Chiara Foglietta

Orcid: 0000-0003-1796-2006

According to our database1, Chiara Foglietta authored at least 32 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Multirate Interlaced Kalman Filter.
Proceedings of the 31st Mediterranean Conference on Control and Automatio, 2023

Modeling and Assessing the Impacts of Cyber Threats on Interdependent Critical Infrastructures.
Proceedings of the Critical Infrastructure Protection XVII, 2023

Enhancing Industrial Cyber-Physical Systems Security with Smart Probing Approach.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

Stability Analysis for Multirate Interlaced Kalman Filter.
Proceedings of the 62nd IEEE Conference on Decision and Control, 2023

2021
Blockchain application in simulated environment for Cyber-Physical Systems Security.
Proceedings of the 19th IEEE International Conference on Industrial Informatics, 2021

2020
Modeling Telecommunications Infrastructures Using the CISIApro 2.0 Simulator.
Proceedings of the Critical Infrastructure Protection XIV, 2020

2019
From Detecting Cyber-Attacks to Mitigating Risk Within a Hybrid Environment.
IEEE Syst. J., 2019

An opacity approach for security exposure of IoT components in critical infrastructures.
Proceedings of the 2019 IEEE International Conference on Systems, Man and Cybernetics, 2019

2018
Smart Behavioural Filter for Industrial Internet of Things - A Security Extension for PLC.
Mob. Networks Appl., 2018

Integrated protection of industrial control systems from cyber-attacks: the ATENA approach.
Int. J. Crit. Infrastructure Prot., 2018

2016
Smart Behavioural Filter for SCADA Network.
Proceedings of the Industrial Networks and Intelligent Systems, 2016

Enhancing Decision Support with Interdependency Modeling.
Proceedings of the Critical Infrastructure Protection X, 2016

Improved multi-criteria distribution network reconfiguration with information fusion.
Proceedings of the 19th International Conference on Information Fusion, 2016

Managing decisions for smart grid using interdependency modeling.
Proceedings of the IEEE Conference on Cognitive and Computational Aspects of Situation Management, 2016

2015
Algorithms and Tools for Risk/Impact Evaluation in Critical Infrastructures.
Proceedings of the Intelligent Monitoring, 2015

Delay and jitter attacks on hierarchical state estimation.
Proceedings of the 2015 IEEE International Conference on Smart Grid Communications, 2015

Assessing Cyber Risk Using the CISIApro Simulator.
Proceedings of the Critical Infrastructure Protection IX, 2015

A graph-based evidence theory for assessing risk.
Proceedings of the 18th International Conference on Information Fusion, 2015

2014
A model for robust distributed hierarchical electric power grid state estimation.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2014

Evidence Theory for Cyber-Physical Systems.
Proceedings of the Critical Infrastructure Protection VIII, 2014

2013
Detection and impact of cyber attacks in a critical infrastructures scenario: the CockpitCI approach.
Int. J. Syst. Syst. Eng., 2013

Aware online interdependency modelling via evidence theory.
Int. J. Crit. Infrastructures, 2013

Evidence theory for Smart Grid diagnostics.
Proceedings of the 4th IEEE PES Innovative Smart Grid Technologies Europe, 2013

Assessing the Impact of Cyber Attacks on Interdependent Physical Systems.
Proceedings of the Critical Infrastructure Protection VII, 2013

Malicious false data injection in hierarchical electric power grid state estimation systems.
Proceedings of the Fourth International Conference on Future Energy Systems, 2013

2012
Issues related to electronic prescribing therapy management.
PhD thesis, 2012

A Networked Evidence Theory Framework for Critical Infrastructure Modeling.
Proceedings of the Critical Infrastructure Protection VI, 2012

An agile model for situation assessment: How to make Evidence Theory able to change idea about classifications.
Proceedings of the 15th International Conference on Information Fusion, 2012

Mixed Holistic Reductionistic Approach for Impact Assessment of Cyber Attacks.
Proceedings of the 2012 European Intelligence and Security Informatics Conference, 2012

2011
Countermeasures Selection via Evidence Theory - (Short Paper).
Proceedings of the Critical Information Infrastructure Security, 2011

2010
Discrete Event Simulation of QoS of a SCADA System Interconnecting a Power Grid and a Telco Network.
Proceedings of the What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience, 2010



  Loading...