Home Funded Projects Team Publications Invited Talks Teaching Thesis

EDITED BOOKS / JOURNAL SPECIAL ISSUES

  • [E004] Microservices - Science and Engineering
    A. Bucchiarone, N. Dragoni, S. Dustdar, P. Lago, M. Mazzara, V. Rivera
    Springer, 2019.
  • [E003] Dependability and Security in a Nordic Perspective - Part II
    N. Dragoni, C. D. Jensen
    International Journal of Critical Computer-Based Systems (IJCCBS), 4(1), 2013.
  • [E002] Dependability and Security in a Nordic Perspective - Part I
    N. Dragoni, C. D. Jensen
    International Journal of Critical Computer-Based Systems (IJCCBS), 3(4), 2012.
  • [E001] Frontiers in Trust Management
    C. D. Jensen, N. Dragoni, A. Basu, C. Mancini
    Journal of Internet Services and Information Security, 1(4), 2011.

INTERNATIONAL JOURNALS AND MAGAZINES

  • [J063] A Systematic Review of Cyber Range Taxonomies: Trends, Gaps, and a Proposed Taxonomy
    P. Lillemets, N. B. Jawad, J. Kashi, A. Sabah, N. Dragoni
    In Future Internet, 17(6): 259, 2025. DOI: https://doi.org/10.3390/fi17060259.
  • [J062] DrIfTeR: A Drone Identification Technique Using RF Signals
    P. Choudhary, V. Sihag, G. Choudhary, N. Dragoni
    In Forensic Science International: Digital Investigation, 54, 2025. DOI: https://doi.org/10.1016/j.fsidi.2025.301948.
  • [J061] Optimizing Internet of Things Honeypots with Machine Learning: A Review
    S. Lanz, S. L.-R. Pignol, P. Schmitt, H. Wang, M. Papaioannou, G. Choudhary, N. Dragoni
    In Applied Sciences, 15(10): 5251, 2025. DOI: https://doi.org/10.3390/app15105251.
  • [J060] Deepfake-Driven Social Engineering: Threats, Detection Techniques, and Defensive Strategies in Corporate Environments
    K. T. Pedersen, L. Pepke, T. Staermose, M. Papaioannou, G. Choudhary, N. Dragoni
    In Journal of Cybersecurity and Privacy, 5(2):18, 2025. DOI: https://doi.org/10.3390/jcp5020018.
  • [J059] Challenges and Potential Improvements for Passkey Adoption - A Literature Review with a User-Centric Perspective
    A. Matzen, A. Rüffer, M. Byllemos, O. Heine, M. Papaioannou, G. Choudhary, N. Dragoni
    In Applied Sciences, 15(8):4414, 2025. DOI: https://doi.org/10.3390/app15084414.
  • [J058] Advancements in Machine Learning-Based Intrusion Detection in IoT: Research Trends and Challenges
    MB. Bankó, S. Dyszewski, M. Králová, MB. Limpek, M. Papaioannou, G. Choudhary, N. Dragoni
    In Algorithms, 18(4):209, 2025. DOI: https://doi.org/10.3390/a18040209.
  • [J057] Systematic Literature Review of IoT Botnet DDOS Attacks and Evaluation of Detection Techniques
    M. Gelgi, Y. Guan, S. Arunachala, M. Samba Siva Rao, N. Dragoni
    In Sensors, 24(11), 3571, 2024. DOI: https://doi.org/10.3390/s24113571.
  • [J056] A Review of Lightweight Security and Privacy for Resource-Constrained IoT Devices
    G. Choudhary, S. Kumar, I. You, N. Dragoni, R. Dangi, D. Kumar
    In Computers, Materials & Continua, 78(1): 31-63, 2024. DOI: https://doi.org/10.32604/cmc.2023.047084.
  • [J055] 6G Mobile Networks: Key Technologies, Directions, and Advances
    R. Dangi, G. Choudhary, N. Dragoni, P. Lalwani, U. Khare, S. Kundu
    In Telecom, 4(4): 836-876, 2023. DOI: https://doi.org/10.3390/ telecom4040037.
  • [J054] A Survey of Automatic Generation of Attack Trees and Attack Graphs
    A. M. Konsta, B. Spiga, A. L. Lafuente, N. Dragoni
    In Computers & Security, 137, 2024. DOI: https://doi.org/10.1016/j.cose.2023.103602.
  • [J053] A Survey of Trust Management for Internet of Things
    A. M. Konsta, A. L. Lafuente, N. Dragoni
    In IEEE Access, vol. 11, 2023. DOI: https://doi.org/10.1109/ACCESS.2023.3327335.
  • [J052] Cyber4Drone: A Systematic Review of Cyber Security and Forensics in Next-Generation Drones
    V. Sihag, G. Choudhary, P. Choudhary, N. Dragoni
    In Drones, 7(7): 430, 2023. DOI: https://doi.org/10.3390/drones7070430.
  • [J051] FC-CACPHS: Fog-Cloud Assisted Context- Aware Framework for Cyber-Physical Healthcare System
    P. Verma, A. Gupta, R. Dangi, G. Choudhary, N. Dragoni, I. You
    In International Journal of Ad Hoc and Ubiquitous Computing, 45(3): 186-199, 2024. DOI: https://doi.org/10.1504/IJAHUC.2024.137505.
  • [J050] MaGiC: a DSL Framework for Implementing Language Agnostic Microservice-based Web Applications
    A. Bucchiarone, C. Ciumedean, K. Soysal, N. Dragoni, V. Pech
    In Journal of Object Technology, 22(1): 1-21, 2023. DOI: https://doi.org/10.5381/jot.2023.22.1.a2.
  • [J049] IEDA-HGEO: Improved Energy Efficient with Clustering-Based Data Aggregation and Transmission Protocol for Underwater Wireless Sensor Networks
    J. Shubham, T.P Anithaashri, R. Rastogi, G. Choudhary, N. Dragoni
    In Energies, 16(1), 353, 2023. DOI: https://doi.org/10.3390/en16010353.
  • [J048] Emerging Cyber Security Challenges after COVID Pandemic: A Survey
    A. Choudhary, G. Choudhary, K. Pareek, C. Kunndra, J. Luthra, N. Dragoni
    In Journal of Internet Services and Information Security, 12(2): 21-50, 2022. DOI: https://doi.org/10.22667/JISIS.2022.05.31.021.
  • [J047] Memory Offloading for Remote Attestation of Multi-Service IoT Devices
    E. Dushku, J.H. Østergaard, N. Dragoni
    In Sensors, 22, 4340, 2022. DOI: https://doi.org/10.3390/s22124340.
  • [J046] Secured Secret Sharing of QR Codes based on Nonnegative Matrix Factorization and Regularized Super Resolution Convolutional Neural Network
    R. Velumani, Hariharasitaraman S, G. Choudhary, S. Bama, M. Victor Jose, N. Dragoni
    In Sensors, 22(8), 2959, 2002. DOI: https://doi.org/10.3390/s22082959.
  • [J045] ML-based 5G Network Slicing Security: A Comprehensive Survey
    R. Dangi, A. Jadhav, G. Choudhary, N. Dragoni, M. K. Mishra, P. Lalwani
    In Future Internet, 14(4), 116, 2022. DOI: https://doi.org/10.3390/fi14040116.
  • [J044] BERT-Based Transfer-Learning Approach for Nested Named Entity Recognition Using Joint Labeling
    A. Agrawal, S. Tripathi, M. Vardhan, V. Sihag, G. Choudhary, N. Dragoni
    In Applied Sciences, 12(3): 976, 2022. DOI: https://doi.org/10.3390/app12030976.
  • [J043] ARCADIS: Asynchronous Remote Control-Flow Attestation of Distributed IoT Services
    R. M. Halldórsson, E. Dushku, N. Dragoni
    In IEEE Access, vol. 9, 2021. DOI: https://doi.org/10.1109/ACCESS.2021.3122391.
  • [J042] rTLS: Secure and Efficient TLS Session Resumption for the Internet of Things
    K. Tange, S. Mödersheim, A. Lalos, X. Fafoutis, N. Dragoni
    In Sensors, 21(19), 2021.
  • [J041] SxC4IoT: A Security-by-Contract Framework for Dynamic Evolving IoT Devices
    A. Giaretta, N. Dragoni, F. Massacci
    In ACM Transactions on Sensor Networks, 18(1): 12, 1-51, 2021. DOI: https://doi.org/10.1145/3480462.
  • [J040] AntibIoTic: The Fog-Enhanced Distributed Security System to Protect the (Legacy) Internet of Things
    M. De Donno, X. Fafoutis, N. Dragoni
    In Journal of Computer Security, 30: 689-725, 2022. DOI: https://doi.org/10.3233/JCS-210027.
  • [J039] A Survey on Botnets: Incentives, Evolution, Detection and Current Trends
    S.N.T. Vu, M. Stege, P.I. El-Habr, J. Bang, N. Dragoni
    In Future Internet, 13(8), 198, 2021. DOI: https://doi.org/10.3390/fi13080198.
  • [J038] State-of-the-Art Software-Based Remote Attestation: Opportunities and Open Issues for Internet of Things
    S. Ankergård, E. Dushku, N. Dragoni
    In Sensors, 21(5), 2021.
  • [J037] Benchmarks and Performance Metrics for Assessing the Migration to Microservice-Based Architectures
    N. Bjørndal, L.J. Pires de Araújo, A. Bucchiarone, N. Dragoni, M. Mazzara, S. Dustdar
    In Journal of Object Technology, 20(2): 3: 1-17, 2021.
  • [J036] Are We Preparing Students to Build Security In? A Survey of European Cybersecurity in Higher Education Programs
    N. Dragoni, A. Lluch Lafuente, F. Massacci, A. Schlichtkrull
    In IEEE Security & Privacy, 19(1): 81-88, Jan.-Feb. 2021.
  • [J035] On The Benefits and Challenges of Blockchains for Managing Food Supply Chains
    P. Katsikouli, A. S. Wilde, N. Dragoni, H. H. Jensen
    In Journal of the Science of Food and Agriculture, 2020, DOI: https://doi.org/10.1002/jsfa.10883.
  • [J034] A Systematic Survey of Industrial Internet of Things Security: Requirements and Fog Computing Opportunities
    K. Tange, M. De Donno, X. Fafoutis, N. Dragoni
    In IEEE Communication Surveys & Tutorials, 22(4): 2489-2520, 2020.
  • [J033] Oscausi - Practical Private Electronic Cash from Lelantus and MimbleWimble
    L. Herskind, P. Katsikouli, N. Dragoni
    In Journal of Internet Services and Information Security, 10(2): 16-34, 2020, DOI: https://doi.org/10.22667/JISIS.2020.05.31.016.
  • [J032] Privacy and Cryptocurrencies - A Systematic Literature Review
    L. Herskind, P. Katsikouli, N. Dragoni
    In IEEE Access, 8, 2020.
  • [J031] Mobile and Wearable Sensing Frameworks for mHealth Studies and Applications: A Systematic Review
    D. Kumar, S. Jeuris, J. E. Bardram, N. Dragoni
    ACM Transactions on Computing for Healthcare, 2(1): 1-28, 2021.
  • [J030] Blockchain Implementations and Use Cases for Supply Chains – A Survey
    P. Gönczöl, P. Katsikouli, L. Herskind, N. Dragoni
    In IEEE Access, 8, 2020.
  • [J029] Foundations and Evolution of Modern Computing Paradigms: Cloud, IoT, Edge, and Fog
    M. De Donno, K. Tange, N. Dragoni
    In IEEE Access, 7, 2019.
  • [J028] IoT Security Configurability with Security-by-Contract
    A. Giaretta, N. Dragoni, F. Massacci
    In Sensors, 19(19), 2019.
  • [J027] Cyber-Storms Come from Clouds: Security of Cloud Computing in the IoT Era
    M. De Donno, A. Giaretta, N. Dragoni, A. Bucchiarone, M. Mazzara
    In Future Internet, 11(6), 2019.
  • [J026] BitFlow - Enabling Real-Time Cash-Flow Evaluations through Blockchain
    L. Herskind, A. Giaretta, M. De Donno, N. Dragoni
    In Concurrency and Computation: Practice and Experience, 2019, DOI: https://doi.org/10.1002/cpe.5333.
  • [J025] Microservices: Migration of a Mission Critical System
    M. Mazzara, N. Dragoni, A. Bucchiarone, A. Giaretta, S. T. Larsen, S. Dustdar
    In IEEE Transactions on Services Computing, 14(5): 1464 - 1477, 2021, DOI: 10.1109/TSC.2018.2889087.
  • [J024] Analysis and Evaluation of SafeDroid v2.0, a Framework for Detecting Malicious Android Applications
    M. Argyriou, A. Spognardi, N. Dragoni
    In Security and Communication Networks, vol. 2018, Article ID 4672072, 15 pages, 2018.
  • [J023] From Monolithic to Microservices: An Experience Report from the Banking Domain
    A. Bucchiarone, N. Dragoni, S. Dustdar, S.T. Larsen, M. Mazzara
    In IEEE Software, 35(3): 50-55, 2018.
  • [J022] DDoS-Capable IoT Malwares - Comparative Analysis and Mirai Investigation
    M. De Donno, N. Dragoni, A. Giaretta, A. Spognardi
    In Security and Communication Networks, vol. 2018, Article ID 7178164, 30 pages, 2018.
  • [J021] A Survey of Man In The Middle Attacks
    M. Conti, N. Dragoni, V. Lesyk
    IEEE Communication Surveys & Tutorials, 18(3): 2027-2051, 2016.
  • [J020] Energy-Efficient Medium Access Control for Energy Harvesting Communications
    X. Fafoutis, A. Di Mauro, C. Orfanidis, N. Dragoni
    IEEE Transactions on Consumer Electronics, 61(4): 402-410, 2015.
  • [J019] A Framework and Classification for Fault Detection Approaches in Wireless Sensor Networks with an Energy Efficiency Perspective
    Y. Zhang, N. Dragoni, J. Wang
    International Journal of Distributed Sensor Networks, 11(11):1-11, 2015.
  • [J018] Adaptive Security in ODMAC for Multihop Energy Harvesting Wireless Sensor Networks
    A. Di Mauro, X. Fafoutis, N. Dragoni
    International Journal of Distributed Sensor Networks, 11(4): 1-10, 2015.
  • [J017] Receiver-Initiated Medium Access Control Protocols for Wireless Sensor Networks
    X. Fafoutis, A. Di Mauro, M. D. Vithanage, N. Dragoni
    Computer Networks, 76: 55-74, 2015, doi: 10.1016/j.comnet.2014.11.002.
  • [J016] Altruistic Backoff: Collision Avoidance for Receiver-Initiated MAC Protocols for Wireless Sensor Networks
    X. Fafoutis, C. Orfanidis, N. Dragoni
    International Journal of Distributed Sensor Networks, vol. 2014, article ID 576401, 2014, doi:10.1155/2014/576401.
  • [J015] Dynamic Allocation and Admission Policies for QoS-aware Provisioning Systems [Special Issue Invited Paper]
    M. Mazzucco, M. Mazzara, N. Dragoni
    International Journal of Critical Computer-Based Systems, 4(1): 27-44, 2013.
  • [J014] High-Level Algorithms and Data Structures for Security-By-Contract on Java Cards [Special Issue Invited Paper]
    N. Dragoni, O. Gadyatskaya, F. Massacci, A. Philippov
    International Journal of Critical Computer-Based Systems, 3(4): 284-304, 2012.
  • [J013] Declarative Specification of Fault Tolerant Auction Protocols: the English Auction Case Study
    N. Dragoni, M. Gaspari
    Computational Intelligence, 28(4): 617-641, 2012.
  • [J012] Introducing the Cyber-Physical Attacker to Energy- Harvesting Wireless Sensor Networks
    A. Di Mauro, D. Papini, R. Vigo, N. Dragoni
    Journal of Networking Technology, 3(3):139-148, 2012.
  • [J011] Implementing Workflow Reconfiguration in WS-BPEL
    M. Mazzara, N. Dragoni, M. Zhou
    Journal of Internet Services and Information Security, 2(1/2), 2012.
  • [J010] Security-by-Contract-with-Trust for Mobile Devices
    G. Costa, A. Lazouski, F. Martinelli, I. Matteucci, V. Issarny, R. Saadi, N. Dragoni, F. Massacci
    Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 1(4): 75-91, 2010.
  • [J009] What the Heck is this Application doing? - A Security-by-Contract Architecture for Pervasive Services
    N. Dragoni, F. Massacci, T. Walter, C. Schaefer
    Computers & Security, 28(7): 566-577, 2009.
  • [J008] Matching in Security-By-Contract for Mobile Code
    N. Bielova, N. Dragoni, F. Massacci, K. Naliuka, I. Siahaan
    Journal of Logic and Algebraic Programming, 78(5): 340-358, 2009.
  • [J007] A Self-Protecting and Self-Healing Framework for Negotiating Services and Trust in Autonomic Communication Systems
    N. Dragoni, F. Massacci, A. Saidane
    Computer Networks, 53(10): 1628-1648, 2009.
  • [J006] Security-By-Contract (S×C) for Mobile Systems [Invited paper]
    N. Dragoni, F. Massacci
    Telektronikk Journal, 1:107-116, 2009, Telenor.
  • [J005] An ACL for Specifying Fault-Tolerant Protocols
    N. Dragoni, M. Gaspari, D. Guidi
    Applied Artificial Intelligence, 21(4): 361-381, 2007.
  • [J004] Fault Tolerant Knowledge Level Inter-Agent Communication in Open Multi-Agent Systems
    N. Dragoni
    AI Communications, 19(4): 385-387, 2006.
  • [J003] Crash Failure Detection in Asynchronous Agent Communication Languages
    N. Dragoni, M. Gaspari
    Autonomous Agents and Multi-Agent Systems, 13(3): 355-390, 2006.
  • [J002] An Infrastructure to Support Cooperation of Knowledge-Level Agents on the Semantic Grid
    N. Dragoni, M. Gaspari, D. Guidi
    International Journal of Applied Intelligence, 25(2): 159-180, 2006.
  • [J001] An Object Based Algebra for Specifying A Fault Tolerant Software Architecture
    N. Dragoni, M. Gaspari
    Journal of Logic and Algebraic Programming, 63(2): 271-297, 2005.

ARTICLES IN BOOKS

  • [B010] Secure Software Updates in IoT Devices
    E. Dushku, N. Dragoni
    In: S. Jajodia, P. Samarati, M. Yung (eds) Encyclopedia of Cryptography, Security and Privacy. Springer, Berlin, Heidelberg.
    DOI: https://doi.org/ 10.1007/978-3-642-27739-9_1784-1.
  • [B009] Swarm Attestation
    E. Dushku, N. Dragoni
    In: S. Jajodia, P. Samarati, M. Yung (eds) Encyclopedia of Cryptography, Security and Privacy. Springer, Berlin, Heidelberg.
    DOI: https://doi.org/10.1007/978-3-642-27739-9_1783-1.
  • [B008] Remote Attestation in IoT Devices
    E. Dushku, N. Dragoni
    In: S. Jajodia, P. Samarati, M. Yung (eds) Encyclopedia of Cryptography, Security and Privacy. Springer, Berlin, Heidelberg.
    DOI: https://doi.org/10.1007/978-3-642-27739-9_1782-1.
  • [B007] Direct Anonymous Attestation
    E. Dushku, T. Giannetsos, N. Dragoni
    In: S. Jajodia, P. Samarati, M. Yung (eds) Encyclopedia of Cryptography, Security and Privacy. Springer, Berlin, Heidelberg.
    DOI: https://doi.org/10.1007/978-3-642-27739-9_1742-1.
  • [B006] Size Matters: Microservices Research and Applications
    M. Mazzara, A. Bucchiarone, N. Dragoni, V. Rivera
    In A. Bucchiarone et al.: Microservices - Science and Engineering, Springer, 2019.
  • [B005] Microservices: Yesterday, Today, and Tomorrow
    N. Dragoni, S. Giallorenzo, A. Lluch-Lafuente, M. Mazzara, F. Montesi, R. Mustafin, L. Safina
    In M. Mazzara and B. Meyer: Present And Ulterior Software Engineering, Springer, 2017.
  • [B004] Social Networks and Collective Intelligence: A Return to the Agora
    M. Mazzara, L. Biselli, P.P. Greco, N. Dragoni, A. Marraffa, N. Qamar, S. De Nicola
    In Caviglione et al.: Social Network Engineering for Secure Web Data and Services, IGI Global, 2013.
  • [B003] Supporting Software Evolution for Open Smart Cards by Security-by-Contract
    N. Dragoni, O. Gadyatskaya, F. Massacci
    In Petre et al.: Dependability and Computer Engineering: Concepts for Software-Intensive Systems, IGI Global, 2011.
  • [B002] Security-by-Contract (SxC) for Software and Services of Mobile Systems
    N. Dragoni, F. Martinelli, F. Massacci, P. Mori, C. Schaefer, T. Walter, E. Vetillard
    Di Nitto et al.: At Your Service - Service-Oriented Computing from an EU Perspective, MIT Press, 2009.
  • [B001] A Fault Tolerant Agent Communication Language for Supporting Web Agent Interaction
    N. Dragoni, M. Gaspari, D. Guidi
    Dugnum et al.: Agent Communication II - International Workshops on Agent Communication, AC2005 and AC2006, Selected and Revised Papers, vol. 3859, 2006, LNAI.

CONFERENCE AND WORKSHOP PROCEEDINGS

  • [P090] NetSMoM: ML-Driven Network Slicing Framework for Efficient and Secure Service Delivering in 6G Network
    R. Dangi, L. Malviya, A. Jadhav, G. Choudhary, N. Dragoni
    In Proceedings of the 8th International Conference on Mobile Internet Security (MobiSec), 2024.
  • [P089] Bruteware: A Novel Family of Cryptoviral Attacks
    V. Coletti, E. Müller, F. Meyer Lehmann Lundsbjerg, N. Dragoni
    In Proceedings of the 39th International Conference on ICT Systems Security and Privacy Protection (IFIP SEC), 2024, Springer.
  • [P088] Fake Base Station Detection and Localization in 5G Network: A Proof of Concept
    D. Butad, S. M. Tao, H. Tudtud, P. V. Astillo, G. Choudhary, N. Dragoni
    In Proceedings of the 7th International Conference on Mobile Internet Security (MobiSec), 2023, Springer.
  • [P087] A Threat and Risk Analysis of Internet Communication Technology Use
    K. Panwar, V. Sihag, G. Choudhary, N. Dragoni
    In Proceedings of the 8th International Conference on ICT for Sustainable Development (ICT4SD), 2023, Springer.
  • [P086] Accomplishing More With Less: The Practice of Cybersecure Health Technology Design Among Danish Startups Detection
    Z. Li, S. Nam Thanh, N. Dragoni, K. Doherty
    In Proceedings of the ACM CHI Conference on Human Factors in Computing Systems, 2023, ACM.
  • [P085] DyBAnd: Dynamic Behavior Based Android Malware Detection
    S. Jaiswal, V. Sihag, G. Choudhary, N. Dragoni
    In Proceedings of the 6th International Symposium on Mobile Internet Security, 2022, Springer.
  • [P084] Software-Defined Network based Secure Internet-Enabled Video Surveillance System
    M. Del Castillo, H. Hermosa, P. V. Astillo, G. Choudhary, N. Dragoni
    In Proceedings of the 23rd World Conference on Information Security Applications (WISA), 2022, Springer LNCS.
  • [P083] Cloud Storage Client Forensic: Analysis of MEGA Cloud
    H. Mishra, V. Sihag, G. Choudhary, N. Dragoni, I. You
    In Proceedings of the 4th International Conference on Futuristic Trends in Networks and Computing Technologies (FTNCT), 2021, Springer.
  • [P082] DIMDA: Deep Learning and Image-based Malware Detection for Android [Best Paper Award]
    V. Sihag, S. Prakash, G. Choudhary, N. Dragoni, I. You
    In Proceedings of the 4th International Conference on Futuristic Trends in Networks and Computing Technologies (FTNCT), 2021, Springer.
  • [P081] PERMANENT: Publicly Verifiable Remote Attestation for Internet of Things through Blockchain
    S. Ankergård, E. Dushku, N. Dragoni
    In Proceedings of the 14th International Symposium on Foundations & Practice of Security (FPS), 2021, Springer.
  • [P080] AI Empowered DevSecOps Security for Next Generation Development
    B. Yadav, G. Choudhary, S. K. Shandilya, N. Dragoni
    In Proceedings of the International Conference on Frontiers in Software Engineering (ICFSE), 2021, Springer.
  • [P079] RESERVE: Remote Attestation of Intermittent loT devices
    MD M. Rabbani, E. Dushku, J. Vliegen, A. Braeken, N. Dragoni, N. Mentens
    In Proceedings of the 9th International Workshop on Energy Harvesting & Energy-Neutral Sensing Systems (ENSsys), 2021, ACM.
  • [P078] ERAMO: Effective Remote Attestation through Memory Offloading
    J. H. østergaard, E. Dushku, N. Dragoni
    In Proceedings of the IEEE International Conference on Cyber Security and Resilience (CSR), 2021, IEEE.
  • [P077] Fault-Tolerant Clock Synchronization using Precise Time Protocol Multi-Domain Aggregation
    E. Kyriakakis, K. Tange, N. Reusch, E. O. Zaballa, X. Fafoutis, M. Schoeberl, N. Dragoni
    In Proceedings of the 24th IEEE International Symposium on Real-Time Distributed Computing (ISORC), 2021, IEEE.
  • [P076] RESIP Host Detection: Identification of Malicious Residential IP Proxy Flows
    A. Tosun, M. De Donno, N. Dragoni, X. Fafoutis
    In Proceedings of the 39th IEEE International Conference on Consumer Electronics (ICCE), 2021, IEEE.
  • [P075] Smart Lamp or Security Camera? Automatic Identification of IoT Devices
    M. D. Thomsen, A. Giaretta, N. Dragoni
    In Proceedings of the 12th International Network Conference 2020 (INC2020), 2020, Springer Lecture Notes in Networks and Systems.
  • [P074] rTLS: Lightweight TLS Session Resumption for Constrained IoT Devices
    K. Tange, D. Howard, T. Shanahan, S. Pepe, X. Fafoutis, N. Dragoni
    In Proceedings of the International Conference on Information and Communications Security (ICICS), 2020, LNCS.
  • [P073] IoT Device Profiling: From MUD Files to SxC Contracts
    G. Matthiasson, A. Giaretta, N. Dragoni
    In Proceedings of Open Identity Summit, 2020, GI-Edition Lecture Notes in Informatics (LNI).
  • [P072] SHAKE: SHared Acceleration Key Establishment for Resource-Constrained IoT Devices
    E. Bejder, A. K. Mathiasen, M. De Donno, N. Dragoni, X. Fafoutis
    In Proceedings of the 6th IEEE World Forum on Internet of Things (WF-IoT), 2020, IEEE.
  • [P071] Sustainable Security for Internet of Things
    M. De Donno, K. M. Malarski, X. Fafoutis, N. Dragoni, M. Nordal Petersen, M. Stübert Berger, S. Ruepp
    In Proceedings of SmartNets 2019: International Conference on Smart Applications, Communications and Networking, 2019, IEEE.
  • [P070] UniquID: A Quest to Reconcile Identity Access Management and the Internet of Things
    A. Giaretta, S. Pepe, N. Dragoni
    In Proceedings of TOOLS 50+1:Technology of Object-Oriented Languages and Systems, 2019, LNCS.
  • [P069] AntibIoTic 2.0: A Fog-based Anti-Malware for Internet of Things
    M. De Donno, Juan M. D. Felipe, N. Dragoni
    In Proceedings of the European Workshop on Security and Privacy in Edge Computing (EuroSPEC at EuroS&P), 2019, IEEE.
  • [P068] Combining AntibIoTic with Fog Computing: AntibIoTic 2.0
    M. De Donno, N. Dragoni
    In Proceedings of the 3rd IEEE International Conference on Fog and Edge Computing (ICFEC 2019), 2019, IEEE.
  • [P067] Protecting the Internet of Things with Security-by-Contract and Fog Computing
    A. Giaretta, N. Dragoni, F. Massacci
    In Proceedings of the IEEE 5th World Forum on Internet of Things (WF-IoT), 2019, IEEE.
  • [P066] Towards a Systematic Survey of Industrial IoT Security Requirements: Research Method and Quantitative Analysis
    K. Tange, M. De Donno, X. Fafoutis, N. Dragoni
    In Proceedings of Workshop on Fog Computing and the IoT (Fog-IoT'19), co-located with CPS-IoT Week, 2019, IEEE.
  • [P065] Vulnerabilities and Security Breaches in Cryptocurrencies
    G. Sigurdsson, A. Giaretta, N. Dragoni
    In: Ciancarini P., Mazzara M., Messina A., Sillitti A., Succi G. (eds) Proceedings of 6th International Conference in Software Engineering for Defence Applications (SEDA 2018). Advances in Intelligent Systems and Computing, vol 925. Springer.
  • [P064] Community Targeted Phishing
    A. Giaretta, N. Dragoni
    In: Ciancarini P., Mazzara M., Messina A., Sillitti A., Succi G. (eds) Proceedings of 6th International Conference in Software Engineering for Defence Applications (SEDA 2018). Advances in Intelligent Systems and Computing, vol 925. Springer.
  • [P063] When the Price Is Your Privacy: A Security Analysis of Two Cheap IoT Devices
    M. Favaretto,T. Tran Anh, J. Kavaja, M. De Donno, N. Dragoni
    In: Ciancarini P., Mazzara M., Messina A., Sillitti A., Succi G. (eds) Proceedings of 6th International Conference in Software Engineering for Defence Applications (SEDA 2018), Advances in Intelligent Systems and Computing, vol 925, Springer.
  • [P062] Adding Salt to Pepper - A Structured Security Assessment over a Humanoid Robot
    A. Giaretta, M. De Donno, N. Dragoni
    In Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES'18), IoT-SECFOR session, 2018, ACM.
  • [P061] Joining Jolie to Docker - Orchestration of Microservices on a Containers-as-a-Service Layer
    A. Giaretta, N. Dragoni, M. Mazzara
    In Proceedings of the 5th International Conference in Software Engineering for Defense Applications (SEDA'16), 2018, LNCS.
  • [P060] The Internet of Hackable Things
    N. Dragoni, A. Giaretta, M. Mazzara
    In Proceedings of the 5th International Conference in Software Engineering for Defense Applications (SEDA'16), 2018, LNCS.
  • [P059] AntibIoTic: Protecting IoT Devices Against DDoS Attacks
    M. De Donno, N. Dragoni, A. Giaretta, M. Mazzara
    In Proceedings of the 5th International Conference in Software Engineering for Defense Applications (SEDA'16), 2018, LNCS.
  • [P058] Analysis of DDoS-Capable IoT Malwares
    M. De Donno, N. Dragoni, A. Giaretta, A. Spognardi
    In Proceedings of 1st International Conference on Security, Privacy, and Trust (INSERT), 2017, IEEE.
  • [P057] Security Flows in OAuth 2.0 Framework - A Case Study
    M. Argyriou, N. Dragoni, A. Spognardi
    In Proceedings of TELERISE: 3rd International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity, 2017, LNCS.
  • [P056] Microservices: How To Make Your Application Scale
    N. Dragoni, I. Lanese, S. Thordal Larsen, M. Mazzara, R. Mustafin, L. Safina
    In Proceedings of the 11th A.P. Ershov Informatics Conference, 2017, LNCS.
  • [P055] A Taxonomy of Distributed Denial of Service Attacks
    M. De Donno, N. Dragoni, A. Giaretta, A. Spognardi
    In Proceedings of the International Conference on Information Society (i-Society), 2017, IEEE.
  • [P054] Security and Privacy Issues in Healthcare Monitoring Systems: A Case Study
    D. T. Handler, L. Hauge, A. Spognardi, N. Dragoni
    In Proceedings of the 10th International Conference on Health Informatics (HEALTHINF'17), 2017, SCITEPRESS.
  • [P053] SafeDroid: A Distributed Malware Detection Service for Android
    R. Goyal, A. Spognardi, N. Dragoni, M. Argyriou
    In Proceedings of the 9th IEEE International Conference on Service-Oriented Computing and Applications (SOCA), 2016, IEEE.
  • [P052] Why Hackers Love eHealth Applications
    R. Goyal, N. Dragoni
    In Proceedings of the 3rd EAI International Conference on IoT Technologies for HealthCare (HealthyIoT), 2016, LNICST.
  • [P051] Security and Privacy Issues in Health Monitoring Systems: eCare@Home Case Study
    T. Wearing, N. Dragoni
    In Proceedings of the 1st Workshop on Emerging eHealth through Internet of Things, affiliated with HealthyIoT'16, 2016, LNICST.
  • [P050] Evaluation of Professional Cloud Password Management Tools
    D. Schougaard, N. Dragoni, A. Spognardi
    In Proceedings of the 2nd International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity (TELERISE'16), affiliated with ICWE'1616, 2016, LNCS.
  • [P049] Mind The Tracker You Wear - A Security Analysis of Wearable Health Trackers
    R. Goyal, N. Dragoni, A. Spognardi
    In Proceedings of the 31st ACM Symposium on Applied Computing (SAC'16), track on HEALTHCARE: A Growing Scenario for Applied Computing, 2016, ACM.
  • [P048] Adaptive Multipath Key Reinforcement for Energy Harvesting Wireless Sensor Networks
    A. Di Mauro, N. Dragoni
    In Proceedings of the 6th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN'15), 2015, Elsevier.
  • [P047] Fault Detection in WSNs - An Energy Efficiency Perspective Towards Human-Centric WSNs
    C. Orfanidis, Y. Zhang, N. Dragoni
    In Proceedings of the 9th International KES Conference on Agents and Multi-Agent Systems: Technologies and Applications (KES-AMSTA'15, session on Anthropic-Oriented Computing), 2015, Springer.
  • [P046] Energy-Efficient Fault-Tolerant Dynamic Event Region Detection in Wireless Sensor Networks
    H.-J. Enemark, Y. Zhang, N. Dragoni, C. Orfanidis
    In Proceedings of IEEE VTC Workshop on Heterogeneous Networking for the Internet of Things, 2015, IEEE.
  • [P045] MITHYS: Mind The Hand You Shake - Protecting Mobile Devices from SSL Usage Vulnerabilities
    M. Conti, N. Dragoni, S. Gottardo
    In Proceedings of the 9th workshop on Security & Trust Management (STM'13), Egham (UK) in conjunction with ESORICS, 2013, LNCS.
  • [P044] Detecting and Preventing Beacon Replay Attacks in Receiver-Initiated MAC Protocols for Energy Efficient WSNs
    A. Di Mauro, X. Fafoutis, S. Mödersheim, N. Dragoni
    In Proceedings of the 18th Nordic Conference on Secure IT Systems (NordSec'13), Ilulissat, Greenland, 2013, LNCS.
  • [P043] Sustainable Performance in Energy Harvesting - Wireless Sensor Networks [Tool Demonstration]
    X. Fafoutis, A. Di Mauro, N. Dragoni
    In Proceedings of the fourth International Conference on Future Energy Systems (e-Energy), Berkeley, CA, 2013, ACM.
  • [P042] Sustainable Medium Access Control: Implementation and Evaluation of ODMAC
    X. Fafoutis, A. Di Mauro, N. Dragoni
    In Proceedings of the IEEE International Conference on Communications (ICC'13) - Workshop on Energy Efficiency in Wireless Networks & Wireless Networks for Energy Efficiency (E2Nets), 2013, IEEE.
  • [P041] Medium Access Control for Thermal Energy Harvesting in Advanced Metering Infrastructures
    M. D. Vithanage, X. Fafoutis, C. B. Andersen, N. Dragoni
    In Proceedings of the International Conference on Computer as a Tool (EUROCON'13), Zagreb, Croatia, 2013, IEEE.
  • [P040] Social Networks and Collective Intelligence - A Return to the Agora (with the Polidoxa Shift) [Position Paper]
    L. Biselli, N. Dragoni, E. Goldoni, P.P. Greco, A. Marraffa, M. Mazzara, G. Papageorgiou
    In Proceedings of the 1st International Conference on Agreement Technologies (AT'12), Dubrovnik, Croatia, 2012, CEUR-WS.
  • [P039] Analytical Comparison of MAC Schemes for Energy Harvesting - Wireless Sensor Networks
    X. Fafoutis, N. Dragoni
    In Proceedings of the International Workshop on Algorithms and Concepts for Networked Sensing Systems Powered by Energy Harvesters (EnHaNSS'12), Antwerp, Belgium, 2012, IEEE.
  • [P038] Adaptive Medium Access Control for Energy Harvesting - Wireless Sensor Networks
    X. Fafoutis, N. Dragoni
    In Proceedings of the 9th International Conference on Networked Sensing Systems (INSS'12), Antwerp, Belgium, 2012, IEEE.
  • [P037] Modelling and Analysis of Dynamic Reconfiguration in BP-Calculus
    F. Abouzaid, J. Mullins, M. Mazzara, N. Dragoni
    In Proceedings of the 1st International Workshop on Trustworthy Multi-Agent Systems (TruMAS'12), Invited Session at KES-AMSTA 2012, Dubrovnik, Croatia, LNCS.
  • [P036] Toward a Threat Model for Energy-Harvesting Wireless Sensor Networks
    A. Di Mauro, D. Papini, R. Vigo, N. Dragoni
    In Proceedings of the International Workshop on Wireless Sensor Networks and their Applications at NDT'12, Dubai, UAE, 2012, CCIS (LNCS).
  • [P035] Security Challenges for Energy-Harvesting Wireless Sensor Networks [Poster/Short Paper]
    A. Di Mauro, D. Papini, N. Dragoni
    In Proceedings of the 2nd International Conference on Pervasive and Embedded Computing and Communication Systems (PECCS 2012), Rome, Italy, 2012.
  • [P034] Energy-Harvesting Wireless Sensor Networks [Poster/Short Paper]
    X. Fafoutis, D. Vuckovic, A. Di Mauro, N. Dragoni, J. Madsen
    In (adjunct) Proceedings of the 9th European Conference on Wireless Sensor Networks (EWSN'12), Trento, Italy, 2012.
  • [P033] Toward a Unified Framework for Web Service Trustworthiness [Reflection Paper]
    N. Miotto, N. Dragoni
    In Proceedings of IADIS e-Society, Berlin, Germany, 2012.
  • [P032] Toward Design, Modelling and Analysis of Dynamic Workflow Reconfigurations - A Process Algebra Perspective
    M. Mazzara, F. Abouzaid, N. Dragoni, A. Bhattacharyya
    In Proceedings of the 8th International Workshop on Web Services and Formal Methods (WS-FM'11), Clermont-Ferrand, France, 2011, LNCS.
  • [P031] ODMAC: On Demand MAC Protocol for Energy Harvesting Wireless Sensor Networks
    X. Fafoutis, N. Dragoni
    In Proceedings of the Eighth ACM International Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks (PE-WASUN'11), Miami Beach, FL, USA, 2011, ACM.
  • [P030] Dependable Workflow Reconfiguration in WS-BPEL
    M. Mazzara, N. Dragoni, M. Zhou
    In Proceedings of the 5th Nordic Workshop on Dependability and Security (NODES'11), Copenhagen, Denmark, 2011, DTU Technical Report.
  • [P029] Analysis of Trust-Based Approaches for Web Service Selection
    N. Dragoni, N. Miotto, D. Papini
    In Proceedings of the 5th Nordic Workshop on Dependability and Security (NODES'11), Copenhagen, Denmark, 2011, DTU Technical Report.
  • [P028] Design, Modelling and Analysis of a Workflow Reconfiguration [Best Paper Award]
    M. Mazzara, F. Abouzaid, N Dragoni, A. Bhattacharyya
    In Proceedings of the International Workshop on Petri Nets and Software Engineering (PNSE'11), Newcastle upon Tyne, UK, 2011, CEUR-WS.
  • [P027] (SC)2: Secure Communication over Smart Cards - How to Secure Off-Card Matching in Security-by-Contract for Open Multi-Application Smart Cards.
    N. Dragoni, E. Lostal, D. Papini, J. Fabra
    In Proceedings of the International Workshop on Foundations & Practice of Security (FPS), Paris, France, 2011, LNCS.
  • [P026] Loading-Time Verification for Open Multi-Application Smart Cards
    N. Dragoni, O. Gadyatskaya, F. Massacci, F. Paci, E. Lostal
    In Proceedings of the IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY 2011), Pisa, Italy, 2011, IEEE.
  • [P025] (SC)2: a System to Secure Off-Card Contract-Policy Matching in Security-by-Contract for Open Multi-Application Smart Cards [Tool Demonstration]
    N. Dragoni, E. Lostal, D. Papini
    In Proceedings of the IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY 2011), Pisa, Italy, 2011, IEEE.
  • [P024] Extending Security-by-Contract with Quantitative Trust on Mobile Devices
    A.Lazouski, F.Martinelli, F.Massacci, G.Costa, N.Dragoni, I.Matteucci
    In Proceeding of CISIS 2010, The Fourth International Conference on Complex, Intelligent and Software Intensive Systems, pages 872-877, 2010, IEEE.
  • [P023] Securing Off-Card Contract-Policy Matching in Security-By-Contract for Multi-Application Smart Cards
    N. Dragoni, E. Lostal, D. Papini, J. Fabra
    In Proceedings of the 4th International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies (UBICOMM 2010), Firenze, Italy, 2010, XPS.
  • [P022] A Survey on Trust-Based Web Service Provision Approaches [Best Paper Award]
    N. Dragoni
    In Proceedings of the 3th International Conference on Dependability (DEPEND 2010), Venice, Italy, 2010, IEEE CPS.
  • [P021] Design of QoS-aware Provisioning Systems
    M. Mazzucco, M. Mazzara, N. Dragoni
    In Proceedings of the 4th Nordic Workshop on Dependability and Security (NODES 2010), Copenhagen, Denmark, 2010, DTU Technical Report.
  • [P020] Security-by-Contract for Applications' Evolution in Multi-Application Smart Cards
    N. Dragoni, O. Gadyatskaya, F. Massacci
    In Proceedings of the 4th Nordic Workshop on Dependability and Security (NODES 2010), Copenhagen, Denmark, 2010, DTU Technical Report.
  • [P019] Supporting Applications' Evolution in Multi-Application Smart Cards by Security-by-Contract
    N. Dragoni, O. Gadyatskaya, F. Massacci
    In Proceedings of the 4th Workshop in Information Security Theory and Practices (WISTP 2010), Passau, Germany, 2010, LNCS, Springer.
  • [P018] Extending Security-by-Contract with Quantitative Trust on Mobile Devices
    G. Costa, N. Dragoni, A. Lazouski, F. Martinelli, F. Massacci, I. Matteucci
    In Proceedings of the 4th International Workshop on Intelligent, Mobile and Internet Services in Ubiquitous Computing (IMIS 2010), Krakow, Poland, 2010, IEEE Computer Society Press.
  • [P017] Where are All the Agents? On the Gap Between Theory and Practice of Agent-Based Referral Networks - An Inter-Agent Communication Perspective
    N. Dragoni
    In Proceedings of the 12th International Conference on Principles of Practice in Multi-Agent Systems (PRIMA'09), Nagoya, Japan, 2009, LNAI, Springer.
  • [P016] A Formal Semantics for the WS-BPEL Recovery Framework - The Pi-Calculus Way
    N. Dragoni, M. Mazzara
    In Proceedings of the 6th International Workshop on Web Services and Formal Methods (WS-FM'09), Bologna, Italy, 2009, LNCS, Springer.
  • [P015] Toward Trustworthy Web Services - Approaches, Weaknesses and Trust-By-Contract Framework
    N. Dragoni
    In Proceedings of WI/IAT Web Privacy and Trust Workshop (WPT'09), Milano, Italy, 2009, IEEE Computer Society Press.
  • [P014] Security-by-Contract (SxC) for Mobile Systems [Position Paper]
    N. Dragoni, F. Massacci, K. Naliuka
    W3C Workshop on Security for Access to Device APIs from the Web (http://www.w3.org/2008/security-ws/), 2008.
  • [P013] Security-by-Contract (SxC) [Poster Paper]
    N. Dragoni, F. Massacci, K. Naliuka
    In Proceedings of ICT-MobileSummit, Stockholm, Sweden, 2008.
  • [P012] An Inline Monitoring System for .NET Mobile Devices [Tool Demonstration]
    N. Dragoni, F. Massacci, K. Naliuka
    In Proceedings of IFIPTM'08, Trondheim, Norway, 2008, IFIP, Springer.
  • [P011] A Framework for Dependable Trust Negotiation in Open Environment
    N. Dragoni, A. Saidane
    In Proceedings of the 5th IEEE Workshop on Engineering of Autonomic and Autonomous Systems (EASE'08), Belfast, Northern Ireland, 2008, IEEE Computer Society Press.
  • [P010] Matching Policies with Security Claims of Mobile Applications
    N. Bielova, M. Dalla Torre, N. Dragoni, I. Siahaan
    In Proceedings of the Third International Conference on Availability, Reliability and Security (ARES'08), Barcelona, Spain, 2008, IEEE Computer Society Press.
  • [P009] Security-by-Contract for Web Services - or How to Trade Credentials for Services
    N. Dragoni, F. Massacci
    In Proceedings of the ACM Workshop on Secure Web Services (SWS'07), Alexandria, VA, USA, 2007, ACM.
  • [P008] Decision Making in Fund Raising Management: a Knowledge Based Approach
    L. Barzanti, N. Dragoni, A. Degli Esposti, M. Gaspari
    In Proceedings of the 27th SGAI International Conference on Artificial Intelligence (AI-2007), Cambridge, UK, 2007, Springer.
  • [P007] A Security-by-Contract Architecture for Pervasive Services
    N. Dragoni, F. Massacci, C. Schaefer, T. Walter, E. Vetillard
    In Proceedings of the 3rd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU'07), Instanbul, Turkey, 2007, IEEE Computer Society Press.
  • [P006] Security-by-Contract: Toward a Semantics for Digital Signatures on Mobile Code
    N. Dragoni, F. Massacci, K. Naliuka, I. Siahaan
    In Proceedings of the Fourth European PKI Workshop: Theory and Practice (EuroPKI'07), Mallorca, Spain, 2007, LNCS.
  • [P005] Performative Patterns for Designing Verifiable ACLs
    N. Dragoni, M. Gaspari
    In Proceedings of the Tenth International Workshop on Cooperative Information Agents (CIA2006), Edinburgh, UK, 2006, LNAI, Springer.
  • [P004] NOWHERE - An Open Service Architecture to support Agents and Services within the Semantic Web
    N. Dragoni, M. Gaspari, D. Guidi
    In Proceedings of the 2nd Italian Semantic Web Workshop on Semantic Web Applications and Perspectives (SWAP'05), Trento, Italy, 2005, CEUR-WS.
  • [P003] An ACL for Specifying Fault-Tolerant Protocols
    N. Dragoni, M. Gaspari, D. Guidi
    In Proceedings of the 9th AI*IA Conference, Milano, Italy, 2005, LNAI, Springer.
  • [P002] Integrating Knowledge-Level Agents in the (Semantic) Web: an Agent-based Open Service Architecture
    N. Dragoni, M. Gaspari, D. Guidi
    In Proceedings of the 18th International FLAIRS Conference, Clearwater Beach, Florida (USA), 2005, AAAI Press.
  • [P001] A Peer-to-Peer Knowledge Level Open Service Architecture
    N. Dragoni, M. Gaspari, D. Guidi
    In Proceedings of WM2005 Workshop on "Peer-to-Peer and Agent Infrastructures for Knowledge Management" (PAIKM05), Kaiserslautern, Germany, 2005, DFKI Kaiserslautern.