Match!
Ferdinando Battiati
Ad hoc wireless distribution serviceOptimized Link State Routing ProtocolComputer securityComputer scienceWireless ad hoc network
3Publications
1H-index
2Citations
What is this?
Publications 3
Newest
#2Girolamo Catania (Leonardo)
Last. Andrea Viola (University of Catania)
view all 6 authors...
The Cyber Security Simulation Service (CSSS) is a platform that provides a simulation environment modeling the impact of cyber attacks and related countermeasure in tactical networks exploiting the software defined networking (SDN) paradigm. CSSS integrates a generator of tactical scenarios, a network simulator, a graphical user interface, and a real SDN controller. The scenario generator, network simulator and user interface interact with each others exploiting a NATO standard called High Level...
Source
#1Marco Biagini (NATO)H-Index: 1
#2Sonia Forconi (NATO)H-Index: 1
Last. Ferdinando BattiatiH-Index: 1
view all 6 authors...
In the framework of the modern tactical scenarios and the increasing employment of Unmanned Autonomous Systems UAxS in multi-battlespace domains land, naval, air and cyberspace, the threats to the communications and networks available among the units on the battlefield are becoming ever more challenging. It thus becomes crucial to protect communications and networking of these systems from possible hostile actions aimed at jeopardizing mission execution in the Cyberspace. This paper is focused o...
1 CitationsSource
#1Ermanno Guardo (University of Catania)H-Index: 3
#2Giacomo Morabito (University of Catania)H-Index: 28
Last. Ferdinando BattiatiH-Index: 1
view all 5 authors...
Mobile Ad Hoc Networks (MANET) are widely used in tactical scenarios because they can be deployed rapidly in hostile areas and the distributed nature of their operations makes them robust to nodes failures. However, distributed control involves new vulnerabilities that might be critical in electronic warfare scenarios. In this paper we focus on black hole attacks which introduce in the network fake routing information. On the consequence of the above information, the malicious node enters in the...
1 CitationsSource
1