Igor Nai Fovino
Igor Nai Fovino
Verified email at
Cited by
Cited by
State-of-the-art in privacy preserving data mining
VS Verykios, E Bertino, IN Fovino, LP Provenza, Y Saygin, Y Theodoridis
ACM Sigmod Record 33 (1), 50-57, 2004
A multidimensional critical state analysis for detecting intrusions in SCADA systems
A Carcano, A Coletta, M Guglielmi, M Masera, IN Fovino, A Trombetta
IEEE Transactions on Industrial Informatics 7 (2), 179-186, 2011
A Framework for Evaluating Privacy Preserving Data Mining Algorithms*
E Bertino, IN Fovino, LP Provenza
Data Mining and Knowledge Discovery 11, 121-154, 2005
A blockchain-based approach for data accountability and provenance tracking
R Neisse, G Steri, I Nai-Fovino
Proceedings of the 12th international conference on availability …, 2017
Modbus/DNP3 state-based intrusion detection system
IN Fovino, A Carcano, TDL Murel, A Trombetta, M Masera
2010 24th IEEE International Conference on Advanced Information Networking …, 2010
Integrating cyber attacks within fault trees
IN Fovino, M Masera, A De Cian
Reliability Engineering & System Safety 94 (9), 1394-1402, 2009
Security and privacy issues for an IoT based smart home
D Geneiatakis, I Kounelis, R Neisse, I Nai-Fovino, G Steri, G Baldini
2017 40th International Convention on Information and Communication …, 2017
Design and implementation of a secure modbus protocol
IN Fovino, A Carcano, M Masera, A Trombetta
Critical Infrastructure Protection III: Third Annual IFIP WG 11.10 …, 2009
An experimental investigation of malware attacks on SCADA systems
IN Fovino, A Carcano, M Masera, A Trombetta
International Journal of Critical Infrastructure Protection 2 (4), 139-145, 2009
SecKit: a model-based security toolkit for the internet of things
R Neisse, G Steri, IN Fovino, G Baldini
computers & security 54, 60-76, 2015
Critical state-based filtering system for securing SCADA network protocols
IN Fovino, A Coletta, A Carcano, M Masera
IEEE Transactions on industrial electronics 59 (10), 3943-3950, 2011
A cyber-physical experimentation environment for the security analysis of networked industrial control systems
B Genge, C Siaterlis, IN Fovino, M Masera
Computers & Electrical Engineering 38 (5), 1146-1161, 2012
An experimental platform for assessing SCADA vulnerabilities and countermeasures in power plants
IN Fovino, M Masera, L Guidi, G Carpi
3rd International Conference on Human System Interaction, 679-686, 2010
Demystifying COVID-19 digital contact tracing: A survey on frameworks and mobile apps
T Martin, G Karopoulos, JL Hernández-Ramos, G Kambourakis, ...
Wireless Communications and Mobile Computing 2020, 1-29, 2020
State-based network intrusion detection systems for SCADA protocols: a proof of concept
A Carcano, IN Fovino, M Masera, A Trombetta
Critical Information Infrastructures Security: 4th International Workshop …, 2010
A Permission verification approach for android mobile applications
D Geneiatakis, IN Fovino, I Kounelis, P Stirparo
Computers & Security 49, 192-205, 2015
Fostering consumers' energy market through smart contracts
I Kounelis, G Steri, R Giuliani, D Geneiatakis, R Neisse, I Nai-Fovino
2017 International Conference in Energy and Sustainability in Small …, 2017
An early warning system for detecting GSM-R wireless interference in the high-speed railway infrastructure
G Baldini, IN Fovino, M Masera, M Luise, V Pellegrini, E Bagagli, ...
International Journal of Critical Infrastructure Protection 3 (3-4), 140-156, 2010
Through the description of attacks: A multidimensional view
IN Fovino, M Masera
Computer Safety, Reliability, and Security: 25th International Conference …, 2006
Cyber security assessment of a power plant
IN Fovino, L Guidi, M Masera, A Stefanini
Electric Power Systems Research 81 (2), 518-526, 2011
The system can't perform the operation now. Try again later.
Articles 1–20