Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Nicola Dragoni
@article{DBLP:journals/compsec/KonstaLSD24a, author = {Alyzia Maria Konsta and Alberto Lluch{-}Lafuente and Beatrice Spiga and Nicola Dragoni}, title = {Survey: Automatic generation of attack trees and attack graphs}, journal = {Comput. Secur.}, volume = {137}, pages = {103602}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103602}, doi = {10.1016/J.COSE.2023.103602}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/KonstaLSD24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KonstaLSD24, author = {Alyzia Maria Konsta and Alberto Lluch{-}Lafuente and Beatrice Spiga and Nicola Dragoni}, title = {Corrigendum to "Survey: Automatic generation of attack trees and attack graphs" [Computers {\&} Security Volume 137, February 2024, 103602]}, journal = {Comput. Secur.}, volume = {138}, pages = {103660}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103660}, doi = {10.1016/J.COSE.2023.103660}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/KonstaLSD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/KonstaLD23, author = {Alyzia Maria Konsta and Alberto Lluch{-}Lafuente and Nicola Dragoni}, title = {A Survey of Trust Management for Internet of Things}, journal = {{IEEE} Access}, volume = {11}, pages = {122175--122204}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3327335}, doi = {10.1109/ACCESS.2023.3327335}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/KonstaLD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jot/BucchiaroneCSDP23, author = {Antonio Bucchiarone and Claudiu{-}Bogdan Ciumedean and Kemal Soysal and Nicola Dragoni and V{\'{a}}clav Pech}, title = {MaGiC: a {DSL} Framework for Implementing Language Agnostic Microservice-based Web Applications}, journal = {J. Object Technol.}, volume = {22}, number = {1}, pages = {1--21}, year = {2023}, url = {https://doi.org/10.5381/jot.2023.22.1.a2}, doi = {10.5381/JOT.2023.22.1.A2}, timestamp = {Wed, 21 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jot/BucchiaroneCSDP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/LiVDD23, author = {Ziru Li and Simon Nam Thanh Vu and Nicola Dragoni and Kevin Doherty}, editor = {Albrecht Schmidt and Kaisa V{\"{a}}{\"{a}}n{\"{a}}nen and Tesh Goyal and Per Ola Kristensson and Anicia Peters}, title = {Accomplishing More With Less: The Practice of Cybersecure Health Technology Design Among Danish Startups}, booktitle = {Extended Abstracts of the 2023 {CHI} Conference on Human Factors in Computing Systems, {CHI} {EA} 2023, Hamburg, Germany, April 23-28, 2023}, pages = {21:1--21:8}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3544549.3585597}, doi = {10.1145/3544549.3585597}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/LiVDD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2022w2, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Guillermo Navarro{-}Arribas and Nicola Dragoni}, title = {Data Privacy Management, Cryptocurrencies and Blockchain Technology - {ESORICS} 2022 International Workshops, {DPM} 2022 and {CBT} 2022, Copenhagen, Denmark, September 26-30, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13619}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-25734-6}, doi = {10.1007/978-3-031-25734-6}, isbn = {978-3-031-25733-9}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/2022w2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-14479, author = {Alyzia Maria Konsta and Beatrice Spiga and Alberto Lluch{-}Lafuente and Nicola Dragoni}, title = {A Survey of Automatic Generation of Attack Trees and Attack Graphs}, journal = {CoRR}, volume = {abs/2302.14479}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.14479}, doi = {10.48550/ARXIV.2302.14479}, eprinttype = {arXiv}, eprint = {2302.14479}, timestamp = {Thu, 02 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-14479.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fi/DangiJCDML22, author = {Ramraj Dangi and Akshay Jadhav and Gaurav Choudhary and Nicola Dragoni and Manas Kumar Mishra and Praveen Lalwani}, title = {ML-Based 5G Network Slicing Security: {A} Comprehensive Survey}, journal = {Future Internet}, volume = {14}, number = {4}, pages = {116}, year = {2022}, url = {https://doi.org/10.3390/fi14040116}, doi = {10.3390/FI14040116}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fi/DangiJCDML22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/DonnoFD22, author = {Michele De Donno and Xenofon Fafoutis and Nicola Dragoni}, title = {AntibIoTic: The Fog-enhanced distributed security system to protect the (legacy) Internet of Things}, journal = {J. Comput. Secur.}, volume = {30}, number = {5}, pages = {689--725}, year = {2022}, url = {https://doi.org/10.3233/JCS-210027}, doi = {10.3233/JCS-210027}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/DonnoFD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/ChoudharyCPKLD22, author = {Arjun Choudhary and Gaurav Choudhary and Kapil Pareek and Chetanya Kunndra and Jatin Luthra and Nicola Dragoni}, title = {Emerging Cyber Security Challenges after {COVID} Pandemic: {A} Survey}, journal = {J. Internet Serv. Inf. Secur.}, volume = {12}, number = {2}, pages = {21--50}, year = {2022}, url = {https://doi.org/10.22667/JISIS.2022.05.31.021}, doi = {10.22667/JISIS.2022.05.31.021}, timestamp = {Tue, 04 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/ChoudharyCPKLD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/VelumaniSCBJD22, author = {Ramesh Velumani and Hariharasitaraman Sudalaimuthu and Gaurav Choudhary and Srinivasan Bama and Maranthiran Victor Jose and Nicola Dragoni}, title = {Secured Secret Sharing of {QR} Codes Based on Nonnegative Matrix Factorization and Regularized Super Resolution Convolutional Neural Network}, journal = {Sensors}, volume = {22}, number = {8}, pages = {2959}, year = {2022}, url = {https://doi.org/10.3390/s22082959}, doi = {10.3390/S22082959}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/VelumaniSCBJD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/DushkuOD22, author = {Edlira Dushku and Jeppe Hagelskj{\ae}r {\O}stergaard and Nicola Dragoni}, title = {Memory Offloading for Remote Attestation of Multi-Service IoT Devices}, journal = {Sensors}, volume = {22}, number = {12}, pages = {4340}, year = {2022}, url = {https://doi.org/10.3390/s22124340}, doi = {10.3390/S22124340}, timestamp = {Mon, 26 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/DushkuOD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosn/GiarettaDM22, author = {Alberto Giaretta and Nicola Dragoni and Fabio Massacci}, title = {S{\texttimes}C4IoT: {A} Security-by-contract Framework for Dynamic Evolving IoT Devices}, journal = {{ACM} Trans. Sens. Networks}, volume = {18}, number = {1}, pages = {12:1--12:51}, year = {2022}, url = {https://doi.org/10.1145/3480462}, doi = {10.1145/3480462}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosn/GiarettaDM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisec2/JaiswalSCD22, author = {Shashank Jaiswal and Vikas Sihag and Gaurav Choudhary and Nicola Dragoni}, editor = {Ilsun You and Hwankuk Kim and Pelin Angin}, title = {DyBAnd: Dynamic Behavior Based Android Malware Detection}, booktitle = {Mobile Internet Security - 6th International Symposium, MobiSec 2022, Jeju, South Korea, December 15-17, 2022, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1644}, pages = {209--219}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-99-4430-9\_15}, doi = {10.1007/978-981-99-4430-9\_15}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobisec2/JaiswalSCD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/CastilloHACD22, author = {Mathew Del Castillo and Harvey Hermosa and Philip Virgil Astillo and Gaurav Choudhary and Nicola Dragoni}, editor = {Ilsun You and Taek{-}Young Youn}, title = {Software-Defined Network Based Secure Internet-Enabled Video Surveillance System}, booktitle = {Information Security Applications - 23rd International Conference, {WISA} 2022, Jeju Island, South Korea, August 24-26, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13720}, pages = {89--101}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-25659-2\_7}, doi = {10.1007/978-3-031-25659-2\_7}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/CastilloHACD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2211-01712, author = {Alyzia Maria Konsta and Alberto Lluch{-}Lafuente and Nicola Dragoni}, title = {Trust Management for Internet of Things: {A} Systematic Literature Review}, journal = {CoRR}, volume = {abs/2211.01712}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2211.01712}, doi = {10.48550/ARXIV.2211.01712}, eprinttype = {arXiv}, eprint = {2211.01712}, timestamp = {Fri, 04 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2211-01712.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HalldorssonDD21, author = {Ragnar Mikael Halld{\'{o}}rsson and Edlira Dushku and Nicola Dragoni}, title = {{ARCADIS:} Asynchronous Remote Control-Flow Attestation of Distributed IoT Services}, journal = {{IEEE} Access}, volume = {9}, pages = {144880--144894}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3122391}, doi = {10.1109/ACCESS.2021.3122391}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/HalldorssonDD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fi/VuSEBD21, author = {Simon Nam Thanh Vu and Mads Stege and Peter Issam El{-}Habr and Jesper Bang and Nicola Dragoni}, title = {A Survey on Botnets: Incentives, Evolution, Detection and Current Trends}, journal = {Future Internet}, volume = {13}, number = {8}, pages = {198}, year = {2021}, url = {https://doi.org/10.3390/fi13080198}, doi = {10.3390/FI13080198}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fi/VuSEBD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/health/KumarJBD21, author = {Devender Kumar and Steven Jeuris and Jakob E. Bardram and Nicola Dragoni}, title = {Mobile and Wearable Sensing Frameworks for mHealth Studies and Applications: {A} Systematic Review}, journal = {{ACM} Trans. Comput. Heal.}, volume = {2}, number = {1}, pages = {8:1--8:28}, year = {2021}, url = {https://doi.org/10.1145/3422158}, doi = {10.1145/3422158}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/health/KumarJBD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/DragoniLMS21, author = {Nicola Dragoni and Alberto Lluch{-}Lafuente and Fabio Massacci and Anders Schlichtkrull}, title = {Are We Preparing Students to Build Security In? {A} Survey of European Cybersecurity in Higher Education Programs [Education]}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {1}, pages = {81--88}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2020.3037446}, doi = {10.1109/MSEC.2020.3037446}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/DragoniLMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jot/BjorndalABDMD21, author = {Nichlas Bj{\o}rndal and Luiz Jonat{\~{a}} Pires de Ara{\'{u}}jo and Antonio Bucchiarone and Nicola Dragoni and Manuel Mazzara and Schahram Dustdar}, title = {Benchmarks and performance metrics for assessing the migration to microservice-based architectures}, journal = {J. Object Technol.}, volume = {20}, number = {2}, pages = {3:1--17}, year = {2021}, url = {https://doi.org/10.5381/jot.2021.20.2.a3}, doi = {10.5381/JOT.2021.20.2.A3}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jot/BjorndalABDMD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/AnkergardDD21, author = {Sigurd Frej Joel J{\o}rgensen Ankerg{\aa}rd and Edlira Dushku and Nicola Dragoni}, title = {State-of-the-Art Software-Based Remote Attestation: Opportunities and Open Issues for Internet of Things}, journal = {Sensors}, volume = {21}, number = {5}, pages = {1598}, year = {2021}, url = {https://doi.org/10.3390/s21051598}, doi = {10.3390/S21051598}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/AnkergardDD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/TangeMLFD21, author = {Koen Tange and Sebastian M{\"{o}}dersheim and Apostolos Lalos and Xenofon Fafoutis and Nicola Dragoni}, title = {rTLS: Secure and Efficient {TLS} Session Resumption for the Internet of Things}, journal = {Sensors}, volume = {21}, number = {19}, pages = {6524}, year = {2021}, url = {https://doi.org/10.3390/s21196524}, doi = {10.3390/S21196524}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/TangeMLFD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/MazzaraDBGLD21, author = {Manuel Mazzara and Nicola Dragoni and Antonio Bucchiarone and Alberto Giaretta and Stephan Thordal Larsen and Schahram Dustdar}, title = {Microservices: Migration of a Mission Critical System}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {14}, number = {5}, pages = {1464--1477}, year = {2021}, url = {https://doi.org/10.1109/TSC.2018.2889087}, doi = {10.1109/TSC.2018.2889087}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsc/MazzaraDBGLD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csr2/OstergaardDD21, author = {Jeppe Hagelskj{\ae}r {\O}stergaard and Edlira Dushku and Nicola Dragoni}, title = {{ERAMO:} Effective Remote Attestation through Memory Offloading}, booktitle = {{IEEE} International Conference on Cyber Security and Resilience, {CSR} 2021, Rhodes, Greece, July 26-28, 2021}, pages = {73--80}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CSR51186.2021.9527978}, doi = {10.1109/CSR51186.2021.9527978}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csr2/OstergaardDD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/AnkergardDD21, author = {Sigurd Frej Joel J{\o}rgensen Ankerg{\aa}rd and Edlira Dushku and Nicola Dragoni}, editor = {Esma A{\"{\i}}meur and Maryline Laurent and Reda Yaich and Beno{\^{\i}}t Dupont and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {{PERMANENT:} Publicly Verifiable Remote Attestation for Internet of Things Through Blockchain}, booktitle = {Foundations and Practice of Security - 14th International Symposium, {FPS} 2021, Paris, France, December 7-10, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13291}, pages = {218--234}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-08147-7\_15}, doi = {10.1007/978-3-031-08147-7\_15}, timestamp = {Tue, 28 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fps/AnkergardDD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccel/TosunDDF21, author = {Altug Tosun and Michele De Donno and Nicola Dragoni and Xenofon Fafoutis}, title = {{RESIP} Host Detection: Identification of Malicious Residential {IP} Proxy Flows}, booktitle = {{IEEE} International Conference on Consumer Electronics, {ICCE} 2021, Las Vegas, NV, USA, January 10-12, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICCE50685.2021.9427688}, doi = {10.1109/ICCE50685.2021.9427688}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccel/TosunDDF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isorc/KyriakakisTRZFS21, author = {Eleftherios Kyriakakis and Koen Tange and Niklas Reusch and Eder Ollora Zaballa and Xenofon Fafoutis and Martin Schoeberl and Nicola Dragoni}, title = {Fault-tolerant Clock Synchronization using Precise Time Protocol Multi-Domain Aggregation}, booktitle = {24th {IEEE} International Symposium on Real-Time Distributed Computing, {ISORC} 2021, Daegu, South Korea, June 1-3, 2021}, pages = {114--122}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISORC52013.2021.00025}, doi = {10.1109/ISORC52013.2021.00025}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isorc/KyriakakisTRZFS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sensys/RabbaniDVBDM21, author = {Md Masoom Rabbani and Edlira Dushku and Jo Vliegen and An Braeken and Nicola Dragoni and Nele Mentens}, editor = {Jorge S{\'{a}} Silva and Fernando Boavida and Andr{\'{e}} Rodrigues and Andrew Markham and Rong Zheng}, title = {{RESERVE:} Remote Attestation of Intermittent IoT devices}, booktitle = {SenSys '21: The 19th {ACM} Conference on Embedded Networked Sensor Systems, Coimbra, Portugal, November 15 - 17, 2021}, pages = {578--580}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485730.3493364}, doi = {10.1145/3485730.3493364}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sensys/RabbaniDVBDM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@misc{DBLP:data/10/DragoniMLS21, author = {Nicola Dragoni and Fabio Massacci and Alberto Lluch{-}Lafuente and Anders Schlichtkrull}, title = {A Survey of European Cybersecurity in Higher Education Programs}, publisher = {{IEEE} DataPort}, year = {2021}, month = jul, howpublished = {\url{https://doi.org/10.21227/b5y0-4243}}, note = {Accessed on YYYY-MM-DD.}, url = {https://doi.org/10.21227/b5y0-4243}, doi = {10.21227/B5Y0-4243}, timestamp = {Wed, 15 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/data/10/DragoniMLS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/GonczolKHD20, author = {Peter Gonczol and Panagiota Katsikouli and Lasse Herskind and Nicola Dragoni}, title = {Blockchain Implementations and Use Cases for Supply Chains-A Survey}, journal = {{IEEE} Access}, volume = {8}, pages = {11856--11871}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2964880}, doi = {10.1109/ACCESS.2020.2964880}, timestamp = {Fri, 07 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/GonczolKHD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HerskindKD20, author = {Lasse Herskind and Panagiota Katsikouli and Nicola Dragoni}, title = {Privacy and Cryptocurrencies - {A} Systematic Literature Review}, journal = {{IEEE} Access}, volume = {8}, pages = {54044--54059}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2980950}, doi = {10.1109/ACCESS.2020.2980950}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/HerskindKD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/TangeDFD20, author = {Koen Tange and Michele De Donno and Xenofon Fafoutis and Nicola Dragoni}, title = {A Systematic Survey of Industrial Internet of Things Security: Requirements and Fog Computing Opportunities}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {22}, number = {4}, pages = {2489--2520}, year = {2020}, url = {https://doi.org/10.1109/COMST.2020.3011208}, doi = {10.1109/COMST.2020.3011208}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsur/TangeDFD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/HerskindGDD20, author = {Lasse Herskind and Alberto Giaretta and Michele De Donno and Nicola Dragoni}, title = {BitFlow: Enabling real-time cash-flow evaluations through blockchain}, journal = {Concurr. Comput. Pract. Exp.}, volume = {32}, number = {12}, year = {2020}, url = {https://doi.org/10.1002/cpe.5333}, doi = {10.1002/CPE.5333}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/HerskindGDD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/HerskindKD20, author = {Lasse Herskind and Panagiota Katsikouli and Nicola Dragoni}, title = {Oscausi - Practical Private Electronic Cash from Lelantus and MimbleWimble}, journal = {J. Internet Serv. Inf. Secur.}, volume = {10}, number = {2}, pages = {16--34}, year = {2020}, url = {https://doi.org/10.22667/JISIS.2020.05.31.016}, doi = {10.22667/JISIS.2020.05.31.016}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisis/HerskindKD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/TangeHSPFD20, author = {Koen Tange and David Howard and Travis Shanahan and Stefano Pepe and Xenofon Fafoutis and Nicola Dragoni}, editor = {Weizhi Meng and Dieter Gollmann and Christian Damsgaard Jensen and Jianying Zhou}, title = {rTLS: Lightweight {TLS} Session Resumption for Constrained IoT Devices}, booktitle = {Information and Communications Security - 22nd International Conference, {ICICS} 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12282}, pages = {243--258}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-61078-4\_14}, doi = {10.1007/978-3-030-61078-4\_14}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/TangeHSPFD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/openidentity/Matthiasson0D20, author = {Gu{\dh}ni Matth{\'{\i}}asson and Alberto Giaretta and Nicola Dragoni}, editor = {Heiko Ro{\ss}nagel and Christian H. Schunck and Sebastian M{\"{o}}dersheim and Detlef H{\"{u}}hnlein}, title = {IoT Device Profiling: From {MUD} Files to S{\texttimes}C Contracts}, booktitle = {Open Identity Summit 2020, 26. - 27.05.2020, Copenhagen, Denmark}, series = {{LNI}}, volume = {{P-305}}, pages = {143--154}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2020}, url = {https://doi.org/10.18420/ois2020\_12}, doi = {10.18420/OIS2020\_12}, timestamp = {Tue, 12 Jan 2021 16:08:46 +0100}, biburl = {https://dblp.org/rec/conf/openidentity/Matthiasson0D20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wf-iot/BejderMDDF20, author = {Emil Bejder and Adam Krog Mathiasen and Michele De Donno and Nicola Dragoni and Xenofon Fafoutis}, title = {{SHAKE:} SHared Acceleration Key Establishment for Resource-Constrained IoT Devices}, booktitle = {6th {IEEE} World Forum on Internet of Things, WF-IoT 2020, New Orleans, LA, USA, June 2-16, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/WF-IoT48130.2020.9221263}, doi = {10.1109/WF-IOT48130.2020.9221263}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wf-iot/BejderMDDF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/20/MazzaraBDR20, author = {Manuel Mazzara and Antonio Bucchiarone and Nicola Dragoni and Victor Rivera}, editor = {Antonio Bucchiarone and Nicola Dragoni and Schahram Dustdar and Patricia Lago and Manuel Mazzara and Victor Rivera and Andrey Sadovykh}, title = {Size Matters: Microservices Research and Applications}, booktitle = {Microservices, Science and Engineering}, pages = {29--42}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-31646-4\_2}, doi = {10.1007/978-3-030-31646-4\_2}, timestamp = {Mon, 05 Feb 2024 20:35:54 +0100}, biburl = {https://dblp.org/rec/books/sp/20/MazzaraBDR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/20/BDDL2020, editor = {Antonio Bucchiarone and Nicola Dragoni and Schahram Dustdar and Patricia Lago and Manuel Mazzara and Victor Rivera and Andrey Sadovykh}, title = {Microservices, Science and Engineering}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-31646-4}, doi = {10.1007/978-3-030-31646-4}, isbn = {978-3-030-31645-7}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/20/BDDL2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/DonnoTD19, author = {Michele De Donno and Koen Tange and Nicola Dragoni}, title = {Foundations and Evolution of Modern Computing Paradigms: Cloud, IoT, Edge, and Fog}, journal = {{IEEE} Access}, volume = {7}, pages = {150936--150948}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2947652}, doi = {10.1109/ACCESS.2019.2947652}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/DonnoTD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fi/DonnoGDBM19, author = {Michele De Donno and Alberto Giaretta and Nicola Dragoni and Antonio Bucchiarone and Manuel Mazzara}, title = {Cyber-Storms Come from Clouds: Security of Cloud Computing in the IoT Era}, journal = {Future Internet}, volume = {11}, number = {6}, pages = {127}, year = {2019}, url = {https://doi.org/10.3390/fi11060127}, doi = {10.3390/FI11060127}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fi/DonnoGDBM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/GiarettaDM19, author = {Alberto Giaretta and Nicola Dragoni and Fabio Massacci}, title = {IoT Security Configurability with Security-by-Contract}, journal = {Sensors}, volume = {19}, number = {19}, pages = {4121}, year = {2019}, url = {https://doi.org/10.3390/s19194121}, doi = {10.3390/S19194121}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/GiarettaDM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/DonnoFD19, author = {Michele De Donno and Juan Manuel Donaire Felipe and Nicola Dragoni}, title = {{ANTIBIOTIC} 2.0: {A} Fog-based Anti-Malware for Internet of Things}, booktitle = {2019 {IEEE} European Symposium on Security and Privacy Workshops, EuroS{\&}P Workshops 2019, Stockholm, Sweden, June 17-19, 2019}, pages = {11--20}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EuroSPW.2019.00008}, doi = {10.1109/EUROSPW.2019.00008}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/DonnoFD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icfec/DonnoD19, author = {Michele De Donno and Nicola Dragoni}, title = {Combining AntibIoTic with Fog Computing: AntibIoTic 2.0}, booktitle = {3rd {IEEE} International Conference on Fog and Edge Computing, {ICFEC} 2019, Larnaca, Cyprus, May 14-17, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CFEC.2019.8733144}, doi = {10.1109/CFEC.2019.8733144}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icfec/DonnoD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iotdi/TangeDFD19, author = {Koen Tange and Michele De Donno and Xenofon Fafoutis and Nicola Dragoni}, editor = {Paul Pop and Karl{-}Erik {\AA}rz{\'{e}}n}, title = {Towards a systematic survey of industrial IoT security requirements: research method and quantitative analysis}, booktitle = {Proceedings of the Workshop on Fog Computing and the IoT, IoT-Fog@IoTDI 2019, Montreal, QC, Canada, April 15, 2019}, pages = {56--63}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3313150.3313228}, doi = {10.1145/3313150.3313228}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iotdi/TangeDFD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartnets/DonnoMFDPBR19, author = {Michele De Donno and Krzysztof Mateusz Malarski and Xenofon Fafoutis and Nicola Dragoni and Martin Nordal Petersen and Michael St{\"{u}}bert Berger and Sarah Ruepp}, title = {Sustainable Security for Internet of Things}, booktitle = {International Conference on Smart Applications, Communications and Networking, SmartNets 2019, Sharm El Sheik, Egypt, December 17-19, 2019}, pages = {1--4}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SmartNets48225.2019.9069776}, doi = {10.1109/SMARTNETS48225.2019.9069776}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/smartnets/DonnoMFDPBR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tools/GiarettaPD19, author = {Alberto Giaretta and Stefano Pepe and Nicola Dragoni}, editor = {Manuel Mazzara and Jean{-}Michel Bruel and Bertrand Meyer and Alexander K. Petrenko}, title = {UniquID: {A} Quest to Reconcile Identity Access Management and the IoT}, booktitle = {Software Technology: Methods and Tools - 51st International Conference, {TOOLS} 2019, Tatarstan, Russia, October 15-17, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11771}, pages = {237--251}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29852-4\_20}, doi = {10.1007/978-3-030-29852-4\_20}, timestamp = {Wed, 24 Jun 2020 11:26:48 +0200}, biburl = {https://dblp.org/rec/conf/tools/GiarettaPD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wf-iot/GiarettaDM19, author = {Alberto Giaretta and Nicola Dragoni and Fabio Massacci}, title = {Protecting the Internet of Things with Security-by-Contract and Fog Computing}, booktitle = {5th {IEEE} World Forum on Internet of Things, WF-IoT 2019, Limerick, Ireland, April 15-18, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/WF-IoT.2019.8767243}, doi = {10.1109/WF-IOT.2019.8767243}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wf-iot/GiarettaDM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1904-03027, author = {Manuel Mazzara and Antonio Bucchiarone and Nicola Dragoni and Victor Rivera}, title = {Size Matters: Microservices Research and Applications}, journal = {CoRR}, volume = {abs/1904.03027}, year = {2019}, url = {http://arxiv.org/abs/1904.03027}, eprinttype = {arXiv}, eprint = {1904.03027}, timestamp = {Wed, 24 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1904-03027.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1905-04021, author = {Alberto Giaretta and Stefano Pepe and Nicola Dragoni}, title = {UniquID: {A} Quest to Reconcile Identity Access Management and the Internet of Things}, journal = {CoRR}, volume = {abs/1905.04021}, year = {2019}, url = {http://arxiv.org/abs/1905.04021}, eprinttype = {arXiv}, eprint = {1905.04021}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1905-04021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ArgyriouDS18, author = {Marios Argyriou and Nicola Dragoni and Angelo Spognardi}, title = {Analysis and Evaluation of SafeDroid v2.0, a Framework for Detecting Malicious Android Applications}, journal = {Secur. Commun. Networks}, volume = {2018}, pages = {4672072:1--4672072:15}, year = {2018}, url = {https://doi.org/10.1155/2018/4672072}, doi = {10.1155/2018/4672072}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ArgyriouDS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/DonnoDGS18, author = {Michele De Donno and Nicola Dragoni and Alberto Giaretta and Angelo Spognardi}, title = {DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation}, journal = {Secur. Commun. Networks}, volume = {2018}, pages = {7178164:1--7178164:30}, year = {2018}, url = {https://doi.org/10.1155/2018/7178164}, doi = {10.1155/2018/7178164}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/DonnoDGS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/software/BucchiaroneDDLM18, author = {Antonio Bucchiarone and Nicola Dragoni and Schahram Dustdar and Stephan Thordal Larsen and Manuel Mazzara}, title = {From Monolithic to Microservices: An Experience Report from the Banking Domain}, journal = {{IEEE} Softw.}, volume = {35}, number = {3}, pages = {50--55}, year = {2018}, url = {https://doi.org/10.1109/MS.2018.2141026}, doi = {10.1109/MS.2018.2141026}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/software/BucchiaroneDDLM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/GiarettaDD18, author = {Alberto Giaretta and Michele De Donno and Nicola Dragoni}, editor = {Sebastian Doerr and Mathias Fischer and Sebastian Schrittwieser and Dominik Herrmann}, title = {Adding Salt to Pepper: {A} Structured Security Assessment over a Humanoid Robot}, booktitle = {Proceedings of the 13th International Conference on Availability, Reliability and Security, {ARES} 2018, Hamburg, Germany, August 27-30, 2018}, pages = {22:1--22:8}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3230833.3232807}, doi = {10.1145/3230833.3232807}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/GiarettaDD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/seda/FavarettoAKDD18, author = {Margherita Favaretto and Tu Tran Anh and Juxhino Kavaja and Michele De Donno and Nicola Dragoni}, editor = {Paolo Ciancarini and Manuel Mazzara and Angelo Messina and Alberto Sillitti and Giancarlo Succi}, title = {When the Price Is Your Privacy: {A} Security Analysis of Two Cheap IoT Devices}, booktitle = {Proceedings of 6th International Conference in Software Engineering for Defence Applications, {SEDA} 2018, Rome, Italy, June 7-8, 2018}, series = {Advances in Intelligent Systems and Computing}, volume = {925}, pages = {55--75}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-14687-0\_6}, doi = {10.1007/978-3-030-14687-0\_6}, timestamp = {Thu, 14 Oct 2021 09:59:32 +0200}, biburl = {https://dblp.org/rec/conf/seda/FavarettoAKDD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/seda/GiarettaD18, author = {Alberto Giaretta and Nicola Dragoni}, editor = {Paolo Ciancarini and Manuel Mazzara and Angelo Messina and Alberto Sillitti and Giancarlo Succi}, title = {Community Targeted Phishing - {A} Middle Ground Between Massive and Spear Phishing Through Natural Language Generation}, booktitle = {Proceedings of 6th International Conference in Software Engineering for Defence Applications, {SEDA} 2018, Rome, Italy, June 7-8, 2018}, series = {Advances in Intelligent Systems and Computing}, volume = {925}, pages = {86--93}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-14687-0\_8}, doi = {10.1007/978-3-030-14687-0\_8}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/seda/GiarettaD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/seda/SigurdssonGD18, author = {Gudmundur Sigurdsson and Alberto Giaretta and Nicola Dragoni}, editor = {Paolo Ciancarini and Manuel Mazzara and Angelo Messina and Alberto Sillitti and Giancarlo Succi}, title = {Vulnerabilities and Security Breaches in Cryptocurrencies}, booktitle = {Proceedings of 6th International Conference in Software Engineering for Defence Applications, {SEDA} 2018, Rome, Italy, June 7-8, 2018}, series = {Advances in Intelligent Systems and Computing}, volume = {925}, pages = {288--299}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-14687-0\_26}, doi = {10.1007/978-3-030-14687-0\_26}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/seda/SigurdssonGD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1805-04101, author = {Alberto Giaretta and Michele De Donno and Nicola Dragoni}, title = {Adding Salt to Pepper: {A} Structured Security Assessment over a Humanoid Robot}, journal = {CoRR}, volume = {abs/1805.04101}, year = {2018}, url = {http://arxiv.org/abs/1805.04101}, eprinttype = {arXiv}, eprint = {1805.04101}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1805-04101.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/biostec/HandlerHSD17, author = {Daniel Tolboe Handler and Lotte Hauge and Angelo Spognardi and Nicola Dragoni}, editor = {Egon L. van den Broek and Ana L. N. Fred and Hugo Gamboa and M{\'{a}}rio Vaz}, title = {Security And Privacy Issues in Healthcare Monitoring Systems: {A} Case Study}, booktitle = {Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies {(BIOSTEC} 2017) - Volume 5: HEALTHINF, Porto, Portugal, February 21-23, 2017}, pages = {383--388}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006224603830388}, doi = {10.5220/0006224603830388}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/biostec/HandlerHSD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ershov/DragoniLLMMS17, author = {Nicola Dragoni and Ivan Lanese and Stephan Thordal Larsen and Manuel Mazzara and Ruslan Mustafin and Larisa Safina}, editor = {Alexander K. Petrenko and Andrei Voronkov}, title = {Microservices: How To Make Your Application Scale}, booktitle = {Perspectives of System Informatics - 11th International Andrei P. Ershov Informatics Conference, {PSI} 2017, Moscow, Russia, June 27-29, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10742}, pages = {95--104}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-74313-4\_8}, doi = {10.1007/978-3-319-74313-4\_8}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ershov/DragoniLLMMS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fedcsis/SpognardiDDG17, author = {Angelo Spognardi and Michele De Donno and Nicola Dragoni and Alberto Giaretta}, editor = {Maria Ganzha and Leszek A. Maciaszek and Marcin Paprzycki}, title = {Analysis of DDoS-Capable IoT Malwares}, booktitle = {Proceedings of the 2017 Federated Conference on Computer Science and Information Systems, FedCSIS 2017, Prague, Czech Republic, September 3-6, 2017}, series = {Annals of Computer Science and Information Systems}, volume = {11}, pages = {807--816}, year = {2017}, url = {https://doi.org/10.15439/2017F288}, doi = {10.15439/2017F288}, timestamp = {Mon, 07 Aug 2023 11:27:06 +0200}, biburl = {https://dblp.org/rec/conf/fedcsis/SpognardiDDG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safecomp/ArgyriouDS17, author = {Marios Argyriou and Nicola Dragoni and Angelo Spognardi}, editor = {Stefano Tonetta and Erwin Schoitsch and Friedemann Bitsch}, title = {Security Flows in OAuth 2.0 Framework: {A} Case Study}, booktitle = {Computer Safety, Reliability, and Security - {SAFECOMP} 2017 Workshops, ASSURE, DECSoS, SASSUR, TELERISE, and TIPS, Trento, Italy, September 12, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10489}, pages = {396--406}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66284-8\_33}, doi = {10.1007/978-3-319-66284-8\_33}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/safecomp/ArgyriouDS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/17/DragoniGLMMMS17, author = {Nicola Dragoni and Saverio Giallorenzo and Alberto Lluch{-}Lafuente and Manuel Mazzara and Fabrizio Montesi and Ruslan Mustafin and Larisa Safina}, editor = {Manuel Mazzara and Bertrand Meyer}, title = {Microservices: Yesterday, Today, and Tomorrow}, booktitle = {Present and Ulterior Software Engineering}, pages = {195--216}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-67425-4\_12}, doi = {10.1007/978-3-319-67425-4\_12}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/17/DragoniGLMMMS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/DragoniLLMMS17, author = {Nicola Dragoni and Ivan Lanese and Stephan Thordal Larsen and Manuel Mazzara and Ruslan Mustafin and Larisa Safina}, title = {Microservices: How To Make Your Application Scale}, journal = {CoRR}, volume = {abs/1702.07149}, year = {2017}, url = {http://arxiv.org/abs/1702.07149}, eprinttype = {arXiv}, eprint = {1702.07149}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/DragoniLLMMS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/DragoniDLM17, author = {Nicola Dragoni and Schahram Dustdar and Stephan Thordal Larsen and Manuel Mazzara}, title = {Microservices: Migration of a Mission Critical System}, journal = {CoRR}, volume = {abs/1704.04173}, year = {2017}, url = {http://arxiv.org/abs/1704.04173}, eprinttype = {arXiv}, eprint = {1704.04173}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/DragoniDLM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/DragoniGM17, author = {Nicola Dragoni and Alberto Giaretta and Manuel Mazzara}, title = {The Internet of Hackable Things}, journal = {CoRR}, volume = {abs/1707.08380}, year = {2017}, url = {http://arxiv.org/abs/1707.08380}, eprinttype = {arXiv}, eprint = {1707.08380}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/DragoniGM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1708-05050, author = {Michele De Donno and Nicola Dragoni and Alberto Giaretta and Manuel Mazzara}, title = {AntibIoTic: Protecting IoT Devices Against DDoS Attacks}, journal = {CoRR}, volume = {abs/1708.05050}, year = {2017}, url = {http://arxiv.org/abs/1708.05050}, eprinttype = {arXiv}, eprint = {1708.05050}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1708-05050.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1708-07342, author = {Alberto Giaretta and Nicola Dragoni}, title = {Community Targeted Spam: {A} Middle Ground Between General Spam and Spear Phishing}, journal = {CoRR}, volume = {abs/1708.07342}, year = {2017}, url = {http://arxiv.org/abs/1708.07342}, eprinttype = {arXiv}, eprint = {1708.07342}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1708-07342.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1709-05635, author = {Alberto Giaretta and Nicola Dragoni and Manuel Mazzara}, title = {Joining Jolie to Docker - Orchestration of Microservices on a Containers-as-a-Service Layer}, journal = {CoRR}, volume = {abs/1709.05635}, year = {2017}, url = {http://arxiv.org/abs/1709.05635}, eprinttype = {arXiv}, eprint = {1709.05635}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1709-05635.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/ContiDL16, author = {Mauro Conti and Nicola Dragoni and Viktor Lesyk}, title = {A Survey of Man In The Middle Attacks}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {18}, number = {3}, pages = {2027--2051}, year = {2016}, url = {https://doi.org/10.1109/COMST.2016.2548426}, doi = {10.1109/COMST.2016.2548426}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsur/ContiDL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/healthyIoT/GoyalD16, author = {Rohit Goyal and Nicola Dragoni}, editor = {Mobyen Uddin Ahmed and Shahina Begum and Wasim Raad}, title = {Why Hackers Love eHealth Applications}, booktitle = {Internet of Things Technologies for HealthCare - Third International Conference, HealthyIoT 2016, V{\"{a}}ster{\aa}s, Sweden, October 18-19, 2016, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {187}, pages = {58--63}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-51234-1\_9}, doi = {10.1007/978-3-319-51234-1\_9}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/healthyIoT/GoyalD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/healthyIoT/WearingD16, author = {Thomas Wearing and Nicola Dragoni}, editor = {Mobyen Uddin Ahmed and Shahina Begum and Wasim Raad}, title = {Security and Privacy Issues in Health Monitoring Systems: eCare@Home Case Study}, booktitle = {Internet of Things Technologies for HealthCare - Third International Conference, HealthyIoT 2016, V{\"{a}}ster{\aa}s, Sweden, October 18-19, 2016, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {187}, pages = {165--170}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-51234-1\_29}, doi = {10.1007/978-3-319-51234-1\_29}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/healthyIoT/WearingD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icwe/SchougaardDS16, author = {Daniel Schougaard and Nicola Dragoni and Angelo Spognardi}, editor = {Sven Casteleyn and Peter Dolog and Cesare Pautasso}, title = {Evaluation of Professional Cloud Password Management Tools}, booktitle = {Current Trends in Web Engineering - {ICWE} 2016 International Workshops, DUI, TELERISE, SoWeMine, and Liquid Web, Lugano, Switzerland, June 6-9, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9881}, pages = {16--28}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-46963-8\_2}, doi = {10.1007/978-3-319-46963-8\_2}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/icwe/SchougaardDS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/GoyalDS16, author = {Rohit Goyal and Nicola Dragoni and Angelo Spognardi}, editor = {Sascha Ossowski}, title = {Mind the tracker you wear: a security analysis of wearable health trackers}, booktitle = {Proceedings of the 31st Annual {ACM} Symposium on Applied Computing, Pisa, Italy, April 4-8, 2016}, pages = {131--136}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2851613.2851685}, doi = {10.1145/2851613.2851685}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sac/GoyalDS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/seda/DonnoDGM16, author = {Michele De Donno and Nicola Dragoni and Alberto Giaretta and Manuel Mazzara}, editor = {Paolo Ciancarini and Stanislav Litvinov and Angelo Messina and Alberto Sillitti and Giancarlo Succi}, title = {AntibIoTic: Protecting IoT Devices Against DDoS Attacks}, booktitle = {Proceedings of 5th International Conference in Software Engineering for Defence Applications - {SEDA} 2016, Rome, Italy, May 10th, 2016}, series = {Advances in Intelligent Systems and Computing}, volume = {717}, pages = {59--72}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-70578-1\_7}, doi = {10.1007/978-3-319-70578-1\_7}, timestamp = {Thu, 14 Oct 2021 09:59:32 +0200}, biburl = {https://dblp.org/rec/conf/seda/DonnoDGM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/seda/DragoniGM16, author = {Nicola Dragoni and Alberto Giaretta and Manuel Mazzara}, editor = {Paolo Ciancarini and Stanislav Litvinov and Angelo Messina and Alberto Sillitti and Giancarlo Succi}, title = {The Internet of Hackable Things}, booktitle = {Proceedings of 5th International Conference in Software Engineering for Defence Applications - {SEDA} 2016, Rome, Italy, May 10th, 2016}, series = {Advances in Intelligent Systems and Computing}, volume = {717}, pages = {129--140}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-70578-1\_13}, doi = {10.1007/978-3-319-70578-1\_13}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/seda/DragoniGM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/seda/GiarettaDM16, author = {Alberto Giaretta and Nicola Dragoni and Manuel Mazzara}, editor = {Paolo Ciancarini and Stanislav Litvinov and Angelo Messina and Alberto Sillitti and Giancarlo Succi}, title = {Joining Jolie to Docker - Orchestration of Microservices on a Containers-as-a-Service Layer}, booktitle = {Proceedings of 5th International Conference in Software Engineering for Defence Applications - {SEDA} 2016, Rome, Italy, May 10th, 2016}, series = {Advances in Intelligent Systems and Computing}, volume = {717}, pages = {167--175}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-70578-1\_16}, doi = {10.1007/978-3-319-70578-1\_16}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/seda/GiarettaDM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soca/GoyalSDA16, author = {Rohit Goyal and Angelo Spognardi and Nicola Dragoni and Marios Argyriou}, title = {SafeDroid: {A} Distributed Malware Detection Service for Android}, booktitle = {9th {IEEE} International Conference on Service-Oriented Computing and Applications, {SOCA} 2016, Macau, China, November 4-6, 2016}, pages = {59--66}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SOCA.2016.14}, doi = {10.1109/SOCA.2016.14}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/soca/GoyalSDA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/DragoniGLMMMS16, author = {Nicola Dragoni and Saverio Giallorenzo and Alberto Lluch{-}Lafuente and Manuel Mazzara and Fabrizio Montesi and Ruslan Mustafin and Larisa Safina}, title = {Microservices: yesterday, today, and tomorrow}, journal = {CoRR}, volume = {abs/1606.04036}, year = {2016}, url = {http://arxiv.org/abs/1606.04036}, eprinttype = {arXiv}, eprint = {1606.04036}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/DragoniGLMMMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/FafoutisMVD15, author = {Xenofon Fafoutis and Alessio Di Mauro and Madava D. Vithanage and Nicola Dragoni}, title = {Receiver-initiated medium access control protocols for wireless sensor networks}, journal = {Comput. Networks}, volume = {76}, pages = {55--74}, year = {2015}, url = {https://doi.org/10.1016/j.comnet.2014.11.002}, doi = {10.1016/J.COMNET.2014.11.002}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/FafoutisMVD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/ZhangDW15, author = {Yue Zhang and Nicola Dragoni and Jiangtao Wang}, title = {A Framework and Classification for Fault Detection Approaches in Wireless Sensor Networks with an Energy Efficiency Perspective}, journal = {Int. J. Distributed Sens. Networks}, volume = {11}, pages = {678029:1--678029:11}, year = {2015}, url = {https://doi.org/10.1155/2015/678029}, doi = {10.1155/2015/678029}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/ZhangDW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/MauroFD15, author = {Alessio Di Mauro and Xenofon Fafoutis and Nicola Dragoni}, title = {Adaptive Security in {ODMAC} for Multihop Energy Harvesting Wireless Sensor Networks}, journal = {Int. J. Distributed Sens. Networks}, volume = {11}, pages = {760302:1--760302:10}, year = {2015}, url = {https://doi.org/10.1155/2015/760302}, doi = {10.1155/2015/760302}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/MauroFD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tce/FafoutisMOD15, author = {Xenofon Fafoutis and Alessio Di Mauro and Charalampos Orfanidis and Nicola Dragoni}, title = {Energy-efficient medium access control for energy harvesting communications}, journal = {{IEEE} Trans. Consumer Electron.}, volume = {61}, number = {4}, pages = {402--410}, year = {2015}, url = {https://doi.org/10.1109/TCE.2015.7389793}, doi = {10.1109/TCE.2015.7389793}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tce/FafoutisMOD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euspn/MauroD15, author = {Alessio Di Mauro and Nicola Dragoni}, title = {Adaptive Multipath Key Reinforcement for Energy Harvesting Wireless Sensor Networks}, booktitle = {The 6th International Conference on Emerging Ubiquitous Systems and Pervasive Networks {(EUSPN} 2015)/ The 5th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare {(ICTH-2015)/} Affiliated Workshops, September 27-30, 2015, Berlin, Germany}, series = {Procedia Computer Science}, volume = {63}, pages = {48--55}, publisher = {Elsevier}, year = {2015}, url = {https://doi.org/10.1016/j.procs.2015.08.311}, doi = {10.1016/J.PROCS.2015.08.311}, timestamp = {Thu, 08 Jul 2021 16:04:01 +0200}, biburl = {https://dblp.org/rec/conf/euspn/MauroD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kesamsta/Orfanidis0D15, author = {Charalampos Orfanidis and Yue Zhang and Nicola Dragoni}, editor = {Gordan Jezic and Robert J. Howlett and Lakhmi C. Jain}, title = {Fault Detection in WSNs - An Energy Efficiency Perspective Towards Human-Centric WSNs}, booktitle = {Agent and Multi-Agent Systems: Technologies and Applications, 9th {KES} International Conference, KES-AMSTA, 2015 Sorrento, Italy, June 17-19, 2015, Proceedings}, series = {Smart Innovation, Systems and Technologies}, volume = {38}, pages = {285--300}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19728-9\_24}, doi = {10.1007/978-3-319-19728-9\_24}, timestamp = {Thu, 17 Sep 2020 17:55:39 +0200}, biburl = {https://dblp.org/rec/conf/kesamsta/Orfanidis0D15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/EnemarkZDO15, author = {Hans{-}Jacob Enemark and Yue Zhang and Nicola Dragoni and Charalampos Orfanidis}, title = {Energy-Efficient Fault-Tolerant Dynamic Event Region Detection in Wireless Sensor Networks}, booktitle = {{IEEE} 81st Vehicular Technology Conference, {VTC} Spring 2015, Glasgow, United Kingdom, 11-14 May, 2015}, pages = {1--5}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/VTCSpring.2015.7145814}, doi = {10.1109/VTCSPRING.2015.7145814}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/vtc/EnemarkZDO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/FafoutisOD14, author = {Xenofon Fafoutis and Charalampos Orfanidis and Nicola Dragoni}, title = {Altruistic Backoff: Collision Avoidance for Receiver-Initiated {MAC} Protocols for Wireless Sensor Networks}, journal = {Int. J. Distributed Sens. Networks}, volume = {10}, year = {2014}, url = {https://doi.org/10.1155/2014/576401}, doi = {10.1155/2014/576401}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/FafoutisOD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijccbs/MazzuccoMD13, author = {Michele Mazzucco and Manuel Mazzara and Nicola Dragoni}, title = {Dynamic allocation and admission policies for QoS-aware provisioning systems}, journal = {Int. J. Crit. Comput. Based Syst.}, volume = {4}, number = {1}, pages = {27--44}, year = {2013}, url = {https://doi.org/10.1504/IJCCBS.2013.053741}, doi = {10.1504/IJCCBS.2013.053741}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijccbs/MazzuccoMD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eenergy/FafoutisMD13, author = {Xenofon Fafoutis and Alessio Di Mauro and Nicola Dragoni}, editor = {David E. Culler and Catherine Rosenberg and Srinivasan Keshav and Jim Kurose}, title = {Sustainable performance in energy harvesting: wireless sensor networks}, booktitle = {The Fourth International Conference on Future Energy Systems, e-Energy '13, Berkeley, CA, USA, May 22-24, 2013}, pages = {267--268}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2487166.2487200}, doi = {10.1145/2487166.2487200}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eenergy/FafoutisMD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocon/VithanageFAD13, author = {Madava D. Vithanage and Xenofon Fafoutis and Claus Bo Andersen and Nicola Dragoni}, title = {Medium access control for thermal energy harvesting in advanced metering infrastructures}, booktitle = {Proceedings of Eurocon 2013, International Conference on Computer as a Tool, Zagreb, Croatia, July 1-4, 2013}, pages = {291--299}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EUROCON.2013.6624999}, doi = {10.1109/EUROCON.2013.6624999}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/eurocon/VithanageFAD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/FafoutisMD13, author = {Xenofon Fafoutis and Alessio Di Mauro and Nicola Dragoni}, title = {Sustainable medium access control: Implementation and evaluation of {ODMAC}}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2013, Budapest, Hungary, June 9-13, 2013, Workshops Proceedings}, pages = {407--412}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICCW.2013.6649268}, doi = {10.1109/ICCW.2013.6649268}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/FafoutisMD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/MauroFMD13, author = {Alessio Di Mauro and Xenofon Fafoutis and Sebastian M{\"{o}}dersheim and Nicola Dragoni}, editor = {Hanne Riis Nielson and Dieter Gollmann}, title = {Detecting and Preventing Beacon Replay Attacks in Receiver-Initiated {MAC} Protocols for Energy Efficient WSNs}, booktitle = {Secure {IT} Systems - 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8208}, pages = {1--16}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41488-6\_1}, doi = {10.1007/978-3-642-41488-6\_1}, timestamp = {Sun, 02 Jun 2019 21:12:28 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/MauroFMD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/ContiDG13, author = {Mauro Conti and Nicola Dragoni and Sebastiano Gottardo}, editor = {Rafael Accorsi and Silvio Ranise}, title = {{MITHYS:} Mind The Hand You Shake - Protecting Mobile Devices from {SSL} Usage Vulnerabilities}, booktitle = {Security and Trust Management - 9th International Workshop, {STM} 2013, Egham, UK, September 12-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8203}, pages = {65--81}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41098-7\_5}, doi = {10.1007/978-3-642-41098-7\_5}, timestamp = {Wed, 25 Sep 2019 18:14:27 +0200}, biburl = {https://dblp.org/rec/conf/stm/ContiDG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ContiDG13, author = {Mauro Conti and Nicola Dragoni and Sebastiano Gottardo}, title = {{MITHYS:} Mind The Hand You Shake - Protecting mobile devices from {SSL} usage vulnerabilities}, journal = {CoRR}, volume = {abs/1306.6729}, year = {2013}, url = {http://arxiv.org/abs/1306.6729}, eprinttype = {arXiv}, eprint = {1306.6729}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ContiDG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/MazzaraBGDMQN13, author = {Manuel Mazzara and Luca Biselli and Pier Paolo Greco and Nicola Dragoni and Antonio Marraffa and Nafees Qamar and Simona de Nicola}, title = {Social Networks and Collective Intelligence: {A} Return to the Agora}, journal = {CoRR}, volume = {abs/1311.2551}, year = {2013}, url = {http://arxiv.org/abs/1311.2551}, eprinttype = {arXiv}, eprint = {1311.2551}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/MazzaraBGDMQN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ci/DragoniG12, author = {Nicola Dragoni and Mauro Gaspari}, title = {Declarative Specification of Fault Tolerant Auction Protocols: the English Auction Case Study}, journal = {Comput. Intell.}, volume = {28}, number = {4}, pages = {617--641}, year = {2012}, url = {https://doi.org/10.1111/j.1467-8640.2012.00448.x}, doi = {10.1111/J.1467-8640.2012.00448.X}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ci/DragoniG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijccbs/DragoniGMP12, author = {Nicola Dragoni and Olga Gadyatskaya and Fabio Massacci and Anton Philippov}, title = {High-level algorithms and data structures requirements for security-by-contract on Java cards}, journal = {Int. J. Crit. Comput. Based Syst.}, volume = {3}, number = {4}, pages = {284--304}, year = {2012}, url = {https://doi.org/10.1504/IJCCBS.2012.053207}, doi = {10.1504/IJCCBS.2012.053207}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijccbs/DragoniGMP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/MazzaraDZ12, author = {Manuel Mazzara and Nicola Dragoni and Mu Zhou}, title = {Implementing Workflow Reconfiguration in {WS-BPEL}}, journal = {J. Internet Serv. Inf. Secur.}, volume = {2}, number = {1/2}, pages = {73--92}, year = {2012}, url = {https://doi.org/10.22667/JISIS.2012.02.31.073}, doi = {10.22667/JISIS.2012.02.31.073}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/MazzaraDZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/at/BiselliDGGMMP12, author = {Luca Biselli and Nicola Dragoni and Emanuela Goldoni and Pier Paolo Greco and Antonio Marraffa and Manuel Mazzara and Georgios Papageorgiou}, editor = {Sascha Ossowski and Francesca Toni and George A. Vouros}, title = {Social Networks and Collective Intelligence - {A} Return to the Agora (with the Polidoxa Shift)}, booktitle = {Proceedings of the First International Conference on Agreement Technologies, {AT} 2012, Dubrovnik, Croatia, October 15-16, 2012}, series = {{CEUR} Workshop Proceedings}, volume = {918}, pages = {347--348}, publisher = {CEUR-WS.org}, year = {2012}, url = {https://ceur-ws.org/Vol-918/111110347.pdf}, timestamp = {Fri, 10 Mar 2023 16:23:00 +0100}, biburl = {https://dblp.org/rec/conf/at/BiselliDGGMMP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/inss/FafoutisD12, author = {Xenofon Fafoutis and Nicola Dragoni}, title = {Adaptive media access control for energy harvesting - Wireless sensor networks}, booktitle = {Ninth International Conference on Networked Sensing, {INSS} 2012, Antwerp, Belgium, June 11-14, 2012}, pages = {1--4}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/INSS.2012.6240557}, doi = {10.1109/INSS.2012.6240557}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/inss/FafoutisD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/inss/FafoutisD12a, author = {Xenofon Fafoutis and Nicola Dragoni}, title = {Analytical comparison of {MAC} schemes for Energy Harvesting - Wireless Sensor Networks}, booktitle = {Ninth International Conference on Networked Sensing, {INSS} 2012, Antwerp, Belgium, June 11-14, 2012}, pages = {1--6}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/INSS.2012.6240580}, doi = {10.1109/INSS.2012.6240580}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/inss/FafoutisD12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kesamsta/AbouzaidMMD12, author = {Faisal Abouzaid and John Mullins and Manuel Mazzara and Nicola Dragoni}, editor = {Gordan Jezic and Mario Kusek and Ngoc Thanh Nguyen and Robert J. Howlett and Lakhmi C. Jain}, title = {Modelling and Analysis of Dynamic Reconfiguration in BP-Calculus}, booktitle = {Agent and Multi-Agent Systems. Technologies and Applications - 6th {KES} International Conference, {KES-AMSTA} 2012,Dubrovnik, Croatia, June 25-27, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7327}, pages = {534--543}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30947-2\_58}, doi = {10.1007/978-3-642-30947-2\_58}, timestamp = {Thu, 16 Mar 2023 20:00:31 +0100}, biburl = {https://dblp.org/rec/conf/kesamsta/AbouzaidMMD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndt/MauroPVD12, author = {Alessio Di Mauro and Davide Papini and Roberto Vigo and Nicola Dragoni}, editor = {Rachid Benlamri}, title = {Toward a Threat Model for Energy-Harvesting Wireless Sensor Networks}, booktitle = {Networked Digital Technologies - 4th International Conference, {NDT} 2012, Dubai, UAE, April 24-26, 2012, Proceedings, Part {II}}, series = {Communications in Computer and Information Science}, volume = {294}, pages = {289--301}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30567-2\_24}, doi = {10.1007/978-3-642-30567-2\_24}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndt/MauroPVD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/peccs/MauroPD12, author = {Alessio Di Mauro and Davide Papini and Nicola Dragoni}, editor = {C{\'{e}}sar Benavente{-}Peces and Falah H. Ali and Joaquim Filipe}, title = {Security Challenges for Energy-harvesting Wireless Sensor Networks}, booktitle = {{PECCS} 2012 - Proceedings of the 2nd International Conference on Pervasive Embedded Computing and Communication Systems, Rome, Italy, 24-26 February, 2012}, pages = {422--425}, publisher = {SciTePress}, year = {2012}, timestamp = {Sun, 06 May 2012 14:26:10 +0200}, biburl = {https://dblp.org/rec/conf/peccs/MauroPD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/JensenDBM11, author = {Christian Damsgaard Jensen and Nicola Dragoni and Anirban Basu and Clara Mancini}, title = {Frontiers in Trust Management}, journal = {J. Internet Serv. Inf. Secur.}, volume = {1}, number = {4}, pages = {1--4}, year = {2011}, url = {https://doi.org/10.22667/JISIS.2011.11.31.001}, doi = {10.22667/JISIS.2011.11.31.001}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/JensenDBM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apn/MazzaraADB11, author = {Manuel Mazzara and Faisal Abouzaid and Nicola Dragoni and Anirban Bhattacharyya}, editor = {Michael Duvigneau and Daniel Moldt and Kunihiko Hiraishi}, title = {Design, Modelling and Analysis of a Workflow Reconfiguration}, booktitle = {Proceedings of the International Workshop on Petri Nets and Software Engineering, Newcastle upon Tyne, UK, June 20-21, 2011}, series = {{CEUR} Workshop Proceedings}, volume = {723}, pages = {10--24}, publisher = {CEUR-WS.org}, year = {2011}, url = {https://ceur-ws.org/Vol-723/paper2.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:38 +0100}, biburl = {https://dblp.org/rec/conf/apn/MazzaraADB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/DragoniLPF11, author = {Nicola Dragoni and Eduardo Lostal and Davide Papini and Javier Fabra}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Pascal Lafourcade}, title = {{SC} 2: Secure Communication over Smart Cards - How to Secure Off-Card Matching in Security-by-Contract for Open Multi-application Smart Cards}, booktitle = {Foundations and Practice of Security - 4th Canada-France {MITACS} Workshop, {FPS} 2011, Paris, France, May 12-13, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6888}, pages = {32--48}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27901-0\_4}, doi = {10.1007/978-3-642-27901-0\_4}, timestamp = {Fri, 27 Dec 2019 21:23:06 +0100}, biburl = {https://dblp.org/rec/conf/fps/DragoniLPF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pe-wasun/FafoutisD11, author = {Xenofon Fafoutis and Nicola Dragoni}, editor = {Isabelle Gu{\'{e}}rin Lassous and M{\'{o}}nica Aguilar{-}Igartua and Francesca Cuomo}, title = {{ODMAC:} an on-demand {MAC} protocol for energy harvesting - wireless sensor networks}, booktitle = {Proceedings of the 8th {ACM} Symposium on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks, {PE-WASUN} 2011, Miami Beach, Florida, USA, October 31 - November 4, 2011}, pages = {49--56}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2069063.2069072}, doi = {10.1145/2069063.2069072}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pe-wasun/FafoutisD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/policy/DragoniLGMP11, author = {Nicola Dragoni and Eduardo Lostal and Olga Gadyatskaya and Fabio Massacci and Federica Paci}, title = {A Load Time Policy Checker for Open Multi-application Smart Cards}, booktitle = {{POLICY} 2011, {IEEE} International Symposium on Policies for Distributed Systems and Networks, Pisa, Italy, 6-8 June 2011}, pages = {153--156}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/POLICY.2011.40}, doi = {10.1109/POLICY.2011.40}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/policy/DragoniLGMP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/policy/DragoniLP11, author = {Nicola Dragoni and Eduardo Lostal and Davide Papini}, title = {(SC){\({^2}\)}: {A} System to Secure Off-Card Contract-Policy Matching in Security-by-Contract for Open Multi-application Smart Cards}, booktitle = {{POLICY} 2011, {IEEE} International Symposium on Policies for Distributed Systems and Networks, Pisa, Italy, 6-8 June 2011}, pages = {186--187}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/POLICY.2011.22}, doi = {10.1109/POLICY.2011.22}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/policy/DragoniLP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wsfm/MazzaraADB11, author = {Manuel Mazzara and Faisal Abouzaid and Nicola Dragoni and Anirban Bhattacharyya}, editor = {Marco Carbone and Jean{-}Marc Petit}, title = {Toward Design, Modelling and Analysis of Dynamic Workflow Reconfigurations - {A} Process Algebra Perspective}, booktitle = {Web Services and Formal Methods - 8th International Workshop, {WS-FM} 2011, Clermont-Ferrand, France, September 1-2, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7176}, pages = {64--78}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29834-9\_6}, doi = {10.1007/978-3-642-29834-9\_6}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/wsfm/MazzaraADB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/CostaLMMISDM10, author = {Gabriele Costa and Aliaksandr Lazouski and Fabio Martinelli and Ilaria Matteucci and Val{\'{e}}rie Issarny and Rachid Saadi and Nicola Dragoni and Fabio Massacci}, title = {Security-by-Contract-with-Trust for Mobile Devices}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {1}, number = {4}, pages = {75--91}, year = {2010}, url = {https://doi.org/10.22667/JOWUA.2010.12.31.075}, doi = {10.22667/JOWUA.2010.12.31.075}, timestamp = {Tue, 05 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/CostaLMMISDM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisis/CostaDLMMM10, author = {Gabriele Costa and Nicola Dragoni and Aliaksandr Lazouski and Fabio Martinelli and Fabio Massacci and Ilaria Matteucci}, editor = {Leonard Barolli and Fatos Xhafa and Salvatore Vitabile and Hui{-}Huang Hsu}, title = {Extending Security-by-Contract with Quantitative Trust on Mobile Devices}, booktitle = {{CISIS} 2010, The Fourth International Conference on Complex, Intelligent and Software Intensive Systems, Krakow, Poland, 15-18 February 2010}, pages = {872--877}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/CISIS.2010.33}, doi = {10.1109/CISIS.2010.33}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisis/CostaDLMMM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/DragoniGM10, author = {Nicola Dragoni and Olga Gadyatskaya and Fabio Massacci}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {Can We Support Applications' Evolution in Multi-application Smart Cards by Security-by-Contract?}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {221--228}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_16}, doi = {10.1007/978-3-642-12368-9\_16}, timestamp = {Fri, 27 Mar 2020 08:56:51 +0100}, biburl = {https://dblp.org/rec/conf/wistp/DragoniGM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1012-0522, author = {Michele Mazzucco and Manuel Mazzara and Nicola Dragoni}, title = {Design of QoS-aware Provisioning Systems}, journal = {CoRR}, volume = {abs/1012.0522}, year = {2010}, url = {http://arxiv.org/abs/1012.0522}, eprinttype = {arXiv}, eprint = {1012.0522}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1012-0522.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/DragoniMS09, author = {Nicola Dragoni and Fabio Massacci and Ayda Sa{\"{\i}}dane}, title = {A self-protecting and self-healing framework for negotiating services and trust in autonomic communication systems}, journal = {Comput. Networks}, volume = {53}, number = {10}, pages = {1628--1648}, year = {2009}, url = {https://doi.org/10.1016/j.comnet.2008.07.016}, doi = {10.1016/J.COMNET.2008.07.016}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/DragoniMS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DragoniMWS09, author = {Nicola Dragoni and Fabio Massacci and Thomas Walter and Christian Schaefer}, title = {What the heck is this application doing? - {A} security-by-contract architecture for pervasive services}, journal = {Comput. Secur.}, volume = {28}, number = {7}, pages = {566--577}, year = {2009}, url = {https://doi.org/10.1016/j.cose.2009.06.005}, doi = {10.1016/J.COSE.2009.06.005}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/DragoniMWS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jlp/BielovaDMNS09, author = {Nataliia Bielova and Nicola Dragoni and Fabio Massacci and Katsiaryna Naliuka and Ida Sri Rejeki Siahaan}, title = {Matching in security-by-contract for mobile code}, journal = {J. Log. Algebraic Methods Program.}, volume = {78}, number = {5}, pages = {340--358}, year = {2009}, url = {https://doi.org/10.1016/j.jlap.2009.02.013}, doi = {10.1016/J.JLAP.2009.02.013}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jlp/BielovaDMNS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iat/Dragoni09, author = {Nicola Dragoni}, title = {Toward Trustworthy Web Services - Approaches, Weaknesses and Trust-By-Contract Framework}, booktitle = {Proceedings of the 2009 {IEEE/WIC/ACM} International Conference on Web Intelligence and International Conference on Intelligent Agent Technology - Workshops, Milan, Italy, 15-18 September 2009}, pages = {599--606}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/WI-IAT.2009.359}, doi = {10.1109/WI-IAT.2009.359}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iat/Dragoni09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/prima/Dragoni09, author = {Nicola Dragoni}, editor = {Jung{-}Jin Yang and Makoto Yokoo and Takayuki Ito and Zhi Jin and Paul Scerri}, title = {Where Are All the Agents? On the Gap between Theory and Practice of Agent-Based Referral Networks}, booktitle = {Principles of Practice in Multi-Agent Systems, 12th International Conference, {PRIMA} 2009, Nagoya, Japan, December 14-16, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5925}, pages = {508--515}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-11161-7\_36}, doi = {10.1007/978-3-642-11161-7\_36}, timestamp = {Wed, 08 Sep 2021 09:45:06 +0200}, biburl = {https://dblp.org/rec/conf/prima/Dragoni09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wsfm/DragoniM09, author = {Nicola Dragoni and Manuel Mazzara}, editor = {Cosimo Laneve and Jianwen Su}, title = {A Formal Semantics for the {WS-BPEL} Recovery Framework - The \emph{pi}-Calculus Way}, booktitle = {Web Services and Formal Methods, 6th International Workshop, {WS-FM} 2009, Bologna, Italy, September 4-5, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6194}, pages = {92--109}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14458-5\_6}, doi = {10.1007/978-3-642-14458-5\_6}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/wsfm/DragoniM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/BielovaTDS08, author = {Nataliia Bielova and Marco Dalla Torre and Nicola Dragoni and Ida Sri Rejeki Siahaan}, title = {Matching Policies with Security Claims of Mobile Applications}, booktitle = {Proceedings of the The Third International Conference on Availability, Reliability and Security, {ARES} 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain}, pages = {128--135}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ARES.2008.96}, doi = {10.1109/ARES.2008.96}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/BielovaTDS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifiptm/DragoniMN08, author = {Nicola Dragoni and Fabio Massacci and Katsiaryna Naliuka}, editor = {Y{\"{u}}cel Karabulut and John Mitchell and Peter Herrmann and Christian Damsgaard Jensen}, title = {An Inline Monitoring System for .NET Mobile Devices}, booktitle = {Trust Management {II} - Proceedings of {IFIPTM} 2008: Joint iTrust and {PST} Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {263}, pages = {363--366}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09428-1\_24}, doi = {10.1007/978-0-387-09428-1\_24}, timestamp = {Fri, 09 Apr 2021 18:43:37 +0200}, biburl = {https://dblp.org/rec/conf/ifiptm/DragoniMN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aai/DragoniGG07, author = {Nicola Dragoni and Mauro Gaspari and Davide Guidi}, title = {An {ACL} for Specifying Fault-Tolerant Protocols}, journal = {Appl. Artif. Intell.}, volume = {21}, number = {4{\&}5}, pages = {361--381}, year = {2007}, url = {https://doi.org/10.1080/08839510701252643}, doi = {10.1080/08839510701252643}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/aai/DragoniGG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/DragoniMNS07, author = {Nicola Dragoni and Fabio Massacci and Katsiaryna Naliuka and Ida Sri Rejeki Siahaan}, editor = {Javier L{\'{o}}pez and Pierangela Samarati and Josep L. Ferrer}, title = {Security-by-Contract: Toward a Semantics for Digital Signatures on Mobile Code}, booktitle = {Public Key Infrastructure, 4th European {PKI} Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4582}, pages = {297--312}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73408-6\_21}, doi = {10.1007/978-3-540-73408-6\_21}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/europki/DragoniMNS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secperu/DragoniMSWV07, author = {Nicola Dragoni and Fabio Massacci and Christian Schaefer and Thomas Walter and Eric V{\'{e}}tillard}, editor = {Panagiotis Georgiadis and Javier L{\'{o}}pez and Stefanos Gritzalis and Giannis F. Marias}, title = {A Security-by-Contract Architecture for Pervasive Services}, booktitle = {Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SECPerU 2007, Istanbul, Turkey, July 19, 2007}, pages = {49--54}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/SECPERU.2007.2}, doi = {10.1109/SECPERU.2007.2}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secperu/DragoniMSWV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sgai/BarzantiDEG07, author = {Luca Barzanti and Nicola Dragoni and Andrea Degli Esposti and Mauro Gaspari}, editor = {Richard Ellis and Tony Allen and Miltos Petridis}, title = {Decision Making in Fund Raising Management: a Knowledge Based Approach}, booktitle = {Applications and Innovations in Intelligent Systems {XV} - Proceedings of AI-2007, the Twenty-seventh {SGAI} International Conference on Innovative Techniques and Applications of Artificial Intelligence, Cambridge, UK, 10-12 December 2007}, pages = {189--201}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-1-84800-086-5\_14}, doi = {10.1007/978-1-84800-086-5\_14}, timestamp = {Thu, 14 Mar 2019 13:50:05 +0100}, biburl = {https://dblp.org/rec/conf/sgai/BarzantiDEG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sws/DragoniM07, author = {Nicola Dragoni and Fabio Massacci}, editor = {Peng Ning and Ernesto Damiani and Seth Proctor}, title = {Security-by-contract for web services}, booktitle = {Proceedings of the 4th {ACM} Workshop On Secure Web Services, {SWS} 2007, Fairfax, VA, USA, November 2, 2007}, pages = {90--98}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1314418.1314433}, doi = {10.1145/1314418.1314433}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sws/DragoniM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/it/Dragoni06, author = {Nicola Dragoni}, title = {Fault tolerant knowledge level inter-agent communication in open multi-agent systems}, school = {University of Bologna, Italy}, year = {2006}, url = {https://opac.bncf.firenze.sbn.it/bncf-prod/resource?uri=BNI0021493}, timestamp = {Thu, 27 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/it/Dragoni06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aamas/DragoniG06, author = {Nicola Dragoni and Mauro Gaspari}, title = {Crash failure detection in asynchronous agent communication languages}, journal = {Auton. Agents Multi Agent Syst.}, volume = {13}, number = {3}, pages = {355--390}, year = {2006}, url = {https://doi.org/10.1007/s10458-006-0006-y}, doi = {10.1007/S10458-006-0006-Y}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/aamas/DragoniG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aicom/Dragoni06, author = {Nicola Dragoni}, title = {Fault tolerant knowledge level inter-agent communication in open Multi-Agent Systems}, journal = {{AI} Commun.}, volume = {19}, number = {4}, pages = {385--387}, year = {2006}, url = {http://content.iospress.com/articles/ai-communications/aic378}, timestamp = {Fri, 15 May 2015 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/aicom/Dragoni06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/apin/DragoniGG06, author = {Nicola Dragoni and Mauro Gaspari and Davide Guidi}, title = {An infrastructure to support cooperation of knowledge-level agents on the semantic Grid}, journal = {Appl. Intell.}, volume = {25}, number = {2}, pages = {159--180}, year = {2006}, url = {https://doi.org/10.1007/s10489-006-9652-7}, doi = {10.1007/S10489-006-9652-7}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/apin/DragoniGG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acom/DragoniGG06, author = {Nicola Dragoni and Mauro Gaspari and Davide Guidi}, editor = {Frank Dignum and Rogier M. van Eijk and Roberto A. Flores}, title = {A Fault Tolerant Agent Communication Language for Supporting Web Agent Interaction}, booktitle = {Agent Communication II, International Workshops on Agent Communication, {AC} 2005 and {AC} 2006, Utrecht, Netherlands, July 25, 2005 and Hakodate, Japan, May 9, 2006, Selected and Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3859}, pages = {273--288}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-68143-4\_19}, doi = {10.1007/978-3-540-68143-4\_19}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acom/DragoniGG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cia/DragoniG06, author = {Nicola Dragoni and Mauro Gaspari}, editor = {Matthias Klusch and Michael Rovatsos and Terry R. Payne}, title = {Performative Patterns for Designing Verifiable ACLs}, booktitle = {Cooperative Information Agents X, 10th International Workshop, {CIA} 2006, Edinburgh, UK, September 11-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4149}, pages = {375--387}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11839354\_27}, doi = {10.1007/11839354\_27}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/cia/DragoniG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jlp/DragoniG05, author = {Nicola Dragoni and Mauro Gaspari}, title = {An object based algebra for specifying a fault tolerant software architecture}, journal = {J. Log. Algebraic Methods Program.}, volume = {63}, number = {2}, pages = {271--297}, year = {2005}, url = {https://doi.org/10.1016/j.jlap.2004.05.006}, doi = {10.1016/J.JLAP.2004.05.006}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jlp/DragoniG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aiia/DragoniGG05, author = {Nicola Dragoni and Mauro Gaspari and Davide Guidi}, editor = {Stefania Bandini and Sara Manzoni}, title = {An {ACL} for Specifying Fault-Tolerant Protocols}, booktitle = {AI*IA 2005: Advances in Artificial Intelligence, 9th Congress of the Italian Association for Artificial Intelligence, Milan, Italy, September 21-23, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3673}, pages = {237--248}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11558590\_24}, doi = {10.1007/11558590\_24}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aiia/DragoniGG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/flairs/DragoniGG05, author = {Nicola Dragoni and Mauro Gaspari and Davide Guidi}, editor = {Ingrid Russell and Zdravko Markov}, title = {Integrating Knowledge-Level Agents in the (Semantic) Web: An Agent-based Open Service Architecture}, booktitle = {Proceedings of the Eighteenth International Florida Artificial Intelligence Research Society Conference, Clearwater Beach, Florida, {USA}}, pages = {320--325}, publisher = {{AAAI} Press}, year = {2005}, url = {http://www.aaai.org/Library/FLAIRS/2005/flairs05-053.php}, timestamp = {Wed, 26 Oct 2022 08:35:28 +0200}, biburl = {https://dblp.org/rec/conf/flairs/DragoniGG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/swap/DragoniGG05, author = {Nicola Dragoni and Mauro Gaspari and Davide Guidi}, editor = {Paolo Bouquet and Giovanni Tummarello}, title = {{NOWHERE} - An Open Service Architecture to support Agents and Services within the Semantic Web}, booktitle = {{SWAP} 2005 - Semantic Web Applications and Perspectives, Proceedings of the 2nd Italian Semantic Web Workshop, University of Trento, Trento, Italy, 14-16 December 2005}, series = {{CEUR} Workshop Proceedings}, volume = {166}, publisher = {CEUR-WS.org}, year = {2005}, url = {https://ceur-ws.org/Vol-166/45.pdf}, timestamp = {Fri, 10 Mar 2023 16:23:20 +0100}, biburl = {https://dblp.org/rec/conf/swap/DragoniGG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wm/DragoniGG05, author = {Nicola Dragoni and Mauro Gaspari and Davide Guidi}, editor = {Klaus{-}Dieter Althoff and Andreas Dengel and Ralph Bergmann and Markus Nick and Thomas Roth{-}Berghofer}, title = {A Peer-to-Peer Knowledge Level Open Service Architecture}, booktitle = {{WM} 2005: Professional Knowledge Management - Experiences and Visions, Contributions to the 3rd Conference Professional Knowledge Management - Experiences and Visions, April 10-13, 2005, Kaiserslautern, Germany}, pages = {195--201}, publisher = {DFKI, Kaiserslautern}, year = {2005}, timestamp = {Fri, 13 Sep 2019 15:47:23 +0200}, biburl = {https://dblp.org/rec/conf/wm/DragoniGG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.