Nicola Dragoni
Orcid: 0000-0001-9575-2990Affiliations:
- Technical University of Denmark, Lyngby
According to our database1,
Nicola Dragoni
authored at least 134 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
Systematic Literature Review of IoT Botnet DDOS Attacks and Evaluation of Detection Techniques.
Sensors, June, 2024
Corrigendum to "Survey: Automatic generation of attack trees and attack graphs" [Computers & Security Volume 137, February 2024, 103602].
Comput. Secur., March, 2024
Comput. Secur., February, 2024
FC-CACPHS: fog-cloud assisted context-aware framework for cyber-physical healthcare system.
Int. J. Ad Hoc Ubiquitous Comput., 2024
Proceedings of the ICT Systems Security and Privacy Protection, 2024
2023
MaGiC: a DSL Framework for Implementing Language Agnostic Microservice-based Web Applications.
J. Object Technol., 2023
Proceedings of the Mobile Internet Security - 7th International Conference, 2023
Accomplishing More With Less: The Practice of Cybersecure Health Technology Design Among Danish Startups.
Proceedings of the Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems, 2023
2022
ACM Trans. Sens. Networks, 2022
Secured Secret Sharing of QR Codes Based on Nonnegative Matrix Factorization and Regularized Super Resolution Convolutional Neural Network.
Sensors, 2022
J. Internet Serv. Inf. Secur., 2022
AntibIoTic: The Fog-enhanced distributed security system to protect the (legacy) Internet of Things.
J. Comput. Secur., 2022
Proceedings of the Information Security Applications - 23rd International Conference, 2022
Proceedings of the Mobile Internet Security - 6th International Symposium, 2022
2021
IEEE Trans. Serv. Comput., 2021
Sensors, 2021
State-of-the-Art Software-Based Remote Attestation: Opportunities and Open Issues for Internet of Things.
Sensors, 2021
Benchmarks and performance metrics for assessing the migration to microservice-based architectures.
J. Object Technol., 2021
Are We Preparing Students to Build Security In? A Survey of European Cybersecurity in Higher Education Programs [Education].
IEEE Secur. Priv., 2021
Mobile and Wearable Sensing Frameworks for mHealth Studies and Applications: A Systematic Review.
ACM Trans. Comput. Heal., 2021
Future Internet, 2021
IEEE Access, 2021
Proceedings of the SenSys '21: The 19th ACM Conference on Embedded Networked Sensor Systems, Coimbra, Portugal, November 15, 2021
Fault-tolerant Clock Synchronization using Precise Time Protocol Multi-Domain Aggregation.
Proceedings of the 24th IEEE International Symposium on Real-Time Distributed Computing, 2021
Proceedings of the IEEE International Conference on Consumer Electronics, 2021
PERMANENT: Publicly Verifiable Remote Attestation for Internet of Things Through Blockchain.
Proceedings of the Foundations and Practice of Security - 14th International Symposium, 2021
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021
2020
J. Internet Serv. Inf. Secur., 2020
Concurr. Comput. Pract. Exp., 2020
A Systematic Survey of Industrial Internet of Things Security: Requirements and Fog Computing Opportunities.
IEEE Commun. Surv. Tutorials, 2020
IEEE Access, 2020
Proceedings of the 6th IEEE World Forum on Internet of Things, 2020
Proceedings of the Open Identity Summit 2020, 26-27 May, 2020, Copenhagen, Denmark., 2020
Proceedings of the Information and Communications Security - 22nd International Conference, 2020
Proceedings of the Microservices, Science and Engineering., 2020
2019
Future Internet, 2019
CoRR, 2019
IEEE Access, 2019
Proceedings of the 5th IEEE World Forum on Internet of Things, 2019
Proceedings of the Software Technology: Methods and Tools - 51st International Conference, 2019
Proceedings of the International Conference on Smart Applications, 2019
Towards a systematic survey of industrial IoT security requirements: research method and quantitative analysis.
Proceedings of the Workshop on Fog Computing and the IoT, 2019
Proceedings of the 3rd IEEE International Conference on Fog and Edge Computing, 2019
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019
2018
IEEE Softw., 2018
Secur. Commun. Networks, 2018
Analysis and Evaluation of SafeDroid v2.0, a Framework for Detecting Malicious Android Applications.
Secur. Commun. Networks, 2018
Proceedings of 6th International Conference in Software Engineering for Defence Applications, 2018
Community Targeted Phishing - A Middle Ground Between Massive and Spear Phishing Through Natural Language Generation.
Proceedings of 6th International Conference in Software Engineering for Defence Applications, 2018
Proceedings of 6th International Conference in Software Engineering for Defence Applications, 2018
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
2017
CoRR, 2017
Proceedings of the Computer Safety, Reliability, and Security, 2017
Proceedings of the 2017 Federated Conference on Computer Science and Information Systems, 2017
Proceedings of the Perspectives of System Informatics, 2017
Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017), 2017
Proceedings of the Present and Ulterior Software Engineering., 2017
2016
Proceedings of the 9th IEEE International Conference on Service-Oriented Computing and Applications, 2016
Joining Jolie to Docker - Orchestration of Microservices on a Containers-as-a-Service Layer.
Proceedings of 5th International Conference in Software Engineering for Defence Applications, 2016
Proceedings of 5th International Conference in Software Engineering for Defence Applications, 2016
Proceedings of 5th International Conference in Software Engineering for Defence Applications, 2016
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016
Proceedings of the Current Trends in Web Engineering, 2016
Proceedings of the Internet of Things Technologies for HealthCare, 2016
Proceedings of the Internet of Things Technologies for HealthCare, 2016
2015
IEEE Trans. Consumer Electron., 2015
A Framework and Classification for Fault Detection Approaches in Wireless Sensor Networks with an Energy Efficiency Perspective.
Int. J. Distributed Sens. Networks, 2015
Int. J. Distributed Sens. Networks, 2015
Comput. Networks, 2015
Energy-Efficient Fault-Tolerant Dynamic Event Region Detection in Wireless Sensor Networks.
Proceedings of the IEEE 81st Vehicular Technology Conference, 2015
Fault Detection in WSNs - An Energy Efficiency Perspective Towards Human-Centric WSNs.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2015
Proceedings of the 6th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2015)/ The 5th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2015)/ Affiliated Workshops, 2015
2014
Altruistic Backoff: Collision Avoidance for Receiver-Initiated MAC Protocols for Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2014
2013
Int. J. Crit. Comput. Based Syst., 2013
MITHYS: Mind The Hand You Shake - Protecting Mobile Devices from SSL Usage Vulnerabilities.
Proceedings of the Security and Trust Management - 9th International Workshop, 2013
Detecting and Preventing Beacon Replay Attacks in Receiver-Initiated MAC Protocols for Energy Efficient WSNs.
Proceedings of the Secure IT Systems - 18th Nordic Conference, 2013
Proceedings of the IEEE International Conference on Communications, 2013
Medium access control for thermal energy harvesting in advanced metering infrastructures.
Proceedings of Eurocon 2013, 2013
Proceedings of the Fourth International Conference on Future Energy Systems, 2013
2012
J. Internet Serv. Inf. Secur., 2012
High-level algorithms and data structures requirements for security-by-contract on Java cards.
Int. J. Crit. Comput. Based Syst., 2012
Declarative Specification of Fault Tolerant Auction Protocols: the English Auction Case Study.
Comput. Intell., 2012
Security Challenges for Energy-harvesting Wireless Sensor Networks.
Proceedings of the PECCS 2012, 2012
Proceedings of the Networked Digital Technologies - 4th International Conference, 2012
Proceedings of the Agent and Multi-Agent Systems. Technologies and Applications, 2012
Analytical comparison of MAC schemes for Energy Harvesting - Wireless Sensor Networks.
Proceedings of the Ninth International Conference on Networked Sensing, 2012
Proceedings of the Ninth International Conference on Networked Sensing, 2012
Social Networks and Collective Intelligence - A Return to the Agora (with the Polidoxa Shift).
Proceedings of the First International Conference on Agreement Technologies, 2012
2011
Toward Design, Modelling and Analysis of Dynamic Workflow Reconfigurations - A Process Algebra Perspective.
Proceedings of the Web Services and Formal Methods - 8th International Workshop, 2011
(SC)²: A System to Secure Off-Card Contract-Policy Matching in Security-by-Contract for Open Multi-application Smart Cards.
Proceedings of the POLICY 2011, 2011
Proceedings of the POLICY 2011, 2011
Proceedings of the 8th ACM Symposium on Performance evaluation of wireless ad hoc, 2011
SC 2: Secure Communication over Smart Cards - How to Secure Off-Card Matching in Security-by-Contract for Open Multi-application Smart Cards.
Proceedings of the Foundations and Practice of Security, 2011
Proceedings of the International Workshop on Petri Nets and Software Engineering, 2011
2010
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2010
Can We Support Applications' Evolution in Multi-application Smart Cards by Security-by-Contract?
Proceedings of the Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010
Proceedings of the CISIS 2010, 2010
2009
J. Log. Algebraic Methods Program., 2009
What the heck is this application doing? - A security-by-contract architecture for pervasive services.
Comput. Secur., 2009
A self-protecting and self-healing framework for negotiating services and trust in autonomic communication systems.
Comput. Networks, 2009
Proceedings of the Web Services and Formal Methods, 6th International Workshop, 2009
Where Are All the Agents? On the Gap between Theory and Practice of Agent-Based Referral Networks.
Proceedings of the Principles of Practice in Multi-Agent Systems, 2009
Toward Trustworthy Web Services - Approaches, Weaknesses and Trust-By-Contract Framework.
Proceedings of the 2009 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2009
2008
Proceedings of the Trust Management II, 2008
Proceedings of the The Third International Conference on Availability, 2008
2007
Proceedings of the 4th ACM Workshop On Secure Web Services, 2007
Proceedings of the Applications and Innovations in Intelligent Systems XV, 2007
Proceedings of the Third International Workshop on Security, 2007
Proceedings of the Public Key Infrastructure, 2007
2006
Fault tolerant knowledge level inter-agent communication in open multi-agent systems.
PhD thesis, 2006
An infrastructure to support cooperation of knowledge-level agents on the semantic Grid.
Appl. Intell., 2006
Fault tolerant knowledge level inter-agent communication in open Multi-Agent Systems.
AI Commun., 2006
Auton. Agents Multi Agent Syst., 2006
Proceedings of the Cooperative Information Agents X, 10th International Workshop, 2006
Proceedings of the Agent Communication II, International Workshops on Agent Communication, 2006
2005
J. Log. Algebraic Methods Program., 2005
A Peer-to-Peer Knowledge Level Open Service Architecture.
Proceedings of the WM 2005: Professional Knowledge Management - Experiences and Visions, Contributions to the 3rd Conference Professional Knowledge Management, 2005
NOWHERE - An Open Service Architecture to support Agents and Services within the Semantic Web.
Proceedings of the SWAP 2005, 2005
Integrating Knowledge-Level Agents in the (Semantic) Web: An Agent-based Open Service Architecture.
Proceedings of the Eighteenth International Florida Artificial Intelligence Research Society Conference, 2005