State-of-the-art in privacy preserving data mining VS Verykios, E Bertino, IN Fovino, LP Provenza, Y Saygin, Y Theodoridis ACM Sigmod Record 33 (1), 50-57, 2004 | 1221 | 2004 |
A multidimensional critical state analysis for detecting intrusions in SCADA systems A Carcano, A Coletta, M Guglielmi, M Masera, IN Fovino, A Trombetta IEEE Transactions on Industrial Informatics 7 (2), 179-186, 2011 | 339 | 2011 |
A blockchain-based approach for data accountability and provenance tracking R Neisse, G Steri, I Nai-Fovino Proceedings of the 12th international conference on availability …, 2017 | 278 | 2017 |
A Framework for Evaluating Privacy Preserving Data Mining Algorithms* E Bertino, IN Fovino, LP Provenza Data Mining and Knowledge Discovery 11, 121-154, 2005 | 271 | 2005 |
Integrating cyber attacks within fault trees IN Fovino, M Masera, A De Cian Reliability Engineering & System Safety 94 (9), 1394-1402, 2009 | 219 | 2009 |
Modbus/DNP3 state-based intrusion detection system IN Fovino, A Carcano, TDL Murel, A Trombetta, M Masera 2010 24th IEEE International Conference on Advanced Information Networking …, 2010 | 217 | 2010 |
Security and privacy issues for an IoT based smart home D Geneiatakis, I Kounelis, R Neisse, I Nai-Fovino, G Steri, G Baldini 2017 40th international convention on information and communication …, 2017 | 208 | 2017 |
Design and implementation of a secure modbus protocol IN Fovino, A Carcano, M Masera, A Trombetta Critical Infrastructure Protection III: Third Annual IFIP WG 11.10 …, 2009 | 183 | 2009 |
SecKit: a model-based security toolkit for the internet of things R Neisse, G Steri, IN Fovino, G Baldini computers & security 54, 60-76, 2015 | 155 | 2015 |
An experimental investigation of malware attacks on SCADA systems IN Fovino, A Carcano, M Masera, A Trombetta International Journal of Critical Infrastructure Protection 2 (4), 139-145, 2009 | 150 | 2009 |
Critical state-based filtering system for securing SCADA network protocols IN Fovino, A Coletta, A Carcano, M Masera IEEE Transactions on industrial electronics 59 (10), 3943-3950, 2011 | 142 | 2011 |
Demystifying COVID‐19 digital contact tracing: A survey on frameworks and mobile apps T Martin, G Karopoulos, JL Hernández-Ramos, G Kambourakis, ... Wireless Communications and Mobile Computing 2020 (1), 8851429, 2020 | 121 | 2020 |
A cyber-physical experimentation environment for the security analysis of networked industrial control systems B Genge, C Siaterlis, IN Fovino, M Masera Computers & Electrical Engineering 38 (5), 1146-1161, 2012 | 111 | 2012 |
An experimental platform for assessing SCADA vulnerabilities and countermeasures in power plants IN Fovino, M Masera, L Guidi, G Carpi 3rd International Conference on Human System Interaction, 679-686, 2010 | 108 | 2010 |
State-based network intrusion detection systems for SCADA protocols: a proof of concept A Carcano, IN Fovino, M Masera, A Trombetta Critical Information Infrastructures Security: 4th International Workshop …, 2010 | 101 | 2010 |
A Permission verification approach for android mobile applications D Geneiatakis, IN Fovino, I Kounelis, P Stirparo Computers & Security 49, 192-205, 2015 | 96 | 2015 |
Fostering consumers' energy market through smart contracts I Kounelis, G Steri, R Giuliani, D Geneiatakis, R Neisse, I Nai-Fovino 2017 international conference in energy and sustainability in small …, 2017 | 87 | 2017 |
Blockchain performance analysis for supporting cross-border E-government services D Geneiatakis, Y Soupionis, G Steri, I Kounelis, R Neisse, I Nai-Fovino IEEE Transactions on Engineering Management 67 (4), 1310-1322, 2020 | 78 | 2020 |
An early warning system for detecting GSM-R wireless interference in the high-speed railway infrastructure G Baldini, IN Fovino, M Masera, M Luise, V Pellegrini, E Bagagli, ... International Journal of Critical Infrastructure Protection 3 (3-4), 140-156, 2010 | 65 | 2010 |
Through the description of attacks: A multidimensional view IN Fovino, M Masera Computer Safety, Reliability, and Security: 25th International Conference …, 2006 | 60 | 2006 |