ANCA  DELIA JURCUT
Title
Cited by
Cited by
Year
Design guidelines for security protocols to prevent replay & parallel session attacks
AD Jurcut, T Coffey, R Dojen
Computers & Security, Elsevier 45, 255-273, 2014
172014
On establishing and fixing a parallel session attack in a security protocol
R Dojen, A Jurcut, T Coffey, C Gyorodi
Intelligent distributed computing, systems and applications, 239-244, 2008
142008
On the prevention and detection of replay attacks using a logic-based verification tool
AD Jurcut, T Coffey, R Dojen
Springer International Conference on Computer Networks, 128-137, 2014
122014
Secure communication channel architecture for software defined mobile networks
M Liyanage, A Braeken, AD Jurcut, M Ylianttila, A Gurtov
Computer Networks 114, 32-50, 2017
112017
Establishing and fixing security protocols weaknesses using a logic-based verification tool
A Jurcut, T Coffey, R Dojen
Journal of Communication 8 (11), 795-806, 2013
112013
A novel security protocol attack detection logic with unique fault discovery capability for freshness attacks and interleaving session attacks
A Jurcut, T Coffey, R Dojen
IEEE transactions on dependable and secure computing, 2017
92017
Anonymous Lightweight Proxy Based Key Agreement for IoT (ALPKA)
A Braeken, M Liyanage, AD Jurcut
Wireless Personal Communications, 1-20, 2019
62019
Determining a parallel session attack on a key distribution protocol using a model checker
V Paşca, A Jurcuţ, R Dojen, T Coffey
Proceedings of the 6th International Conference on Advances in Mobile …, 2008
62008
On the Security Verification of a Short Message Service Protocol
AD Jurcut, M Liyanage, J Chen, C Gyorodi, J He
2018 IEEE Wireless Communications and Networking Conference (WCNC), 2018
52018
AGE: authentication in gadget-free healthcare environments
T Kumar, A Braeken, AD Jurcut, M Liyanage, M Ylianttila
Information Technology and Management, 1-20, 2019
42019
Realizing Multi-Access Edge Computing Feasibility: Security Perspective
P Ranaweera, AD Jurcut, M Liyanage
2019 IEEE Conference on Standards for Communications and Networking (CSCN), 2019
42019
Design requirements to counter parallel session attacks in security protocols
AD Jurcut, T Coffey, R Dojen
2014 Twelfth Annual International Conference on Privacy, Security and Trust …, 2014
42014
Analysis of a key-establishment security protocol
A Jurcut, T Coffey, R Dojen, R Gyorodi
Journal of Computer Science and Control Systems 2008, 42-47, 2008
42008
Symmetry in Security Protocol Cryptographic Messages--A Serious Weakness Exploitable by Parallel Session Attacks
A Jurcut, T Coffey, R Dojen
2012 Seventh International Conference on Availability, Reliability and …, 2012
32012
Security Protocol Design: A Case Study Using Key Distribution Protocols.
A Jurcut, T Coffey, R Dojen, R Gyorodi
Journal of Computer Science & Control Systems 2 (2), 2009
32009
Introduction to IoT Security
AD Jurcut, R Ranaweera, L Xu
IoT Security : Advances in Authentication 1, 37, 2019
22019
Machine-Learning Techniques for Detecting Attacks in SDN
MS Elsayed, NA Le-Khac, S Dev, AD Jurcut
2019 IEEE 7th International Conference on Computer Science and Network …, 2019
22019
Automated Logic-Based Technique for Formal Verification of Security Protocols
AD Jurcut
Journal of Advances in Computer Networks (JACN 2018) 6 (ISSN: 1793-8244), 77-85, 2018
22018
Insider threats in Cyber Security: The enemy within the gates
G Mazzarolo, AD Jurcut
European Cybersecurity Journal, 2019
12019
DDoSNet: A Deep-Learning Model for Detecting Network Attacks
MS Elsayed, NA Le-Khac, S Dev, AD Jurcut
21ST IEEE INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND …, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–20