Follow
Michele De Donno
Michele De Donno
Senior Manager Security Assurance, Sky Deutschland
Verified email at sky.de
Title
Cited by
Cited by
Year
Foundations and evolution of modern computing paradigms: Cloud, iot, edge, and fog
M De Donno, K Tange, N Dragoni
Ieee Access 7, 150936-150948, 2019
3092019
A systematic survey of industrial Internet of Things security: Requirements and fog computing opportunities
K Tange, M De Donno, X Fafoutis, N Dragoni
IEEE Communications Surveys & Tutorials 22 (4), 2489-2520, 2020
2702020
DDoS-capable IoT malwares: Comparative analysis and Mirai investigation
M De Donno, N Dragoni, A Giaretta, A Spognardi
Security and Communication Networks 2018, 1-30, 2018
2002018
Analysis of DDoS-capable IoT malwares
M De Donno, N Dragoni, A Giaretta, A Spognardi
2017 Federated Conference on Computer Science and Information Systems†…, 2017
1042017
Cyber-storms come from clouds: Security of cloud computing in the IoT era
M De Donno, A Giaretta, N Dragoni, A Bucchiarone, M Mazzara
Future Internet 11 (6), 127, 2019
552019
Adding salt to pepper: A structured security assessment over a humanoid robot
A Giaretta, M De Donno, N Dragoni
Proceedings of the 13th International Conference on Availability†…, 2018
482018
AntibIoTic: protecting IoT devices against DDoS attacks
M De Donno, N Dragoni, A Giaretta, M Mazzara
Proceedings of 5th International Conference in Software Engineering for†…, 2018
452018
Towards a systematic survey of industrial IoT security requirements: Research method and quantitative analysis
K Tange, M De Donno, X Fafoutis, N Dragoni
Proceedings of the Workshop on Fog Computing and the IoT, 56-63, 2019
272019
ANTIBIOTIC 2.0: A fog-based anti-malware for Internet of Things
M De Donno, JMD Felipe, N Dragoni
2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 11-20, 2019
162019
RESIP host detection: identification of malicious residential IP proxy flows
A Tosun, M De Donno, N Dragoni, X Fafoutis
2021 IEEE International Conference on Consumer Electronics (ICCE), 1-6, 2021
142021
When the price is your privacy: A security analysis of two cheap IoT devices
M Favaretto, T Tran Anh, J Kavaja, M De Donno, N Dragoni
Proceedings of 6th International Conference in Software Engineering for†…, 2020
122020
A Taxonomy of Distributed Denial of Service Attacks
M De Donno, N Dragoni, A Giaretta, A Spognardi
International Conference on Information Society (i-Society), 2017, 2017
122017
Combining AntibIoTic with fog computing: AntibIoTic 2.0
M De Donno, N Dragoni
2019 IEEE 3rd International Conference on Fog and Edge Computing (ICFEC), 1-6, 2019
112019
BitFlow: Enabling real‐time cash‐flow evaluations through blockchain
L Herskind, A Giaretta, M De Donno, N Dragoni
Concurrency and Computation: Practice and Experience 32 (12), e5333, 2020
62020
SHAKE: Shared acceleration key establishment for resource-constrained IoT devices
E Bejder, AK Mathiasen, M De Donno, N Dragoni, X Fafoutis
2020 IEEE 6th World Forum on Internet of Things (WF-IoT), 1-6, 2020
62020
Sustainable security for Internet of Things
M De Donno, KM Malarski, X Fafoutis, N Dragoni, MN Petersen, ...
2019 international conference on smart applications, communications and†…, 2019
42019
AntibIoTic: The Fog-enhanced distributed security system to protect the (legacy) Internet of Things
M De Donno, X Fafoutis, N Dragoni
Journal of Computer Security, 1-37, 2022
12022
AntibIoTic: Securing the Internet of Things with Fog Computing
M De Donno
Technical University of Denmark, 2020
12020
The system can't perform the operation now. Try again later.
Articles 1–18