Segui
Michele De Donno
Michele De Donno
Senior Manager Security Assurance, Sky Deutschland
Email verificata su sky.de
Titolo
Citata da
Citata da
Anno
Foundations and evolution of modern computing paradigms: Cloud, iot, edge, and fog
M De Donno, K Tange, N Dragoni
Ieee Access 7, 150936-150948, 2019
3042019
A systematic survey of industrial Internet of Things security: Requirements and fog computing opportunities
K Tange, M De Donno, X Fafoutis, N Dragoni
IEEE Communications Surveys & Tutorials 22 (4), 2489-2520, 2020
2642020
DDoS-capable IoT malwares: Comparative analysis and Mirai investigation
M De Donno, N Dragoni, A Giaretta, A Spognardi
Security and Communication Networks 2018, 1-30, 2018
1982018
Analysis of DDoS-capable IoT malwares
M De Donno, N Dragoni, A Giaretta, A Spognardi
2017 Federated Conference on Computer Science and Information Systemsá…, 2017
1042017
Cyber-storms come from clouds: Security of cloud computing in the IoT era
M De Donno, A Giaretta, N Dragoni, A Bucchiarone, M Mazzara
Future Internet 11 (6), 127, 2019
552019
Adding salt to pepper: A structured security assessment over a humanoid robot
A Giaretta, M De Donno, N Dragoni
Proceedings of the 13th International Conference on Availabilityá…, 2018
472018
AntibIoTic: protecting IoT devices against DDoS attacks
M De Donno, N Dragoni, A Giaretta, M Mazzara
Proceedings of 5th International Conference in Software Engineering forá…, 2018
452018
Towards a systematic survey of industrial IoT security requirements: Research method and quantitative analysis
K Tange, M De Donno, X Fafoutis, N Dragoni
Proceedings of the Workshop on Fog Computing and the IoT, 56-63, 2019
262019
ANTIBIOTIC 2.0: A fog-based anti-malware for Internet of Things
M De Donno, JMD Felipe, N Dragoni
2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 11-20, 2019
162019
RESIP host detection: identification of malicious residential IP proxy flows
A Tosun, M De Donno, N Dragoni, X Fafoutis
2021 IEEE International Conference on Consumer Electronics (ICCE), 1-6, 2021
142021
When the price is your privacy: A security analysis of two cheap IoT devices
M Favaretto, T Tran Anh, J Kavaja, M De Donno, N Dragoni
Proceedings of 6th International Conference in Software Engineering forá…, 2020
122020
A Taxonomy of Distributed Denial of Service Attacks
M De Donno, N Dragoni, A Giaretta, A Spognardi
International Conference on Information Society (i-Society), 2017, 2017
122017
Combining AntibIoTic with fog computing: AntibIoTic 2.0
M De Donno, N Dragoni
2019 IEEE 3rd International Conference on Fog and Edge Computing (ICFEC), 1-6, 2019
92019
BitFlow: Enabling real‐time cash‐flow evaluations through blockchain
L Herskind, A Giaretta, M De Donno, N Dragoni
Concurrency and Computation: Practice and Experience 32 (12), e5333, 2020
62020
SHAKE: Shared acceleration key establishment for resource-constrained IoT devices
E Bejder, AK Mathiasen, M De Donno, N Dragoni, X Fafoutis
2020 IEEE 6th World Forum on Internet of Things (WF-IoT), 1-6, 2020
62020
Sustainable security for Internet of Things
M De Donno, KM Malarski, X Fafoutis, N Dragoni, MN Petersen, ...
2019 international conference on smart applications, communications andá…, 2019
42019
AntibIoTic: The Fog-enhanced distributed security system to protect the (legacy) Internet of Things
M De Donno, X Fafoutis, N Dragoni
Journal of Computer Security, 1-37, 2022
12022
AntibIoTic: Securing the Internet of Things with Fog Computing
M De Donno
Technical University of Denmark, 2020
2020
Il sistema al momento non pu˛ eseguire l'operazione. Riprova pi¨ tardi.
Articoli 1–18