Folgen
Nicola Dragoni
Nicola Dragoni
Deputy Director, Head of Section, Professor @ DTU Compute
Bestätigte E-Mail-Adresse bei dtu.dk - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Microservices: yesterday, today, and tomorrow
N Dragoni, S Giallorenzo, AL Lafuente, M Mazzara, F Montesi, R Mustafin, ...
Present and ulterior software engineering, 195-216, 2017
17932017
A Survey of Man In The Middle Attacks
M Conti, N Dragoni, V Lesyk
IEEE COMMUNICATIONS SURVEYS & TUTORIALS 18 (3), 2027-2051, 2016
8152016
Foundations and evolution of modern computing paradigms: Cloud, iot, edge, and fog
M De Donno, K Tange, N Dragoni
IEEE access 7, 150936-150948, 2019
4112019
A systematic survey of industrial Internet of Things security: Requirements and fog computing opportunities
K Tange, M De Donno, X Fafoutis, N Dragoni
IEEE Communications Surveys & Tutorials 22 (4), 2489-2520, 2020
4002020
Microservices: How to make your application scale
N Dragoni, I Lanese, ST Larsen, M Mazzara, R Mustafin, L Safina
Perspectives of System Informatics: 11th International Andrei P. Ershov …, 2018
2822018
DDoS-capable IoT malwares: Comparative analysis and Mirai investigation
M De Donno, N Dragoni, A Giaretta, A Spognardi
Security and Communication Networks 2018, 2018
2332018
Blockchain implementations and use cases for supply chains-a survey
P Gonczol, P Katsikouli, L Herskind, N Dragoni
Ieee Access 8, 11856-11871, 2020
2202020
From monolithic to microservices: An experience report from the banking domain
A Bucchiarone, N Dragoni, S Dustdar, ST Larsen, M Mazzara
Ieee Software 35 (3), 50-55, 2018
2172018
On the benefits and challenges of blockchains for managing food supply chains
P Katsikouli, AS Wilde, N Dragoni, H Høgh‐Jensen
Journal of the Science of Food and Agriculture 101 (6), 2175-2181, 2021
1532021
ODMAC: An on-demand MAC protocol for energy harvesting-wireless sensor networks
X Fafoutis, N Dragoni
Proceedings of the 8th ACM Symposium on Performance evaluation of wireless …, 2011
1462011
Microservices: Migration of a mission critical system
M Mazzara, N Dragoni, A Bucchiarone, A Giaretta, ST Larsen, S Dustdar
IEEE Transactions on Services Computing 14 (5), 1464-1477, 2018
1442018
Analysis of DDoS-capable IoT malwares
M De Donno, N Dragoni, A Giaretta, A Spognardi
2017 Federated Conference on Computer Science and Information Systems …, 2017
1242017
Security-by-contract: Toward a semantics for digital signatures on mobile code
N Dragoni, F Massacci, K Naliuka, I Siahaan
Public Key Infrastructure: 4th European PKI Workshop: Theory and Practice …, 2007
962007
Mind the tracker you wear: a security analysis of wearable health trackers
R Goyal, N Dragoni, A Spognardi
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 131-136, 2016
802016
Receiver-initiated medium access control protocols for wireless sensor networks
X Fafoutis, A Di Mauro, MD Vithanage, N Dragoni
Computer Networks 76, 55-74, 2015
742015
The internet of hackable things
N Dragoni, A Giaretta, M Mazzara
International Conference in Software Engineering for Defence Applications …, 2016
712016
Ml-based 5g network slicing security: A comprehensive survey
R Dangi, A Jadhav, G Choudhary, N Dragoni, MK Mishra, P Lalwani
Future Internet 14 (4), 116, 2022
672022
A security-by-contract architecture for pervasive services
N Dragoni, F Massacci, C Schaefer, T Walter, E Vétillard
Third International Workshop on Security, Privacy and Trust in Pervasive and …, 2007
64*2007
Cyber-storms come from clouds: Security of cloud computing in the IoT era
M De Donno, A Giaretta, N Dragoni, A Bucchiarone, M Mazzara
Future Internet 11 (6), 127, 2019
632019
Privacy and cryptocurrencies—A systematic literature review
L Herskind, P Katsikouli, N Dragoni
IEEE Access 8, 54044-54059, 2020
62*2020
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20