Igor Nai Fovino
Igor Nai Fovino
Verified email at jrc.ec.europa.eu
Cited by
Cited by
State-of-the-art in privacy preserving data mining
VS Verykios, E Bertino, IN Fovino, LP Provenza, Y Saygin, Y Theodoridis
ACM Sigmod Record 33 (1), 50-57, 2004
A multidimensional critical state analysis for detecting intrusions in SCADA systems
A Carcano, A Coletta, M Guglielmi, M Masera, IN Fovino, A Trombetta
IEEE Transactions on Industrial Informatics 7 (2), 179-186, 2011
A framework for evaluating privacy preserving data mining algorithms
E Bertino, IN Fovino, LP Provenza
Data Mining and Knowledge Discovery 11 (2), 121-154, 2005
Integrating cyber attacks within fault trees
IN Fovino, M Masera, A De Cian
Reliability Engineering & System Safety 94 (9), 1394-1402, 2009
Modbus/DNP3 state-based intrusion detection system
IN Fovino, A Carcano, TDL Murel, A Trombetta, M Masera
2010 24th IEEE International Conference on Advanced Information Networking …, 2010
An experimental investigation of malware attacks on SCADA systems
IN Fovino, A Carcano, M Masera, A Trombetta
International Journal of Critical Infrastructure Protection 2 (4), 139-145, 2009
Critical state-based filtering system for securing SCADA network protocols
IN Fovino, A Coletta, A Carcano, M Masera
IEEE Transactions on industrial electronics 59 (10), 3943-3950, 2011
SecKit: a model-based security toolkit for the internet of things
R Neisse, G Steri, IN Fovino, G Baldini
computers & security 54, 60-76, 2015
Design and implementation of a secure modbus protocol
IN Fovino, A Carcano, M Masera, A Trombetta
International conference on critical infrastructure protection, 83-96, 2009
A cyber-physical experimentation environment for the security analysis of networked industrial control systems
BL Genge, C Siaterlis, IN Fovino, M Masera
Computers & Electrical Engineering 38 (5), 1146-1161, 2012
An experimental platform for assessing SCADA vulnerabilities and countermeasures in power plants
IN Fovino, M Masera, L Guidi, G Carpi
3rd International Conference on Human System Interaction, 679-686, 2010
State-based network intrusion detection systems for SCADA protocols: a proof of concept
A Carcano, IN Fovino, M Masera, A Trombetta
International Workshop on Critical Information Infrastructures Security, 138-150, 2009
A Permission verification approach for android mobile applications
D Geneiatakis, IN Fovino, I Kounelis, P Stirparo
Computers & Security 49, 192-205, 2015
Cyber security assessment of a power plant
IN Fovino, L Guidi, M Masera, A Stefanini
Electric Power Systems Research 81 (2), 518-526, 2011
Through the description of attacks: A multidimensional view
IN Fovino, M Masera
International Conference on Computer Safety, Reliability, and Security, 15-28, 2006
An early warning system for detecting GSM-R wireless interference in the high-speed railway infrastructure
G Baldini, IN Fovino, M Masera, M Luise, V Pellegrini, E Bagagli, ...
international journal of critical infrastructure protection 3 (3-4), 140-156, 2010
Effects of intentional threats to power substation control systems
G Dondossola, J Szanto, M Masera, I Nai Fovino
International journal of critical infrastructures 4 (1-2), 129-143, 2008
A service-oriented approach for assessing infrastructure security
M Masera, IN Fovino
International Conference on Critical Infrastructure Protection, 367-379, 2007
Analyzing cyber-physical attacks on networked industrial control systems
B Genge, IN Fovino, C Siaterlis, M Masera
International Conference on Critical Infrastructure Protection, 167-183, 2011
Emergent disservices in interdependent systems and system-of-systems
IN Fovino, M Masera
2006 IEEE International Conference on Systems, Man and Cybernetics 1, 590-595, 2006
The system can't perform the operation now. Try again later.
Articles 1–20