Bogdan Ghita

Orcid: 0000-0002-1788-547X

Affiliations:
  • University of Plymouth, School of Computing and Mathematics, UK


According to our database1, Bogdan Ghita authored at least 112 papers between 2001 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Review of IoT Firmware Vulnerabilities and Auditing Techniques.
Sensors, January, 2024

Medical Systems Data Security and Biometric Authentication in Public Cloud Servers.
IEEE Trans. Emerg. Top. Comput., 2024

Personalised Feedback Framework for Online Education Programmes Using Generative AI.
CoRR, 2024

A Unified Knowledge Graph to Permit Interoperability of Heterogeneous Digital Evidence.
CoRR, 2024

Energy-Efficient Placement of Virtual Network Functions in a Wireless Mesh Network.
IEEE Access, 2024

Industry Perception of Security Challenges with Identity Access Management Solutions.
Proceedings of the IEEE International Black Sea Conference on Communications and Networking, 2024

Deepfake Image Detection Using Vision Transformer Models.
Proceedings of the IEEE International Black Sea Conference on Communications and Networking, 2024

2023
Brainwave-based authentication using features fusion.
Comput. Secur., June, 2023

Data Driven Approaches to Cybersecurity Governance for Board Decision-Making - A Systematic Review.
CoRR, 2023

A Unified Knowledge Graph to Permit Interoperability of Heterogenous Digital Evidence.
Proceedings of the Ubiquitous Security, 2023

SAFE: a Standardized Automotive Forensic Engine for Law Enforcement Agencies.
Proceedings of the 15th International Conference on Innovations in Information Technology, 2023

Evaluating Learning Algorithms for Keystroke Based User Authentication.
Proceedings of the IEEE International Black Sea Conference on Communications and Networking, 2023

Work-in-Progress: Security of Public-Key Schemes in the Quantum Computing Era - A Literature Review.
Proceedings of the IEEE International Black Sea Conference on Communications and Networking, 2023

2022
A Gesture-Based Educational System that Integrates Simulation and Molecular Visualization to Teach Chemistry.
Int. J. Emerg. Technol. Learn., February, 2022

On the Importance of the Newborn Stage When Learning Patterns with the Spatial Pooler.
SN Comput. Sci., 2022

2021
Anomaly Detection in Encrypted Internet Traffic Using Hybrid Deep Learning.
Secur. Commun. Networks, 2021

A Novel Multimodal Biometric Authentication System using Machine Learning and Blockchain.
CoRR, 2021

Using a Machine Learning Model for Malicious URL Type Detection.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2021

The Challenges with Internet of Things Security for Business.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2021

Improved HTM Spatial Pooler with Homeostatic Plasticity Control.
Proceedings of the 10th International Conference on Pattern Recognition Applications and Methods, 2021

Enhancing Medical Data Security on Public Cloud.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021

On Keystroke Pattern Variability in Virtual Desktop Infrastructure.
Proceedings of The Fourth International Workshop on Computer Modeling and Intelligent Systems (CMIS-2021), 2021

2020
Digital forensics cloud log unification: Implementing CADF in Apache CloudStack.
J. Inf. Secur. Appl., 2020

Entropy-Based Metrics for Occupancy Detection Using Energy Demand.
Entropy, 2020

The Challenges with Internet of Things for Business.
CoRR, 2020

Impact of Network and Host Characteristics on the Keystroke Pattern in Remote Desktop Sessions.
CoRR, 2020

Blockchain and Trust for Secure, End-User-Based and Decentralized IoT Service Provision.
IEEE Access, 2020

Audio Interval Retrieval Using Convolutional Neural Networks.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2020

Comparative Analysis of Cryptographic Key Management Systems.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2020

Detection of Insider Threats using Artificial Intelligence and Visualisation.
Proceedings of the 6th IEEE Conference on Network Softwarization, 2020

Bluetooth Performance Evaluation based on Notify for Real-time Body-Area Sensor Networks.
Proceedings of the 2020 IEEE International Workshop on Metrology for Industry 4.0 & IoT, 2020

Performance Evaluation of Bluetooth in a Wireless Body Area Network for Practical Applications.
Proceedings of the 11th IEEE Sensor Array and Multichannel Signal Processing Workshop, 2020

On the Relationship Between Input Sparsity and Noise Robustness in Hierarchical Temporal Memory Spatial Pooler.
Proceedings of the ESSE 2020: 2020 European Symposium on Software Engineering, 2020

Synergy of Trust, Blockchain and Smart Contracts for Optimization of Decentralized IoT Service Platforms.
Proceedings of the Advanced Information Networking and Applications, 2020

2019
Using Burstiness for Network Applications Classification.
J. Comput. Networks Commun., 2019

Formal Application Description of Autonomous and Cooperative M2M Application Services.
J. Commun., 2019

Novel trust consensus protocol and blockchain-based trust evaluation system for M2M application services.
Internet Things, 2019

Performance analysis of data fragmentation techniques on a cloud server.
Int. J. Grid Util. Comput., 2019

A machine-learning approach to Detect users' suspicious behaviour through the Facebook wall.
CoRR, 2019

FCMDT: A novel fuzzy cognitive maps dynamic trust model for cloud federated identity management.
Comput. Secur., 2019

NFV Resource Advertisement and Discovery Protocol for a Distributed NFV Orchestration in a WMN-based Disaster Network.
Proceedings of the 2019 International Conference on Software, 2019

Enhancing Data Security in Cloud using Random Pattern Fragmentation and a Distributed NoSQL Database.
Proceedings of the 2019 IEEE International Conference on Systems, Man and Cybernetics, 2019

A Novel Online Incremental Learning Intrusion Prevention System.
Proceedings of the 10th IFIP International Conference on New Technologies, 2019

Malware Squid: A Novel IoT Malware Traffic Analysis Framework Using Convolutional Neural Network and Binary Visualisation.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2019

FaceWallGraph: Using Machine Learning for Profiling User Behaviour from Facebook Wall.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2019

A novel approach for performance-based clustering and anagement of network traffic flows.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

User Profiling Based on Application-Level Using Network Metadata.
Proceedings of the 7th International Symposium on Digital Forensics and Security, 2019

Requirements for a Distributed NFV Orchestration in a WMN-Based Disaster Network.
Proceedings of the 5th International Conference on Information and Communication Technologies for Disaster Management, 2019

A Novel Features Set for Internet Traffic Classification using Burstiness.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

BBGDASH: A Max-Min Bounded Bitrate Guidance for SDN Enabled Adaptive Video Streaming.
Proceedings of the 22nd Conference on Innovation in Clouds, 2019

Bandwidth Prediction Schemes for Defining Bitrate Levels in SDN-enabled Adaptive Streaming.
Proceedings of the 15th International Conference on Network and Service Management, 2019

Trusted, Decentralized and Blockchain-Based M2M Application Service Provision.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2019

2018
Sharing with Live Migration Energy Optimization Scheduler for Cloud Computing Data Centers.
Future Internet, 2018

Dynamic Neighbour Aware Power-controlled MAC for Multi-hop Ad-hoc networks.
Ad Hoc Networks, 2018

Securing Cloud Storage by Transparent Biometric Cryptography.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2018

Trust-Based Composition of M2M Application Services.
Proceedings of the Tenth International Conference on Ubiquitous and Future Networks, 2018

Distributed NFV Orchestration in a WMN-Based Disaster Network.
Proceedings of the Tenth International Conference on Ubiquitous and Future Networks, 2018

Detection of LDDoS Attacks Based on TCP Connection Parameters.
Proceedings of the 2018 Global Information Infrastructure and Networking Symposium, 2018

Agent-based Vs Agent-less Sandbox for Dynamic Behavioral Analysis.
Proceedings of the 2018 Global Information Infrastructure and Networking Symposium, 2018

Blockchain-Based Trust Communities for Decentralized M2M Application Services.
Proceedings of the Advances on P2P, 2018

2017
M2M Application Service Provision: An Autonomous and Decentralised Approach.
J. Commun., 2017

Signals of opportunity geolocation methods for urban and indoor environments.
Ann. des Télécommunications, 2017

Location based transmission using a neighbour aware with optimized EIFS MAC for ad hoc networks.
Ad Hoc Networks, 2017

QoE-driven video enhancements in wireless networks through predictive packet drops.
Proceedings of the 13th IEEE International Conference on Wireless and Mobile Computing, 2017

Trust Integration for Security Optimisation in P2P-Based M2M Applications.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Performance analysis of WMN routing protocols for disaster networks.
Proceedings of the 24. IEEE Symposium on Communications and Vehicular Technology, 2017

Framework for automated functional testing of P2P-based M2M applications.
Proceedings of the Ninth International Conference on Ubiquitous and Future Networks, 2017

Bit precision and Cyclic prefix effect on OFDM Power Consumption Estimation.
Proceedings of the 5th International Conference on Communications and Broadband Networking, Bali, Indonesia, February 20, 2017

2016
On Internet Traffic Classification: A Two-Phased Machine Learning Approach.
J. Comput. Networks Commun., 2016

Location Based Transmission Using a Neighbour Aware-Cross Layer MAC for Ad Hoc Networks.
Proceedings of the Wired/Wireless Internet Communications, 2016

OpenFlow-enabled user traffic profiling in campus software defined networks.
Proceedings of the 12th IEEE International Conference on Wireless and Mobile Computing, 2016

A Pre-clustering Method To Improve Anomaly Detection.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

User-Centric Network Provisioning in Software Defined Data Center Environment.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016

Efficient Test Case Derivation from Statecharts-based Models.
Proceedings of the Eleventh International Network Conference, 2016

P2P-based M2M Community Applications.
Proceedings of the Eleventh International Network Conference, 2016

QoE Enhancements in IEEE 802.11e EDCA for Video Transmission through Selective Queueing.
Proceedings of the Eleventh International Network Conference, 2016

Mobile Edge Computing: Requirements for Powerful Mobile Near Real-Time Applications.
Proceedings of the Eleventh International Network Conference, 2016

Assay of Multipath TCP for Session Continuity in Distributed Mobility Management.
Proceedings of the Eleventh International Network Conference, 2016

A Review on Power Consumption Reduction Techniques on OFDM.
Proceedings of the Eleventh International Network Conference, 2016

User-centric traffic optimization in residential software defined networks.
Proceedings of the 23rd International Conference on Telecommunications, 2016

Improving IP Prefix Hijacking Detection by Tracing Hijack Fingerprints and Verifying Them through RIR Databases.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

IP prefix hijack detection using BGP connectivity monitoring.
Proceedings of the 17th IEEE International Conference on High Performance Switching and Routing, 2016

Traffic Profiling: Evaluating Stability in Multi-device User Environments.
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016

2015
Toward enhanced data exchange capabilities for the oneM2M service platform.
IEEE Commun. Mag., 2015

Queue utilization with hop based enhanced arbitrary inter frame spacing MAC for saturated ad HOC networks.
Proceedings of the 14th Annual Mediterranean Ad Hoc Networking Workshop, 2015

2014
Achieving Improved Network Subscriber Geo-Location.
Proceedings of the Tenth International Network Conference, 2014

A M2M-based Automotive Service Delivery Platform for Distributed Vehicular Applications.
Proceedings of the Tenth International Network Conference, 2014

Assay of White Space Technology Standards for Vehicular Cognitive Access.
Proceedings of the Tenth International Network Conference, 2014

2013
Generic Real-Time Traffic Distribution Framework: Black Rider.
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013

A new service description for communication services as basis for automated functional testing.
Proceedings of the Second International Conference on Future Generation Communication Technologies (FGCT 2013), 2013

P2p-based community concept for M2M applications.
Proceedings of the Second International Conference on Future Generation Communication Technologies (FGCT 2013), 2013

Framework for Generic Context- and Policy-Based Traffic Distribution in Heterogeneous Wireless Networks: Black Rider.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

Hop-Based dynamic fair scheduler for wireless Ad-Hoc networks.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2013

2012
A Novel Security Architecture for a Space-Data DTN.
Proceedings of the Wired/Wireless Internet Communication - 10th International Conference, 2012

Prospects for WLAN in the Evolved Packet Core Environment.
Proceedings of the 5th International Conference on New Technologies, 2012

2011
Improvements to Inter System Handover in the EPC Environment.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011

A new service description language as basis for service composition in SIP-based peer-to-peer infrastructures.
Proceedings of the 4th Joint IFIP Wireless and Mobile Networking Conference, 2011

Transmission rate control through MAC layer acknowledgements feedback.
Proceedings of the 4th Joint IFIP Wireless and Mobile Networking Conference, 2011

User-centric quality of service provisioning.
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011

2010
A Bootstrap Mechanism for NGN QoS Profiling.
Proceedings of the Eighth International Network Conference (INC 2010), 2010

Signalling Effort Evaluation of Mobility Protocols within Evolved Packet Core Network.
Proceedings of the Eighth International Network Conference (INC 2010), 2010

Enhanced Concept of the TeamCom SCE for Automated Generated Services Based on JSLEE.
Proceedings of the Eighth International Network Conference (INC 2010), 2010

Improving Fairness in Ad Hoc Networks Through Collision Rate Control.
Proceedings of the Eighth International Network Conference (INC 2010), 2010

Optimising Quality of Service through the controlled aggregation of traffic.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010

2009
DSP-based bottleneck bandwidth estimation.
Simul. Model. Pract. Theory, 2009

A Sample of Consumer Wi-Fi Use & Security in the UK.
Proceedings of the 7th Annual Conference on Communication Networks and Services Research, 2009

2008
A Framework for Improved QoS Evaluation and Control in SIP-Based NGN.
Proceedings of the Seventh International Network Conference (INC 2008), 2008

2007
A new taxonomy for comparing intrusion detection systems.
Internet Res., 2007

Bottleneck Bandwidth Estimation Using Frequency Analysis.
Proceedings of the 16th International Conference on Computer Communications and Networks, 2007

2004
Performance characterisation of IP networks.
PhD thesis, 2004

2002
Assessing the global accessibility of the Internet.
Internet Res., 2002

2001
Network quality of service monitoring for IP telephony.
Internet Res., 2001


  Loading...