Follow
Ermanno Battista
Ermanno Battista
Fervento srl | Ph.D. Department of Electrical Engineering and Information Technology, University of
Verified email at unina.it - Homepage
Title
Cited by
Cited by
Year
Manipulating the attacker's view of a system's attack surface
M Albanese, E Battista, S Jajodia, V Casola
2014 IEEE Conference on Communications and Network Security, 472-480, 2014
402014
Deceiving attackers by creating a virtual attack surface
M Albanese, E Battista, S Jajodia
Cyber Deception: Building the Scientific Foundation, 167-199, 2016
352016
A deception based approach for defeating OS and service fingerprinting
M Albanese, E Battista, S Jajodia
2015 IEEE Conference on Communications and Network Security (CNS), 317-325, 2015
282015
Testing 90 nm microcontroller SRAM PUF quality
M Barbareschi, E Battista, A Mazzeo, N Mazzocca
2015 10th International Conference on Design & Technology of Integrated …, 2015
242015
Advancing wsn physical security adopting tpm-based architectures
M Barbareschi, E Battista, A Mazzeo, S Venkatesan
Proceedings of the 2014 IEEE 15th International Conference on Information …, 2014
232014
Next-generation technologies for preventing accidental death of children trapped in parked vehicles
V Aiello, PN Borazjani, E Battista, M Albanese
Proceedings of the 2014 IEEE 15th International Conference on Information …, 2014
212014
A hardware accelerator for data classification within the sensing infrastructure
M Barbareschi, E Battista, N Mazzocca, S Venkatesan
Proceedings of the 2014 IEEE 15th International Conference on Information …, 2014
142014
On the adoption of fpga for protecting cyber physical infrastructures
M Barbareschi, E Battista, V Casola
2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and …, 2013
142013
Siren: a feasible moving target defence framework for securing resource-constrained embedded nodes
E Battista, V Casola, A Mazzeo, N Mazzocca
International Journal of Critical Computer-Based Systems 4 (4), 374-392, 2013
112013
How to manage keys and reconfiguration in WSNs exploiting sram based PUFs
D Amelino, M Barbareschi, E Battista, A Mazzeo
Intelligent Interactive Multimedia Systems and Services 2016, 109-119, 2016
82016
Developing secure cloud applications
M Rak, M Ficco, E Battista, V Casola, N Mazzocca
Scalable Computing: Practice and Experience 15 (1), 49-62, 2014
72014
An integrated lifetime and network quality model of large WSNs
E Battista, V Casola, S Marrone, N Mazzocca, R Nardone, V Vittorini
2013 IEEE International Workshop on Measurements & Networking (M&N), 132-137, 2013
52013
A compositional modelling approach for large sensor networks design
E Battista, V Casola, N Mazzocca, R Nardone, S Marrone
2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and …, 2013
42013
Developing secure cloud applications: a case study
E Battista, V Casola, N Mazzocca, M Ficco, M Rak
2013 15th International Symposium on Symbolic and Numeric Algorithms for …, 2013
12013
Design a Secure Cyber-Physical Systems How Models and Security Adaptation Techniques can address CPS's challenges.
E Battista
University of Naples Federico II, Italy, 2015
2015
BOSON 2017 Reviewers List
R Nardone, A de Benedictis, F Moscato, D Amalfitano, A de Santo, ...
CADSA 2015
F Persia, D D'Auria, D Amalfitano, A de Santo, G Sperlì, S Pelosi, A Maisto, ...
The system can't perform the operation now. Try again later.
Articles 1–17