Follow
Michele De Donno
Michele De Donno
Cyber Security Engineer, Sky Deutschland
Verified email at dtu.dk
Title
Cited by
Cited by
Year
Foundations and evolution of modern computing paradigms: Cloud, iot, edge, and fog
M De Donno, K Tange, N Dragoni
Ieee Access 7, 150936-150948, 2019
1632019
DDoS-capable IoT malwares: Comparative analysis and Mirai investigation
M De Donno, N Dragoni, A Giaretta, A Spognardi
Security and Communication Networks 2018, 2018
1522018
A systematic survey of industrial Internet of Things security: Requirements and fog computing opportunities
K Tange, M De Donno, X Fafoutis, N Dragoni
IEEE Communications Surveys & Tutorials 22 (4), 2489-2520, 2020
1452020
Analysis of DDoS-capable IoT malwares
M De Donno, N Dragoni, A Giaretta, A Spognardi
2017 Federated Conference on Computer Science and Information Systems†…, 2017
832017
Cyber-storms come from clouds: Security of cloud computing in the IoT era
M De Donno, A Giaretta, N Dragoni, A Bucchiarone, M Mazzara
Future Internet 11 (6), 127, 2019
392019
AntibIoTic: protecting IoT devices against DDoS attacks
MD Donno, N Dragoni, A Giaretta, M Mazzara
International Conference in Software Engineering for Defence Applications, 59-72, 2016
362016
Adding salt to pepper: A structured security assessment over a humanoid robot
A Giaretta, M De Donno, N Dragoni
Proceedings of the 13th International Conference on Availability†…, 2018
352018
Towards a systematic survey of industrial IoT security requirements: research method and quantitative analysis
K Tange, M De Donno, X Fafoutis, N Dragoni
Proceedings of the Workshop on Fog Computing and the IoT, 56-63, 2019
182019
ANTIBIOTIC 2.0: A fog-based anti-malware for Internet of Things
M De Donno, JMD Felipe, N Dragoni
2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 11-20, 2019
112019
When the price is your privacy: A security analysis of two cheap IoT devices
M Favaretto, T Tran Anh, J Kavaja, MD Donno, N Dragoni
International Conference in Software Engineering for Defence Applications, 55-75, 2018
92018
A Taxonomy of Distributed Denial of Service Attacks
M De Donno, N Dragoni, A Giaretta, A Spognardi
International Conference on Information Society (i-Society), 2017, 2017
72017
Combining AntibIoTic with fog computing: AntibIoTic 2.0
M De Donno, N Dragoni
2019 IEEE 3rd International Conference on Fog and Edge Computing (ICFEC), 1-6, 2019
62019
Resip host detection: Identification of malicious residential ip proxy flows
A Tosun, M De Donno, N Dragoni, X Fafoutis
2021 IEEE International Conference on Consumer Electronics (ICCE), 1-6, 2021
32021
BitFlow: enabling real‐time cash‐flow evaluations through blockchain
L Herskind, A Giaretta, M De Donno, N Dragoni
Concurrency and Computation: Practice and Experience 32 (12), e5333, 2020
32020
SHAKE: SHared Acceleration Key Establishment for Resource-Constrained IoT Devices
E Bejder, AK Mathiasen, M De Donno, N Dragoni, X Fafoutis
2020 IEEE 6th World Forum on Internet of Things (WF-IoT), 1-6, 2020
22020
Sustainable security for Internet of Things
M De Donno, KM Malarski, X Fafoutis, N Dragoni, MN Petersen, ...
2019 International Conference on Smart Applications, Communications and†…, 2019
22019
AntibIoTic: the Fog-enhanced distributed security system to protect the (legacy) Internet of Things
M De Donno, X Fafoutis, N Dragoni
Journal of Computer Security, 1-37, 2022
2022
AntibIoTic: Securing the Internet of Things with Fog Computing
M De Donno, N Dragoni, CW Probst, X Fafoutis, P Pop, M Conti, ...
Technical University of Denmark, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–18