INTERNATIONAL JOURNALS AND MAGAZINES
-
[J063] A Systematic Review of Cyber Range Taxonomies: Trends, Gaps, and a Proposed Taxonomy
P. Lillemets, N. B. Jawad, J. Kashi, A. Sabah, N. Dragoni
In Future Internet, 17(6): 259, 2025. DOI: https://doi.org/10.3390/fi17060259.
-
[J062] DrIfTeR: A Drone Identification Technique Using RF Signals
P. Choudhary, V. Sihag, G. Choudhary, N. Dragoni
In Forensic Science International: Digital Investigation, 54, 2025. DOI: https://doi.org/10.1016/j.fsidi.2025.301948.
-
[J061] Optimizing Internet of Things Honeypots with
Machine Learning: A Review
S. Lanz, S. L.-R. Pignol, P. Schmitt, H. Wang, M.
Papaioannou, G. Choudhary, N. Dragoni
In Applied Sciences, 15(10): 5251, 2025. DOI:
https://doi.org/10.3390/app15105251.
-
[J060] Deepfake-Driven Social Engineering: Threats,
Detection Techniques, and Defensive Strategies in
Corporate Environments
K. T. Pedersen, L. Pepke, T. Staermose, M. Papaioannou, G.
Choudhary, N. Dragoni
In Journal of Cybersecurity and Privacy, 5(2):18, 2025. DOI:
https://doi.org/10.3390/jcp5020018.
-
[J059] Challenges and Potential Improvements for
Passkey Adoption - A Literature Review with a
User-Centric Perspective
A. Matzen, A. Rüffer, M. Byllemos, O. Heine, M.
Papaioannou, G. Choudhary, N. Dragoni
In Applied Sciences, 15(8):4414, 2025. DOI:
https://doi.org/10.3390/app15084414.
-
[J058] Advancements in Machine Learning-Based
Intrusion Detection in IoT: Research Trends and
Challenges
MB. Bankó, S. Dyszewski, M. Králová, MB. Limpek, M.
Papaioannou, G. Choudhary, N. Dragoni
In Algorithms, 18(4):209, 2025. DOI:
https://doi.org/10.3390/a18040209.
-
[J057] Systematic Literature Review of IoT Botnet
DDOS Attacks and Evaluation of Detection Techniques
M. Gelgi, Y. Guan, S. Arunachala, M. Samba Siva Rao, N.
Dragoni
In Sensors, 24(11), 3571, 2024. DOI:
https://doi.org/10.3390/s24113571.
-
[J056] A Review of Lightweight Security and Privacy
for Resource-Constrained IoT Devices
G. Choudhary, S. Kumar, I. You, N. Dragoni, R. Dangi, D.
Kumar
In Computers, Materials & Continua, 78(1): 31-63, 2024. DOI:
https://doi.org/10.32604/cmc.2023.047084.
-
[J055] 6G Mobile Networks: Key Technologies,
Directions, and Advances
R. Dangi, G. Choudhary, N. Dragoni, P. Lalwani, U. Khare, S.
Kundu
In Telecom, 4(4): 836-876, 2023. DOI:
https://doi.org/10.3390/ telecom4040037.
-
[J054] A Survey of Automatic Generation of Attack
Trees and Attack Graphs
A. M. Konsta, B. Spiga, A. L. Lafuente, N. Dragoni
In Computers & Security, 137, 2024. DOI:
https://doi.org/10.1016/j.cose.2023.103602.
-
[J053] A Survey of Trust Management for Internet of
Things
A. M. Konsta, A. L. Lafuente, N. Dragoni
In IEEE Access, vol. 11, 2023. DOI:
https://doi.org/10.1109/ACCESS.2023.3327335.
-
[J052] Cyber4Drone: A Systematic Review of Cyber
Security and Forensics in Next-Generation Drones
V. Sihag, G. Choudhary, P. Choudhary, N. Dragoni
In Drones, 7(7): 430, 2023. DOI:
https://doi.org/10.3390/drones7070430.
-
[J051] FC-CACPHS: Fog-Cloud Assisted Context- Aware
Framework for Cyber-Physical Healthcare System
P. Verma, A. Gupta, R. Dangi, G. Choudhary, N. Dragoni, I.
You
In International Journal of Ad Hoc and Ubiquitous Computing,
45(3): 186-199, 2024. DOI:
https://doi.org/10.1504/IJAHUC.2024.137505.
-
[J050] MaGiC: a DSL Framework for Implementing
Language Agnostic Microservice-based Web Applications
A. Bucchiarone, C. Ciumedean, K. Soysal, N. Dragoni, V.
Pech
In Journal of Object Technology, 22(1): 1-21, 2023. DOI:
https://doi.org/10.5381/jot.2023.22.1.a2.
-
[J049] IEDA-HGEO: Improved Energy Efficient with
Clustering-Based Data Aggregation and Transmission
Protocol for Underwater Wireless Sensor Networks
J. Shubham, T.P Anithaashri, R. Rastogi, G. Choudhary, N.
Dragoni
In Energies, 16(1), 353, 2023. DOI:
https://doi.org/10.3390/en16010353.
-
[J048] Emerging Cyber Security Challenges after COVID
Pandemic: A Survey
A. Choudhary, G. Choudhary, K. Pareek, C. Kunndra, J.
Luthra, N. Dragoni
In Journal of Internet Services and Information Security,
12(2): 21-50, 2022. DOI:
https://doi.org/10.22667/JISIS.2022.05.31.021.
-
[J047] Memory Offloading for Remote Attestation of
Multi-Service IoT Devices
E. Dushku, J.H. Østergaard, N. Dragoni
In Sensors, 22, 4340, 2022. DOI:
https://doi.org/10.3390/s22124340.
-
[J046] Secured Secret Sharing of QR Codes based on
Nonnegative Matrix Factorization and Regularized Super
Resolution Convolutional Neural Network
R. Velumani, Hariharasitaraman S, G. Choudhary, S. Bama, M.
Victor Jose, N. Dragoni
In Sensors, 22(8), 2959, 2002. DOI:
https://doi.org/10.3390/s22082959.
-
[J045] ML-based 5G Network Slicing Security: A
Comprehensive Survey
R. Dangi, A. Jadhav, G. Choudhary, N. Dragoni, M. K. Mishra,
P. Lalwani
In Future Internet, 14(4), 116, 2022. DOI:
https://doi.org/10.3390/fi14040116.
-
[J044] BERT-Based Transfer-Learning Approach for
Nested Named Entity Recognition Using Joint Labeling
A. Agrawal, S. Tripathi, M. Vardhan, V. Sihag, G. Choudhary,
N. Dragoni
In Applied Sciences, 12(3): 976, 2022. DOI:
https://doi.org/10.3390/app12030976.
-
[J043] ARCADIS: Asynchronous Remote Control-Flow
Attestation of Distributed IoT Services
R. M. Halldórsson, E. Dushku, N. Dragoni
In IEEE Access, vol. 9, 2021. DOI:
https://doi.org/10.1109/ACCESS.2021.3122391.
-
[J042] rTLS: Secure and Efficient TLS Session
Resumption for the Internet of Things
K. Tange, S. Mödersheim, A. Lalos, X. Fafoutis, N.
Dragoni
In Sensors, 21(19), 2021.
-
[J041] SxC4IoT: A Security-by-Contract Framework for
Dynamic Evolving IoT Devices
A. Giaretta, N. Dragoni, F. Massacci
In ACM Transactions on Sensor Networks, 18(1): 12, 1-51,
2021. DOI: https://doi.org/10.1145/3480462.
-
[J040] AntibIoTic: The Fog-Enhanced Distributed
Security System to Protect the (Legacy) Internet of
Things
M. De Donno, X. Fafoutis, N. Dragoni
In Journal of Computer Security, 30: 689-725, 2022. DOI:
https://doi.org/10.3233/JCS-210027.
-
[J039] A Survey on Botnets: Incentives, Evolution,
Detection and Current Trends
S.N.T. Vu, M. Stege, P.I. El-Habr, J. Bang, N. Dragoni
In Future Internet, 13(8), 198, 2021. DOI:
https://doi.org/10.3390/fi13080198.
-
[J038] State-of-the-Art Software-Based Remote
Attestation: Opportunities and Open Issues for
Internet of Things
S. Ankergård, E. Dushku, N. Dragoni
In Sensors, 21(5), 2021.
-
[J037] Benchmarks and Performance Metrics for
Assessing the Migration to Microservice-Based
Architectures
N. Bjørndal, L.J. Pires de Araújo, A.
Bucchiarone, N. Dragoni, M. Mazzara, S. Dustdar
In Journal of Object Technology, 20(2): 3: 1-17, 2021.
-
[J036] Are We Preparing Students to Build Security
In? A Survey of European Cybersecurity in Higher
Education Programs
N. Dragoni, A. Lluch Lafuente, F. Massacci, A.
Schlichtkrull
In IEEE Security & Privacy, 19(1): 81-88, Jan.-Feb. 2021.
-
[J035] On The Benefits and Challenges of Blockchains
for Managing Food Supply Chains
P. Katsikouli, A. S. Wilde, N. Dragoni, H. H. Jensen
In Journal of the Science of Food and Agriculture, 2020,
DOI: https://doi.org/10.1002/jsfa.10883.
-
[J034] A Systematic Survey of Industrial Internet of
Things Security: Requirements and Fog Computing
Opportunities
K. Tange, M. De Donno, X. Fafoutis, N. Dragoni
In IEEE Communication Surveys & Tutorials, 22(4): 2489-2520,
2020.
-
[J033] Oscausi - Practical Private Electronic Cash
from Lelantus and MimbleWimble
L. Herskind, P. Katsikouli, N. Dragoni
In Journal of Internet Services and Information Security,
10(2): 16-34, 2020, DOI:
https://doi.org/10.22667/JISIS.2020.05.31.016.
-
[J032] Privacy and Cryptocurrencies - A Systematic
Literature Review
L. Herskind, P. Katsikouli, N. Dragoni
In IEEE Access, 8, 2020.
-
[J031] Mobile and Wearable Sensing Frameworks for
mHealth Studies and Applications: A Systematic Review
D. Kumar, S. Jeuris, J. E. Bardram, N. Dragoni
ACM Transactions on Computing for Healthcare, 2(1): 1-28,
2021.
-
[J030] Blockchain Implementations and Use Cases for
Supply Chains – A Survey
P. Gönczöl, P. Katsikouli, L. Herskind, N.
Dragoni
In IEEE Access, 8, 2020.
-
[J029] Foundations and Evolution of Modern Computing
Paradigms: Cloud, IoT, Edge, and Fog
M. De Donno, K. Tange, N. Dragoni
In IEEE Access, 7, 2019.
-
[J028] IoT Security Configurability with
Security-by-Contract
A. Giaretta, N. Dragoni, F. Massacci
In Sensors, 19(19), 2019.
-
[J027] Cyber-Storms Come from Clouds: Security of
Cloud Computing in the IoT Era
M. De Donno, A. Giaretta, N. Dragoni, A. Bucchiarone, M.
Mazzara
In Future Internet, 11(6), 2019.
-
[J026] BitFlow - Enabling Real-Time Cash-Flow
Evaluations through Blockchain
L. Herskind, A. Giaretta, M. De Donno, N. Dragoni
In Concurrency and Computation: Practice and Experience,
2019, DOI: https://doi.org/10.1002/cpe.5333.
-
[J025] Microservices: Migration of a Mission Critical
System
M. Mazzara, N. Dragoni, A. Bucchiarone, A. Giaretta, S. T.
Larsen, S. Dustdar
In IEEE Transactions on Services Computing, 14(5): 1464 -
1477, 2021, DOI: 10.1109/TSC.2018.2889087.
-
[J024] Analysis and Evaluation of SafeDroid v2.0, a
Framework for Detecting Malicious Android Applications
M. Argyriou, A. Spognardi, N. Dragoni
In Security and Communication Networks, vol. 2018, Article
ID 4672072, 15 pages, 2018.
-
[J023] From Monolithic to Microservices: An
Experience Report from the Banking Domain
A. Bucchiarone, N. Dragoni, S. Dustdar, S.T. Larsen, M.
Mazzara
In IEEE Software, 35(3): 50-55, 2018.
-
[J022] DDoS-Capable IoT Malwares - Comparative
Analysis and Mirai Investigation
M. De Donno, N. Dragoni, A. Giaretta, A. Spognardi
In Security and Communication Networks, vol. 2018, Article
ID 7178164, 30 pages, 2018.
-
[J021] A Survey of Man In The Middle Attacks
M. Conti, N. Dragoni, V. Lesyk
IEEE Communication Surveys & Tutorials, 18(3): 2027-2051,
2016.
-
[J020] Energy-Efficient Medium Access Control for
Energy Harvesting Communications
X. Fafoutis, A. Di Mauro, C. Orfanidis, N. Dragoni
IEEE Transactions on Consumer Electronics, 61(4): 402-410,
2015.
-
[J019] A Framework and Classification for Fault
Detection Approaches in Wireless Sensor Networks with
an Energy Efficiency Perspective
Y. Zhang, N. Dragoni, J. Wang
International Journal of Distributed Sensor Networks,
11(11):1-11, 2015.
-
[J018] Adaptive Security in ODMAC for Multihop Energy
Harvesting Wireless Sensor Networks
A. Di Mauro, X. Fafoutis, N. Dragoni
International Journal of Distributed Sensor Networks, 11(4):
1-10, 2015.
-
[J017] Receiver-Initiated Medium Access Control
Protocols for Wireless Sensor Networks
X. Fafoutis, A. Di Mauro, M. D. Vithanage, N. Dragoni
Computer Networks, 76: 55-74, 2015, doi:
10.1016/j.comnet.2014.11.002.
-
[J016] Altruistic Backoff: Collision Avoidance for
Receiver-Initiated MAC Protocols for Wireless Sensor
Networks
X. Fafoutis, C. Orfanidis, N. Dragoni
International Journal of Distributed Sensor Networks, vol.
2014, article ID 576401, 2014, doi:10.1155/2014/576401.
-
[J015] Dynamic Allocation and Admission Policies for
QoS-aware Provisioning Systems [Special Issue Invited
Paper]
M. Mazzucco, M. Mazzara, N. Dragoni
International Journal of Critical Computer-Based Systems,
4(1): 27-44, 2013.
-
[J014] High-Level Algorithms and Data Structures for
Security-By-Contract on Java Cards [Special Issue
Invited Paper]
N. Dragoni, O. Gadyatskaya, F. Massacci, A. Philippov
International Journal of Critical Computer-Based Systems,
3(4): 284-304, 2012.
-
[J013] Declarative Specification of Fault Tolerant
Auction Protocols: the English Auction Case Study
N. Dragoni, M. Gaspari
Computational Intelligence, 28(4): 617-641, 2012.
-
[J012] Introducing the Cyber-Physical Attacker to
Energy- Harvesting Wireless Sensor Networks
A. Di Mauro, D. Papini, R. Vigo, N. Dragoni
Journal of Networking Technology, 3(3):139-148, 2012.
-
[J011] Implementing Workflow Reconfiguration in
WS-BPEL
M. Mazzara, N. Dragoni, M. Zhou
Journal of Internet Services and Information Security,
2(1/2), 2012.
-
[J010] Security-by-Contract-with-Trust for Mobile
Devices
G. Costa, A. Lazouski, F. Martinelli, I. Matteucci, V.
Issarny, R. Saadi, N. Dragoni, F. Massacci
Journal of Wireless Mobile Networks, Ubiquitous Computing,
and Dependable Applications, 1(4): 75-91, 2010.
-
[J009] What the Heck is this Application doing? - A
Security-by-Contract Architecture for Pervasive
Services
N. Dragoni, F. Massacci, T. Walter, C. Schaefer
Computers & Security, 28(7): 566-577, 2009.
-
[J008] Matching in Security-By-Contract for Mobile
Code
N. Bielova, N. Dragoni, F. Massacci, K. Naliuka, I.
Siahaan
Journal of Logic and Algebraic Programming, 78(5): 340-358,
2009.
-
[J007] A Self-Protecting and Self-Healing Framework
for Negotiating Services and Trust in Autonomic
Communication Systems
N. Dragoni, F. Massacci, A. Saidane
Computer Networks, 53(10): 1628-1648, 2009.
-
[J006] Security-By-Contract (S×C) for Mobile Systems
[Invited paper]
N. Dragoni, F. Massacci
Telektronikk Journal, 1:107-116, 2009, Telenor.
-
[J005] An ACL for Specifying Fault-Tolerant Protocols
N. Dragoni, M. Gaspari, D. Guidi
Applied Artificial Intelligence, 21(4): 361-381, 2007.
-
[J004] Fault Tolerant Knowledge Level Inter-Agent
Communication in Open Multi-Agent Systems
N. Dragoni
AI Communications, 19(4): 385-387, 2006.
-
[J003] Crash Failure Detection in Asynchronous Agent
Communication Languages
N. Dragoni, M. Gaspari
Autonomous Agents and Multi-Agent Systems, 13(3): 355-390,
2006.
-
[J002] An Infrastructure to Support Cooperation of
Knowledge-Level Agents on the Semantic Grid
N. Dragoni, M. Gaspari, D. Guidi
International Journal of Applied Intelligence, 25(2):
159-180, 2006.
-
[J001] An Object Based Algebra for Specifying A Fault
Tolerant Software Architecture
N. Dragoni, M. Gaspari
Journal of Logic and Algebraic Programming, 63(2): 271-297,
2005.
|
CONFERENCE AND WORKSHOP PROCEEDINGS
-
[P090] NetSMoM: ML-Driven Network Slicing Framework
for Efficient and Secure Service Delivering in 6G
Network
R. Dangi, L. Malviya, A. Jadhav, G. Choudhary, N. Dragoni
In Proceedings of the 8th International Conference on Mobile
Internet Security (MobiSec), 2024.
-
[P089] Bruteware: A Novel Family of Cryptoviral
Attacks
V. Coletti, E. Müller, F. Meyer Lehmann Lundsbjerg, N.
Dragoni
In Proceedings of the 39th International Conference on ICT
Systems Security and Privacy Protection (IFIP SEC), 2024,
Springer.
-
[P088] Fake Base Station Detection and Localization
in 5G Network: A Proof of Concept
D. Butad, S. M. Tao, H. Tudtud, P. V. Astillo, G. Choudhary,
N. Dragoni
In Proceedings of the 7th International Conference on Mobile
Internet Security (MobiSec), 2023, Springer.
-
[P087] A Threat and Risk Analysis of Internet
Communication Technology Use
K. Panwar, V. Sihag, G. Choudhary, N. Dragoni
In Proceedings of the 8th International Conference on ICT
for Sustainable Development (ICT4SD), 2023, Springer.
-
[P086] Accomplishing More With Less: The Practice of
Cybersecure Health Technology Design Among Danish
Startups Detection
Z. Li, S. Nam Thanh, N. Dragoni, K. Doherty
In Proceedings of the ACM CHI Conference on Human Factors in
Computing Systems, 2023, ACM.
-
[P085] DyBAnd: Dynamic Behavior Based Android Malware
Detection
S. Jaiswal, V. Sihag, G. Choudhary, N. Dragoni
In Proceedings of the 6th International Symposium on Mobile
Internet Security, 2022, Springer.
-
[P084] Software-Defined Network based Secure
Internet-Enabled Video Surveillance System
M. Del Castillo, H. Hermosa, P. V. Astillo, G. Choudhary, N.
Dragoni
In Proceedings of the 23rd World Conference on Information
Security Applications (WISA), 2022, Springer LNCS.
-
[P083] Cloud Storage Client Forensic: Analysis of
MEGA Cloud
H. Mishra, V. Sihag, G. Choudhary, N. Dragoni, I. You
In Proceedings of the 4th International Conference on
Futuristic Trends in Networks and Computing Technologies
(FTNCT), 2021, Springer.
-
[P082] DIMDA: Deep Learning and Image-based Malware
Detection for Android [Best Paper Award]
V. Sihag, S. Prakash, G. Choudhary, N. Dragoni, I. You
In Proceedings of the 4th International Conference on
Futuristic Trends in Networks and Computing Technologies
(FTNCT), 2021, Springer.
-
[P081] PERMANENT: Publicly Verifiable Remote
Attestation for Internet of Things through
Blockchain
S. Ankergård, E. Dushku, N. Dragoni
In Proceedings of the 14th International Symposium on
Foundations & Practice of Security (FPS), 2021, Springer.
-
[P080] AI Empowered DevSecOps Security for Next
Generation Development
B. Yadav, G. Choudhary, S. K. Shandilya, N. Dragoni
In Proceedings of the International Conference on Frontiers
in Software Engineering (ICFSE), 2021, Springer.
-
[P079] RESERVE: Remote Attestation of Intermittent
loT devices
MD M. Rabbani, E. Dushku, J. Vliegen, A. Braeken, N.
Dragoni, N. Mentens
In Proceedings of the 9th International Workshop on Energy
Harvesting & Energy-Neutral Sensing Systems (ENSsys), 2021,
ACM.
-
[P078] ERAMO: Effective Remote Attestation through
Memory Offloading
J. H. østergaard, E. Dushku, N. Dragoni
In Proceedings of the IEEE International Conference on Cyber
Security and Resilience (CSR), 2021, IEEE.
-
[P077] Fault-Tolerant Clock Synchronization using
Precise Time Protocol Multi-Domain Aggregation
E. Kyriakakis, K. Tange, N. Reusch, E. O. Zaballa, X.
Fafoutis, M. Schoeberl, N. Dragoni
In Proceedings of the 24th IEEE International Symposium on
Real-Time Distributed Computing (ISORC), 2021, IEEE.
-
[P076] RESIP Host Detection: Identification of
Malicious Residential IP Proxy Flows
A. Tosun, M. De Donno, N. Dragoni, X. Fafoutis
In Proceedings of the 39th IEEE International Conference on
Consumer Electronics (ICCE), 2021, IEEE.
-
[P075] Smart Lamp or Security Camera? Automatic
Identification of IoT Devices
M. D. Thomsen, A. Giaretta, N. Dragoni
In Proceedings of the 12th International Network Conference
2020 (INC2020), 2020, Springer Lecture Notes in Networks and
Systems.
-
[P074] rTLS: Lightweight TLS Session Resumption for
Constrained IoT Devices
K. Tange, D. Howard, T. Shanahan, S. Pepe, X. Fafoutis, N.
Dragoni
In Proceedings of the International Conference on
Information and Communications Security (ICICS), 2020, LNCS.
-
[P073] IoT Device Profiling: From MUD Files to SxC
Contracts
G. Matthiasson, A. Giaretta, N. Dragoni
In Proceedings of Open Identity Summit, 2020, GI-Edition
Lecture Notes in Informatics (LNI).
-
[P072] SHAKE: SHared Acceleration Key Establishment
for Resource-Constrained IoT Devices
E. Bejder, A. K. Mathiasen, M. De Donno, N. Dragoni, X.
Fafoutis
In Proceedings of the 6th IEEE World Forum on Internet of
Things (WF-IoT), 2020, IEEE.
-
[P071] Sustainable Security for Internet of Things
M. De Donno, K. M. Malarski, X. Fafoutis, N. Dragoni, M.
Nordal Petersen, M. Stübert Berger, S. Ruepp
In Proceedings of SmartNets 2019: International Conference
on Smart Applications, Communications and Networking, 2019,
IEEE.
-
[P070] UniquID: A Quest to Reconcile Identity Access
Management and the Internet of Things
A. Giaretta, S. Pepe, N. Dragoni
In Proceedings of TOOLS 50+1:Technology of Object-Oriented
Languages and Systems, 2019, LNCS.
-
[P069] AntibIoTic 2.0: A Fog-based Anti-Malware for
Internet of Things
M. De Donno, Juan M. D. Felipe, N. Dragoni
In Proceedings of the European Workshop on Security and
Privacy in Edge Computing (EuroSPEC at EuroS&P), 2019, IEEE.
-
[P068] Combining AntibIoTic with Fog Computing:
AntibIoTic 2.0
M. De Donno, N. Dragoni
In Proceedings of the 3rd IEEE International Conference on
Fog and Edge Computing (ICFEC 2019), 2019, IEEE.
-
[P067] Protecting the Internet of Things with
Security-by-Contract and Fog Computing
A. Giaretta, N. Dragoni, F. Massacci
In Proceedings of the IEEE 5th World Forum on Internet of
Things (WF-IoT), 2019, IEEE.
-
[P066] Towards a Systematic Survey of Industrial IoT
Security Requirements: Research Method and
Quantitative Analysis
K. Tange, M. De Donno, X. Fafoutis, N. Dragoni
In Proceedings of Workshop on Fog Computing and the IoT
(Fog-IoT'19), co-located with CPS-IoT Week, 2019, IEEE.
-
[P065] Vulnerabilities and Security Breaches in
Cryptocurrencies
G. Sigurdsson, A. Giaretta, N. Dragoni
In: Ciancarini P., Mazzara M., Messina A., Sillitti A.,
Succi G. (eds) Proceedings of 6th International Conference
in Software Engineering for Defence Applications (SEDA
2018). Advances in Intelligent Systems and Computing, vol
925. Springer.
-
[P064] Community Targeted Phishing
A. Giaretta, N. Dragoni
In: Ciancarini P., Mazzara M., Messina A., Sillitti A.,
Succi G. (eds) Proceedings of 6th International Conference
in Software Engineering for Defence Applications (SEDA
2018). Advances in Intelligent Systems and Computing, vol
925. Springer.
-
[P063] When the Price Is Your Privacy: A Security
Analysis of Two Cheap IoT Devices
M. Favaretto,T. Tran Anh, J. Kavaja, M. De Donno, N.
Dragoni
In: Ciancarini P., Mazzara M., Messina A., Sillitti A.,
Succi G. (eds) Proceedings of 6th International Conference
in Software Engineering for Defence Applications (SEDA
2018), Advances in Intelligent Systems and Computing, vol
925, Springer.
-
[P062] Adding Salt to Pepper - A Structured Security
Assessment over a Humanoid Robot
A. Giaretta, M. De Donno, N. Dragoni
In Proceedings of the 13th International Conference on
Availability, Reliability and Security (ARES'18), IoT-SECFOR
session, 2018, ACM.
-
[P061] Joining Jolie to Docker - Orchestration of
Microservices on a Containers-as-a-Service Layer
A. Giaretta, N. Dragoni, M. Mazzara
In Proceedings of the 5th International Conference in
Software Engineering for Defense Applications (SEDA'16),
2018, LNCS.
-
[P060] The Internet of Hackable Things
N. Dragoni, A. Giaretta, M. Mazzara
In Proceedings of the 5th International Conference in
Software Engineering for Defense Applications (SEDA'16),
2018, LNCS.
-
[P059] AntibIoTic: Protecting IoT Devices Against
DDoS Attacks
M. De Donno, N. Dragoni, A. Giaretta, M. Mazzara
In Proceedings of the 5th International Conference in
Software Engineering for Defense Applications (SEDA'16),
2018, LNCS.
-
[P058] Analysis of DDoS-Capable IoT Malwares
M. De Donno, N. Dragoni, A. Giaretta, A. Spognardi
In Proceedings of 1st International Conference on Security,
Privacy, and Trust (INSERT), 2017, IEEE.
-
[P057] Security Flows in OAuth 2.0 Framework - A Case
Study
M. Argyriou, N. Dragoni, A. Spognardi
In Proceedings of TELERISE: 3rd International Workshop on
TEchnical and LEgal aspects of data pRIvacy and SEcurity,
2017, LNCS.
-
[P056] Microservices: How To Make Your Application
Scale
N. Dragoni, I. Lanese, S. Thordal Larsen, M. Mazzara, R.
Mustafin, L. Safina
In Proceedings of the 11th A.P. Ershov Informatics
Conference, 2017, LNCS.
-
[P055] A Taxonomy of Distributed Denial of Service
Attacks
M. De Donno, N. Dragoni, A. Giaretta, A. Spognardi
In Proceedings of the International Conference on
Information Society (i-Society), 2017, IEEE.
-
[P054] Security and Privacy Issues in Healthcare
Monitoring Systems: A Case Study
D. T. Handler, L. Hauge, A. Spognardi, N. Dragoni
In Proceedings of the 10th International Conference on
Health Informatics (HEALTHINF'17), 2017, SCITEPRESS.
-
[P053] SafeDroid: A Distributed Malware Detection
Service for Android
R. Goyal, A. Spognardi, N. Dragoni, M. Argyriou
In Proceedings of the 9th IEEE International Conference on
Service-Oriented Computing and Applications (SOCA), 2016,
IEEE.
-
[P052] Why Hackers Love eHealth Applications
R. Goyal, N. Dragoni
In Proceedings of the 3rd EAI International Conference on
IoT Technologies for HealthCare (HealthyIoT), 2016, LNICST.
-
[P051] Security and Privacy Issues in Health
Monitoring Systems: eCare@Home Case Study
T. Wearing, N. Dragoni
In Proceedings of the 1st Workshop on Emerging eHealth
through Internet of Things, affiliated with HealthyIoT'16,
2016, LNICST.
-
[P050] Evaluation of Professional Cloud Password
Management Tools
D. Schougaard, N. Dragoni, A. Spognardi
In Proceedings of the 2nd International Workshop on
TEchnical and LEgal aspects of data pRIvacy and SEcurity
(TELERISE'16), affiliated with ICWE'1616, 2016, LNCS.
-
[P049] Mind The Tracker You Wear - A Security
Analysis of Wearable Health Trackers
R. Goyal, N. Dragoni, A. Spognardi
In Proceedings of the 31st ACM Symposium on Applied
Computing (SAC'16), track on HEALTHCARE: A Growing Scenario
for Applied Computing, 2016, ACM.
-
[P048] Adaptive Multipath Key Reinforcement for
Energy Harvesting Wireless Sensor Networks
A. Di Mauro, N. Dragoni
In Proceedings of the 6th International Conference on
Emerging Ubiquitous Systems and Pervasive Networks
(EUSPN'15), 2015, Elsevier.
-
[P047] Fault Detection in WSNs - An Energy Efficiency
Perspective Towards Human-Centric WSNs
C. Orfanidis, Y. Zhang, N. Dragoni
In Proceedings of the 9th International KES Conference on
Agents and Multi-Agent Systems: Technologies and
Applications (KES-AMSTA'15, session on Anthropic-Oriented
Computing), 2015, Springer.
-
[P046] Energy-Efficient Fault-Tolerant Dynamic Event
Region Detection in Wireless Sensor Networks
H.-J. Enemark, Y. Zhang, N. Dragoni, C. Orfanidis
In Proceedings of IEEE VTC Workshop on Heterogeneous
Networking for the Internet of Things, 2015, IEEE.
-
[P045] MITHYS: Mind The Hand You Shake - Protecting
Mobile Devices from SSL Usage Vulnerabilities
M. Conti, N. Dragoni, S. Gottardo
In Proceedings of the 9th workshop on Security & Trust
Management (STM'13), Egham (UK) in conjunction with ESORICS,
2013, LNCS.
-
[P044] Detecting and Preventing Beacon Replay Attacks
in Receiver-Initiated MAC Protocols for Energy
Efficient WSNs
A. Di Mauro, X. Fafoutis, S. Mödersheim, N. Dragoni
In Proceedings of the 18th Nordic Conference on Secure IT
Systems (NordSec'13), Ilulissat, Greenland, 2013, LNCS.
-
[P043] Sustainable Performance in Energy Harvesting -
Wireless Sensor Networks [Tool Demonstration]
X. Fafoutis, A. Di Mauro, N. Dragoni
In Proceedings of the fourth International Conference on
Future Energy Systems (e-Energy), Berkeley, CA, 2013, ACM.
-
[P042] Sustainable Medium Access Control:
Implementation and Evaluation of ODMAC
X. Fafoutis, A. Di Mauro, N. Dragoni
In Proceedings of the IEEE International Conference on
Communications (ICC'13) - Workshop on Energy Efficiency in
Wireless Networks & Wireless Networks for Energy Efficiency
(E2Nets), 2013, IEEE.
-
[P041] Medium Access Control for Thermal Energy
Harvesting in Advanced Metering Infrastructures
M. D. Vithanage, X. Fafoutis, C. B. Andersen, N. Dragoni
In Proceedings of the International Conference on Computer
as a Tool (EUROCON'13), Zagreb, Croatia, 2013, IEEE.
-
[P040] Social Networks and Collective Intelligence -
A Return to the Agora (with the Polidoxa Shift)
[Position Paper]
L. Biselli, N. Dragoni, E. Goldoni, P.P. Greco, A. Marraffa,
M. Mazzara, G. Papageorgiou
In Proceedings of the 1st International Conference on
Agreement Technologies (AT'12), Dubrovnik, Croatia, 2012,
CEUR-WS.
-
[P039] Analytical Comparison of MAC Schemes for
Energy Harvesting - Wireless Sensor Networks
X. Fafoutis, N. Dragoni
In Proceedings of the International Workshop on Algorithms
and Concepts for Networked Sensing Systems Powered by Energy
Harvesters (EnHaNSS'12), Antwerp, Belgium, 2012, IEEE.
-
[P038] Adaptive Medium Access Control for Energy
Harvesting - Wireless Sensor Networks
X. Fafoutis, N. Dragoni
In Proceedings of the 9th International Conference on
Networked Sensing Systems (INSS'12), Antwerp, Belgium, 2012,
IEEE.
-
[P037] Modelling and Analysis of Dynamic
Reconfiguration in BP-Calculus
F. Abouzaid, J. Mullins, M. Mazzara, N. Dragoni
In Proceedings of the 1st International Workshop on
Trustworthy Multi-Agent Systems (TruMAS'12), Invited Session
at KES-AMSTA 2012, Dubrovnik, Croatia, LNCS.
-
[P036] Toward a Threat Model for Energy-Harvesting
Wireless Sensor Networks
A. Di Mauro, D. Papini, R. Vigo, N. Dragoni
In Proceedings of the International Workshop on Wireless
Sensor Networks and their Applications at NDT'12, Dubai,
UAE, 2012, CCIS (LNCS).
-
[P035] Security Challenges for Energy-Harvesting
Wireless Sensor Networks [Poster/Short Paper]
A. Di Mauro, D. Papini, N. Dragoni
In Proceedings of the 2nd International Conference on
Pervasive and Embedded Computing and Communication Systems
(PECCS 2012), Rome, Italy, 2012.
-
[P034] Energy-Harvesting Wireless Sensor Networks
[Poster/Short Paper]
X. Fafoutis, D. Vuckovic, A. Di Mauro, N. Dragoni, J. Madsen
In (adjunct) Proceedings of the 9th European Conference on
Wireless Sensor Networks (EWSN'12), Trento, Italy, 2012.
-
[P033] Toward a Unified Framework for Web Service
Trustworthiness [Reflection Paper]
N. Miotto, N. Dragoni
In Proceedings of IADIS e-Society, Berlin, Germany, 2012.
-
[P032] Toward Design, Modelling and Analysis of
Dynamic Workflow Reconfigurations - A Process Algebra
Perspective
M. Mazzara, F. Abouzaid, N. Dragoni, A. Bhattacharyya
In Proceedings of the 8th International Workshop on Web
Services and Formal Methods (WS-FM'11), Clermont-Ferrand,
France, 2011, LNCS.
-
[P031] ODMAC: On Demand MAC Protocol for Energy
Harvesting Wireless Sensor Networks
X. Fafoutis, N. Dragoni
In Proceedings of the Eighth ACM International Symposium on
Performance Evaluation of Wireless Ad Hoc, Sensor, and
Ubiquitous Networks (PE-WASUN'11), Miami Beach, FL, USA,
2011, ACM.
-
[P030] Dependable Workflow Reconfiguration in WS-BPEL
M. Mazzara, N. Dragoni, M. Zhou
In Proceedings of the 5th Nordic Workshop on Dependability
and Security (NODES'11), Copenhagen, Denmark, 2011, DTU
Technical Report.
-
[P029] Analysis of Trust-Based Approaches for Web
Service Selection
N. Dragoni, N. Miotto, D. Papini
In Proceedings of the 5th Nordic Workshop on Dependability
and Security (NODES'11), Copenhagen, Denmark, 2011, DTU
Technical Report.
-
[P028] Design, Modelling and Analysis of a Workflow
Reconfiguration [Best Paper Award]
M. Mazzara, F. Abouzaid, N Dragoni, A. Bhattacharyya
In Proceedings of the International Workshop on Petri Nets
and Software Engineering (PNSE'11), Newcastle upon Tyne, UK,
2011, CEUR-WS.
-
[P027] (SC)2: Secure Communication over Smart Cards -
How to Secure Off-Card Matching in
Security-by-Contract for Open Multi-Application Smart
Cards.
N. Dragoni, E. Lostal, D. Papini, J. Fabra
In Proceedings of the International Workshop on Foundations
& Practice of Security (FPS), Paris, France, 2011, LNCS.
-
[P026] Loading-Time Verification for Open
Multi-Application Smart Cards
N. Dragoni, O. Gadyatskaya, F. Massacci, F. Paci, E.
Lostal
In Proceedings of the IEEE International Symposium on
Policies for Distributed Systems and Networks (POLICY 2011),
Pisa, Italy, 2011, IEEE.
-
[P025] (SC)2: a System to Secure Off-Card
Contract-Policy Matching in Security-by-Contract for
Open Multi-Application Smart Cards [Tool
Demonstration]
N. Dragoni, E. Lostal, D. Papini
In Proceedings of the IEEE International Symposium on
Policies for Distributed Systems and Networks (POLICY 2011),
Pisa, Italy, 2011, IEEE.
-
[P024] Extending Security-by-Contract with
Quantitative Trust on Mobile Devices
A.Lazouski, F.Martinelli, F.Massacci, G.Costa, N.Dragoni,
I.Matteucci
In Proceeding of CISIS 2010, The Fourth International
Conference on Complex, Intelligent and Software Intensive
Systems, pages 872-877, 2010, IEEE.
-
[P023] Securing Off-Card Contract-Policy Matching in
Security-By-Contract for Multi-Application Smart
Cards
N. Dragoni, E. Lostal, D. Papini, J. Fabra
In Proceedings of the 4th International Conference on Mobile
Ubiquitous Computing, Systems, Services and Technologies
(UBICOMM 2010), Firenze, Italy, 2010, XPS.
-
[P022] A Survey on Trust-Based Web Service Provision
Approaches [Best Paper Award]
N. Dragoni
In Proceedings of the 3th International Conference on
Dependability (DEPEND 2010), Venice, Italy, 2010, IEEE CPS.
-
[P021] Design of QoS-aware Provisioning Systems
M. Mazzucco, M. Mazzara, N. Dragoni
In Proceedings of the 4th Nordic Workshop on Dependability
and Security (NODES 2010), Copenhagen, Denmark, 2010, DTU
Technical Report.
-
[P020] Security-by-Contract for Applications'
Evolution in Multi-Application Smart Cards
N. Dragoni, O. Gadyatskaya, F. Massacci
In Proceedings of the 4th Nordic Workshop on Dependability
and Security (NODES 2010), Copenhagen, Denmark, 2010, DTU
Technical Report.
-
[P019] Supporting Applications' Evolution in
Multi-Application Smart Cards by
Security-by-Contract
N. Dragoni, O. Gadyatskaya, F. Massacci
In Proceedings of the 4th Workshop in Information Security
Theory and Practices (WISTP 2010), Passau, Germany, 2010,
LNCS, Springer.
-
[P018] Extending Security-by-Contract with
Quantitative Trust on Mobile Devices
G. Costa, N. Dragoni, A. Lazouski, F. Martinelli, F.
Massacci, I. Matteucci
In Proceedings of the 4th International Workshop on
Intelligent, Mobile and Internet Services in Ubiquitous
Computing (IMIS 2010), Krakow, Poland, 2010, IEEE Computer
Society Press.
-
[P017] Where are All the Agents? On the Gap Between
Theory and Practice of Agent-Based Referral Networks -
An Inter-Agent Communication Perspective
N. Dragoni
In Proceedings of the 12th International Conference on
Principles of Practice in Multi-Agent Systems (PRIMA'09),
Nagoya, Japan, 2009, LNAI, Springer.
-
[P016] A Formal Semantics for the WS-BPEL Recovery
Framework - The Pi-Calculus Way
N. Dragoni, M. Mazzara
In Proceedings of the 6th International Workshop on Web
Services and Formal Methods (WS-FM'09), Bologna, Italy,
2009, LNCS, Springer.
-
[P015] Toward Trustworthy Web Services - Approaches,
Weaknesses and Trust-By-Contract Framework
N. Dragoni
In Proceedings of WI/IAT Web Privacy and Trust Workshop
(WPT'09), Milano, Italy, 2009, IEEE Computer Society Press.
-
[P014] Security-by-Contract (SxC) for Mobile Systems
[Position Paper]
N. Dragoni, F. Massacci, K. Naliuka
W3C Workshop on Security for Access to Device APIs from the
Web (http://www.w3.org/2008/security-ws/), 2008.
-
[P013] Security-by-Contract (SxC) [Poster Paper]
N. Dragoni, F. Massacci, K. Naliuka
In Proceedings of ICT-MobileSummit, Stockholm, Sweden, 2008.
-
[P012] An Inline Monitoring System for .NET Mobile
Devices [Tool Demonstration]
N. Dragoni, F. Massacci, K. Naliuka
In Proceedings of IFIPTM'08, Trondheim, Norway, 2008, IFIP,
Springer.
-
[P011] A Framework for Dependable Trust Negotiation
in Open Environment
N. Dragoni, A. Saidane
In Proceedings of the 5th IEEE Workshop on Engineering of
Autonomic and Autonomous Systems (EASE'08), Belfast,
Northern Ireland, 2008, IEEE Computer Society Press.
-
[P010] Matching Policies with Security Claims of
Mobile Applications
N. Bielova, M. Dalla Torre, N. Dragoni, I. Siahaan
In Proceedings of the Third International Conference on
Availability, Reliability and Security (ARES'08), Barcelona,
Spain, 2008, IEEE Computer Society Press.
-
[P009] Security-by-Contract for Web Services - or How
to Trade Credentials for Services
N. Dragoni, F. Massacci
In Proceedings of the ACM Workshop on Secure Web Services
(SWS'07), Alexandria, VA, USA, 2007, ACM.
-
[P008] Decision Making in Fund Raising Management: a
Knowledge Based Approach
L. Barzanti, N. Dragoni, A. Degli Esposti, M. Gaspari
In Proceedings of the 27th SGAI International Conference on
Artificial Intelligence (AI-2007), Cambridge, UK, 2007,
Springer.
-
[P007] A Security-by-Contract Architecture for
Pervasive Services
N. Dragoni, F. Massacci, C. Schaefer, T. Walter, E.
Vetillard
In Proceedings of the 3rd International Workshop on
Security, Privacy and Trust in Pervasive and Ubiquitous
Computing (SecPerU'07), Instanbul, Turkey, 2007, IEEE
Computer Society Press.
-
[P006] Security-by-Contract: Toward a Semantics for
Digital Signatures on Mobile Code
N. Dragoni, F. Massacci, K. Naliuka, I. Siahaan
In Proceedings of the Fourth European PKI Workshop: Theory
and Practice (EuroPKI'07), Mallorca, Spain, 2007, LNCS.
-
[P005] Performative Patterns for Designing Verifiable
ACLs
N. Dragoni, M. Gaspari
In Proceedings of the Tenth International Workshop on
Cooperative Information Agents (CIA2006), Edinburgh, UK,
2006, LNAI, Springer.
-
[P004] NOWHERE - An Open Service Architecture to
support Agents and Services within the Semantic Web
N. Dragoni, M. Gaspari, D. Guidi
In Proceedings of the 2nd Italian Semantic Web Workshop on
Semantic Web Applications and Perspectives (SWAP'05),
Trento, Italy, 2005, CEUR-WS.
-
[P003] An ACL for Specifying Fault-Tolerant Protocols
N. Dragoni, M. Gaspari, D. Guidi
In Proceedings of the 9th AI*IA Conference, Milano, Italy,
2005, LNAI, Springer.
-
[P002] Integrating Knowledge-Level Agents in the
(Semantic) Web: an Agent-based Open Service
Architecture
N. Dragoni, M. Gaspari, D. Guidi
In Proceedings of the 18th International FLAIRS Conference,
Clearwater Beach, Florida (USA), 2005, AAAI Press.
-
[P001] A Peer-to-Peer Knowledge Level Open Service
Architecture
N. Dragoni, M. Gaspari, D. Guidi
In Proceedings of WM2005 Workshop on "Peer-to-Peer and Agent
Infrastructures for Knowledge Management" (PAIKM05),
Kaiserslautern, Germany, 2005, DFKI Kaiserslautern.
|