Nicola Dragoni
Nicola Dragoni
Professor in Secure Pervasive Computing, PhD
Verified email at dtu.dk - Homepage
Title
Cited by
Cited by
Year
Microservices: yesterday, today, and tomorrow
N Dragoni, S Giallorenzo, AL Lafuente, M Mazzara, F Montesi, R Mustafin, ...
Present and ulterior software engineering, 195-216, 2017
5372017
A Survey of Man In The Middle Attacks
M Conti, N Dragoni, V Lesyk
IEEE COMMUNICATIONS SURVEYS & TUTORIALS 18 (3), 2027-2051, 2016
2042016
ODMAC: An on-demand MAC protocol for energy harvesting-wireless sensor networks
X Fafoutis, N Dragoni
Proceedings of the 8th ACM Symposium on Performance evaluation of wireless …, 2011
1002011
Microservices: How to make your application scale
N Dragoni, I Lanese, ST Larsen, M Mazzara, R Mustafin, L Safina
International Andrei Ershov Memorial Conference on Perspectives of System …, 2017
962017
Security-by-contract: Toward a semantics for digital signatures on mobile code
N Dragoni, F Massacci, K Naliuka, I Siahaan
European Public Key Infrastructure Workshop, 297-312, 2007
842007
Receiver-initiated medium access control protocols for wireless sensor networks
X Fafoutis, A Di Mauro, MD Vithanage, N Dragoni
Computer Networks 76, 55-74, 2015
612015
DDoS-capable IoT malwares: Comparative analysis and Mirai investigation
M De Donno, N Dragoni, A Giaretta, A Spognardi
Security and Communication Networks 2018, 2018
542018
A survey on trust-based web service provision approaches
N Dragoni
2010 Third International Conference on Dependability, 83-91, 2010
512010
A self-protecting and self-healing framework for negotiating services and trust in autonomic communication systems
N Dragoni, F Massacci, A Saidane
Computer Networks 53 (10), 1628-1648, 2009
46*2009
From monolithic to microservices: An experience report from the banking domain
A Bucchiarone, N Dragoni, S Dustdar, ST Larsen, M Mazzara
Ieee Software 35 (3), 50-55, 2018
452018
What the heck is this application doing?–A security-by-contract architecture for pervasive services
N Dragoni, F Massacci, T Walter, C Schaefer
computers & security 28 (7), 566-577, 2009
41*2009
Mithys: Mind the hand you shake-protecting mobile devices from ssl usage vulnerabilities
M Conti, N Dragoni, S Gottardo
International Workshop on Security and Trust Management, 65-81, 2013
402013
Extending security-by-contract with quantitative trust on mobile devices
G Costa, N Dragoni, A Lazouski, F Martinelli, F Massacci, I Matteucci
2010 International Conference on Complex, Intelligent and Software Intensive …, 2010
392010
Energy-efficient medium access control for energy harvesting communications
X Fafoutis, A Di Mauro, C Orfanidis, N Dragoni
IEEE transactions on consumer electronics 61 (4), 402-410, 2015
37*2015
Crash failure detection in asynchronous agent communication languages
N Dragoni, M Gaspari
Autonomous Agents and Multi-Agent Systems 13 (3), 355-390, 2006
37*2006
Energy-harvesting wireless sensor networks
X Fafoutis, D Vuckovic, A Di Mauro, N Dragoni, J Madsen
9th European Conference on Wireless Sensor Networks (EWSN 2012), 84-85, 2012
36*2012
Toward trustworthy web services-approaches, weaknesses and trust-by-contract framework
N Dragoni
2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and …, 2009
362009
Analysis of DDoS-capable IoT malwares
M De Donno, N Dragoni, A Giaretta, A Spognardi
2017 Federated Conference on Computer Science and Information Systems …, 2017
332017
Security-by-contract (SxC) for software and services of mobile systems
N Dragoni, F Martinelli, F Massacci, P Mori, C Schaefer, T Walter, ...
At your service-Service-Oriented Computing from an EU Perspective, 429-455, 2008
332008
Mind the tracker you wear: a security analysis of wearable health trackers
R Goyal, N Dragoni, A Spognardi
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 131-136, 2016
322016
The system can't perform the operation now. Try again later.
Articles 1–20