Foundations and evolution of modern computing paradigms: Cloud, iot, edge, and fog M De Donno, K Tange, N Dragoni IEEE access 7, 150936-150948, 2019 | 367 | 2019 |
A systematic survey of industrial Internet of Things security: Requirements and fog computing opportunities K Tange, M De Donno, X Fafoutis, N Dragoni IEEE Communications Surveys & Tutorials 22 (4), 2489-2520, 2020 | 350 | 2020 |
DDoS‐capable IoT malwares: comparative analysis and Mirai investigation M De Donno, N Dragoni, A Giaretta, A Spognardi Security and Communication Networks 2018 (1), 7178164, 2018 | 216 | 2018 |
Analysis of DDoS-capable IoT malwares M De Donno, N Dragoni, A Giaretta, A Spognardi 2017 Federated Conference on Computer Science and Information Systems …, 2017 | 112 | 2017 |
Cyber-storms come from clouds: Security of cloud computing in the IoT era M De Donno, A Giaretta, N Dragoni, A Bucchiarone, M Mazzara Future Internet 11 (6), 127, 2019 | 57 | 2019 |
Adding salt to pepper: A structured security assessment over a humanoid robot A Giaretta, M De Donno, N Dragoni Proceedings of the 13th international conference on availability …, 2018 | 56 | 2018 |
AntibIoTic: protecting IoT devices against DDoS attacks M De Donno, N Dragoni, A Giaretta, M Mazzara Proceedings of 5th International Conference in Software Engineering for …, 2018 | 44 | 2018 |
Towards a systematic survey of industrial IoT security requirements: Research method and quantitative analysis K Tange, M De Donno, X Fafoutis, N Dragoni Proceedings of the Workshop on Fog Computing and the IoT, 56-63, 2019 | 29 | 2019 |
RESIP host detection: identification of malicious residential IP proxy flows A Tosun, M De Donno, N Dragoni, X Fafoutis 2021 IEEE International Conference on Consumer Electronics (ICCE), 1-6, 2021 | 19 | 2021 |
ANTIBIOTIC 2.0: A fog-based anti-malware for Internet of Things M De Donno, JMD Felipe, N Dragoni 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 11-20, 2019 | 15 | 2019 |
When the price is your privacy: A security analysis of two cheap IoT devices M Favaretto, T Tran Anh, J Kavaja, M De Donno, N Dragoni Proceedings of 6th International Conference in Software Engineering for …, 2020 | 13 | 2020 |
A Taxonomy of Distributed Denial of Service Attacks M De Donno, N Dragoni, A Giaretta, A Spognardi International Conference on Information Society (i-Society), 2017, 2017 | 12 | 2017 |
SHAKE: SHared acceleration key establishment for resource-constrained IoT devices E Bejder, AK Mathiasen, M De Donno, N Dragoni, X Fafoutis 2020 IEEE 6th World Forum on Internet of Things (WF-IoT), 1-6, 2020 | 10 | 2020 |
Combining AntibIoTic with fog computing: AntibIoTic 2.0 M De Donno, N Dragoni 2019 IEEE 3rd International Conference on Fog and Edge Computing (ICFEC), 1-6, 2019 | 10 | 2019 |
BitFlow: Enabling real‐time cash‐flow evaluations through blockchain L Herskind, A Giaretta, M De Donno, N Dragoni Concurrency and Computation: Practice and Experience 32 (12), e5333, 2020 | 7 | 2020 |
Sustainable security for Internet of Things M De Donno, KM Malarski, X Fafoutis, N Dragoni, MN Petersen, ... 2019 international conference on smart applications, communications and …, 2019 | 4 | 2019 |
AntibIoTic: The Fog-enhanced distributed security system to protect the (legacy) Internet of Things M De Donno, X Fafoutis, N Dragoni Journal of Computer Security 30 (5), 689-725, 2022 | 1 | 2022 |
AntibIoTic: Securing the Internet of Things with Fog Computing M De Donno Technical University of Denmark, 2020 | 1 | 2020 |