Publications

ATENA Papers published in peer-reviewed journals, books and conference proceedings:

Scientific journals

2019

[1] Rosa, L. and Freitas, M.B.d. and Mazo, S. and Edmundo Monteiro and Tiago Cruz and Simões, P., “A Comprehensive Security Analysis of a SCADA Protocol: from OSINT to Mitigation”, IEEE Access, 2019. DOI: 10.1109/ACCESS.2019.2906926

[2] A. Tortorelli, A. Fiaschetti, A. Giuseppi, V. Suraci, R. Germanà, F. Delli Priscoli,
” A security metric for assessing the Security Level of Critical Infrastructures”, submitted to International Journal of Critical Computer-Based Systems (IJCCBS)

[3] F. Liberati, A. Di Giorgio, A. Giuseppi, A. Pietrabissa, F. Delli Priscoli, “Efficient and Risk-aware Control of Electricity Distribution Grids” submitted to IEEE Systems journal.

[4] I. Frazão, P. Abreu, T. Cruz, H Araújo, P. Simões, “Cyber-security Modbus ICS Dataset“, in IEEE DataPort, January 2019. DOI: 10.21227/pjff-1a03

2018

[1] Henriques, J.P., Caldeira F., Cruz, T., and Simões, P., “On the Use of Ontology Data for Protecting Critical Infrastructures”, Journal of Information Warfare, 2018

[2] Barbatsalou, K., Cruz, T., Simões, P., and Monteiro E., “Mobile Forensic Data Analysis: Suspicious Pattern Detection in Mobile Evidence”, IEEE Access, October 2018, DOI: 10.1109/ACCESS.2018.2875068

[3] Graveto, V., Rosa, L., Cruz, T., and Simões, P. , “A Stealth Monitoring Mechanism for Cyber-Physical Systems”, International Journal of Critical Infrastructure Protection, October 2018 DOI: 10.1016/j.ijcip.2018.10.006

[4] Perez, R., Adamsky, F., Soua, R., and Engel, T., “Forget the Myth of the Air Gap: Machine Learning for Reliable Intrusion Detection in SCADA Systems”, 2018 Abstract

[5] Adamsky, F., Aubigny, M., Battisti, F., Carli, M., Cimorelli, F., Cruz, T., Giorgio, A.D., Foglietta, C., Galli, A., Giuseppi, A., Liberati, F., Neri, A., Panzieri, S., Pascucci, F., Proença, J., Pucci, P., Rosa, L., and Soua, R., “Integrated Protection of Industrial Control Systems from Cyber-attacks: the ATENA Approach”, International Journal of Critical Infrastructure Protection – Elsevier, 2018, DOI: 10.1016/j.ijcip.2018.04.004

[6] Foglietta, C., Masucci, D., Palazzo, C., Santini, R., Panzieri, S., Rosa, L., Cruz, T., and Lev, L. , “From Detecting Cyber-Attacks to Mitigating Risk Within a Hybrid Environment”, IEEE Systems Journal, 2018 

[7] Di Giorgio, A., Pietrabissa, A., DelliPriscoli, F., & Isidori, A. (2018). “Robust protection scheme against cyber-physical attacks in power systems”. IET Control Theory & Applications, 12(13), 1792-1801.

[8] Muller, S., Lancrenon, J., Harpes, C., L. Traon, Y., Gombault, S. and
Bonnin, J.-M.,   “A training-resistant anomaly detection system“, Computers
& Security, vol. 76, pp. 1–11, 2018, ISSN: 0167-4048. DOI: 10.1016/j.cose.2018.02.015

2017

[1] Liberati, F., & Di Giorgio, A. (2017). Economic model predictive and feedback control of a smart grid prosumer node. Energies, 11(1), 48. DOI: 10.3390/en11010048

[2] Muller, S., Lancrenon, J., Harpes, C., L. Traon, Y., Gombault, S. and
Bonnin, J.-M., “A training-resistant anomaly detection system“, Computers
& Security, vol. 76, pp. 1–11, 2018, ISSN: 0167-4048. DOI: 10.1016/j.cose.2018.02.015.

2016

[1] Cruz T., Simões P. and Monteiro E., “Virtualizing Programmable Logic Controllers: Towards a Convergent Approach”, in the IEEE Embedded Systems Letters, vol. 8, no. 4, December 2016, DOI: 10.1109/LES.2016.2608418.Abstract

[2] T. Cruz, P. Simões and Edmundo Monteiro, ‘Using virtualization techniques for improving SCADA ICS Security and Reliability’, Journal of Information Warfare – ISSN 1445 3347 (online) / ISSN 445-3312 (printed)

[3] Alonge, G., Ciancamerla, E., Mastrilli, A., Minichino, M., Nicotra, A., Ranno, M., Reali, M., and Regina, P., “Towards Energy Efficiency of Interdependent Urban Networks” in the  Int. J. Simulation and Process Modelling, Vol. 11, No. 6, 2016. Abstract

Conference papers

2019

[1] A. Craveiro, A. Oliveira, J. Proença, T. Cruz, P. Simões, “A Framework for Improved Home Network Security, submission accepted for the 18th European Conference on Cyber Warfare and Security (ECCWS 2019), Lisbon, Portugal, 4-5 July 2019

[2] Masucci D., Palazzo C., Foglietta C., Panzieri S., “An Integrated Maintenance Approach for Critical Infrastructures Ageing” submission accepted for the 2019 CIB World Building Congress, Hong Kong, China, June 2019, DOI: 10.5281/zenodo.2654546

[3] Masucci D., Panzieri S., Pizzuti S., Botticelli M., “Fault Detection Strategies applied to Smart Building Supervisor System” submission accepted for the 2019 CIB World Building Congress, Hong Kong, China, June 2019, DOI: 10.5281/zenodo.2654560

[4] A. Giuseppi, A. Tortorelli, R. Germanà, F. Liberati, V. Suraci, A. Fiaschetti, “Securing Cyber-Physical Systems: an Optimization Framework based on OSSTMM and Genetic Algorithms” submission accepted for the 27th Mediterranean Conference on Control and Automation (MED) IEEE, Akko, Israel

[5] Nuno Martins, José Cruz, Tiago Cruz and Pedro Abreu, “Analysing the Footprint of Classifiers in Adversarial Denial of Service Contexts“, (accepted, to be published) in Proc. of 19th EPIA Conference on Artificial Intelligence, Vila Real in September 3rd-6th, 2019.

2018

[1] Freitas, M., Rosa, L., Cruz, T., and Simões, P. , “SDN-Enabled Virtual Data Diode”, in the 4th ESORICS Workshop on the Security of Industrial Control Systems & of Cyber-Physical Systems (CyberICPS 2018), September 2018

[2] Frazão, I., Abreu, P.H., Cruz, T., Araújo, H., and Simões, P., “Denial of Service Attacks: Detecting the Frailties of Machine Learning Algorithms in the Classification Process”, in the 13th edition of the International Conference on Critical Information Infrastructures Security (CRITIS 2018), September 24-26, 2018

[3] Riccardo, C., Panzieri, S. , Pascucci, F. “Exploiting System Model for Securing CPS: the Anomaly Based IDS Perspective”, 2018 IEEE 23rd International Conference on Emerging Technologies and Factory Automation (ETFA), DOI: 10.1109/ETFA.2018.8502495

[4] Panfili, M., Giuseppi, A., Fiaschetti, A., Al-Jibreen, H. B., Pietrabissa, A., & Priscoli, F. D. (2018, June). “A Game-Theoretical Approach to Cyber-Security of Critical Infrastructures Based on Multi-Agent Reinforcement Learning”. In 2018 26th Mediterranean Conference on Control and Automation (MED)(pp. 460-465). IEEE. DOI: 10.1109/MED.2018.8442695

[5] Suraci, V., Celsi, L. R., Giuseppi, A., Manfredi, G., & Di Giorgio, A. (2018, June). “Distributed Wardrop Load Balancing in Multi-MTU SCADA Systems. In 2018 26th Mediterranean Conference on Control and Automation” (MED) (pp. 1-9). IEEE, DOI: 10.1109/MED.2018.8442485

[6] Giuseppi, A., Germana, R., & Di Giorgio, A. (2018, June). “Risk adverse virtual power plant control in unsecure power systems“. In 2018 26th Mediterranean Conference on Control and Automation (MED) (pp. 1-9). IEEE, DOI: 10.5281/zenodo.2652933

[7] F. Battisti, G. Bernieri, M. Carli, M. Lopardo and F. Pascucci, “Detecting Integrity Attacks in IoT-based Cyber Physical Systems: a Case Study on Hydra Testbed,” 2018 Global Internet of Things Summit (GIoTS), Bilbao, 2018, pp. 1-6.
doi: 10.1109/GIOTS.2018.8534437

[8] Masucci D., Palazzo C., Panzieri S., “Evacuation Management Multi-Criteria Risk Assessment Based”, 8th International conference on building resilience, Nov. 2018 Lisbon, Portugal, ISBN 978-989-20-8992-8, DOI: 10.5281/zenodo.2654519

[9] Lavalle, L., Patriarca, T., Daulne, B., Hautier, O., Ciancamerla, E., “Model and Simulation of a real water distribution network to support emergency plans”, 8th International Defence and Homeland Security Simulation Workshop (DHSS 2018), Budapest, Hungary 17 – 19 September 2018, DOI: 10.5281/zenodo.3052172

[10] Iassinovski, S., Ciancamerla, E., Fresilli, B., Lavalle, L., Patriarca, T., Tofani, A., “Heterogeneous and distributed simulation models for Critical Infrastructures Interdependencies analysis and risk mitigation”, Proceedings of the Congress on Intelligent Systems and Information Technologies “IS&IT’18”. Scientific publication in 3 volumes. – Taganrog: Stupin S.A Publishing House, 2018, vol. 2, pp. 371 – 380 (ISBN 978-5-6041321-6-6), DOI: 10.5281/zenodo.3055109

2017

[1] Proença J., Cruz T., Simões P., Gaspar G., Parreira B., Laranjeira A., and Bastos F., “Building an NFV-Based vRGW: Lessons Learned”, in the proc. of the 14th Annual IEEE Consumer Communications and Networking Conference (CCNC 2017), Las Vegas, USA, January  2017, pp. 73-78.Abstract

[2] Rosa L., Cruz T., Simões P., Monteiro E., and Lev L. (2017), “Attacking SCADA systems: a practical perspective”, in the proc. of the 15th IFIP/IEEE International Symposium on Integrated Management (IM 2017), Lisbon, Protugal, 8-12th May 2017.Abstract

[3] Muller S., Harpes C., Le Traon Y., Gombault S., Bonnin J.-M., and Hoffmann P., Dynamic Risk Analyses and Dependency-Aware Root Cause Model for Critical Infrastructures, in the 11th edition of the International Conference on Critical Information Infrastructures Security (CRITIS 2016), published 2017, DOI: 10.1007/978-3-319-71368-7_14

[4] Rosa, L., Proença, J., Henriques, J.P., Graveto, V., Cruz, T., Simões, P., Caldeira, F., and Monteiro, E., “An Evolved Security Architecture for Distributed Industrial Automation and Control Systems”, in the 16th European Conference on Cyber Warfare and Security (ECCWS 2017). Abstract

[5] Lima, A., Cruz, T., Sousa, B., and Simões, P, “Security Monitoring for Mobile Device Assets: a Survey”, in the 12th International Conference on Cyber Warfare and Security – ICCWS 2017. Abstract

[6] Di Giorgio, A., Giuseppi, A., Liberati, F., Ornatelli, A., Rabezzano, A., and Celsi, L.R., On the Optimization of Energy Storage System Placement for Protecting Power Transmission Grids Against Dynamic Load Altering Attacks”,  in the 25th Mediterranean Conference on Control and Automation (MED), Valletta, 2017, pp. 986-992, DOI: 10.1109/MED.2017.7984247

[7] Di Giorgio, A., Giuseppi, A., Liberati, F., and Pietrabissa, A., Controlled Electricity Distribution Network Black Start with Energy Storage System Support”, 25th Mediterranean Conference on Control and Automation (MED), Valletta, 2017, pp. 781-786, DOI: 10.1109/MED.2017.7984213

[8] Iassinovski, S., Minichino, M., Ciancamerla, E., “Modeling and Simulation of Critical Infrastructures Interdependencies for Risk Mitigation”, Proceedings of the Congress on Intelligent Systems and Information Technologies “IS&IT’17”. Scientific publication in 3 volumes. – Taganrog: Stupin S.A Publishing House, 2017, vol. 2, pp. 59 – 66 (ISBN 978-5-9500107-8-1)

2016

[1] Masucci D., Foglietta C., Palazzo C. and Panzieri S. (2016), “Improved Multi-Criteria Distribution Network Reconfiguration with Information Fusion”, 19th International Conference on Information Fusion (FUSION), Heidelberg, Germany, July 2016, pp.256-263.Abstract, DOI: 10.5281/zenodo.2649901

[2] Santini R., Gasparri A., Pasqualetti F, “Network Composition for Optimal Disturbance Rejection”, American Control Conference (ACC), Boston, MA, USA, July 2016, pp.3764-3769.Abstract

[3] Foglietta C., Corbò G., Palazzo C. and Panzieri S. (2016), “Smart Behavioural Filter for SCADA Network”, submitted at 2nd EAI International Conference on Industrial Networks and Intelligent Systems, Leicester, UK, October – November 2016.Abstract, DOI: 10.1007/s11036-017-0882-1

[4] T. Cruz, P. Simões and Edmundo Monteiro, ‘Security implications of SCADA ICS virtualization: survey and future trends’, in ECCWS 2016 – 15th European Conference on Cyber Warfare and Security, 2016

[5] E. Ciancamerla, B. Fresilli, M. Minichino, T. Patriarca, “Cyber attacks on SCADA of critical infrastructures by an hybrid testbed “Proceeding of 13th International Multidisciplinary Modeling and Simulation Multiconference (I3M 2016), Larnaca, Cyprus 26-28 September 2016, Editors: Agostino Bruzzone, Robert Sottilare, ISBN: 978-1-5108-3084.Abstract

[6] E. Ciancamerla, M.C. Falvo, L. Martirano, M. Minichino “Active distribution grids: a MatLab-Simulink tool for energy performance analysis”, AEIT 2016 annual international conference, Capri 5-7 october 2016.Abstract

Conferences

Conferences attended by ATENA partners

2018

1) 4th ESORICS Workshop on the Security of Industrial Control Systems & of Cyber-Physical Systems (CyberICPS 2018), September 2018 Conference website

2) IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-18), 2018 Conference website

3) 13th edition of the International Conference on Critical Information Infrastructures Security (CRITIS 2018), September 24-26, 2018 Conference website

4) 17th European Conference on Cyber Warfare and Security, 2018 Conference website

2017

1) 14th Annual IEEE Consumer Communications and Networking Conference (CCNC 2017), Las Vegas, USA, January 2017, pp. 73-78 .Conference website

2) 15th IFIP/IEEE International Symposium on Integrated Management (IM 2017), Lisbon, Protugal, 8-12th May 2017. Conference website

3) 11th edition of the International Conference on Critical Information Infrastructures Security (CRITIS 2016), published 2017. Conference website

4) 16th European Conference on Cyber Warfare and Security (ECCWS 2017). Conference website

5) 25th Mediterranean Conference on Control and Automation (MED), Valletta, 2017, pp. 986-992 Conference website