


default search action
Victor Valeriu Patriciu
Publications
- 2022
- [c42]Ioana Apostol, Alexandru-Dan Tica, Victor-Valeriu Patriciu:
Design and implementation of a novel hybrid botnet. ECAI 2022: 1-6 - 2021
- [c41]Constantin Nila
, Marius Preda
, Ioana Apostol, Victor Valeriu Patriciu:
Reactive WiFi honeypot. ECAI 2021: 1-6 - 2020
- [c40]Marius Preda
, Ion Bica, Victor-Valeriu Patriciu:
Internet of Things Traffic Characterization using flow and packet analysis. ECAI 2020: 1-7 - [c39]Iulian Aciobanitei, Vlad Dedita, Mihai-Lica Pura, Victor Valeriu Patriciu:
SABRES - A Proof of Concept for Enhanced Cloud Qualified Electronic Signatures. COMM 2020: 103-108 - [c38]Marius Preda
, Victor-Valeriu Patriciu:
Simulating RPL Attacks in 6lowpan for Detection Purposes. COMM 2020: 239-245 - 2019
- [c37]Cristian Lupascu
, Mihai Togan, Victor Valeriu Patriciu:
Acceleration Techniques for Fully-Homomorphic Encryption Schemes. CSCS 2019: 118-122 - [c36]Valentin-Alexandru Vladuta, Ion Bica, Victor Valeriu Patriciu:
Energy Efficient Trust-Based Security Mechanism for Wireless Sensors and Unmanned Aerial Vehicles. ECAI 2019: 1-6 - 2018
- [j3]Bogdan-Cosmin Chifor, Ion Bica, Victor Valeriu Patriciu, Florin Pop:
A security authorization scheme for smart home Internet of Things devices. Future Gener. Comput. Syst. 86: 740-749 (2018) - [c35]Ana-Maria Ghimes, Valentin-Alexandru Vladuta, Victor Valeriu Patriciu, Adrian Ionita:
Applying Neural Network Approach to Homomorphic Encrypted Data. ECAI 2018: 1-6 - [c34]Valentin-Alexandru Vladuta, Ana-Maria Ghimes, Constantin Grumazescu, Victor-Valeriu Patriciu:
Trajectory influence on data collection in Wireless Sensor Networks using an Unmanned Aerial Vehicle. ECAI 2018: 1-6 - 2017
- [j2]Bogdan-Cosmin Chifor, Ion Bica, Victor Valeriu Patriciu:
Sensing service architecture for smart cities using social network platforms. Soft Comput. 21(16): 4513-4522 (2017) - [c33]Radu Velea, Casian Ciobanu, Florina Gurzau, Victor Valeriu Patriciu:
Feature Extraction and Visualization for Network PcapNg Traces. CSCS 2017: 311-316 - [c32]Bogdan-Cosmin Chifor, Ion Bica, Victor Valeriu Patriciu:
Mitigating DoS attacks in publish-subscribe IoT networks. ECAI 2017: 1-6 - [c31]Ana-Maria Ghimes, Victor Valeriu Patriciu:
Neural network models in big data analytics and cyber security. ECAI 2017: 1-6 - [c30]Alexandru-Valentin Vladuta, Victor Valeriu Patriciu:
Authentication mechanism for data gathering protocol in wireless sensor networks. ECAI 2017: 1-6 - [c29]Alexandru-Valentin Vladuta
, Ion Bica, Victor Valeriu Patriciu, Florin Pop:
Reliable Data Collection for Wireless Sensor Networks Using Unmanned Aerial Vehicles. GPC 2017: 323-337 - 2016
- [c28]Alexandru-Valentin Vladuta
, Constantin Grumazescu, Ion Bica, Victor Valeriu Patriciu:
Energy considerations for data gathering protocol in wireless sensor networks using unmanned aerial vehicles. COMM 2016: 237-240 - [c27]Bogdan-Cosmin Chifor, Ion Bica, Victor-Valeriu Patriciu:
A Participatory Verification security scheme for the Internet of Things. COMM 2016: 267-270 - [c26]Marius-Alexandru Velciu, Victor Valeriu Patriciu, Ion Bica:
A Bio-cryptographic framework for securing mobile devices content. SACI 2016: 37-42 - [c25]Radu Velea, Florina Gurzau, Laurentiu Margarit, Ion Bica, Victor Valeriu Patriciu:
Performance of parallel ChaCha20 stream cipher. SACI 2016: 391-396 - [c24]Ana-Maria Ghimes, Victor Valeriu Patriciu:
Proposed Scheme for Data Confidentiality and Access Control in Cloud Computing. SECITC 2016: 274-285 - [c23]Radu Velea, Ioana Apostol, Victor Valeriu Patriciu:
LightPcapNg: Implementing a library for general-purpose tracing based on PcapNg. SISY 2016: 211-214 - 2015
- [j1]Alecsandru Patrascu, Victor Valeriu Patriciu:
Logging for Cloud Computing Forensic Systems. Int. J. Comput. Commun. Control 10(2): 222-229 (2015) - [c21]Radu Velea, Victor Valeriu Patriciu, Florina Gurzau:
Using OpenCL to Improve String Matching for Network Intrusion Detection. CSCS 2015: 447-452 - [c20]Alecsandru Patrascu, Victor Valeriu Patriciu:
Cyber Protection of Critical Infrastructures Using Supervised Learning. CSCS 2015: 461-468 - [c19]Alecsandru Patrascu, Mihai Togan, Victor Valeriu Patriciu:
Deduplicated distributed file system using lightweight cryptography. ICCP 2015: 501-506 - [c18]Marius-Alexandru Velciu, Alecsandru Patrascu, Victor Valeriu Patriciu:
An evaluation of the Reed-Solomon error-correcting codes usage for bio-cryptographic algorithms. SACI 2015: 37-41 - [c17]Alecsandru Patrascu, Marius-Alexandru Velciu, Victor Valeriu Patriciu:
Cloud computing digital forensics framework for automated anomalies detection. SACI 2015: 505-510 - [c16]Alecsandru Patrascu, Ion Bica, Victor Valeriu Patriciu:
Spam Filtering Using Automated Classifying Services over a Cloud Computing Infrastructure. SECITC 2015: 226-241 - [c15]Constantin Grumazescu, Mihai-Lica Pura, Victor Valeriu Patriciu:
Hybrid Distributed-Hierarchical Identity Based Cryptographic Scheme for Wireless Sensor Networks. WorldCIST (1) 2015: 949-958 - 2014
- [c14]Adriana-Cristina Enache, Victor Valeriu Patriciu:
Spam host classification using swarm intelligence. COMM 2014: 1-4 - [c12]Alecsandru Patrascu, Victor Valeriu Patriciu:
Logging framework for cloud computing forensic environments. COMM 2014: 1-4 - [c11]Adriana-Cristina Enache, Victor Valeriu Patriciu:
Intrusions detection based on Support Vector Machine optimized with swarm intelligence. SACI 2014: 153-158 - [c10]Marius-Alexandru Velciu, Alecsandru Patrascu, Victor Valeriu Patriciu:
Bio-cryptographic authentication in cloud storage sharing. SACI 2014: 165-170 - [c9]Adrian Pauna, Victor Valeriu Patriciu:
CASSHH - Case Adaptive SSH Honeypot. SNDS 2014: 322-333 - 2013
- [c8]Alecsandru Patrascu, Victor Valeriu Patriciu:
Beyond digital forensics. A cloud computing perspective over incident response and reporting. SACI 2013: 455-460 - 2012
- [c7]Stefan-Vladimir Ghita, Victor-Valeriu Patriciu, Ion Bica:
A new DRM architecture based on mobilel code and white-box encryption. COMM 2012: 303-306 - [c5]Stefan-Vladimir Ghita, Victor Valeriu Patriciu, Ion Bica:
Experimental DRM Model Using Mobile Code and White-Box Encryption. SNDS 2012: 293-303 - 2010
- [c4]Mihai-Lica Pura, Victor Valeriu Patriciu, Ion Bica:
Formal Verification of G-PAKE Using Casper/FDR2 - Securing a Group PAKE Protocol Using Casper/FDR2. SECRYPT 2010: 299-303 - 2009
- [c2]Mihai-Lica Pura, Victor Valeriu Patriciu, Ion Bica:
Simulation of an Identity-based Cryptography Scheme for Ad Hoc Networks. SECRYPT 2009: 135-139

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
[+][–] Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
[+][–] Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 12:47 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint