Stere Preda

According to our database1, Stere Preda authored at least 20 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Forensic Data Analytics for Anomaly Detection in Evolving Networks.
CoRR, 2023

Trust Management Framework for Containerized Workloads Applications to 5G Networks.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023

2022
Multi-Perspective Content Delivery Networks Security Framework Using Optimized Unsupervised Anomaly Detection.
IEEE Trans. Netw. Serv. Manag., 2022

2021
Content Delivery Network Security: A Survey.
IEEE Commun. Surv. Tutorials, 2021

2020
LURK: Server-Controlled TLS Delegation.
IACR Cryptol. ePrint Arch., 2020

2018
Dynamic Security Orchestration for CDN Edge-Servers.
Proceedings of the 4th IEEE Conference on Network Softwarization and Workshops, 2018

A Security Orchestration System for CDN Edge Servers.
Proceedings of the 4th IEEE Conference on Network Softwarization and Workshops, 2018

2017
Corrigendum to 'OBA2: An Onion approach to Binary code Authorship Attribution' [Digit Investig 11 (2014) S94-S103].
Digit. Investig., 2017

2016
Simplified Wireless Connectivity for 5G Machine Type Communication.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

2015
Scalable code clone search for malware analysis.
Digit. Investig., 2015

2014
OBA2: An Onion approach to Binary code Authorship Attribution.
Digit. Investig., 2014

2013
On the Reverse Engineering of the Citadel Botnet.
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013

2012
RESource: A Framework for Online Matching of Assembly with Open Source Code.
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012

2011
Dynamic deployment of context-aware access control policies for constrained security devices.
J. Syst. Softw., 2011

2010
Model-Driven Security Policy Deployment: Property Oriented Approach.
Proceedings of the Engineering Secure Software and Systems, Second International Symposium, 2010

MIRAGE: A Management Tool for the Analysis and Deployment of Network Security Policies.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2010

Architecture-Aware Adaptive Deployment of Contextual Security Policies.
Proceedings of the ARES 2010, 2010

2009
A secured delegation of remote services on IPv6 home networks.
Proceedings of the CRiSIS 2009, 2009

Semantic context aware security policy deployment.
Proceedings of the 2009 ACM Symposium on Information, 2009

2007
Reliable Process for Security Policy Deployment.
Proceedings of the SECRYPT 2007, 2007


  Loading...