Anca Jurcut
Orcid: 0000-0002-2705-1823Affiliations:
- University College Dublin, Ireland
According to our database1,
Anca Jurcut
authored at least 85 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
An Evolutionary Game Theory-Based Cooperation Framework for Countering Privacy Inference Attacks.
IEEE Trans. Comput. Soc. Syst., June, 2024
Trans. Emerg. Telecommun. Technol., January, 2024
Malicious traffic detection in multi-environment networks using novel S-DATE and PSO-D-SEM approaches.
Comput. Secur., January, 2024
A Novel Authentication Protocol for 5G gNodeBs in Service Migration Scenarios of MEC.
IEEE Trans. Dependable Secur. Comput., 2024
A Holistic Approach to Ransomware Classification: Leveraging Static and Dynamic Analysis with Visualization.
Inf., 2024
FAMTDS: A novel MFO-based fully automated malicious traffic detection system for multi-environment networks.
Comput. Networks, 2024
Comput. Electr. Eng., 2024
Advancing Autonomous Vehicle Safety: Machine Learning to Predict Sensor-Related Accident Severity.
IEEE Access, 2024
IEEE Access, 2024
IEEE Access, 2024
Enhancing In-Vehicle Network Security Against AI-Generated Cyberattacks Using Machine Learning.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2024
AI on the Defensive and Offensive: Securing Multi-Environment Networks from AI Agents.
Proceedings of the IEEE International Conference on Communications, 2024
JoinDetect: A Data-Led Machine Learning Approach to Detection of Coinjoin Transactions.
Proceedings of the 2024 International Conference on Information Technology for Social Good, 2024
2023
An Optimized Privacy Information Exchange Schema for Explainable AI Empowered WiMAX-based IoT networks.
Future Gener. Comput. Syst., November, 2023
Comput. Electr. Eng., September, 2023
Future Internet, July, 2023
Comput. Networks, April, 2023
Novel Online Network Intrusion Detection System for Industrial IoT Based on OI-SVDD and AS-ELM.
IEEE Internet Things J., March, 2023
IEEE Trans. Intell. Transp. Syst., February, 2023
Correction to: Methodology for Detecting Cyber Intrusions in e-Learning Systems during COVID-19 Pandemic.
Mob. Networks Appl., February, 2023
Methodology for Detecting Cyber Intrusions in e-Learning Systems during COVID-19 Pandemic.
Mob. Networks Appl., February, 2023
J. Parallel Distributed Comput., February, 2023
A privacy-dependent condition-based privacy-preserving information sharing scheme in online social networks.
Comput. Commun., February, 2023
Algorithms, February, 2023
NG-MVEE: A New Proposed Hybrid Technique for Enhanced Mitigation of Code Re-Use Attack.
IEEE Access, 2023
Securing Multi-Environment Networks using Versatile Synthetic Data Augmentation Technique and Machine Learning Algorithms.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023
Proceedings of the 21st Mediterranean Communication and Computer Networking Conference, 2023
Enhancing Ransomware Classification with Multi-stage Feature Selection and Data Imbalance Correction.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2023
Design Requirements for Secured and Cost-Efficient Blockchain-Based Data Exchange Frameworks in Healthcare.
Proceedings of the Fifth International Conference on Blockchain Computing and Applications, 2023
2022
IEEE Trans. Cogn. Commun. Netw., 2022
A Flow-Based Anomaly Detection Approach With Feature Selection Method Against DDoS Attacks in SDNs.
IEEE Trans. Cogn. Commun. Netw., 2022
Intrusion Detection in Internet of Things Systems: A Review on Design Approaches Leveraging Multi-Access Edge Computing, Machine Learning, and Datasets.
Sensors, 2022
Deep Learning Based Homomorphic Secure Search-Able Encryption for Keyword Search in Blockchain Healthcare System: A Novel Approach to Cryptography.
Sensors, 2022
ICT Express, 2022
Trans. Emerg. Telecommun. Technol., 2022
ACM Comput. Surv., 2022
Toward pragmatic modeling of privacy information propagation in online social networks.
Comput. Networks, 2022
A comparative study on online machine learning techniques for network traffic streams analysis.
Comput. Networks, 2022
Anomaly Detection Based on CNN and Regularization Techniques Against Zero-Day Attacks in IoT Networks.
IEEE Access, 2022
SDN Intrusion Detection: An Ensemble Approach to Reducing False Negative Rate for Novel Attacks.
Proceedings of the 32nd International Telecommunication Networks and Applications Conference, 2022
Proceedings of the IEEE Global Communications Conference, 2022
Proceedings of the 27th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2022
Security Requirements for Vehicle-to-Everything (V2X) Communications Integrated with Blockchain.
Proceedings of the Fourth International Conference on Blockchain Computing and Applications, 2022
2021
Wirel. Pers. Commun., 2021
Wirel. Pers. Commun., 2021
Deep Learning Based Early Detection Framework for Preliminary Diagnosis of COVID-19 via Onboard Smartphone Sensors.
Sensors, 2021
A novel hybrid model for intrusion detection systems in SDNs based on CNN and a new regularization technique.
J. Netw. Comput. Appl., 2021
IEEE Secur. Priv., 2021
Methodology proposal for proactive detection of network anomalies in e-learning system during the COVID-19 scenario.
CoRR, 2021
Protect Against Unintentional Insider Threats: The risk of an employee's cyber misconduct on a Social Media Site.
CoRR, 2021
IEEE Commun. Surv. Tutorials, 2021
IEEE Consumer Electron. Mag., 2021
Securing Bio-Cyber Interface for the Internet of Bio-Nano Things using Particle Swarm Optimization and Artificial Neural Networks based parameter profiling.
Comput. Biol. Medicine, 2021
Proceedings of the Future Access Enablers for Ubiquitous and Intelligent Infrastructures, 2021
The Role of CNN for Intrusion Detection Systems: An Improved CNN Learning Approach for SDNs.
Proceedings of the Future Access Enablers for Ubiquitous and Intelligent Infrastructures, 2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
2020
Proceedings of the Guide to Disaster-Resilient Communication Networks, 2020
Inf. Technol. Manag., 2020
Proceedings of the 21st IEEE International Symposium on "A World of Wireless, 2020
Proceedings of the Q2SWinet '20: Proceedings of the 16th ACM Symposium on QoS and Security for Wireless and Mobile Networks, 2020
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020
Proceedings of the ICNCC 2020: The 9th International Conference on Networks, 2020
Security as a Service Platform Leveraging Multi-Access Edge Computing Infrastructure Provisions.
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Proceedings of the Cyber and Digital Forensic Investigations, 2020
2019
Wirel. Pers. Commun., 2019
A Novel Security Protocol Attack Detection Logic with Unique Fault Discovery Capability for Freshness Attacks and Interleaving Session Attacks.
IEEE Trans. Dependable Secur. Comput., 2019
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference Workshop, 2019
Proceedings of the 2019 IEEE Conference on Standards for Communications and Networking, 2019
2018
Proceedings of the 2018 IEEE Wireless Communications and Networking Conference, 2018
2017
Comput. Networks, 2017
2014
Design guidelines for security protocols to prevent replay & parallel session attacks.
Comput. Secur., 2014
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014
On the Prevention and Detection of Replay Attacks Using a Logic-Based Verification Tool.
Proceedings of the Computer Networks - 21st International Conference, 2014
2013
Establishing and Fixing Security Protocols Weaknesses Using a Logic-based Verification Tool.
J. Commun., 2013
2012
Symmetry in Security Protocol Cryptographic Messages - A Serious Weakness Exploitable by Parallel Session Attacks.
Proceedings of the Seventh International Conference on Availability, 2012
2008
Determining a parallel session attack on a key distribution protocol using a model checker.
Proceedings of the MoMM'2008 - The 6th International Conference on Advances in Mobile Computing and Multimedia, 24, 2008
Proceedings of the Intelligent Distributed Computing, Systems and Applications, Proceedings of the 2nd International Symposium on Intelligent Distributed Computing, 2008