Emil Pricop

According to our database1, Emil Pricop authored at least 20 papers between 2013 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
An analysis of the application of fuzzy logic in cloud computing.
J. Intell. Fuzzy Syst., 2020

Smali+: An Operational Semantics for Low-Level Code Generated from Reverse Engineering Android Applications.
Inf., 2020

2019
Fuzzy approach on modelling cyber attacks patterns on data transfer in industrial control systems.
CoRR, 2019

On the design of an innovative solution for increasing hazardous materials transportation safety.
CoRR, 2019

IoT Forensic - A digital investigation framework for IoT systems.
CoRR, 2019

Real-time stock analysis for blending recipes in industrial plants.
Proceedings of the 23rd International Conference on System Theory, Control and Computing, 2019

Towards a reliable approach on scaling in data acquisition.
Proceedings of the 23rd International Conference on System Theory, Control and Computing, 2019

On the Security of Cryptographic Protocols Using the Little Theorem of Witness Functions.
Proceedings of the 2019 IEEE Canadian Conference of Electrical and Computer Engineering, 2019

2018
Considerations regarding security issues impact on systems availability.
CoRR, 2018

2017
Introduction to SinJAR (a New Tool for Reverse Engineering Java Applications) and Tracing Its Malicious Actions Using Hidden Markov Models.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2017

Radiation pattern synthesis using hybrid fourier-woodward-lawson-neural networks for reliable mimo antenna systems.
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017

Witness-functions versus interpretation-functions for secrecy in cryptographic protocols: What to choose?
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017

Cryptographic protocol for multipart missions involving two independent and distributed decision levels in a military context.
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017

Performance analysis in WiMAX networks using random linear network coding.
Proceedings of the 4th International Conference on Control, 2017

Method for authentication of sensors connected on Modbus TCP.
Proceedings of the 4th International Conference on Control, 2017

2016
Authentication by Witness Functions.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Sidelobe level reduction in linear array pattern synthesis using Taylor-MUSIC algorithm for reliable IEEE 802.11 MIMO applications.
Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics, 2016

Formal reasoning on authentication in security protocols.
Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics, 2016

2015
Tracking Security Flaws in Cryptographic Protocols Using Witness-Functions.
Proceedings of the 2015 IEEE International Conference on Systems, 2015

2013
On the Design of a System for Airport Protection against Terrorist Attacks Using MANPADs.
Proceedings of the IEEE International Conference on Systems, 2013


  Loading...