Ermanno Battista

Orcid: 0000-0001-9680-3040

According to our database1, Ermanno Battista authored at least 18 papers between 2013 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
How to manage massive spatiotemporal dataset from stationary and non-stationary sensors in commercial DBMS?
Knowl. Inf. Syst., March, 2024

2023
Rail anomalies detection: A comparative analysis of three self-supervised models on real data.
Comput. Ind., June, 2023

E2E-Loader: A Framework to Support Performance Testing of Web Applications.
Proceedings of the IEEE Conference on Software Testing, Verification and Validation, 2023

2016
How to Manage Keys and Reconfiguration in WSNs Exploiting SRAM Based PUFs.
Proceedings of the Intelligent Interactive Multimedia Systems and Services 2016, 2016

Deceiving Attackers by Creating a Virtual Attack Surface.
Proceedings of the Cyber Deception, Building the Scientific Foundation, 2016

2015
Design a Secure Cyber-Physical Systems How Models and Security Adaptation Techniques can address CPS's challenges.
PhD thesis, 2015

Testing 90 nm microcontroller SRAM PUF quality.
Proceedings of the 10th International Conference on Design & Technology of Integrated Systems in Nanoscale Era, 2015

A deception based approach for defeating OS and service fingerprinting.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
Developing Secure Cloud Applications.
Scalable Comput. Pract. Exp., 2014

A hardware accelerator for data classification within the sensing infrastructure.
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, 2014

Advancing WSN physical security adopting TPM-based architectures.
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, 2014

Next-generation technologies for preventing accidental death of children trapped in parked vehicles.
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, 2014

Manipulating the attacker's view of a system's attack surface.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

2013
SIREN: a feasible moving target defence framework for securing resource-constrained embedded nodes.
Int. J. Crit. Comput. Based Syst., 2013

Developing Secure Cloud Applications: A Case Study.
Proceedings of the 15th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2013

An integrated lifetime and network quality model of large WSNs.
Proceedings of the 2nd IEEE International Workshop on Measurements & Networking, 2013

A Compositional Modelling Approach for Large Sensor Networks Design.
Proceedings of the Eighth International Conference on P2P, 2013

On the Adoption of FPGA for Protecting Cyber Physical Infrastructures.
Proceedings of the Eighth International Conference on P2P, 2013


  Loading...