Nicola Dragoni

Affiliations:
  • Technical University of Denmark, Lyngby


According to our database1, Nicola Dragoni authored at least 113 papers between 2005 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Microservices: Migration of a Mission Critical System.
IEEE Trans. Serv. Comput., 2021

rTLS: Secure and Efficient TLS Session Resumption for the Internet of Things.
Sensors, 2021

State-of-the-Art Software-Based Remote Attestation: Opportunities and Open Issues for Internet of Things.
Sensors, 2021

Benchmarks and performance metrics for assessing the migration to microservice-based architectures.
J. Object Technol., 2021

Are We Preparing Students to Build Security In? A Survey of European Cybersecurity in Higher Education Programs [Education].
IEEE Secur. Priv., 2021

Mobile and Wearable Sensing Frameworks for mHealth Studies and Applications: A Systematic Review.
ACM Trans. Comput. Heal., 2021

A Survey on Botnets: Incentives, Evolution, Detection and Current Trends.
Future Internet, 2021

ARCADIS: Asynchronous Remote Control-Flow Attestation of Distributed IoT Services.
IEEE Access, 2021

RESERVE: Remote Attestation of Intermittent IoT devices.
Proceedings of the SenSys '21: The 19th ACM Conference on Embedded Networked Sensor Systems, Coimbra, Portugal, November 15, 2021

Fault-tolerant Clock Synchronization using Precise Time Protocol Multi-Domain Aggregation.
Proceedings of the 24th IEEE International Symposium on Real-Time Distributed Computing, 2021

RESIP Host Detection: Identification of Malicious Residential IP Proxy Flows.
Proceedings of the IEEE International Conference on Consumer Electronics, 2021

ERAMO: Effective Remote Attestation through Memory Offloading.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021

2020
Oscausi - Practical Private Electronic Cash from Lelantus and MimbleWimble.
J. Internet Serv. Inf. Secur., 2020

BitFlow: Enabling real-time cash-flow evaluations through blockchain.
Concurr. Comput. Pract. Exp., 2020

A Systematic Survey of Industrial Internet of Things Security: Requirements and Fog Computing Opportunities.
IEEE Commun. Surv. Tutorials, 2020

Privacy and Cryptocurrencies - A Systematic Literature Review.
IEEE Access, 2020

Blockchain Implementations and Use Cases for Supply Chains-A Survey.
IEEE Access, 2020

SHAKE: SHared Acceleration Key Establishment for Resource-Constrained IoT Devices.
Proceedings of the 6th IEEE World Forum on Internet of Things, 2020

IoT Device Profiling: From MUD Files to S×C Contracts.
Proceedings of the Open Identity Summit 2020, 26. - 27.05.2020, Copenhagen, Denmark., 2020

rTLS: Lightweight TLS Session Resumption for Constrained IoT Devices.
Proceedings of the Information and Communications Security - 22nd International Conference, 2020

Size Matters: Microservices Research and Applications.
Proceedings of the Microservices, Science and Engineering., 2020

2019
IoT Security Configurability with Security-by-Contract.
Sensors, 2019

Cyber-Storms Come from Clouds: Security of Cloud Computing in the IoT Era.
Future Internet, 2019

UniquID: A Quest to Reconcile Identity Access Management and the Internet of Things.
CoRR, 2019

Size Matters: Microservices Research and Applications.
CoRR, 2019

Foundations and Evolution of Modern Computing Paradigms: Cloud, IoT, Edge, and Fog.
IEEE Access, 2019

Protecting the Internet of Things with Security-by-Contract and Fog Computing.
Proceedings of the 5th IEEE World Forum on Internet of Things, 2019

UniquID: A Quest to Reconcile Identity Access Management and the IoT.
Proceedings of the Software Technology: Methods and Tools - 51st International Conference, 2019

Sustainable Security for Internet of Things.
Proceedings of the International Conference on Smart Applications, 2019

Towards a systematic survey of industrial IoT security requirements: research method and quantitative analysis.
Proceedings of the Workshop on Fog Computing and the IoT, 2019

Combining AntibIoTic with Fog Computing: AntibIoTic 2.0.
Proceedings of the 3rd IEEE International Conference on Fog and Edge Computing, 2019

ANTIBIOTIC 2.0: A Fog-based Anti-Malware for Internet of Things.
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019

2018
From Monolithic to Microservices: An Experience Report from the Banking Domain.
IEEE Softw., 2018

DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation.
Secur. Commun. Networks, 2018

Analysis and Evaluation of SafeDroid v2.0, a Framework for Detecting Malicious Android Applications.
Secur. Commun. Networks, 2018

Vulnerabilities and Security Breaches in Cryptocurrencies.
Proceedings of 6th International Conference in Software Engineering for Defence Applications, 2018

Community Targeted Phishing - A Middle Ground Between Massive and Spear Phishing Through Natural Language Generation.
Proceedings of 6th International Conference in Software Engineering for Defence Applications, 2018

When the Price Is Your Privacy: A Security Analysis of Two Cheap IoT Devices.
Proceedings of 6th International Conference in Software Engineering for Defence Applications, 2018

Adding Salt to Pepper: A Structured Security Assessment over a Humanoid Robot.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Community Targeted Spam: A Middle Ground Between General Spam and Spear Phishing.
CoRR, 2017

Microservices: Migration of a Mission Critical System.
CoRR, 2017

Security Flows in OAuth 2.0 Framework: A Case Study.
Proceedings of the Computer Safety, Reliability, and Security, 2017

Analysis of DDoS-Capable IoT Malwares.
Proceedings of the 2017 Federated Conference on Computer Science and Information Systems, 2017

Microservices: How To Make Your Application Scale.
Proceedings of the Perspectives of System Informatics, 2017

Security And Privacy Issues in Healthcare Monitoring Systems: A Case Study.
Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017), 2017

Microservices: Yesterday, Today, and Tomorrow.
Proceedings of the Present and Ulterior Software Engineering., 2017

2016
Microservices: yesterday, today, and tomorrow.
CoRR, 2016

A Survey of Man In The Middle Attacks.
IEEE Commun. Surv. Tutorials, 2016

SafeDroid: A Distributed Malware Detection Service for Android.
Proceedings of the 9th IEEE International Conference on Service-Oriented Computing and Applications, 2016

Joining Jolie to Docker - Orchestration of Microservices on a Containers-as-a-Service Layer.
Proceedings of 5th International Conference in Software Engineering for Defence Applications, 2016

The Internet of Hackable Things.
Proceedings of 5th International Conference in Software Engineering for Defence Applications, 2016

AntibIoTic: Protecting IoT Devices Against DDoS Attacks.
Proceedings of 5th International Conference in Software Engineering for Defence Applications, 2016

Mind the tracker you wear: a security analysis of wearable health trackers.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Evaluation of Professional Cloud Password Management Tools.
Proceedings of the Current Trends in Web Engineering, 2016

Security and Privacy Issues in Health Monitoring Systems: eCare@Home Case Study.
Proceedings of the Internet of Things Technologies for HealthCare, 2016

Why Hackers Love eHealth Applications.
Proceedings of the Internet of Things Technologies for HealthCare, 2016

2015
Energy-efficient medium access control for energy harvesting communications.
IEEE Trans. Consumer Electron., 2015

A Framework and Classification for Fault Detection Approaches in Wireless Sensor Networks with an Energy Efficiency Perspective.
Int. J. Distributed Sens. Networks, 2015

Adaptive Security in ODMAC for Multihop Energy Harvesting Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

Receiver-initiated medium access control protocols for wireless sensor networks.
Comput. Networks, 2015

Energy-Efficient Fault-Tolerant Dynamic Event Region Detection in Wireless Sensor Networks.
Proceedings of the IEEE 81st Vehicular Technology Conference, 2015

Fault Detection in WSNs - An Energy Efficiency Perspective Towards Human-Centric WSNs.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2015

Adaptive Multipath Key Reinforcement for Energy Harvesting Wireless Sensor Networks.
Proceedings of the 6th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2015)/ The 5th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2015)/ Affiliated Workshops, 2015

2014
Altruistic Backoff: Collision Avoidance for Receiver-Initiated MAC Protocols for Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2014

2013
Dynamic allocation and admission policies for QoS-aware provisioning systems.
Int. J. Crit. Comput. Based Syst., 2013

Social Networks and Collective Intelligence: A Return to the Agora.
CoRR, 2013

MITHYS: Mind The Hand You Shake - Protecting Mobile Devices from SSL Usage Vulnerabilities.
Proceedings of the Security and Trust Management - 9th International Workshop, 2013

Detecting and Preventing Beacon Replay Attacks in Receiver-Initiated MAC Protocols for Energy Efficient WSNs.
Proceedings of the Secure IT Systems - 18th Nordic Conference, 2013

Sustainable medium access control: Implementation and evaluation of ODMAC.
Proceedings of the IEEE International Conference on Communications, 2013

Medium access control for thermal energy harvesting in advanced metering infrastructures.
Proceedings of Eurocon 2013, 2013

Sustainable performance in energy harvesting: wireless sensor networks.
Proceedings of the Fourth International Conference on Future Energy Systems, 2013

2012
Implementing Workflow Reconfiguration in WS-BPEL.
J. Internet Serv. Inf. Secur., 2012

High-level algorithms and data structures requirements for security-by-contract on Java cards.
Int. J. Crit. Comput. Based Syst., 2012

Declarative Specification of Fault Tolerant Auction Protocols: the English Auction Case Study.
Comput. Intell., 2012

Security Challenges for Energy-harvesting Wireless Sensor Networks.
Proceedings of the PECCS 2012, 2012

Toward a Threat Model for Energy-Harvesting Wireless Sensor Networks.
Proceedings of the Networked Digital Technologies - 4th International Conference, 2012

Modelling and Analysis of Dynamic Reconfiguration in BP-Calculus.
Proceedings of the Agent and Multi-Agent Systems. Technologies and Applications, 2012

Analytical comparison of MAC schemes for Energy Harvesting - Wireless Sensor Networks.
Proceedings of the Ninth International Conference on Networked Sensing, 2012

Adaptive media access control for energy harvesting - Wireless sensor networks.
Proceedings of the Ninth International Conference on Networked Sensing, 2012

Social Networks and Collective Intelligence - A Return to the Agora (with the Polidoxa Shift).
Proceedings of the First International Conference on Agreement Technologies, 2012

2011
Frontiers in Trust Management.
J. Internet Serv. Inf. Secur., 2011

Toward Design, Modelling and Analysis of Dynamic Workflow Reconfigurations - A Process Algebra Perspective.
Proceedings of the Web Services and Formal Methods - 8th International Workshop, 2011

(SC)²: A System to Secure Off-Card Contract-Policy Matching in Security-by-Contract for Open Multi-application Smart Cards.
Proceedings of the POLICY 2011, 2011

A Load Time Policy Checker for Open Multi-application Smart Cards.
Proceedings of the POLICY 2011, 2011

ODMAC: an on-demand MAC protocol for energy harvesting - wireless sensor networks.
Proceedings of the 8th ACM Symposium on Performance evaluation of wireless ad hoc, 2011

SC 2: Secure Communication over Smart Cards - How to Secure Off-Card Matching in Security-by-Contract for Open Multi-application Smart Cards.
Proceedings of the Foundations and Practice of Security, 2011

Design, Modelling and Analysis of a Workflow Reconfiguration.
Proceedings of the International Workshop on Petri Nets and Software Engineering, 2011

2010
Security-by-Contract-with-Trust for Mobile Devices.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2010

Design of QoS-aware Provisioning Systems
CoRR, 2010

Can We Support Applications' Evolution in Multi-application Smart Cards by Security-by-Contract?
Proceedings of the Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010

Extending Security-by-Contract with Quantitative Trust on Mobile Devices.
Proceedings of the CISIS 2010, 2010

2009
Matching in security-by-contract for mobile code.
J. Log. Algebraic Methods Program., 2009

What the heck is this application doing? - A security-by-contract architecture for pervasive services.
Comput. Secur., 2009

A self-protecting and self-healing framework for negotiating services and trust in autonomic communication systems.
Comput. Networks, 2009

A Formal Semantics for the WS-BPEL Recovery Framework - The <i>pi</i>-Calculus Way.
Proceedings of the Web Services and Formal Methods, 6th International Workshop, 2009

Where Are All the Agents? On the Gap between Theory and Practice of Agent-Based Referral Networks.
Proceedings of the Principles of Practice in Multi-Agent Systems, 2009

Toward Trustworthy Web Services - Approaches, Weaknesses and Trust-By-Contract Framework.
Proceedings of the 2009 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2009

2008
An Inline Monitoring System for .NET Mobile Devices.
Proceedings of the Trust Management II, 2008

Matching Policies with Security Claims of Mobile Applications.
Proceedings of the The Third International Conference on Availability, 2008

2007
An ACL for Specifying Fault-Tolerant Protocols.
Appl. Artif. Intell., 2007

Security-by-contract for web services.
Proceedings of the 4th ACM Workshop On Secure Web Services, 2007

Decision Making in Fund Raising Management: a Knowledge Based Approach.
Proceedings of the Applications and Innovations in Intelligent Systems XV, 2007

A Security-by-Contract Architecture for Pervasive Services.
Proceedings of the Third International Workshop on Security, 2007

Security-by-Contract: Toward a Semantics for Digital Signatures on Mobile Code.
Proceedings of the Public Key Infrastructure, 2007

2006
An infrastructure to support cooperation of knowledge-level agents on the semantic Grid.
Appl. Intell., 2006

Fault tolerant knowledge level inter-agent communication in open Multi-Agent Systems.
AI Commun., 2006

Crash failure detection in asynchronous agent communication languages.
Auton. Agents Multi Agent Syst., 2006

Performative Patterns for Designing Verifiable ACLs.
Proceedings of the Cooperative Information Agents X, 10th International Workshop, 2006

A Fault Tolerant Agent Communication Language for Supporting Web Agent Interaction.
Proceedings of the Agent Communication II, International Workshops on Agent Communication, 2006

2005
An object based algebra for specifying a fault tolerant software architecture.
J. Log. Algebraic Methods Program., 2005

A Peer-to-Peer Knowledge Level Open Service Architecture.
Proceedings of the WM 2005: Professional Knowledge Management - Experiences and Visions, Contributions to the 3rd Conference Professional Knowledge Management, 2005

NOWHERE - An Open Service Architecture to support Agents and Services within the Semantic Web.
Proceedings of the SWAP 2005, 2005

Integrating Knowledge-Level Agents in the (Semantic) Web: An Agent-based Open Service Architecture.
Proceedings of the Eighteenth International Florida Artificial Intelligence Research Society Conference, 2005


  Loading...