Michele De Donno
Michele De Donno
Cyber Security Engineer, Terma GmbH
Verified email at dtu.dk
Title
Cited by
Cited by
Year
DDoS-capable IoT malwares: Comparative analysis and Mirai investigation
M De Donno, N Dragoni, A Giaretta, A Spognardi
Security and Communication Networks 2018, 2018
892018
Analysis of DDoS-capable IoT malwares
M De Donno, N Dragoni, A Giaretta, A Spognardi
2017 Federated Conference on Computer Science and Information Systems†…, 2017
562017
Foundations and evolution of modern computing paradigms: Cloud, iot, edge, and fog
M De Donno, K Tange, N Dragoni
Ieee Access 7, 150936-150948, 2019
552019
AntibIoTic: protecting IoT devices against DDoS attacks
M De Donno, N Dragoni, A Giaretta, M Mazzara
International Conference in Software Engineering for Defence Applications, 59-72, 2016
282016
Cyber-storms come from clouds: Security of cloud computing in the iot era
M De Donno, A Giaretta, N Dragoni, A Bucchiarone, M Mazzara
Future Internet 11 (6), 127, 2019
242019
Adding salt to pepper: A structured security assessment over a humanoid robot
A Giaretta, M De Donno, N Dragoni
Proceedings of the 13th International Conference on Availability†…, 2018
212018
A systematic survey of industrial internet of things security: Requirements and fog computing opportunities
K Tange, M De Donno, X Fafoutis, N Dragoni
IEEE Communications Surveys & Tutorials 22 (4), 2489-2520, 2020
182020
Towards a systematic survey of industrial IoT security requirements: research method and quantitative analysis
K Tange, M De Donno, X Fafoutis, N Dragoni
Proceedings of the Workshop on Fog Computing and the IoT, 56-63, 2019
92019
ANTIBIoTIC 2.0: A fog-based anti-malware for Internet of Things
M De Donno, JMD Felipe, N Dragoni
2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 11-20, 2019
72019
A Taxonomy of Distributed Denial of Service Attacks
M De Donno, N Dragoni, A Giaretta, A Spognardi
International Conference on Information Society (i-Society), 2017, 2017
62017
When the price is your privacy: A security analysis of two cheap iot devices
M Favaretto, TT Anh, J Kavaja, M De Donno, N Dragoni
International Conference in Software Engineering for Defence Applications, 55-75, 2018
52018
Combining AntibIoTic with fog computing: AntibIoTic 2.0
M De Donno, N Dragoni
2019 IEEE 3rd International Conference on Fog and Edge Computing (ICFEC), 1-6, 2019
42019
BitFlow: Enabling real‐time cash‐flow evaluations through blockchain
L Herskind, A Giaretta, M De Donno, N Dragoni
Concurrency and Computation: Practice and Experience 32 (12), e5333, 2020
22020
SHAKE: SHared Acceleration Key Establishment for Resource-Constrained IoT Devices
E Bejder, AK Mathiasen, M De Donno, N Dragoni, X Fafoutis
2020 IEEE 6th World Forum on Internet of Things (WF-IoT), 1-6, 2020
2020
AntibIoTic: Securing the Internet of Things with Fog Computing
M De Donno
Technical University of Denmark, 2020
2020
Sustainable Security for Internet of Things
M De Donno, KM Malarski, X Fafoutis, N Dragoni, MN Petersen, ...
2019 International Conference on Smart Applications, Communications and†…, 2019
2019
RESIP Host Detection: Identification of Malicious Residential IP Proxy Flows
A Tosun, M De Donno, N Dragoni, X Fafoutis
39th IEEE International Conference on Consumer Electronics, 0
The system can't perform the operation now. Try again later.
Articles 1–17