I. Jinga, Laurentiu-Florin Botezatu, Ioana Culic, Alexandru Radovici
{"title":"Using Cloud and Mobile Technologies in the Hospitality Industry","authors":"I. Jinga, Laurentiu-Florin Botezatu, Ioana Culic, Alexandru Radovici","doi":"10.1109/ROEDUNET.2018.8514134","DOIUrl":"https://doi.org/10.1109/ROEDUNET.2018.8514134","url":null,"abstract":"Although the expansion rate of the technology mixed with other domains is growing, restaurant industry has, on average, little to no technical solutions for the common problems of their business. A specific problem is the time consuming and ineffective methods of calculating the bill for every person at the table. In this paper, we describe an automatic and efficient solution for this problem, a platform that digitally extracts the products from the bill, no matter the structure of it and allows users to select the items they ordered.","PeriodicalId":407088,"journal":{"name":"2018 17th RoEduNet Conference: Networking in Education and Research (RoEduNet)","volume":"744 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116115976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey of IoT Security Threats and Solutions","authors":"Alexandru Radovici, Cristian Rusu, Razvan Serban","doi":"10.1109/ROEDUNET.2018.8514146","DOIUrl":"https://doi.org/10.1109/ROEDUNET.2018.8514146","url":null,"abstract":"Security features are essential in Internet of Things (IoT) systems where replacing or updating hardware components due to security concerns is expensive (or even impossible). In this paper we make a review of the recent malware and security threats related to the IoT, then we propose a solution to run secure applications on IoT devices as a secure execution framework for the Internet of Things. Running verified bytecode in an isolated framework will assure that all the security enforcement is done by software and does not rely on the security features provided by hardware components.","PeriodicalId":407088,"journal":{"name":"2018 17th RoEduNet Conference: Networking in Education and Research (RoEduNet)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130560327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cristian Sandescu, Octavian Grigorescu, R. Rughinis, Răzvan Deaconescu, M. Calin
{"title":"Why IoT security is failing. The Need of a Test Driven Security Approach","authors":"Cristian Sandescu, Octavian Grigorescu, R. Rughinis, Răzvan Deaconescu, M. Calin","doi":"10.1109/ROEDUNET.2018.8514135","DOIUrl":"https://doi.org/10.1109/ROEDUNET.2018.8514135","url":null,"abstract":"Internet of Things has evolved very quickly in recent years, being used by more and more people in many industries such as medical, automotive, energy, etc. This ecosystem brought with it multiple security issues that led to a significant growth of the daily challenges for cyber security professionals, and to novel types of cyber-attacks worldwide. In this paper, we discuss the existing vulnerabilities and attacks in the context of Internet of Things, followed by a proposal of a monitoring and security testing framework that analyzes and evaluates a complex IoT application from the incipient phase throughout its developing process.","PeriodicalId":407088,"journal":{"name":"2018 17th RoEduNet Conference: Networking in Education and Research (RoEduNet)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131597017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Impact of Post-processing Functions on Random Number Sequences","authors":"K. Marton, Leonard Pârvu, A. Suciu","doi":"10.1109/ROEDUNET.2018.8514140","DOIUrl":"https://doi.org/10.1109/ROEDUNET.2018.8514140","url":null,"abstract":"In this paper we study and compare several postprocessing functions in order to provide a better overview of their impact on random number sequences. Using a reference benchmark provided by the NIST statistical test suite, we explore the impact post-processing functions have on the output of random number generators, and empirically analyze methods to improve the randomness quality. Finally, we provide guidelines for applying post-processing functions based on the quality of the raw input bitstreams and the expected results regarding bias correction and throughput.","PeriodicalId":407088,"journal":{"name":"2018 17th RoEduNet Conference: Networking in Education and Research (RoEduNet)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130968424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Open-source multi-protocol gateway for Internet of Things","authors":"Bogdan Oniga, A. Munteanu, V. Dădârlat","doi":"10.1109/ROEDUNET.2018.8514136","DOIUrl":"https://doi.org/10.1109/ROEDUNET.2018.8514136","url":null,"abstract":"Internet of Things (IoT) is becoming increasingly ubiquitous with global applicability in a very wide spectrum of commercial sectors, making use of diverse technologies for custom usage in certain environments. The diversity of applications and protocols and the custom needs for each environment introduce a big challenge for IoT applications, demanding the support of communication and message exchanges in implementations that aggregate diverse protocols. The paper addresses the design of an open-source multiprotocol gateway which supports two communication protocols, namely, Bluetooth Low Energy (BLE) and LoRa. The proposed gateway represents the bridge between the devices and the network server and transports the received messages via a standard format readable by the network server. The messages between the gateway and the network server are transported over the Message Queuing Telemetry Transport (MQTT) protocol. The paper details the implementation of the proposed multi-protocol gateway and highlights its benefits. In particular, the proposed gateway demonstrates support for multiple protocols on the same hardware base and eliminates the need of using multiple hardware components for each type of protocol.","PeriodicalId":407088,"journal":{"name":"2018 17th RoEduNet Conference: Networking in Education and Research (RoEduNet)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122655405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Rosner, Cristiana Trifu, C. Tranca, I. Vasilescu, F. Stancu
{"title":"Magnetic Field Sensor for UAV Power Line Acquisition and Tracking","authors":"D. Rosner, Cristiana Trifu, C. Tranca, I. Vasilescu, F. Stancu","doi":"10.1109/ROEDUNET.2018.8514123","DOIUrl":"https://doi.org/10.1109/ROEDUNET.2018.8514123","url":null,"abstract":"High voltage power line inspection is a critical task that can be automated by using UAV (Unmanned Aerial Vehicle) inspection. Automated navigating along power lines remains however an open challenge, with current available sensors systems limited in terms of accuracy and consistency by environmental variables. The current work presents an automated power line detection system based on the magnetic signature from an active power line. This paper will discuss the design, testing and fine tuning of a magnetic field sensor system optimized to measure the distance and relative bearing of the power line.","PeriodicalId":407088,"journal":{"name":"2018 17th RoEduNet Conference: Networking in Education and Research (RoEduNet)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125998421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure and Extensible Smart Home Template","authors":"Vlad Haţegan, V. Dădârlat, A. Peculea, E. Cebuc","doi":"10.1109/ROEDUNET.2018.8514145","DOIUrl":"https://doi.org/10.1109/ROEDUNET.2018.8514145","url":null,"abstract":"As the Internet of Things and smart home systems are becoming more and more popular, the security of such applications has become a continuous source of concerns for their users. The paper proposes a smart home template that effectively addresses the issue ofpersonal data security and allows for system extension by adding modules andfunctionalities. To solve the problem of secure communication between theparties involved in the data transfer, a proprietary protocol has beendeveloped and implemented. This solution reached its objective of providinga safe experience to the users, mostly through the proposed protocol whichdefines a mechanism for secure distribution of the secret keys in order toassure data confidentiality, integrity and authentication. This mechanismwas designed taking into account that the computing power and memory of thesensor or actuator modules can be reduced and that system users do not havecomputer networks security knowledge.","PeriodicalId":407088,"journal":{"name":"2018 17th RoEduNet Conference: Networking in Education and Research (RoEduNet)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128887050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"File System Minifilter Based Data Leakage Prevention System","authors":"Adrian Buda, Adrian Colesa","doi":"10.1109/ROEDUNET.2018.8514147","DOIUrl":"https://doi.org/10.1109/ROEDUNET.2018.8514147","url":null,"abstract":"In recent years, more and more companies and institutions tend to keep most of their data in digital format. There is a large specter of information stored by such entities, like medical records, contracts, internal procedures, etc. that can be considered as being confidential, thus protecting them is a great concern. Since employees have access to such information, either by negligence or bad intention, they could leak the aforementioned information. As a solution to the given problem, our implementation is based on a file system mini filter driver that will block potentially unwanted file system operations, such as copying a confidential file to a removable storage device. The aforementioned architecture allows us to intercept and block I/O requests that originate from CopyFile or ReadFileAPIs. Another feature consists in blocking external devices such as SD cards, USB drives or external hard drives (the drives are detected, assigned a drive letter, but no further operations are allowed).","PeriodicalId":407088,"journal":{"name":"2018 17th RoEduNet Conference: Networking in Education and Research (RoEduNet)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130795225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Penetration Testing Solution for Wireless Networks using mobile devices","authors":"Alexandru Ilovan, B. Iancu","doi":"10.1109/ROEDUNET.2018.8514129","DOIUrl":"https://doi.org/10.1109/ROEDUNET.2018.8514129","url":null,"abstract":"An important problem when teaching cyber security concepts is the difficulty in understanding and testing security and penetration scenarios. Since the beginning of networks and computers, there was a constant battle regarding when, how and who has access to different resources and information. The paper unveils some key insecurities of wireless networks and presents a penetration testing (pen testing) mobile programmable device controlled by a mobile application that can be used for understanding and learning security concepts. The proposed system allows teachers to build low cost hand-on security laboratory solutions and lets students run real security penetration scenarios, to further deepen their cyber security understanding.","PeriodicalId":407088,"journal":{"name":"2018 17th RoEduNet Conference: Networking in Education and Research (RoEduNet)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126778205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Laurentiu Piciu, A. Damian, N. Tapus, Andrei Simion-Constantinescu, B. Dumitrescu
{"title":"Deep recommender engine based on efficient product embeddings neural pipeline","authors":"Laurentiu Piciu, A. Damian, N. Tapus, Andrei Simion-Constantinescu, B. Dumitrescu","doi":"10.1109/ROEDUNET.2018.8514141","DOIUrl":"https://doi.org/10.1109/ROEDUNET.2018.8514141","url":null,"abstract":"Predictive analytics systems are currently one of the most important areas of research and development within the Artificial Intelligence domain and particularly in Machine Learning. One of the “holy grails” of predictive analytics is the research and development of the “perfect” recommendation system. In our paper we propose an advanced pipeline model for the multi-task objective of determining product complementarity, similarity and sales prediction using deep neural models applied to big-data sequential transaction systems. Our highly parallelized hybrid pipeline consists of both unsupervised and supervised models, used for the objectives of generating semantic product embeddings and predicting sales, respectively. Our experimentation andbenchmarking havebeen done using very large pharma-industry retailer Big Data stream.","PeriodicalId":407088,"journal":{"name":"2018 17th RoEduNet Conference: Networking in Education and Research (RoEduNet)","volume":"54 75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125893731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}