systems.cs.pub.ro

Recent Publications – Laura Gheorghe

Papers accepted for publication in journals in 2016

[1] C.-L. Duta, L. Gheorghe, N. Tapus, “Real Time Collaborative Editing in Mobile Computing Environments”, UPB Scientific Bulletin, Series C, Vol. 78,  Issue 1, 2016, pp. 3-16.
[2] L. Mogoșanu, M. Carabaș, R. Deaconescu, L. Gheorghe, V.- G. Voiculescu, “VMXHAL: A Versatile Virtualization Framework for Embedded Systems”,  Journal of Control Engineering and Applied Informatics (CEAI), Vol. 18, No. 1, 2016, pp. 68-77.
[3] M. Carabas, C. Carabas, L. Gheorghe, R. Deaconescu, N. Tapus, “Monitoring and Auditing Mobile Operating Systems”, International Journal of Space-Based and Situated Computing, 2016, Vol.6, No.1, pp. 54-63.
[4] P. Eftime, L. Mogoșanu, M. Carabaș,  R. Deaconescu, L. Gheorghe, V.-G. Voiculescu, “Optimizing Memory Usage in an L4-based microkernel”, Journal Computing and Informatics (CAI), 2016 (accepted).

Papers accepted for presentation in conferences in 2016

[1] C.-L. Duta, L. Gheorghe, N. Tapus, “Performance Analysis of Real Time Implementations of Voice Encryption Algorithms Using Blackfin Processors”, International Conference on Information Systems Security and Privacy, 2016, pp. 157-166.
[2] C.-L. Duta, L. Gheorghe, N. Tapus, “eAEcrypt Tool for Understanding Modern and Complex Cryptographic Algorithms”, International Scientific Conference eLearning and Software for Education (eLSE), 2016.
[3]  C.-L. Duta, L. Gheorghe, N. Tapus, “Framework for Evaluation and Comparison of Integer Factorization Algorithms”, SAI Computing Conference, pp.1047-1053, 2016.
[4] C.-A. Tudorica, L. Gheorghe, “Context-Aware Security Framework for Android”, International Workshop on Secure Internet of Things, in the 21st European Symposium on Research in Computer Security (ESORICS), 2016.
[5] D. Dragomir, L. Gheorghe, S. Costea, A. Radovici, “A Survey on Secure Communication Protocols for IoT Systems”, International Workshop on Secure Internet of Things, in the 21st European Symposium on Research in Computer Security (ESORICS), 2016.
[6] I.-I. Pătru, M. Carabaș, M. Bărbulescu, L. Gheorghe, “Smart Home IoT System”, 15th RoEduNet Conference: Networking in Education and Research, 2016.

Papers accepted for publication in journals in 2015

[1] C.-L. Duta, B.-C. Mocanu, F.-A. Vladescu, L. Gheorghe, N. Tapus, “Evaluation Framework for Security and Resource Consumption of Cryptographic Algorithms”,  Journal of Control Engineering and Applied Informatics (CEAI), vol. 17, no. 3, pp. 77-87, 2015.
[2] L. Gheorghe, B. Marin, G. Gibson, L. Mogosanu, R. Deaconescu, V.-G. Voiculescu, M. Carabas, “Smart Malware Detection on Android”, Security and Communication Networks (SCN), Wiley, Vol. 8, Issue 18, pp. 4254-4272, December 2015.
[3] P. Eftime, M. Carabas, L. Mogosanu, L. Gheorghe, R. Deaconescu, “VMXLinux: Improving Shim Layer Portability”, UPB Scientific Bulletin, Series C, Vol. 77, Issue 4, pp. 45-54, 2015.

Papers accepted for presentation in conferences in 2015

[1] L. Gheorghe, L. Mogosanu, M. Carabas, V.-G. Voiculescu, G. Gibson, “Infrastructure for Learning the Behaviour of Malicious and Abnormal Applications”,  11th International Scientific Conference eLearning and Software for Education, 2015, pp. 202-209.
[2] C.-L. Duță, L. Gheorghe, “Elearning Framework for Understanding Cryptography at all Levels”, 11th International Scientific Conference eLearning and Software for Education, 2015, pp. 171-179.
[3] V. Manea, M. Carabas, L. Mogosanu, L. Gheorghe, “Native Runtime Environment for Internet of Things”,  Proceedings of 3rd International Conference on Computer Science, Applied Mathematics and Applications (ICCSAMA 2015), 2015, pp. 381-390.
[4] C.-L. Duță, L. Gheorghe, N. Țăpuș, “Framework for Evaluation and Comparison of Primality Testing Algorithms”, 20th International Conference on Control Systems and Computer Science (CSCS20 2015), 2015, pp. 483-490.
[5] L. Mogoșanu, M. Carabaș, C. Condurache, L. Gheorghe, N. Țăpuș, “Evaluating Architecture-Dependent Linux Performance”, 20th International Conference on Control Systems and Computer Science (CSCS20 2015), 2015, pp. 499-505.
[6] C. Carabaș, I.-I. Pătru, M. Carabaș, L. Gheorghe, N. Țăpuș, “Error Monitoring for Mobile Operating Systems”, 9th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS 2015), 2015, pp. 302-307.
[7] C.-L. Duță, L. Gheorghe, N. Tăpuș, “Analyze OSPF Convergence Time in the Presence of Single and Multiple Failures”, 7th International Conference on Emerging Networks and Systems Intelligence (EMERGING 2015),  2015, pp. 72-78.
[8] I.M. Florea, L. Gheorghe, M. Carabaș, N. Tăpuș, “Routing Enhancements based on Evolutionary Algorithm”, 11th International Conference on Intelligent Computer Communications and Processing (ICCP 2015), 2015, pp. 491-497.
[9] C.-L. Duță, L. Gheorghe, N. Tăpuș, “Real Time Implementation of MELP Speech Compression Algorithm using Blackfin Processors”, 9th International Symposium on Image and Signal Processing and Analysis (ISPA 2015), 2015, pp. 252-257.
[10] C. Condurache, L. Mogoșanu, M. Carabaș, L. Gheorghe, N. Țăpuș, “Performance Evaluation of In-Kernel System Calls”, 4th Eastern European Regional Conference on the Engineering of Computer Based Systems (ECBS-EERC 2015), 2015, pp. 130-133.
[11] P. Eftime, L. Mogoșanu, M. Carabaș, L. Gheorghe, R. Deaconescu, “Adding SMP Support to Fastpaths in an L4 Microkernel”, International Conference on Computing and Informatics (ICOCI 2015), 2015, pp. 347-352.
[12] A. Nicolae, L. Gheorghe, M. Carabas, N. Tapus, C.-L. Duta, “LLDP Packet Generator”, 14th RoEduNet Conference: Networking in Education and Research, 2015, pp. 7-11.
[13] M.N. Aneci, L. Gheorghe, M. Carabas, S. Soriga, R. A. Somesan, “SDN-based Security Mechanism”, 14th RoEduNet Conference: Networking in Education and Research, 2015, pp. 12-17.
[14] I.-I. Pătru, M. Carabas, L. Gheorghe, S.G. Șoriga, N. Tapus, “Porting Android on Intel-based Embedded Platforms”, 14th RoEduNet Conference: Networking in Education and Research, 2015, pp. 18-22.

Papers accepted for publication in journals in 2014

[1] C.-L. Duta, B.-C. Mocanu, F.-A. Vladescu, L. Gheorghe, “Randomness Evaluation Framework of Cryptographic Algorithms”, International Journal on Cryptography and Information Security, Vol. 4, No. 1., 2014, pp. 31-49.
[2] R. Rughinis, and L. Gheorghe, “Energy-Efficient Authentication and Anti-Replay Security Protocol for Wireless Sensor Networks”, Journal of Control Engineering and Applied Informatics (CEAI), Vol. 16, No. 4, 2014, pp. 61-72.

Papers accepted for presentation in conferences in 2014

[1] G. Lupescu, L. Gheorghe, N. Tapus, “Commodity hardware performance in AES processing”, 13th International Symposium on Parallel and Distributed Computing, pp. 82-86, 2014.
[2] D. Rosner, R. Tătăroiu, L. Gheorghe, R. Țilimpea, “UNCHAIN-Ubiquitous Wireless Network Communication arcHitecture for Ambient Intelligence and Health sceNarios”, 3rd International Workshop on Secure Internet of Things (SIoT), in the 19th European Symposium on Research in Computer Security (ESORICS), 2014.
[3] M. Carabaș, L. Mogoșanu, R. Deaconescu, L. Gheorghe, N. Țăpuș, “Lightweight Display Virtualization For Mobile Devices”, 3rd International Workshop on Secure Internet of Things (SIoT), in the 19th European Symposium on Research in Computer Security (ESORICS), 2014.
[4] A. Burada, L. Gheorghe, N. Tapus, “Portable Implementation of the SPID Algorithm”, 13th RoEduNet International Conference, 2014, pp. 53-58.
[5] M. Vasilescu, L. Gheorghe, N. Tapus, “Practical Malware Analysis based on Sandboxing”, 13th RoEduNet International Conference, 2014, pp. 47-52.
[6] O. Niculaescu, M. Carabas, L. Gheorghe, R. Rughinis, N. Tapus, “Graphical Packet Generator – a Solution for Automatic Discovery of the Network Topology and Packet Generation”, 13th RoEduNet International Conference, 2014, pp. 78-83.

Papers accepted for publication in journals in 2013

[1] D. Tudose, L. Gheorghe, and N. Ţăpuş, “Radio Transciever Consumption Modeling for Multi-hop Wireless Sensor Networks”, UPB Scientific Bulletin, Series C,  Vol. 75, Issue 1, 2013, pp. 17-26.
[2] R. Rughiniș, and L. Gheorghe, “TinyAFD: Attack and Fault Detection Framework for Wireless Sensor Networks”, Journal of Control Engineering and Applied Informatics – CEAI, Vol. 15, No. 1, 2013, pp. 33–44.

Papers accepted for presentation in conferences in 2013

[1] R.-A. Vasilache, I.-C. Gavrila, A.-C. Grigorescu, L. Gheorghe, “Comparative Evaluation of Trust Mechanisms for Wireless Sensor Networks”, 11th RoEduNet International Conference, 2013, pp. 141-144.
[2] C.-L. Duţă, G. Michiu, S. Stoica and L. Gheorghe, “Accelerating Encryption Algorithms Using Parallelism”, International Workshop on Secure Internet of Things, in the 19th International Conference on Control Systems and Computer Science, 2013.
[3] R.-A. Vasilache, I.-C. Gavrila, A.-C. Grigorescu, and L. Gheorghe, “Trust Mechanisms for Multi-Owner Wireless Sensor Networks”, International Workshop on Secure Internet of Things, in the 19th International Conference on Control Systems and Computer Science, 2013, pp. 537-542.
[4] V. Varza, L. Gheorghe, “Evaluating software vulnerabilities using fuzzing methods”, The International Conference on Security for Information Technology and Communications – SECITC, 2013.
[5] L. Gheorghe, R. Rughinis, R. Tataroiu, “Adaptive Trust Management Protocol based on Intrusion Detection for Wireless Sensor Networks”, 12th RoEduNet International Conference, 2013.
[6] V. Ilie, L. Gheorghe, T. Popeea, “A Hybrid Approach to a Cryptanalysis Library”, 12th RoEduNet International Conference, 2013.

Papers accepted for presentation in conferences in 2012

[1] T. Bartzsch, D. Burggraf, L. Gheorghe, A. Olivereau, N. Oualha, E. Slusanschi, D. Tudose, M. Wehner, and S. Zeisberg, “AAA-based Infrastructure for Industrial Wireless Sensor Networks, ” IETF Smart Object Security Workshop, 2012.
[2] T. Bartzsch, D. Burggraf, L. Gheorghe, A. Olivereau, N. Oualha, E. Slusanschi, D. Tudose, M. Wehner, and S. Zeisberg, “AAA-based Infrastructure for Industrial Wireless Sensor Networks,” Future Network and Mobile Summit, 2012, pp. 1-8.
[3] L. Gheorghe, R. Rughiniș, and N. Ţăpuş, “Trust and Energy-aware Routing Protocol for Wireless Sensor Networks”, International Conference on Wireless and Mobile Communications, 2012, pp. 388-394.
[4] C. Dinu, L. Gheorghe, and N. Ţăpuş, “MAGIKMAIDS: Mobile Agents for In-Kernel Monitoring, Assessment and Intervention in Distributed Systems”, IEEE 7th International Symposium on Applied Computational Intelligence and Informatics, 2012, pp. 47-52.
[5] L. Gheorghe, D. Tudose, M. Wehner, and S. Zeisberg, “Securing Virtual Networks for Multi-Owner Wireless Sensor Networks”, International Workshop on Secure Internet of Things, in the 4th International Conference on Intelligent Networking and Collaborative Systems, 2012, pp. 630-635.
[6] L. Gheorghe, R. Rughiniș, and N. Ţăpuş, “Adaptive Security Framework for Wireless Sensor Networks”, International Workshop on Secure Internet of Things, in the 4th International Conference on Intelligent Networking and Collaborative Systems, 2012, pp. 636-641.
[7] T. Popeea, A. Constantinescu, L. Gheorghe, and N. Ţăpuş, “Inference Detection and Database Security for a Business Environment”, International Workshop on Secure Internet of Things, in the 4th International Conference on Intelligent Networking and Collaborative Systems, 2012, pp. 612-617.
[8] B. Hess, F. von Reischach, and L. Gheorghe, “Establishing Trust in Industrial WSN”, User-Centred Trust in Interactive Systems, Workshop at 7th Nordic Conference on Human-Computer Interaction (NordiCHI), 2012, pp. 31-35.

Papers accepted for publication in journals in 2012

[1] M. Wehner, S. Zeisberg, N. Oualha, A. Olivereau, M. Ludwig, D. Tudose, L. Gheorghe, E. Slusanschi, B. Hess, F. von Reischach, and D. Bateman, “Challenges and Current Results of the TWISNet FP7 Project,” in Trust, Privacy and Security in Digital Business, vol. 7449, S. Fischer-Hübner, S. Katsikas, and G. Quirchmayr, Eds. Springer Berlin / Heidelberg, 2012, pp. 232–233.

Papers accepted for presentation in conferences in 2011

[1] L. Gheorghe, R. Rughiniș, and N. Ţăpuş, “Energy-efficient Optimizations of the Authentication and Anti-replay Security Protocol for Wireless Sensor Networks,” The Seventh International Conference on Networking and Services, 2011, pp. 201-207.
[2] R. Rughiniș, L. Gheorghe, R. Deaconescu, and N. Țăpuș, “Hop-by-hop Inpection Mechanism for Wireless Sensor Networks,”18th International Conference on Control Systems and Computer Science, 2011, pp. 709-715.
[3] I. Apetroaei, I.-A. Oprea, B.-E. Proca, and L. Gheorghe, “Genetic Algorithms Applied in Routing Protocols for Wireless Sensor Networks,” 10th RoEduNet IEEE International Conference, 2011, pp. 1-6.
[4] T. Popeea, V. Olteanu, L. Gheorghe, and R. Rughiniș, “Extension of a port knocking client-server architecture with NTP synchronization,” 10th RoEduNet IEEE International Conference, 2011, pp. 1-5.
[5] M. Wehner, S. Zeisberg, A. Olivereau, N. Oulha, L. Gheorghe, E. Slusanschi, B. Hess, F.V. Reischach, M. Ludwig, and D. Bateman, “A Trustworthy Architecture for Wireless Industrial Sensor Networks: Research Roadmap of EU TWISNet Trust and Security Project,” 1st SysSec Workshop, 2011, pp. 63-66.

Papers accepted for publication in journals in 2011

[1] L. Gheorghe, R. Rughiniş, and N. Țăpuş, “Security Infrastructure for Wireless Sensor Networks,” UPB Scientific Bulletin, Series C, vol. 73, 2011, pp. 103-116.

Papers accepted for presentation in conferences in 2010

[1] L. Gheorghe, R. Rughiniș, and N. Țăpuș, “Attack Evaluation and Mitigation Framework,” Sixth International Conference on Networking and Services, Mar. 2010, pp. 243-252.
[2] L. Gheorghe, R. Rughiniș, and N. Țăpuș, “Fault-Tolerant Flooding Time Synchronization Protocol for Wireless Sensor Networks,” 2010 Sixth International Conference on Networking and Services, Mar. 2010, pp. 143-149.
[3] R. Rughiniș and L. Gheorghe, “Storm Control Mechanism in Wireless Sensor Networks,” 9th RoEduNet IEEE International Conference, IEEE, 2010, p. 430–435.
[4] E. Craciun, C. Manole, M. Stan, and L. Gheorghe, “Position aware routing protocol for wireless sensors networks,” 9th RoEduNet IEEE International Conference, 2010, p. 408–413.
[5] P.C. Huruiala, A. Urzica, and L. Gheorghe, “Hierarchical routing protocol based on evolutionary algorithms for Wireless Sensor Networks,” 9th RoEduNet IEEE International Conference, 2010, p. 387–392.
[6] A. Chiornita, L. Gheorghe, and D. Rosner, “A practical analysis of EAP authentication methods,” 9th RoEduNet IEEE International Conference, 2010, p. 31–35.
[7] L. Gheorghe, R. Rughiniș, R. Deaconescu, and N. Țăpuș, “Authentication and Anti-replay Security Protocol for Wireless Sensor Networks,” The Sixth International Conference on Systems and Networks Communications, 2010, pp. 7-13.
[8] L. Gheorghe, R. Rughiniș, R. Deaconescu, and N. Țăpuș, “Reliable Authentication and Anti-replay Security Protocol for Wireless Sensor Networks,” The Second International Conferences on Advanced Service Computing, 2010, pp. 208-214.
[9] L. Gheorghe, R. Rughiniș, R. Deaconescu, and N. Țăpuș, “Adaptive Trust Management Protocol Based on Fault Detection for Wireless Sensor Networks,” The Second International Conferences on Advanced Service Computing,  2010, pp. 216-221.