Alberto Giaretta

Assistant Professor

AASS Research Center
School of Science and Technology
Örebro University
70182 Örebro, Sweden
Room: No Room Available
Phone: No Phone Number Available
Email: No Email Address Available

Google Scholar

Publications

[1] A. Giaretta, N. Dragoni and F. Massacci. S×C4IoT : A Security-by-Contract Framework for Dynamic Evolving IoT Devices.BibTeX | DiVA ]
[2] M. Venturini, F. Freda, E. Miotto, M. Conti and A. Giaretta. Differential Area Analysis for Ransomware : Attacks, Countermeasures, and Limitations. IEEE Transactions on Dependable and Secure Computing, 22(4):3449-3464, 2025BibTeX | DiVA ]
[3] A. Giaretta. Security and privacy in virtual reality : a literature survey. Virtual Reality, 29(1), 2025BibTeX | DiVA | PDF ]
[4] Y. Zhu, Z. Chen, Q. Yan, S. Wang, A. Giaretta, E. Li, L. Peng, C. Zhao and M. Conti. Devils in the Clouds : An Evolutionary Study of Telnet Bot Loaders. In ICC 2023 - IEEE International Conference on Communications, pages 2338-2344, 2023BibTeX | DiVA ]
[5] A. Giaretta and A. Loutfi. On the people counting problem in smart homes : undirected graphs and theoretical lower-bounds. Journal of Ambient Intelligence and Humanized Computing, 14(4):3839-3851, 2023BibTeX | DiVA | PDF ]
[6] N. Ritola, A. Giaretta and A. Kiselev. Operator Identification in a VR-Based Robot Teleoperation Scenario Using Head, Hands, and Eyes Movement Data. In Proceedings of the 6th International Workshop on Virtual, Augmented, and Mixed Reality for Human-Robot Interactions (VAM-HRI), 2023 2023BibTeX | DiVA ]
[7] F. Tavella, A. Giaretta, M. Conti and S. Balasubramaniam. A machine learning-based approach to detect threats in bio-cyber DNA storage systems. Computer Communications, 187:59-70, 2022BibTeX | DiVA ]
[8] J. Pirayesh, A. Giaretta, M. Conti and P. Keshavarzi. A PLS-HECC-based device authentication and key agreement scheme for smart home networks. Computer Networks, 216, 2022BibTeX | DiVA ]
[9] G. Chimamiwa, A. Giaretta, M. Alirezaie, F. Pecora and A. Loutfi. Are Smart Homes Adequate for Older Adults with Dementia?. Sensors, 22(11), 2022BibTeX | DiVA ]
[10] A. Giaretta, N. Dragoni and F. Massacci. S×C4IoT : A Security-by-contract Framework for Dynamic Evolving IoT Devices. ACM transactions on sensor networks, 18(1), 2022BibTeX | DiVA | PDF ]
[11] F. Tavella, A. Giaretta, T. M. Dooley-Cullinane, M. Conti, L. Coffey and S. Balasubramaniam. DNA Molecular Storage System : Transferring Digitally Encoded Information through Bacterial Nanonetworks. IEEE Transactions on Emerging Topics in Computing, 9(3):1566-1580, 2021BibTeX | DiVA ]
[12] M. Mazzara, N. Dragoni, A. Bucchiarone, A. Giaretta, S. T. Larsen and S. Dustdar. Microservices : Migration of a Mission Critical System. IEEE Transactions on Services Computing, 14(5):1464-1477, 2021BibTeX | DiVA ]
[13] A. Giaretta. Securing the Internet of Things with Security-by-Contract. Örebro University, School of Science and Technology, Ph.D. Thesis, 2021BibTeX | DiVA ]
[14] M. D. Thomsen, A. Giaretta and N. Dragoni. Smart Lamp or Security Camera? Automatic Identification of IoT Devices. In Selected Papers from the 12th International Networking Conference, pages 85-99, 2021BibTeX | DiVA ]
[15] L. Herskind, A. Giaretta, M. De Donno and N. Dragoni. BitFlow : Enabling Real‐time Cash‐flow Evaluations through Blockchain. Concurrency and Computation, 32(12), 2020BibTeX | DiVA ]
[16] G. Matthíasson, A. Giaretta and N. Dragoni. IoT Device Profiling : From MUD Files to S×C Contracts. In Open Identity Summit 2020, pages 143-154, 2020BibTeX | DiVA ]
[17] G. Sigurdsson, A. Giaretta and N. Dragoni. Vulnerabilities and Security Breaches in Cryptocurrencies. In Proceedings of 6th International Conference in Software Engineering for Defence Applications 2020BibTeX | DiVA ]
[18] A. Giaretta and H. Banaee. Edge Virtual Fence for Smart Airport Physical Security : A Case Study. In Availability, Reliability and Security : ARES 2025 International Workshops, Ghent, Belgium, August 11–14, 2025, Proceedings, Part I, 15994(15994):41-54, 2026BibTeX | DiVA ]
[19] A. Giaretta, N. Dragoni and F. Massacci. IoT Security Configurability with Security-by-Contract. Sensors, 19(19), 2019BibTeX | DiVA ]
[20] A. Giaretta, N. Dragoni and F. Massacci. Protecting the Internet of Things with Security-by-Contract and Fog Computing. In 2019 IEEE 5th World Forum on Internet of Things (WF-IoT) 2019BibTeX | DiVA ]
[21] A. Giaretta, S. Pepe and N. Dragoni. UniquID : A Quest to Reconcile Identity Access Management and the IoT. In Software Technology : Methods and Tools, pages 237-251, 2019BibTeX | DiVA ]
[22] A. Giaretta, M. De Donno and N. Dragoni. Adding Salt to Pepper : A Structured Security Assessment over a Humanoid Robot. In Proceedings of the 13th International Conference on Availability, Reliability and Security 2018BibTeX | DiVA ]
[23] M. De Donno, N. Dragoni, A. Giaretta and M. Mazzara. AntibIoTic : Protecting IoT Devices Against DDoS Attacks. In Proceedings of 5th International Conference in Software Engineering for Defence Applications : SEDA 2016, pages 59-72, 2018BibTeX | DiVA ]
[24] A. Giaretta and N. Dragoni. Community Targeted Phishing : A Middle Ground Between Massive and Spear Phishing through Natural Language Generation. 2018BibTeX | DiVA ]
[25] M. De Donno, N. Dragoni, A. Giaretta and A. Spognardi. DDoS-Capable IoT Malwares : Comparative Analysis and Mirai Investigation. Security and Communication Networks 2018BibTeX | DiVA ]
[26] A. Giaretta, N. Dragoni and M. Mazzara. Joining Jolie to Docker : Orchestration of Microservices on a Containers-as-a-Service Layer. In Proceedings of 5th International Conference in Software Engineering for Defence Applications : SEDA 2016, pages 167-175, 2018BibTeX | DiVA ]
[27] N. Dragoni, A. Giaretta and M. Mazzara. The Internet of Hackable Things. In Proceedings of 5th International Conference in Software Engineering for Defence Applications : SEDA 2016, pages 129-140, 2018BibTeX | DiVA ]
[28] M. De Donno, A. Giaretta, N. Dragoni and A. Spognardi. A Taxonomy of Distributed Denial of Service Attacks. In i-Society 2017 : Proceedings, pages 99-106, 2017BibTeX | DiVA ]
[29] M. De Donno, N. Dragoni, A. Giaretta and A. Spognardi. Analysis of DDoS-Capable IoT Malwares. In Proceedings of the 2017 Federated Conference on Computer Science and Information Systems, pages 807-816, 2017BibTeX | DiVA ]
[30] A. Giaretta, S. Balasubramaniam and M. Conti. Security Vulnerabilities and Countermeasures for Target Localization in Bio-NanoThings Communication Networks. IEEE Transactions on Information Forensics and Security, 11(4):665-676, 2016BibTeX | DiVA ]
[31] M. De Donno, A. Giaretta, N. Dragoni, A. Bucchiarone and M. Mazzara. Cyber-Storms Come from Clouds : Security of Cloud Computing in the IoT Era. Future Internet, 11(6), 2019BibTeX | DiVA ]