Victor Valeriu Patriciu

According to our database1, Victor Valeriu Patriciu authored at least 45 papers between 2007 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Design and implementation of a novel hybrid botnet.
Proceedings of the 14th International Conference on Electronics, 2022

2021
Reactive WiFi honeypot.
Proceedings of the 13th International Conference on Electronics, 2021

2020
Simulating RPL Attacks in 6lowpan for Detection Purposes.
Proceedings of the 13th International Conference on Communications, 2020

SABRES - A Proof of Concept for Enhanced Cloud Qualified Electronic Signatures.
Proceedings of the 13th International Conference on Communications, 2020

Internet of Things Traffic Characterization using flow and packet analysis.
Proceedings of the 12th International Conference on Electronics, 2020

2019
Energy Efficient Trust-Based Security Mechanism for Wireless Sensors and Unmanned Aerial Vehicles.
Proceedings of the 11th International Conference on Electronics, 2019

Acceleration Techniques for Fully-Homomorphic Encryption Schemes.
Proceedings of the 22nd International Conference on Control Systems and Computer Science, 2019

2018
A security authorization scheme for smart home Internet of Things devices.
Future Gener. Comput. Syst., 2018

Trajectory influence on data collection in Wireless Sensor Networks using an Unmanned Aerial Vehicle.
Proceedings of the 2018 10th International Conference on Electronics, 2018

Applying Neural Network Approach to Homomorphic Encrypted Data.
Proceedings of the 2018 10th International Conference on Electronics, 2018

2017
Sensing service architecture for smart cities using social network platforms.
Soft Comput., 2017

Reliable Data Collection for Wireless Sensor Networks Using Unmanned Aerial Vehicles.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

Authentication mechanism for data gathering protocol in wireless sensor networks.
Proceedings of the 9th International Conference on Electronics, 2017

Neural network models in big data analytics and cyber security.
Proceedings of the 9th International Conference on Electronics, 2017

Mitigating DoS attacks in publish-subscribe IoT networks.
Proceedings of the 9th International Conference on Electronics, 2017

Feature Extraction and Visualization for Network PcapNg Traces.
Proceedings of the 21st International Conference on Control Systems and Computer Science, 2017

2016
LightPcapNg: Implementing a library for general-purpose tracing based on PcapNg.
Proceedings of the 14th IEEE International Symposium on Intelligent Systems and Informatics, 2016

Proposed Scheme for Data Confidentiality and Access Control in Cloud Computing.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2016

Performance of parallel ChaCha20 stream cipher.
Proceedings of the 11th IEEE International Symposium on Applied Computational Intelligence and Informatics, 2016

A Bio-cryptographic framework for securing mobile devices content.
Proceedings of the 11th IEEE International Symposium on Applied Computational Intelligence and Informatics, 2016

Energy considerations for data gathering protocol in wireless sensor networks using unmanned aerial vehicles.
Proceedings of the International Conference on Communications, 2016

A Participatory Verification security scheme for the Internet of Things.
Proceedings of the International Conference on Communications, 2016

2015
Logging for Cloud Computing Forensic Systems.
Int. J. Comput. Commun. Control, 2015

Hybrid Distributed-Hierarchical Identity Based Cryptographic Scheme for Wireless Sensor Networks.
Proceedings of the New Contributions in Information Systems and Technologies, 2015

Spam Filtering Using Automated Classifying Services over a Cloud Computing Infrastructure.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2015

An evaluation of the Reed-Solomon error-correcting codes usage for bio-cryptographic algorithms.
Proceedings of the 10th IEEE Jubilee International Symposium on Applied Computational Intelligence and Informatics, 2015

Cloud computing digital forensics framework for automated anomalies detection.
Proceedings of the 10th IEEE Jubilee International Symposium on Applied Computational Intelligence and Informatics, 2015

Deduplicated distributed file system using lightweight cryptography.
Proceedings of the IEEE International Conference on Intelligent Computer Communication and Processing, 2015

Using OpenCL to Improve String Matching for Network Intrusion Detection.
Proceedings of the 20th International Conference on Control Systems and Computer Science, 2015

Cyber Protection of Critical Infrastructures Using Supervised Learning.
Proceedings of the 20th International Conference on Control Systems and Computer Science, 2015

Cyber Incident Response Aided by Neural Networks and Visual Analytics.
Proceedings of the 20th International Conference on Control Systems and Computer Science, 2015

2014
CASSHH - Case Adaptive SSH Honeypot.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2014

Bio-cryptographic authentication in cloud storage sharing.
Proceedings of the 9th IEEE International Symposium on Applied Computational Intelligence and Informatics, 2014

Intrusions detection based on Support Vector Machine optimized with swarm intelligence.
Proceedings of the 9th IEEE International Symposium on Applied Computational Intelligence and Informatics, 2014

Logging framework for cloud computing forensic environments.
Proceedings of the 10th International Conference on Communications, 2014

Biologically inspired risk assessment in cyber security using neural networks.
Proceedings of the 10th International Conference on Communications, 2014

Spam host classification using swarm intelligence.
Proceedings of the 10th International Conference on Communications, 2014

2013
Beyond digital forensics. A cloud computing perspective over incident response and reporting.
Proceedings of the IEEE 8th International Symposium on Applied Computational Intelligence and Informatics, 2013

2012
Experimental DRM Model Using Mobile Code and White-Box Encryption.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012

Using MTMs to secure electronic signatures generation.
Proceedings of the 9th International Conference on Communications, 2012

A new DRM architecture based on mobilel code and white-box encryption.
Proceedings of the 9th International Conference on Communications, 2012

2010
Formal Verification of G-PAKE Using Casper/FDR2 - Securing a Group PAKE Protocol Using Casper/FDR2.
Proceedings of the SECRYPT 2010, 2010

2009
Simulation of an Identity-based Cryptography Scheme for Ad Hoc Networks.
Proceedings of the SECRYPT 2009, 2009

Workflow management for paramedical emergency operations within a mobile-static distributed environment.
Proceedings of the 4th Workshop on Workflows in Support of Large-Scale Science, 2009

2007
The Polynomial Multicomposition Problem in (Z/nZ).
Proceedings of the SECRYPT 2007, 2007


  Loading...