default search action
Nicola Dragoni
Person information
- affiliation: Technical University of Denmark, Lyngby
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j51]Alyzia Maria Konsta, Alberto Lluch-Lafuente, Beatrice Spiga, Nicola Dragoni:
Survey: Automatic generation of attack trees and attack graphs. Comput. Secur. 137: 103602 (2024) - [j50]Alyzia Maria Konsta, Alberto Lluch-Lafuente, Beatrice Spiga, Nicola Dragoni:
Corrigendum to "Survey: Automatic generation of attack trees and attack graphs" [Computers & Security Volume 137, February 2024, 103602]. Comput. Secur. 138: 103660 (2024) - [j49]Prabal Verma, Aditya Gupta, Ramraj Dangi, Gaurav Choudhary, Nicola Dragoni, Ilsun You:
FC-CACPHS: fog-cloud assisted context-aware framework for cyber-physical healthcare system. Int. J. Ad Hoc Ubiquitous Comput. 45(3): 186-199 (2024) - [j48]Metehan Gelgi, Yueting Guan, Sanjay Arunachala, Maddi Samba Siva Rao, Nicola Dragoni:
Systematic Literature Review of IoT Botnet DDOS Attacks and Evaluation of Detection Techniques. Sensors 24(11): 3571 (2024) - [c72]Valerio Coletti, Emil Müller, Frederik Meyer Lehmann Lundsbjerg, Nicola Dragoni:
Bruteware: A Novel Family of Cryptoviral Attacks. SEC 2024: 91-104 - 2023
- [j47]Alyzia Maria Konsta, Alberto Lluch-Lafuente, Nicola Dragoni:
A Survey of Trust Management for Internet of Things. IEEE Access 11: 122175-122204 (2023) - [j46]Antonio Bucchiarone, Claudiu-Bogdan Ciumedean, Kemal Soysal, Nicola Dragoni, Václav Pech:
MaGiC: a DSL Framework for Implementing Language Agnostic Microservice-based Web Applications. J. Object Technol. 22(1): 1-21 (2023) - [c71]Ziru Li, Simon Nam Thanh Vu, Nicola Dragoni, Kevin Doherty:
Accomplishing More With Less: The Practice of Cybersecure Health Technology Design Among Danish Startups. CHI Extended Abstracts 2023: 21:1-21:8 - [c70]Danmarl Butad, Steven Matthew Tao, Harlee Tudtud, Alvin Joseph Macapagal, Philip Virgil Astillo, Gaurav Choudhary, Nicola Dragoni:
Fake Base Station Detection and Localization in 5G Network: A Proof of Concept. MobiSec 2023: 3-17 - [e2]Joaquín García-Alfaro, Guillermo Navarro-Arribas, Nicola Dragoni:
Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2022 International Workshops, DPM 2022 and CBT 2022, Copenhagen, Denmark, September 26-30, 2022, Revised Selected Papers. Lecture Notes in Computer Science 13619, Springer 2023, ISBN 978-3-031-25733-9 [contents] - [i15]Alyzia Maria Konsta, Beatrice Spiga, Alberto Lluch-Lafuente, Nicola Dragoni:
A Survey of Automatic Generation of Attack Trees and Attack Graphs. CoRR abs/2302.14479 (2023) - 2022
- [j45]Ramraj Dangi, Akshay Jadhav, Gaurav Choudhary, Nicola Dragoni, Manas Kumar Mishra, Praveen Lalwani:
ML-Based 5G Network Slicing Security: A Comprehensive Survey. Future Internet 14(4): 116 (2022) - [j44]Michele De Donno, Xenofon Fafoutis, Nicola Dragoni:
AntibIoTic: The Fog-enhanced distributed security system to protect the (legacy) Internet of Things. J. Comput. Secur. 30(5): 689-725 (2022) - [j43]Arjun Choudhary, Gaurav Choudhary, Kapil Pareek, Chetanya Kunndra, Jatin Luthra, Nicola Dragoni:
Emerging Cyber Security Challenges after COVID Pandemic: A Survey. J. Internet Serv. Inf. Secur. 12(2): 21-50 (2022) - [j42]Ramesh Velumani, Hariharasitaraman Sudalaimuthu, Gaurav Choudhary, Srinivasan Bama, Maranthiran Victor Jose, Nicola Dragoni:
Secured Secret Sharing of QR Codes Based on Nonnegative Matrix Factorization and Regularized Super Resolution Convolutional Neural Network. Sensors 22(8): 2959 (2022) - [j41]Edlira Dushku, Jeppe Hagelskjær Østergaard, Nicola Dragoni:
Memory Offloading for Remote Attestation of Multi-Service IoT Devices. Sensors 22(12): 4340 (2022) - [j40]Alberto Giaretta, Nicola Dragoni, Fabio Massacci:
S×C4IoT: A Security-by-contract Framework for Dynamic Evolving IoT Devices. ACM Trans. Sens. Networks 18(1): 12:1-12:51 (2022) - [c69]Shashank Jaiswal, Vikas Sihag, Gaurav Choudhary, Nicola Dragoni:
DyBAnd: Dynamic Behavior Based Android Malware Detection. MobiSec 2022: 209-219 - [c68]Mathew Del Castillo, Harvey Hermosa, Philip Virgil Astillo, Gaurav Choudhary, Nicola Dragoni:
Software-Defined Network Based Secure Internet-Enabled Video Surveillance System. WISA 2022: 89-101 - [i14]Alyzia Maria Konsta, Alberto Lluch-Lafuente, Nicola Dragoni:
Trust Management for Internet of Things: A Systematic Literature Review. CoRR abs/2211.01712 (2022) - 2021
- [j39]Ragnar Mikael Halldórsson, Edlira Dushku, Nicola Dragoni:
ARCADIS: Asynchronous Remote Control-Flow Attestation of Distributed IoT Services. IEEE Access 9: 144880-144894 (2021) - [j38]Simon Nam Thanh Vu, Mads Stege, Peter Issam El-Habr, Jesper Bang, Nicola Dragoni:
A Survey on Botnets: Incentives, Evolution, Detection and Current Trends. Future Internet 13(8): 198 (2021) - [j37]Devender Kumar, Steven Jeuris, Jakob E. Bardram, Nicola Dragoni:
Mobile and Wearable Sensing Frameworks for mHealth Studies and Applications: A Systematic Review. ACM Trans. Comput. Heal. 2(1): 8:1-8:28 (2021) - [j36]Nicola Dragoni, Alberto Lluch-Lafuente, Fabio Massacci, Anders Schlichtkrull:
Are We Preparing Students to Build Security In? A Survey of European Cybersecurity in Higher Education Programs [Education]. IEEE Secur. Priv. 19(1): 81-88 (2021) - [j35]Nichlas Bjørndal, Luiz Jonatã Pires de Araújo, Antonio Bucchiarone, Nicola Dragoni, Manuel Mazzara, Schahram Dustdar:
Benchmarks and performance metrics for assessing the migration to microservice-based architectures. J. Object Technol. 20(2): 3:1-17 (2021) - [j34]Sigurd Frej Joel Jørgensen Ankergård, Edlira Dushku, Nicola Dragoni:
State-of-the-Art Software-Based Remote Attestation: Opportunities and Open Issues for Internet of Things. Sensors 21(5): 1598 (2021) - [j33]Koen Tange, Sebastian Mödersheim, Apostolos Lalos, Xenofon Fafoutis, Nicola Dragoni:
rTLS: Secure and Efficient TLS Session Resumption for the Internet of Things. Sensors 21(19): 6524 (2021) - [j32]Manuel Mazzara, Nicola Dragoni, Antonio Bucchiarone, Alberto Giaretta, Stephan Thordal Larsen, Schahram Dustdar:
Microservices: Migration of a Mission Critical System. IEEE Trans. Serv. Comput. 14(5): 1464-1477 (2021) - [c67]Jeppe Hagelskjær Østergaard, Edlira Dushku, Nicola Dragoni:
ERAMO: Effective Remote Attestation through Memory Offloading. CSR 2021: 73-80 - [c66]Sigurd Frej Joel Jørgensen Ankergård, Edlira Dushku, Nicola Dragoni:
PERMANENT: Publicly Verifiable Remote Attestation for Internet of Things Through Blockchain. FPS 2021: 218-234 - [c65]Altug Tosun, Michele De Donno, Nicola Dragoni, Xenofon Fafoutis:
RESIP Host Detection: Identification of Malicious Residential IP Proxy Flows. ICCE 2021: 1-6 - [c64]Eleftherios Kyriakakis, Koen Tange, Niklas Reusch, Eder Ollora Zaballa, Xenofon Fafoutis, Martin Schoeberl, Nicola Dragoni:
Fault-tolerant Clock Synchronization using Precise Time Protocol Multi-Domain Aggregation. ISORC 2021: 114-122 - [c63]Md Masoom Rabbani, Edlira Dushku, Jo Vliegen, An Braeken, Nicola Dragoni, Nele Mentens:
RESERVE: Remote Attestation of Intermittent IoT devices. SenSys 2021: 578-580 - [d1]Nicola Dragoni, Fabio Massacci, Alberto Lluch-Lafuente, Anders Schlichtkrull:
A Survey of European Cybersecurity in Higher Education Programs. IEEE DataPort, 2021 - 2020
- [j31]Peter Gonczol, Panagiota Katsikouli, Lasse Herskind, Nicola Dragoni:
Blockchain Implementations and Use Cases for Supply Chains-A Survey. IEEE Access 8: 11856-11871 (2020) - [j30]Lasse Herskind, Panagiota Katsikouli, Nicola Dragoni:
Privacy and Cryptocurrencies - A Systematic Literature Review. IEEE Access 8: 54044-54059 (2020) - [j29]Koen Tange, Michele De Donno, Xenofon Fafoutis, Nicola Dragoni:
A Systematic Survey of Industrial Internet of Things Security: Requirements and Fog Computing Opportunities. IEEE Commun. Surv. Tutorials 22(4): 2489-2520 (2020) - [j28]Lasse Herskind, Alberto Giaretta, Michele De Donno, Nicola Dragoni:
BitFlow: Enabling real-time cash-flow evaluations through blockchain. Concurr. Comput. Pract. Exp. 32(12) (2020) - [j27]Lasse Herskind, Panagiota Katsikouli, Nicola Dragoni:
Oscausi - Practical Private Electronic Cash from Lelantus and MimbleWimble. J. Internet Serv. Inf. Secur. 10(2): 16-34 (2020) - [c62]Koen Tange, David Howard, Travis Shanahan, Stefano Pepe, Xenofon Fafoutis, Nicola Dragoni:
rTLS: Lightweight TLS Session Resumption for Constrained IoT Devices. ICICS 2020: 243-258 - [c61]Guðni Matthíasson, Alberto Giaretta, Nicola Dragoni:
IoT Device Profiling: From MUD Files to S×C Contracts. Open Identity Summit 2020: 143-154 - [c60]Emil Bejder, Adam Krog Mathiasen, Michele De Donno, Nicola Dragoni, Xenofon Fafoutis:
SHAKE: SHared Acceleration Key Establishment for Resource-Constrained IoT Devices. WF-IoT 2020: 1-6 - [p2]Manuel Mazzara, Antonio Bucchiarone, Nicola Dragoni, Victor Rivera:
Size Matters: Microservices Research and Applications. Microservices, Science and Engineering 2020: 29-42 - [e1]Antonio Bucchiarone, Nicola Dragoni, Schahram Dustdar, Patricia Lago, Manuel Mazzara, Victor Rivera, Andrey Sadovykh:
Microservices, Science and Engineering. Springer 2020, ISBN 978-3-030-31645-7 [contents]
2010 – 2019
- 2019
- [j26]Michele De Donno, Koen Tange, Nicola Dragoni:
Foundations and Evolution of Modern Computing Paradigms: Cloud, IoT, Edge, and Fog. IEEE Access 7: 150936-150948 (2019) - [j25]Michele De Donno, Alberto Giaretta, Nicola Dragoni, Antonio Bucchiarone, Manuel Mazzara:
Cyber-Storms Come from Clouds: Security of Cloud Computing in the IoT Era. Future Internet 11(6): 127 (2019) - [j24]Alberto Giaretta, Nicola Dragoni, Fabio Massacci:
IoT Security Configurability with Security-by-Contract. Sensors 19(19): 4121 (2019) - [c59]Michele De Donno, Juan Manuel Donaire Felipe, Nicola Dragoni:
ANTIBIOTIC 2.0: A Fog-based Anti-Malware for Internet of Things. EuroS&P Workshops 2019: 11-20 - [c58]Michele De Donno, Nicola Dragoni:
Combining AntibIoTic with Fog Computing: AntibIoTic 2.0. ICFEC 2019: 1-6 - [c57]Koen Tange, Michele De Donno, Xenofon Fafoutis, Nicola Dragoni:
Towards a systematic survey of industrial IoT security requirements: research method and quantitative analysis. IoT-Fog@IoTDI 2019: 56-63 - [c56]Michele De Donno, Krzysztof Mateusz Malarski, Xenofon Fafoutis, Nicola Dragoni, Martin Nordal Petersen, Michael Stübert Berger, Sarah Ruepp:
Sustainable Security for Internet of Things. SmartNets 2019: 1-4 - [c55]Alberto Giaretta, Stefano Pepe, Nicola Dragoni:
UniquID: A Quest to Reconcile Identity Access Management and the IoT. TOOLS 2019: 237-251 - [c54]Alberto Giaretta, Nicola Dragoni, Fabio Massacci:
Protecting the Internet of Things with Security-by-Contract and Fog Computing. WF-IoT 2019: 1-6 - [i13]Manuel Mazzara, Antonio Bucchiarone, Nicola Dragoni, Victor Rivera:
Size Matters: Microservices Research and Applications. CoRR abs/1904.03027 (2019) - [i12]Alberto Giaretta, Stefano Pepe, Nicola Dragoni:
UniquID: A Quest to Reconcile Identity Access Management and the Internet of Things. CoRR abs/1905.04021 (2019) - 2018
- [j23]Marios Argyriou, Nicola Dragoni, Angelo Spognardi:
Analysis and Evaluation of SafeDroid v2.0, a Framework for Detecting Malicious Android Applications. Secur. Commun. Networks 2018: 4672072:1-4672072:15 (2018) - [j22]Michele De Donno, Nicola Dragoni, Alberto Giaretta, Angelo Spognardi:
DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation. Secur. Commun. Networks 2018: 7178164:1-7178164:30 (2018) - [j21]Antonio Bucchiarone, Nicola Dragoni, Schahram Dustdar, Stephan Thordal Larsen, Manuel Mazzara:
From Monolithic to Microservices: An Experience Report from the Banking Domain. IEEE Softw. 35(3): 50-55 (2018) - [c53]Alberto Giaretta, Michele De Donno, Nicola Dragoni:
Adding Salt to Pepper: A Structured Security Assessment over a Humanoid Robot. ARES 2018: 22:1-22:8 - [c52]Margherita Favaretto, Tu Tran Anh, Juxhino Kavaja, Michele De Donno, Nicola Dragoni:
When the Price Is Your Privacy: A Security Analysis of Two Cheap IoT Devices. SEDA 2018: 55-75 - [c51]Alberto Giaretta, Nicola Dragoni:
Community Targeted Phishing - A Middle Ground Between Massive and Spear Phishing Through Natural Language Generation. SEDA 2018: 86-93 - [c50]Gudmundur Sigurdsson, Alberto Giaretta, Nicola Dragoni:
Vulnerabilities and Security Breaches in Cryptocurrencies. SEDA 2018: 288-299 - [i11]Alberto Giaretta, Michele De Donno, Nicola Dragoni:
Adding Salt to Pepper: A Structured Security Assessment over a Humanoid Robot. CoRR abs/1805.04101 (2018) - 2017
- [c49]Daniel Tolboe Handler, Lotte Hauge, Angelo Spognardi, Nicola Dragoni:
Security And Privacy Issues in Healthcare Monitoring Systems: A Case Study. HEALTHINF 2017: 383-388 - [c48]Nicola Dragoni, Ivan Lanese, Stephan Thordal Larsen, Manuel Mazzara, Ruslan Mustafin, Larisa Safina:
Microservices: How To Make Your Application Scale. Ershov Informatics Conference 2017: 95-104 - [c47]Angelo Spognardi, Michele De Donno, Nicola Dragoni, Alberto Giaretta:
Analysis of DDoS-Capable IoT Malwares. FedCSIS 2017: 807-816 - [c46]Marios Argyriou, Nicola Dragoni, Angelo Spognardi:
Security Flows in OAuth 2.0 Framework: A Case Study. SAFECOMP Workshops 2017: 396-406 - [p1]Nicola Dragoni, Saverio Giallorenzo, Alberto Lluch-Lafuente, Manuel Mazzara, Fabrizio Montesi, Ruslan Mustafin, Larisa Safina:
Microservices: Yesterday, Today, and Tomorrow. Present and Ulterior Software Engineering 2017: 195-216 - [i10]Nicola Dragoni, Ivan Lanese, Stephan Thordal Larsen, Manuel Mazzara, Ruslan Mustafin, Larisa Safina:
Microservices: How To Make Your Application Scale. CoRR abs/1702.07149 (2017) - [i9]Nicola Dragoni, Schahram Dustdar, Stephan Thordal Larsen, Manuel Mazzara:
Microservices: Migration of a Mission Critical System. CoRR abs/1704.04173 (2017) - [i8]Nicola Dragoni, Alberto Giaretta, Manuel Mazzara:
The Internet of Hackable Things. CoRR abs/1707.08380 (2017) - [i7]Michele De Donno, Nicola Dragoni, Alberto Giaretta, Manuel Mazzara:
AntibIoTic: Protecting IoT Devices Against DDoS Attacks. CoRR abs/1708.05050 (2017) - [i6]Alberto Giaretta, Nicola Dragoni:
Community Targeted Spam: A Middle Ground Between General Spam and Spear Phishing. CoRR abs/1708.07342 (2017) - [i5]Alberto Giaretta, Nicola Dragoni, Manuel Mazzara:
Joining Jolie to Docker - Orchestration of Microservices on a Containers-as-a-Service Layer. CoRR abs/1709.05635 (2017) - 2016
- [j20]Mauro Conti, Nicola Dragoni, Viktor Lesyk:
A Survey of Man In The Middle Attacks. IEEE Commun. Surv. Tutorials 18(3): 2027-2051 (2016) - [c45]Rohit Goyal, Nicola Dragoni:
Why Hackers Love eHealth Applications. HealthyIoT 2016: 58-63 - [c44]Thomas Wearing, Nicola Dragoni:
Security and Privacy Issues in Health Monitoring Systems: eCare@Home Case Study. HealthyIoT 2016: 165-170 - [c43]Daniel Schougaard, Nicola Dragoni, Angelo Spognardi:
Evaluation of Professional Cloud Password Management Tools. ICWE Workshops 2016: 16-28 - [c42]Rohit Goyal, Nicola Dragoni, Angelo Spognardi:
Mind the tracker you wear: a security analysis of wearable health trackers. SAC 2016: 131-136 - [c41]Michele De Donno, Nicola Dragoni, Alberto Giaretta, Manuel Mazzara:
AntibIoTic: Protecting IoT Devices Against DDoS Attacks. SEDA 2016: 59-72 - [c40]Nicola Dragoni, Alberto Giaretta, Manuel Mazzara:
The Internet of Hackable Things. SEDA 2016: 129-140 - [c39]Alberto Giaretta, Nicola Dragoni, Manuel Mazzara:
Joining Jolie to Docker - Orchestration of Microservices on a Containers-as-a-Service Layer. SEDA 2016: 167-175 - [c38]Rohit Goyal, Angelo Spognardi, Nicola Dragoni, Marios Argyriou:
SafeDroid: A Distributed Malware Detection Service for Android. SOCA 2016: 59-66 - [i4]Nicola Dragoni, Saverio Giallorenzo, Alberto Lluch-Lafuente, Manuel Mazzara, Fabrizio Montesi, Ruslan Mustafin, Larisa Safina:
Microservices: yesterday, today, and tomorrow. CoRR abs/1606.04036 (2016) - 2015
- [j19]Xenofon Fafoutis, Alessio Di Mauro, Madava D. Vithanage, Nicola Dragoni:
Receiver-initiated medium access control protocols for wireless sensor networks. Comput. Networks 76: 55-74 (2015) - [j18]Yue Zhang, Nicola Dragoni, Jiangtao Wang:
A Framework and Classification for Fault Detection Approaches in Wireless Sensor Networks with an Energy Efficiency Perspective. Int. J. Distributed Sens. Networks 11: 678029:1-678029:11 (2015) - [j17]Alessio Di Mauro, Xenofon Fafoutis, Nicola Dragoni:
Adaptive Security in ODMAC for Multihop Energy Harvesting Wireless Sensor Networks. Int. J. Distributed Sens. Networks 11: 760302:1-760302:10 (2015) - [j16]Xenofon Fafoutis, Alessio Di Mauro, Charalampos Orfanidis, Nicola Dragoni:
Energy-efficient medium access control for energy harvesting communications. IEEE Trans. Consumer Electron. 61(4): 402-410 (2015) - [c37]Alessio Di Mauro, Nicola Dragoni:
Adaptive Multipath Key Reinforcement for Energy Harvesting Wireless Sensor Networks. EUSPN/ICTH 2015: 48-55 - [c36]Charalampos Orfanidis, Yue Zhang, Nicola Dragoni:
Fault Detection in WSNs - An Energy Efficiency Perspective Towards Human-Centric WSNs. KES-AMSTA 2015: 285-300 - [c35]Hans-Jacob Enemark, Yue Zhang, Nicola Dragoni, Charalampos Orfanidis:
Energy-Efficient Fault-Tolerant Dynamic Event Region Detection in Wireless Sensor Networks. VTC Spring 2015: 1-5 - 2014
- [j15]Xenofon Fafoutis, Charalampos Orfanidis, Nicola Dragoni:
Altruistic Backoff: Collision Avoidance for Receiver-Initiated MAC Protocols for Wireless Sensor Networks. Int. J. Distributed Sens. Networks 10 (2014) - 2013
- [j14]Michele Mazzucco, Manuel Mazzara, Nicola Dragoni:
Dynamic allocation and admission policies for QoS-aware provisioning systems. Int. J. Crit. Comput. Based Syst. 4(1): 27-44 (2013) - [c34]Xenofon Fafoutis, Alessio Di Mauro, Nicola Dragoni:
Sustainable performance in energy harvesting: wireless sensor networks. e-Energy 2013: 267-268 - [c33]Madava D. Vithanage, Xenofon Fafoutis, Claus Bo Andersen, Nicola Dragoni:
Medium access control for thermal energy harvesting in advanced metering infrastructures. EUROCON 2013: 291-299 - [c32]Xenofon Fafoutis, Alessio Di Mauro, Nicola Dragoni:
Sustainable medium access control: Implementation and evaluation of ODMAC. ICC Workshops 2013: 407-412 - [c31]Alessio Di Mauro, Xenofon Fafoutis, Sebastian Mödersheim, Nicola Dragoni:
Detecting and Preventing Beacon Replay Attacks in Receiver-Initiated MAC Protocols for Energy Efficient WSNs. NordSec 2013: 1-16 - [c30]Mauro Conti, Nicola Dragoni, Sebastiano Gottardo:
MITHYS: Mind The Hand You Shake - Protecting Mobile Devices from SSL Usage Vulnerabilities. STM 2013: 65-81 - [i3]Mauro Conti, Nicola Dragoni, Sebastiano Gottardo:
MITHYS: Mind The Hand You Shake - Protecting mobile devices from SSL usage vulnerabilities. CoRR abs/1306.6729 (2013) - [i2]Manuel Mazzara, Luca Biselli, Pier Paolo Greco, Nicola Dragoni, Antonio Marraffa, Nafees Qamar, Simona de Nicola:
Social Networks and Collective Intelligence: A Return to the Agora. CoRR abs/1311.2551 (2013) - 2012
- [j13]Nicola Dragoni, Mauro Gaspari:
Declarative Specification of Fault Tolerant Auction Protocols: the English Auction Case Study. Comput. Intell. 28(4): 617-641 (2012) - [j12]Nicola Dragoni, Olga Gadyatskaya, Fabio Massacci, Anton Philippov:
High-level algorithms and data structures requirements for security-by-contract on Java cards. Int. J. Crit. Comput. Based Syst. 3(4): 284-304 (2012) - [j11]Manuel Mazzara, Nicola Dragoni, Mu Zhou:
Implementing Workflow Reconfiguration in WS-BPEL. J. Internet Serv. Inf. Secur. 2(1/2): 73-92 (2012) - [c29]Luca Biselli, Nicola Dragoni, Emanuela Goldoni, Pier Paolo Greco, Antonio Marraffa, Manuel Mazzara, Georgios Papageorgiou:
Social Networks and Collective Intelligence - A Return to the Agora (with the Polidoxa Shift). AT 2012: 347-348 - [c28]Xenofon Fafoutis, Nicola Dragoni:
Adaptive media access control for energy harvesting - Wireless sensor networks. INSS 2012: 1-4 - [c27]Xenofon Fafoutis, Nicola Dragoni:
Analytical comparison of MAC schemes for Energy Harvesting - Wireless Sensor Networks. INSS 2012: 1-6 - [c26]Faisal Abouzaid, John Mullins, Manuel Mazzara, Nicola Dragoni:
Modelling and Analysis of Dynamic Reconfiguration in BP-Calculus. KES-AMSTA 2012: 534-543 - [c25]Alessio Di Mauro, Davide Papini, Roberto Vigo, Nicola Dragoni:
Toward a Threat Model for Energy-Harvesting Wireless Sensor Networks. NDT (2) 2012: 289-301 - [c24]Alessio Di Mauro, Davide Papini, Nicola Dragoni:
Security Challenges for Energy-harvesting Wireless Sensor Networks. PECCS 2012: 422-425 - 2011
- [j10]Christian Damsgaard Jensen, Nicola Dragoni, Anirban Basu, Clara Mancini:
Frontiers in Trust Management. J. Internet Serv. Inf. Secur. 1(4): 1-4 (2011) - [c23]Manuel Mazzara, Faisal Abouzaid, Nicola Dragoni, Anirban Bhattacharyya:
Design, Modelling and Analysis of a Workflow Reconfiguration. PNSE 2011: 10-24 - [c22]Nicola Dragoni, Eduardo Lostal, Davide Papini, Javier Fabra:
SC 2: Secure Communication over Smart Cards - How to Secure Off-Card Matching in Security-by-Contract for Open Multi-application Smart Cards. FPS 2011: 32-48 - [c21]Xenofon Fafoutis, Nicola Dragoni:
ODMAC: an on-demand MAC protocol for energy harvesting - wireless sensor networks. PE-WASUN 2011: 49-56 - [c20]Nicola Dragoni, Eduardo Lostal, Olga Gadyatskaya, Fabio Massacci, Federica Paci:
A Load Time Policy Checker for Open Multi-application Smart Cards. POLICY 2011: 153-156 - [c19]Nicola Dragoni, Eduardo Lostal, Davide Papini:
(SC)²: A System to Secure Off-Card Contract-Policy Matching in Security-by-Contract for Open Multi-application Smart Cards. POLICY 2011: 186-187 - [c18]Manuel Mazzara, Faisal Abouzaid, Nicola Dragoni, Anirban Bhattacharyya:
Toward Design, Modelling and Analysis of Dynamic Workflow Reconfigurations - A Process Algebra Perspective. WS-FM 2011: 64-78 - 2010
- [j9]Gabriele Costa, Aliaksandr Lazouski, Fabio Martinelli, Ilaria Matteucci, Valérie Issarny, Rachid Saadi, Nicola Dragoni, Fabio Massacci:
Security-by-Contract-with-Trust for Mobile Devices. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 1(4): 75-91 (2010) - [c17]Gabriele Costa, Nicola Dragoni, Aliaksandr Lazouski, Fabio Martinelli, Fabio Massacci, Ilaria Matteucci:
Extending Security-by-Contract with Quantitative Trust on Mobile Devices. CISIS 2010: 872-877 - [c16]Nicola Dragoni, Olga Gadyatskaya, Fabio Massacci:
Can We Support Applications' Evolution in Multi-application Smart Cards by Security-by-Contract? WISTP 2010: 221-228 - [i1]Michele Mazzucco, Manuel Mazzara, Nicola Dragoni:
Design of QoS-aware Provisioning Systems. CoRR abs/1012.0522 (2010)
2000 – 2009
- 2009
- [j8]Nicola Dragoni, Fabio Massacci, Ayda Saïdane:
A self-protecting and self-healing framework for negotiating services and trust in autonomic communication systems. Comput. Networks 53(10): 1628-1648 (2009) - [j7]Nicola Dragoni, Fabio Massacci, Thomas Walter, Christian Schaefer:
What the heck is this application doing? - A security-by-contract architecture for pervasive services. Comput. Secur. 28(7): 566-577 (2009) - [j6]Nataliia Bielova, Nicola Dragoni, Fabio Massacci, Katsiaryna Naliuka, Ida Sri Rejeki Siahaan:
Matching in security-by-contract for mobile code. J. Log. Algebraic Methods Program. 78(5): 340-358 (2009) - [c15]Nicola Dragoni:
Toward Trustworthy Web Services - Approaches, Weaknesses and Trust-By-Contract Framework. Web Intelligence/IAT Workshops 2009: 599-606 - [c14]Nicola Dragoni:
Where Are All the Agents? On the Gap between Theory and Practice of Agent-Based Referral Networks. PRIMA 2009: 508-515 - [c13]Nicola Dragoni, Manuel Mazzara:
A Formal Semantics for the WS-BPEL Recovery Framework - The pi-Calculus Way. WS-FM 2009: 92-109 - 2008
- [c12]Nataliia Bielova, Marco Dalla Torre, Nicola Dragoni, Ida Sri Rejeki Siahaan:
Matching Policies with Security Claims of Mobile Applications. ARES 2008: 128-135 - [c11]Nicola Dragoni, Fabio Massacci, Katsiaryna Naliuka:
An Inline Monitoring System for .NET Mobile Devices. IFIPTM 2008: 363-366 - 2007
- [j5]Nicola Dragoni, Mauro Gaspari, Davide Guidi:
An ACL for Specifying Fault-Tolerant Protocols. Appl. Artif. Intell. 21(4&5): 361-381 (2007) - [c10]Nicola Dragoni, Fabio Massacci, Katsiaryna Naliuka, Ida Sri Rejeki Siahaan:
Security-by-Contract: Toward a Semantics for Digital Signatures on Mobile Code. EuroPKI 2007: 297-312 - [c9]Nicola Dragoni, Fabio Massacci, Christian Schaefer, Thomas Walter, Eric Vétillard:
A Security-by-Contract Architecture for Pervasive Services. SECPerU 2007: 49-54 - [c8]Luca Barzanti, Nicola Dragoni, Andrea Degli Esposti, Mauro Gaspari:
Decision Making in Fund Raising Management: a Knowledge Based Approach. SGAI Conf. (Applications) 2007: 189-201 - [c7]Nicola Dragoni, Fabio Massacci:
Security-by-contract for web services. SWS 2007: 90-98 - 2006
- [b1]Nicola Dragoni:
Fault tolerant knowledge level inter-agent communication in open multi-agent systems. University of Bologna, Italy, 2006 - [j4]Nicola Dragoni, Mauro Gaspari:
Crash failure detection in asynchronous agent communication languages. Auton. Agents Multi Agent Syst. 13(3): 355-390 (2006) - [j3]Nicola Dragoni:
Fault tolerant knowledge level inter-agent communication in open Multi-Agent Systems. AI Commun. 19(4): 385-387 (2006) - [j2]Nicola Dragoni, Mauro Gaspari, Davide Guidi:
An infrastructure to support cooperation of knowledge-level agents on the semantic Grid. Appl. Intell. 25(2): 159-180 (2006) - [c6]Nicola Dragoni, Mauro Gaspari, Davide Guidi:
A Fault Tolerant Agent Communication Language for Supporting Web Agent Interaction. AC 2006: 273-288 - [c5]Nicola Dragoni, Mauro Gaspari:
Performative Patterns for Designing Verifiable ACLs. CIA 2006: 375-387 - 2005
- [j1]Nicola Dragoni, Mauro Gaspari:
An object based algebra for specifying a fault tolerant software architecture. J. Log. Algebraic Methods Program. 63(2): 271-297 (2005) - [c4]Nicola Dragoni, Mauro Gaspari, Davide Guidi:
An ACL for Specifying Fault-Tolerant Protocols. AI*IA 2005: 237-248 - [c3]Nicola Dragoni, Mauro Gaspari, Davide Guidi:
Integrating Knowledge-Level Agents in the (Semantic) Web: An Agent-based Open Service Architecture. FLAIRS 2005: 320-325 - [c2]Nicola Dragoni, Mauro Gaspari, Davide Guidi:
NOWHERE - An Open Service Architecture to support Agents and Services within the Semantic Web. SWAP 2005 - [c1]Nicola Dragoni, Mauro Gaspari, Davide Guidi:
A Peer-to-Peer Knowledge Level Open Service Architecture. Wissensmanagement 2005: 195-201
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 21:27 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint