default search action
Ermanno Battista
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j4]Vincenzo Norman Vitale, Sergio Di Martino, Adriano Peron, Massimiliano Russo, Ermanno Battista:
How to manage massive spatiotemporal dataset from stationary and non-stationary sensors in commercial DBMS? Knowl. Inf. Syst. 66(3): 2063-2088 (2024) - 2023
- [j3]Antonio Origlia, Sergio Di Martino, Ermanno Battista:
Rail anomalies detection: A comparative analysis of three self-supervised models on real data. Comput. Ind. 148: 103909 (2023) - [c12]Ermanno Battista, Sergio Di Martino, Sergio Di Meglio, Fabio Scippacercola, Luigi Libero Lucio Starace:
E2E-Loader: A Framework to Support Performance Testing of Web Applications. ICST 2023: 351-361
2010 – 2019
- 2016
- [c11]Domenico Amelino, Mario Barbareschi, Ermanno Battista, Antonino Mazzeo:
How to Manage Keys and Reconfiguration in WSNs Exploiting SRAM Based PUFs. IIMSS 2016: 109-119 - [p1]Massimiliano Albanese, Ermanno Battista, Sushil Jajodia:
Deceiving Attackers by Creating a Virtual Attack Surface. Cyber Deception 2016: 169-201 - 2015
- [b1]Ermanno Battista:
Design a Secure Cyber-Physical Systems How Models and Security Adaptation Techniques can address CPS's challenges. University of Naples Federico II, Italy, 2015 - [c10]Massimiliano Albanese, Ermanno Battista, Sushil Jajodia:
A deception based approach for defeating OS and service fingerprinting. CNS 2015: 317-325 - [c9]Mario Barbareschi, Ermanno Battista, Antonino Mazzeo, Nicola Mazzocca:
Testing 90 nm microcontroller SRAM PUF quality. DTIS 2015: 1-6 - 2014
- [j2]Massimiliano Rak, Massimo Ficco, Ermanno Battista, Valentina Casola, Nicola Mazzocca:
Developing Secure Cloud Applications. Scalable Comput. Pract. Exp. 15(1) (2014) - [c8]Massimiliano Albanese, Ermanno Battista, Sushil Jajodia, Valentina Casola:
Manipulating the attacker's view of a system's attack surface. CNS 2014: 472-480 - [c7]Mario Barbareschi, Ermanno Battista, Antonino Mazzeo, Sridhar Venkatesan:
Advancing WSN physical security adopting TPM-based architectures. IRI 2014: 394-399 - [c6]Mario Barbareschi, Ermanno Battista, Nicola Mazzocca, Sridhar Venkatesan:
A hardware accelerator for data classification within the sensing infrastructure. IRI 2014: 400-405 - [c5]Vittoria Aiello, Parnian Najafi Borazjani, Ermanno Battista, Massimiliano Albanese:
Next-generation technologies for preventing accidental death of children trapped in parked vehicles. IRI 2014: 508-513 - 2013
- [j1]Ermanno Battista, Valentina Casola, Antonino Mazzeo, Nicola Mazzocca:
SIREN: a feasible moving target defence framework for securing resource-constrained embedded nodes. Int. J. Crit. Comput. Based Syst. 4(4): 374-392 (2013) - [c4]Ermanno Battista, Valentina Casola, Nicola Mazzocca, Roberto Nardone, Stefano Marrone:
A Compositional Modelling Approach for Large Sensor Networks Design. 3PGCIC 2013: 422-429 - [c3]Mario Barbareschi, Ermanno Battista, Valentina Casola, Antonino Mazzeo, Nicola Mazzocca:
On the Adoption of FPGA for Protecting Cyber Physical Infrastructures. 3PGCIC 2013: 430-435 - [c2]Ermanno Battista, Valentina Casola, Stefano Marrone, Nicola Mazzocca, Roberto Nardone, Valeria Vittorini:
An integrated lifetime and network quality model of large WSNs. M&N 2013: 132-137 - [c1]Ermanno Battista, Valentina Casola, Nicola Mazzocca, Massimo Ficco, Massimiliano Rak:
Developing Secure Cloud Applications: A Case Study. SYNASC 2013: 432-439
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:56 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint