Ion Bica

Orcid: 0000-0003-0791-3016

According to our database1, Ion Bica authored at least 29 papers between 2001 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Speech Emotion Recognition for Emergency Services.
Proceedings of the International Conference on Speech Technology and Human-Computer Dialogue, 2023

MTAFinder - Unified OSINT platform for efficient data gathering.
Proceedings of the 15th International Conference on Electronics, 2023

2021
Cyber Attacks Detection Using Open Source ELK Stack.
Proceedings of the 13th International Conference on Electronics, 2021

2020
DLT Based Authentication Framework for Industrial IoT Devices.
Sensors, 2020

Virtualization and Automation for Cybersecurity Training and Experimentation.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2020

Applying Parallel and Distributed Computing Curriculum to Cyber Security Courses.
Proceedings of the IEEE/ACM Workshop on Education for High-Performance Computing, 2020

Internet of Things Traffic Characterization using flow and packet analysis.
Proceedings of the 12th International Conference on Electronics, 2020

2019
Multi-Layer IoT Security Framework for Ambient Intelligence Environments.
Sensors, 2019

On the rewards of self-adaptive IoT honeypots.
Ann. des Télécommunications, 2019

Reputation-Based Security Framework for Internet of Things.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2019

Energy Efficient Trust-Based Security Mechanism for Wireless Sensors and Unmanned Aerial Vehicles.
Proceedings of the 11th International Conference on Electronics, 2019

Data Gathering Optimization in Wireless Sensor Networks Using Unmanned Aerial Vehicles.
Proceedings of the 22nd International Conference on Control Systems and Computer Science, 2019

Security-Oriented Framework for Internet of Things Smart-Home Applications.
Proceedings of the 22nd International Conference on Control Systems and Computer Science, 2019

2018
A security authorization scheme for smart home Internet of Things devices.
Future Gener. Comput. Syst., 2018

2017
Sensing service architecture for smart cities using social network platforms.
Soft Comput., 2017

Reliable Data Collection for Wireless Sensor Networks Using Unmanned Aerial Vehicles.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

Mitigating DoS attacks in publish-subscribe IoT networks.
Proceedings of the 9th International Conference on Electronics, 2017

2016
Performance of parallel ChaCha20 stream cipher.
Proceedings of the 11th IEEE International Symposium on Applied Computational Intelligence and Informatics, 2016

A Bio-cryptographic framework for securing mobile devices content.
Proceedings of the 11th IEEE International Symposium on Applied Computational Intelligence and Informatics, 2016

Energy considerations for data gathering protocol in wireless sensor networks using unmanned aerial vehicles.
Proceedings of the International Conference on Communications, 2016

A Participatory Verification security scheme for the Internet of Things.
Proceedings of the International Conference on Communications, 2016

2015
Spam Filtering Using Automated Classifying Services over a Cloud Computing Infrastructure.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2015

2014
RASSH - Reinforced adaptive SSH honeypot.
Proceedings of the 10th International Conference on Communications, 2014

2012
Experimental DRM Model Using Mobile Code and White-Box Encryption.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012

A new DRM architecture based on mobilel code and white-box encryption.
Proceedings of the 9th International Conference on Communications, 2012

2010
Formal Verification of G-PAKE Using Casper/FDR2 - Securing a Group PAKE Protocol Using Casper/FDR2.
Proceedings of the SECRYPT 2010, 2010

Gossip membership protocol for peer-to-peer streaming overlay construction.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010

2009
Simulation of an Identity-based Cryptography Scheme for Ad Hoc Networks.
Proceedings of the SECRYPT 2009, 2009

2001
SciFinance: A Program Synthesis Tool for Financial Modeling.
AI Mag., 2001


  Loading...