This page in Swedish

Nicola Dragoni

Title: Professor School/office: School of Science and Technology

Email:

Phone: +46 19 303000

Room: -

Research Projects

Research Teams

Publications

Publications

Articles in journals |  Articles, reviews/surveys |  Chapters in books |  Conference papers | 

Articles in journals

De Donno, M. , Giaretta, A. , Dragoni, N. , Bucchiarone, A. & Mazzara, M. (2019). Cyber-Storms Come from Clouds: Security of Cloud Computing in the IoT Era. Future Internet, 11 (6).
De Donno, M. , Dragoni, N. , Giaretta, A. & Spognardi, A. (2018). DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation. Security and Communication Networks.
Bucchiarone, A. , Dragoni, N. , Dustdar, S. , Larsen, S. T. & Mazzara, M. (2018). From Monolithic to Microservices An Experience Report from the Banking Domain. IEEE Software, 35 (3), 50-55.
Mazzara, M. , Dragoni, N. , Bucchiarone, A. , Giaretta, A. , Larsen, S. T. & Dustdar, S. (2018). Microservices: Migration of a Mission Critical System. IEEE Transactions on Services Computing, 1-1.
Conti, M. , Dragoni, N. & Lesyk, V. (2016). A Survey of Man In The Middle Attacks. IEEE Communications Surveys and Tutorials, 18 (3), 2027-2051.
Di Mauro, A. , Fafoutis, X. & Dragoni, N. (2015). Adaptive security in ODMAC for multihop energy harvesting wireless sensor networks. International Journal of Distributed Sensor Networks.
Fafoutis, X. , Di Mauro, A. , Orfanidis, C. & Dragoni, N. (2015). Energy-efficient medium access control for energy harvesting communications. IEEE transactions on consumer electronics, 61 (4), 402-410.
Fafoutis, X. , Di Mauro, A. , Vithanage, M. D. & Dragoni, N. (2015). Receiver-Initiated Medium Access Control Protocols for Wireless Sensor Networks. Computer Networks, 76, 55-74.
Fafoutis, X. , Orfanidis, C. & Dragoni, N. (2014). Altruistic Backoff: Collision Avoidance for Receiver-Initiated MAC Protocols for Wireless Sensor Networks. International Journal of Distributed Sensor Networks (Article ID 576401).

Articles, reviews/surveys

Chapters in books

Dragoni, N. , Giallorenzo, S. , Lluch-Lafuente, A. , Mazzara, M. , Montesi, F. , Mustafin, R. & Safina, L. (2017). Microservices: Yesterday, Today, and Tomorrow. In: M. Mazzara and B. Meyer, Present and Ulterior Software Engineering (pp. 195-216). . Springer.

Conference papers

Sigurdsson, G. , Giaretta, A. & Dragoni, N. (2020). Vulnerabilities and Security Breaches in Cryptocurrencies. In: Ciancarini, P.; Mazzara, M.; Messina, A.; Sillitti, A.; Succi, G., Proceedings of 6th International Conference in Software Engineering for Defence Applications. Paper presented at 6th International Conference in Software Engineering for Defence Applications (SEDA 2018), Rome, Italy, June 7-8, 2018. Springer.
Tange, K. , De Donno, M. , Fafoutis, X. & Dragoni, N. (2019). Towards a Systematic Survey of Industrial IoT Security Requirements: Research Method and Quantitative Analysis. In: Ramachandran, GS; Ortiz, J, Proceedings of the 2019 Workshop on Fog Computing and the IoT (IOT-FOG '19). Paper presented at 2019 Workshop on Fog Computing and the IoT (IoT-Fog 2019), Montreal, Canada, April 15, 2019 (pp. 56-63). Association for Computing Machinery (ACM).
Giaretta, A. , De Donno, M. & Dragoni, N. (2018). Adding Salt to Pepper: A Structured Security Assessment over a Humanoid Robot. In: Proceedings of the 13th International Conference on Availability, Reliability and Security. Paper presented at 13th International Conference on Availability, Reliability and Security (ARES 2018), Hamburg, Germany, August 27-30, 2018. ACM.
De Donno, M. , Dragoni, N. , Giaretta, A. & Mazzara, M. (2018). AntibIoTic: Protecting IoT Devices Against DDoS Attacks. In: Ciancarini, P.; Litvinov, S.; Messina, A.; Sillitti, A.; Succi, G., Proceedings of 5th International Conference in Software Engineering for Defence Applications SEDA 2016. Paper presented at 5th International Conference in Software Engineering for Defence Applications, Rome, Italy, May 10, 2016 (pp. 59-72). Cham: Springer.
Giaretta, A. & Dragoni, N. (2018). Community Targeted Phishing: A Middle Ground Between Massive and Spear Phishing through Natural Language Generation. Paper presented at 6th International Conference in Software Engineering for Defence Applications (SEDA 2018), Rome, Italy, June 7-8, 2018.
Giaretta, A. , Dragoni, N. & Mazzara, M. (2018). Joining Jolie to Docker: Orchestration of Microservices on a Containers-as-a-Service Layer. In: Ciancarini, P.; Litvinov, S.; Messina, A.; Sillitti, A.; Succi, G., Proceedings of 5th International Conference in Software Engineering for Defence Applications SEDA 2016. Paper presented at 5th International Conference in Software Engineering for Defence Applications, Rome, Italy, May 10, 2016 (pp. 167-175). Cham: Springer.
Dragoni, N. , Lanese, I. , Thordal Larsen, S. , Mazzara, M. , Mustafin, R. & Safina, L. (2018). Microservices: How To Make Your Application Scale. In: Alexander K. Petrenko, Andrei Voronkov, Perspectives of System Informatics 11th International Andrei P. Ershov Informatics Conference, PSI 2017, Moscow, Russia, June 27-29, 2017, Revised Selected Papers. Paper presented at 11th International Andrei Ershov Memorial Conference on Perspectives of System Informatics (PSI 2017), Moscow, Russian Federation, June 27-29, 2017 (pp. 95-104). Springer.
Dragoni, N. , Giaretta, A. & Mazzara, M. (2018). The Internet of Hackable Things. In: Ciancarini, P.; Litvinov, S.; Messina, A.; Sillitti, A.; Succi, G., Proceedings of 5th International Conference in Software Engineering for Defence Applications SEDA 2016. Paper presented at 5th International Conference in Software Engineering for Defence Applications, Rome, Italy, May 10, 2016 (pp. 129-140). Cham: Springer.
De Donno, M. , Giaretta, A. , Dragoni, N. & Spognardi, A. (2017). A Taxonomy of Distributed Denial of Service Attacks. In: Charles A. Shoniregun, Galyna A. Akmayeva, i-Society 2017 Proceedings. Paper presented at International Conference on Information Society (i-Society 2017), Dublin, Ireland, July 17-19, 2017 (pp. 99-106). Infonomics Society.
De Donno, M. , Dragoni, N. , Giaretta, A. & Spognardi, A. (2017). Analysis of DDoS-Capable IoT Malwares. In: M. Ganzha, L. Maciaszek, M. Paprzycki, Proceedings of the 2017 Federated Conference on Computer Science and Information Systems. Paper presented at Federated Conference on Computer Science and Information Systems (FedCSIS 2017), Prague, Czech Republic, September 3-6, 2017 (pp. 807-816). Institute of Electrical and Electronics Engineers (IEEE).
Tolboe Handler, D. , Hauge, L. , Angelo, S. & Dragoni, N. (2017). Security And Privacy Issues in Healthcare Monitoring Systems: A Case Study. In: Proceedings of the 10th International Conference on Health Informatics (HEALTHINF'17). Paper presented at 10th International Conference on Health Informatics (HEALTHINF'17), Porto, Portugal, February 21-23, 2017. SciTePress.
Argyriou, M. , Dragoni, N. & Spognardi, A. (2017). Security Flows in OAuth 2.0 Framework: A Case Study. In: Tonetta S., Schoitsch E., Bitsch F., Computer safety, reliability, and security SAFECOMP 2017 Workshops, ASSURE, DECSoS, SASSUR, TELERISE, and TIPS, Trento, Italy, September 12, 2017, Proceedings. Paper presented at TELERISE: 3rd International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity, 2017, LNCS. (pp. 396-406). Springer.
Schougaard, D. , Dragoni, N. & Spognardi, A. (2016). Evaluation of Professional Cloud Password Management Tools. In: Current Trends in Web Engineering ICWE 2016 International Workshops. Paper presented at 16th International Conference on Web Engineering (ICWE), Lugano, Switzerland, June 6-9, 2016 (pp. 16-28).
Goyal, R. , Dragoni, N. & Spognardi, A. (2016). Mind The Tracker You Wear: A Security Analysis of Wearable Health Trackers. In: Proceedings of the 31st Annual ACM Symposium on Applied Computing. Paper presented at 31st Annual ACM Symposium on Applied Computing (SAC 2016), Pisa, Italy, April 4-8, 2016 (pp. 131-136). Association for Computing Machinery (ACM).
Goyal, R. , Spognardi, A. , Dragoni, N. & Marios, A. (2016). SafeDroid: A Distributed Malware Detection Service for Android. In: 2016 IEEE 9th International Conference on Service-Oriented Computing and Applications (SOCA). Paper presented at 9th IEEE International Conference on Service-Oriented Computing and Applications (SOCA 2016), Macau, China, November 4-6, 2016 (pp. 59-66). New York: Institute of Electrical and Electronics Engineers (IEEE).
Wearing, T. & Dragoni, N. (2016). Security and Privacy Issues in Health Monitoring Systems: eCare@Home Case Study. In: Proceedings of the 1st Workshop on Emerging eHealth through Internet of Things (EHIoT 2016). Paper presented at 1st Workshop on Emerging eHealth through Internet of Things (EHIoT 2016)(affiliated with HealthyIoT’16), Västerås, Sweden, October 19, 2016.
Goyal, R. & Dragoni, N. (2016). Why Hackers Love eHealth Applications. Paper presented at 3rd EAI International Conference on IoT Technologies for HealthCare (HealthyIoT'16), Västerås, Sweden, October 18-19, 2016.
Enemark, H. , Zhang, Y. , Dragoni, N. & Orfanidis, C. (2015). Energy-Efficient Fault-Tolerant Dynamic Event Region Detection in Wireless Sensor Networks. In: 2015 IEEE 81st Vehicular Technology Conference (VTC Spring) proceedings. Paper presented at 2015 IEEE 81st Vehicular Technology Conference (VTC2015-Spring), IEEE VTC Workshop on Heterogeneous Networking for the Internet of Things, Glasgow, Scotland, May 11-14, 2015. IEEE conference proceedings.
Orfanidis, C. , Zhang, Y. & Dragoni, N. (2015). Fault Detection in WSNs - An Energy Efficiency Perspective Towards Human-Centric WSNs. In: Gordan Jezic, Robert J. Howlett, Lakhmi C. Jain, Agent and Multi-Agent Systems Technologies and Applications. Paper presented at 9th KES International Conference on Agent and Multi-Agent Systems - Technologies and Applications (KES-AMSTA), Sorrento, Italy, June 17-19, 2015 (pp. 285-300).