EDITED BOOKS/JOURNAL SPECIAL ISSUES
-
•[E004] Microservices - Science and Engineering
-
A. Bucchiarone, N. Dragoni, S. Dustdar, P. Lago, M. Mazzara, V. Rivera
-
Springer, 2019.
-
•[E003] Dependability and Security in a Nordic Perspective - Part II
-
N. Dragoni, C. D. Jensen
-
International Journal of Critical Computer-Based Systems (IJCCBS), 4(1), 2013.
-
•[E002] Dependability and Security in a Nordic Perspective - Part I
-
N. Dragoni, C. D. Jensen
-
International Journal of Critical Computer-Based Systems (IJCCBS), 3(4), 2012.
-
•[E001] Frontiers in Trust Management
C. D. Jensen, N. Dragoni, A. Basu, C. Mancini
Journal of Internet Services and Information Security, 1(4), 2011.
INTERNATIONAL JOURNALS AND MAGAZINES
-
•[J060] Deepfake-Driven Social Engineering: Threats, Detection Techniques, and Defensive Strategies in Corporate Environments
-
K. T. Pedersen, L. Pepke, T. Stærmose, M. Papaioannou, G. Choudhary, N. Dragoni
-
In Journal of Cybersecurity and Privacy, 5(2):18, 2025. DOI: https://doi.org/10.3390/jcp5020018.
-
•[J059] Challenges and Potential Improvements for Passkey Adoption - A Literature Review with a User-Centric Perspective
-
A. Matzen, A. Rüffer, M. Byllemos, O. Heine, M. Papaioannou, G. Choudhary, N. Dragoni
-
In Applied Sciences, 15(8):4414, 2025. DOI: https://doi.org/10.3390/app15084414.
-
•[J058] Advancements in Machine Learning-Based Intrusion Detection in IoT: Research Trends and Challenges
-
MB. Bankó, S. Dyszewski, M. Králová, MB. Limpek, M. Papaioannou, G. Choudhary, N. Dragoni
-
In Algorithms, 18(4):209, 2025. DOI: https://doi.org/10.3390/a18040209.
-
•[J057] Systematic Literature Review of IoT Botnet DDOS Attacks and Evaluation of Detection Techniques
-
M. Gelgi, Y. Guan, S. Arunachala, M. Samba Siva Rao, N. Dragoni
-
In Sensors, 24(11), 3571, 2024. DOI: https://doi.org/10.3390/s24113571.
-
•[J056] A Review of Lightweight Security and Privacy for Resource-Constrained IoT Devices
-
G. Choudhary, S. Kumar, I. You, N. Dragoni, R. Dangi, D. Kumar
-
In Computers, Materials & Continua, 78(1): 31-63, 2024. DOI: https://doi.org/10.32604/cmc.2023.047084.
-
•[J055] 6G Mobile Networks: Key Technologies, Directions, and Advances
-
R. Dangi, G. Choudhary, N. Dragoni, P. Lalwani, U. Khare, S. Kundu
-
In Telecom, 4(4): 836-876, 2023. DOI: https://doi.org/10.3390/ telecom4040037.
-
•[J054] A Survey of Automatic Generation of Attack Trees and Attack Graphs
-
A. M. Konsta, B. Spiga, A. L. Lafuente, N. Dragoni
-
In Computers & Security, 137, 2024. DOI: https://doi.org/10.1016/j.cose.2023.103602.
-
•[J053] A Survey of Trust Management for Internet of Things
-
A. M. Konsta, A. L. Lafuente, N. Dragoni
-
In IEEE Access, vol. 11, 2023. DOI: https://doi.org/10.1109/ACCESS.2023.3327335.
-
•[J052] Cyber4Drone: A Systematic Review of Cyber Security and Forensics in Next-Generation Drones
-
V. Sihag, G. Choudhary, P. Choudhary, N. Dragoni
-
In Drones, 7(7): 430, 2023. DOI: https://doi.org/10.3390/drones7070430.
-
•[J051] FC-CACPHS: Fog-Cloud Assisted Context- Aware Framework for Cyber-Physical Healthcare System
-
P. Verma, A. Gupta, R. Dangi, G. Choudhary, N. Dragoni, I. You
-
In International Journal of Ad Hoc and Ubiquitous Computing, 45(3): 186-199, 2024. DOI: https://doi.org/10.1504/IJAHUC.2024.137505.
-
•[J050] MaGiC: a DSL Framework for Implementing Language Agnostic Microservice-based Web Applications
-
A. Bucchiarone, C. Ciumedean, K. Soysal, N. Dragoni, V. Pech
-
Journal of Object Technology, 22(1): 1-21, 2023. DOI: https://doi.org/10.5381/jot.2023.22.1.a2.
-
•[J049] IEDA-HGEO: Improved Energy Efficient with Clustering-Based Data Aggregation and Transmission Protocol for Underwater Wireless Sensor Networks
-
J. Shubham, T.P Anithaashri, R. Rastogi, G. Choudhary, N. Dragoni
-
In Energies, 16(1), 353, 2023. DOI: https://doi.org/10.3390/en16010353.
-
•[J048] Emerging Cyber Security Challenges after COVID Pandemic: A Survey
-
A. Choudhary, G. Choudhary, K. Pareek, C. Kunndra, J. Luthra, N. Dragoni
-
In Journal of Internet Services and Information Security, 12(2): 21-50, 2022. DOI: https://doi.org/10.22667/JISIS.2022.05.31.021.
-
•[J047] Memory Offloading for Remote Attestation of Multi-Service IoT Devices
-
E. Dushku, J.H. Østergaard, N. Dragoni
-
In Sensors, 22, 4340, 2022. DOI: https://doi.org/10.3390/s22124340.
-
•[J046] Secured Secret Sharing of QR Codes based on Nonnegative Matrix Factorization and Regularized Super Resolution Convolutional Neural Network
-
R. Velumani, Hariharasitaraman S, G. Choudhary, S. Bama, M. Victor Jose, N. Dragoni
-
In Sensors, 22(8), 2959, 2002. DOI: https://doi.org/10.3390/s22082959.
-
•[J045] ML-based 5G Network Slicing Security: A Comprehensive Survey
-
R. Dangi, A. Jadhav, G. Choudhary, N. Dragoni, M. K. Mishra, P. Lalwani
-
In Future Internet, 14(4), 116, 2022. DOI: https://doi.org/10.3390/fi14040116.
-
•[J044] BERT-Based Transfer-Learning Approach for Nested Named Entity Recognition Using Joint Labeling
-
A. Agrawal, S. Tripathi, M. Vardhan, V. Sihag, G. Choudhary, N. Dragoni
-
In Applied Sciences, 12(3): 976, 2022. DOI: https://doi.org/10.3390/app12030976.
-
•[J043] ARCADIS: Asynchronous Remote Control-Flow Attestation of Distributed IoT Services
-
R. M. Halldórsson, E. Dushku, N. Dragoni
-
In IEEE Access, vol. 9, 2021. DOI: https://doi.org/10.1109/ACCESS.2021.3122391.
-
•[J042] rTLS: Secure and Efficient TLS Session Resumption for the Internet of Things
-
K. Tange, S. Mödersheim, A. Lalos, X. Fafoutis, N. Dragoni
-
In Sensors, 21(19), 2021.
-
•[J042] SxC4IoT: A Security-by-Contract Framework for Dynamic Evolving IoT Devices
-
A. Giaretta, N. Dragoni, F. Massacci
-
In ACM Transactions on Sensor Networks, 18(1): 12, 1-51, 2021. DOI: https://doi.org/10.1145/3480462.
-
•[J040] AntibIoTic: The Fog-Enhanced Distributed Security System to Protect the (Legacy) Internet of Things
-
M. De Donno, X. Fafoutis, N. Dragoni
-
In Journal of Computer Security, 30: 689-725, 2022. DOI: https://doi.org/10.3233/JCS-210027.
-
•[J039] A Survey on Botnets: Incentives, Evolution, Detection and Current Trends
-
S.N.T. Vu, M. Stege, P.I. El-Habr, J. Bang, N. Dragoni
-
In Future Internet, 13(8), 198, 2021. DOI: https://doi.org/10.3390/fi13080198.
-
•[J038] State-of-the-Art Software-Based Remote Attestation: Opportunities and Open Issues for Internet of Things
-
S. Ankergård, E. Dushku, N. Dragoni
-
In Sensors, 21(5), 2021.
-
•[J037] Benchmarks and Performance Metrics for Assessing the Migration to Microservice-Based Architectures
-
N. Bjørndal, L.J. Pires de Araújo, A. Bucchiarone, N. Dragoni, M. Mazzara, S. Dustdar
-
In Journal of Object Technology, 20(2): 3: 1-17, 2021.
-
•[J036] Are We Preparing Students to Build Security In? A Survey of European Cybersecurity in Higher Education Programs
-
N. Dragoni, A. Lluch Lafuente, F. Massacci, A. Schlichtkrull
-
In IEEE Security & Privacy, 19(1): 81-88, Jan.-Feb. 2021.
-
•[J035] On The Benefits and Challenges of Blockchains for Managing Food Supply Chains
-
P. Katsikouli, A. S. Wilde, N. Dragoni, H. H. Jensen
-
In Journal of the Science of Food and Agriculture, 2020, DOI: https://doi.org/10.1002/jsfa.10883.
-
•[J034] A Systematic Survey of Industrial Internet of Things Security: Requirements and Fog Computing Opportunities
-
K. Tange, M. De Donno, X. Fafoutis, N. Dragoni
-
In IEEE Communication Surveys & Tutorials, 22(4): 2489-2520, 2020.
-
•[J033] Oscausi - Practical Private Electronic Cash from Lelantus and MimbleWimble
-
L. Herskind, P. Katsikouli, N. Dragoni
-
In Journal of Internet Services and Information Security (JISIS), 10(2): 16-34, 2020, DOI: https://doi.org/10.22667/JISIS.2020.05.31.016.
-
•[J032] Privacy and Cryptocurrencies - A Systematic Literature Review
-
L. Herskind, P. Katsikouli, N. Dragoni
-
In IEEE Access, 8, 2020.
-
•[J031] Mobile and Wearable Sensing Frameworks for mHealth Studies and Applications: A Systematic Review
-
D. Kumar, S. Jeuris, J. E. Bardram, N. Dragoni
-
ACM Transactions on Computing for Healthcare, 2(1): 1–28, 2021.
-
•[J030] Blockchain Implementations and Use Cases for Supply Chains – A Survey
-
P. Gönczöl, P. Katsikouli, L. Herskind, N. Dragoni
-
In IEEE Access, 8, 2020.
-
•[J029] Foundations and Evolution of Modern Computing Paradigms: Cloud, IoT, Edge, and Fog
-
M. De Donno, K. Tange, N. Dragoni
-
In IEEE Access, 7, 2019.
-
•[J028] IoT Security Configurability with Security-by-Contract
-
A. Giaretta, N. Dragoni, F. Massacci
-
In Sensors, 19(19), 2019.
-
•[J027] Cyber-Storms Come from Clouds: Security of Cloud Computing in the IoT Era
-
M. De Donno, A. Giaretta, N. Dragoni, A. Bucchiarone, M. Mazzara
-
In Future Internet, 11(6), 2019.
-
•[J026] BitFlow - Enabling Real-Time Cash-Flow Evaluations through Blockchain
-
L. Herskind, A. Giaretta, M. De Donno, N. Dragoni
-
In Concurrency and Computation: Practice and Experience, 2019, DOI: https://doi.org/10.1002/cpe.5333.
-
•[J025] Microservices: Migration of a Mission Critical System
-
M. Mazzara, N. Dragoni, A. Bucchiarone, A. Giaretta, S. T. Larsen, S. Dustdar
-
In IEEE Transactions on Services Computing, 14(5): 1464 - 1477, 2021, DOI: 10.1109/TSC.2018.2889087.
-
•[J024] Analysis and Evaluation of SafeDroid v2.0, a Framework for Detecting Malicious Android Applications
-
M. Argyriou, A. Spognardi, N. Dragoni
-
In Security and Communication Networks, vol. 2018, Article ID 4672072, 15 pages, 2018.
-
•[J023] From Monolithic to Microservices: An Experience Report from the Banking Domain
-
A. Bucchiarone, N. Dragoni, S. Dustdar, S.T. Larsen, M. Mazzara
-
In IEEE Software, 35(3): 50-55, 2018.
-
•[J022] DDoS-Capable IoT Malwares - Comparative Analysis and Mirai Investigation
-
M. De Donno, N. Dragoni, A. Giaretta, A. Spognardi
-
In Security and Communication Networks, vol. 2018, Article ID 7178164, 30 pages, 2018.
-
•[J021] A Survey of Man In The Middle Attacks
-
M. Conti, N. Dragoni, V. Lesyk
-
IEEE Communication Surveys & Tutorials, 18(3): 2027-2051, 2016.
-
•[J020] Energy-Efficient Medium Access Control for Energy Harvesting Communications
-
X. Fafoutis, A. Di Mauro, C. Orfanidis, N. Dragoni
-
IEEE Transactions on Consumer Electronics, 61(4): 402-410, 2015.
-
•[J019] A Framework and Classification for Fault Detection Approaches in Wireless Sensor Networks with an Energy Efficiency Perspective
-
Y. Zhang, N. Dragoni, J. Wang
-
International Journal of Distributed Sensor Networks, 11(11):1-11, 2015.
-
•[J018] Adaptive Security in ODMAC for Multihop Energy Harvesting Wireless Sensor Networks
-
A. Di Mauro, X. Fafoutis, N. Dragoni
-
International Journal of Distributed Sensor Networks, 11(4): 1-10, 2015.
-
•[J017] Receiver-Initiated Medium Access Control Protocols for Wireless Sensor Networks
-
X. Fafoutis, A. Di Mauro, M. D. Vithanage, N. Dragoni
-
Computer Networks, 76: 55-74, 2015, doi: 10.1016/j.comnet.2014.11.002.
-
•[J016] Altruistic Backoff: Collision Avoidance for Receiver-Initiated MAC Protocols for Wireless Sensor Networks
-
X. Fafoutis, C. Orfanidis, N. Dragoni
-
International Journal of Distributed Sensor Networks, vol. 2014, article ID 576401, 2014, doi:10.1155/2014/576401.
-
•[J015] Dynamic Allocation and Admission Policies for QoS-aware Provisioning Systems [Special Issue Invited Paper]
M. Mazzucco, M. Mazzara, N. Dragoni
International Journal of Critical Computer-Based Systems, 4(1): 27-44, 2013. -
•[J014] High-Level Algorithms and Data Structures for Security-By-Contract on Java Cards [Special Issue Invited Paper]
N. Dragoni, O. Gadyatskaya, F. Massacci, A. Philippov
International Journal of Critical Computer-Based Systems, 3(4): 284-304, 2012. -
•[J013] Declarative Specification of Fault Tolerant Auction Protocols: the English Auction Case Study
N. Dragoni, M. Gaspari
Computational Intelligence, 28(4): 617-641, 2012. -
•[J012] Introducing the Cyber-Physical Attacker to Energy- Harvesting Wireless Sensor Networks
A. Di Mauro, D. Papini, R. Vigo, N. Dragoni
Journal of Networking Technology, 3(3):139-148, 2012. -
•[J011] Implementing Workflow Reconfiguration in WS-BPEL
M. Mazzara, N. Dragoni, M. Zhou
Journal of Internet Services and Information Security, 2(1/2), 2012. -
•[J010] Security-by-Contract-with-Trust for Mobile Devices
G. Costa, A. Lazouski, F. Martinelli, I. Matteucci, V. Issarny, R. Saadi, N. Dragoni, F. Massacci -
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 1(4): 75-91, 2010.
-
•[J009] What the Heck is this Application doing? - A Security-by-Contract Architecture for Pervasive Services
N. Dragoni, F. Massacci, T. Walter, C. Schaefer
Computers & Security, 28(7): 566-577, 2009. -
•[J008] Matching in Security-By-Contract for Mobile Code
N. Bielova, N. Dragoni, F. Massacci, K. Naliuka, I. Siahaan
Journal of Logic and Algebraic Programming, 78(5): 340-358, 2009. -
•[J007] A Self-Protecting and Self-Healing Framework for Negotiating Services and Trust in Autonomic Communication Systems
N. Dragoni, F. Massacci, A. Saidane
Computer Networks, 53(10): 1628-1648, 2009. -
•[J006] Security-By-Contract (S×C) for Mobile Systems [Invited paper]
-
N. Dragoni, F. Massacci
-
Telektronikk Journal, 1:107-116, 2009, Telenor.
-
•[J005] An ACL for Specifying Fault-Tolerant Protocols
-
N. Dragoni, M. Gaspari, D. Guidi
-
Applied Artificial Intelligence, 21(4): 361-381, 2007.
-
•[J004] Fault Tolerant Knowledge Level Inter-Agent Communication in Open Multi-Agent Systems
-
N. Dragoni
-
AI Communications, 19(4): 385-387, 2006.
-
•[J003] Crash Failure Detection in Asynchronous Agent Communication Languages
N. Dragoni, M. Gaspari
Autonomous Agents and Multi-Agent Systems, 13(3): 355-390, 2006. -
•[J002] An Infrastructure to Support Cooperation of Knowledge-Level Agents on the Semantic Grid
N. Dragoni, M. Gaspari, D. Guidi
International Journal of Applied Intelligence, 25(2): 159-180, 2006. -
•[J001] An Object Based Algebra for Specifying A Fault Tolerant Software Architecture
N. Dragoni, M. Gaspari
Journal of Logic and Algebraic Programming, 63(2): 271-297, 2005.
ARTICLES IN BOOKS
-
•[B010] Secure Software Updates in IoT Devices
-
E. Dushku, N. Dragoni
-
In: S. Jajodia, P. Samarati, M. Yung (eds) Encyclopedia of Cryptography, Security and Privacy. Springer, Berlin, Heidelberg.
DOI: https://doi.org/ 10.1007/978-3-642-27739-9_1784-1.
-
•[B009] Swarm Attestation
-
E. Dushku, N. Dragoni
-
In: S. Jajodia, P. Samarati, M. Yung (eds) Encyclopedia of Cryptography, Security and Privacy. Springer, Berlin, Heidelberg.
DOI: https://doi.org/10.1007/978-3-642-27739-9_1783-1.
-
•[B008] Remote Attestation in IoT Devices
-
E. Dushku, N. Dragoni
-
In: S. Jajodia, P. Samarati, M. Yung (eds) Encyclopedia of Cryptography, Security and Privacy. Springer, Berlin, Heidelberg.
DOI: https://doi.org/10.1007/978-3-642-27739-9_1782-1. -
•[B007] Direct Anonymous Attestation
-
E. Dushku, T. Giannetsos, N. Dragoni
-
In: S. Jajodia, P. Samarati, M. Yung (eds) Encyclopedia of Cryptography, Security and Privacy. Springer, Berlin, Heidelberg.
DOI: https://doi.org/10.1007/978-3-642-27739-9_1742-1. -
•[B006] Size Matters: Microservices Research and Applications
-
M. Mazzara, A. Bucchiarone, N. Dragoni, V. Rivera
-
In A. Bucchiarone et al.: Microservices - Science and Engineering, Springer, 2019.
-
•[B005] Microservices: Yesterday, Today, and Tomorrow
-
N. Dragoni, S. Giallorenzo, A. Lluch-Lafuente, M. Mazzara, F. Montesi, R. Mustafin, L. Safina
-
In M. Mazzara and B. Meyer: Present And Ulterior Software Engineering, Springer, 2017.
-
•[B004] Social Networks and Collective Intelligence: A Return to the Agora
-
M. Mazzara, L. Biselli, P.P. Greco, N. Dragoni, A. Marraffa, N. Qamar, S. De Nicola
-
In Caviglione et al.: Social Network Engineering for Secure Web Data and Services, IGI Global, 2013.
-
•[B003] Supporting Software Evolution for Open Smart Cards by Security-by-Contract
N. Dragoni, O. Gadyatskaya, F. Massacci
In Petre et al.: Dependability and Computer Engineering: Concepts for Software-Intensive Systems, IGI Global, 2011. -
•[B002] Security-by-Contract (SxC) for Software and Services of Mobile Systems
-
N. Dragoni, F. Martinelli, F. Massacci, P. Mori, C. Schaefer, T. Walter, E. Vetillard
-
Di Nitto et al.: At Your Service - Service-Oriented Computing from an EU Perspective, MIT Press, 2009.
-
•[B001] A Fault Tolerant Agent Communication Language for Supporting Web Agent Interaction
-
N. Dragoni, M. Gaspari, D. Guidi
-
Dugnum et al.: Agent Communication II - International Workshops on Agent Communication, AC2005 and AC2006, Selected and Revised Papers, vol. 3859, 2006, LNAI.
CONFERENCE AND WORKSHOP PROCEEDINGS
-
•[P090] NetSMoM: ML-Driven Network Slicing Framework for Efficient and Secure Service Delivering in 6G Network
R. Dangi, L. Malviya, A. Jadhav, G. Choudhary, N. Dragoni
In Proceedings of the 8th International Conference on Mobile Internet Security (MobiSec), 2024.
-
•[P089] Bruteware: A Novel Family of Cryptoviral Attacks
V. Coletti, E. Müller, F. Meyer Lehmann Lundsbjerg, N. Dragoni
In Proceedings of the 39th International Conference on ICT Systems Security and Privacy Protection (IFIP SEC), 2024, Springer.
-
•[P088] Fake Base Station Detection and Localization in 5G Network: A Proof of Concept
D. Butad, S. M. Tao, H. Tudtud, P. V. Astillo, G. Choudhary, N. Dragoni
In Proceedings of the 7th International Conference on Mobile Internet Security (MobiSec), 2023, Springer.
-
•[P087] A Threat and Risk Analysis of Internet Communication Technology Use
K. Panwar, V. Sihag, G. Choudhary, N. Dragoni
In Proceedings of the 8th International Conference on ICT for Sustainable Development (ICT4SD), 2023, Springer.
-
•[P086] Accomplishing More With Less: The Practice of Cybersecure Health Technology Design Among Danish Startups Detection
Z. Li, S. Nam Thanh, N. Dragoni, K. Doherty
In Proceedings of the ACM CHI Conference on Human Factors in Computing Systems, 2023, ACM.
-
•[P085] DyBAnd: Dynamic Behavior Based Android Malware Detection
S. Jaiswal, V. Sihag, G. Choudhary, N. Dragoni
In Proceedings of the 6th International Symposium on Mobile Internet Security, 2022, Springer.
-
•[P084] Software-Defined Network based Secure Internet-Enabled Video Surveillance System
M. Del Castillo, H. Hermosa, P. V. Astillo, G. Choudhary, N. Dragoni
In Proceedings of the 23rd World Conference on Information Security Applications (WISA), 2022, Springer LNCS.
-
•[P083] Cloud Storage Client Forensic: Analysis of MEGA Cloud
H. Mishra, V. Sihag, G. Choudhary, N. Dragoni, I. You
In Proceedings of the 4th International Conference on Futuristic Trends in Networks and Computing Technologies (FTNCT), 2021, Springer.
-
•[P082] DIMDA: Deep Learning and Image-based Malware Detection for Android [Best Paper Award]
V. Sihag, S. Prakash, G. Choudhary, N. Dragoni, I. You
In Proceedings of the 4th International Conference on Futuristic Trends in Networks and Computing Technologies (FTNCT), 2021, Springer.
-
•[P081] PERMANENT: Publicly Verifiable Remote Attestation for Internet of Things through Blockchain
S. Ankergård, E. Dushku, N. Dragoni
In Proceedings of the 14th International Symposium on Foundations & Practice of Security (FPS), 2021, Springer.
-
•[P080] AI Empowered DevSecOps Security for Next Generation Development
B. Yadav, G. Choudhary, S. K. Shandilya, N. Dragoni
In Proceedings of the International Conference on Frontiers in Software Engineering (ICFSE), 2021, Springer.
-
•[P079] RESERVE: Remote Attestation of Intermittent loT devices
MD M. Rabbani, E. Dushku, J. Vliegen, A. Braeken, N. Dragoni, N. Mentens
In Proceedings of the 9th International Workshop on Energy Harvesting & Energy-Neutral Sensing Systems (ENSsys), 2021, ACM.
-
•[P078] ERAMO: Effective Remote Attestation through Memory Offloading
J. H. Østergaard, E. Dushku, N. Dragoni
In Proceedings of the IEEE International Conference on Cyber Security and Resilience (CSR), 2021, IEEE.
-
•[P077] Fault-Tolerant Clock Synchronization using Precise Time Protocol Multi-Domain Aggregation
E. Kyriakakis, K. Tange, N. Reusch, E. O. Zaballa, X. Fafoutis, M. Schoeberl, N. Dragoni
In Proceedings of the 24th IEEE International Symposium on Real-Time Distributed Computing (ISORC), 2021, IEEE.
-
•[P076] RESIP Host Detection: Identification of Malicious Residential IP Proxy Flows
A. Tosun, M. De Donno, N. Dragoni, X. Fafoutis
In Proceedings of the 39th IEEE International Conference on Consumer Electronics (ICCE), 2021, IEEE.
-
•[P075] Smart Lamp or Security Camera? Automatic Identification of IoT Devices
M. D. Thomsen, A. Giaretta, N. Dragoni
In Proceedings of the 12th International Network Conference 2020 (INC2020), 2020, Springer Lecture Notes in Networks and Systems.
-
•[P074] rTLS: Lightweight TLS Session Resumption for Constrained IoT Devices
K. Tange, D. Howard, T. Shanahan, S. Pepe, X. Fafoutis, N. Dragoni
In Proceedings of the International Conference on Information and Communications Security (ICICS), 2020, LNCS.
-
•[P073] IoT Device Profiling: From MUD Files to SxC Contracts
G. Matthiasson, A. Giaretta, N. Dragoni
In Proceedings of Open Identity Summit, 2020, GI-Edition Lecture Notes in Informatics (LNI).
-
•[P072] SHAKE: SHared Acceleration Key Establishment for Resource-Constrained IoT Devices
E. Bejder, A. K. Mathiasen, M. De Donno, N. Dragoni, X. Fafoutis
In Proceedings of the 6th IEEE World Forum on Internet of Things (WF-IoT), 2020, IEEE.
-
•[P071] Sustainable Security for Internet of Things
M. De Donno, K. M. Malarski, X. Fafoutis, N. Dragoni, M. Nordal Petersen, M. Stübert Berger, S. Ruepp
In Proceedings of SmartNets 2019: International Conference on Smart Applications, Communications and Networking, 2019, IEEE.
-
•[P070] UniquID: A Quest to Reconcile Identity Access Management and the Internet of Things
A. Giaretta, S. Pepe, N. Dragoni
In Proceedings of TOOLS 50+1:Technology of Object-Oriented Languages and Systems, 2019, LNCS.
-
•[P069] AntibIoTic 2.0: A Fog-based Anti-Malware for Internet of Things
M. De Donno, Juan M. D. Felipe, N. Dragoni
In Proceedings of the European Workshop on Security and Privacy in Edge Computing (EuroSPEC at EuroS&P), 2019, IEEE.
-
•[P068] Combining AntibIoTic with Fog Computing: AntibIoTic 2.0
M. De Donno, N. Dragoni
In Proceedings of the 3rd IEEE International Conference on Fog and Edge Computing (ICFEC 2019), 2019, IEEE.
-
•[P067] Protecting the Internet of Things with Security-by-Contract and Fog Computing
A. Giaretta, N. Dragoni, F. Massacci
In Proceedings of the IEEE 5th World Forum on Internet of Things (WF-IoT), 2019, IEEE.
-
•[P066] Towards a Systematic Survey of Industrial IoT Security Requirements: Research Method and Quantitative Analysis
K. Tange, M. De Donno, X. Fafoutis, N. Dragoni
In Proceedings of Workshop on Fog Computing and the IoT (Fog-IoT’19), co-located with CPS-IoT Week, 2019, IEEE.
-
•[P065] Vulnerabilities and Security Breaches in Cryptocurrencies
-
G. Sigurdsson, A. Giaretta, N. Dragoni
-
In: Ciancarini P., Mazzara M., Messina A., Sillitti A., Succi G. (eds) Proceedings of 6th International Conference in Software Engineering for Defence Applications (SEDA 2018). Advances in Intelligent Systems and Computing, vol 925. Springer.
-
•[P064] Community Targeted Phishing
-
A. Giaretta, N. Dragoni
-
In: Ciancarini P., Mazzara M., Messina A., Sillitti A., Succi G. (eds) Proceedings of 6th International Conference in Software Engineering for Defence Applications (SEDA 2018). Advances in Intelligent Systems and Computing, vol 925. Springer.
-
•[P063] When the Price Is Your Privacy: A Security Analysis of Two Cheap IoT Devices
-
M. Favaretto,T. Tran Anh, J. Kavaja, M. De Donno, N. Dragoni
-
In: Ciancarini P., Mazzara M., Messina A., Sillitti A., Succi G. (eds) Proceedings of 6th International Conference in Software Engineering for Defence Applications (SEDA 2018), Advances in Intelligent Systems and Computing, vol 925, Springer.
-
•[P062] Adding Salt to Pepper - A Structured Security Assessment over a Humanoid Robot
-
A. Giaretta, M. De Donno, N. Dragoni
-
In Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES’18), IoT-SECFOR session, 2018, ACM.
-
•[P061] Joining Jolie to Docker - Orchestration of Microservices on a Containers-as-a-Service Layer
-
A. Giaretta, N. Dragoni, M. Mazzara
-
In Proceedings of the 5th International Conference in Software Engineering for Defense Applications (SEDA’16), 2018, LNCS.
-
•[P060] The Internet of Hackable Things
-
N. Dragoni, A. Giaretta, M. Mazzara
-
In Proceedings of the 5th International Conference in Software Engineering for Defense Applications (SEDA’16), 2018, LNCS.
-
•[P059] AntibIoTic: Protecting IoT Devices Against DDoS Attacks
-
M. De Donno, N. Dragoni, A. Giaretta, M. Mazzara
-
In Proceedings of the 5th International Conference in Software Engineering for Defense Applications (SEDA’16), 2018, LNCS.
-
•[P058] Analysis of DDoS-Capable IoT Malwares
M. De Donno, N. Dragoni, A. Giaretta, A. Spognardi
In Proceedings of 1st International Conference on Security, Privacy, and Trust (INSERT), 2017, IEEE.
-
•[P057] Security Flows in OAuth 2.0 Framework - A Case Study
M. Argyriou, N. Dragoni, A. Spognardi
In Proceedings of TELERISE: 3rd International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity, 2017, LNCS.
-
•[P056] Microservices: How To Make Your Application Scale
-
N. Dragoni, I. Lanese, S. Thordal Larsen, M. Mazzara, R. Mustafin, L. Safina
-
In Proceedings of the 11th A.P. Ershov Informatics Conference, 2017, LNCS.
-
•[P055] A Taxonomy of Distributed Denial of Service Attacks
-
M. De Donno, N. Dragoni, A. Giaretta, A. Spognardi
-
In Proceedings of the International Conference on Information Society (i-Society), 2017, IEEE.
-
•[P054] Security and Privacy Issues in Healthcare Monitoring Systems: A Case Study
-
D. T. Handler, L. Hauge, A. Spognardi, N. Dragoni
-
In Proceedings of the 10th International Conference on Health Informatics (HEALTHINF'17), 2017, SCITEPRESS.
-
•[P053] SafeDroid: A Distributed Malware Detection Service for Android
-
R. Goyal, A. Spognardi, N. Dragoni, M. Argyriou
-
In Proceedings of the 9th IEEE International Conference on Service-Oriented Computing and Applications (SOCA), 2016, IEEE.
-
•[P052] Why Hackers Love eHealth Applications
-
R. Goyal, N. Dragoni
-
In Proceedings of the 3rd EAI International Conference on IoT Technologies for HealthCare (HealthyIoT), 2016, LNICST.
-
•[P051] Security and Privacy Issues in Health Monitoring Systems: eCare@Home Case Study
-
T. Wearing, N. Dragoni
-
In Proceedings of the 1st Workshop on Emerging eHealth through Internet of Things, affiliated with HealthyIoT’16, 2016, LNICST.
-
•[P050] Evaluation of Professional Cloud Password Management Tools
-
D. Schougaard, N. Dragoni, A. Spognardi
-
In Proceedings of the 2nd International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity (TELERISE’16), affiliated with ICWE’1616, 2016, LNCS.
-
•[P049] Mind The Tracker You Wear - A Security Analysis of Wearable Health Trackers
-
R. Goyal, N. Dragoni, A. Spognardi
-
In Proceedings of the 31st ACM Symposium on Applied Computing (SAC’16), track on HEALTHCARE: A Growing Scenario for Applied Computing, 2016, ACM.
-
•[P048] Adaptive Multipath Key Reinforcement for Energy Harvesting Wireless Sensor Networks
-
A. Di Mauro, N. Dragoni
-
In Proceedings of the 6th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN’15), 2015, Elsevier.
-
•[P047] Fault Detection in WSNs - An Energy Efficiency Perspective Towards Human-Centric WSNs
-
C. Orfanidis, Y. Zhang, N. Dragoni
-
In Proceedings of the 9th International KES Conference on Agents and Multi-Agent Systems: Technologies and Applications (KES-AMSTA’15, session on Anthropic-Oriented Computing), 2015, Springer.
-
•[P046] Energy-Efficient Fault-Tolerant Dynamic Event Region Detection in Wireless Sensor Networks
-
H.-J. Enemark, Y. Zhang, N. Dragoni, C. Orfanidis
-
In Proceedings of IEEE VTC Workshop on Heterogeneous Networking for the Internet of Things, 2015, IEEE.
-
•[P045] MITHYS: Mind The Hand You Shake - Protecting Mobile Devices from SSL Usage Vulnerabilities
-
M. Conti, N. Dragoni, S. Gottardo
-
In Proceedings of the 9th workshop on Security & Trust Management (STM’13), Egham (UK) in conjunction with ESORICS, 2013, LNCS.
-
•[P044] Detecting and Preventing Beacon Replay Attacks in Receiver-Initiated MAC Protocols for Energy Efficient WSNs
-
A. Di Mauro, X. Fafoutis, S. Mödersheim, N. Dragoni
-
In Proceedings of the 18th Nordic Conference on Secure IT Systems (NordSec’13), Ilulissat, Greenland, 2013, LNCS.
-
•[P043] Sustainable Performance in Energy Harvesting - Wireless Sensor Networks [Tool Demonstration]
-
X. Fafoutis, A. Di Mauro, N. Dragoni
-
In Proceedings of the fourth International Conference on Future Energy Systems (e-Energy), Berkeley, CA, 2013, ACM.
-
•[P042] Sustainable Medium Access Control: Implementation and Evaluation of ODMAC
-
X. Fafoutis, A. Di Mauro, N. Dragoni
-
In Proceedings of the IEEE International Conference on Communications (ICC’13) - Workshop on Energy Efficiency in Wireless Networks & Wireless Networks for Energy Efficiency (E2Nets), 2013, IEEE.
-
•[P041] Medium Access Control for Thermal Energy Harvesting in Advanced Metering Infrastructures
-
M. D. Vithanage, X. Fafoutis, C. B. Andersen, N. Dragoni
-
In Proceedings of the International Conference on Computer as a Tool (EUROCON’13), Zagreb, Croatia, 2013, IEEE.
-
•[P040] Social Networks and Collective Intelligence - A Return to the Agora (with the Polidoxa Shift) [Position Paper]
-
L. Biselli, N. Dragoni, E. Goldoni, P.P. Greco, A. Marraffa, M. Mazzara, G. Papageorgiou
-
In Proceedings of the 1st International Conference on Agreement Technologies (AT’12), Dubrovnik, Croatia, 2012, CEUR-WS.
-
•[P039] Analytical Comparison of MAC Schemes for Energy Harvesting - Wireless Sensor Networks
-
X. Fafoutis, N. Dragoni
-
In Proceedings of the International Workshop on Algorithms and Concepts for Networked Sensing Systems Powered by Energy Harvesters (EnHaNSS'12), Antwerp, Belgium, 2012, IEEE.
-
•[P038] Adaptive Medium Access Control for Energy Harvesting - Wireless Sensor Networks
-
X. Fafoutis, N. Dragoni
-
In Proceedings of the 9th International Conference on Networked Sensing Systems (INSS’12), Antwerp, Belgium, 2012, IEEE.
-
•[P037] Modelling and Analysis of Dynamic Reconfiguration in BP-Calculus
-
F. Abouzaid, J. Mullins, M. Mazzara, N. Dragoni
-
In Proceedings of the 1st International Workshop on Trustworthy Multi-Agent Systems (TruMAS’12), Invited Session at KES-AMSTA 2012, Dubrovnik, Croatia, LNCS.
-
•[P036] Toward a Threat Model for Energy-Harvesting Wireless Sensor Networks
-
A. Di Mauro, D. Papini, R. Vigo, N. Dragoni
-
In Proceedings of the International Workshop on Wireless Sensor Networks and their Applications at NDT’12, Dubai, UAE, 2012, CCIS (LNCS).
-
•[P035] Security Challenges for Energy-Harvesting Wireless Sensor Networks [Poster/Short Paper]
-
A. Di Mauro, D. Papini, N. Dragoni
-
In Proceedings of the 2nd International Conference on Pervasive and Embedded Computing and Communication Systems (PECCS 2012), Rome, Italy, 2012.
-
•[P034] Energy-Harvesting Wireless Sensor Networks [Poster/Short Paper]
-
X. Fafoutis, D. Vuckovic, A. Di Mauro, N. Dragoni, J. Madsen
-
In (adjunct) Proceedings of the 9th European Conference on Wireless Sensor Networks (EWSN’12), Trento, Italy, 2012.
-
•[P033] Toward a Unified Framework for Web Service Trustworthiness [Reflection Paper]
-
N. Miotto, N. Dragoni
-
In Proceedings of IADIS e-Society, Berlin, Germany, 2012.
-
•[P032] Toward Design, Modelling and Analysis of Dynamic Workflow Reconfigurations - A Process Algebra Perspective
-
M. Mazzara, F. Abouzaid, N. Dragoni, A. Bhattacharyya
-
In Proceedings of the 8th International Workshop on Web Services and Formal Methods (WS-FM’11), Clermont-Ferrand, France, 2011, LNCS.
-
•[P031] ODMAC: On Demand MAC Protocol for Energy Harvesting Wireless Sensor Networks
-
X. Fafoutis, N. Dragoni
-
In Proceedings of the Eighth ACM International Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks (PE-WASUN’11), Miami Beach, FL, USA, 2011, ACM.
-
•[P030] Dependable Workflow Reconfiguration in WS-BPEL
-
M. Mazzara, N. Dragoni, M. Zhou
-
In Proceedings of the 5th Nordic Workshop on Dependability and Security (NODES’11), Copenhagen, Denmark, 2011, DTU Technical Report.
-
•[P029] Analysis of Trust-Based Approaches for Web Service Selection
-
N. Dragoni, N. Miotto, D. Papini
-
In Proceedings of the 5th Nordic Workshop on Dependability and Security (NODES’11), Copenhagen, Denmark, 2011, DTU Technical Report.
-
•[P028] Design, Modelling and Analysis of a Workflow Reconfiguration [Best Paper Award]
-
M. Mazzara, F. Abouzaid, N Dragoni, A. Bhattacharyya
-
In Proceedings of the International Workshop on Petri Nets and Software Engineering (PNSE’11), Newcastle upon Tyne, UK, 2011, CEUR-WS.
-
•[P027] (SC)2: Secure Communication over Smart Cards - How to Secure Off-Card Matching in Security-by-Contract for Open Multi-Application Smart Cards.
-
N. Dragoni, E. Lostal, D. Papini, J. Fabra
-
In Proceedings of the International Workshop on Foundations & Practice of Security (FPS), Paris, France, 2011, LNCS.
-
•[P026] Loading-Time Verification for Open Multi-Application Smart Cards
-
N. Dragoni, O. Gadyatskaya, F. Massacci, F. Paci, E. Lostal
-
In Proceedings of the IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY 2011), Pisa, Italy, 2011, IEEE.
-
•[P025] (SC)2: a System to Secure Off-Card Contract-Policy Matching in Security-by-Contract for Open Multi-Application Smart Cards [Tool Demonstration]
-
N. Dragoni, E. Lostal, D. Papini
-
In Proceedings of the IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY 2011), Pisa, Italy, 2011, IEEE.
-
•[P024] Extending Security-by-Contract with Quantitative Trust on Mobile Devices
-
A.Lazouski, F.Martinelli, F.Massacci, G.Costa, N.Dragoni, I.Matteucci
-
In Proceeding of CISIS 2010, The Fourth International Conference on Complex, Intelligent and Software Intensive Systems, pages 872–877, 2010, IEEE.
-
•[P023] Securing Off-Card Contract-Policy Matching in Security-By-Contract for Multi-Application Smart Cards
N. Dragoni, E. Lostal, D. Papini, J. Fabra
In Proceedings of the 4th International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies (UBICOMM 2010), Firenze, Italy, 2010, XPS. -
•[P022] A Survey on Trust-Based Web Service Provision Approaches [Best Paper Award]
N. Dragoni
In Proceedings of the 3th International Conference on Dependability (DEPEND 2010), Venice, Italy, 2010, IEEE CPS. -
•[P021] Design of QoS-aware Provisioning Systems
M. Mazzucco, M. Mazzara, N. Dragoni
In Proceedings of the 4th Nordic Workshop on Dependability and Security (NODES 2010), Copenhagen, Denmark, 2010, DTU Technical Report. -
•[P020] Security-by-Contract for Applications’ Evolution in Multi-Application Smart Cards
N. Dragoni, O. Gadyatskaya, F. Massacci
In Proceedings of the 4th Nordic Workshop on Dependability and Security (NODES 2010), Copenhagen, Denmark, 2010, DTU Technical Report. -
•[P019] Supporting Applications' Evolution in Multi-Application Smart Cards by Security-by-Contract
N. Dragoni, O. Gadyatskaya, F. Massacci
In Proceedings of the 4th Workshop in Information Security Theory and Practices (WISTP 2010), Passau, Germany, 2010, LNCS, Springer. -
•[P018] Extending Security-by-Contract with Quantitative Trust on Mobile Devices
G. Costa, N. Dragoni, A. Lazouski, F. Martinelli, F. Massacci, I. Matteucci
In Proceedings of the 4th International Workshop on Intelligent, Mobile and Internet Services in Ubiquitous Computing (IMIS 2010), Krakow, Poland, 2010, IEEE Computer Society Press. -
•[P017] Where are All the Agents? On the Gap Between Theory and Practice of Agent-Based Referral Networks - An Inter-Agent Communication Perspective
N. Dragoni
In Proceedings of the 12th International Conference on Principles of Practice in Multi-Agent Systems (PRIMA’09), Nagoya, Japan, 2009, LNAI, Springer. -
•[P016] A Formal Semantics for the WS-BPEL Recovery Framework - The π-Calculus Way
N. Dragoni, M. Mazzara
In Proceedings of the 6th International Workshop on Web Services and Formal Methods (WS-FM’09), Bologna, Italy, 2009, LNCS, Springer. -
•[P015] Toward Trustworthy Web Services - Approaches, Weaknesses and Trust-By-Contract Framework
N. Dragoni
In Proceedings of WI/IAT Web Privacy and Trust Workshop (WPT'09), Milano, Italy, 2009, IEEE Computer Society Press. -
•[P014] Security-by-Contract (SxC) for Mobile Systems [Position Paper]
N. Dragoni, F. Massacci, K. Naliuka
W3C Workshop on Security for Access to Device APIs from the Web (http://www.w3.org/2008/security-ws/), 2008. -
•[P013] Security-by-Contract (SxC) [Poster Paper]
N. Dragoni, F. Massacci, K. Naliuka
In Proceedings of ICT-MobileSummit, Stockholm, Sweden, 2008. -
•[P012] An Inline Monitoring System for .NET Mobile Devices [Tool Demonstration]
-
N. Dragoni, F. Massacci, K. Naliuka
In Proceedings of IFIPTM'08, Trondheim, Norway, 2008, IFIP, Springer. -
•[P011] A Framework for Dependable Trust Negotiation in Open Environment
N. Dragoni, A. Saidane -
In Proceedings of the 5th IEEE Workshop on Engineering of Autonomic and Autonomous Systems (EASE'08), Belfast, Northern Ireland, 2008, IEEE Computer Society Press.
-
•[P010] Matching Policies with Security Claims of Mobile Applications
-
N. Bielova, M. Dalla Torre, N. Dragoni, I. Siahaan
-
In Proceedings of the Third International Conference on Availability, Reliability and Security (ARES'08), Barcelona, Spain, 2008, IEEE Computer Society Press.
-
•[P009] Security-by-Contract for Web Services - or How to Trade Credentials for Services
-
N. Dragoni, F. Massacci
In Proceedings of the ACM Workshop on Secure Web Services (SWS'07), Alexandria, VA, USA, 2007, ACM. -
•[P008] Decision Making in Fund Raising Management: a Knowledge Based Approach
L. Barzanti, N. Dragoni, A. Degli Esposti, M. Gaspari
In Proceedings of the 27th SGAI International Conference on Artificial Intelligence (AI-2007), Cambridge, UK, 2007, Springer. -
•[P007] A Security-by-Contract Architecture for Pervasive Services
N. Dragoni, F. Massacci, C. Schaefer, T. Walter, E. Vetillard -
In Proceedings of the 3rd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU'07), Instanbul, Turkey, 2007, IEEE Computer Society Press.
-
•[P006] Security-by-Contract: Toward a Semantics for Digital Signatures on Mobile Code
N. Dragoni, F. Massacci, K. Naliuka, I. Siahaan -
In Proceedings of the Fourth European PKI Workshop: Theory and Practice (EuroPKI'07), Mallorca, Spain, 2007, LNCS.
-
•[P005] Performative Patterns for Designing Verifiable ACLs
N. Dragoni, M. Gaspari -
In Proceedings of the Tenth International Workshop on Cooperative Information Agents (CIA2006), Edinburgh, UK, 2006, LNAI, Springer.
-
•[P004] NOWHERE - An Open Service Architecture to support Agents and Services within the Semantic Web
N. Dragoni, M. Gaspari, D. Guidi -
In Proceedings of the 2nd Italian Semantic Web Workshop on Semantic Web Applications and Perspectives (SWAP’05), Trento, Italy, 2005, CEUR-WS.
-
•[P003] An ACL for Specifying Fault-Tolerant Protocols
N. Dragoni, M. Gaspari, D. Guidi -
In Proceedings of the 9th AI*IA Conference, Milano, Italy, 2005, LNAI, Springer.
-
•[P002] Integrating Knowledge-Level Agents in the (Semantic) Web: an Agent-based Open Service Architecture
N. Dragoni, M. Gaspari, D. Guidi
In Proceedings of the 18th International FLAIRS Conference, Clearwater Beach, Florida (USA), 2005, AAAI Press. -
•[P001] A Peer-to-Peer Knowledge Level Open Service Architecture
N. Dragoni, M. Gaspari, D. Guidi -
In Proceedings of WM2005 Workshop on “Peer-to-Peer and Agent Infrastructures for Knowledge Management”(PAIKM05), Kaiserslautern, Germany, 2005, DFKI Kaiserslautern.