Gustavo Betarte
Orcid: 0000-0002-6863-1082
According to our database1,
Gustavo Betarte
authored at least 50 papers
between 1999 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
J. Internet Serv. Appl., 2024
A process mining-based method for attacker profiling using the MITRE ATT&CK taxonomy.
J. Internet Serv. Appl., 2024
A Formal Analysis of the Mimblewimble Cryptocurrency Protocol with a Security Approach.
CLEI Electron. J., 2024
CLEI Electron. J., 2024
Capturing the security expert knowledge in feature selection for web application attack detection.
Proceedings of the 13th Latin-American Symposium on Dependable and Secure Computing, 2024
Proceedings of the 13th Latin-American Symposium on Dependable and Secure Computing, 2024
Proceedings of the L Latin American Computer Conference, 2024
2023
A Blockchain based and GDPR-compliant design of a system for digital education certificates.
CLEI Electron. J., May, 2023
Proceedings of the 12th Latin-American Symposium on Dependable and Secure Computing, 2023
Proceedings of the 12th Latin-American Symposium on Dependable and Secure Computing, 2023
Proceedings of the XLIX Latin American Computer Conference, 2023
2022
CLEI Electron. J., 2022
An Idealized Model for the Formal Security Analysis of the Mimblewimble Cryptocurrency Protocol.
Proceedings of the XLVIII Latin American Computer Conference, 2022
2021
Proceedings of the 4th IEEE/ACM International Workshop on Emerging Trends in Software Engineering for Blockchain, 2021
Exploring the Application of Process Mining Techniques to Improve Web Application Security.
Proceedings of the XLVII Latin American Computing Conference, 2021
Proceedings of the XLVII Latin American Computing Conference, 2021
Privacy-aware blockchain solutions: design and threat analysis.
Proceedings of the 24th Iberoamerican Conference on Software Engineering, 2021
Proceedings of the Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, 2021
2020
System-Level Non-interference of Constant-Time Cryptography. Part II: Verified Static Analysis and Stealth Memory.
J. Autom. Reason., 2020
Towards a Formally Verified Implementation of the MimbleWimble Cryptocurrency Protocol.
Proceedings of the Applied Cryptography and Network Security Workshops, 2020
2019
J. Autom. Reason., 2019
2018
A formal approach for the verification of the permission-based security model of Android.
CLEI Electron. J., 2018
Proceedings of the IV School on Systems and Networks, 2018
Proceedings of the 37th International Conference of the Chilean Computer Science Society, 2018
Proceedings of the 8th Latin-American Symposium on Dependable Computing, 2018
Proceedings of the 17th IEEE International Conference on Machine Learning and Applications, 2018
Proceedings of the 17th IEEE International Conference on Machine Learning and Applications, 2018
2017
Proceedings of the Logic-Based Program Synthesis and Transformation, 2017
Proceedings of the 2017 XLIII Latin American Computer Conference, 2017
2016
Sci. Ann. Comput. Sci., 2016
Proceedings of the 2016 Seventh Latin-American Symposium on Dependable Computing, 2016
2015
Formal Analysis of Security Models for Mobile Devices, Virtualization Platforms, and Domain Name Systems.
CLEI Electron. J., 2015
Proceedings of the 4th International Workshop "What can FCA do for Artificial Intelligence?", 2015
Proceedings of the Theoretical Aspects of Computing - ICTAC 2015, 2015
2014
IACR Cryptol. ePrint Arch., 2014
2013
Proceedings of the 19th International Conference on Types for Proofs and Programs, 2013
Proceedings of the 2013 XXXIX Latin American Computing Conference (CLEI), 2013
2012
Proceedings of the 25th IEEE Computer Security Foundations Symposium, 2012
2011
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2011
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011
Formally Verifying Isolation and Availability in an Idealized Model of Virtualization.
Proceedings of the FM 2011: Formal Methods, 2011
2009
Proceedings of the 2009 International Conference of the Chilean Computer Science Society, 2009
Proceedings of the 2009 International Conference of the Chilean Computer Science Society, 2009
2008
A Framework for the Analysis of Access Control Models for Interactive Mobile Devices.
Proceedings of the Types for Proofs and Programs, International Conference, 2008
2006
Proceedings of the Formal Aspects in Security and Trust, Fourth International Workshop, 2006
2000
1999
Proceedings of the Types for Proofs and Programs, 1999