Igor Nai Fovino
Igor Nai Fovino
Verified email at
Cited by
Cited by
State-of-the-art in privacy preserving data mining
VS Verykios, E Bertino, IN Fovino, LP Provenza, Y Saygin, Y Theodoridis
ACM Sigmod Record 33 (1), 50-57, 2004
A multidimensional critical state analysis for detecting intrusions in SCADA systems
A Carcano, A Coletta, M Guglielmi, M Masera, IN Fovino, A Trombetta
IEEE Transactions on Industrial Informatics 7 (2), 179-186, 2011
A framework for evaluating privacy preserving data mining algorithms
E Bertino, IN Fovino, LP Provenza
Data Mining and Knowledge Discovery 11 (2), 121-154, 2005
A blockchain-based approach for data accountability and provenance tracking
R Neisse, G Steri, I Nai-Fovino
Proceedings of the 12th international conference on availability …, 2017
Modbus/DNP3 state-based intrusion detection system
IN Fovino, A Carcano, TDL Murel, A Trombetta, M Masera
2010 24th IEEE International Conference on Advanced Information Networking …, 2010
Integrating cyber attacks within fault trees
IN Fovino, M Masera, A De Cian
Reliability Engineering & System Safety 94 (9), 1394-1402, 2009
Security and privacy issues for an IoT based smart home
D Geneiatakis, I Kounelis, R Neisse, I Nai-Fovino, G Steri, G Baldini
2017 40th International Convention on Information and Communication …, 2017
An experimental investigation of malware attacks on SCADA systems
IN Fovino, A Carcano, M Masera, A Trombetta
International Journal of Critical Infrastructure Protection 2 (4), 139-145, 2009
SecKit: a model-based security toolkit for the internet of things
R Neisse, G Steri, IN Fovino, G Baldini
computers & security 54, 60-76, 2015
Design and implementation of a secure modbus protocol
IN Fovino, A Carcano, M Masera, A Trombetta
International conference on critical infrastructure protection, 83-96, 2009
Critical state-based filtering system for securing SCADA network protocols
IN Fovino, A Coletta, A Carcano, M Masera
IEEE Transactions on industrial electronics 59 (10), 3943-3950, 2011
An experimental platform for assessing SCADA vulnerabilities and countermeasures in power plants
IN Fovino, M Masera, L Guidi, G Carpi
3rd International Conference on Human System Interaction, 679-686, 2010
A cyber-physical experimentation environment for the security analysis of networked industrial control systems
B Genge, C Siaterlis, IN Fovino, M Masera
Computers & Electrical Engineering 38 (5), 1146-1161, 2012
State-based network intrusion detection systems for SCADA protocols: a proof of concept
A Carcano, IN Fovino, M Masera, A Trombetta
International Workshop on Critical Information Infrastructures Security, 138-150, 2009
A Permission verification approach for android mobile applications
D Geneiatakis, IN Fovino, I Kounelis, P Stirparo
Computers & Security 49, 192-205, 2015
Demystifying COVID-19 digital contact tracing: A survey on frameworks and mobile apps
T Martin, G Karopoulos, JL Hernández-Ramos, G Kambourakis, ...
Wireless Communications and Mobile Computing 2020, 2020
Fostering consumers' energy market through smart contracts
I Kounelis, G Steri, R Giuliani, D Geneiatakis, R Neisse, I Nai-Fovino
2017 International Conference in Energy and Sustainability in Small …, 2017
Cyber security assessment of a power plant
IN Fovino, L Guidi, M Masera, A Stefanini
Electric Power Systems Research 81 (2), 518-526, 2011
An early warning system for detecting GSM-R wireless interference in the high-speed railway infrastructure
G Baldini, IN Fovino, M Masera, M Luise, V Pellegrini, E Bagagli, ...
International Journal of Critical Infrastructure Protection 3 (3-4), 140-156, 2010
Through the description of attacks: A multidimensional view
IN Fovino, M Masera
International Conference on Computer Safety, Reliability, and Security, 15-28, 2006
The system can't perform the operation now. Try again later.
Articles 1–20