


default search action
Nicola Dragoni
Person information
- affiliation: Technical University of Denmark, Lyngby
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j51]Alyzia Maria Konsta
, Alberto Lluch-Lafuente
, Beatrice Spiga, Nicola Dragoni
:
Survey: Automatic generation of attack trees and attack graphs. Comput. Secur. 137: 103602 (2024) - [j50]Alyzia Maria Konsta, Alberto Lluch-Lafuente, Beatrice Spiga, Nicola Dragoni:
Corrigendum to "Survey: Automatic generation of attack trees and attack graphs" [Computers & Security Volume 137, February 2024, 103602]. Comput. Secur. 138: 103660 (2024) - [j49]Prabal Verma, Aditya Gupta, Ramraj Dangi, Gaurav Choudhary
, Nicola Dragoni
, Ilsun You:
FC-CACPHS: fog-cloud assisted context-aware framework for cyber-physical healthcare system. Int. J. Ad Hoc Ubiquitous Comput. 45(3): 186-199 (2024) - [j48]Metehan Gelgi
, Yueting Guan, Sanjay Arunachala
, Maddi Samba Siva Rao
, Nicola Dragoni
:
Systematic Literature Review of IoT Botnet DDOS Attacks and Evaluation of Detection Techniques. Sensors 24(11): 3571 (2024) - [c72]Valerio Coletti
, Emil Müller
, Frederik Meyer Lehmann Lundsbjerg, Nicola Dragoni
:
Bruteware: A Novel Family of Cryptoviral Attacks. SEC 2024: 91-104 - 2023
- [j47]Alyzia Maria Konsta
, Alberto Lluch-Lafuente
, Nicola Dragoni
:
A Survey of Trust Management for Internet of Things. IEEE Access 11: 122175-122204 (2023) - [j46]Antonio Bucchiarone
, Claudiu-Bogdan Ciumedean, Kemal Soysal, Nicola Dragoni
, Václav Pech:
MaGiC: a DSL Framework for Implementing Language Agnostic Microservice-based Web Applications. J. Object Technol. 22(1): 1-21 (2023) - [c71]Ziru Li
, Simon Nam Thanh Vu
, Nicola Dragoni
, Kevin Doherty
:
Accomplishing More With Less: The Practice of Cybersecure Health Technology Design Among Danish Startups. CHI Extended Abstracts 2023: 21:1-21:8 - [c70]Danmarl Butad, Steven Matthew Tao, Harlee Tudtud, Alvin Joseph Macapagal, Philip Virgil Astillo, Gaurav Choudhary
, Nicola Dragoni
:
Fake Base Station Detection and Localization in 5G Network: A Proof of Concept. MobiSec 2023: 3-17 - [e2]Joaquín García-Alfaro
, Guillermo Navarro-Arribas
, Nicola Dragoni
:
Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2022 International Workshops, DPM 2022 and CBT 2022, Copenhagen, Denmark, September 26-30, 2022, Revised Selected Papers. Lecture Notes in Computer Science 13619, Springer 2023, ISBN 978-3-031-25733-9 [contents] - [i15]Alyzia Maria Konsta, Beatrice Spiga, Alberto Lluch-Lafuente, Nicola Dragoni:
A Survey of Automatic Generation of Attack Trees and Attack Graphs. CoRR abs/2302.14479 (2023) - 2022
- [j45]Ramraj Dangi
, Akshay Jadhav
, Gaurav Choudhary
, Nicola Dragoni
, Manas Kumar Mishra
, Praveen Lalwani:
ML-Based 5G Network Slicing Security: A Comprehensive Survey. Future Internet 14(4): 116 (2022) - [j44]Michele De Donno, Xenofon Fafoutis
, Nicola Dragoni
:
AntibIoTic: The Fog-enhanced distributed security system to protect the (legacy) Internet of Things. J. Comput. Secur. 30(5): 689-725 (2022) - [j43]Arjun Choudhary, Gaurav Choudhary
, Kapil Pareek, Chetanya Kunndra, Jatin Luthra, Nicola Dragoni
:
Emerging Cyber Security Challenges after COVID Pandemic: A Survey. J. Internet Serv. Inf. Secur. 12(2): 21-50 (2022) - [j42]Ramesh Velumani, Hariharasitaraman Sudalaimuthu, Gaurav Choudhary
, Srinivasan Bama, Maranthiran Victor Jose, Nicola Dragoni
:
Secured Secret Sharing of QR Codes Based on Nonnegative Matrix Factorization and Regularized Super Resolution Convolutional Neural Network. Sensors 22(8): 2959 (2022) - [j41]Edlira Dushku
, Jeppe Hagelskjær Østergaard
, Nicola Dragoni
:
Memory Offloading for Remote Attestation of Multi-Service IoT Devices. Sensors 22(12): 4340 (2022) - [j40]Alberto Giaretta, Nicola Dragoni
, Fabio Massacci:
S×C4IoT: A Security-by-contract Framework for Dynamic Evolving IoT Devices. ACM Trans. Sens. Networks 18(1): 12:1-12:51 (2022) - [c69]Shashank Jaiswal, Vikas Sihag, Gaurav Choudhary
, Nicola Dragoni
:
DyBAnd: Dynamic Behavior Based Android Malware Detection. MobiSec 2022: 209-219 - [c68]Mathew Del Castillo, Harvey Hermosa, Philip Virgil Astillo
, Gaurav Choudhary
, Nicola Dragoni
:
Software-Defined Network Based Secure Internet-Enabled Video Surveillance System. WISA 2022: 89-101 - [i14]Alyzia Maria Konsta, Alberto Lluch-Lafuente, Nicola Dragoni:
Trust Management for Internet of Things: A Systematic Literature Review. CoRR abs/2211.01712 (2022) - 2021
- [j39]Ragnar Mikael Halldórsson, Edlira Dushku
, Nicola Dragoni
:
ARCADIS: Asynchronous Remote Control-Flow Attestation of Distributed IoT Services. IEEE Access 9: 144880-144894 (2021) - [j38]Simon Nam Thanh Vu, Mads Stege
, Peter Issam El-Habr
, Jesper Bang
, Nicola Dragoni
:
A Survey on Botnets: Incentives, Evolution, Detection and Current Trends. Future Internet 13(8): 198 (2021) - [j37]Devender Kumar
, Steven Jeuris
, Jakob E. Bardram
, Nicola Dragoni
:
Mobile and Wearable Sensing Frameworks for mHealth Studies and Applications: A Systematic Review. ACM Trans. Comput. Heal. 2(1): 8:1-8:28 (2021) - [j36]Nicola Dragoni
, Alberto Lluch-Lafuente
, Fabio Massacci
, Anders Schlichtkrull
:
Are We Preparing Students to Build Security In? A Survey of European Cybersecurity in Higher Education Programs [Education]. IEEE Secur. Priv. 19(1): 81-88 (2021) - [j35]Nichlas Bjørndal, Luiz Jonatã Pires de Araújo, Antonio Bucchiarone
, Nicola Dragoni, Manuel Mazzara, Schahram Dustdar
:
Benchmarks and performance metrics for assessing the migration to microservice-based architectures. J. Object Technol. 20(2): 3:1-17 (2021) - [j34]Sigurd Frej Joel Jørgensen Ankergård, Edlira Dushku
, Nicola Dragoni
:
State-of-the-Art Software-Based Remote Attestation: Opportunities and Open Issues for Internet of Things. Sensors 21(5): 1598 (2021) - [j33]Koen Tange
, Sebastian Mödersheim
, Apostolos Lalos, Xenofon Fafoutis
, Nicola Dragoni
:
rTLS: Secure and Efficient TLS Session Resumption for the Internet of Things. Sensors 21(19): 6524 (2021) - [j32]Manuel Mazzara
, Nicola Dragoni
, Antonio Bucchiarone
, Alberto Giaretta
, Stephan Thordal Larsen, Schahram Dustdar
:
Microservices: Migration of a Mission Critical System. IEEE Trans. Serv. Comput. 14(5): 1464-1477 (2021) - [c67]Jeppe Hagelskjær Østergaard, Edlira Dushku
, Nicola Dragoni
:
ERAMO: Effective Remote Attestation through Memory Offloading. CSR 2021: 73-80 - [c66]Sigurd Frej Joel Jørgensen Ankergård, Edlira Dushku
, Nicola Dragoni
:
PERMANENT: Publicly Verifiable Remote Attestation for Internet of Things Through Blockchain. FPS 2021: 218-234 - [c65]Altug Tosun
, Michele De Donno, Nicola Dragoni
, Xenofon Fafoutis
:
RESIP Host Detection: Identification of Malicious Residential IP Proxy Flows. ICCE 2021: 1-6 - [c64]Eleftherios Kyriakakis, Koen Tange, Niklas Reusch, Eder Ollora Zaballa
, Xenofon Fafoutis
, Martin Schoeberl
, Nicola Dragoni
:
Fault-tolerant Clock Synchronization using Precise Time Protocol Multi-Domain Aggregation. ISORC 2021: 114-122 - [c63]Md Masoom Rabbani
, Edlira Dushku
, Jo Vliegen, An Braeken, Nicola Dragoni
, Nele Mentens:
RESERVE: Remote Attestation of Intermittent IoT devices. SenSys 2021: 578-580 - [d1]Nicola Dragoni
, Fabio Massacci
, Alberto Lluch-Lafuente
, Anders Schlichtkrull
:
A Survey of European Cybersecurity in Higher Education Programs. IEEE DataPort, 2021 - 2020
- [j31]Peter Gonczol
, Panagiota Katsikouli
, Lasse Herskind
, Nicola Dragoni
:
Blockchain Implementations and Use Cases for Supply Chains-A Survey. IEEE Access 8: 11856-11871 (2020) - [j30]Lasse Herskind
, Panagiota Katsikouli
, Nicola Dragoni
:
Privacy and Cryptocurrencies - A Systematic Literature Review. IEEE Access 8: 54044-54059 (2020) - [j29]Koen Tange, Michele De Donno
, Xenofon Fafoutis
, Nicola Dragoni
:
A Systematic Survey of Industrial Internet of Things Security: Requirements and Fog Computing Opportunities. IEEE Commun. Surv. Tutorials 22(4): 2489-2520 (2020) - [j28]Lasse Herskind, Alberto Giaretta
, Michele De Donno, Nicola Dragoni
:
BitFlow: Enabling real-time cash-flow evaluations through blockchain. Concurr. Comput. Pract. Exp. 32(12) (2020) - [j27]Lasse Herskind, Panagiota Katsikouli, Nicola Dragoni
:
Oscausi - Practical Private Electronic Cash from Lelantus and MimbleWimble. J. Internet Serv. Inf. Secur. 10(2): 16-34 (2020) - [c62]Koen Tange, David Howard, Travis Shanahan, Stefano Pepe, Xenofon Fafoutis
, Nicola Dragoni
:
rTLS: Lightweight TLS Session Resumption for Constrained IoT Devices. ICICS 2020: 243-258 - [c61]Guðni Matthíasson, Alberto Giaretta, Nicola Dragoni:
IoT Device Profiling: From MUD Files to S×C Contracts. Open Identity Summit 2020: 143-154 - [c60]Emil Bejder, Adam Krog Mathiasen, Michele De Donno, Nicola Dragoni
, Xenofon Fafoutis
:
SHAKE: SHared Acceleration Key Establishment for Resource-Constrained IoT Devices. WF-IoT 2020: 1-6 - [p2]Manuel Mazzara, Antonio Bucchiarone
, Nicola Dragoni
, Victor Rivera:
Size Matters: Microservices Research and Applications. Microservices, Science and Engineering 2020: 29-42 - [e1]Antonio Bucchiarone
, Nicola Dragoni, Schahram Dustdar, Patricia Lago, Manuel Mazzara, Victor Rivera, Andrey Sadovykh
:
Microservices, Science and Engineering. Springer 2020, ISBN 978-3-030-31645-7 [contents]
2010 – 2019
- 2019
- [j26]Michele De Donno
, Koen Tange, Nicola Dragoni
:
Foundations and Evolution of Modern Computing Paradigms: Cloud, IoT, Edge, and Fog. IEEE Access 7: 150936-150948 (2019) - [j25]Michele De Donno
, Alberto Giaretta, Nicola Dragoni
, Antonio Bucchiarone
, Manuel Mazzara
:
Cyber-Storms Come from Clouds: Security of Cloud Computing in the IoT Era. Future Internet 11(6): 127 (2019) - [j24]Alberto Giaretta
, Nicola Dragoni
, Fabio Massacci
:
IoT Security Configurability with Security-by-Contract. Sensors 19(19): 4121 (2019) - [c59]Michele De Donno, Juan Manuel Donaire Felipe, Nicola Dragoni
:
ANTIBIOTIC 2.0: A Fog-based Anti-Malware for Internet of Things. EuroS&P Workshops 2019: 11-20 - [c58]Michele De Donno, Nicola Dragoni
:
Combining AntibIoTic with Fog Computing: AntibIoTic 2.0. ICFEC 2019: 1-6 - [c57]Koen Tange, Michele De Donno, Xenofon Fafoutis
, Nicola Dragoni
:
Towards a systematic survey of industrial IoT security requirements: research method and quantitative analysis. IoT-Fog@IoTDI 2019: 56-63 - [c56]Michele De Donno, Krzysztof Mateusz Malarski, Xenofon Fafoutis
, Nicola Dragoni, Martin Nordal Petersen, Michael Stübert Berger, Sarah Ruepp:
Sustainable Security for Internet of Things. SmartNets 2019: 1-4 - [c55]Alberto Giaretta, Stefano Pepe, Nicola Dragoni
:
UniquID: A Quest to Reconcile Identity Access Management and the IoT. TOOLS 2019: 237-251 - [c54]Alberto Giaretta, Nicola Dragoni
, Fabio Massacci
:
Protecting the Internet of Things with Security-by-Contract and Fog Computing. WF-IoT 2019: 1-6 - [i13]Manuel Mazzara, Antonio Bucchiarone, Nicola Dragoni, Victor Rivera:
Size Matters: Microservices Research and Applications. CoRR abs/1904.03027 (2019) - [i12]Alberto Giaretta, Stefano Pepe, Nicola Dragoni:
UniquID: A Quest to Reconcile Identity Access Management and the Internet of Things. CoRR abs/1905.04021 (2019) - 2018
- [j23]Marios Argyriou
, Nicola Dragoni
, Angelo Spognardi
:
Analysis and Evaluation of SafeDroid v2.0, a Framework for Detecting Malicious Android Applications. Secur. Commun. Networks 2018: 4672072:1-4672072:15 (2018) - [j22]Michele De Donno
, Nicola Dragoni
, Alberto Giaretta
, Angelo Spognardi:
DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation. Secur. Commun. Networks 2018: 7178164:1-7178164:30 (2018) - [j21]Antonio Bucchiarone
, Nicola Dragoni
, Schahram Dustdar
, Stephan Thordal Larsen, Manuel Mazzara
:
From Monolithic to Microservices: An Experience Report from the Banking Domain. IEEE Softw. 35(3): 50-55 (2018) - [c53]Alberto Giaretta, Michele De Donno, Nicola Dragoni
:
Adding Salt to Pepper: A Structured Security Assessment over a Humanoid Robot. ARES 2018: 22:1-22:8 - [c52]Margherita Favaretto, Tu Tran Anh, Juxhino Kavaja, Michele De Donno, Nicola Dragoni
:
When the Price Is Your Privacy: A Security Analysis of Two Cheap IoT Devices. SEDA 2018: 55-75 - [c51]Alberto Giaretta, Nicola Dragoni
:
Community Targeted Phishing - A Middle Ground Between Massive and Spear Phishing Through Natural Language Generation. SEDA 2018: 86-93 - [c50]Gudmundur Sigurdsson, Alberto Giaretta, Nicola Dragoni
:
Vulnerabilities and Security Breaches in Cryptocurrencies. SEDA 2018: 288-299 - [i11]Alberto Giaretta, Michele De Donno, Nicola Dragoni:
Adding Salt to Pepper: A Structured Security Assessment over a Humanoid Robot. CoRR abs/1805.04101 (2018) - 2017
- [c49]Daniel Tolboe Handler, Lotte Hauge, Angelo Spognardi, Nicola Dragoni
:
Security And Privacy Issues in Healthcare Monitoring Systems: A Case Study. HEALTHINF 2017: 383-388 - [c48]Nicola Dragoni
, Ivan Lanese, Stephan Thordal Larsen, Manuel Mazzara
, Ruslan Mustafin, Larisa Safina
:
Microservices: How To Make Your Application Scale. Ershov Informatics Conference 2017: 95-104 - [c47]Angelo Spognardi, Michele De Donno, Nicola Dragoni
, Alberto Giaretta
:
Analysis of DDoS-Capable IoT Malwares. FedCSIS 2017: 807-816 - [c46]Marios Argyriou, Nicola Dragoni
, Angelo Spognardi
:
Security Flows in OAuth 2.0 Framework: A Case Study. SAFECOMP Workshops 2017: 396-406 - [p1]Nicola Dragoni
, Saverio Giallorenzo
, Alberto Lluch-Lafuente
, Manuel Mazzara
, Fabrizio Montesi
, Ruslan Mustafin, Larisa Safina
:
Microservices: Yesterday, Today, and Tomorrow. Present and Ulterior Software Engineering 2017: 195-216 - [i10]Nicola Dragoni, Ivan Lanese, Stephan Thordal Larsen, Manuel Mazzara, Ruslan Mustafin, Larisa Safina:
Microservices: How To Make Your Application Scale. CoRR abs/1702.07149 (2017) - [i9]Nicola Dragoni, Schahram Dustdar, Stephan Thordal Larsen, Manuel Mazzara:
Microservices: Migration of a Mission Critical System. CoRR abs/1704.04173 (2017) - [i8]Nicola Dragoni, Alberto Giaretta, Manuel Mazzara:
The Internet of Hackable Things. CoRR abs/1707.08380 (2017) - [i7]Michele De Donno, Nicola Dragoni, Alberto Giaretta, Manuel Mazzara:
AntibIoTic: Protecting IoT Devices Against DDoS Attacks. CoRR abs/1708.05050 (2017) - [i6]Alberto Giaretta, Nicola Dragoni:
Community Targeted Spam: A Middle Ground Between General Spam and Spear Phishing. CoRR abs/1708.07342 (2017) - [i5]Alberto Giaretta, Nicola Dragoni, Manuel Mazzara:
Joining Jolie to Docker - Orchestration of Microservices on a Containers-as-a-Service Layer. CoRR abs/1709.05635 (2017) - 2016
- [j20]Mauro Conti
, Nicola Dragoni
, Viktor Lesyk:
A Survey of Man In The Middle Attacks. IEEE Commun. Surv. Tutorials 18(3): 2027-2051 (2016) - [c45]Rohit Goyal, Nicola Dragoni
:
Why Hackers Love eHealth Applications. HealthyIoT 2016: 58-63 - [c44]Thomas Wearing, Nicola Dragoni
:
Security and Privacy Issues in Health Monitoring Systems: eCare@Home Case Study. HealthyIoT 2016: 165-170 - [c43]Daniel Schougaard, Nicola Dragoni
, Angelo Spognardi
:
Evaluation of Professional Cloud Password Management Tools. ICWE Workshops 2016: 16-28 - [c42]Rohit Goyal, Nicola Dragoni
, Angelo Spognardi
:
Mind the tracker you wear: a security analysis of wearable health trackers. SAC 2016: 131-136 - [c41]Michele De Donno, Nicola Dragoni
, Alberto Giaretta
, Manuel Mazzara
:
AntibIoTic: Protecting IoT Devices Against DDoS Attacks. SEDA 2016: 59-72 - [c40]Nicola Dragoni
, Alberto Giaretta
, Manuel Mazzara
:
The Internet of Hackable Things. SEDA 2016: 129-140 - [c39]Alberto Giaretta
, Nicola Dragoni
, Manuel Mazzara
:
Joining Jolie to Docker - Orchestration of Microservices on a Containers-as-a-Service Layer. SEDA 2016: 167-175 - [c38]Rohit Goyal, Angelo Spognardi
, Nicola Dragoni
, Marios Argyriou:
SafeDroid: A Distributed Malware Detection Service for Android. SOCA 2016: 59-66 - [i4]Nicola Dragoni, Saverio Giallorenzo, Alberto Lluch-Lafuente, Manuel Mazzara, Fabrizio Montesi, Ruslan Mustafin, Larisa Safina:
Microservices: yesterday, today, and tomorrow. CoRR abs/1606.04036 (2016) - 2015
- [j19]Xenofon Fafoutis
, Alessio Di Mauro, Madava D. Vithanage, Nicola Dragoni
:
Receiver-initiated medium access control protocols for wireless sensor networks. Comput. Networks 76: 55-74 (2015) - [j18]Yue Zhang, Nicola Dragoni
, Jiangtao Wang:
A Framework and Classification for Fault Detection Approaches in Wireless Sensor Networks with an Energy Efficiency Perspective. Int. J. Distributed Sens. Networks 11: 678029:1-678029:11 (2015) - [j17]Alessio Di Mauro, Xenofon Fafoutis
, Nicola Dragoni
:
Adaptive Security in ODMAC for Multihop Energy Harvesting Wireless Sensor Networks. Int. J. Distributed Sens. Networks 11: 760302:1-760302:10 (2015) - [j16]Xenofon Fafoutis
, Alessio Di Mauro, Charalampos Orfanidis, Nicola Dragoni
:
Energy-efficient medium access control for energy harvesting communications. IEEE Trans. Consumer Electron. 61(4): 402-410 (2015) - [c37]Alessio Di Mauro, Nicola Dragoni
:
Adaptive Multipath Key Reinforcement for Energy Harvesting Wireless Sensor Networks. EUSPN/ICTH 2015: 48-55 - [c36]Charalampos Orfanidis, Yue Zhang, Nicola Dragoni
:
Fault Detection in WSNs - An Energy Efficiency Perspective Towards Human-Centric WSNs. KES-AMSTA 2015: 285-300 - [c35]Hans-Jacob Enemark, Yue Zhang, Nicola Dragoni
, Charalampos Orfanidis:
Energy-Efficient Fault-Tolerant Dynamic Event Region Detection in Wireless Sensor Networks. VTC Spring 2015: 1-5 - 2014
- [j15]Xenofon Fafoutis
, Charalampos Orfanidis
, Nicola Dragoni
:
Altruistic Backoff: Collision Avoidance for Receiver-Initiated MAC Protocols for Wireless Sensor Networks. Int. J. Distributed Sens. Networks 10 (2014) - 2013
- [j14]Michele Mazzucco, Manuel Mazzara
, Nicola Dragoni
:
Dynamic allocation and admission policies for QoS-aware provisioning systems. Int. J. Crit. Comput. Based Syst. 4(1): 27-44 (2013) - [c34]Xenofon Fafoutis
, Alessio Di Mauro, Nicola Dragoni
:
Sustainable performance in energy harvesting: wireless sensor networks. e-Energy 2013: 267-268 - [c33]Madava D. Vithanage, Xenofon Fafoutis
, Claus Bo Andersen, Nicola Dragoni
:
Medium access control for thermal energy harvesting in advanced metering infrastructures. EUROCON 2013: 291-299 - [c32]Xenofon Fafoutis
, Alessio Di Mauro, Nicola Dragoni
:
Sustainable medium access control: Implementation and evaluation of ODMAC. ICC Workshops 2013: 407-412 - [c31]Alessio Di Mauro, Xenofon Fafoutis
, Sebastian Mödersheim
, Nicola Dragoni
:
Detecting and Preventing Beacon Replay Attacks in Receiver-Initiated MAC Protocols for Energy Efficient WSNs. NordSec 2013: 1-16 - [c30]Mauro Conti
, Nicola Dragoni
, Sebastiano Gottardo:
MITHYS: Mind The Hand You Shake - Protecting Mobile Devices from SSL Usage Vulnerabilities. STM 2013: 65-81 - [i3]Mauro Conti, Nicola Dragoni, Sebastiano Gottardo:
MITHYS: Mind The Hand You Shake - Protecting mobile devices from SSL usage vulnerabilities. CoRR abs/1306.6729 (2013) - [i2]Manuel Mazzara, Luca Biselli, Pier Paolo Greco, Nicola Dragoni, Antonio Marraffa, Nafees Qamar, Simona de Nicola:
Social Networks and Collective Intelligence: A Return to the Agora. CoRR abs/1311.2551 (2013) - 2012
- [j13]Nicola Dragoni
, Mauro Gaspari
:
Declarative Specification of Fault Tolerant Auction Protocols: the English Auction Case Study. Comput. Intell. 28(4): 617-641 (2012) - [j12]Nicola Dragoni
, Olga Gadyatskaya, Fabio Massacci
, Anton Philippov:
High-level algorithms and data structures requirements for security-by-contract on Java cards. Int. J. Crit. Comput. Based Syst. 3(4): 284-304 (2012) - [j11]Manuel Mazzara, Nicola Dragoni, Mu Zhou:
Implementing Workflow Reconfiguration in WS-BPEL. J. Internet Serv. Inf. Secur. 2(1/2): 73-92 (2012) - [c29]Luca Biselli, Nicola Dragoni, Emanuela Goldoni, Pier Paolo Greco, Antonio Marraffa, Manuel Mazzara, Georgios Papageorgiou:
Social Networks and Collective Intelligence - A Return to the Agora (with the Polidoxa Shift). AT 2012: 347-348 - [c28]Xenofon Fafoutis
, Nicola Dragoni
:
Adaptive media access control for energy harvesting - Wireless sensor networks. INSS 2012: 1-4 - [c27]Xenofon Fafoutis
, Nicola Dragoni
:
Analytical comparison of MAC schemes for Energy Harvesting - Wireless Sensor Networks. INSS 2012: 1-6 - [c26]Faisal Abouzaid, John Mullins, Manuel Mazzara
, Nicola Dragoni
:
Modelling and Analysis of Dynamic Reconfiguration in BP-Calculus. KES-AMSTA 2012: 534-543 - [c25]Alessio Di Mauro, Davide Papini, Roberto Vigo, Nicola Dragoni
:
Toward a Threat Model for Energy-Harvesting Wireless Sensor Networks. NDT (2) 2012: 289-301 - [c24]Alessio Di Mauro, Davide Papini, Nicola Dragoni:
Security Challenges for Energy-harvesting Wireless Sensor Networks. PECCS 2012: 422-425 - 2011
- [j10]Christian Damsgaard Jensen, Nicola Dragoni, Anirban Basu, Clara Mancini:
Frontiers in Trust Management. J. Internet Serv. Inf. Secur. 1(4): 1-4 (2011) - [c23]Manuel Mazzara, Faisal Abouzaid, Nicola Dragoni, Anirban Bhattacharyya:
Design, Modelling and Analysis of a Workflow Reconfiguration. PNSE 2011: 10-24 - [c22]Nicola Dragoni
, Eduardo Lostal, Davide Papini, Javier Fabra:
SC 2: Secure Communication over Smart Cards - How to Secure Off-Card Matching in Security-by-Contract for Open Multi-application Smart Cards. FPS 2011: 32-48 - [c21]Xenofon Fafoutis
, Nicola Dragoni
:
ODMAC: an on-demand MAC protocol for energy harvesting - wireless sensor networks. PE-WASUN 2011: 49-56 - [c20]Nicola Dragoni
, Eduardo Lostal, Olga Gadyatskaya, Fabio Massacci
, Federica Paci
:
A Load Time Policy Checker for Open Multi-application Smart Cards. POLICY 2011: 153-156 - [c19]Nicola Dragoni
, Eduardo Lostal, Davide Papini:
(SC)²: A System to Secure Off-Card Contract-Policy Matching in Security-by-Contract for Open Multi-application Smart Cards. POLICY 2011: 186-187 - [c18]Manuel Mazzara
, Faisal Abouzaid, Nicola Dragoni
, Anirban Bhattacharyya:
Toward Design, Modelling and Analysis of Dynamic Workflow Reconfigurations - A Process Algebra Perspective. WS-FM 2011: 64-78 - 2010
- [j9]