Michele De Donno
Michele De Donno
Cyber Security Engineer, Terma GmbH
Verified email at dtu.dk
Title
Cited by
Cited by
Year
DDoS-capable IoT malwares: Comparative analysis and Mirai investigation
M De Donno, N Dragoni, A Giaretta, A Spognardi
Security and Communication Networks 2018, 2018
1162018
Foundations and evolution of modern computing paradigms: Cloud, iot, edge, and fog
M De Donno, K Tange, N Dragoni
Ieee Access 7, 150936-150948, 2019
872019
Analysis of DDoS-capable IoT malwares
M De Donno, N Dragoni, A Giaretta, A Spognardi
2017 Federated Conference on Computer Science and Information Systems†…, 2017
662017
A systematic survey of industrial Internet of Things security: Requirements and fog computing opportunities
K Tange, M De Donno, X Fafoutis, N Dragoni
IEEE Communications Surveys & Tutorials 22 (4), 2489-2520, 2020
532020
AntibIoTic: protecting IoT devices against DDoS attacks
M De Donno, N Dragoni, A Giaretta, M Mazzara
International Conference in Software Engineering for Defence Applications, 59-72, 2016
322016
Cyber-storms come from clouds: Security of cloud computing in the iot era
M De Donno, A Giaretta, N Dragoni, A Bucchiarone, M Mazzara
Future Internet 11 (6), 127, 2019
282019
Adding salt to pepper: A structured security assessment over a humanoid robot
A Giaretta, M De Donno, N Dragoni
Proceedings of the 13th International Conference on Availability†…, 2018
252018
Towards a systematic survey of industrial IoT security requirements: research method and quantitative analysis
K Tange, M De Donno, X Fafoutis, N Dragoni
Proceedings of the Workshop on Fog Computing and the IoT, 56-63, 2019
132019
ANTIBIoTIC 2.0: A fog-based anti-malware for Internet of Things
M De Donno, JMD Felipe, N Dragoni
2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 11-20, 2019
102019
When the price is your privacy: A security analysis of two cheap iot devices
M Favaretto, TT Anh, J Kavaja, M De Donno, N Dragoni
International Conference in Software Engineering for Defence Applications, 55-75, 2018
72018
A Taxonomy of Distributed Denial of Service Attacks
M De Donno, N Dragoni, A Giaretta, A Spognardi
International Conference on Information Society (i-Society), 2017, 2017
72017
Combining AntibIoTic with fog computing: AntibIoTic 2.0
M De Donno, N Dragoni
2019 IEEE 3rd International Conference on Fog and Edge Computing (ICFEC), 1-6, 2019
52019
BitFlow: Enabling real‐time cash‐flow evaluations through blockchain
L Herskind, A Giaretta, M De Donno, N Dragoni
Concurrency and Computation: Practice and Experience 32 (12), e5333, 2020
32020
RESIP Host Detection: Identification of Malicious Residential IP Proxy Flows
A Tosun, M De Donno, N Dragoni, X Fafoutis
2021 IEEE International Conference on Consumer Electronics (ICCE), 1-6, 2021
12021
SHAKE: SHared Acceleration Key Establishment for Resource-Constrained IoT Devices
E Bejder, AK Mathiasen, M De Donno, N Dragoni, X Fafoutis
2020 IEEE 6th World Forum on Internet of Things (WF-IoT), 1-6, 2020
12020
Sustainable Security for Internet of Things
M De Donno, KM Malarski, X Fafoutis, N Dragoni, MN Petersen, ...
2019 International Conference on Smart Applications, Communications and†…, 2019
12019
AntibIoTic: The Fog-enhanced distributed security system to protect the (legacy) Internet of Things
M De Donno, X Fafoutis, N Dragoni
Journal of Computer Security, 1-37, 2021
2021
AntibIoTic: Securing the Internet of Things with Fog Computing
M De Donno
Technical University of Denmark, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–18