


Остановите войну!
for scientists:


default search action
Anca Jurcut
Person information

- affiliation: University College Dublin, Ireland
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j31]Mohamed ElKashlan, Heba Aslan, Mahmoud Said Elsayed
, Anca D. Jurcut
, Marianne A. Azer
:
Intrusion Detection for Electric Vehicle Charging Systems (EVCS). Algorithms 16(2): 75 (2023) - [j30]Muhammad Arslan Akram, Hira Ahmad, Adnan Noor Mian, Anca Delia Jurcut, Saru Kumari:
Blockchain-based privacy-preserving authentication protocol for UAV networks. Comput. Networks 224: 109638 (2023) - [j29]Eric Gyamfi
, Anca Delia Jurcut
:
Novel Online Network Intrusion Detection System for Industrial IoT Based on OI-SVDD and AS-ELM. IEEE Internet Things J. 10(5): 3827-3839 (2023) - [j28]Furqan Rustam, Imran Ashraf, Anca Delia Jurcut, Ali Kashif Bashir, Yousaf Bin Zikria:
Malware detection using image representation of malware data and transfer learning. J. Parallel Distributed Comput. 172: 32-50 (2023) - [j27]Eric Gyamfi
, James Adu Ansere, Mohsin Kamal
, Muhammad Tariq
, Anca Jurcut
:
An Adaptive Network Security System for IoT-Enabled Maritime Transportation. IEEE Trans. Intell. Transp. Syst. 24(2): 2538-2547 (2023) - 2022
- [j26]Belal Ibrahim Hairab
, Mahmoud Said Elsayed
, Anca D. Jurcut
, Marianne A. Azer
:
Anomaly Detection Based on CNN and Regularization Techniques Against Zero-Day Attacks in IoT Networks. IEEE Access 10: 98427-98440 (2022) - [j25]Amin Shahraki
, Mahmoud Abbasi
, Amir Taherkordi, Anca Delia Jurcut
:
A comparative study on online machine learning techniques for network traffic streams analysis. Comput. Networks 207: 108836 (2022) - [j24]Yuzi Yi, Nafei Zhu, Jingsha He, Anca Delia Jurcut
, Bin Zhao:
Toward pragmatic modeling of privacy information propagation in online social networks. Comput. Networks 219: 109429 (2022) - [j23]Pasika Ranaweera, Anca Jurcut, Madhusanka Liyanage
:
MEC-enabled 5G Use Cases: A Survey on Security Vulnerabilities and Countermeasures. ACM Comput. Surv. 54(9): 186:1-186:37 (2022) - [j22]Iraj Lohrasbinasab, Amin Shahraki, Amir Taherkordi, Anca Delia Jurcut:
From statistical- to machine learning-based network traffic prediction. Trans. Emerg. Telecommun. Technol. 33(4) (2022) - [j21]Pasika Ranaweera
, Chamitha de Alwis
, Anca D. Jurcut
, Madhusanka Liyanage
:
Realizing contact-less applications with Multi-Access Edge Computing. ICT Express 8(4): 575-587 (2022) - [j20]Aitizaz Ali
, Muhammad Fermi Pasha
, Jehad Ali
, Ong Huey Fang, Mehedi Masud
, Anca Delia Jurcut, Mohammed A. Alzain
:
Deep Learning Based Homomorphic Secure Search-Able Encryption for Keyword Search in Blockchain Healthcare System: A Novel Approach to Cryptography. Sensors 22(2): 528 (2022) - [j19]Eric Gyamfi
, Anca Jurcut:
Intrusion Detection in Internet of Things Systems: A Review on Design Approaches Leveraging Multi-Access Edge Computing, Machine Learning, and Datasets. Sensors 22(10): 3744 (2022) - [j18]Amin Shahraki
, Mahmoud Abbasi
, Amir Taherkordi
, Anca Delia Jurcut
:
Active Learning for Network Traffic Classification: A Technical Study. IEEE Trans. Cogn. Commun. Netw. 8(1): 422-439 (2022) - [j17]Mahmoud Said Elsayed
, Nhien-An Le-Khac
, Marianne A. Azer
, Anca D. Jurcut
:
A Flow-Based Anomaly Detection Approach With Feature Selection Method Against DDoS Attacks in SDNs. IEEE Trans. Cogn. Commun. Netw. 8(4): 1862-1880 (2022) - [c19]Eranda Harshanath Jayatunga
, Avishek Nag, Anca Delia Jurcut:
Security Requirements for Vehicle-to-Everything (V2X) Communications Integrated with Blockchain. BCCA 2022: 208-213 - [c18]Eric Gyamfi, Anca Jurcut:
M-TADS: A Multi-Trust DoS Attack Detection System for MEC-enabled Industrial loT. CAMAD 2022: 166-172 - [c17]Pasika Ranaweera, Awaneesh Kumar Yadav, Madhusanka Liyanage
, Anca Delia Jurcut:
Service Migration Authentication Protocol for MEC. GLOBECOM 2022: 5493-5498 - [c16]John William O'Meara, Mahmoud Said Elsayed, Takfarinas Saber
, Anca Delia Jurcut:
SDN Intrusion Detection: An Ensemble Approach to Reducing False Negative Rate for Novel Attacks. ITNAC 2022: 1-8 - 2021
- [j16]Sidra Zafar
, Mohsin Nazir
, Aneeqa Sabah
, Anca Delia Jurcut
:
Securing Bio-Cyber Interface for the Internet of Bio-Nano Things using Particle Swarm Optimization and Artificial Neural Networks based parameter profiling. Comput. Biol. Medicine 136: 104707 (2021) - [j15]Pasika Ranaweera, Madhusanka Liyanage
, Anca Delia Jurcut:
Novel MEC Based Approaches for Smart Hospitals to Combat COVID-19 Pandemic. IEEE Consumer Electron. Mag. 10(2): 80-91 (2021) - [j14]Pasika Ranaweera
, Anca Delia Jurcut
, Madhusanka Liyanage
:
Survey on Multi-Access Edge Computing Security and Privacy. IEEE Commun. Surv. Tutorials 23(2): 1078-1124 (2021) - [j13]Mahmoud Said Elsayed
, Nhien-An Le-Khac
, Anca Delia Jurcut:
Dealing With COVID-19 Network Traffic Spikes [Cybercrime and Forensics]. IEEE Secur. Priv. 19(1): 90-94 (2021) - [j12]Mahmoud Said Elsayed
, Nhien-An Le-Khac
, Marwan Ali Albahar
, Anca Jurcut
:
A novel hybrid model for intrusion detection systems in SDNs based on CNN and a new regularization technique. J. Netw. Comput. Appl. 191: 103160 (2021) - [j11]Hayat Khaloufi
, Karim Abouelmehdi, Abderrahim Beni Hssane, Furqan Rustam
, Anca Delia Jurcut
, Ernesto Lee
, Imran Ashraf
:
Deep Learning Based Early Detection Framework for Preliminary Diagnosis of COVID-19 via Onboard Smartphone Sensors. Sensors 21(20): 6853 (2021) - [j10]Mohsin Nazir
, Aneeqa Sabah, Sana Sarwar, Azeema Yaseen
, Anca Jurcut:
Power and Resource Allocation in Wireless Communication Network. Wirel. Pers. Commun. 119(4): 3529-3552 (2021) - [j9]Mohsin Nazir
, Aneeqa Sabah, Sana Sarwar, Azeema Yaseen, Anca Jurcut:
Correction to: Power and Resource Allocation in Wireless Communication Network. Wirel. Pers. Commun. 119(4): 3553 (2021) - [c15]Mahmoud Abdallah, Nhien-An Le-Khac
, Hamed Z. Jahromi, Anca Delia Jurcut:
A Hybrid CNN-LSTM Based Approach for Anomaly Detection Systems in SDNs. ARES 2021: 34:1-34:7 - [c14]Iqra Iqbal
, Anca D. Jurcut, Muhammad Mohsin Nazir
:
A Design of Energy Efficient Nanorouting Protocol Using Greedy Algorithm. FABULOUS 2021: 37-47 - [c13]Mahmoud Said Elsayed, Hamed Z. Jahromi, Muhammad Mohsin Nazir, Anca Delia Jurcut:
The Role of CNN for Intrusion Detection Systems: An Improved CNN Learning Approach for SDNs. FABULOUS 2021: 91-104 - [i11]Jinyong Chen, Reiner Dojen, Anca Jurcut:
Detection and Prevention of New Attacks for ID-based Authentication Protocols. CoRR abs/2101.12604 (2021) - [i10]Guerrino Mazzarolo, Juan Carlos Fernandez Casas, Anca Delia Jurcut, Nhien-An Le-Khac:
Protect Against Unintentional Insider Threats: The risk of an employee's cyber misconduct on a Social Media Site. CoRR abs/2103.04744 (2021) - [i9]Promise Agbedanu, Anca Delia Jurcut:
BLOFF: A Blockchain based Forensic Model in IoT. CoRR abs/2103.08442 (2021) - [i8]Ivan Cvitic, Dragan Perakovic, Marko Perisa, Anca D. Jurcut:
Methodology for Detecting Cyber Intrusions in e-Learning Systems during COVID-19 Pandemic. CoRR abs/2104.11041 (2021) - [i7]Ivan Cvitic, Dragan Perakovic, Marko Perisa, Anca D. Jurcut:
Methodology proposal for proactive detection of network anomalies in e-learning system during the COVID-19 scenario. CoRR abs/2104.11234 (2021) - [i6]Amin Shahraki, Mahmoud Abbasi, Amir Taherkordi, Anca Delia Jurcut:
Active Learning for Network Traffic Classification: A Technical Survey. CoRR abs/2106.06933 (2021) - 2020
- [j8]Mahmoud Said Elsayed
, Nhien-An Le-Khac
, Anca D. Jurcut
:
InSDN: A Novel SDN Intrusion Dataset. IEEE Access 8: 165263-165284 (2020) - [j7]Tanesh Kumar
, An Braeken
, Anca Delia Jurcut, Madhusanka Liyanage
, Mika Ylianttila:
AGE: authentication in gadget-free healthcare environments. Inf. Technol. Manag. 21(2): 95-114 (2020) - [j6]Anca Jurcut
, Tiberiu Niculcea, Pasika Ranaweera, Nhien-An Le-Khac
:
Security Considerations for Internet of Things: A Survey. SN Comput. Sci. 1(4): 193 (2020) - [c12]Pasika Ranaweera, Vashish N. Imrith, Madhusanka Liyanage
, Anca Delia Jurcut:
Security as a Service Platform Leveraging Multi-Access Edge Computing Infrastructure Provisions. ICC 2020: 1-6 - [c11]Mahmoud Said Elsayed, Nhien-An Le-Khac
, Soumyabrata Dev, Anca Delia Jurcut:
Detecting Abnormal Traffic in Large-Scale Networks. ISNCC 2020: 1-7 - [c10]Mahmoud Said Elsayed, Nhien-An Le-Khac
, Soumyabrata Dev, Anca Delia Jurcut:
Network Anomaly Detection Using LSTM Based Autoencoder. Q2SWinet 2020: 37-45 - [c9]Mahmoud Said Elsayed, Nhien-An Le-Khac
, Soumyabrata Dev, Anca Delia Jurcut:
DDoSNet: A Deep-Learning Model for Detecting Network Attacks. WoWMoM 2020: 391-396 - [p2]Christopher Boyton, Nhien-An Le-Khac
, Kim-Kwang Raymond Choo, Anca Jurcut:
Forensic Investigation of Ransomware Activities - Part 2. Cyber and Digital Forensic Investigations 2020: 79-108 - [p1]Mohammad Borhani
, Madhusanka Liyanage
, Ali Hassan Sodhro, Pardeep Kumar, Anca Delia Jurcut, Andrei V. Gurtov:
Secure and Resilient Communications in the Industrial Internet. Guide to Disaster-Resilient Communication Networks 2020: 219-242 - [i5]Anca Jurcut, Tiberiu Niculcea, Pasika Ranaweera, Nhien-An Le-Khac:
Security Considerations for Internet of Things: A Survey. CoRR abs/2006.10591 (2020) - [i4]Mahmoud Said Elsayed, Nhien-An Le-Khac, Soumyabrata Dev, Anca Delia Jurcut:
DDoSNet: A Deep-Learning Model for Detecting Network Attacks. CoRR abs/2006.13981 (2020) - [i3]Mahmoud Said Elsayed, Nhien-An Le-Khac, Soumyabrata Dev, Anca Delia Jurcut:
Detecting Abnormal Traffic in Large-Scale Networks. CoRR abs/2008.05791 (2020)
2010 – 2019
- 2019
- [j5]Anca Jurcut, Tom Coffey, Reiner Dojen
:
A Novel Security Protocol Attack Detection Logic with Unique Fault Discovery Capability for Freshness Attacks and Interleaving Session Attacks. IEEE Trans. Dependable Secur. Comput. 16(6): 969-983 (2019) - [j4]An Braeken
, Madhusanka Liyanage
, Anca Delia Jurcut:
Anonymous Lightweight Proxy Based Key Agreement for IoT (ALPKA). Wirel. Pers. Commun. 106(2): 345-364 (2019) - [c8]Pasika Ranaweera, Anca Delia Jurcut, Madhusanka Liyanage
:
Realizing Multi-Access Edge Computing Feasibility: Security Perspective. CSCN 2019: 1-7 - [c7]Anca Delia Jurcut, Jinyong Chen, Anshuman Kalla
, Madhusanka Liyanage
, John Murphy:
A Novel Authentication Mechanism for Mobile Satellite Communication Systems. WCNC Workshops 2019: 1-7 - [i2]Mahmoud Said Elsayed, Nhien-An Le-Khac, Soumyabrata Dev, Anca Delia Jurcut:
Machine-Learning Techniques for Detecting Attacks in SDN. CoRR abs/1910.00817 (2019) - [i1]Guerrino Mazzarolo, Anca Delia Jurcut:
Insider threats in Cyber Security: The enemy within the gates. CoRR abs/1911.09575 (2019) - 2018
- [c6]Anca Delia Jurcut, Madhusanka Liyanage
, Jinyong Chen, Cornelia Györödi
, Jingsha He:
On the security verification of a short message service protocol. WCNC 2018: 1-6 - 2017
- [j3]Madhusanka Liyanage
, An Braeken
, Anca Delia Jurcut, Mika Ylianttila
, Andrei V. Gurtov
:
Secure communication channel architecture for Software Defined Mobile Networks. Comput. Networks 114: 32-50 (2017) - 2014
- [j2]Anca D. Jurcut, Tom Coffey, Reiner Dojen
:
Design guidelines for security protocols to prevent replay & parallel session attacks. Comput. Secur. 45: 255-273 (2014) - [c5]Anca Jurcut, Tom Coffey, Reiner Dojen:
On the Prevention and Detection of Replay Attacks Using a Logic-Based Verification Tool. CN 2014: 128-137 - [c4]Anca D. Jurcut, Tom Coffey, Reiner Dojen:
Design requirements to counter parallel session attacks in security protocols. PST 2014: 298-305 - 2013
- [j1]Anca D. Jurcut, Tom Coffey, Reiner Dojen:
Establishing and Fixing Security Protocols Weaknesses Using a Logic-based Verification Tool. J. Commun. 8(11): 795-805 (2013) - 2012
- [c3]Anca Jurcut, Tom Coffey, Reiner Dojen:
Symmetry in Security Protocol Cryptographic Messages - A Serious Weakness Exploitable by Parallel Session Attacks. ARES 2012: 410-416
2000 – 2009
- 2008
- [c2]Reiner Dojen, Anca Jurcut, Tom Coffey, Cornelia Györödi
:
On Establishing and Fixing a Parallel Session Attack in a Security Protocol. IDC 2008: 239-244 - [c1]Vladimir Pasca, Anca Jurcut, Reiner Dojen, Tom Coffey:
Determining a parallel session attack on a key distribution protocol using a model checker. MoMM 2008: 150-155
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-03-22 22:12 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint