Volgen
Nicola Dragoni
Nicola Dragoni
Professor in Secure Pervasive Computing, PhD
Geverifieerd e-mailadres voor dtu.dk - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Microservices: yesterday, today, and tomorrow
N Dragoni, S Giallorenzo, AL Lafuente, M Mazzara, F Montesi, R Mustafin, ...
Present and ulterior software engineering, 195-216, 2017
10872017
A Survey of Man In The Middle Attacks
M Conti, N Dragoni, V Lesyk
IEEE COMMUNICATIONS SURVEYS & TUTORIALS 18 (3), 2027-2051, 2016
4522016
Microservices: How to make your application scale
N Dragoni, I Lanese, ST Larsen, M Mazzara, R Mustafin, L Safina
International Andrei Ershov Memorial Conference on Perspectives of System …, 2017
1752017
Foundations and evolution of modern computing paradigms: Cloud, iot, edge, and fog
M De Donno, K Tange, N Dragoni
Ieee Access 7, 150936-150948, 2019
1492019
DDoS-capable IoT malwares: Comparative analysis and Mirai investigation
M De Donno, N Dragoni, A Giaretta, A Spognardi
Security and Communication Networks 2018, 2018
1452018
A systematic survey of industrial Internet of Things security: Requirements and fog computing opportunities
K Tange, M De Donno, X Fafoutis, N Dragoni
IEEE Communications Surveys & Tutorials 22 (4), 2489-2520, 2020
1272020
From monolithic to microservices: An experience report from the banking domain
A Bucchiarone, N Dragoni, S Dustdar, ST Larsen, M Mazzara
Ieee Software 35 (3), 50-55, 2018
1212018
ODMAC: An on-demand MAC protocol for energy harvesting-wireless sensor networks
X Fafoutis, N Dragoni
Proceedings of the 8th ACM Symposium on Performance evaluation of wireless …, 2011
1182011
Size matters: Microservices research and applications
M Mazzara, A Bucchiarone, N Dragoni, V Rivera
Microservices, 29-42, 2020
106*2020
Blockchain implementations and use cases for supply chains-a survey
P Gonczol, P Katsikouli, L Herskind, N Dragoni
Ieee Access 8, 11856-11871, 2020
942020
Security-by-contract: Toward a semantics for digital signatures on mobile code
N Dragoni, F Massacci, K Naliuka, I Siahaan
European Public Key Infrastructure Workshop, 297-312, 2007
942007
Analysis of DDoS-capable IoT malwares
M De Donno, N Dragoni, A Giaretta, A Spognardi
2017 Federated Conference on Computer Science and Information Systems …, 2017
802017
Receiver-initiated medium access control protocols for wireless sensor networks
X Fafoutis, A Di Mauro, MD Vithanage, N Dragoni
Computer Networks 76, 55-74, 2015
692015
The internet of hackable things
N Dragoni, A Giaretta, M Mazzara
International Conference in Software Engineering for Defence Applications …, 2016
612016
Mind the tracker you wear: a security analysis of wearable health trackers
R Goyal, N Dragoni, A Spognardi
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 131-136, 2016
602016
A survey on trust-based web service provision approaches
N Dragoni
2010 Third International Conference on Dependability, 83-91, 2010
562010
A self-protecting and self-healing framework for negotiating services and trust in autonomic communication systems
N Dragoni, F Massacci, A Saidane
Computer Networks 53 (10), 1628-1648, 2009
53*2009
An ACL for specifying fault-tolerant protocols
N Dragoni, M Gaspari, D Guidi
Applied Artificial Intelligence 21 (4-5), 361-381, 2007
50*2007
WS-BPEL
MZ M Mazzara, F Abouzaid, N Dragoni, A Bhattacharyya
Newcastle University, 2009
46*2009
Mithys: Mind the hand you shake-protecting mobile devices from ssl usage vulnerabilities
M Conti, N Dragoni, S Gottardo
International Workshop on Security and Trust Management, 65-81, 2013
442013
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20