- Smart Grid Security and Resilience
- Network Security and Intrusion Detection
- Advanced Authentication Protocols Security
- Advanced Malware Detection Techniques
- Information and Cyber Security
- User Authentication and Security Systems
- Software-Defined Networks and 5G
- Anomaly Detection Techniques and Applications
- Physical Unclonable Functions (PUFs) and Hardware Security
- Security and Verification in Computing
- Cryptographic Implementations and Security
- Peer-to-Peer Network Technologies
- Access Control and Trust
- Caching and Content Delivery
- Vehicular Ad Hoc Networks (VANETs)
- IoT and Edge/Fog Computing
- Fault Detection and Control Systems
- Infrastructure Resilience and Vulnerability Analysis
- Service-Oriented Architecture and Web Services
- Privacy-Preserving Technologies in Data
- Electrostatic Discharge in Electronics
- Cryptography and Data Security
- Network Traffic and Congestion Control
- Mobile Ad Hoc Networks
- Digital Rights Management and Security
Universitatea de Medicină, Farmacie, Științe și Tehnologie „George Emil Palade” din Târgu Mureș
2017-2024
Universitatea Petru Maior din Tîrgu Mureş
2008-2019
Google (United States)
2019
Japan Science and Technology Agency
2019
Microsoft (United States)
2019
Joint Research Centre
2011-2014
European Commission
2014
Technical University of Cluj-Napoca
2006-2014
Abstract Shodan has been acknowledged as one of the most popular search engines available today, designed to crawl Internet and index discovered services. This paper expands features exposed by with advanced vulnerability assessment capabilities embedded into a novel tool called Shodan‐based (ShoVAT). ShoVAT takes output traditional queries performs an in‐depth analysis service‐specific data, that is, service banners. It embodies specially crafted algorithms which rely on in‐memory data...
Modern Networked Critical Infrastructures (NCI), involving cyber and physical systems, are exposed to intelligent attacks targeting the stable operation of these systems. In order ensure anomaly awareness, observed data can be used in accordance with mining techniques develop Intrusion Detection Systems (IDS) or Anomaly (ADS). There is an increase volume sensor generated by both sensors, so there a need apply Big Data technologies for real-time analysis large sets. this paper, we propose...
Internet is considered a Critical Infrastructure (CI) that vital for both the economy and society. Disruptions caused by natural disasters, malicious human actions even hardware failure pose serious risks. Emulation testbeds are increasingly used to study in order improve protection response mechanisms. These frequently more adequate than software simulators realistically recreate complex behavior of networks. In this paper we how based on Emulab can be conduct scientifically rigorous...
Recent malware, like Stuxnet and Flame, constitute a major threat to networked critical infrastructures (NCIs), e.g., power plants. They revealed several vulnerabilities in today's NCIs, but most importantly they highlighted the lack of an efficient scientific approach conduct experiments that measure impact cyber threats on both physical parts NCIs. In this paper, we present EPIC, novel cyber-physical testbed, modern instrument can provide accurate assessments effects cyber-attacks may have...
Modern Process Control Systems (PCS) exhibit an increasing trend towards the pervasive adoption of commodity, off-the-shelf Information and Communication Technologies (ICT). This has brought significant economical operational benefits, but it also shifted architecture PCS from a completely isolated environment to open, "system systems" integration with traditional ICT systems, susceptible computer attacks. In this paper we present novel approach detect cyber attacks targeting measurements...
The pervasive adoption of traditional information and communication technologies hardware software in industrial control systems (ICS) has given birth to a unique technological ecosystem encapsulating variety objects ranging from sensors actuators video surveillance cameras generic PCs. Despite their invaluable advantages, these advanced ICS create new design challenges, which expose them significant cyber threats. To address an innovative network technique is proposed this paper harmonize...
The Industrial Internet of Things (IIoT) have been designed to perform a more agile and efficient automation, control, orchestration future industrial systems while improving the energy efficiency in smart factories. Unfortunately, benefits IIoT are undeniable, their pervasive adoption as key enablers for industries also paved way new security risks. In fact, damaging effects exploiting vulnerable repeatedly demonstrated publicly reported. Mirai botnet, various reports on hackable invasive...
EPIC helps assess cyberthreats against the cyber and physical dimensions of networked critical infrastructures.
The H2020 European research project GHOST - Safe-Guarding Home IoT Environments with Personalised Real-time Risk Control aims to deploy a highly effective security framework for smart home residents through novel reference architecture user-centric cyber in homes providing an unobtrusive and user-comprehensible solution. aforementioned leads transparent environment by increasing the effectiveness of existing services enhancing system's self-defence disruptive software-enabled network...
The fourth industrial revolution, also known as Industry 4.0, brings many advantages including innovative applications and services, new technologies advanced features, increased operational benefits, reduced installation costs. However, this technological advancement exposes several challenges pertaining to the development of cyber-physical architectures, resilient communication systems, secure data exchange. This paper develops a systematic methodology for designing intrusion detection...
Modern Industrial Control Systems (ICS) integrate advanced solutions from the field of traditional IP networks, i.e., Software-Defined Networks (SDN), in order to increase security and resilience communication infrastructures. Despite their clear advantages, such also expose ICS common cyber threats that may have a dramatic impact on functioning critical infrastructures, e.g., power grid. As response these issues, this work develops novel hierarchical SDN control plane for ICS. The approach...
The Internet of Things (IoT) has a significant effect on the evolution modern Information and Communication Technology. It reshapes traditional network infrastructures with novel hardware software technologies. In this work we analyse IoT platforms from communication architecture point view evaluate effects anomalies different edges data lines to end-to-end transmission performance. To improve performance resilience these systems adopt hybrid composed Software Defined Networking (SDN)...
Smart Grid has been characterized as the next generation power grid in which modern Information and Communication Technologies (ICT) will improve control, reliability safety. Although adoption of generic off-the-shelf ICT provisions indisputable advantages benefits, it raises several issues concerning security communications - core infrastructure Grid. Cloud computing developed evolved over past years becoming a real choice for Grids because availability, scalability, performance...
Recent trends in Critical Infrastructures (CIs), e.g., power plants and energy smart grids, showed an increased use of commodity, off-the-shelf Information Communication Technologies (ICT) hardware software. Although this enabled the implementation a broad palette new features, pervasive ICT, especially within core CIs, i.e., Industrial Control Systems (ICSs), attracted class attacks which cyber disturbances propagate to physical dimension CIs. To ensure more effective detection against ICS...
The fact that modern Networked Industrial Control Systems (NICS) depend on Information and Communication Technologies (ICT), is well known. Although many studies have focused the security of SCADA systems, today we still lack proper understanding effects cyber attacks NICS. In this paper identify communication control logic implementation parameters influence outcome against NICS could be used as effective measures for increasing resilience industrial installations. implemented scenario...