Nelson Uto

According to our database1, Nelson Uto authored at least 8 papers between 2005 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book  In proceedings  Article  PhD thesis  Dataset  Other 

Links

On csauthors.net:

Bibliography

2025
Revisiting the Effectiveness of Jailbreak Detection.
Proceedings of the Computer Security. ESORICS 2025 International Workshops, 2025

2014
Implementation Aspects of MeterGoat, a Smart Meter Security Training Platform.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

Implementation aspects of software guards: A case study.
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014

2013
A Methodology for Retrieving Information from Malware Encrypted Output Files: Brazilian Case Studies.
Future Internet, 2013

Security Analysis of Touch Inputted Passwords - A Preliminary Study Based on the Resistance against Brute Force Attacks.
Proceedings of the Network and System Security - 7th International Conference, 2013

2012
Implementation of tools for brute forcing touch inputted passwords.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

Retrieving Information from Malware Encrypted Output Files: Two Case Studies from Brazil.
Proceedings of the 2012 IEEE International Conference on Green Computing and Communications, 2012

2005
Generating security event correlation rules through k-means clustering.
Proceedings of the ICETE 2005, 2005


  Loading...