default search action
Igor Nai Fovino
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c38]Dermot O'Brien, Vasileios Christaras, Ioannis Kounelis, Igor Nai Fovino, Georgios Fontaras:
Blockchain for Transport (BC4 T), Performance Simulations of Blockchain Network for Emission Monitoring. KST 2022: 1-6 - 2021
- [j25]José Luis Hernández Ramos, Georgios Karopoulos, Dimitris Geneiatakis, Tania Martin, Georgios Kambourakis, Igor Nai Fovino:
Sharing Pandemic Vaccination Certificates through Blockchain: Case Study and Performance Evaluation. Wirel. Commun. Mob. Comput. 2021: 2427896:1-2427896:12 (2021) - [i3]José Luis Hernández Ramos, Georgios Karopoulos, Dimitris Geneiatakis, Tania Martin, Georgios Kambourakis, Igor Nai Fovino:
Sharing pandemic vaccination certificates through blockchain: Case study and performance evaluation. CoRR abs/2101.04575 (2021) - 2020
- [j24]José Luis Hernández Ramos, Dimitris Geneiatakis, Ioannis Kounelis, Gary Steri, Igor Nai Fovino:
Toward a Data-Driven Society: A Technological Perspective on the Development of Cybersecurity and Data-Protection Policies. IEEE Secur. Priv. 18(1): 28-38 (2020) - [j23]Gianmarco Baldini, José Luis Hernández Ramos, Gary Steri, Ricardo Neisse, Igor Nai Fovino:
A Review on the Application of Distributed Ledgers in the Evolution of Road Transport. IEEE Internet Comput. 24(6): 27-36 (2020) - [j22]Tania Martin, Dimitrios Geneiatakis, Ioannis Kounelis, Stéphanie Kerckhof, Igor Nai Fovino:
Towards a Formal IoT Security Model. Symmetry 12(8): 1305 (2020) - [j21]Dimitris Geneiatakis, Yannis Soupionis, Gary Steri, Ioannis Kounelis, Ricardo Neisse, Igor Nai Fovino:
Blockchain Performance Analysis for Supporting Cross-Border E-Government Services. IEEE Trans. Engineering Management 67(4): 1310-1322 (2020) - [j20]Tania Martin, Georgios Karopoulos, José Luis Hernández Ramos, Georgios Kambourakis, Igor Nai Fovino:
Demystifying COVID-19 Digital Contact Tracing: A Survey on Frameworks and Mobile Apps. Wirel. Commun. Mob. Comput. 2020: 8851429:1-8851429:29 (2020) - [i2]Tania Martin, Georgios Karopoulos, José Luis Hernández Ramos, Georgios Kambourakis, Igor Nai Fovino:
Demystifying COVID-19 digital contact tracing: A survey on frameworks and mobile apps. CoRR abs/2007.11687 (2020)
2010 – 2019
- 2018
- [c37]Dimitris Geneiatakis, Gianmarco Baldini, Igor Nai Fovino, Ioannis Vakalis:
Towards a Mobile Malware Detection Framework with the Support of Machine Learning. Euro-CYBERSEC 2018: 119-129 - [e2]Sajal Bhatia, Alvaro A. Cárdenas, Ernest Foo, Marina Krotofil, Sye Loong Keoh, Thomas Locher, Daisuke Mashima, Tommy H. Morris, John Mulder, Stephen McLaughlin, Igor Nai Fovino, Julian L. Rrushi, Bradley L. Schatz, Jared Smith, Saman A. Zonouz, Tim Zimmerman:
Proceedings of the 4th Annual Industrial Control System Security Workshop, ICSS 2018, San Juan, PR, USA, December 4, 2018. ACM 2018, ISBN 978-1-4503-6220-7 [contents] - [e1]Marit Hansen, Eleni Kosta, Igor Nai Fovino, Simone Fischer-Hübner:
Privacy and Identity Management. The Smart Revolution - 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papers. IFIP Advances in Information and Communication Technology 526, Springer 2018, ISBN 978-3-319-92924-8 [contents] - 2017
- [c36]Ricardo Neisse, Gary Steri, Igor Nai Fovino:
A Blockchain-based Approach for Data Accountability and Provenance Tracking. ARES 2017: 14:1-14:10 - [c35]Dimitris Geneiatakis, Ioannis Kounelis, Ricardo Neisse, Igor Nai Fovino, Gary Steri, Gianmarco Baldini:
Security and privacy issues for an IoT based smart home. MIPRO 2017: 1292-1297 - [c34]Eleni Kosta, Igor Nai Fovino, Simone Fischer-Hübner, Marit Hansen, Charles D. Raab, Ignacio Sanchez, Diane Whitehouse:
The Smart World Revolution. Privacy and Identity Management 2017: 3-12 - [c33]Ricardo Neisse, Gary Steri, Igor Nai Fovino:
Blockchain-based Identity Management and Data Usage Control (Extended Abstract). Privacy and Identity Management 2017: 237-239 - [i1]Ricardo Neisse, Gary Steri, Igor Nai Fovino:
A Blockchain-based Approach for Data Accountability and Provenance Tracking. CoRR abs/1706.04507 (2017) - 2016
- [j19]Ricardo Neisse, Gary Steri, Dimitris Geneiatakis, Igor Nai Fovino:
A privacy enforcing framework for Android applications. Comput. Secur. 62: 257-277 (2016) - [c32]Gary Steri, Gianmarco Baldini, Igor Nai Fovino, Ricardo Neisse, Leonardo Goratti:
A novel multi-hop secure LTE-D2D communication protocol for IoT scenarios. ICT 2016: 1-6 - 2015
- [j18]Dimitris Geneiatakis, Igor Nai Fovino, Ioannis Kounelis, Pasquale Stirparo:
A Permission verification approach for android mobile applications. Comput. Secur. 49: 192-205 (2015) - [j17]Ricardo Neisse, Gary Steri, Igor Nai Fovino, Gianmarco Baldini:
SecKit: A Model-based Security Toolkit for the Internet of Things. Comput. Secur. 54: 60-76 (2015) - [c31]Dimitris Geneiatakis, Riccardo Satta, Igor Nai Fovino, Ricardo Neisse:
On the Efficacy of Static Features to Detect Malicious Applications in Android. TrustBus 2015: 87-98 - 2014
- [j16]Andreas Polydoros, Nikos Dimitriou, Gianmarco Baldini, Igor Nai Fovino, Marco Taddeo, Antonio M. Cipriano:
Public Protection and Disaster Relief Communication System Integrity: A Radio-Flexibility and Identity-Based Cryptography Approach. IEEE Veh. Technol. Mag. 9(4): 51-60 (2014) - [c30]Ricardo Neisse, Igor Nai Fovino, Gianmarco Baldini, Vera Stavroulaki, Panagiotis Vlacheas, Raffaele Giaffreda:
A Model-Based Security Toolkit for the Internet of Things. ARES 2014: 78-87 - [c29]Ignacio Sanchez, Riccardo Satta, Igor Nai Fovino, Gianmarco Baldini, Gary Steri, David Shaw, Andrea Ciardulli:
Privacy leakages in Smart Home wireless technologies. ICCST 2014: 1-6 - [p2]Igor Nai Fovino:
SCADA System Cyber Security. Secure Smart Embedded Devices, Platforms and Applications 2014: 451-471 - 2013
- [j15]Emiliano Casalicchio, Marco Caselli, Alessio Coletta, Igor Nai Fovino:
DNS as critical infrastructure, the energy system case study. Int. J. Crit. Infrastructures 9(1/2): 111-129 (2013) - [j14]Saeed Abu-Nimeh, Ernest Foo, Igor Nai Fovino, Manimaran Govindarasu, Thomas Morris:
Cyber security of networked critical infrastructures [Guest Editorial]. IEEE Netw. 27(1): 3-4 (2013) - [j13]Gianmarco Baldini, Igor Nai Fovino, Stefano Braghin, Alberto Trombetta:
Distributed access control policies for spectrum sharing. Secur. Commun. Networks 6(8): 925-935 (2013) - [c28]Gianmarco Baldini, Ioannis Kounelis, Igor Nai Fovino, Ricardo Neisse:
A Framework for Privacy Protection and Usage Control of Personal Data in a Smart City Scenario. CRITIS 2013: 212-217 - [c27]Gianmarco Baldini, Vincent Mahieu, Igor Nai Fovino, Alberto Trombetta, Marco Taddeo:
Identity-based security systems for vehicular ad-hoc networks. ICCVE 2013: 672-678 - [c26]Pasquale Stirparo, Igor Nai Fovino, Ioannis Kounelis:
Data-in-use leakages from Android memory - Test and analysis. WiMob 2013: 701-708 - [c25]Pasquale Stirparo, Igor Nai Fovino, Marco Taddeo, Ioannis Kounelis:
In-memory credentials robbery on android phones. WorldCIS 2013: 88-93 - 2012
- [j12]Béla Genge, Christos Siaterlis, Igor Nai Fovino, Marcelo Masera:
A cyber-physical experimentation environment for the security analysis of networked industrial control systems. Comput. Electr. Eng. 38(5): 1146-1161 (2012) - [j11]Igor Nai Fovino, Alessio Coletta, Andrea Carcano, Marcelo Masera:
Critical State-Based Filtering System for Securing SCADA Network Protocols. IEEE Trans. Ind. Electron. 59(10): 3943-3950 (2012) - [c24]Görkem Kilinç, Igor Nai Fovino:
Distributed Identity Based Private Key Generation for SCADA Systems. CRITIS 2012: 118-129 - [c23]Emiliano Casalicchio, Marco Caselli, Alessio Coletta, Salvatore Di Blasi, Igor Nai Fovino:
Measuring Name System Health. Critical Infrastructure Protection 2012: 155-169 - [c22]Görkem Kilinç, Igor Nai Fovino, Carlo Ferigato, Ahmet Koltuksuz:
A model of distributed key generation for industrial control systems. WODES 2012: 356-363 - [p1]Ettore Bompard, Paolo Cuccia, Marcelo Masera, Igor Nai Fovino:
Cyber Vulnerability in Power Systems Operation and Control. Critical Infrastructure Protection 2012: 197-234 - 2011
- [j10]Rafal Leszczyna, Igor Nai Fovino, Marcelo Masera:
Approach to security assessment of critical infrastructures' information systems. IET Inf. Secur. 5(3): 135-144 (2011) - [j9]Andrea Carcano, Alessio Coletta, Michele Guglielmi, Marcelo Masera, Igor Nai Fovino, Alberto Trombetta:
A Multidimensional Critical State Analysis for Detecting Intrusions in SCADA Systems. IEEE Trans. Ind. Informatics 7(2): 179-186 (2011) - [c21]Igor Nai Fovino, Salvatore Di Blasi, Andrea Rigoni:
The Role of the DNS in the Secure and Resilient Operation of CIs, the Energy System Example. CRITIS 2011: 152-163 - [c20]Béla Genge, Igor Nai Fovino, Christos Siaterlis, Marcelo Masera:
Analyzing Cyber-Physical Attacks on Networked Industrial Control Systems. Critical Infrastructure Protection 2011: 167-183 - 2010
- [j8]Gianmarco Baldini, Igor Nai Fovino, Marcelo Masera, Marco Luise, Vincenzo Pellegrini, Enzo Bagagli, Giuseppe Rubino, Raffaele Malangone, Marcoccio Stefano, Fabio Senesi:
An early warning system for detecting GSM-R wireless interference in the high-speed railway infrastructure. Int. J. Crit. Infrastructure Prot. 3(3-4): 140-156 (2010) - [j7]Stefano Braghin, Alberto Trombetta, Igor Nai Fovino:
Advanced trust negotiations in critical infrastructures. Int. J. Crit. Infrastructures 6(3): 225-245 (2010) - [j6]Rafal Leszczyna, Igor Nai Fovino, Marcelo Masera:
Simulating malware with MAlSim. J. Comput. Virol. 6(1): 65-75 (2010) - [c19]Igor Nai Fovino, Andrea Carcano, Thibault De Lacheze Murel, Alberto Trombetta, Marcelo Masera:
Modbus/DNP3 State-Based Intrusion Detection System. AINA 2010: 729-736 - [c18]Gianmarco Baldini, Stefano Braghin, Igor Nai Fovino, Alberto Trombetta:
Adaptive and Distributed Access Control in Cognitive Radio Networks. AINA 2010: 988-995 - [c17]Igor Nai Fovino, Andrea Carcano, Alessio Coletta, Michele Guglielmi, Marcelo Masera, Alberto Trombetta:
State-Based Firewall for Industrial Protocols with Critical-State Prediction Monitor. CRITIS 2010: 116-127 - [c16]Igor Nai Fovino, Marcelo Masera, Michele Guglielmi, Andrea Carcano, Alberto Trombetta:
Distributed Intrusion Detection System for SCADA Protocols. Critical Infrastructure Protection 2010: 95-110 - [c15]Michele Guglielmi, Igor Nai Fovino, Andres Perez-Garcia, Christos Siaterlis:
A Preliminary Study of a Wireless Process Control Network Using Emulation Testbeds. MOBILIGHT 2010: 268-279
2000 – 2009
- 2009
- [j5]Igor Nai Fovino, Andrea Carcano, Marcelo Masera, Alberto Trombetta:
An experimental investigation of malware attacks on SCADA systems. Int. J. Crit. Infrastructure Prot. 2(4): 139-145 (2009) - [j4]Igor Nai Fovino, Marcelo Masera, Alessio De Cian:
Integrating cyber attacks within fault trees. Reliab. Eng. Syst. Saf. 94(9): 1394-1402 (2009) - [c14]Marcelo Masera, Igor Nai Fovino:
Methodology for Experimental ICT Industrial and Critical Infrastructure Security Tests. ARES 2009: 400-405 - [c13]Andrea Carcano, Igor Nai Fovino, Marcelo Masera, Alberto Trombetta:
State-Based Network Intrusion Detection Systems for SCADA Protocols: A Proof of Concept. CRITIS 2009: 138-150 - [c12]Igor Nai Fovino, Andrea Carcano, Marcelo Masera, Alberto Trombetta:
Design and Implementation of a Secure Modbus Protocol. Critical Infrastructure Protection 2009: 83-96 - 2008
- [j3]Giovanna Dondossola, Judit Szanto, Marcelo Masera, Igor Nai Fovino:
Effects of intentional threats to power substation control systems. Int. J. Crit. Infrastructures 4(1/2): 129-143 (2008) - [c11]Andrea Carcano, Igor Nai Fovino, Marcelo Masera, Alberto Trombetta:
Scada Malware, a Proof of Concept. CRITIS 2008: 211-222 - [c10]Gianmarco Baldini, Igor Nai Fovino:
Service Modeling Language Applied to Critical Infrastructure. CRITIS 2008: 271-278 - [c9]Igor Nai Fovino, Marcelo Masera:
Methodology for Experimental ICT Industrial and Critical Infrastructure Security Tests. EuroISI 2008: 274-275 - [c8]Marcelo Masera, Igor Nai Fovino, Rafal Leszczyna:
Security Assessment Of A Turbo-Gas Power Plant. Critical Infrastructure Protection 2008: 31-40 - [c7]Rafal Leszczyna, Igor Nai Fovino, Marcelo Masera:
MAISim: mobile agent malware simulator. SimuTools 2008: 35 - 2007
- [c6]Marcelo Masera, Igor Nai Fovino:
A Service-Oriented Approach for Assessing Infrastructure Security. Critical Infrastructure Protection 2007: 367-379 - 2006
- [c5]Igor Nai Fovino, Marcelo Masera:
Through the Description of Attacks: A Multidimensional View. SAFECOMP 2006: 15-28 - [c4]Igor Nai Fovino, Marcelo Masera:
Emergent Disservices in Interdependent Systems and System-of-Systems. SMC 2006: 590-595 - 2005
- [j2]Elisa Bertino, Igor Nai Fovino, Loredana Parasiliti Provenza:
A Framework for Evaluating Privacy Preserving Data Mining Algorithms. Data Min. Knowl. Discov. 11(2): 121-154 (2005) - [c3]Elisa Bertino, Igor Nai Fovino:
Information Driven Evaluation of Data Hiding Algorithms. DaWaK 2005: 418-427 - [c2]Danilo Bruschi, Igor Nai Fovino, Andrea Lanzi:
A Protocol for Anonymous and Accurate E-Polling. TCGOV 2005: 112-121 - 2004
- [j1]Vassilios S. Verykios, Elisa Bertino, Igor Nai Fovino, Loredana Parasiliti Provenza, Yücel Saygin, Yannis Theodoridis:
State-of-the-art in privacy preserving data mining. SIGMOD Rec. 33(1): 50-57 (2004) - [c1]Elisa Bertino, Danilo Bruschi, Stefano Franzoni, Igor Nai Fovino, Stefano Valtolina:
Threat Modelling for SQL Servers - Designing a Secure Database in a Web Application. Communications and Multimedia Security 2004: 159-171
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint