|
Search the dblp DataBase
Igor Nai Fovino:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Elisa Bertino, Igor Nai Fovino
Information Driven Evaluation of Data Hiding Algorithms. [Citation Graph (0, 0)][DBLP] DaWaK, 2005, pp:418-427 [Conf]
- Igor Nai Fovino, Marcelo Masera
Through the Description of Attacks: A Multidimensional View. [Citation Graph (0, 0)][DBLP] SAFECOMP, 2006, pp:15-28 [Conf]
- Danilo Bruschi, Igor Nai Fovino, Andrea Lanzi
A Protocol for Anonymous and Accurate E-Polling. [Citation Graph (0, 0)][DBLP] TCGOV, 2005, pp:112-121 [Conf]
- Elisa Bertino, Igor Nai Fovino, Loredana Parasiliti Provenza
A Framework for Evaluating Privacy Preserving Data Mining Algorithms. [Citation Graph (0, 0)][DBLP] Data Min. Knowl. Discov., 2005, v:11, n:2, pp:121-154 [Journal]
- Vassilios S. Verykios, Elisa Bertino, Igor Nai Fovino, Loredana Parasiliti Provenza, Yücel Saygin, Yannis Theodoridis
State-of-the-art in privacy preserving data mining. [Citation Graph (0, 0)][DBLP] SIGMOD Record, 2004, v:33, n:1, pp:50-57 [Journal]
Methodology for Experimental ICT Industrial and Critical Infrastructure Security Tests. [Citation Graph (, )][DBLP]
Modbus/DNP3 State-Based Intrusion Detection System. [Citation Graph (, )][DBLP]
Adaptive and Distributed Access Control in Cognitive Radio Networks. [Citation Graph (, )][DBLP]
Scada Malware, a Proof of Concept. [Citation Graph (, )][DBLP]
Service Modeling Language Applied to Critical Infrastructure. [Citation Graph (, )][DBLP]
State-Based Network Intrusion Detection Systems for SCADA Protocols: A Proof of Concept. [Citation Graph (, )][DBLP]
A Service-Oriented Approach for Assessing Infrastructure Security. [Citation Graph (, )][DBLP]
Methodology for Experimental ICT Industrial and Critical Infrastructure Security Tests. [Citation Graph (, )][DBLP]
MAISim: mobile agent malware simulator. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|