ANCA  DELIA JURCUT
Title
Cited by
Cited by
Year
DDoSNet: A Deep-Learning Model for Detecting Network Attacks
MS Elsayed, NA Le-Khac, S Dev, AD Jurcut
21ST IEEE INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND …, 2020
292020
Security Considerations for Internet of Things: A Survey
A Jurcut, T Niculcea, P Ranaweera, A LeKhac
Springer SN Computer Science (2020) 1:193, 2020
222020
Realizing Multi-Access Edge Computing Feasibility: Security Perspective
P Ranaweera, AD Jurcut, M Liyanage
2019 IEEE Conference on Standards for Communications and Networking (CSCN), 2019
212019
Secure communication channel architecture for software defined mobile networks
M Liyanage, A Braeken, AD Jurcut, M Ylianttila, A Gurtov
Computer Networks 114, 32-50, 2017
202017
Design guidelines for security protocols to prevent replay & parallel session attacks
AD Jurcut, T Coffey, R Dojen
Computers & Security, Elsevier 45, 255-273, 2014
182014
InSDN: A Novel SDN Intrusion Dataset
MS M. S. ElSayed, N Le-Khac, A Jurcut
IEEE Access, 2020
172020
Introduction to IoT Security
AD Jurcut, R Ranaweera, L Xu
IoT Security : Advances in Authentication 1, 37, 2019
172019
On establishing and fixing a parallel session attack in a security protocol
R Dojen, A Jurcut, T Coffey, C Gyorodi
Intelligent distributed computing, systems and applications, 239-244, 2008
152008
Survey on multi-access edge computing security and privacy
P Ranaweera, AD Jurcut, M Liyanage
IEEE Communications Surveys & Tutorials 23 (2), 1078-1124, 2021
142021
On the prevention and detection of replay attacks using a logic-based verification tool
AD Jurcut, T Coffey, R Dojen
Springer International Conference on Computer Networks, 128-137, 2014
142014
AGE: authentication in gadget-free healthcare environments
T Kumar, A Braeken, AD Jurcut, M Liyanage, M Ylianttila
Information Technology and Management 21 (2), 95-114, 2020
132020
Machine-learning techniques for detecting attacks in SDN
MS Elsayed, NA Le-Khac, S Dev, AD Jurcut
arXiv preprint arXiv:1910.00817, 2019
132019
Secure and resilient communications in the industrial internet
M Borhani, M Liyanage, AH Sodhro, P Kumar, AD Jurcut, A Gurtov
Guide to Disaster-Resilient Communication Networks, 219-242, 2020
122020
A novel security protocol attack detection logic with unique fault discovery capability for freshness attacks and interleaving session attacks
A Jurcut, T Coffey, R Dojen
IEEE transactions on dependable and secure computing 16 (6), 969-983, 2017
122017
Establishing and Fixing Security Protocols Weaknesses Using a Logic-based Verification Tool.
AD Jurcut, T Coffey, R Dojen
J. Commun. 8 (11), 795-805, 2013
122013
Anonymous Lightweight Proxy Based Key Agreement for IoT (ALPKA)
A Braeken, M Liyanage, AD Jurcut
Wireless Personal Communications, 1-20, 2019
112019
Novel MEC based Approaches for Smart Hospitals to Combat COVID-19 Pandemic
P Ranaweera, M Liyanage, A Jurcut
IEEE Consumer Electronics Magazine, 2020
102020
Insider threats in Cyber Security: The enemy within the gates
G Mazzarolo, AD Jurcut
European Cybersecurity Journal, 2019
102019
On the Security Verification of a Short Message Service Protocol
AD Jurcut, M Liyanage, J Chen, C Gyorodi, J He
2018 IEEE Wireless Communications and Networking Conference (WCNC), 2018
102018
Network anomaly detection using LSTM based autoencoder
M Said Elsayed, NA Le-Khac, S Dev, AD Jurcut
Proceedings of the 16th ACM Symposium on QoS and Security for Wireless and …, 2020
92020
The system can't perform the operation now. Try again later.
Articles 1–20