Follow
ANCA  DELIA JURCUT
Title
Cited by
Cited by
Year
DDoSNet: A Deep-Learning Model for Detecting Network Attacks
MS Elsayed, NA Le-Khac, S Dev, AD Jurcut
21ST IEEE INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND …, 2020
982020
Survey on multi-access edge computing security and privacy
P Ranaweera, AD Jurcut, M Liyanage
IEEE Communications Surveys & Tutorials 23 (2), 1078-1124, 2021
732021
Security Considerations for Internet of Things: A Survey
A Jurcut, T Niculcea, P Ranaweera, A LeKhac
Springer SN Computer Science (2020) 1:193, 2020
552020
InSDN: A Novel SDN Intrusion Dataset
MS M. S. ElSayed, N Le-Khac, A Jurcut
IEEE Access, 2020
522020
Realizing Multi-Access Edge Computing Feasibility: Security Perspective
P Ranaweera, AD Jurcut, M Liyanage
2019 IEEE Conference on Standards for Communications and Networking (CSCN), 2019
322019
Network anomaly detection using LSTM based autoencoder
M Said Elsayed, NA Le-Khac, S Dev, AD Jurcut
Proceedings of the 16th ACM Symposium on QoS and Security for Wireless and …, 2020
302020
Machine-learning techniques for detecting attacks in SDN
MS Elsayed, NA Le-Khac, S Dev, AD Jurcut
2019 IEEE 7th International Conference on Computer Science and Network …, 2019
292019
Introduction to IoT Security
AD Jurcut, R Ranaweera, L Xu
IoT Security : Advances in Authentication 1, 37, 2019
252019
Secure communication channel architecture for software defined mobile networks
M Liyanage, A Braeken, AD Jurcut, M Ylianttila, A Gurtov
Computer Networks 114, 32-50, 2017
252017
Novel MEC based Approaches for Smart Hospitals to Combat COVID-19 Pandemic
P Ranaweera, M Liyanage, A Jurcut
IEEE Consumer Electronics Magazine, 2020
212020
AGE: authentication in gadget-free healthcare environments
T Kumar, A Braeken, AD Jurcut, M Liyanage, M Ylianttila
Information Technology and Management 21 (2), 95-114, 2020
202020
Secure and resilient communications in the industrial internet
M Borhani, M Liyanage, AH Sodhro, P Kumar, AD Jurcut, A Gurtov
Guide to Disaster-Resilient Communication Networks, 219-242, 2020
192020
Design guidelines for security protocols to prevent replay & parallel session attacks
AD Jurcut, T Coffey, R Dojen
Computers & Security, Elsevier 45, 255-273, 2014
192014
A novel hybrid model for intrusion detection systems in SDNs based on CNN and a new regularization technique
MS ElSayed, NA Le-Khac, MA Albahar, A Jurcut
Journal of Network and Computer Applications 191, 103160, 2021
172021
MEC Enabled 5G Use Cases: A Survey on Security Vulnerabilities and Countermeasures
P RANAWEERA, A JURCUT, M LIYANAGE
ACM Computing Surveys, 2021
172021
Security as a Service Platform Leveraging Multi-Access Edge Computing Infrastructure Provisions
P Ranaweera, VN Imrith, M Liyanage, AD Jurcut
IEEE International Conference on Communications, 2020
172020
Anonymous Lightweight Proxy Based Key Agreement for IoT (ALPKA)
A Braeken, M Liyanage, AD Jurcut
Wireless Personal Communications, 1-20, 2019
162019
On establishing and fixing a parallel session attack in a security protocol
R Dojen, A Jurcut, T Coffey, C Gyorodi
Intelligent distributed computing, systems and applications, 239-244, 2008
162008
On the prevention and detection of replay attacks using a logic-based verification tool
AD Jurcut, T Coffey, R Dojen
Springer International Conference on Computer Networks, 128-137, 2014
142014
Insider threats in Cyber Security: The enemy within the gates
G Mazzarolo, AD Jurcut
European Cybersecurity Journal, 2019
132019
The system can't perform the operation now. Try again later.
Articles 1–20