EDITED BOOKS/JOURNAL SPECIAL ISSUES


  1. [E004] Microservices - Science and Engineering

  2. A. Bucchiarone, N. Dragoni, S. Dustdar, P. Lago, M. Mazzara, V. Rivera 

  3. Springer, 2019.

  4. [E003] Dependability and Security in a Nordic Perspective - Part II

  5. N. Dragoni, C. D. Jensen

  6. International Journal of Critical Computer-Based Systems (IJCCBS), 4(1), 2013.

  7. [E002] Dependability and Security in a Nordic Perspective - Part I

  8. N. Dragoni, C. D. Jensen

  9. International Journal of Critical Computer-Based Systems (IJCCBS), 3(4), 2012.

  10. [E001] Frontiers in Trust Management
    C. D. Jensen, N. Dragoni, A. Basu, C. Mancini
    Journal of Internet Services and Information Security, 1(4), 2011.


INTERNATIONAL JOURNALS AND MAGAZINES


  1. [J060] Deepfake-Driven Social Engineering: Threats, Detection Techniques, and Defensive Strategies in Corporate Environments    

  2. K. T. Pedersen, L. Pepke, T. Stærmose, M. Papaioannou, G. Choudhary, N. Dragoni

  3. In Journal of Cybersecurity and Privacy, 5(2):18, 2025. DOI: https://doi.org/10.3390/jcp5020018.

  4. [J059] Challenges and Potential Improvements for Passkey Adoption - A Literature Review with a User-Centric Perspective    

  5. A. Matzen, A. Rüffer, M. Byllemos, O. Heine, M. Papaioannou, G. Choudhary, N. Dragoni

  6. In Applied Sciences, 15(8):4414, 2025. DOI: https://doi.org/10.3390/app15084414.

  7. [J058] Advancements in Machine Learning-Based Intrusion Detection in IoT: Research Trends and Challenges    

  8. MB. Bankó, S. Dyszewski, M. Králová, MB. Limpek, M. Papaioannou, G. Choudhary, N. Dragoni

  9. In Algorithms, 18(4):209, 2025. DOI: https://doi.org/10.3390/a18040209.

  10. [J057] Systematic Literature Review of IoT Botnet DDOS Attacks and Evaluation of Detection Techniques    

  11. M. Gelgi, Y. Guan, S. Arunachala, M. Samba Siva Rao, N. Dragoni

  12. In Sensors, 24(11), 3571, 2024. DOI: https://doi.org/10.3390/s24113571.

  13. [J056] A Review of Lightweight Security and Privacy for Resource-Constrained IoT Devices    

  14. G. Choudhary, S. Kumar, I. You, N. Dragoni, R. Dangi, D. Kumar

  15. In Computers, Materials & Continua, 78(1): 31-63, 2024. DOI: https://doi.org/10.32604/cmc.2023.047084.

  16. [J055] 6G Mobile Networks: Key Technologies, Directions, and Advances    

  17. R. Dangi, G. Choudhary, N. Dragoni, P. Lalwani, U. Khare, S. Kundu

  18. In Telecom, 4(4): 836-876, 2023. DOI: https://doi.org/10.3390/ telecom4040037.

  19. [J054] A Survey of Automatic Generation of Attack Trees and Attack Graphs    

  20. A. M. Konsta, B. Spiga, A. L. Lafuente, N. Dragoni

  21. In Computers & Security, 137, 2024. DOI: https://doi.org/10.1016/j.cose.2023.103602.

  22. [J053] A Survey of Trust Management for Internet of Things    

  23. A. M. Konsta, A. L. Lafuente, N. Dragoni

  24. In IEEE Access, vol. 11, 2023. DOI: https://doi.org/10.1109/ACCESS.2023.3327335.

  25. [J052] Cyber4Drone: A Systematic Review of Cyber Security and Forensics in Next-Generation Drones    

  26. V. Sihag, G. Choudhary, P. Choudhary, N. Dragoni

  27. In Drones, 7(7): 430, 2023. DOI: https://doi.org/10.3390/drones7070430.

  28. [J051] FC-CACPHS: Fog-Cloud Assisted Context- Aware Framework for Cyber-Physical Healthcare System    

  29. P. Verma, A. Gupta, R. Dangi, G. Choudhary, N. Dragoni, I. You

  30. In International Journal of Ad Hoc and Ubiquitous Computing, 45(3): 186-199, 2024. DOI: https://doi.org/10.1504/IJAHUC.2024.137505.

  31. [J050] MaGiC: a DSL Framework for Implementing Language Agnostic Microservice-based Web Applications    

  32. A. Bucchiarone, C. Ciumedean, K. Soysal, N. Dragoni, V. Pech

  33. Journal of Object Technology, 22(1): 1-21, 2023. DOI: https://doi.org/10.5381/jot.2023.22.1.a2.

  34. [J049] IEDA-HGEO: Improved Energy Efficient with Clustering-Based Data Aggregation and Transmission Protocol for Underwater Wireless Sensor Networks    

  35. J. Shubham, T.P Anithaashri, R. Rastogi, G. Choudhary, N. Dragoni

  36. In Energies, 16(1), 353, 2023. DOI: https://doi.org/10.3390/en16010353.

  37. [J048] Emerging Cyber Security Challenges after COVID Pandemic: A Survey    

  38. A. Choudhary, G. Choudhary, K. Pareek, C. Kunndra, J. Luthra, N. Dragoni

  39. In Journal of Internet Services and Information Security, 12(2): 21-50, 2022. DOI: https://doi.org/10.22667/JISIS.2022.05.31.021.

  40. [J047] Memory Offloading for Remote Attestation of Multi-Service IoT Devices    

  41. E. Dushku, J.H. Østergaard, N. Dragoni

  42. In Sensors, 22, 4340, 2022. DOI: https://doi.org/10.3390/s22124340.

  43. [J046] Secured Secret Sharing of QR Codes based on Nonnegative Matrix Factorization and Regularized Super Resolution Convolutional Neural Network    

  44. R. Velumani, Hariharasitaraman S, G. Choudhary, S. Bama, M. Victor Jose, N. Dragoni

  45. In Sensors, 22(8), 2959, 2002. DOI: https://doi.org/10.3390/s22082959.

  46. [J045] ML-based 5G Network Slicing Security: A Comprehensive Survey    

  47. R. Dangi, A. Jadhav, G. Choudhary, N. Dragoni, M. K. Mishra, P. Lalwani

  48. In Future Internet, 14(4), 116, 2022. DOI: https://doi.org/10.3390/fi14040116.

  49. [J044] BERT-Based Transfer-Learning Approach for Nested Named Entity Recognition Using Joint Labeling    

  50. A. Agrawal, S. Tripathi, M. Vardhan, V. Sihag, G. Choudhary, N. Dragoni

  51. In Applied Sciences, 12(3): 976, 2022. DOI: https://doi.org/10.3390/app12030976.

  52. [J043] ARCADIS: Asynchronous Remote Control-Flow Attestation of Distributed IoT Services    

  53. R. M. Halldórsson, E. Dushku, N. Dragoni

  54. In IEEE Access, vol. 9, 2021. DOI: https://doi.org/10.1109/ACCESS.2021.3122391.

  55. [J042] rTLS: Secure and Efficient TLS Session Resumption for the Internet of Things    

  56. K. Tange, S. Mödersheim, A. Lalos, X. Fafoutis, N. Dragoni

  57. In Sensors, 21(19), 2021.

  58. [J042] SxC4IoT: A Security-by-Contract Framework for Dynamic Evolving IoT Devices    

  59. A. Giaretta, N. Dragoni, F. Massacci

  60. In ACM Transactions on Sensor Networks, 18(1): 12, 1-51, 2021. DOI: https://doi.org/10.1145/3480462.

  61. [J040] AntibIoTic: The Fog-Enhanced Distributed Security System to Protect the (Legacy) Internet of Things    

  62. M. De Donno, X. Fafoutis, N. Dragoni

  63. In Journal of Computer Security, 30: 689-725, 2022. DOI: https://doi.org/10.3233/JCS-210027.

  64. [J039] A Survey on Botnets: Incentives, Evolution, Detection and Current Trends    

  65. S.N.T. Vu, M. Stege, P.I. El-Habr, J. Bang, N. Dragoni

  66. In Future Internet, 13(8), 198, 2021. DOI: https://doi.org/10.3390/fi13080198.

  67. [J038] State-of-the-Art Software-Based Remote Attestation: Opportunities and Open Issues for Internet of Things    

  68. S. Ankergård, E. Dushku, N. Dragoni

  69. In Sensors, 21(5), 2021.

  70. [J037] Benchmarks and Performance Metrics for Assessing the Migration to Microservice-Based Architectures    

  71. N. Bjørndal, L.J. Pires de Araújo, A. Bucchiarone, N. Dragoni, M. Mazzara, S. Dustdar

  72. In Journal of Object Technology, 20(2): 3: 1-17, 2021.

  73. [J036] Are We Preparing Students to Build Security In? A Survey of European Cybersecurity in Higher Education Programs    

  74. N. Dragoni, A. Lluch Lafuente, F. Massacci, A. Schlichtkrull

  75. In IEEE Security & Privacy, 19(1): 81-88, Jan.-Feb. 2021.

  76. [J035] On The Benefits and Challenges of Blockchains for Managing Food Supply Chains    

  77. P. Katsikouli, A. S. Wilde, N. Dragoni, H. H. Jensen

  78. In Journal of the Science of Food and Agriculture, 2020, DOI: https://doi.org/10.1002/jsfa.10883.

  79. [J034] A Systematic Survey of Industrial Internet of Things Security: Requirements and Fog Computing Opportunities    

  80. K. Tange, M. De Donno, X. Fafoutis, N. Dragoni

  81. In IEEE Communication Surveys & Tutorials, 22(4): 2489-2520, 2020.

  82. [J033] Oscausi - Practical Private Electronic Cash from Lelantus and MimbleWimble    

  83. L. Herskind, P. Katsikouli, N. Dragoni

  84. In Journal of Internet Services and Information Security (JISIS), 10(2): 16-34, 2020, DOI: https://doi.org/10.22667/JISIS.2020.05.31.016.

  85. [J032] Privacy and Cryptocurrencies - A Systematic Literature Review    

  86. L. Herskind, P. Katsikouli, N. Dragoni

  87. In IEEE Access, 8, 2020.

  88. [J031] Mobile and Wearable Sensing Frameworks for mHealth Studies and Applications: A Systematic Review    

  89. D. Kumar, S. Jeuris, J. E. Bardram, N. Dragoni

  90. ACM Transactions on Computing for Healthcare, 2(1): 1–28, 2021.

  91. [J030] Blockchain Implementations and Use Cases for Supply Chains – A Survey    

  92. P. Gönczöl, P. Katsikouli, L. Herskind, N. Dragoni

  93. In IEEE Access, 8, 2020.

  94. [J029] Foundations and Evolution of Modern Computing Paradigms: Cloud, IoT, Edge, and Fog    

  95. M. De Donno, K. Tange, N. Dragoni

  96. In IEEE Access, 7, 2019.

  97. [J028] IoT Security Configurability with Security-by-Contract   

  98. A. Giaretta, N. Dragoni, F. Massacci

  99. In Sensors, 19(19), 2019.

  100. [J027] Cyber-Storms Come from Clouds: Security of Cloud Computing in the IoT Era 

  101. M. De Donno, A. Giaretta, N. Dragoni, A. Bucchiarone, M. Mazzara

  102. In Future Internet, 11(6), 2019.

  103. [J026] BitFlow - Enabling Real-Time Cash-Flow Evaluations through Blockchain

  104. L. Herskind, A. Giaretta, M. De Donno, N. Dragoni

  105. In Concurrency and Computation: Practice and Experience, 2019, DOI: https://doi.org/10.1002/cpe.5333.

  106. [J025] Microservices: Migration of a Mission Critical System

  107. M. Mazzara, N. Dragoni, A. Bucchiarone, A. Giaretta, S. T. Larsen, S. Dustdar

  108. In IEEE Transactions on Services Computing, 14(5): 1464 - 1477, 2021, DOI: 10.1109/TSC.2018.2889087.

  109. [J024] Analysis and Evaluation of SafeDroid v2.0, a Framework for Detecting Malicious Android Applications

  110. M. Argyriou, A. Spognardi, N. Dragoni

  111. In Security and Communication Networks, vol. 2018, Article ID 4672072, 15 pages, 2018.

  112. [J023] From Monolithic to Microservices: An Experience Report from the Banking Domain

  113. A. Bucchiarone, N. Dragoni, S. Dustdar, S.T. Larsen, M. Mazzara

  114. In IEEE Software, 35(3): 50-55, 2018.

  115. [J022] DDoS-Capable IoT Malwares - Comparative Analysis and Mirai Investigation 

  116. M. De Donno, N. Dragoni, A. Giaretta, A. Spognardi

  117. In Security and Communication Networks, vol. 2018, Article ID 7178164, 30 pages, 2018.

  118. [J021] A Survey of Man In The Middle Attacks

  119. M. Conti, N. Dragoni, V. Lesyk

  120. IEEE Communication Surveys & Tutorials, 18(3): 2027-2051, 2016.

  121. [J020] Energy-Efficient Medium Access Control for Energy Harvesting Communications

  122. X. Fafoutis, A. Di Mauro, C. Orfanidis, N. Dragoni

  123. IEEE Transactions on Consumer Electronics, 61(4): 402-410, 2015.

  124. [J019] A Framework and Classification for Fault Detection Approaches in Wireless Sensor Networks with an Energy Efficiency Perspective

  125. Y. Zhang, N. Dragoni, J. Wang

  126. International Journal of Distributed Sensor Networks, 11(11):1-11, 2015.

  127. [J018] Adaptive Security in ODMAC for Multihop Energy Harvesting Wireless Sensor Networks

  128. A. Di Mauro, X. Fafoutis, N. Dragoni

  129. International Journal of Distributed Sensor Networks, 11(4): 1-10, 2015.

  130. [J017] Receiver-Initiated Medium Access Control Protocols for Wireless Sensor Networks

  131. X. Fafoutis, A. Di Mauro, M. D. Vithanage, N. Dragoni

  132. Computer Networks, 76: 55-74, 2015, doi: 10.1016/j.comnet.2014.11.002.

  133. [J016] Altruistic Backoff: Collision Avoidance for Receiver-Initiated MAC Protocols for Wireless Sensor Networks

  134. X. Fafoutis, C. Orfanidis, N. Dragoni

  135. International Journal of Distributed Sensor Networks, vol. 2014, article ID 576401, 2014, doi:10.1155/2014/576401.

  136. [J015] Dynamic Allocation and Admission Policies for QoS-aware Provisioning Systems [Special Issue Invited Paper]
    M. Mazzucco, M. Mazzara, N. Dragoni
    International Journal of Critical Computer-Based Systems, 4(1): 27-44, 2013.

  137. [J014] High-Level Algorithms and Data Structures for Security-By-Contract on Java Cards [Special Issue Invited Paper]
    N. Dragoni, O. Gadyatskaya, F. Massacci, A. Philippov
    International Journal of Critical Computer-Based Systems, 3(4): 284-304, 2012.

  138. [J013] Declarative Specification of Fault Tolerant Auction Protocols: the English Auction Case Study
    N. Dragoni, M. Gaspari
    Computational Intelligence, 28(4): 617-641, 2012.

  139. [J012] Introducing the Cyber-Physical Attacker to Energy- Harvesting Wireless Sensor Networks
    A. Di Mauro, D. Papini, R. Vigo, N. Dragoni
    Journal of Networking Technology, 3(3):139-148, 2012.

  140. [J011] Implementing Workflow Reconfiguration in WS-BPEL
    M. Mazzara, N. Dragoni, M. Zhou
    Journal of Internet Services and Information Security, 2(1/2), 2012.

  141. [J010] Security-by-Contract-with-Trust for Mobile Devices
    G. Costa, A. Lazouski, F. Martinelli, I. Matteucci, V. Issarny, R. Saadi, N. Dragoni, F. Massacci

  142. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 1(4): 75-91, 2010.

  143. [J009] What the Heck is this Application doing? - A Security-by-Contract Architecture for Pervasive Services
    N. Dragoni, F. Massacci, T. Walter, C. Schaefer
    Computers & Security, 28(7): 566-577, 2009.

  144. [J008] Matching in Security-By-Contract for Mobile Code
    N. Bielova, N. Dragoni, F. Massacci, K. Naliuka, I. Siahaan
    Journal of Logic and Algebraic Programming, 78(5): 340-358, 2009.

  145. [J007] A Self-Protecting and Self-Healing Framework for Negotiating Services and Trust in Autonomic Communication Systems
    N. Dragoni, F. Massacci, A. Saidane
    Computer Networks, 53(10): 1628-1648, 2009.

  146. [J006] Security-By-Contract (S×C) for Mobile Systems [Invited paper]

  147. N. Dragoni, F. Massacci

  148. Telektronikk Journal, 1:107-116, 2009, Telenor.

  149. [J005] An ACL for Specifying Fault-Tolerant Protocols

  150. N. Dragoni, M. Gaspari, D. Guidi

  151. Applied Artificial Intelligence, 21(4): 361-381, 2007.

  152. [J004] Fault Tolerant Knowledge Level Inter-Agent Communication in Open Multi-Agent Systems

  153. N. Dragoni

  154. AI Communications, 19(4): 385-387, 2006.

  155. [J003] Crash Failure Detection in Asynchronous Agent Communication Languages
    N. Dragoni, M. Gaspari
    Autonomous Agents and Multi-Agent Systems, 13(3): 355-390, 2006.

  156. [J002] An Infrastructure to Support Cooperation of Knowledge-Level Agents on the Semantic Grid
    N. Dragoni, M. Gaspari, D. Guidi
    International Journal of Applied Intelligence, 25(2): 159-180, 2006.

  157. [J001] An Object Based Algebra for Specifying A Fault Tolerant Software Architecture
    N. Dragoni, M. Gaspari
    Journal of Logic and Algebraic Programming, 63(2): 271-297, 2005.


ARTICLES IN BOOKS


  1. [B010] Secure Software Updates in IoT Devices

  2. E. Dushku, N. Dragoni 

  3. In: S. Jajodia, P. Samarati, M. Yung (eds) Encyclopedia of Cryptography, Security and Privacy. Springer, Berlin, Heidelberg.
    DOI: https://doi.org/ 10.1007/978-3-642-27739-9_1784-1.

  4. [B009] Swarm Attestation

  5. E. Dushku, N. Dragoni 

  6. In: S. Jajodia, P. Samarati, M. Yung (eds) Encyclopedia of Cryptography, Security and Privacy. Springer, Berlin, Heidelberg.
    DOI: https://doi.org/10.1007/978-3-642-27739-9_1783-1.

  7. [B008] Remote Attestation in IoT Devices

  8. E. Dushku, N. Dragoni 

  9. In: S. Jajodia, P. Samarati, M. Yung (eds) Encyclopedia of Cryptography, Security and Privacy. Springer, Berlin, Heidelberg.
    DOI: https://doi.org/10.1007/978-3-642-27739-9_1782-1.

  10. [B007] Direct Anonymous Attestation

  11. E. Dushku, T. Giannetsos, N. Dragoni 

  12. In: S. Jajodia, P. Samarati, M. Yung (eds) Encyclopedia of Cryptography, Security and Privacy. Springer, Berlin, Heidelberg.
    DOI: https://doi.org/10.1007/978-3-642-27739-9_1742-1.

  13. [B006] Size Matters: Microservices Research and Applications

  14. M. Mazzara, A. Bucchiarone, N. Dragoni, V. Rivera 

  15. In A. Bucchiarone et al.: Microservices - Science and Engineering, Springer, 2019.

  16. [B005] Microservices: Yesterday, Today, and Tomorrow

  17. N. Dragoni, S. Giallorenzo, A. Lluch-Lafuente, M. Mazzara, F. Montesi, R. Mustafin, L. Safina

  18. In M. Mazzara and B. Meyer: Present And Ulterior Software Engineering, Springer, 2017.

  19. [B004] Social Networks and Collective Intelligence: A Return to the Agora

  20. M. Mazzara, L. Biselli, P.P. Greco, N. Dragoni, A. Marraffa, N. Qamar, S. De Nicola

  21. In Caviglione et al.: Social Network Engineering for Secure Web Data and Services, IGI Global, 2013.

  22. [B003] Supporting Software Evolution for Open Smart Cards by Security-by-Contract
    N. Dragoni, O. Gadyatskaya, F. Massacci
    In Petre et al.: Dependability and Computer Engineering: Concepts for Software-Intensive Systems, IGI Global, 2011.

  23. [B002] Security-by-Contract (SxC) for Software and Services of Mobile Systems

  24. N. Dragoni, F. Martinelli, F. Massacci, P. Mori, C. Schaefer, T. Walter, E. Vetillard

  25. Di Nitto et al.: At Your Service - Service-Oriented Computing from an EU Perspective, MIT Press, 2009.

  26. [B001] A Fault Tolerant Agent Communication Language for Supporting Web Agent Interaction

  27. N. Dragoni, M. Gaspari, D. Guidi

  28. Dugnum et al.: Agent Communication II - International Workshops on Agent Communication, AC2005 and AC2006, Selected and Revised Papers, vol. 3859, 2006, LNAI.


CONFERENCE AND WORKSHOP PROCEEDINGS


  1. [P090] NetSMoM: ML-Driven Network Slicing Framework for Efficient and Secure Service Delivering in 6G Network

    R. Dangi, L. Malviya, A. Jadhav, G. Choudhary, N. Dragoni

    In Proceedings of the 8th International Conference on Mobile Internet Security (MobiSec), 2024.

  1. [P089] Bruteware: A Novel Family of Cryptoviral Attacks

    V. Coletti, E. Müller, F. Meyer Lehmann Lundsbjerg, N. Dragoni

    In Proceedings of the 39th International Conference on ICT Systems Security and Privacy Protection (IFIP SEC), 2024, Springer.

  1. [P088] Fake Base Station Detection and Localization in 5G Network: A Proof of Concept

    D. Butad, S. M. Tao, H. Tudtud, P. V. Astillo, G. Choudhary, N. Dragoni

    In Proceedings of the 7th International Conference on Mobile Internet Security (MobiSec), 2023, Springer.

  1. [P087] A Threat and Risk Analysis of Internet Communication Technology Use

    K. Panwar, V. Sihag, G. Choudhary, N. Dragoni

    In Proceedings of the 8th International Conference on ICT for Sustainable Development (ICT4SD), 2023, Springer.

  1. [P086] Accomplishing More With Less: The Practice of Cybersecure Health Technology Design Among Danish Startups Detection

    Z. Li, S. Nam Thanh, N. Dragoni, K. Doherty

    In Proceedings of the ACM CHI Conference on Human Factors in Computing Systems, 2023, ACM.

  1. [P085] DyBAnd: Dynamic Behavior Based Android Malware Detection

    S. Jaiswal, V. Sihag, G. Choudhary, N. Dragoni

    In Proceedings of the 6th International Symposium on Mobile Internet Security, 2022, Springer.

  1. [P084] Software-Defined Network based Secure Internet-Enabled Video Surveillance System

    M. Del Castillo, H. Hermosa, P. V. Astillo, G. Choudhary, N. Dragoni

    In Proceedings of the 23rd World Conference on Information Security Applications (WISA), 2022, Springer LNCS.

  1. [P083] Cloud Storage Client Forensic: Analysis of MEGA Cloud

    H. Mishra, V. Sihag, G. Choudhary, N. Dragoni, I. You

    In Proceedings of the 4th International Conference on Futuristic Trends in Networks and Computing Technologies (FTNCT), 2021, Springer.

  1. [P082] DIMDA: Deep Learning and Image-based Malware Detection for Android [Best Paper Award]

    V. Sihag, S. Prakash, G. Choudhary, N. Dragoni, I. You

    In Proceedings of the 4th International Conference on Futuristic Trends in Networks and Computing Technologies (FTNCT), 2021, Springer.

  1. [P081] PERMANENT: Publicly Verifiable Remote Attestation for Internet of Things through Blockchain

    S. Ankergård, E. Dushku, N. Dragoni

    In Proceedings of the 14th International Symposium on Foundations & Practice of Security (FPS), 2021, Springer.

  1. [P080] AI Empowered DevSecOps Security for Next Generation Development

    B. Yadav, G. Choudhary, S. K. Shandilya, N. Dragoni

    In Proceedings of the International Conference on Frontiers in Software Engineering (ICFSE), 2021, Springer.

  1. [P079] RESERVE: Remote Attestation of Intermittent loT devices

    MD M. Rabbani, E. Dushku, J. Vliegen, A. Braeken, N. Dragoni, N. Mentens

    In Proceedings of the 9th International Workshop on Energy Harvesting & Energy-Neutral Sensing Systems (ENSsys), 2021, ACM.

  1. [P078] ERAMO: Effective Remote Attestation through Memory Offloading

    J. H. Østergaard, E. Dushku, N. Dragoni

    In Proceedings of the IEEE International Conference on Cyber Security and Resilience (CSR), 2021, IEEE.

  1. [P077] Fault-Tolerant Clock Synchronization using Precise Time Protocol Multi-Domain Aggregation

    E. Kyriakakis, K. Tange, N. Reusch, E. O. Zaballa, X. Fafoutis, M. Schoeberl, N. Dragoni

    In Proceedings of the 24th IEEE International Symposium on Real-Time Distributed Computing (ISORC), 2021, IEEE.

  1. [P076] RESIP Host Detection: Identification of Malicious Residential IP Proxy Flows

    A. Tosun, M. De Donno, N. Dragoni, X. Fafoutis

    In Proceedings of the 39th IEEE International Conference on Consumer Electronics (ICCE), 2021, IEEE.

  1. [P075] Smart Lamp or Security Camera? Automatic Identification of IoT Devices

    M. D. Thomsen, A. Giaretta, N. Dragoni

    In Proceedings of the 12th International Network Conference 2020 (INC2020), 2020, Springer Lecture Notes in Networks and Systems.

  1. [P074] rTLS: Lightweight TLS Session Resumption for Constrained IoT Devices

    K. Tange, D. Howard, T. Shanahan, S. Pepe, X. Fafoutis, N. Dragoni

    In Proceedings of the International Conference on Information and Communications Security (ICICS), 2020, LNCS.

  1. [P073] IoT Device Profiling: From MUD Files to SxC Contracts

    G. Matthiasson, A. Giaretta, N. Dragoni

    In Proceedings of Open Identity Summit, 2020, GI-Edition Lecture Notes in Informatics (LNI).

  1. [P072] SHAKE: SHared Acceleration Key Establishment for Resource-Constrained IoT Devices

    E. Bejder, A. K. Mathiasen, M. De Donno, N. Dragoni, X. Fafoutis

    In Proceedings of the 6th IEEE World Forum on Internet of Things (WF-IoT), 2020, IEEE.

  1. [P071] Sustainable Security for Internet of Things

    M. De Donno, K. M. Malarski, X. Fafoutis, N. Dragoni, M. Nordal Petersen, M. Stübert Berger, S. Ruepp

    In  Proceedings of SmartNets 2019: International Conference on Smart Applications, Communications and Networking, 2019, IEEE.

  1. [P070] UniquID: A Quest to Reconcile Identity Access Management and the Internet of Things

    A. Giaretta, S. Pepe, N. Dragoni

    In Proceedings of TOOLS 50+1:Technology of Object-Oriented Languages and Systems, 2019, LNCS.

  1. [P069] AntibIoTic 2.0: A Fog-based Anti-Malware for Internet of Things

    M. De Donno, Juan M. D. Felipe, N. Dragoni

    In Proceedings of the European Workshop on Security and Privacy in Edge Computing (EuroSPEC at EuroS&P), 2019, IEEE.

  1. [P068] Combining AntibIoTic with Fog Computing: AntibIoTic 2.0

    M. De Donno, N. Dragoni

    In Proceedings of the 3rd IEEE International Conference on Fog and Edge Computing (ICFEC 2019), 2019, IEEE.

  1. [P067] Protecting the Internet of Things with Security-by-Contract and Fog Computing

    A. Giaretta, N. Dragoni, F. Massacci

    In Proceedings of the IEEE 5th World Forum on Internet of Things (WF-IoT), 2019, IEEE.

  1. [P066] Towards a Systematic Survey of Industrial IoT Security Requirements: Research Method and Quantitative Analysis

    K. Tange, M. De Donno, X. Fafoutis, N. Dragoni

    In Proceedings of Workshop on Fog Computing and the IoT (Fog-IoT’19), co-located with CPS-IoT Week, 2019, IEEE.

  1. [P065] Vulnerabilities and Security Breaches in Cryptocurrencies

  2. G. Sigurdsson, A. Giaretta, N. Dragoni

  3. In: Ciancarini P., Mazzara M., Messina A., Sillitti A., Succi G. (eds) Proceedings of 6th International Conference in Software Engineering for Defence Applications (SEDA 2018). Advances in Intelligent Systems and Computing, vol 925. Springer.

  4. [P064] Community Targeted Phishing

  5. A. Giaretta, N. Dragoni

  6. In: Ciancarini P., Mazzara M., Messina A., Sillitti A., Succi G. (eds) Proceedings of 6th International Conference in Software Engineering for Defence Applications (SEDA 2018). Advances in Intelligent Systems and Computing, vol 925. Springer.

  7. [P063] When the Price Is Your Privacy: A Security Analysis of Two Cheap IoT Devices

  8. M. Favaretto,T. Tran Anh, J. Kavaja, M. De Donno, N. Dragoni

  9. In: Ciancarini P., Mazzara M., Messina A., Sillitti A., Succi G. (eds) Proceedings of 6th International Conference in Software Engineering for Defence Applications (SEDA 2018), Advances in Intelligent Systems and Computing, vol 925, Springer.

  10. [P062] Adding Salt to Pepper - A Structured Security Assessment over a Humanoid Robot

  11. A. Giaretta, M. De Donno, N. Dragoni

  12. In Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES’18), IoT-SECFOR session, 2018, ACM.

  13. [P061] Joining Jolie to Docker - Orchestration of Microservices on a Containers-as-a-Service Layer

  14. A. Giaretta, N. Dragoni, M. Mazzara

  15. In Proceedings of the 5th International Conference in Software Engineering for Defense Applications (SEDA’16), 2018, LNCS.

  16. [P060] The Internet of Hackable Things

  17. N. Dragoni, A. Giaretta, M. Mazzara

  18. In Proceedings of the 5th International Conference in Software Engineering for Defense Applications (SEDA’16), 2018, LNCS.

  19. [P059] AntibIoTic: Protecting IoT Devices Against DDoS Attacks

  20. M. De Donno, N. Dragoni, A. Giaretta, M. Mazzara

  21. In Proceedings of the 5th International Conference in Software Engineering for Defense Applications (SEDA’16), 2018, LNCS.

  22. [P058] Analysis of DDoS-Capable IoT Malwares

    M. De Donno, N. Dragoni, A. Giaretta, A. Spognardi

    In Proceedings of 1st International Conference on Security, Privacy, and Trust (INSERT), 2017, IEEE.

  1. [P057] Security Flows in OAuth 2.0 Framework - A Case Study

    M. Argyriou, N. Dragoni, A. Spognardi

    In Proceedings of TELERISE: 3rd International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity, 2017, LNCS.

  1. [P056] Microservices: How To Make Your Application Scale

  2. N. Dragoni, I. Lanese, S. Thordal Larsen, M. Mazzara, R. Mustafin, L. Safina

  3. In Proceedings of the 11th A.P. Ershov Informatics Conference, 2017, LNCS.

  4. [P055] A Taxonomy of Distributed Denial of Service Attacks

  5. M. De Donno, N. Dragoni, A. Giaretta, A. Spognardi

  6. In Proceedings of the International Conference on Information Society (i-Society), 2017, IEEE.

  7. [P054] Security and Privacy Issues in Healthcare Monitoring Systems: A Case Study

  8. D. T. Handler, L. Hauge, A. Spognardi, N. Dragoni  

  9. In Proceedings of the 10th International Conference on Health Informatics (HEALTHINF'17), 2017, SCITEPRESS.

  10. [P053] SafeDroid: A Distributed Malware Detection Service for Android

  11. R. Goyal, A. Spognardi, N. Dragoni, M. Argyriou  

  12. In Proceedings of the 9th IEEE International Conference on Service-Oriented Computing and Applications (SOCA), 2016, IEEE.

  13. [P052] Why Hackers Love eHealth Applications

  14. R. Goyal, N. Dragoni  

  15. In Proceedings of the 3rd EAI International Conference on IoT Technologies for HealthCare (HealthyIoT), 2016, LNICST.

  16. [P051] Security and Privacy Issues in Health Monitoring Systems: eCare@Home Case Study

  17. T. Wearing, N. Dragoni  

  18. In Proceedings of the 1st Workshop on Emerging eHealth through Internet of Things, affiliated with HealthyIoT’16, 2016, LNICST.

  19. [P050] Evaluation of Professional Cloud Password Management Tools

  20. D. Schougaard, N. Dragoni, A. Spognardi  

  21. In Proceedings of the 2nd International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity (TELERISE’16), affiliated with ICWE’1616, 2016, LNCS.

  22. [P049] Mind The Tracker You Wear - A Security Analysis of Wearable Health Trackers

  23. R. Goyal, N. Dragoni, A. Spognardi 

  24. In Proceedings of the 31st ACM Symposium on Applied Computing (SAC’16), track on HEALTHCARE: A Growing Scenario for Applied Computing, 2016, ACM.

  25. [P048] Adaptive Multipath Key Reinforcement for Energy Harvesting Wireless Sensor Networks

  26. A. Di Mauro, N. Dragoni

  27. In Proceedings of the 6th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN’15), 2015, Elsevier.

  28. [P047] Fault Detection in WSNs - An Energy Efficiency Perspective Towards Human-Centric WSNs

  29. C. Orfanidis, Y. Zhang, N. Dragoni

  30. In Proceedings of the 9th International KES Conference on Agents and Multi-Agent Systems: Technologies and Applications (KES-AMSTA’15, session on Anthropic-Oriented Computing), 2015, Springer.

  31. [P046] Energy-Efficient Fault-Tolerant Dynamic Event Region Detection in Wireless Sensor Networks

  32. H.-J. Enemark, Y. Zhang, N. Dragoni, C. Orfanidis

  33. In Proceedings of IEEE VTC Workshop on Heterogeneous Networking for the Internet of Things, 2015, IEEE.

  34. [P045] MITHYS: Mind The Hand You Shake - Protecting Mobile Devices from SSL Usage Vulnerabilities

  35. M. Conti, N. Dragoni, S. Gottardo

  36. In Proceedings of the 9th workshop on Security & Trust Management (STM’13), Egham (UK) in conjunction with ESORICS, 2013, LNCS.

  37. [P044] Detecting and Preventing Beacon Replay Attacks in Receiver-Initiated MAC Protocols for Energy Efficient WSNs

  38. A. Di Mauro, X. Fafoutis, S. Mödersheim, N. Dragoni

  39. In Proceedings of the 18th Nordic Conference on Secure IT Systems (NordSec’13), Ilulissat, Greenland, 2013, LNCS.

  40. [P043] Sustainable Performance in Energy Harvesting - Wireless Sensor Networks [Tool Demonstration]

  41. X. Fafoutis, A. Di Mauro, N. Dragoni

  42. In Proceedings of the fourth International Conference on Future Energy Systems (e-Energy), Berkeley, CA, 2013, ACM.

  43. [P042] Sustainable Medium Access Control: Implementation and Evaluation of ODMAC

  44. X. Fafoutis, A. Di Mauro, N. Dragoni

  45. In Proceedings of the IEEE International Conference on Communications (ICC’13) - Workshop on Energy Efficiency in Wireless Networks & Wireless Networks for Energy Efficiency (E2Nets), 2013, IEEE.

  46. [P041] Medium Access Control for Thermal Energy Harvesting in Advanced Metering Infrastructures

  47. M. D. Vithanage, X. Fafoutis, C. B. Andersen, N. Dragoni

  48. In Proceedings of the International Conference on Computer as a Tool (EUROCON’13), Zagreb, Croatia, 2013, IEEE.

  49. [P040] Social Networks and Collective Intelligence - A Return to the Agora (with the Polidoxa Shift) [Position Paper]

  50. L. Biselli, N. Dragoni, E. Goldoni, P.P. Greco, A. Marraffa, M. Mazzara, G. Papageorgiou 

  51. In Proceedings of the 1st International Conference on Agreement Technologies (AT’12), Dubrovnik, Croatia, 2012, CEUR-WS.

  52. [P039] Analytical Comparison of MAC Schemes for Energy Harvesting - Wireless Sensor Networks

  53. X. Fafoutis, N. Dragoni 

  54. In Proceedings of the International Workshop on Algorithms and Concepts for Networked Sensing Systems Powered by Energy Harvesters (EnHaNSS'12), Antwerp, Belgium, 2012, IEEE.

  55. [P038] Adaptive Medium Access Control for Energy Harvesting - Wireless Sensor Networks

  56. X. Fafoutis, N. Dragoni 

  57. In Proceedings of the 9th International Conference on Networked Sensing Systems (INSS’12), Antwerp, Belgium, 2012, IEEE.

  58. [P037] Modelling and Analysis of Dynamic Reconfiguration in BP-Calculus

  59. F. Abouzaid, J. Mullins, M. Mazzara, N. Dragoni 

  60. In Proceedings of the 1st International Workshop on Trustworthy Multi-Agent Systems (TruMAS’12), Invited Session at KES-AMSTA 2012, Dubrovnik, Croatia, LNCS.

  61. [P036] Toward a Threat Model for Energy-Harvesting Wireless Sensor Networks

  62. A. Di Mauro, D. Papini, R. Vigo, N. Dragoni

  63. In Proceedings of the International Workshop on Wireless Sensor Networks and their Applications at NDT’12, Dubai, UAE, 2012, CCIS (LNCS).

  64. [P035] Security Challenges for Energy-Harvesting Wireless Sensor Networks [Poster/Short Paper]

  65. A. Di Mauro, D. Papini, N. Dragoni

  66. In Proceedings of the 2nd International Conference on Pervasive and Embedded Computing and Communication Systems (PECCS 2012), Rome, Italy, 2012.

  67. [P034] Energy-Harvesting Wireless Sensor Networks [Poster/Short Paper]

  68. X. Fafoutis, D. Vuckovic, A. Di Mauro, N. Dragoni, J. Madsen

  69. In (adjunct) Proceedings of the 9th European Conference on Wireless Sensor Networks (EWSN’12), Trento, Italy, 2012.

  70. [P033] Toward a Unified Framework for Web Service Trustworthiness [Reflection Paper]

  71. N. Miotto, N. Dragoni

  72. In Proceedings of IADIS e-Society, Berlin, Germany, 2012.

  73. [P032] Toward Design, Modelling and Analysis of Dynamic Workflow Reconfigurations - A Process Algebra Perspective

  74. M. Mazzara, F. Abouzaid, N. Dragoni, A. Bhattacharyya

  75. In Proceedings of the 8th International Workshop on Web Services and Formal Methods (WS-FM’11), Clermont-Ferrand, France, 2011, LNCS.

  76. [P031] ODMAC: On Demand MAC Protocol for Energy Harvesting Wireless Sensor Networks

  77. X. Fafoutis, N. Dragoni 

  78. In Proceedings of the Eighth ACM International Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks (PE-WASUN’11), Miami Beach, FL, USA, 2011, ACM.

  79. [P030] Dependable Workflow Reconfiguration in WS-BPEL

  80. M. Mazzara, N. Dragoni, M. Zhou

  81. In Proceedings of the 5th Nordic Workshop on Dependability and Security (NODES’11), Copenhagen, Denmark, 2011, DTU Technical Report.

  82. [P029] Analysis of Trust-Based Approaches for Web Service Selection

  83. N. Dragoni, N. Miotto, D. Papini

  84. In Proceedings of the 5th Nordic Workshop on Dependability and Security (NODES’11), Copenhagen, Denmark, 2011, DTU Technical Report.

  85. [P028] Design, Modelling and Analysis of a Workflow Reconfiguration [Best Paper Award]

  86. M. Mazzara, F. Abouzaid, N Dragoni, A. Bhattacharyya

  87. In Proceedings of the International Workshop on Petri Nets and Software Engineering (PNSE’11), Newcastle upon Tyne, UK, 2011, CEUR-WS.

  88. [P027] (SC)2: Secure Communication over Smart Cards - How to Secure Off-Card Matching in Security-by-Contract for Open Multi-Application Smart Cards.

  89. N. Dragoni, E. Lostal, D. Papini, J. Fabra

  90. In Proceedings of the International Workshop on Foundations & Practice of Security (FPS), Paris, France, 2011, LNCS.

  91. [P026] Loading-Time Verification for Open Multi-Application Smart Cards

  92. N. Dragoni, O. Gadyatskaya, F. Massacci, F. Paci, E. Lostal

  93. In Proceedings of the IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY 2011), Pisa, Italy, 2011, IEEE.

  94. [P025] (SC)2: a System to Secure Off-Card Contract-Policy Matching in Security-by-Contract for Open Multi-Application Smart Cards [Tool Demonstration]

  95. N. Dragoni, E. Lostal, D. Papini

  96. In Proceedings of the IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY 2011), Pisa, Italy, 2011, IEEE.

  97. [P024] Extending Security-by-Contract with Quantitative Trust on Mobile Devices

  98. A.Lazouski, F.Martinelli, F.Massacci, G.Costa, N.Dragoni, I.Matteucci

  99. In Proceeding of CISIS 2010, The Fourth International Conference on Complex, Intelligent and Software Intensive Systems, pages 872–877, 2010, IEEE.

  100. [P023] Securing Off-Card Contract-Policy Matching in Security-By-Contract for Multi-Application Smart Cards
    N. Dragoni, E. Lostal, D. Papini, J. Fabra
    In Proceedings of the 4th International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies (UBICOMM 2010), Firenze, Italy, 2010, XPS.

  101. [P022] A Survey on Trust-Based Web Service Provision Approaches [Best Paper Award]
    N. Dragoni
    In Proceedings of the 3th International Conference on Dependability (DEPEND 2010), Venice, Italy, 2010, IEEE CPS.

  102. [P021] Design of QoS-aware Provisioning Systems
    M. Mazzucco, M. Mazzara, N. Dragoni
    In Proceedings of the 4th Nordic Workshop on Dependability and Security (NODES 2010), Copenhagen, Denmark, 2010, DTU Technical Report.

  103. [P020] Security-by-Contract for Applications’ Evolution in Multi-Application Smart Cards
    N. Dragoni, O. Gadyatskaya, F. Massacci
    In Proceedings of the 4th Nordic Workshop on Dependability and Security (NODES 2010), Copenhagen, Denmark, 2010, DTU Technical Report.

  104. [P019] Supporting Applications' Evolution in Multi-Application Smart Cards by Security-by-Contract
    N. Dragoni, O. Gadyatskaya, F. Massacci
    In Proceedings of the 4th Workshop in Information Security Theory and Practices (WISTP 2010), Passau, Germany, 2010, LNCS, Springer.

  105. [P018] Extending Security-by-Contract with Quantitative Trust on Mobile Devices
    G. Costa, N. Dragoni, A. Lazouski, F. Martinelli, F. Massacci, I. Matteucci
    In Proceedings of the 4th International Workshop on Intelligent, Mobile and Internet Services in Ubiquitous Computing (IMIS 2010), Krakow, Poland, 2010, IEEE Computer Society Press.

  106. [P017] Where are All the Agents? On the Gap Between Theory and Practice of Agent-Based Referral Networks - An Inter-Agent Communication Perspective
    N. Dragoni
    In Proceedings of the 12th International Conference on Principles of Practice in Multi-Agent Systems (PRIMA’09), Nagoya, Japan, 2009, LNAI, Springer.

  107. [P016] A Formal Semantics for the WS-BPEL Recovery Framework - The π-Calculus Way
    N. Dragoni, M. Mazzara
    In Proceedings of the 6th International Workshop on Web Services and Formal Methods (WS-FM’09), Bologna, Italy, 2009, LNCS, Springer.

  108. [P015] Toward Trustworthy Web Services - Approaches, Weaknesses and Trust-By-Contract Framework
    N. Dragoni
    In Proceedings of WI/IAT Web Privacy and Trust Workshop (WPT'09), Milano, Italy, 2009, IEEE Computer Society Press.

  109. [P014] Security-by-Contract (SxC) for Mobile Systems [Position Paper]
    N. Dragoni, F. Massacci, K. Naliuka
    W3C Workshop on Security for Access to Device APIs from the Web (http://www.w3.org/2008/security-ws/), 2008.

  110. [P013] Security-by-Contract (SxC) [Poster Paper]
    N. Dragoni, F. Massacci, K. Naliuka
    In Proceedings of ICT-MobileSummit, Stockholm, Sweden, 2008.

  111. [P012] An Inline Monitoring System for .NET Mobile Devices [Tool Demonstration]

  112. N. Dragoni, F. Massacci, K. Naliuka
    In Proceedings of IFIPTM'08, Trondheim, Norway, 2008, IFIP, Springer.

  113. [P011] A Framework for Dependable Trust Negotiation in Open Environment
    N. Dragoni, A. Saidane

  114. In Proceedings of the 5th IEEE Workshop on Engineering of Autonomic and Autonomous Systems (EASE'08), Belfast, Northern Ireland, 2008, IEEE Computer Society Press.

  115. [P010] Matching Policies with Security Claims of Mobile Applications

  116. N. Bielova, M. Dalla Torre, N. Dragoni, I. Siahaan

  117. In Proceedings of the Third International Conference on Availability, Reliability and Security (ARES'08), Barcelona, Spain, 2008, IEEE Computer Society Press.

  118. [P009] Security-by-Contract for Web Services - or How to Trade Credentials for Services

  119. N. Dragoni, F. Massacci
    In Proceedings of the ACM Workshop on Secure Web Services (SWS'07), Alexandria, VA, USA, 2007, ACM.

  120. [P008] Decision Making in Fund Raising Management: a Knowledge Based Approach
    L. Barzanti, N. Dragoni, A. Degli Esposti, M. Gaspari
    In Proceedings of the 27th SGAI International Conference on Artificial Intelligence (AI-2007), Cambridge,  UK, 2007, Springer.

  121. [P007] A Security-by-Contract Architecture for Pervasive Services
    N. Dragoni, F. Massacci, C. Schaefer, T. Walter, E. Vetillard

  122. In Proceedings of the 3rd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU'07), Instanbul, Turkey, 2007, IEEE Computer Society Press.

  123. [P006] Security-by-Contract: Toward a Semantics for Digital Signatures on Mobile Code
    N. Dragoni, F. Massacci, K. Naliuka, I. Siahaan

  124. In Proceedings of the Fourth European PKI Workshop: Theory and Practice (EuroPKI'07), Mallorca, Spain, 2007, LNCS.

  125. [P005] Performative Patterns for Designing Verifiable ACLs
    N. Dragoni, M. Gaspari

  126. In Proceedings of the Tenth International Workshop on Cooperative Information Agents (CIA2006), Edinburgh, UK, 2006, LNAI, Springer.

  127. [P004] NOWHERE - An Open Service Architecture to support Agents and Services within the Semantic Web
    N. Dragoni, M. Gaspari, D. Guidi

  128. In Proceedings of the 2nd Italian Semantic Web Workshop on Semantic Web Applications and Perspectives (SWAP’05), Trento, Italy, 2005, CEUR-WS.

  129. [P003] An ACL for Specifying Fault-Tolerant Protocols
    N. Dragoni, M. Gaspari, D. Guidi

  130. In Proceedings of the 9th AI*IA Conference, Milano, Italy, 2005, LNAI, Springer.

  131. [P002] Integrating Knowledge-Level Agents in the (Semantic) Web: an Agent-based Open Service Architecture
    N. Dragoni, M. Gaspari, D. Guidi
    In Proceedings of the 18th International FLAIRS Conference, Clearwater Beach, Florida (USA), 2005, AAAI Press.

  132. [P001] A Peer-to-Peer Knowledge Level Open Service Architecture
    N. Dragoni, M. Gaspari, D. Guidi

  133. In Proceedings of WM2005 Workshop on “Peer-to-Peer and Agent Infrastructures for Knowledge Management”(PAIKM05), Kaiserslautern, Germany, 2005, DFKI Kaiserslautern.