Follow
Igor Nai Fovino
Igor Nai Fovino
Verified email at ec.europa.eu
Title
Cited by
Cited by
Year
State-of-the-art in privacy preserving data mining
VS Verykios, E Bertino, IN Fovino, LP Provenza, Y Saygin, Y Theodoridis
ACM Sigmod Record 33 (1), 50-57, 2004
12212004
A multidimensional critical state analysis for detecting intrusions in SCADA systems
A Carcano, A Coletta, M Guglielmi, M Masera, IN Fovino, A Trombetta
IEEE Transactions on Industrial Informatics 7 (2), 179-186, 2011
3402011
A blockchain-based approach for data accountability and provenance tracking
R Neisse, G Steri, I Nai-Fovino
Proceedings of the 12th international conference on availability …, 2017
2792017
A Framework for Evaluating Privacy Preserving Data Mining Algorithms*
E Bertino, IN Fovino, LP Provenza
Data Mining and Knowledge Discovery 11, 121-154, 2005
2712005
Integrating cyber attacks within fault trees
IN Fovino, M Masera, A De Cian
Reliability Engineering & System Safety 94 (9), 1394-1402, 2009
2192009
Modbus/DNP3 state-based intrusion detection system
IN Fovino, A Carcano, TDL Murel, A Trombetta, M Masera
2010 24th IEEE International Conference on Advanced Information Networking …, 2010
2182010
Security and privacy issues for an IoT based smart home
D Geneiatakis, I Kounelis, R Neisse, I Nai-Fovino, G Steri, G Baldini
2017 40th international convention on information and communication …, 2017
2082017
Design and implementation of a secure modbus protocol
IN Fovino, A Carcano, M Masera, A Trombetta
Critical Infrastructure Protection III: Third Annual IFIP WG 11.10 …, 2009
1832009
SecKit: a model-based security toolkit for the internet of things
R Neisse, G Steri, IN Fovino, G Baldini
computers & security 54, 60-76, 2015
1552015
An experimental investigation of malware attacks on SCADA systems
IN Fovino, A Carcano, M Masera, A Trombetta
International Journal of Critical Infrastructure Protection 2 (4), 139-145, 2009
1492009
Critical state-based filtering system for securing SCADA network protocols
IN Fovino, A Coletta, A Carcano, M Masera
IEEE Transactions on industrial electronics 59 (10), 3943-3950, 2011
1422011
Demystifying COVID‐19 digital contact tracing: A survey on frameworks and mobile apps
T Martin, G Karopoulos, JL Hernández-Ramos, G Kambourakis, ...
Wireless Communications and Mobile Computing 2020 (1), 8851429, 2020
1212020
A cyber-physical experimentation environment for the security analysis of networked industrial control systems
B Genge, C Siaterlis, IN Fovino, M Masera
Computers & Electrical Engineering 38 (5), 1146-1161, 2012
1112012
An experimental platform for assessing SCADA vulnerabilities and countermeasures in power plants
IN Fovino, M Masera, L Guidi, G Carpi
3rd International Conference on Human System Interaction, 679-686, 2010
1082010
State-based network intrusion detection systems for SCADA protocols: a proof of concept
A Carcano, IN Fovino, M Masera, A Trombetta
Critical Information Infrastructures Security: 4th International Workshop …, 2010
1012010
A Permission verification approach for android mobile applications
D Geneiatakis, IN Fovino, I Kounelis, P Stirparo
Computers & Security 49, 192-205, 2015
962015
Fostering consumers' energy market through smart contracts
I Kounelis, G Steri, R Giuliani, D Geneiatakis, R Neisse, I Nai-Fovino
2017 international conference in energy and sustainability in small …, 2017
872017
Blockchain performance analysis for supporting cross-border E-government services
D Geneiatakis, Y Soupionis, G Steri, I Kounelis, R Neisse, I Nai-Fovino
IEEE Transactions on Engineering Management 67 (4), 1310-1322, 2020
782020
An early warning system for detecting GSM-R wireless interference in the high-speed railway infrastructure
G Baldini, IN Fovino, M Masera, M Luise, V Pellegrini, E Bagagli, ...
International Journal of Critical Infrastructure Protection 3 (3-4), 140-156, 2010
652010
Through the description of attacks: A multidimensional view
IN Fovino, M Masera
Computer Safety, Reliability, and Security: 25th International Conference …, 2006
602006
The system can't perform the operation now. Try again later.
Articles 1–20