Igor Nai Fovino

According to our database1, Igor Nai Fovino authored at least 64 papers between 2004 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Blockchain for Transport (BC4 T), Performance Simulations of Blockchain Network for Emission Monitoring.
Proceedings of the 14th International Conference on Knowledge and Smart Technology, 2022

2021
Sharing Pandemic Vaccination Certificates through Blockchain: Case Study and Performance Evaluation.
Wirel. Commun. Mob. Comput., 2021

2020
Demystifying COVID-19 Digital Contact Tracing: A Survey on Frameworks and Mobile Apps.
Wirel. Commun. Mob. Comput., 2020

Blockchain Performance Analysis for Supporting Cross-Border E-Government Services.
IEEE Trans. Engineering Management, 2020

Towards a Formal IoT Security Model.
Symmetry, 2020

A Review on the Application of Distributed Ledgers in the Evolution of Road Transport.
IEEE Internet Comput., 2020

Toward a Data-Driven Society: A Technological Perspective on the Development of Cybersecurity and Data-Protection Policies.
IEEE Secur. Priv., 2020

2018
Towards a Mobile Malware Detection Framework with the Support of Machine Learning.
Proceedings of the Security in Computer and Information Sciences, 2018

2017
Blockchain-based Identity Management and Data Usage Control (Extended Abstract).
Proceedings of the Privacy and Identity Management. The Smart Revolution, 2017

The Smart World Revolution.
Proceedings of the Privacy and Identity Management. The Smart Revolution, 2017

Security and privacy issues for an IoT based smart home.
Proceedings of the 40th International Convention on Information and Communication Technology, 2017

A Blockchain-based Approach for Data Accountability and Provenance Tracking.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
A privacy enforcing framework for Android applications.
Comput. Secur., 2016

A novel multi-hop secure LTE-D2D communication protocol for IoT scenarios.
Proceedings of the 23rd International Conference on Telecommunications, 2016

2015
SecKit: A Model-based Security Toolkit for the Internet of Things.
Comput. Secur., 2015

A Permission verification approach for android mobile applications.
Comput. Secur., 2015

On the Efficacy of Static Features to Detect Malicious Applications in Android.
Proceedings of the Trust, Privacy and Security in Digital Business, 2015

2014
Public Protection and Disaster Relief Communication System Integrity: A Radio-Flexibility and Identity-Based Cryptography Approach.
IEEE Veh. Technol. Mag., 2014

Privacy leakages in Smart Home wireless technologies.
Proceedings of the International Carnahan Conference on Security Technology, 2014

A Model-Based Security Toolkit for the Internet of Things.
Proceedings of the Ninth International Conference on Availability, 2014

SCADA System Cyber Security.
Proceedings of the Secure Smart Embedded Devices, Platforms and Applications, 2014

2013
Distributed access control policies for spectrum sharing.
Secur. Commun. Networks, 2013

Cyber security of networked critical infrastructures [Guest Editorial].
IEEE Netw., 2013

DNS as critical infrastructure, the energy system case study.
Int. J. Crit. Infrastructures, 2013

In-memory credentials robbery on android phones.
Proceedings of the 2013 World Congress on Internet Security, 2013

Data-in-use leakages from Android memory - Test and analysis.
Proceedings of the 9th IEEE International Conference on Wireless and Mobile Computing, 2013

Identity-based security systems for vehicular ad-hoc networks.
Proceedings of the International Conference on Connected Vehicles and Expo, 2013

A Framework for Privacy Protection and Usage Control of Personal Data in a Smart City Scenario.
Proceedings of the Critical Information Infrastructures Security, 2013

2012
Cyber Vulnerability in Power Systems Operation and Control.
Proceedings of the Critical Infrastructure Protection, 2012

Critical State-Based Filtering System for Securing SCADA Network Protocols.
IEEE Trans. Ind. Electron., 2012

A cyber-physical experimentation environment for the security analysis of networked industrial control systems.
Comput. Electr. Eng., 2012

A model of distributed key generation for industrial control systems.
Proceedings of the 11th International Workshop on Discrete Event Systems, 2012

Measuring Name System Health.
Proceedings of the Critical Infrastructure Protection VI, 2012

Distributed Identity Based Private Key Generation for SCADA Systems.
Proceedings of the Critical Information Infrastructures Security, 2012

2011
A Multidimensional Critical State Analysis for Detecting Intrusions in SCADA Systems.
IEEE Trans. Ind. Informatics, 2011

Approach to security assessment of critical infrastructures' information systems.
IET Inf. Secur., 2011

Analyzing Cyber-Physical Attacks on Networked Industrial Control Systems.
Proceedings of the Critical Infrastructure Protection V, 2011

The Role of the DNS in the Secure and Resilient Operation of CIs, the Energy System Example.
Proceedings of the Critical Information Infrastructure Security, 2011

2010
Simulating malware with MAlSim.
J. Comput. Virol., 2010

Advanced trust negotiations in critical infrastructures.
Int. J. Crit. Infrastructures, 2010

An early warning system for detecting GSM-R wireless interference in the high-speed railway infrastructure.
Int. J. Crit. Infrastructure Prot., 2010

A Preliminary Study of a Wireless Process Control Network Using Emulation Testbeds.
Proceedings of the Mobile Lightweight Wireless Systems, 2010

Distributed Intrusion Detection System for SCADA Protocols.
Proceedings of the Critical Infrastructure Protection IV, 2010

State-Based Firewall for Industrial Protocols with Critical-State Prediction Monitor.
Proceedings of the Critical Information Infrastructures Security, 2010

Modbus/DNP3 State-Based Intrusion Detection System.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

Adaptive and Distributed Access Control in Cognitive Radio Networks.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

2009
Integrating cyber attacks within fault trees.
Reliab. Eng. Syst. Saf., 2009

An experimental investigation of malware attacks on SCADA systems.
Int. J. Crit. Infrastructure Prot., 2009

Design and Implementation of a Secure Modbus Protocol.
Proceedings of the Critical Infrastructure Protection III, 2009

State-Based Network Intrusion Detection Systems for SCADA Protocols: A Proof of Concept.
Proceedings of the Critical Information Infrastructures Security, 2009

2008
Effects of intentional threats to power substation control systems.
Int. J. Crit. Infrastructures, 2008

MAISim: mobile agent malware simulator.
Proceedings of the 1st International Conference on Simulation Tools and Techniques for Communications, 2008

Security Assessment Of A Turbo-Gas Power Plant.
Proceedings of the Critical Infrastructure Protection II, 2008

Methodology for Experimental ICT Industrial and Critical Infrastructure Security Tests.
Proceedings of the Intelligence and Security Informatics, 2008

Scada Malware, a Proof of Concept.
Proceedings of the Critical Information Infrastructure Security, 2008

Service Modeling Language Applied to Critical Infrastructure.
Proceedings of the Critical Information Infrastructure Security, 2008

2007
A Service-Oriented Approach for Assessing Infrastructure Security.
Proceedings of the Critical Infrastructure Protection, 2007

2006
Emergent Disservices in Interdependent Systems and System-of-Systems.
Proceedings of the IEEE International Conference on Systems, 2006

Through the Description of Attacks: A Multidimensional View.
Proceedings of the Computer Safety, 2006

2005
A Framework for Evaluating Privacy Preserving Data Mining Algorithms.
Data Min. Knowl. Discov., 2005

A Protocol for Anonymous and Accurate E-Polling.
Proceedings of the E-Government: Towards Electronic Democracy, International Conference, 2005

Information Driven Evaluation of Data Hiding Algorithms.
Proceedings of the Data Warehousing and Knowledge Discovery, 2005

2004
State-of-the-art in privacy preserving data mining.
SIGMOD Rec., 2004

Threat Modelling for SQL Servers - Designing a Secure Database in a Web Application.
Proceedings of the Communications and Multimedia Security, 2004


  Loading...