Ivan Cibrario Bertolotti
Orcid: 0000-0002-9607-9993
According to our database1,
Ivan Cibrario Bertolotti
authored at least 62 papers
between 2003 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
2005
2010
2015
2020
0
1
2
3
4
5
6
7
8
1
2
1
1
2
1
1
3
2
1
1
3
1
3
1
1
2
2
6
1
3
4
2
5
1
1
2
3
2
1
2
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
IEEE Trans. Veh. Technol., August, 2023
Proceedings of the 29th IEEE Real-Time and Embedded Technology and Applications Symposium, 2023
2022
Improving performance and cyber-attack resilience in multi-firewall industrial networks.
Proceedings of the 18th IEEE International Conference on Factory Communication Systems, 2022
Open-source firewalls for industrial applications: a laboratory study of Linux IPFire behavior<sup>*</sup>.
Proceedings of the IECON 2022, 2022
2020
Comput. Stand. Interfaces, 2020
2019
Comput. Stand. Interfaces, 2019
2018
Proceedings of the 14th IEEE International Workshop on Factory Communication Systems, 2018
Proceedings of the 14th IEEE International Workshop on Factory Communication Systems, 2018
2017
CAN With eXtensible In-Frame Reply: Protocol Definition and Prototype Implementation.
IEEE Trans. Ind. Informatics, 2017
Proceedings of the IEEE 13th International Workshop on Factory Communication Systems, 2017
Proceedings of the IEEE 13th International Workshop on Factory Communication Systems, 2017
Proceedings of the IEEE International Conference on Industrial Technology, 2017
Proceedings of the IEEE International Conference on Industrial Technology, 2017
Proceedings of the 22nd IEEE International Conference on Emerging Technologies and Factory Automation, 2017
Proceedings of the 22nd IEEE International Conference on Emerging Technologies and Factory Automation, 2017
2016
Proceedings of the 14th IEEE International Conference on Industrial Informatics, 2016
2015
IEEE Trans. Ind. Informatics, 2015
Comput. Stand. Interfaces, 2015
A twofold model for the analysis of access control policies in industrial networked systems.
Comput. Stand. Interfaces, 2015
Proceedings of the 1st IEEE International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow, 2015
Proceedings of the 1st IEEE International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow, 2015
Proceedings of the 1st IEEE International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow, 2015
2014
Proceedings of the 10th IEEE Workshop on Factory Communication Systems, 2014
Proceedings of the 10th IEEE Workshop on Factory Communication Systems, 2014
Latency evaluation of a firewall for industrial networks based on the Tofino Industrial Security Solution.
Proceedings of the 2014 IEEE Emerging Technology and Factory Automation, 2014
Proceedings of the 2014 IEEE Emerging Technology and Factory Automation, 2014
2013
IEEE Trans. Ind. Informatics, 2013
On a family of run length limited, block decodable codes to prevent payload-induced jitter in Controller Area Networks.
Comput. Stand. Interfaces, 2013
Proceedings of the 1st International Symposium for ICS & SCADA Cyber Security Research 2013, 2013
Software-based assessment of the synchronization and error handling behavior of a real CAN controller.
Proceedings of 2013 IEEE 18th Conference on Emerging Technologies & Factory Automation, 2013
2012
IEEE Trans. Ind. Informatics, 2012
Proceedings of the 9th IEEE International Workshop on Factory Communication Systems, 2012
Proceedings of the 9th IEEE International Workshop on Factory Communication Systems, 2012
Performance evaluation and improvement of the CPU-CAN controller interface for low-jitter communication.
Proceedings of 2012 IEEE 17th International Conference on Emerging Technologies & Factory Automation, 2012
Performance comparison of mechanisms to reduce bit stuffing jitters in controller area networks.
Proceedings of 2012 IEEE 17th International Conference on Emerging Technologies & Factory Automation, 2012
Proceedings of the Critical Information Infrastructures Security, 2012
2011
IEEE Trans. Ind. Informatics, 2011
Real-time performance of an open-source protocol stack for low-cost, embedded systems.
Proceedings of the IEEE 16th Conference on Emerging Technologies & Factory Automation, 2011
2010
Proceedings of 15th IEEE International Conference on Emerging Technologies and Factory Automation, 2010
2009
IEEE Trans. Ind. Informatics, 2009
Comput. Stand. Interfaces, 2009
Proceedings of 12th IEEE International Conference on Emerging Technologies and Factory Automation, 2009
Proceedings of 12th IEEE International Conference on Emerging Technologies and Factory Automation, 2009
Proceedings of the Embedded Systems Design and Verification, 2009
2008
Efficient representation of the attacker's knowledge in cryptographic protocols analysis.
Formal Aspects Comput., 2008
2007
Comput. Stand. Interfaces, 2007
Proceedings of 12th IEEE International Conference on Emerging Technologies and Factory Automation, 2007
Experimental Comparison of Automatic Tools for the Formal Analysis of Cryptographic Protocols.
Proceedings of the 2007 International Conference on Dependability of Computer Systems (DepCoS-RELCOMEX 2007), 2007
Evaluating the Combined Effect of Vulnerabilities and Faults on Large Distributed Systems.
Proceedings of the 2007 International Conference on Dependability of Computer Systems (DepCoS-RELCOMEX 2007), 2007
2006
Int. J. Found. Comput. Sci., 2006
2005
Proceedings of the Embedded Systems Handbook., 2005
Proceedings of 10th IEEE International Conference on Emerging Technologies and Factory Automation, 2005
Proceedings of the Detection of Intrusions and Malware, 2005
Internal Architecture and Features of Real-Time Embedded Operation Systems.
Proceedings of the Industrial Information Technology Handbook, 2005
2004
Proceedings of the Automated Technology for Verification and Analysis: Second International Conference, 2004
2003
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2003
Introducing Commutative and Associative Operators in Cryptographic Protocol Analysis.
Proceedings of the Formal Techniques for Networked and Distributed Systems - FORTE 2003, 23rd IFIP WG 6.1 International Conference, Berlin, Germany, September 29, 2003