Emil Pricop

Orcid: 0000-0002-4021-6549

According to our database1, Emil Pricop authored at least 35 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Handwritten Signature Recognition using Parallel CNNs and Transfer Learning for Forensics.
Proceedings of the 10th International Conference on Control, 2024

2023
Game-based Resource Allocation for Secure UAV Communication in Wireless Networks.
Proceedings of the 15th International Conference on Electronics, 2023

Zero-Load: A Zero Touch Network based router management scheme underlying 6G-IoT ecosystems.
Proceedings of the 15th International Conference on Electronics, 2023

2022
Cyber Security: Issues and Current Trends
Studies in Computational Intelligence 995, Springer, ISBN: 978-981-16-6596-7, 2022

Deep convolutional neural network for environmental sound classification via dilation.
J. Intell. Fuzzy Syst., 2022

An Approach to Discover Similar Musical Patterns.
IEEE Access, 2022

On the design of an interactive automatic Python programming skills assessment system.
Proceedings of the 14th International Conference on Electronics, 2022

FPGA Implementation of SIMON-128 Cryptographic Algorithm Using Artix-7.
Proceedings of the 14th International Conference on Electronics, 2022

2021
PoRF: Proof-of-Reputation-based Consensus Scheme for Fair Transaction Ordering.
Proceedings of the 13th International Conference on Electronics, 2021

A Machine Learning Approach to Classify Network Traffic.
Proceedings of the 13th International Conference on Electronics, 2021

FaitH: Trusted Chain Network for Non-Cooperative D2D Communication Underlying HetNet.
Proceedings of the 13th International Conference on Electronics, 2021

2020
An analysis of the application of fuzzy logic in cloud computing.
J. Intell. Fuzzy Syst., 2020

Smali+: An Operational Semantics for Low-Level Code Generated from Reverse Engineering Android Applications.
Inf., 2020

UAV identification system based on memristor physical unclonable functions.
Proceedings of the 12th International Conference on Electronics, 2020

2019
On the design of an innovative solution for increasing hazardous materials transportation safety.
CoRR, 2019

Real-time stock analysis for blending recipes in industrial plants.
Proceedings of the 23rd International Conference on System Theory, Control and Computing, 2019

Towards a reliable approach on scaling in data acquisition.
Proceedings of the 23rd International Conference on System Theory, Control and Computing, 2019

On the development of a robust cyber security system for Internet of Things devices.
Proceedings of the 11th International Conference on Electronics, 2019

On the Security of Cryptographic Protocols Using the Little Theorem of Witness Functions.
Proceedings of the 2019 IEEE Canadian Conference of Electrical and Computer Engineering, 2019

2018
IoT Forensic A digital investigation framework for IoT systems.
Proceedings of the 2018 10th International Conference on Electronics, 2018

2017
Introduction to SinJAR (a New Tool for Reverse Engineering Java Applications) and Tracing Its Malicious Actions Using Hidden Markov Models.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2017

Radiation pattern synthesis using hybrid fourier-woodward-lawson-neural networks for reliable mimo antenna systems.
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017

Witness-functions versus interpretation-functions for secrecy in cryptographic protocols: What to choose?
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017

Cryptographic protocol for multipart missions involving two independent and distributed decision levels in a military context.
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017

A multi-agent system for management of control functions as services in onshore oilfield.
Proceedings of the 9th International Conference on Electronics, 2017

Performance analysis in WiMAX networks using random linear network coding.
Proceedings of the 4th International Conference on Control, 2017

Method for authentication of sensors connected on Modbus TCP.
Proceedings of the 4th International Conference on Control, 2017

2016
Authentication by Witness Functions.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Sidelobe level reduction in linear array pattern synthesis using Taylor-MUSIC algorithm for reliable IEEE 802.11 MIMO applications.
Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics, 2016

Formal reasoning on authentication in security protocols.
Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics, 2016

Considerations regarding security issues impact on systems availability.
Proceedings of the 8th International Conference on Electronics, 2016

2015
Tracking Security Flaws in Cryptographic Protocols Using Witness-Functions.
Proceedings of the 2015 IEEE International Conference on Systems, 2015

Fuzzy approach on modelling cyber attacks patterns on data transfer in industrial control systems.
Proceedings of the 2015 7th International Conference on Electronics, 2015

2014
Assessing the security risks of a wireless sensor network from a gas compressor station.
Proceedings of the 6th International Conference on Electronics, 2014

2013
On the Design of a System for Airport Protection against Terrorist Attacks Using MANPADs.
Proceedings of the IEEE International Conference on Systems, 2013


  Loading...