Radu State
Orcid: 0000-0002-4751-9577
According to our database1,
Radu State
authored at least 283 papers
between 1995 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
NIRWatchdog: Cross-Domain Product Quality Assessment Using Miniaturized Near-Infrared Sensors.
IEEE Internet Things J., April, 2024
A review on graph-based approaches for network security monitoring and botnet detection.
Int. J. Inf. Sec., February, 2024
Mitigating federated learning contribution allocation instability through randomized aggregation.
CoRR, 2024
To Squelch or not to Squelch: Enabling Improved Message Dissemination on the XRP Ledger.
Proceedings of the NOMS 2024 IEEE Network Operations and Management Symposium, 2024
Proceedings of the NOMS 2024 IEEE Network Operations and Management Symposium, 2024
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2024, 2024
Proceedings of the 5th ACM International Conference on AI in Finance, 2024
Proceedings of the 5th ACM International Conference on AI in Finance, 2024
2023
Remote. Sens., October, 2023
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023
G-HIN2Vec: Distributed heterogeneous graph representations for cardholder transactions.
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023
XRP-NDN overlay: Improving the Communication Efficiency of Consensus-Validation based Blockchains with an NDN Overlay.
Proceedings of the NOMS 2023, 2023
Proceedings of the 24th IEEE International Conference on Mobile Data Management, 2023
Proceedings of the IEEE Latin-American Conference on Communications, 2023
Proceedings of the IEEE Latin-American Conference on Communications, 2023
Proceedings of the IEEE Symposium on Computers and Communications, 2023
ULA, a Bibliometric Method to Identify Sustainable Development Goals using Large Language Models.
Proceedings of the IEEE International Humanitarian Technology Conference, 2023
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023
Proceedings of the IEEE International Conference on Decentralized Applications and Infrastructures, 2023
2022
Elysium: Context-Aware Bytecode-Level Patching to Automatically Heal Vulnerable Smart Contracts.
Proceedings of the 25th International Symposium on Research in Attacks, 2022
An Analysis of Byzantine-Tolerant Aggregation Mechanisms on Model Poisoning in Federated Learning.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2022
Proceedings of the 22nd ACM Internet Measurement Conference, 2022
Proceedings of the IEEE Global Communications Conference, 2022
An REE-independent Approach to Identify Callers of TEEs in TrustZone-enabled Cortex-M Devices.
Proceedings of the 8th ACM on Cyber-Physical System Security Workshop, 2022
Proceedings of the IEEE International Conference on Big Data, 2022
2021
IACR Cryptol. ePrint Arch., 2021
Elysium: Automagically Healing Vulnerable Smart Contracts Using Context-Aware Patching.
CoRR, 2021
Frontrunner Jones and the Raiders of the Dark Forest: An Empirical Study of Frontrunning on the Ethereum Blockchain.
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking and Services, 2021
Securing Robots: An Integrated Approach for Security Challenges and Monitoring for the Robotic Operating System (ROS).
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021
Proceedings of the IEEE European Symposium on Security and Privacy, 2021
Proceedings of the IEEE Conference on Communications and Network Security, 2021
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021
2020
Int. J. Netw. Comput., 2020
Blockchain Governance: An Overview and Prediction of Optimal Strategies using Nash Equilibrium.
CoRR, 2020
Intrusion detection on robot cameras using spatio-temporal autoencoders: A self-driving car application.
Proceedings of the 91st IEEE Vehicular Technology Conference, 2020
Proceedings of the NOMS 2020, 2020
Proceedings of the NOMS 2020, 2020
Proceedings of the Mediterranean Communication and Computer Networking Conference, 2020
Proceedings of the Principles, Systems and Applications of IP Telecommunications, 2020
Proceedings of the IECC 2020: 2nd International Electronics Communication Conference, 2020
Proceedings of the 25th International Conference on Engineering of Complex Computer Systems, 2020
Federated Learning For Cyber Security: SOC Collaboration For Malicious URL Detection.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020
Proceedings of the "I Can't Believe It's Not Better!" at NeurIPS Workshops, 2020
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2020
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2020
Opportunities for Blockchain Diffusion in the Agri-food Supply Chain: Case Study in Wine Sector - Abstract.
Proceedings of the 9th International Conference on Information and Communication Technologies in Agriculture, 2020
Proceedings of the BSCI '20: Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2020
Proceedings of the 17th IEEE/ACS International Conference on Computer Systems and Applications, 2020
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
2019
Infer Your Enemies and Know Yourself, Learning in Real-Time Bidding with Partially Observable Opponents.
CoRR, 2019
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019
Proceedings of the 2019 IEEE International Conference on Systems, Man and Cybernetics, 2019
Proceedings of the Smart Blockchain - Second International Conference, 2019
Proceedings of the 6th Swiss Conference on Data Science, 2019
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2019
Proceedings of the Mining Data for Financial Applications - 4th ECML PKDD Workshop, 2019
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2019
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2019
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2019
Proceedings of the 3rd IEEE International Conference on Robotic Computing, 2019
Proceedings of the 3rd IEEE International Conference on Robotic Computing, 2019
An Experimental Analysis of Fraud Detection Methods in Enterprise Telecommunication Data using Unsupervised Outlier Ensembles.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019
Proceedings of the 23rd International Database Applications & Engineering Symposium, 2019
Proceedings of the 2019 International Conference on Data Mining Workshops, 2019
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019
Proceedings of the Financial Cryptography and Data Security, 2019
Proceedings of the 27th European Symposium on Artificial Neural Networks, 2019
Proceedings of the Crypto Valley Conference on Blockchain Technology, 2019
Proceedings of the Blockchain and Applications - International Congress, 2019
Proceedings of the IEEE International Conference on Big Data and Smart Computing, 2019
Proceedings of the Advances in Artificial Intelligence, 2019
2018
CoRR, 2018
On the Reduction of Biases in Big Data Sets for the Detection of Irregular Power Usage.
CoRR, 2018
Proceedings of the 9th IFIP International Conference on New Technologies, 2018
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018
Proceedings of the Second Workshop on Distributed Infrastructures for Deep Learning, 2018
Proceedings of the 21st International Conference on Intelligent Transportation Systems, 2018
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018
Proceedings of the 2018 Principles, Systems and Applications of IP Telecommunications, 2018
User-Device Authentication in Mobile Banking Using APHEN for Paratuck2 Tensor Decomposition.
Proceedings of the 2018 IEEE International Conference on Data Mining Workshops, 2018
Proceedings of the Sixth International Symposium on Computing and Networking, 2018
Proceedings of the 26th European Symposium on Artificial Neural Networks, 2018
Non-negative Paratuck2 Tensor Decomposition Combined to LSTM Network for Smart Contracts Profiling.
Proceedings of the 2018 IEEE International Conference on Big Data and Smart Computing, 2018
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2017
Proc. VLDB Endow., 2017
The Challenge of Non-Technical Loss Detection Using Artificial Intelligence: A Survey.
Int. J. Comput. Intell. Syst., 2017
Human in the Loop: Interactive Passive Automata Learning via Evidence-Driven State-Merging Algorithms.
CoRR, 2017
Proceedings of the Second Workshop on MIning DAta for financial applicationS (MIDAS 2017) co-located with the 2017 European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML-PKDD 2017), 2017
Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, 2017
Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, 2017
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017
Proceedings of the 2017 Principles, Systems and Applications of IP Telecommunications, 2017
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017
Identifying Irregular Power Usage by Turning Predictions into Holographic Spatial Visualizations.
Proceedings of the 2017 IEEE International Conference on Data Mining Workshops, 2017
Proceedings of the 2017 IEEE International Conference on Data Mining Workshops, 2017
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2017, 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Proceedings of the 25th European Symposium on Artificial Neural Networks, 2017
Proceedings of the 1st Cyber Security in Networking Conference, 2017
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017
Proceedings of the ACM/IEEE Symposium on Architectures for Networking and Communications Systems, 2017
Proceedings of the Advanced Data Mining and Applications - 13th International Conference, 2017
Proceedings of the Advanced Data Mining and Applications - 13th International Conference, 2017
2016
Empirical assessment of machine learning-based malware detectors for Android - Measuring the gap between in-the-lab and in-the-wild validation scenarios.
Empir. Softw. Eng., 2016
The Challenge of Non-Technical Loss Detection using Artificial Intelligence: A Survey.
CoRR, 2016
Comput. Commun. Rev., 2016
Proceedings of the IEEE NetSoft Conference and Workshops, 2016
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016
Proceedings of the 2016 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2016
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
Proceedings of the 13th International Conference on Grammatical Inference, 2016
Proceedings of the 12th International Conference on Network and Service Management, 2016
Proceedings of the 3rd IEEE/ACM International Conference on Big Data Computing, 2016
Proceedings of the 3rd IEEE/ACM International Conference on Big Data Computing, 2016
2015
IEEE Trans. Netw. Serv. Manag., 2015
Proceedings of the Principles, Systems and Applications on IP Telecommunications, 2015
Proceedings of the Principles, Systems and Applications on IP Telecommunications, 2015
Proceedings of the Intelligent Mechanisms for Network Configuration and Security, 2015
2014
IEEE/ACM Trans. Netw., 2014
IEEE Trans. Netw. Serv. Manag., 2014
Comput. Commun. Rev., 2014
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Proceedings of the Conference on Principles, 2014
Proceedings of the Conference on Principles, 2014
Proceedings of the IEEE International Conference on Communications, 2014
Proceedings of the IEEE Global Communications Conference, 2014
A Forensic Analysis of Android Malware - How is Malware Written and How it Could Be Detected?
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014
Large-scale machine learning-based malware detection: confronting the "10-fold cross validation" scheme with reality.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014
Proceedings of the 10th International Conference on Network and Service Management, 2014
Making historical connections: Building Application Layer Traffic Optimization (ALTO) network and cost maps from public broadband data.
Proceedings of the 10th International Conference on Network and Service Management, 2014
Proceedings of the 2014 IEEE International Congress on Big Data, Anchorage, AK, USA, June 27, 2014
2013
Proceedings of Principles, Systems and Applications on IP Telecommunications, 2013
Proceedings of Principles, Systems and Applications on IP Telecommunications, 2013
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013
CLIP: Content labeling in IPv6, a layer 3 protocol for information centric networking.
Proceedings of IEEE International Conference on Communications, 2013
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013
Proceedings of the 9th International Conference on Network and Service Management, 2013
Proceedings of the IEEE Conference on Communications and Network Security, 2013
2012
Concurr. Comput. Pract. Exp., 2012
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012
Proceedings of the NETWORKING 2012, 2012
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems, 2012
Proceedings of the Dependable Networks and Services, 2012
2011
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011
Securing Application-Level Topology Estimation Networks: Facing the Frog-Boiling Attack.
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011
Proceedings of the 5th International Conference on Network and System Security, 2011
Proceedings of the NETWORKING 2011, 2011
Proceedings of the NETWORKING 2011, 2011
Proceedings of the 11th International Symposium on Communications and Information Technologies, 2011
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011
Proceedings of the 7th International Conference on Network and Service Management, 2011
Proceedings of the Computational Intelligence in Security for Information Systems, 2011
Proceedings of the 8th IEEE International Conference on Advanced Video and Signal-Based Surveillance, 2011
Comparison of Low-Latency Anonymous Communication Systems - Practical Usage and Performance.
Proceedings of the Ninth Australasian Information Security Conference, 2011
2010
IEEE Trans. Netw. Serv. Manag., 2010
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010
Proceedings of the 7th International Symposium on Visualization for Cyber Security, 2010
Proceedings of the Fourth International Conference on Network and System Security, 2010
Proceedings of the Fourth International Conference on Network and System Security, 2010
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, 2010
Proceedings of the Networked Services and Applications, 2010
Proceedings of the 6th International Conference on Network and Service Management, 2010
Proceedings of the 6th International Conference on Network and Service Management, 2010
Proceedings of the Computational Intelligence in Security for Information Systems 2010, 2010
Proceedings of the Computational Intelligence in Security for Information Systems 2010, 2010
Proceedings of the Mechanisms for Autonomous Management of Networks and Services, 2010
Proceedings of the Mechanisms for Autonomous Management of Networks and Services, 2010
2009
Tech. Sci. Informatiques, 2009
Proceedings of the Stabilization, 2009
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009
Proceedings of the 4th International Conference on Malicious and Unwanted Software, 2009
Proceedings of the Integrated Network Management, 2009
Proceedings of IEEE International Conference on Communications, 2009
, 2009
2008
J. Netw. Syst. Manag., 2008
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008
2007
J. Comput. Virol., 2007
IEEE Trans. Netw. Serv. Manag., 2007
Review of "Embedded Linux Primer: A Practical Real-world Approach by Christopher Hallinan, " Prentice Hall PTR, 2006, ISBN: 0131679848.
ACM Queue, 2007
Proceedings of the Principles, 2007
Proceedings of the Integrated Network Management, 2007
Proceedings of the Integrated Network Management, 2007
Proceedings of the Managing Virtualization of Networks and Services, 2007
Proceedings of the Inter-Domain Management, 2007
2006
IEEE Trans. Netw. Serv. Manag., 2006
Review of "Hacking Exposed: Web Applications, 2nd edition by Joel Scambray, Mike Shema, and Caleb Sima, " McGraw-Hill Osborne Media, 2006, ISBN: 0072262990.
ACM Queue, 2006
Review of "Phishing Exposed by Lance James and Joe Stewart, " Syngress Publishing, 2005, ISBN: 159749030X.
ACM Queue, 2006
Review of "Software Security: Building Security In by Gary McGraw, " Addison-Wesley Professional, 2006, ISBN: 0321356705.
ACM Queue, 2006
Review of "Extrusion Detection: Security Monitoring for Internal Intrusions by Richard Bejtlich, " Adddison-Wesley Professional, 2005, ISBN: 0321349962.
ACM Queue, 2006
Review of "Switching to VoIP by Ted Wallingford, " O'Reilly & Associates, 2005, ISBN 0596008686.
ACM Queue, 2006
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006
Proceedings of the NETWORKING 2006, 2006
2005
Review of "Gray Hat Hacking: The Ethical Hacker's Handbook by Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, and Michael Lester".
ACM Queue, 2005
J. Netw. Syst. Manag., 2005
Management of mobile ad hoc networks: information model and probe-based architecture.
Int. J. Netw. Manag., 2005
Proceedings of the Operations and Management in IP-Based Networks, 2005
Proceedings of the Integrated Network Management, 2005
Proceedings of the Integrated Network Management, 2005
Proceedings of the Networking, 2005
2004
Proceedings of the First International Workshop, 2004
Proceedings of the Managing Next Generation Convergence Networks and Services, 2004
Proceedings of the Utility Computing: 15th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, 2004
2003
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003
Wireless Terminal Management Architectures.
Proceedings of the Integrated Network Management VII, Managing It All, 2003
Proceedings of the High Speed Networks and Multimedia Communications, 2003
Proceedings of the Self-Managing Distributed Systems, 2003
2002
J. Netw. Syst. Manag., 2002
Proceedings of the IEEE International Conference on Systems, Man and Cybernetics: Bridging the Digital Divide, Yasmine Hammamet, Tunisia, October 6-9, 2002, 2002
Proceedings of the Management Solutions for the New Communications World, 2002
Proceedings of The Fourth IEEE Conference on Mobile and Wireless Communications Networks, 2002
Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 2002
Policy based management of wireless networks.
Proceedings of the Network Control and Engineering for QoS, 2002
Proceedings of the Global Telecommunications Conference, 2002
2001
Modèles d'information étendus pour la supervision des réseaux et services dynamiques. (Extended Network Information models for the management of dynamic networks and services).
PhD thesis, 2001
Proceedings of the 2001 IEEE/IFIP International Symposium on Integrated Network Management, 2001
2000
IEEE J. Sel. Areas Commun., 2000
A Programmable Network Based Approach for Managing Dynamic Virtual Private Networks.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2000
A Java based implementation of a network level information model for the ATM/frame relay interconnection.
Proceedings of the Networked Planet: Management Beyond 2000, 2000
Managing Concurrent QoS Assured Multicast Sessions Using a Programmable Network Architecture.
Proceedings of the Services Management in Intelligent Networks, 2000
1996
Neural Parallel Sci. Comput., 1996
1995
Proceedings of the Symbolic and Quantitative Approaches to Reasoning and Uncertainty, 1995