound and Precise Cross-Layer Data Flow Tracking.
Proceedings of the Engineering Secure Software and Systems - 8th International Symposium, 2016

2015
Cross-layer Data-centric Usage Control.
PhD thesis, 2015

SHRIFT System-Wide HybRid Information Flow Tracking.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

2014
Structure Matters - A New Approach for Data Flow Tracking.
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014

Cross-Layer Data-Centric Usage Control.
Proceedings of the 2014 ESSoS Doctoral Symposium co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2014), 2014

On quantitative dynamic data flow tracking.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

DroidForce: Enforcing Complex, Data-centric, System-wide Policies in Android.
Proceedings of the Ninth International Conference on Availability, 2014

2011
A virtualized usage control bus system.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011

Data-centric multi-layer usage control enforcement: a social network example.
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, 2011

Representation-Independent Data Usage Control.
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011

A Hypervisor-Based Bus System for Usage Control.
Proceedings of the Sixth International Conference on Availability, 2011


  Loading...