The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Igor Nai Fovino: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Elisa Bertino, Igor Nai Fovino
    Information Driven Evaluation of Data Hiding Algorithms. [Citation Graph (0, 0)][DBLP]
    DaWaK, 2005, pp:418-427 [Conf]
  2. Igor Nai Fovino, Marcelo Masera
    Through the Description of Attacks: A Multidimensional View. [Citation Graph (0, 0)][DBLP]
    SAFECOMP, 2006, pp:15-28 [Conf]
  3. Danilo Bruschi, Igor Nai Fovino, Andrea Lanzi
    A Protocol for Anonymous and Accurate E-Polling. [Citation Graph (0, 0)][DBLP]
    TCGOV, 2005, pp:112-121 [Conf]
  4. Elisa Bertino, Igor Nai Fovino, Loredana Parasiliti Provenza
    A Framework for Evaluating Privacy Preserving Data Mining Algorithms. [Citation Graph (0, 0)][DBLP]
    Data Min. Knowl. Discov., 2005, v:11, n:2, pp:121-154 [Journal]
  5. Vassilios S. Verykios, Elisa Bertino, Igor Nai Fovino, Loredana Parasiliti Provenza, Yücel Saygin, Yannis Theodoridis
    State-of-the-art in privacy preserving data mining. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 2004, v:33, n:1, pp:50-57 [Journal]

  6. Methodology for Experimental ICT Industrial and Critical Infrastructure Security Tests. [Citation Graph (, )][DBLP]


  7. Modbus/DNP3 State-Based Intrusion Detection System. [Citation Graph (, )][DBLP]


  8. Adaptive and Distributed Access Control in Cognitive Radio Networks. [Citation Graph (, )][DBLP]


  9. Scada Malware, a Proof of Concept. [Citation Graph (, )][DBLP]


  10. Service Modeling Language Applied to Critical Infrastructure. [Citation Graph (, )][DBLP]


  11. State-Based Network Intrusion Detection Systems for SCADA Protocols: A Proof of Concept. [Citation Graph (, )][DBLP]


  12. A Service-Oriented Approach for Assessing Infrastructure Security. [Citation Graph (, )][DBLP]


  13. Methodology for Experimental ICT Industrial and Critical Infrastructure Security Tests. [Citation Graph (, )][DBLP]


  14. MAISim: mobile agent malware simulator. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002