Manipulating the attacker's view of a system's attack surface M Albanese, E Battista, S Jajodia, V Casola 2014 IEEE Conference on Communications and Network Security, 472-480, 2014 | 40 | 2014 |
Deceiving attackers by creating a virtual attack surface M Albanese, E Battista, S Jajodia Cyber Deception: Building the Scientific Foundation, 167-199, 2016 | 35 | 2016 |
A deception based approach for defeating OS and service fingerprinting M Albanese, E Battista, S Jajodia 2015 IEEE Conference on Communications and Network Security (CNS), 317-325, 2015 | 28 | 2015 |
Testing 90 nm microcontroller SRAM PUF quality M Barbareschi, E Battista, A Mazzeo, N Mazzocca 2015 10th International Conference on Design & Technology of Integrated …, 2015 | 24 | 2015 |
Advancing wsn physical security adopting tpm-based architectures M Barbareschi, E Battista, A Mazzeo, S Venkatesan Proceedings of the 2014 IEEE 15th International Conference on Information …, 2014 | 23 | 2014 |
Next-generation technologies for preventing accidental death of children trapped in parked vehicles V Aiello, PN Borazjani, E Battista, M Albanese Proceedings of the 2014 IEEE 15th International Conference on Information …, 2014 | 21 | 2014 |
A hardware accelerator for data classification within the sensing infrastructure M Barbareschi, E Battista, N Mazzocca, S Venkatesan Proceedings of the 2014 IEEE 15th International Conference on Information …, 2014 | 14 | 2014 |
On the adoption of fpga for protecting cyber physical infrastructures M Barbareschi, E Battista, V Casola 2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and …, 2013 | 14 | 2013 |
Siren: a feasible moving target defence framework for securing resource-constrained embedded nodes E Battista, V Casola, A Mazzeo, N Mazzocca International Journal of Critical Computer-Based Systems 4 (4), 374-392, 2013 | 11 | 2013 |
How to manage keys and reconfiguration in WSNs exploiting sram based PUFs D Amelino, M Barbareschi, E Battista, A Mazzeo Intelligent Interactive Multimedia Systems and Services 2016, 109-119, 2016 | 8 | 2016 |
Developing secure cloud applications M Rak, M Ficco, E Battista, V Casola, N Mazzocca Scalable Computing: Practice and Experience 15 (1), 49-62, 2014 | 7 | 2014 |
An integrated lifetime and network quality model of large WSNs E Battista, V Casola, S Marrone, N Mazzocca, R Nardone, V Vittorini 2013 IEEE International Workshop on Measurements & Networking (M&N), 132-137, 2013 | 5 | 2013 |
A compositional modelling approach for large sensor networks design E Battista, V Casola, N Mazzocca, R Nardone, S Marrone 2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and …, 2013 | 4 | 2013 |
Developing secure cloud applications: a case study E Battista, V Casola, N Mazzocca, M Ficco, M Rak 2013 15th International Symposium on Symbolic and Numeric Algorithms for …, 2013 | 1 | 2013 |
Design a Secure Cyber-Physical Systems How Models and Security Adaptation Techniques can address CPS's challenges. E Battista University of Naples Federico II, Italy, 2015 | | 2015 |
BOSON 2017 Reviewers List R Nardone, A de Benedictis, F Moscato, D Amalfitano, A de Santo, ... | | |
CADSA 2015 F Persia, D D'Auria, D Amalfitano, A de Santo, G Sperlì, S Pelosi, A Maisto, ... | | |