Romanian Cyber Security Journal最新文献

筛选
英文 中文
Generation Z and the Age of Technology Addiction Z世代与科技成瘾时代
Romanian Cyber Security Journal Pub Date : 2022-05-18 DOI: 10.54851/v4i1y202202
Alexandra Raluca Albescu
{"title":"Generation Z and the Age of Technology Addiction","authors":"Alexandra Raluca Albescu","doi":"10.54851/v4i1y202202","DOIUrl":"https://doi.org/10.54851/v4i1y202202","url":null,"abstract":"","PeriodicalId":127637,"journal":{"name":"Romanian Cyber Security Journal","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126786180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cryptographic Analysis of P2DPI P2DPI的密码分析
Romanian Cyber Security Journal Pub Date : 2022-05-18 DOI: 10.54851/v4i1y202201
Mihai-Alexandru Bogatu
{"title":"Cryptographic Analysis of P2DPI","authors":"Mihai-Alexandru Bogatu","doi":"10.54851/v4i1y202201","DOIUrl":"https://doi.org/10.54851/v4i1y202201","url":null,"abstract":": This paper represents an analysis of the recently proposed P2DPI encryption scheme for deep packet inspection. Constructs of the algorithm are challenged with a complete confidentiality and integrity evaluation. Later in the article, there is proof that, in the current form, usage of P2DPI can compromise user privacy.","PeriodicalId":127637,"journal":{"name":"Romanian Cyber Security Journal","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123387578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The New Challenges of Romania’s Cyber Security Policy 罗马尼亚网络安全政策的新挑战
Romanian Cyber Security Journal Pub Date : 2022-05-18 DOI: 10.54851/v4i1y202207
I. Petcu, Dragos-Catalin Barbu
{"title":"The New Challenges of Romania’s Cyber Security Policy","authors":"I. Petcu, Dragos-Catalin Barbu","doi":"10.54851/v4i1y202207","DOIUrl":"https://doi.org/10.54851/v4i1y202207","url":null,"abstract":": The 21st century has presented us with not easy challenges for society. The global security strategy has entered a new era following the September 2001 attack on the World Trade Center. Breaking the real estate bubble in 2008 caused massive losses for international banks and investors, leading to a severe financial crisis and an impending recession. The Arab Spring was marked by demonstrations in the Islamic world in the early 2010s. The refugee crisis followed as millions of people migrated from the Middle East to Europe. A new challenge came at the end of 2019 when a contagious virus triggered the Covid-19 pandemic leading to a global health crisis. When we thought that everything was back to normal, the appearance of the military conflict on the borders of Romania led to the deepening of the energy and food crisis, creating premises for the beginning of a new economic recession. This international context has led to new challenges for Romania, and paradigm shifts in EU security policies and strategies have created favorable conditions for updating the legislative framework on national defense policies, including the approval of Romania’s new Cyber Security Strategy.","PeriodicalId":127637,"journal":{"name":"Romanian Cyber Security Journal","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125889137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Importance of Simulation Modeling of Different Systems, with an Emphasis on Agent-Based Modeling 不同系统仿真建模的重要性,重点是基于智能体的建模
Romanian Cyber Security Journal Pub Date : 2022-05-18 DOI: 10.54851/v4i1y202203
Mihnea-Vlad Nicolae
{"title":"The Importance of Simulation Modeling of Different Systems, with an Emphasis on Agent-Based Modeling","authors":"Mihnea-Vlad Nicolae","doi":"10.54851/v4i1y202203","DOIUrl":"https://doi.org/10.54851/v4i1y202203","url":null,"abstract":": Simulation modeling has become a key instrument for planners and decision makers over the years and its development has increased the accuracy of the resulted data and the efficiency of the simulated model. Agent-Based Modeling is being used in a vast variety of areas, helping in developing new applications, new transport systems, increasing the security of different infrastructures and even helping to manage natural disasters. This modeling technique has a lot of benefits over physically simulating the environment and this accounts for its growing use. This paper presents the importance of simulation modeling, highlights key applications and focuses on tracing the evolution of agent-based modeling in the field of transport.","PeriodicalId":127637,"journal":{"name":"Romanian Cyber Security Journal","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132473692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity Management for Incident Response 事件响应的网络安全管理
Romanian Cyber Security Journal Pub Date : 2022-05-18 DOI: 10.54851/v4i1y202208
Alin Zamfiroiu, Ramesh C Sharma
{"title":"Cybersecurity Management for Incident Response","authors":"Alin Zamfiroiu, Ramesh C Sharma","doi":"10.54851/v4i1y202208","DOIUrl":"https://doi.org/10.54851/v4i1y202208","url":null,"abstract":": In information technology, security is the protection of information assets through the use of technology, processes and training. There will always be situations of attack on software systems but the software must continue to work properly under such potential risks. The security process assumes and is required to provide three important elements: integrity, authentication, and availability. Security is a set of processes and techniques implemented to protect private information in electronic or printed format against modification, destruction or unauthorized access. This paper discusses effective management of cybersecurity for incident response.","PeriodicalId":127637,"journal":{"name":"Romanian Cyber Security Journal","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134369649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study on Actual Developments in the Field of Quantum Computing in Terms of Cyber Security and Physical Systems 从网络安全和物理系统角度研究量子计算领域的实际发展
Romanian Cyber Security Journal Pub Date : 2022-05-18 DOI: 10.54851/v4i1y202206
Maria-Daniela Iancu
{"title":"Study on Actual Developments in the Field of Quantum Computing in Terms of Cyber Security and Physical Systems","authors":"Maria-Daniela Iancu","doi":"10.54851/v4i1y202206","DOIUrl":"https://doi.org/10.54851/v4i1y202206","url":null,"abstract":": This paper deals with the concept of quantum computer, which describes the quantum algorithms, areas of use and weaknesses or strengths of quantum computing, cyber security and circuits.","PeriodicalId":127637,"journal":{"name":"Romanian Cyber Security Journal","volume":"233 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133339677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Simulating the Volume of Industrial Traffic Control System Using Standard Communication Protocols 基于标准通信协议的工业交通控制系统流量模拟研究
Romanian Cyber Security Journal Pub Date : 2022-05-18 DOI: 10.54851/v4i1y202205
V. Popescu, Tiberiu Ion, Victor Gânsac, M. Parvu, Sorin Pistol, Olivia Comşa
{"title":"Research on Simulating the Volume of Industrial Traffic Control System Using Standard Communication Protocols","authors":"V. Popescu, Tiberiu Ion, Victor Gânsac, M. Parvu, Sorin Pistol, Olivia Comşa","doi":"10.54851/v4i1y202205","DOIUrl":"https://doi.org/10.54851/v4i1y202205","url":null,"abstract":": This paper aims to analyze, simulate and test the control of industrial traffic by using existing standard communication protocols in order to be able to respond to cyber security incidents and to implement new services and innovative processes. This study with practical results is part of the research carried out within the project “Center of Excellence for Cyber Security and Critical Infrastructure Resilience - SafePIC, funded under the Operational Program Competitiveness 2014-2020.","PeriodicalId":127637,"journal":{"name":"Romanian Cyber Security Journal","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121959689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Malicious Strategy: Watering Hole Attacks 恶意策略:水坑攻击
Romanian Cyber Security Journal Pub Date : 2022-05-18 DOI: 10.54851/v4i1y202204
Mihai Apostol, Bogdan Paliniuc, Rareș Morar, Florin Vidu
{"title":"Malicious Strategy: Watering Hole Attacks","authors":"Mihai Apostol, Bogdan Paliniuc, Rareș Morar, Florin Vidu","doi":"10.54851/v4i1y202204","DOIUrl":"https://doi.org/10.54851/v4i1y202204","url":null,"abstract":": A recent attack strategy named watering hole attack has evolved in the past years, a combination of different techniques which are aimed at companies network by infecting websites which are frequently accesed by its employees. This paper aims to bring a better understanding and awareness of this type of attack. A case study is included in this research and also an analysis of Earth Lusca, a criminal organization whose strategy is concentrated on watering hole attacks.","PeriodicalId":127637,"journal":{"name":"Romanian Cyber Security Journal","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122293675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信