BibTeX records: Nicola Dragoni

download as .bib file

@article{DBLP:journals/compsec/KonstaLSD24a,
  author       = {Alyzia Maria Konsta and
                  Alberto Lluch{-}Lafuente and
                  Beatrice Spiga and
                  Nicola Dragoni},
  title        = {Survey: Automatic generation of attack trees and attack graphs},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103602},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103602},
  doi          = {10.1016/J.COSE.2023.103602},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/KonstaLSD24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KonstaLSD24,
  author       = {Alyzia Maria Konsta and
                  Alberto Lluch{-}Lafuente and
                  Beatrice Spiga and
                  Nicola Dragoni},
  title        = {Corrigendum to "Survey: Automatic generation of attack trees
                  and attack graphs" [Computers {\&} Security Volume 137, February
                  2024, 103602]},
  journal      = {Comput. Secur.},
  volume       = {138},
  pages        = {103660},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103660},
  doi          = {10.1016/J.COSE.2023.103660},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/KonstaLSD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/KonstaLD23,
  author       = {Alyzia Maria Konsta and
                  Alberto Lluch{-}Lafuente and
                  Nicola Dragoni},
  title        = {A Survey of Trust Management for Internet of Things},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {122175--122204},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3327335},
  doi          = {10.1109/ACCESS.2023.3327335},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/KonstaLD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jot/BucchiaroneCSDP23,
  author       = {Antonio Bucchiarone and
                  Claudiu{-}Bogdan Ciumedean and
                  Kemal Soysal and
                  Nicola Dragoni and
                  V{\'{a}}clav Pech},
  title        = {MaGiC: a {DSL} Framework for Implementing Language Agnostic Microservice-based
                  Web Applications},
  journal      = {J. Object Technol.},
  volume       = {22},
  number       = {1},
  pages        = {1--21},
  year         = {2023},
  url          = {https://doi.org/10.5381/jot.2023.22.1.a2},
  doi          = {10.5381/JOT.2023.22.1.A2},
  timestamp    = {Wed, 21 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jot/BucchiaroneCSDP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/LiVDD23,
  author       = {Ziru Li and
                  Simon Nam Thanh Vu and
                  Nicola Dragoni and
                  Kevin Doherty},
  editor       = {Albrecht Schmidt and
                  Kaisa V{\"{a}}{\"{a}}n{\"{a}}nen and
                  Tesh Goyal and
                  Per Ola Kristensson and
                  Anicia Peters},
  title        = {Accomplishing More With Less: The Practice of Cybersecure Health Technology
                  Design Among Danish Startups},
  booktitle    = {Extended Abstracts of the 2023 {CHI} Conference on Human Factors in
                  Computing Systems, {CHI} {EA} 2023, Hamburg, Germany, April 23-28,
                  2023},
  pages        = {21:1--21:8},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3544549.3585597},
  doi          = {10.1145/3544549.3585597},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/LiVDD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2022w2,
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Guillermo Navarro{-}Arribas and
                  Nicola Dragoni},
  title        = {Data Privacy Management, Cryptocurrencies and Blockchain Technology
                  - {ESORICS} 2022 International Workshops, {DPM} 2022 and {CBT} 2022,
                  Copenhagen, Denmark, September 26-30, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13619},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-25734-6},
  doi          = {10.1007/978-3-031-25734-6},
  isbn         = {978-3-031-25733-9},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/2022w2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-14479,
  author       = {Alyzia Maria Konsta and
                  Beatrice Spiga and
                  Alberto Lluch{-}Lafuente and
                  Nicola Dragoni},
  title        = {A Survey of Automatic Generation of Attack Trees and Attack Graphs},
  journal      = {CoRR},
  volume       = {abs/2302.14479},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.14479},
  doi          = {10.48550/ARXIV.2302.14479},
  eprinttype    = {arXiv},
  eprint       = {2302.14479},
  timestamp    = {Thu, 02 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-14479.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fi/DangiJCDML22,
  author       = {Ramraj Dangi and
                  Akshay Jadhav and
                  Gaurav Choudhary and
                  Nicola Dragoni and
                  Manas Kumar Mishra and
                  Praveen Lalwani},
  title        = {ML-Based 5G Network Slicing Security: {A} Comprehensive Survey},
  journal      = {Future Internet},
  volume       = {14},
  number       = {4},
  pages        = {116},
  year         = {2022},
  url          = {https://doi.org/10.3390/fi14040116},
  doi          = {10.3390/FI14040116},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fi/DangiJCDML22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/DonnoFD22,
  author       = {Michele De Donno and
                  Xenofon Fafoutis and
                  Nicola Dragoni},
  title        = {AntibIoTic: The Fog-enhanced distributed security system to protect
                  the (legacy) Internet of Things},
  journal      = {J. Comput. Secur.},
  volume       = {30},
  number       = {5},
  pages        = {689--725},
  year         = {2022},
  url          = {https://doi.org/10.3233/JCS-210027},
  doi          = {10.3233/JCS-210027},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/DonnoFD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/ChoudharyCPKLD22,
  author       = {Arjun Choudhary and
                  Gaurav Choudhary and
                  Kapil Pareek and
                  Chetanya Kunndra and
                  Jatin Luthra and
                  Nicola Dragoni},
  title        = {Emerging Cyber Security Challenges after {COVID} Pandemic: {A} Survey},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {12},
  number       = {2},
  pages        = {21--50},
  year         = {2022},
  url          = {https://doi.org/10.22667/JISIS.2022.05.31.021},
  doi          = {10.22667/JISIS.2022.05.31.021},
  timestamp    = {Tue, 04 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/ChoudharyCPKLD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/VelumaniSCBJD22,
  author       = {Ramesh Velumani and
                  Hariharasitaraman Sudalaimuthu and
                  Gaurav Choudhary and
                  Srinivasan Bama and
                  Maranthiran Victor Jose and
                  Nicola Dragoni},
  title        = {Secured Secret Sharing of {QR} Codes Based on Nonnegative Matrix Factorization
                  and Regularized Super Resolution Convolutional Neural Network},
  journal      = {Sensors},
  volume       = {22},
  number       = {8},
  pages        = {2959},
  year         = {2022},
  url          = {https://doi.org/10.3390/s22082959},
  doi          = {10.3390/S22082959},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/VelumaniSCBJD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/DushkuOD22,
  author       = {Edlira Dushku and
                  Jeppe Hagelskj{\ae}r {\O}stergaard and
                  Nicola Dragoni},
  title        = {Memory Offloading for Remote Attestation of Multi-Service IoT Devices},
  journal      = {Sensors},
  volume       = {22},
  number       = {12},
  pages        = {4340},
  year         = {2022},
  url          = {https://doi.org/10.3390/s22124340},
  doi          = {10.3390/S22124340},
  timestamp    = {Mon, 26 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/DushkuOD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosn/GiarettaDM22,
  author       = {Alberto Giaretta and
                  Nicola Dragoni and
                  Fabio Massacci},
  title        = {S{\texttimes}C4IoT: {A} Security-by-contract Framework for Dynamic
                  Evolving IoT Devices},
  journal      = {{ACM} Trans. Sens. Networks},
  volume       = {18},
  number       = {1},
  pages        = {12:1--12:51},
  year         = {2022},
  url          = {https://doi.org/10.1145/3480462},
  doi          = {10.1145/3480462},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosn/GiarettaDM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisec2/JaiswalSCD22,
  author       = {Shashank Jaiswal and
                  Vikas Sihag and
                  Gaurav Choudhary and
                  Nicola Dragoni},
  editor       = {Ilsun You and
                  Hwankuk Kim and
                  Pelin Angin},
  title        = {DyBAnd: Dynamic Behavior Based Android Malware Detection},
  booktitle    = {Mobile Internet Security - 6th International Symposium, MobiSec 2022,
                  Jeju, South Korea, December 15-17, 2022, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1644},
  pages        = {209--219},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-981-99-4430-9\_15},
  doi          = {10.1007/978-981-99-4430-9\_15},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobisec2/JaiswalSCD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/CastilloHACD22,
  author       = {Mathew Del Castillo and
                  Harvey Hermosa and
                  Philip Virgil Astillo and
                  Gaurav Choudhary and
                  Nicola Dragoni},
  editor       = {Ilsun You and
                  Taek{-}Young Youn},
  title        = {Software-Defined Network Based Secure Internet-Enabled Video Surveillance
                  System},
  booktitle    = {Information Security Applications - 23rd International Conference,
                  {WISA} 2022, Jeju Island, South Korea, August 24-26, 2022, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13720},
  pages        = {89--101},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25659-2\_7},
  doi          = {10.1007/978-3-031-25659-2\_7},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/CastilloHACD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-01712,
  author       = {Alyzia Maria Konsta and
                  Alberto Lluch{-}Lafuente and
                  Nicola Dragoni},
  title        = {Trust Management for Internet of Things: {A} Systematic Literature
                  Review},
  journal      = {CoRR},
  volume       = {abs/2211.01712},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2211.01712},
  doi          = {10.48550/ARXIV.2211.01712},
  eprinttype    = {arXiv},
  eprint       = {2211.01712},
  timestamp    = {Fri, 04 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-01712.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HalldorssonDD21,
  author       = {Ragnar Mikael Halld{\'{o}}rsson and
                  Edlira Dushku and
                  Nicola Dragoni},
  title        = {{ARCADIS:} Asynchronous Remote Control-Flow Attestation of Distributed
                  IoT Services},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {144880--144894},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3122391},
  doi          = {10.1109/ACCESS.2021.3122391},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/HalldorssonDD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fi/VuSEBD21,
  author       = {Simon Nam Thanh Vu and
                  Mads Stege and
                  Peter Issam El{-}Habr and
                  Jesper Bang and
                  Nicola Dragoni},
  title        = {A Survey on Botnets: Incentives, Evolution, Detection and Current
                  Trends},
  journal      = {Future Internet},
  volume       = {13},
  number       = {8},
  pages        = {198},
  year         = {2021},
  url          = {https://doi.org/10.3390/fi13080198},
  doi          = {10.3390/FI13080198},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fi/VuSEBD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/health/KumarJBD21,
  author       = {Devender Kumar and
                  Steven Jeuris and
                  Jakob E. Bardram and
                  Nicola Dragoni},
  title        = {Mobile and Wearable Sensing Frameworks for mHealth Studies and Applications:
                  {A} Systematic Review},
  journal      = {{ACM} Trans. Comput. Heal.},
  volume       = {2},
  number       = {1},
  pages        = {8:1--8:28},
  year         = {2021},
  url          = {https://doi.org/10.1145/3422158},
  doi          = {10.1145/3422158},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/health/KumarJBD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/DragoniLMS21,
  author       = {Nicola Dragoni and
                  Alberto Lluch{-}Lafuente and
                  Fabio Massacci and
                  Anders Schlichtkrull},
  title        = {Are We Preparing Students to Build Security In? {A} Survey of European
                  Cybersecurity in Higher Education Programs [Education]},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {1},
  pages        = {81--88},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2020.3037446},
  doi          = {10.1109/MSEC.2020.3037446},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/DragoniLMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jot/BjorndalABDMD21,
  author       = {Nichlas Bj{\o}rndal and
                  Luiz Jonat{\~{a}} Pires de Ara{\'{u}}jo and
                  Antonio Bucchiarone and
                  Nicola Dragoni and
                  Manuel Mazzara and
                  Schahram Dustdar},
  title        = {Benchmarks and performance metrics for assessing the migration to
                  microservice-based architectures},
  journal      = {J. Object Technol.},
  volume       = {20},
  number       = {2},
  pages        = {3:1--17},
  year         = {2021},
  url          = {https://doi.org/10.5381/jot.2021.20.2.a3},
  doi          = {10.5381/JOT.2021.20.2.A3},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jot/BjorndalABDMD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/AnkergardDD21,
  author       = {Sigurd Frej Joel J{\o}rgensen Ankerg{\aa}rd and
                  Edlira Dushku and
                  Nicola Dragoni},
  title        = {State-of-the-Art Software-Based Remote Attestation: Opportunities
                  and Open Issues for Internet of Things},
  journal      = {Sensors},
  volume       = {21},
  number       = {5},
  pages        = {1598},
  year         = {2021},
  url          = {https://doi.org/10.3390/s21051598},
  doi          = {10.3390/S21051598},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/AnkergardDD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/TangeMLFD21,
  author       = {Koen Tange and
                  Sebastian M{\"{o}}dersheim and
                  Apostolos Lalos and
                  Xenofon Fafoutis and
                  Nicola Dragoni},
  title        = {rTLS: Secure and Efficient {TLS} Session Resumption for the Internet
                  of Things},
  journal      = {Sensors},
  volume       = {21},
  number       = {19},
  pages        = {6524},
  year         = {2021},
  url          = {https://doi.org/10.3390/s21196524},
  doi          = {10.3390/S21196524},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/TangeMLFD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/MazzaraDBGLD21,
  author       = {Manuel Mazzara and
                  Nicola Dragoni and
                  Antonio Bucchiarone and
                  Alberto Giaretta and
                  Stephan Thordal Larsen and
                  Schahram Dustdar},
  title        = {Microservices: Migration of a Mission Critical System},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {14},
  number       = {5},
  pages        = {1464--1477},
  year         = {2021},
  url          = {https://doi.org/10.1109/TSC.2018.2889087},
  doi          = {10.1109/TSC.2018.2889087},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsc/MazzaraDBGLD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csr2/OstergaardDD21,
  author       = {Jeppe Hagelskj{\ae}r {\O}stergaard and
                  Edlira Dushku and
                  Nicola Dragoni},
  title        = {{ERAMO:} Effective Remote Attestation through Memory Offloading},
  booktitle    = {{IEEE} International Conference on Cyber Security and Resilience,
                  {CSR} 2021, Rhodes, Greece, July 26-28, 2021},
  pages        = {73--80},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CSR51186.2021.9527978},
  doi          = {10.1109/CSR51186.2021.9527978},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csr2/OstergaardDD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/AnkergardDD21,
  author       = {Sigurd Frej Joel J{\o}rgensen Ankerg{\aa}rd and
                  Edlira Dushku and
                  Nicola Dragoni},
  editor       = {Esma A{\"{\i}}meur and
                  Maryline Laurent and
                  Reda Yaich and
                  Beno{\^{\i}}t Dupont and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {{PERMANENT:} Publicly Verifiable Remote Attestation for Internet of
                  Things Through Blockchain},
  booktitle    = {Foundations and Practice of Security - 14th International Symposium,
                  {FPS} 2021, Paris, France, December 7-10, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13291},
  pages        = {218--234},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-08147-7\_15},
  doi          = {10.1007/978-3-031-08147-7\_15},
  timestamp    = {Tue, 28 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fps/AnkergardDD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccel/TosunDDF21,
  author       = {Altug Tosun and
                  Michele De Donno and
                  Nicola Dragoni and
                  Xenofon Fafoutis},
  title        = {{RESIP} Host Detection: Identification of Malicious Residential {IP}
                  Proxy Flows},
  booktitle    = {{IEEE} International Conference on Consumer Electronics, {ICCE} 2021,
                  Las Vegas, NV, USA, January 10-12, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICCE50685.2021.9427688},
  doi          = {10.1109/ICCE50685.2021.9427688},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccel/TosunDDF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isorc/KyriakakisTRZFS21,
  author       = {Eleftherios Kyriakakis and
                  Koen Tange and
                  Niklas Reusch and
                  Eder Ollora Zaballa and
                  Xenofon Fafoutis and
                  Martin Schoeberl and
                  Nicola Dragoni},
  title        = {Fault-tolerant Clock Synchronization using Precise Time Protocol Multi-Domain
                  Aggregation},
  booktitle    = {24th {IEEE} International Symposium on Real-Time Distributed Computing,
                  {ISORC} 2021, Daegu, South Korea, June 1-3, 2021},
  pages        = {114--122},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ISORC52013.2021.00025},
  doi          = {10.1109/ISORC52013.2021.00025},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isorc/KyriakakisTRZFS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sensys/RabbaniDVBDM21,
  author       = {Md Masoom Rabbani and
                  Edlira Dushku and
                  Jo Vliegen and
                  An Braeken and
                  Nicola Dragoni and
                  Nele Mentens},
  editor       = {Jorge S{\'{a}} Silva and
                  Fernando Boavida and
                  Andr{\'{e}} Rodrigues and
                  Andrew Markham and
                  Rong Zheng},
  title        = {{RESERVE:} Remote Attestation of Intermittent IoT devices},
  booktitle    = {SenSys '21: The 19th {ACM} Conference on Embedded Networked Sensor
                  Systems, Coimbra, Portugal, November 15 - 17, 2021},
  pages        = {578--580},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485730.3493364},
  doi          = {10.1145/3485730.3493364},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sensys/RabbaniDVBDM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@misc{DBLP:data/10/DragoniMLS21,
  author       = {Nicola Dragoni and
                  Fabio Massacci and
                  Alberto Lluch{-}Lafuente and
                  Anders Schlichtkrull},
  title        = {A Survey of European Cybersecurity in Higher Education Programs},
  publisher    = {{IEEE} DataPort},
  year         = {2021},
  month        = jul,
  howpublished = {\url{https://doi.org/10.21227/b5y0-4243}},
  note         = {Accessed on YYYY-MM-DD.},
  url          = {https://doi.org/10.21227/b5y0-4243},
  doi          = {10.21227/B5Y0-4243},
  timestamp    = {Wed, 15 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/data/10/DragoniMLS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/GonczolKHD20,
  author       = {Peter Gonczol and
                  Panagiota Katsikouli and
                  Lasse Herskind and
                  Nicola Dragoni},
  title        = {Blockchain Implementations and Use Cases for Supply Chains-A Survey},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {11856--11871},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2964880},
  doi          = {10.1109/ACCESS.2020.2964880},
  timestamp    = {Fri, 07 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/GonczolKHD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HerskindKD20,
  author       = {Lasse Herskind and
                  Panagiota Katsikouli and
                  Nicola Dragoni},
  title        = {Privacy and Cryptocurrencies - {A} Systematic Literature Review},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {54044--54059},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2980950},
  doi          = {10.1109/ACCESS.2020.2980950},
  timestamp    = {Mon, 04 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/HerskindKD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/TangeDFD20,
  author       = {Koen Tange and
                  Michele De Donno and
                  Xenofon Fafoutis and
                  Nicola Dragoni},
  title        = {A Systematic Survey of Industrial Internet of Things Security: Requirements
                  and Fog Computing Opportunities},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {22},
  number       = {4},
  pages        = {2489--2520},
  year         = {2020},
  url          = {https://doi.org/10.1109/COMST.2020.3011208},
  doi          = {10.1109/COMST.2020.3011208},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsur/TangeDFD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/HerskindGDD20,
  author       = {Lasse Herskind and
                  Alberto Giaretta and
                  Michele De Donno and
                  Nicola Dragoni},
  title        = {BitFlow: Enabling real-time cash-flow evaluations through blockchain},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {32},
  number       = {12},
  year         = {2020},
  url          = {https://doi.org/10.1002/cpe.5333},
  doi          = {10.1002/CPE.5333},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/HerskindGDD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/HerskindKD20,
  author       = {Lasse Herskind and
                  Panagiota Katsikouli and
                  Nicola Dragoni},
  title        = {Oscausi - Practical Private Electronic Cash from Lelantus and MimbleWimble},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {10},
  number       = {2},
  pages        = {16--34},
  year         = {2020},
  url          = {https://doi.org/10.22667/JISIS.2020.05.31.016},
  doi          = {10.22667/JISIS.2020.05.31.016},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisis/HerskindKD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/TangeHSPFD20,
  author       = {Koen Tange and
                  David Howard and
                  Travis Shanahan and
                  Stefano Pepe and
                  Xenofon Fafoutis and
                  Nicola Dragoni},
  editor       = {Weizhi Meng and
                  Dieter Gollmann and
                  Christian Damsgaard Jensen and
                  Jianying Zhou},
  title        = {rTLS: Lightweight {TLS} Session Resumption for Constrained IoT Devices},
  booktitle    = {Information and Communications Security - 22nd International Conference,
                  {ICICS} 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12282},
  pages        = {243--258},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61078-4\_14},
  doi          = {10.1007/978-3-030-61078-4\_14},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/TangeHSPFD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/openidentity/Matthiasson0D20,
  author       = {Gu{\dh}ni Matth{\'{\i}}asson and
                  Alberto Giaretta and
                  Nicola Dragoni},
  editor       = {Heiko Ro{\ss}nagel and
                  Christian H. Schunck and
                  Sebastian M{\"{o}}dersheim and
                  Detlef H{\"{u}}hnlein},
  title        = {IoT Device Profiling: From {MUD} Files to S{\texttimes}C Contracts},
  booktitle    = {Open Identity Summit 2020, 26. - 27.05.2020, Copenhagen, Denmark},
  series       = {{LNI}},
  volume       = {{P-305}},
  pages        = {143--154},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2020},
  url          = {https://doi.org/10.18420/ois2020\_12},
  doi          = {10.18420/OIS2020\_12},
  timestamp    = {Tue, 12 Jan 2021 16:08:46 +0100},
  biburl       = {https://dblp.org/rec/conf/openidentity/Matthiasson0D20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wf-iot/BejderMDDF20,
  author       = {Emil Bejder and
                  Adam Krog Mathiasen and
                  Michele De Donno and
                  Nicola Dragoni and
                  Xenofon Fafoutis},
  title        = {{SHAKE:} SHared Acceleration Key Establishment for Resource-Constrained
                  IoT Devices},
  booktitle    = {6th {IEEE} World Forum on Internet of Things, WF-IoT 2020, New Orleans,
                  LA, USA, June 2-16, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/WF-IoT48130.2020.9221263},
  doi          = {10.1109/WF-IOT48130.2020.9221263},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wf-iot/BejderMDDF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/20/MazzaraBDR20,
  author       = {Manuel Mazzara and
                  Antonio Bucchiarone and
                  Nicola Dragoni and
                  Victor Rivera},
  editor       = {Antonio Bucchiarone and
                  Nicola Dragoni and
                  Schahram Dustdar and
                  Patricia Lago and
                  Manuel Mazzara and
                  Victor Rivera and
                  Andrey Sadovykh},
  title        = {Size Matters: Microservices Research and Applications},
  booktitle    = {Microservices, Science and Engineering},
  pages        = {29--42},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-31646-4\_2},
  doi          = {10.1007/978-3-030-31646-4\_2},
  timestamp    = {Mon, 05 Feb 2024 20:35:54 +0100},
  biburl       = {https://dblp.org/rec/books/sp/20/MazzaraBDR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/20/BDDL2020,
  editor       = {Antonio Bucchiarone and
                  Nicola Dragoni and
                  Schahram Dustdar and
                  Patricia Lago and
                  Manuel Mazzara and
                  Victor Rivera and
                  Andrey Sadovykh},
  title        = {Microservices, Science and Engineering},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-31646-4},
  doi          = {10.1007/978-3-030-31646-4},
  isbn         = {978-3-030-31645-7},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/sp/20/BDDL2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/DonnoTD19,
  author       = {Michele De Donno and
                  Koen Tange and
                  Nicola Dragoni},
  title        = {Foundations and Evolution of Modern Computing Paradigms: Cloud, IoT,
                  Edge, and Fog},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {150936--150948},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2947652},
  doi          = {10.1109/ACCESS.2019.2947652},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/DonnoTD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fi/DonnoGDBM19,
  author       = {Michele De Donno and
                  Alberto Giaretta and
                  Nicola Dragoni and
                  Antonio Bucchiarone and
                  Manuel Mazzara},
  title        = {Cyber-Storms Come from Clouds: Security of Cloud Computing in the
                  IoT Era},
  journal      = {Future Internet},
  volume       = {11},
  number       = {6},
  pages        = {127},
  year         = {2019},
  url          = {https://doi.org/10.3390/fi11060127},
  doi          = {10.3390/FI11060127},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fi/DonnoGDBM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/GiarettaDM19,
  author       = {Alberto Giaretta and
                  Nicola Dragoni and
                  Fabio Massacci},
  title        = {IoT Security Configurability with Security-by-Contract},
  journal      = {Sensors},
  volume       = {19},
  number       = {19},
  pages        = {4121},
  year         = {2019},
  url          = {https://doi.org/10.3390/s19194121},
  doi          = {10.3390/S19194121},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/GiarettaDM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/DonnoFD19,
  author       = {Michele De Donno and
                  Juan Manuel Donaire Felipe and
                  Nicola Dragoni},
  title        = {{ANTIBIOTIC} 2.0: {A} Fog-based Anti-Malware for Internet of Things},
  booktitle    = {2019 {IEEE} European Symposium on Security and Privacy Workshops,
                  EuroS{\&}P Workshops 2019, Stockholm, Sweden, June 17-19, 2019},
  pages        = {11--20},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EuroSPW.2019.00008},
  doi          = {10.1109/EUROSPW.2019.00008},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/DonnoFD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icfec/DonnoD19,
  author       = {Michele De Donno and
                  Nicola Dragoni},
  title        = {Combining AntibIoTic with Fog Computing: AntibIoTic 2.0},
  booktitle    = {3rd {IEEE} International Conference on Fog and Edge Computing, {ICFEC}
                  2019, Larnaca, Cyprus, May 14-17, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CFEC.2019.8733144},
  doi          = {10.1109/CFEC.2019.8733144},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icfec/DonnoD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iotdi/TangeDFD19,
  author       = {Koen Tange and
                  Michele De Donno and
                  Xenofon Fafoutis and
                  Nicola Dragoni},
  editor       = {Paul Pop and
                  Karl{-}Erik {\AA}rz{\'{e}}n},
  title        = {Towards a systematic survey of industrial IoT security requirements:
                  research method and quantitative analysis},
  booktitle    = {Proceedings of the Workshop on Fog Computing and the IoT, IoT-Fog@IoTDI
                  2019, Montreal, QC, Canada, April 15, 2019},
  pages        = {56--63},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3313150.3313228},
  doi          = {10.1145/3313150.3313228},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iotdi/TangeDFD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartnets/DonnoMFDPBR19,
  author       = {Michele De Donno and
                  Krzysztof Mateusz Malarski and
                  Xenofon Fafoutis and
                  Nicola Dragoni and
                  Martin Nordal Petersen and
                  Michael St{\"{u}}bert Berger and
                  Sarah Ruepp},
  title        = {Sustainable Security for Internet of Things},
  booktitle    = {International Conference on Smart Applications, Communications and
                  Networking, SmartNets 2019, Sharm El Sheik, Egypt, December 17-19,
                  2019},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SmartNets48225.2019.9069776},
  doi          = {10.1109/SMARTNETS48225.2019.9069776},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/smartnets/DonnoMFDPBR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tools/GiarettaPD19,
  author       = {Alberto Giaretta and
                  Stefano Pepe and
                  Nicola Dragoni},
  editor       = {Manuel Mazzara and
                  Jean{-}Michel Bruel and
                  Bertrand Meyer and
                  Alexander K. Petrenko},
  title        = {UniquID: {A} Quest to Reconcile Identity Access Management and the
                  IoT},
  booktitle    = {Software Technology: Methods and Tools - 51st International Conference,
                  {TOOLS} 2019, Tatarstan, Russia, October 15-17, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11771},
  pages        = {237--251},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29852-4\_20},
  doi          = {10.1007/978-3-030-29852-4\_20},
  timestamp    = {Wed, 24 Jun 2020 11:26:48 +0200},
  biburl       = {https://dblp.org/rec/conf/tools/GiarettaPD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wf-iot/GiarettaDM19,
  author       = {Alberto Giaretta and
                  Nicola Dragoni and
                  Fabio Massacci},
  title        = {Protecting the Internet of Things with Security-by-Contract and Fog
                  Computing},
  booktitle    = {5th {IEEE} World Forum on Internet of Things, WF-IoT 2019, Limerick,
                  Ireland, April 15-18, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/WF-IoT.2019.8767243},
  doi          = {10.1109/WF-IOT.2019.8767243},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wf-iot/GiarettaDM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1904-03027,
  author       = {Manuel Mazzara and
                  Antonio Bucchiarone and
                  Nicola Dragoni and
                  Victor Rivera},
  title        = {Size Matters: Microservices Research and Applications},
  journal      = {CoRR},
  volume       = {abs/1904.03027},
  year         = {2019},
  url          = {http://arxiv.org/abs/1904.03027},
  eprinttype    = {arXiv},
  eprint       = {1904.03027},
  timestamp    = {Wed, 24 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1904-03027.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1905-04021,
  author       = {Alberto Giaretta and
                  Stefano Pepe and
                  Nicola Dragoni},
  title        = {UniquID: {A} Quest to Reconcile Identity Access Management and the
                  Internet of Things},
  journal      = {CoRR},
  volume       = {abs/1905.04021},
  year         = {2019},
  url          = {http://arxiv.org/abs/1905.04021},
  eprinttype    = {arXiv},
  eprint       = {1905.04021},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1905-04021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ArgyriouDS18,
  author       = {Marios Argyriou and
                  Nicola Dragoni and
                  Angelo Spognardi},
  title        = {Analysis and Evaluation of SafeDroid v2.0, a Framework for Detecting
                  Malicious Android Applications},
  journal      = {Secur. Commun. Networks},
  volume       = {2018},
  pages        = {4672072:1--4672072:15},
  year         = {2018},
  url          = {https://doi.org/10.1155/2018/4672072},
  doi          = {10.1155/2018/4672072},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ArgyriouDS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/DonnoDGS18,
  author       = {Michele De Donno and
                  Nicola Dragoni and
                  Alberto Giaretta and
                  Angelo Spognardi},
  title        = {DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation},
  journal      = {Secur. Commun. Networks},
  volume       = {2018},
  pages        = {7178164:1--7178164:30},
  year         = {2018},
  url          = {https://doi.org/10.1155/2018/7178164},
  doi          = {10.1155/2018/7178164},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/DonnoDGS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/software/BucchiaroneDDLM18,
  author       = {Antonio Bucchiarone and
                  Nicola Dragoni and
                  Schahram Dustdar and
                  Stephan Thordal Larsen and
                  Manuel Mazzara},
  title        = {From Monolithic to Microservices: An Experience Report from the Banking
                  Domain},
  journal      = {{IEEE} Softw.},
  volume       = {35},
  number       = {3},
  pages        = {50--55},
  year         = {2018},
  url          = {https://doi.org/10.1109/MS.2018.2141026},
  doi          = {10.1109/MS.2018.2141026},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/software/BucchiaroneDDLM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/GiarettaDD18,
  author       = {Alberto Giaretta and
                  Michele De Donno and
                  Nicola Dragoni},
  editor       = {Sebastian Doerr and
                  Mathias Fischer and
                  Sebastian Schrittwieser and
                  Dominik Herrmann},
  title        = {Adding Salt to Pepper: {A} Structured Security Assessment over a Humanoid
                  Robot},
  booktitle    = {Proceedings of the 13th International Conference on Availability,
                  Reliability and Security, {ARES} 2018, Hamburg, Germany, August 27-30,
                  2018},
  pages        = {22:1--22:8},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3230833.3232807},
  doi          = {10.1145/3230833.3232807},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/GiarettaDD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/seda/FavarettoAKDD18,
  author       = {Margherita Favaretto and
                  Tu Tran Anh and
                  Juxhino Kavaja and
                  Michele De Donno and
                  Nicola Dragoni},
  editor       = {Paolo Ciancarini and
                  Manuel Mazzara and
                  Angelo Messina and
                  Alberto Sillitti and
                  Giancarlo Succi},
  title        = {When the Price Is Your Privacy: {A} Security Analysis of Two Cheap
                  IoT Devices},
  booktitle    = {Proceedings of 6th International Conference in Software Engineering
                  for Defence Applications, {SEDA} 2018, Rome, Italy, June 7-8, 2018},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {925},
  pages        = {55--75},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-14687-0\_6},
  doi          = {10.1007/978-3-030-14687-0\_6},
  timestamp    = {Thu, 14 Oct 2021 09:59:32 +0200},
  biburl       = {https://dblp.org/rec/conf/seda/FavarettoAKDD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/seda/GiarettaD18,
  author       = {Alberto Giaretta and
                  Nicola Dragoni},
  editor       = {Paolo Ciancarini and
                  Manuel Mazzara and
                  Angelo Messina and
                  Alberto Sillitti and
                  Giancarlo Succi},
  title        = {Community Targeted Phishing - {A} Middle Ground Between Massive and
                  Spear Phishing Through Natural Language Generation},
  booktitle    = {Proceedings of 6th International Conference in Software Engineering
                  for Defence Applications, {SEDA} 2018, Rome, Italy, June 7-8, 2018},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {925},
  pages        = {86--93},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-14687-0\_8},
  doi          = {10.1007/978-3-030-14687-0\_8},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/seda/GiarettaD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/seda/SigurdssonGD18,
  author       = {Gudmundur Sigurdsson and
                  Alberto Giaretta and
                  Nicola Dragoni},
  editor       = {Paolo Ciancarini and
                  Manuel Mazzara and
                  Angelo Messina and
                  Alberto Sillitti and
                  Giancarlo Succi},
  title        = {Vulnerabilities and Security Breaches in Cryptocurrencies},
  booktitle    = {Proceedings of 6th International Conference in Software Engineering
                  for Defence Applications, {SEDA} 2018, Rome, Italy, June 7-8, 2018},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {925},
  pages        = {288--299},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-14687-0\_26},
  doi          = {10.1007/978-3-030-14687-0\_26},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/seda/SigurdssonGD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1805-04101,
  author       = {Alberto Giaretta and
                  Michele De Donno and
                  Nicola Dragoni},
  title        = {Adding Salt to Pepper: {A} Structured Security Assessment over a Humanoid
                  Robot},
  journal      = {CoRR},
  volume       = {abs/1805.04101},
  year         = {2018},
  url          = {http://arxiv.org/abs/1805.04101},
  eprinttype    = {arXiv},
  eprint       = {1805.04101},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1805-04101.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/biostec/HandlerHSD17,
  author       = {Daniel Tolboe Handler and
                  Lotte Hauge and
                  Angelo Spognardi and
                  Nicola Dragoni},
  editor       = {Egon L. van den Broek and
                  Ana L. N. Fred and
                  Hugo Gamboa and
                  M{\'{a}}rio Vaz},
  title        = {Security And Privacy Issues in Healthcare Monitoring Systems: {A}
                  Case Study},
  booktitle    = {Proceedings of the 10th International Joint Conference on Biomedical
                  Engineering Systems and Technologies {(BIOSTEC} 2017) - Volume 5:
                  HEALTHINF, Porto, Portugal, February 21-23, 2017},
  pages        = {383--388},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006224603830388},
  doi          = {10.5220/0006224603830388},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/biostec/HandlerHSD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ershov/DragoniLLMMS17,
  author       = {Nicola Dragoni and
                  Ivan Lanese and
                  Stephan Thordal Larsen and
                  Manuel Mazzara and
                  Ruslan Mustafin and
                  Larisa Safina},
  editor       = {Alexander K. Petrenko and
                  Andrei Voronkov},
  title        = {Microservices: How To Make Your Application Scale},
  booktitle    = {Perspectives of System Informatics - 11th International Andrei P.
                  Ershov Informatics Conference, {PSI} 2017, Moscow, Russia, June 27-29,
                  2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10742},
  pages        = {95--104},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-74313-4\_8},
  doi          = {10.1007/978-3-319-74313-4\_8},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ershov/DragoniLLMMS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fedcsis/SpognardiDDG17,
  author       = {Angelo Spognardi and
                  Michele De Donno and
                  Nicola Dragoni and
                  Alberto Giaretta},
  editor       = {Maria Ganzha and
                  Leszek A. Maciaszek and
                  Marcin Paprzycki},
  title        = {Analysis of DDoS-Capable IoT Malwares},
  booktitle    = {Proceedings of the 2017 Federated Conference on Computer Science and
                  Information Systems, FedCSIS 2017, Prague, Czech Republic, September
                  3-6, 2017},
  series       = {Annals of Computer Science and Information Systems},
  volume       = {11},
  pages        = {807--816},
  year         = {2017},
  url          = {https://doi.org/10.15439/2017F288},
  doi          = {10.15439/2017F288},
  timestamp    = {Mon, 07 Aug 2023 11:27:06 +0200},
  biburl       = {https://dblp.org/rec/conf/fedcsis/SpognardiDDG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safecomp/ArgyriouDS17,
  author       = {Marios Argyriou and
                  Nicola Dragoni and
                  Angelo Spognardi},
  editor       = {Stefano Tonetta and
                  Erwin Schoitsch and
                  Friedemann Bitsch},
  title        = {Security Flows in OAuth 2.0 Framework: {A} Case Study},
  booktitle    = {Computer Safety, Reliability, and Security - {SAFECOMP} 2017 Workshops,
                  ASSURE, DECSoS, SASSUR, TELERISE, and TIPS, Trento, Italy, September
                  12, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10489},
  pages        = {396--406},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66284-8\_33},
  doi          = {10.1007/978-3-319-66284-8\_33},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/safecomp/ArgyriouDS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/17/DragoniGLMMMS17,
  author       = {Nicola Dragoni and
                  Saverio Giallorenzo and
                  Alberto Lluch{-}Lafuente and
                  Manuel Mazzara and
                  Fabrizio Montesi and
                  Ruslan Mustafin and
                  Larisa Safina},
  editor       = {Manuel Mazzara and
                  Bertrand Meyer},
  title        = {Microservices: Yesterday, Today, and Tomorrow},
  booktitle    = {Present and Ulterior Software Engineering},
  pages        = {195--216},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-67425-4\_12},
  doi          = {10.1007/978-3-319-67425-4\_12},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/17/DragoniGLMMMS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/DragoniLLMMS17,
  author       = {Nicola Dragoni and
                  Ivan Lanese and
                  Stephan Thordal Larsen and
                  Manuel Mazzara and
                  Ruslan Mustafin and
                  Larisa Safina},
  title        = {Microservices: How To Make Your Application Scale},
  journal      = {CoRR},
  volume       = {abs/1702.07149},
  year         = {2017},
  url          = {http://arxiv.org/abs/1702.07149},
  eprinttype    = {arXiv},
  eprint       = {1702.07149},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/DragoniLLMMS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/DragoniDLM17,
  author       = {Nicola Dragoni and
                  Schahram Dustdar and
                  Stephan Thordal Larsen and
                  Manuel Mazzara},
  title        = {Microservices: Migration of a Mission Critical System},
  journal      = {CoRR},
  volume       = {abs/1704.04173},
  year         = {2017},
  url          = {http://arxiv.org/abs/1704.04173},
  eprinttype    = {arXiv},
  eprint       = {1704.04173},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/DragoniDLM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/DragoniGM17,
  author       = {Nicola Dragoni and
                  Alberto Giaretta and
                  Manuel Mazzara},
  title        = {The Internet of Hackable Things},
  journal      = {CoRR},
  volume       = {abs/1707.08380},
  year         = {2017},
  url          = {http://arxiv.org/abs/1707.08380},
  eprinttype    = {arXiv},
  eprint       = {1707.08380},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/DragoniGM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1708-05050,
  author       = {Michele De Donno and
                  Nicola Dragoni and
                  Alberto Giaretta and
                  Manuel Mazzara},
  title        = {AntibIoTic: Protecting IoT Devices Against DDoS Attacks},
  journal      = {CoRR},
  volume       = {abs/1708.05050},
  year         = {2017},
  url          = {http://arxiv.org/abs/1708.05050},
  eprinttype    = {arXiv},
  eprint       = {1708.05050},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1708-05050.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1708-07342,
  author       = {Alberto Giaretta and
                  Nicola Dragoni},
  title        = {Community Targeted Spam: {A} Middle Ground Between General Spam and
                  Spear Phishing},
  journal      = {CoRR},
  volume       = {abs/1708.07342},
  year         = {2017},
  url          = {http://arxiv.org/abs/1708.07342},
  eprinttype    = {arXiv},
  eprint       = {1708.07342},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1708-07342.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1709-05635,
  author       = {Alberto Giaretta and
                  Nicola Dragoni and
                  Manuel Mazzara},
  title        = {Joining Jolie to Docker - Orchestration of Microservices on a Containers-as-a-Service
                  Layer},
  journal      = {CoRR},
  volume       = {abs/1709.05635},
  year         = {2017},
  url          = {http://arxiv.org/abs/1709.05635},
  eprinttype    = {arXiv},
  eprint       = {1709.05635},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1709-05635.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/ContiDL16,
  author       = {Mauro Conti and
                  Nicola Dragoni and
                  Viktor Lesyk},
  title        = {A Survey of Man In The Middle Attacks},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {18},
  number       = {3},
  pages        = {2027--2051},
  year         = {2016},
  url          = {https://doi.org/10.1109/COMST.2016.2548426},
  doi          = {10.1109/COMST.2016.2548426},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsur/ContiDL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/healthyIoT/GoyalD16,
  author       = {Rohit Goyal and
                  Nicola Dragoni},
  editor       = {Mobyen Uddin Ahmed and
                  Shahina Begum and
                  Wasim Raad},
  title        = {Why Hackers Love eHealth Applications},
  booktitle    = {Internet of Things Technologies for HealthCare - Third International
                  Conference, HealthyIoT 2016, V{\"{a}}ster{\aa}s, Sweden, October
                  18-19, 2016, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {187},
  pages        = {58--63},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-51234-1\_9},
  doi          = {10.1007/978-3-319-51234-1\_9},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/healthyIoT/GoyalD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/healthyIoT/WearingD16,
  author       = {Thomas Wearing and
                  Nicola Dragoni},
  editor       = {Mobyen Uddin Ahmed and
                  Shahina Begum and
                  Wasim Raad},
  title        = {Security and Privacy Issues in Health Monitoring Systems: eCare@Home
                  Case Study},
  booktitle    = {Internet of Things Technologies for HealthCare - Third International
                  Conference, HealthyIoT 2016, V{\"{a}}ster{\aa}s, Sweden, October
                  18-19, 2016, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {187},
  pages        = {165--170},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-51234-1\_29},
  doi          = {10.1007/978-3-319-51234-1\_29},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/healthyIoT/WearingD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icwe/SchougaardDS16,
  author       = {Daniel Schougaard and
                  Nicola Dragoni and
                  Angelo Spognardi},
  editor       = {Sven Casteleyn and
                  Peter Dolog and
                  Cesare Pautasso},
  title        = {Evaluation of Professional Cloud Password Management Tools},
  booktitle    = {Current Trends in Web Engineering - {ICWE} 2016 International Workshops,
                  DUI, TELERISE, SoWeMine, and Liquid Web, Lugano, Switzerland, June
                  6-9, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9881},
  pages        = {16--28},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-46963-8\_2},
  doi          = {10.1007/978-3-319-46963-8\_2},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/icwe/SchougaardDS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/GoyalDS16,
  author       = {Rohit Goyal and
                  Nicola Dragoni and
                  Angelo Spognardi},
  editor       = {Sascha Ossowski},
  title        = {Mind the tracker you wear: a security analysis of wearable health
                  trackers},
  booktitle    = {Proceedings of the 31st Annual {ACM} Symposium on Applied Computing,
                  Pisa, Italy, April 4-8, 2016},
  pages        = {131--136},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2851613.2851685},
  doi          = {10.1145/2851613.2851685},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/GoyalDS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/seda/DonnoDGM16,
  author       = {Michele De Donno and
                  Nicola Dragoni and
                  Alberto Giaretta and
                  Manuel Mazzara},
  editor       = {Paolo Ciancarini and
                  Stanislav Litvinov and
                  Angelo Messina and
                  Alberto Sillitti and
                  Giancarlo Succi},
  title        = {AntibIoTic: Protecting IoT Devices Against DDoS Attacks},
  booktitle    = {Proceedings of 5th International Conference in Software Engineering
                  for Defence Applications - {SEDA} 2016, Rome, Italy, May 10th, 2016},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {717},
  pages        = {59--72},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-70578-1\_7},
  doi          = {10.1007/978-3-319-70578-1\_7},
  timestamp    = {Thu, 14 Oct 2021 09:59:32 +0200},
  biburl       = {https://dblp.org/rec/conf/seda/DonnoDGM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/seda/DragoniGM16,
  author       = {Nicola Dragoni and
                  Alberto Giaretta and
                  Manuel Mazzara},
  editor       = {Paolo Ciancarini and
                  Stanislav Litvinov and
                  Angelo Messina and
                  Alberto Sillitti and
                  Giancarlo Succi},
  title        = {The Internet of Hackable Things},
  booktitle    = {Proceedings of 5th International Conference in Software Engineering
                  for Defence Applications - {SEDA} 2016, Rome, Italy, May 10th, 2016},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {717},
  pages        = {129--140},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-70578-1\_13},
  doi          = {10.1007/978-3-319-70578-1\_13},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/seda/DragoniGM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/seda/GiarettaDM16,
  author       = {Alberto Giaretta and
                  Nicola Dragoni and
                  Manuel Mazzara},
  editor       = {Paolo Ciancarini and
                  Stanislav Litvinov and
                  Angelo Messina and
                  Alberto Sillitti and
                  Giancarlo Succi},
  title        = {Joining Jolie to Docker - Orchestration of Microservices on a Containers-as-a-Service
                  Layer},
  booktitle    = {Proceedings of 5th International Conference in Software Engineering
                  for Defence Applications - {SEDA} 2016, Rome, Italy, May 10th, 2016},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {717},
  pages        = {167--175},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-70578-1\_16},
  doi          = {10.1007/978-3-319-70578-1\_16},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/seda/GiarettaDM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soca/GoyalSDA16,
  author       = {Rohit Goyal and
                  Angelo Spognardi and
                  Nicola Dragoni and
                  Marios Argyriou},
  title        = {SafeDroid: {A} Distributed Malware Detection Service for Android},
  booktitle    = {9th {IEEE} International Conference on Service-Oriented Computing
                  and Applications, {SOCA} 2016, Macau, China, November 4-6, 2016},
  pages        = {59--66},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SOCA.2016.14},
  doi          = {10.1109/SOCA.2016.14},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/soca/GoyalSDA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/DragoniGLMMMS16,
  author       = {Nicola Dragoni and
                  Saverio Giallorenzo and
                  Alberto Lluch{-}Lafuente and
                  Manuel Mazzara and
                  Fabrizio Montesi and
                  Ruslan Mustafin and
                  Larisa Safina},
  title        = {Microservices: yesterday, today, and tomorrow},
  journal      = {CoRR},
  volume       = {abs/1606.04036},
  year         = {2016},
  url          = {http://arxiv.org/abs/1606.04036},
  eprinttype    = {arXiv},
  eprint       = {1606.04036},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/DragoniGLMMMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/FafoutisMVD15,
  author       = {Xenofon Fafoutis and
                  Alessio Di Mauro and
                  Madava D. Vithanage and
                  Nicola Dragoni},
  title        = {Receiver-initiated medium access control protocols for wireless sensor
                  networks},
  journal      = {Comput. Networks},
  volume       = {76},
  pages        = {55--74},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.comnet.2014.11.002},
  doi          = {10.1016/J.COMNET.2014.11.002},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/FafoutisMVD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/ZhangDW15,
  author       = {Yue Zhang and
                  Nicola Dragoni and
                  Jiangtao Wang},
  title        = {A Framework and Classification for Fault Detection Approaches in Wireless
                  Sensor Networks with an Energy Efficiency Perspective},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {11},
  pages        = {678029:1--678029:11},
  year         = {2015},
  url          = {https://doi.org/10.1155/2015/678029},
  doi          = {10.1155/2015/678029},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/ZhangDW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/MauroFD15,
  author       = {Alessio Di Mauro and
                  Xenofon Fafoutis and
                  Nicola Dragoni},
  title        = {Adaptive Security in {ODMAC} for Multihop Energy Harvesting Wireless
                  Sensor Networks},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {11},
  pages        = {760302:1--760302:10},
  year         = {2015},
  url          = {https://doi.org/10.1155/2015/760302},
  doi          = {10.1155/2015/760302},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/MauroFD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tce/FafoutisMOD15,
  author       = {Xenofon Fafoutis and
                  Alessio Di Mauro and
                  Charalampos Orfanidis and
                  Nicola Dragoni},
  title        = {Energy-efficient medium access control for energy harvesting communications},
  journal      = {{IEEE} Trans. Consumer Electron.},
  volume       = {61},
  number       = {4},
  pages        = {402--410},
  year         = {2015},
  url          = {https://doi.org/10.1109/TCE.2015.7389793},
  doi          = {10.1109/TCE.2015.7389793},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tce/FafoutisMOD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euspn/MauroD15,
  author       = {Alessio Di Mauro and
                  Nicola Dragoni},
  title        = {Adaptive Multipath Key Reinforcement for Energy Harvesting Wireless
                  Sensor Networks},
  booktitle    = {The 6th International Conference on Emerging Ubiquitous Systems and
                  Pervasive Networks {(EUSPN} 2015)/ The 5th International Conference
                  on Current and Future Trends of Information and Communication Technologies
                  in Healthcare {(ICTH-2015)/} Affiliated Workshops, September 27-30,
                  2015, Berlin, Germany},
  series       = {Procedia Computer Science},
  volume       = {63},
  pages        = {48--55},
  publisher    = {Elsevier},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.procs.2015.08.311},
  doi          = {10.1016/J.PROCS.2015.08.311},
  timestamp    = {Thu, 08 Jul 2021 16:04:01 +0200},
  biburl       = {https://dblp.org/rec/conf/euspn/MauroD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kesamsta/Orfanidis0D15,
  author       = {Charalampos Orfanidis and
                  Yue Zhang and
                  Nicola Dragoni},
  editor       = {Gordan Jezic and
                  Robert J. Howlett and
                  Lakhmi C. Jain},
  title        = {Fault Detection in WSNs - An Energy Efficiency Perspective Towards
                  Human-Centric WSNs},
  booktitle    = {Agent and Multi-Agent Systems: Technologies and Applications, 9th
                  {KES} International Conference, KES-AMSTA, 2015 Sorrento, Italy, June
                  17-19, 2015, Proceedings},
  series       = {Smart Innovation, Systems and Technologies},
  volume       = {38},
  pages        = {285--300},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19728-9\_24},
  doi          = {10.1007/978-3-319-19728-9\_24},
  timestamp    = {Thu, 17 Sep 2020 17:55:39 +0200},
  biburl       = {https://dblp.org/rec/conf/kesamsta/Orfanidis0D15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/EnemarkZDO15,
  author       = {Hans{-}Jacob Enemark and
                  Yue Zhang and
                  Nicola Dragoni and
                  Charalampos Orfanidis},
  title        = {Energy-Efficient Fault-Tolerant Dynamic Event Region Detection in
                  Wireless Sensor Networks},
  booktitle    = {{IEEE} 81st Vehicular Technology Conference, {VTC} Spring 2015, Glasgow,
                  United Kingdom, 11-14 May, 2015},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/VTCSpring.2015.7145814},
  doi          = {10.1109/VTCSPRING.2015.7145814},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/vtc/EnemarkZDO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/FafoutisOD14,
  author       = {Xenofon Fafoutis and
                  Charalampos Orfanidis and
                  Nicola Dragoni},
  title        = {Altruistic Backoff: Collision Avoidance for Receiver-Initiated {MAC}
                  Protocols for Wireless Sensor Networks},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {10},
  year         = {2014},
  url          = {https://doi.org/10.1155/2014/576401},
  doi          = {10.1155/2014/576401},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/FafoutisOD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijccbs/MazzuccoMD13,
  author       = {Michele Mazzucco and
                  Manuel Mazzara and
                  Nicola Dragoni},
  title        = {Dynamic allocation and admission policies for QoS-aware provisioning
                  systems},
  journal      = {Int. J. Crit. Comput. Based Syst.},
  volume       = {4},
  number       = {1},
  pages        = {27--44},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJCCBS.2013.053741},
  doi          = {10.1504/IJCCBS.2013.053741},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijccbs/MazzuccoMD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eenergy/FafoutisMD13,
  author       = {Xenofon Fafoutis and
                  Alessio Di Mauro and
                  Nicola Dragoni},
  editor       = {David E. Culler and
                  Catherine Rosenberg and
                  Srinivasan Keshav and
                  Jim Kurose},
  title        = {Sustainable performance in energy harvesting: wireless sensor networks},
  booktitle    = {The Fourth International Conference on Future Energy Systems, e-Energy
                  '13, Berkeley, CA, USA, May 22-24, 2013},
  pages        = {267--268},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2487166.2487200},
  doi          = {10.1145/2487166.2487200},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eenergy/FafoutisMD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocon/VithanageFAD13,
  author       = {Madava D. Vithanage and
                  Xenofon Fafoutis and
                  Claus Bo Andersen and
                  Nicola Dragoni},
  title        = {Medium access control for thermal energy harvesting in advanced metering
                  infrastructures},
  booktitle    = {Proceedings of Eurocon 2013, International Conference on Computer
                  as a Tool, Zagreb, Croatia, July 1-4, 2013},
  pages        = {291--299},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EUROCON.2013.6624999},
  doi          = {10.1109/EUROCON.2013.6624999},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocon/VithanageFAD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/FafoutisMD13,
  author       = {Xenofon Fafoutis and
                  Alessio Di Mauro and
                  Nicola Dragoni},
  title        = {Sustainable medium access control: Implementation and evaluation of
                  {ODMAC}},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2013, Budapest,
                  Hungary, June 9-13, 2013, Workshops Proceedings},
  pages        = {407--412},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICCW.2013.6649268},
  doi          = {10.1109/ICCW.2013.6649268},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/FafoutisMD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/MauroFMD13,
  author       = {Alessio Di Mauro and
                  Xenofon Fafoutis and
                  Sebastian M{\"{o}}dersheim and
                  Nicola Dragoni},
  editor       = {Hanne Riis Nielson and
                  Dieter Gollmann},
  title        = {Detecting and Preventing Beacon Replay Attacks in Receiver-Initiated
                  {MAC} Protocols for Energy Efficient WSNs},
  booktitle    = {Secure {IT} Systems - 18th Nordic Conference, NordSec 2013, Ilulissat,
                  Greenland, October 18-21, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8208},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41488-6\_1},
  doi          = {10.1007/978-3-642-41488-6\_1},
  timestamp    = {Sun, 02 Jun 2019 21:12:28 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/MauroFMD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/ContiDG13,
  author       = {Mauro Conti and
                  Nicola Dragoni and
                  Sebastiano Gottardo},
  editor       = {Rafael Accorsi and
                  Silvio Ranise},
  title        = {{MITHYS:} Mind The Hand You Shake - Protecting Mobile Devices from
                  {SSL} Usage Vulnerabilities},
  booktitle    = {Security and Trust Management - 9th International Workshop, {STM}
                  2013, Egham, UK, September 12-13, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8203},
  pages        = {65--81},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41098-7\_5},
  doi          = {10.1007/978-3-642-41098-7\_5},
  timestamp    = {Wed, 25 Sep 2019 18:14:27 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/ContiDG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ContiDG13,
  author       = {Mauro Conti and
                  Nicola Dragoni and
                  Sebastiano Gottardo},
  title        = {{MITHYS:} Mind The Hand You Shake - Protecting mobile devices from
                  {SSL} usage vulnerabilities},
  journal      = {CoRR},
  volume       = {abs/1306.6729},
  year         = {2013},
  url          = {http://arxiv.org/abs/1306.6729},
  eprinttype    = {arXiv},
  eprint       = {1306.6729},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ContiDG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/MazzaraBGDMQN13,
  author       = {Manuel Mazzara and
                  Luca Biselli and
                  Pier Paolo Greco and
                  Nicola Dragoni and
                  Antonio Marraffa and
                  Nafees Qamar and
                  Simona de Nicola},
  title        = {Social Networks and Collective Intelligence: {A} Return to the Agora},
  journal      = {CoRR},
  volume       = {abs/1311.2551},
  year         = {2013},
  url          = {http://arxiv.org/abs/1311.2551},
  eprinttype    = {arXiv},
  eprint       = {1311.2551},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/MazzaraBGDMQN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ci/DragoniG12,
  author       = {Nicola Dragoni and
                  Mauro Gaspari},
  title        = {Declarative Specification of Fault Tolerant Auction Protocols: the
                  English Auction Case Study},
  journal      = {Comput. Intell.},
  volume       = {28},
  number       = {4},
  pages        = {617--641},
  year         = {2012},
  url          = {https://doi.org/10.1111/j.1467-8640.2012.00448.x},
  doi          = {10.1111/J.1467-8640.2012.00448.X},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ci/DragoniG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijccbs/DragoniGMP12,
  author       = {Nicola Dragoni and
                  Olga Gadyatskaya and
                  Fabio Massacci and
                  Anton Philippov},
  title        = {High-level algorithms and data structures requirements for security-by-contract
                  on Java cards},
  journal      = {Int. J. Crit. Comput. Based Syst.},
  volume       = {3},
  number       = {4},
  pages        = {284--304},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJCCBS.2012.053207},
  doi          = {10.1504/IJCCBS.2012.053207},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijccbs/DragoniGMP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/MazzaraDZ12,
  author       = {Manuel Mazzara and
                  Nicola Dragoni and
                  Mu Zhou},
  title        = {Implementing Workflow Reconfiguration in {WS-BPEL}},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {2},
  number       = {1/2},
  pages        = {73--92},
  year         = {2012},
  url          = {https://doi.org/10.22667/JISIS.2012.02.31.073},
  doi          = {10.22667/JISIS.2012.02.31.073},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/MazzaraDZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/at/BiselliDGGMMP12,
  author       = {Luca Biselli and
                  Nicola Dragoni and
                  Emanuela Goldoni and
                  Pier Paolo Greco and
                  Antonio Marraffa and
                  Manuel Mazzara and
                  Georgios Papageorgiou},
  editor       = {Sascha Ossowski and
                  Francesca Toni and
                  George A. Vouros},
  title        = {Social Networks and Collective Intelligence - {A} Return to the Agora
                  (with the Polidoxa Shift)},
  booktitle    = {Proceedings of the First International Conference on Agreement Technologies,
                  {AT} 2012, Dubrovnik, Croatia, October 15-16, 2012},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {918},
  pages        = {347--348},
  publisher    = {CEUR-WS.org},
  year         = {2012},
  url          = {https://ceur-ws.org/Vol-918/111110347.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:23:00 +0100},
  biburl       = {https://dblp.org/rec/conf/at/BiselliDGGMMP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/inss/FafoutisD12,
  author       = {Xenofon Fafoutis and
                  Nicola Dragoni},
  title        = {Adaptive media access control for energy harvesting - Wireless sensor
                  networks},
  booktitle    = {Ninth International Conference on Networked Sensing, {INSS} 2012,
                  Antwerp, Belgium, June 11-14, 2012},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/INSS.2012.6240557},
  doi          = {10.1109/INSS.2012.6240557},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/inss/FafoutisD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/inss/FafoutisD12a,
  author       = {Xenofon Fafoutis and
                  Nicola Dragoni},
  title        = {Analytical comparison of {MAC} schemes for Energy Harvesting - Wireless
                  Sensor Networks},
  booktitle    = {Ninth International Conference on Networked Sensing, {INSS} 2012,
                  Antwerp, Belgium, June 11-14, 2012},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/INSS.2012.6240580},
  doi          = {10.1109/INSS.2012.6240580},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/inss/FafoutisD12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kesamsta/AbouzaidMMD12,
  author       = {Faisal Abouzaid and
                  John Mullins and
                  Manuel Mazzara and
                  Nicola Dragoni},
  editor       = {Gordan Jezic and
                  Mario Kusek and
                  Ngoc Thanh Nguyen and
                  Robert J. Howlett and
                  Lakhmi C. Jain},
  title        = {Modelling and Analysis of Dynamic Reconfiguration in BP-Calculus},
  booktitle    = {Agent and Multi-Agent Systems. Technologies and Applications - 6th
                  {KES} International Conference, {KES-AMSTA} 2012,Dubrovnik, Croatia,
                  June 25-27, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7327},
  pages        = {534--543},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30947-2\_58},
  doi          = {10.1007/978-3-642-30947-2\_58},
  timestamp    = {Thu, 16 Mar 2023 20:00:31 +0100},
  biburl       = {https://dblp.org/rec/conf/kesamsta/AbouzaidMMD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndt/MauroPVD12,
  author       = {Alessio Di Mauro and
                  Davide Papini and
                  Roberto Vigo and
                  Nicola Dragoni},
  editor       = {Rachid Benlamri},
  title        = {Toward a Threat Model for Energy-Harvesting Wireless Sensor Networks},
  booktitle    = {Networked Digital Technologies - 4th International Conference, {NDT}
                  2012, Dubai, UAE, April 24-26, 2012, Proceedings, Part {II}},
  series       = {Communications in Computer and Information Science},
  volume       = {294},
  pages        = {289--301},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30567-2\_24},
  doi          = {10.1007/978-3-642-30567-2\_24},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndt/MauroPVD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/peccs/MauroPD12,
  author       = {Alessio Di Mauro and
                  Davide Papini and
                  Nicola Dragoni},
  editor       = {C{\'{e}}sar Benavente{-}Peces and
                  Falah H. Ali and
                  Joaquim Filipe},
  title        = {Security Challenges for Energy-harvesting Wireless Sensor Networks},
  booktitle    = {{PECCS} 2012 - Proceedings of the 2nd International Conference on
                  Pervasive Embedded Computing and Communication Systems, Rome, Italy,
                  24-26 February, 2012},
  pages        = {422--425},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Sun, 06 May 2012 14:26:10 +0200},
  biburl       = {https://dblp.org/rec/conf/peccs/MauroPD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/JensenDBM11,
  author       = {Christian Damsgaard Jensen and
                  Nicola Dragoni and
                  Anirban Basu and
                  Clara Mancini},
  title        = {Frontiers in Trust Management},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {1},
  number       = {4},
  pages        = {1--4},
  year         = {2011},
  url          = {https://doi.org/10.22667/JISIS.2011.11.31.001},
  doi          = {10.22667/JISIS.2011.11.31.001},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/JensenDBM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apn/MazzaraADB11,
  author       = {Manuel Mazzara and
                  Faisal Abouzaid and
                  Nicola Dragoni and
                  Anirban Bhattacharyya},
  editor       = {Michael Duvigneau and
                  Daniel Moldt and
                  Kunihiko Hiraishi},
  title        = {Design, Modelling and Analysis of a Workflow Reconfiguration},
  booktitle    = {Proceedings of the International Workshop on Petri Nets and Software
                  Engineering, Newcastle upon Tyne, UK, June 20-21, 2011},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {723},
  pages        = {10--24},
  publisher    = {CEUR-WS.org},
  year         = {2011},
  url          = {https://ceur-ws.org/Vol-723/paper2.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:38 +0100},
  biburl       = {https://dblp.org/rec/conf/apn/MazzaraADB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/DragoniLPF11,
  author       = {Nicola Dragoni and
                  Eduardo Lostal and
                  Davide Papini and
                  Javier Fabra},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Pascal Lafourcade},
  title        = {{SC} 2: Secure Communication over Smart Cards - How to Secure Off-Card
                  Matching in Security-by-Contract for Open Multi-application Smart
                  Cards},
  booktitle    = {Foundations and Practice of Security - 4th Canada-France {MITACS}
                  Workshop, {FPS} 2011, Paris, France, May 12-13, 2011, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6888},
  pages        = {32--48},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27901-0\_4},
  doi          = {10.1007/978-3-642-27901-0\_4},
  timestamp    = {Fri, 27 Dec 2019 21:23:06 +0100},
  biburl       = {https://dblp.org/rec/conf/fps/DragoniLPF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pe-wasun/FafoutisD11,
  author       = {Xenofon Fafoutis and
                  Nicola Dragoni},
  editor       = {Isabelle Gu{\'{e}}rin Lassous and
                  M{\'{o}}nica Aguilar{-}Igartua and
                  Francesca Cuomo},
  title        = {{ODMAC:} an on-demand {MAC} protocol for energy harvesting - wireless
                  sensor networks},
  booktitle    = {Proceedings of the 8th {ACM} Symposium on Performance evaluation of
                  wireless ad hoc, sensor, and ubiquitous networks, {PE-WASUN} 2011,
                  Miami Beach, Florida, USA, October 31 - November 4, 2011},
  pages        = {49--56},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2069063.2069072},
  doi          = {10.1145/2069063.2069072},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pe-wasun/FafoutisD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/policy/DragoniLGMP11,
  author       = {Nicola Dragoni and
                  Eduardo Lostal and
                  Olga Gadyatskaya and
                  Fabio Massacci and
                  Federica Paci},
  title        = {A Load Time Policy Checker for Open Multi-application Smart Cards},
  booktitle    = {{POLICY} 2011, {IEEE} International Symposium on Policies for Distributed
                  Systems and Networks, Pisa, Italy, 6-8 June 2011},
  pages        = {153--156},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/POLICY.2011.40},
  doi          = {10.1109/POLICY.2011.40},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/policy/DragoniLGMP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/policy/DragoniLP11,
  author       = {Nicola Dragoni and
                  Eduardo Lostal and
                  Davide Papini},
  title        = {(SC){\({^2}\)}: {A} System to Secure Off-Card Contract-Policy Matching
                  in Security-by-Contract for Open Multi-application Smart Cards},
  booktitle    = {{POLICY} 2011, {IEEE} International Symposium on Policies for Distributed
                  Systems and Networks, Pisa, Italy, 6-8 June 2011},
  pages        = {186--187},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/POLICY.2011.22},
  doi          = {10.1109/POLICY.2011.22},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/policy/DragoniLP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wsfm/MazzaraADB11,
  author       = {Manuel Mazzara and
                  Faisal Abouzaid and
                  Nicola Dragoni and
                  Anirban Bhattacharyya},
  editor       = {Marco Carbone and
                  Jean{-}Marc Petit},
  title        = {Toward Design, Modelling and Analysis of Dynamic Workflow Reconfigurations
                  - {A} Process Algebra Perspective},
  booktitle    = {Web Services and Formal Methods - 8th International Workshop, {WS-FM}
                  2011, Clermont-Ferrand, France, September 1-2, 2011, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7176},
  pages        = {64--78},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29834-9\_6},
  doi          = {10.1007/978-3-642-29834-9\_6},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/wsfm/MazzaraADB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/CostaLMMISDM10,
  author       = {Gabriele Costa and
                  Aliaksandr Lazouski and
                  Fabio Martinelli and
                  Ilaria Matteucci and
                  Val{\'{e}}rie Issarny and
                  Rachid Saadi and
                  Nicola Dragoni and
                  Fabio Massacci},
  title        = {Security-by-Contract-with-Trust for Mobile Devices},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {1},
  number       = {4},
  pages        = {75--91},
  year         = {2010},
  url          = {https://doi.org/10.22667/JOWUA.2010.12.31.075},
  doi          = {10.22667/JOWUA.2010.12.31.075},
  timestamp    = {Tue, 05 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/CostaLMMISDM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisis/CostaDLMMM10,
  author       = {Gabriele Costa and
                  Nicola Dragoni and
                  Aliaksandr Lazouski and
                  Fabio Martinelli and
                  Fabio Massacci and
                  Ilaria Matteucci},
  editor       = {Leonard Barolli and
                  Fatos Xhafa and
                  Salvatore Vitabile and
                  Hui{-}Huang Hsu},
  title        = {Extending Security-by-Contract with Quantitative Trust on Mobile Devices},
  booktitle    = {{CISIS} 2010, The Fourth International Conference on Complex, Intelligent
                  and Software Intensive Systems, Krakow, Poland, 15-18 February 2010},
  pages        = {872--877},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CISIS.2010.33},
  doi          = {10.1109/CISIS.2010.33},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisis/CostaDLMMM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/DragoniGM10,
  author       = {Nicola Dragoni and
                  Olga Gadyatskaya and
                  Fabio Massacci},
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {Can We Support Applications' Evolution in Multi-application Smart
                  Cards by Security-by-Contract?},
  booktitle    = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  pages        = {221--228},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9\_16},
  doi          = {10.1007/978-3-642-12368-9\_16},
  timestamp    = {Fri, 27 Mar 2020 08:56:51 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/DragoniGM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1012-0522,
  author       = {Michele Mazzucco and
                  Manuel Mazzara and
                  Nicola Dragoni},
  title        = {Design of QoS-aware Provisioning Systems},
  journal      = {CoRR},
  volume       = {abs/1012.0522},
  year         = {2010},
  url          = {http://arxiv.org/abs/1012.0522},
  eprinttype    = {arXiv},
  eprint       = {1012.0522},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1012-0522.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/DragoniMS09,
  author       = {Nicola Dragoni and
                  Fabio Massacci and
                  Ayda Sa{\"{\i}}dane},
  title        = {A self-protecting and self-healing framework for negotiating services
                  and trust in autonomic communication systems},
  journal      = {Comput. Networks},
  volume       = {53},
  number       = {10},
  pages        = {1628--1648},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.comnet.2008.07.016},
  doi          = {10.1016/J.COMNET.2008.07.016},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/DragoniMS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DragoniMWS09,
  author       = {Nicola Dragoni and
                  Fabio Massacci and
                  Thomas Walter and
                  Christian Schaefer},
  title        = {What the heck is this application doing? - {A} security-by-contract
                  architecture for pervasive services},
  journal      = {Comput. Secur.},
  volume       = {28},
  number       = {7},
  pages        = {566--577},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.cose.2009.06.005},
  doi          = {10.1016/J.COSE.2009.06.005},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/DragoniMWS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jlp/BielovaDMNS09,
  author       = {Nataliia Bielova and
                  Nicola Dragoni and
                  Fabio Massacci and
                  Katsiaryna Naliuka and
                  Ida Sri Rejeki Siahaan},
  title        = {Matching in security-by-contract for mobile code},
  journal      = {J. Log. Algebraic Methods Program.},
  volume       = {78},
  number       = {5},
  pages        = {340--358},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.jlap.2009.02.013},
  doi          = {10.1016/J.JLAP.2009.02.013},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jlp/BielovaDMNS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iat/Dragoni09,
  author       = {Nicola Dragoni},
  title        = {Toward Trustworthy Web Services - Approaches, Weaknesses and Trust-By-Contract
                  Framework},
  booktitle    = {Proceedings of the 2009 {IEEE/WIC/ACM} International Conference on
                  Web Intelligence and International Conference on Intelligent Agent
                  Technology - Workshops, Milan, Italy, 15-18 September 2009},
  pages        = {599--606},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/WI-IAT.2009.359},
  doi          = {10.1109/WI-IAT.2009.359},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iat/Dragoni09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/prima/Dragoni09,
  author       = {Nicola Dragoni},
  editor       = {Jung{-}Jin Yang and
                  Makoto Yokoo and
                  Takayuki Ito and
                  Zhi Jin and
                  Paul Scerri},
  title        = {Where Are All the Agents? On the Gap between Theory and Practice of
                  Agent-Based Referral Networks},
  booktitle    = {Principles of Practice in Multi-Agent Systems, 12th International
                  Conference, {PRIMA} 2009, Nagoya, Japan, December 14-16, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5925},
  pages        = {508--515},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-11161-7\_36},
  doi          = {10.1007/978-3-642-11161-7\_36},
  timestamp    = {Wed, 08 Sep 2021 09:45:06 +0200},
  biburl       = {https://dblp.org/rec/conf/prima/Dragoni09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wsfm/DragoniM09,
  author       = {Nicola Dragoni and
                  Manuel Mazzara},
  editor       = {Cosimo Laneve and
                  Jianwen Su},
  title        = {A Formal Semantics for the {WS-BPEL} Recovery Framework - The \emph{pi}-Calculus
                  Way},
  booktitle    = {Web Services and Formal Methods, 6th International Workshop, {WS-FM}
                  2009, Bologna, Italy, September 4-5, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6194},
  pages        = {92--109},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14458-5\_6},
  doi          = {10.1007/978-3-642-14458-5\_6},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/wsfm/DragoniM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/BielovaTDS08,
  author       = {Nataliia Bielova and
                  Marco Dalla Torre and
                  Nicola Dragoni and
                  Ida Sri Rejeki Siahaan},
  title        = {Matching Policies with Security Claims of Mobile Applications},
  booktitle    = {Proceedings of the The Third International Conference on Availability,
                  Reliability and Security, {ARES} 2008, March 4-7, 2008, Technical
                  University of Catalonia, Barcelona , Spain},
  pages        = {128--135},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ARES.2008.96},
  doi          = {10.1109/ARES.2008.96},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/BielovaTDS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifiptm/DragoniMN08,
  author       = {Nicola Dragoni and
                  Fabio Massacci and
                  Katsiaryna Naliuka},
  editor       = {Y{\"{u}}cel Karabulut and
                  John Mitchell and
                  Peter Herrmann and
                  Christian Damsgaard Jensen},
  title        = {An Inline Monitoring System for .NET Mobile Devices},
  booktitle    = {Trust Management {II} - Proceedings of {IFIPTM} 2008: Joint iTrust
                  and {PST} Conferences on Privacy, Trust Management and Security, June
                  18-20, 2008, Trondheim, Norway},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {263},
  pages        = {363--366},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09428-1\_24},
  doi          = {10.1007/978-0-387-09428-1\_24},
  timestamp    = {Fri, 09 Apr 2021 18:43:37 +0200},
  biburl       = {https://dblp.org/rec/conf/ifiptm/DragoniMN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aai/DragoniGG07,
  author       = {Nicola Dragoni and
                  Mauro Gaspari and
                  Davide Guidi},
  title        = {An {ACL} for Specifying Fault-Tolerant Protocols},
  journal      = {Appl. Artif. Intell.},
  volume       = {21},
  number       = {4{\&}5},
  pages        = {361--381},
  year         = {2007},
  url          = {https://doi.org/10.1080/08839510701252643},
  doi          = {10.1080/08839510701252643},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/aai/DragoniGG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europki/DragoniMNS07,
  author       = {Nicola Dragoni and
                  Fabio Massacci and
                  Katsiaryna Naliuka and
                  Ida Sri Rejeki Siahaan},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati and
                  Josep L. Ferrer},
  title        = {Security-by-Contract: Toward a Semantics for Digital Signatures on
                  Mobile Code},
  booktitle    = {Public Key Infrastructure, 4th European {PKI} Workshop: Theory and
                  Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4582},
  pages        = {297--312},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73408-6\_21},
  doi          = {10.1007/978-3-540-73408-6\_21},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/europki/DragoniMNS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secperu/DragoniMSWV07,
  author       = {Nicola Dragoni and
                  Fabio Massacci and
                  Christian Schaefer and
                  Thomas Walter and
                  Eric V{\'{e}}tillard},
  editor       = {Panagiotis Georgiadis and
                  Javier L{\'{o}}pez and
                  Stefanos Gritzalis and
                  Giannis F. Marias},
  title        = {A Security-by-Contract Architecture for Pervasive Services},
  booktitle    = {Third International Workshop on Security, Privacy and Trust in Pervasive
                  and Ubiquitous Computing, SECPerU 2007, Istanbul, Turkey, July 19,
                  2007},
  pages        = {49--54},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/SECPERU.2007.2},
  doi          = {10.1109/SECPERU.2007.2},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secperu/DragoniMSWV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sgai/BarzantiDEG07,
  author       = {Luca Barzanti and
                  Nicola Dragoni and
                  Andrea Degli Esposti and
                  Mauro Gaspari},
  editor       = {Richard Ellis and
                  Tony Allen and
                  Miltos Petridis},
  title        = {Decision Making in Fund Raising Management: a Knowledge Based Approach},
  booktitle    = {Applications and Innovations in Intelligent Systems {XV} - Proceedings
                  of AI-2007, the Twenty-seventh {SGAI} International Conference on
                  Innovative Techniques and Applications of Artificial Intelligence,
                  Cambridge, UK, 10-12 December 2007},
  pages        = {189--201},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-1-84800-086-5\_14},
  doi          = {10.1007/978-1-84800-086-5\_14},
  timestamp    = {Thu, 14 Mar 2019 13:50:05 +0100},
  biburl       = {https://dblp.org/rec/conf/sgai/BarzantiDEG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sws/DragoniM07,
  author       = {Nicola Dragoni and
                  Fabio Massacci},
  editor       = {Peng Ning and
                  Ernesto Damiani and
                  Seth Proctor},
  title        = {Security-by-contract for web services},
  booktitle    = {Proceedings of the 4th {ACM} Workshop On Secure Web Services, {SWS}
                  2007, Fairfax, VA, USA, November 2, 2007},
  pages        = {90--98},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1314418.1314433},
  doi          = {10.1145/1314418.1314433},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sws/DragoniM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/it/Dragoni06,
  author       = {Nicola Dragoni},
  title        = {Fault tolerant knowledge level inter-agent communication in open multi-agent
                  systems},
  school       = {University of Bologna, Italy},
  year         = {2006},
  url          = {https://opac.bncf.firenze.sbn.it/bncf-prod/resource?uri=BNI0021493},
  timestamp    = {Thu, 27 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/it/Dragoni06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aamas/DragoniG06,
  author       = {Nicola Dragoni and
                  Mauro Gaspari},
  title        = {Crash failure detection in asynchronous agent communication languages},
  journal      = {Auton. Agents Multi Agent Syst.},
  volume       = {13},
  number       = {3},
  pages        = {355--390},
  year         = {2006},
  url          = {https://doi.org/10.1007/s10458-006-0006-y},
  doi          = {10.1007/S10458-006-0006-Y},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/aamas/DragoniG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aicom/Dragoni06,
  author       = {Nicola Dragoni},
  title        = {Fault tolerant knowledge level inter-agent communication in open Multi-Agent
                  Systems},
  journal      = {{AI} Commun.},
  volume       = {19},
  number       = {4},
  pages        = {385--387},
  year         = {2006},
  url          = {http://content.iospress.com/articles/ai-communications/aic378},
  timestamp    = {Fri, 15 May 2015 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/aicom/Dragoni06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/apin/DragoniGG06,
  author       = {Nicola Dragoni and
                  Mauro Gaspari and
                  Davide Guidi},
  title        = {An infrastructure to support cooperation of knowledge-level agents
                  on the semantic Grid},
  journal      = {Appl. Intell.},
  volume       = {25},
  number       = {2},
  pages        = {159--180},
  year         = {2006},
  url          = {https://doi.org/10.1007/s10489-006-9652-7},
  doi          = {10.1007/S10489-006-9652-7},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/apin/DragoniGG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acom/DragoniGG06,
  author       = {Nicola Dragoni and
                  Mauro Gaspari and
                  Davide Guidi},
  editor       = {Frank Dignum and
                  Rogier M. van Eijk and
                  Roberto A. Flores},
  title        = {A Fault Tolerant Agent Communication Language for Supporting Web Agent
                  Interaction},
  booktitle    = {Agent Communication II, International Workshops on Agent Communication,
                  {AC} 2005 and {AC} 2006, Utrecht, Netherlands, July 25, 2005 and Hakodate,
                  Japan, May 9, 2006, Selected and Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3859},
  pages        = {273--288},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-68143-4\_19},
  doi          = {10.1007/978-3-540-68143-4\_19},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acom/DragoniGG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cia/DragoniG06,
  author       = {Nicola Dragoni and
                  Mauro Gaspari},
  editor       = {Matthias Klusch and
                  Michael Rovatsos and
                  Terry R. Payne},
  title        = {Performative Patterns for Designing Verifiable ACLs},
  booktitle    = {Cooperative Information Agents X, 10th International Workshop, {CIA}
                  2006, Edinburgh, UK, September 11-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4149},
  pages        = {375--387},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11839354\_27},
  doi          = {10.1007/11839354\_27},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/cia/DragoniG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jlp/DragoniG05,
  author       = {Nicola Dragoni and
                  Mauro Gaspari},
  title        = {An object based algebra for specifying a fault tolerant software architecture},
  journal      = {J. Log. Algebraic Methods Program.},
  volume       = {63},
  number       = {2},
  pages        = {271--297},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.jlap.2004.05.006},
  doi          = {10.1016/J.JLAP.2004.05.006},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jlp/DragoniG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aiia/DragoniGG05,
  author       = {Nicola Dragoni and
                  Mauro Gaspari and
                  Davide Guidi},
  editor       = {Stefania Bandini and
                  Sara Manzoni},
  title        = {An {ACL} for Specifying Fault-Tolerant Protocols},
  booktitle    = {AI*IA 2005: Advances in Artificial Intelligence, 9th Congress of the
                  Italian Association for Artificial Intelligence, Milan, Italy, September
                  21-23, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3673},
  pages        = {237--248},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11558590\_24},
  doi          = {10.1007/11558590\_24},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aiia/DragoniGG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/flairs/DragoniGG05,
  author       = {Nicola Dragoni and
                  Mauro Gaspari and
                  Davide Guidi},
  editor       = {Ingrid Russell and
                  Zdravko Markov},
  title        = {Integrating Knowledge-Level Agents in the (Semantic) Web: An Agent-based
                  Open Service Architecture},
  booktitle    = {Proceedings of the Eighteenth International Florida Artificial Intelligence
                  Research Society Conference, Clearwater Beach, Florida, {USA}},
  pages        = {320--325},
  publisher    = {{AAAI} Press},
  year         = {2005},
  url          = {http://www.aaai.org/Library/FLAIRS/2005/flairs05-053.php},
  timestamp    = {Wed, 26 Oct 2022 08:35:28 +0200},
  biburl       = {https://dblp.org/rec/conf/flairs/DragoniGG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/swap/DragoniGG05,
  author       = {Nicola Dragoni and
                  Mauro Gaspari and
                  Davide Guidi},
  editor       = {Paolo Bouquet and
                  Giovanni Tummarello},
  title        = {{NOWHERE} - An Open Service Architecture to support Agents and Services
                  within the Semantic Web},
  booktitle    = {{SWAP} 2005 - Semantic Web Applications and Perspectives, Proceedings
                  of the 2nd Italian Semantic Web Workshop, University of Trento, Trento,
                  Italy, 14-16 December 2005},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {166},
  publisher    = {CEUR-WS.org},
  year         = {2005},
  url          = {https://ceur-ws.org/Vol-166/45.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:23:20 +0100},
  biburl       = {https://dblp.org/rec/conf/swap/DragoniGG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wm/DragoniGG05,
  author       = {Nicola Dragoni and
                  Mauro Gaspari and
                  Davide Guidi},
  editor       = {Klaus{-}Dieter Althoff and
                  Andreas Dengel and
                  Ralph Bergmann and
                  Markus Nick and
                  Thomas Roth{-}Berghofer},
  title        = {A Peer-to-Peer Knowledge Level Open Service Architecture},
  booktitle    = {{WM} 2005: Professional Knowledge Management - Experiences and Visions,
                  Contributions to the 3rd Conference Professional Knowledge Management
                  - Experiences and Visions, April 10-13, 2005, Kaiserslautern, Germany},
  pages        = {195--201},
  publisher    = {DFKI, Kaiserslautern},
  year         = {2005},
  timestamp    = {Fri, 13 Sep 2019 15:47:23 +0200},
  biburl       = {https://dblp.org/rec/conf/wm/DragoniGG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics