Anca Jurcut

Orcid: 0000-0002-2705-1823

Affiliations:
  • University College Dublin, Ireland


According to our database1, Anca Jurcut authored at least 77 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A privacy-sensitive data identification model in online social networks.
Trans. Emerg. Telecommun. Technol., January, 2024

Malicious traffic detection in multi-environment networks using novel S-DATE and PSO-D-SEM approaches.
Comput. Secur., January, 2024

A Holistic Approach to Ransomware Classification: Leveraging Static and Dynamic Analysis with Visualization.
Inf., 2024

Advancing Autonomous Vehicle Safety: Machine Learning to Predict Sensor-Related Accident Severity.
IEEE Access, 2024

A Novel Approach for Real-Time Server-Based Attack Detection Using Meta-Learning.
IEEE Access, 2024

2023
IoT Vulnerabilities and Attacks: SILEX Malware Case Study.
Symmetry, November, 2023

An Optimized Privacy Information Exchange Schema for Explainable AI Empowered WiMAX-based IoT networks.
Future Gener. Comput. Syst., November, 2023

A lightweight-X-authentication protocol over automotive gateway.
Comput. Electr. Eng., September, 2023

Analysis of ICS and SCADA Systems Attacks Using Honeypots.
Future Internet, July, 2023

Blockchain-based privacy-preserving authentication protocol for UAV networks.
Comput. Networks, April, 2023

Novel Online Network Intrusion Detection System for Industrial IoT Based on OI-SVDD and AS-ELM.
IEEE Internet Things J., March, 2023

An Adaptive Network Security System for IoT-Enabled Maritime Transportation.
IEEE Trans. Intell. Transp. Syst., February, 2023

Correction to: Methodology for Detecting Cyber Intrusions in e-Learning Systems during COVID-19 Pandemic.
Mob. Networks Appl., February, 2023

Methodology for Detecting Cyber Intrusions in e-Learning Systems during COVID-19 Pandemic.
Mob. Networks Appl., February, 2023

Malware detection using image representation of malware data and transfer learning.
J. Parallel Distributed Comput., February, 2023

A privacy-dependent condition-based privacy-preserving information sharing scheme in online social networks.
Comput. Commun., February, 2023

Intrusion Detection for Electric Vehicle Charging Systems (EVCS).
Algorithms, February, 2023

A Comprehensive Joint Learning System to Detect Skin Cancer.
IEEE Access, 2023

NG-MVEE: A New Proposed Hybrid Technique for Enhanced Mitigation of Code Re-Use Attack.
IEEE Access, 2023

Securing Multi-Environment Networks using Versatile Synthetic Data Augmentation Technique and Machine Learning Algorithms.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023

Deep Ensemble-based Efficient Framework for Network Attack Detection.
Proceedings of the 21st Mediterranean Communication and Computer Networking Conference, 2023

Enhancing Ransomware Classification with Multi-stage Feature Selection and Data Imbalance Correction.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2023

Design Requirements for Secured and Cost-Efficient Blockchain-Based Data Exchange Frameworks in Healthcare.
Proceedings of the Fifth International Conference on Blockchain Computing and Applications, 2023

2022
Active Learning for Network Traffic Classification: A Technical Study.
IEEE Trans. Cogn. Commun. Netw., 2022

A Flow-Based Anomaly Detection Approach With Feature Selection Method Against DDoS Attacks in SDNs.
IEEE Trans. Cogn. Commun. Netw., 2022

Intrusion Detection in Internet of Things Systems: A Review on Design Approaches Leveraging Multi-Access Edge Computing, Machine Learning, and Datasets.
Sensors, 2022

Deep Learning Based Homomorphic Secure Search-Able Encryption for Keyword Search in Blockchain Healthcare System: A Novel Approach to Cryptography.
Sensors, 2022

Realizing contact-less applications with Multi-Access Edge Computing.
ICT Express, 2022

From statistical- to machine learning-based network traffic prediction.
Trans. Emerg. Telecommun. Technol., 2022

MEC-enabled 5G Use Cases: A Survey on Security Vulnerabilities and Countermeasures.
ACM Comput. Surv., 2022

Toward pragmatic modeling of privacy information propagation in online social networks.
Comput. Networks, 2022

A comparative study on online machine learning techniques for network traffic streams analysis.
Comput. Networks, 2022

Anomaly Detection Based on CNN and Regularization Techniques Against Zero-Day Attacks in IoT Networks.
IEEE Access, 2022

SDN Intrusion Detection: An Ensemble Approach to Reducing False Negative Rate for Novel Attacks.
Proceedings of the 32nd International Telecommunication Networks and Applications Conference, 2022

Service Migration Authentication Protocol for MEC.
Proceedings of the IEEE Global Communications Conference, 2022

M-TADS: A Multi-Trust DoS Attack Detection System for MEC-enabled Industrial loT.
Proceedings of the 27th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2022

Security Requirements for Vehicle-to-Everything (V2X) Communications Integrated with Blockchain.
Proceedings of the Fourth International Conference on Blockchain Computing and Applications, 2022

2021
Correction to: Power and Resource Allocation in Wireless Communication Network.
Wirel. Pers. Commun., 2021

Power and Resource Allocation in Wireless Communication Network.
Wirel. Pers. Commun., 2021

Deep Learning Based Early Detection Framework for Preliminary Diagnosis of COVID-19 via Onboard Smartphone Sensors.
Sensors, 2021

A novel hybrid model for intrusion detection systems in SDNs based on CNN and a new regularization technique.
J. Netw. Comput. Appl., 2021

Dealing With COVID-19 Network Traffic Spikes [Cybercrime and Forensics].
IEEE Secur. Priv., 2021

Active Learning for Network Traffic Classification: A Technical Survey.
CoRR, 2021

Methodology proposal for proactive detection of network anomalies in e-learning system during the COVID-19 scenario.
CoRR, 2021

BLOFF: A Blockchain based Forensic Model in IoT.
CoRR, 2021

Protect Against Unintentional Insider Threats: The risk of an employee's cyber misconduct on a Social Media Site.
CoRR, 2021

Survey on Multi-Access Edge Computing Security and Privacy.
IEEE Commun. Surv. Tutorials, 2021

Novel MEC Based Approaches for Smart Hospitals to Combat COVID-19 Pandemic.
IEEE Consumer Electron. Mag., 2021

Securing Bio-Cyber Interface for the Internet of Bio-Nano Things using Particle Swarm Optimization and Artificial Neural Networks based parameter profiling.
Comput. Biol. Medicine, 2021

A Design of Energy Efficient Nanorouting Protocol Using Greedy Algorithm.
Proceedings of the Future Access Enablers for Ubiquitous and Intelligent Infrastructures, 2021

The Role of CNN for Intrusion Detection Systems: An Improved CNN Learning Approach for SDNs.
Proceedings of the Future Access Enablers for Ubiquitous and Intelligent Infrastructures, 2021

A Hybrid CNN-LSTM Based Approach for Anomaly Detection Systems in SDNs.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Secure and Resilient Communications in the Industrial Internet.
Proceedings of the Guide to Disaster-Resilient Communication Networks, 2020

Security Considerations for Internet of Things: A Survey.
SN Comput. Sci., 2020

AGE: authentication in gadget-free healthcare environments.
Inf. Technol. Manag., 2020

InSDN: A Novel SDN Intrusion Dataset.
IEEE Access, 2020

DDoSNet: A Deep-Learning Model for Detecting Network Attacks.
Proceedings of the 21st IEEE International Symposium on "A World of Wireless, 2020

Network Anomaly Detection Using LSTM Based Autoencoder.
Proceedings of the Q2SWinet '20: Proceedings of the 16th ACM Symposium on QoS and Security for Wireless and Mobile Networks, 2020

Detecting Abnormal Traffic in Large-Scale Networks.
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020

Detection and Prevention of New Attacks for ID-based Authentication Protocols.
Proceedings of the ICNCC 2020: The 9th International Conference on Networks, 2020

Security as a Service Platform Leveraging Multi-Access Edge Computing Infrastructure Provisions.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Forensic Investigation of Ransomware Activities - Part 2.
Proceedings of the Cyber and Digital Forensic Investigations, 2020

2019
Anonymous Lightweight Proxy Based Key Agreement for IoT (ALPKA).
Wirel. Pers. Commun., 2019

A Novel Security Protocol Attack Detection Logic with Unique Fault Discovery Capability for Freshness Attacks and Interleaving Session Attacks.
IEEE Trans. Dependable Secur. Comput., 2019

Insider threats in Cyber Security: The enemy within the gates.
CoRR, 2019

Machine-Learning Techniques for Detecting Attacks in SDN.
CoRR, 2019

A Novel Authentication Mechanism for Mobile Satellite Communication Systems.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference Workshop, 2019

Realizing Multi-Access Edge Computing Feasibility: Security Perspective.
Proceedings of the 2019 IEEE Conference on Standards for Communications and Networking, 2019

2018
On the security verification of a short message service protocol.
Proceedings of the 2018 IEEE Wireless Communications and Networking Conference, 2018

2017
Secure communication channel architecture for Software Defined Mobile Networks.
Comput. Networks, 2017

2014
Design guidelines for security protocols to prevent replay & parallel session attacks.
Comput. Secur., 2014

Design requirements to counter parallel session attacks in security protocols.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

On the Prevention and Detection of Replay Attacks Using a Logic-Based Verification Tool.
Proceedings of the Computer Networks - 21st International Conference, 2014

2013
Establishing and Fixing Security Protocols Weaknesses Using a Logic-based Verification Tool.
J. Commun., 2013

2012
Symmetry in Security Protocol Cryptographic Messages - A Serious Weakness Exploitable by Parallel Session Attacks.
Proceedings of the Seventh International Conference on Availability, 2012

2008
Determining a parallel session attack on a key distribution protocol using a model checker.
Proceedings of the MoMM'2008 - The 6th International Conference on Advances in Mobile Computing and Multimedia, 24, 2008

On Establishing and Fixing a Parallel Session Attack in a Security Protocol.
Proceedings of the Intelligent Distributed Computing, Systems and Applications, Proceedings of the 2nd International Symposium on Intelligent Distributed Computing, 2008


  Loading...