default search action
Emil Pricop
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c29]Jaouhar Fattahi, Feriel Sghaier, Mohamed Mejri, Ridha Ghayoula, Emil Pricop, Baha Eddine Lakdher:
Handwritten Signature Recognition using Parallel CNNs and Transfer Learning for Forensics. CoDIT 2024: 1697-1702 - 2023
- [c28]Pronaya Bhattacharya, Anwesha Mukherjee, Sudeep Tanwar, Emil Pricop:
Zero-Load: A Zero Touch Network based router management scheme underlying 6G-IoT ecosystems. ECAI 2023: 1-7 - [c27]Riya Kakkar, Rajesh Gupta, Smita Agrawal, Sudeep Tanwar, Emil Pricop:
Game-based Resource Allocation for Secure UAV Communication in Wireless Networks. ECAI 2023: 1-6 - [i11]Ridha Ghayoula, Jaouhar Fattahi, Amor Smida, Issam El Gmati, Emil Pricop, Marwa Ziadia:
FPGA Implementation of SIMON-128 Cryptographic Algorithm Using Artix-7. CoRR abs/2301.01889 (2023) - 2022
- [b1]Nitul Dutta, Nilesh Kumar Jadav, Sudeep Tanwar, Hiren Kumar Deva Sarma, Emil Pricop:
Cyber Security: Issues and Current Trends. Studies in Computational Intelligence 995, Springer 2022, ISBN 978-981-16-6596-7, pp. 1-174 - [j4]Sudipta Chakrabarty, Ruhul Islam, Emil Pricop, Hiren Kumar Deva Sarma:
An Approach to Discover Similar Musical Patterns. IEEE Access 10: 47322-47339 (2022) - [j3]Sanjiban Sekhar Roy, Sanda Florentina Mihalache, Emil Pricop, Nishant Rodrigues:
Deep convolutional neural network for environmental sound classification via dilation. J. Intell. Fuzzy Syst. 43(2): 1827-1833 (2022) - [c26]Ridha Ghayoula, Jaouhar Fattahi, Amor Smida, Issam El Gmati, Emil Pricop, Marwa Ziadia:
FPGA Implementation of SIMON-128 Cryptographic Algorithm Using Artix-7. ECAI 2022: 1-5 - [c25]Florin Zamfir, Emil Pricop:
On the design of an interactive automatic Python programming skills assessment system. ECAI 2022: 1-5 - 2021
- [c24]Rajesh Gupta, Tejal Rathod, Dakshita Reebadiya, Sudeep Tanwar, Pronaya Bhattacharya, Emil Pricop:
FaitH: Trusted Chain Network for Non-Cooperative D2D Communication Underlying HetNet. ECAI 2021: 1-6 - [c23]Nilesh Kumar Jadav, Nitul Dutta, Hiren Kumar Deva Sarma, Emil Pricop, Sudeep Tanwar:
A Machine Learning Approach to Classify Network Traffic. ECAI 2021: 1-6 - [c22]Sidharth Shyamsukha, Pronaya Bhattacharya, Farnazbanu Patel, Sudeep Tanwar, Rajesh Gupta, Emil Pricop:
PoRF: Proof-of-Reputation-based Consensus Scheme for Fair Transaction Ordering. ECAI 2021: 1-6 - 2020
- [j2]Marwa Ziadia, Jaouhar Fattahi, Mohamed Mejri, Emil Pricop:
Smali+: An Operational Semantics for Low-Level Code Generated from Reverse Engineering Android Applications. Inf. 11(3): 130 (2020) - [j1]Muhammad Imran Tariq, Shahzadi Tayyaba, Natash Ali Mian, Muhammad Shahzad Sarfraz, Akhtar Hussain, Muhammad Imran, Emil Pricop, Otilia Cangea, Nicolae Paraschiv:
An analysis of the application of fuzzy logic in cloud computing. J. Intell. Fuzzy Syst. 38(5): 5933-5947 (2020) - [c21]Octavian Ionescu, Cristina Besleaga, Viorel Dumitru, Emil Pricop:
UAV identification system based on memristor physical unclonable functions. ECAI 2020: 1-4
2010 – 2019
- 2019
- [c20]Jaouhar Fattahi, Mohamed Mejri, Emil Pricop:
On the Security of Cryptographic Protocols Using the Little Theorem of Witness Functions. CCECE 2019: 1-5 - [c19]Octavian Ionescu, Viorel Dumitru, Emil Pricop, Octavian Buiu, Cornel Cobianu, Mihai Raneti, Stefan Pircalabu, Costin Marica:
On the development of a robust cyber security system for Internet of Things devices. ECAI 2019: 1-5 - [c18]Florin Zamfir, Nicolae Paraschiv, Emil Pricop:
Real-time stock analysis for blending recipes in industrial plants. ICSTCC 2019: 79-83 - [c17]Nicolae Paraschiv, Emil Pricop, Jaouhar Fattahi, Florin Zamfir:
Towards a reliable approach on scaling in data acquisition. ICSTCC 2019: 84-88 - [i10]Jaouhar Fattahi, Mohamed Mejri, Emil Pricop:
On the Security of Cryptographic Protocols Using the Little Theorem of Witness Functions. CoRR abs/1903.00499 (2019) - [i9]Jaouhar Fattahi, Mohamed Mejri, Emil Pricop:
Authentication by Witness Functions. CoRR abs/1903.05791 (2019) - [i8]Snehal Sathwara, Nitul Dutta, Emil Pricop:
IoT Forensic - A digital investigation framework for IoT systems. CoRR abs/1909.02815 (2019) - [i7]Florin Zamfir, Nicolae Paraschiv, Emil Pricop:
Real-time stock analysis for blending recipes in industrial plants. CoRR abs/1909.02960 (2019) - [i6]Emil Pricop:
On the design of an innovative solution for increasing hazardous materials transportation safety. CoRR abs/1909.07438 (2019) - [i5]Emil Pricop, Sanda Florentina Mihalache:
Fuzzy approach on modelling cyber attacks patterns on data transfer in industrial control systems. CoRR abs/1912.00234 (2019) - 2018
- [c16]Snehal Sathwara, Nitul Dutta, Emil Pricop:
IoT Forensic A digital investigation framework for IoT systems. ECAI 2018: 1-4 - [i4]Emil Pricop, Sanda Florentina Mihalache, Nicolae Paraschiv, Jaouhar Fattahi, Florin Zamfir:
Considerations regarding security issues impact on systems availability. CoRR abs/1801.05459 (2018) - 2017
- [c15]Florin Zamfir, Nicolae Paraschiv, Emil Pricop:
Performance analysis in WiMAX networks using random linear network coding. CoDIT 2017: 590-594 - [c14]Emil Pricop, Jaouhar Fattahi, Nicolae Paraschiv, Florin Zamfir, Elies Ghayoula:
Method for authentication of sensors connected on Modbus TCP. CoDIT 2017: 679-683 - [c13]Nicoleta Marilena Matei, Sorin-Lucian Dobrescu, Loretta Ichim, Dan Popescu, Emil Pricop:
A multi-agent system for management of control functions as services in onshore oilfield. ECAI 2017: 1-5 - [c12]Jaouhar Fattahi, Mohamed Mejri, Marwa Ziadia, Elies Ghayoula, Ouejdene Samoud, Emil Pricop:
Cryptographic protocol for multipart missions involving two independent and distributed decision levels in a military context. SMC 2017: 1127-1132 - [c11]Jaouhar Fattahi, Mohamed Mejri, Marwa Ziadia, Takwa Omrani, Emil Pricop:
Witness-functions versus interpretation-functions for secrecy in cryptographic protocols: What to choose? SMC 2017: 2649-2654 - [c10]Elies Ghayoula, Ammar Bouallegue, Ridha Ghayoula, Jaouhar Fattahi, Emil Pricop, Jean-Yves Chouinard:
Radiation pattern synthesis using hybrid fourier-woodward-lawson-neural networks for reliable mimo antenna systems. SMC 2017: 3290-3295 - [c9]Jaouhar Fattahi, Mohamed Mejri, Marwa Ziadia, Emil Pricop, Ouejdene Samoud:
Introduction to SinJAR (a New Tool for Reverse Engineering Java Applications) and Tracing Its Malicious Actions Using Hidden Markov Models. SoMeT 2017: 441-453 - [i3]Jaouhar Fattahi, Mohamed Mejri, Marwa Ziadia, Ouejdene Samoud, Elies Ghayoula, Emil Pricop:
Cryptographic Protocol for Multipart Missions Involving Two Independent and Distributed Decision Levels in a Military Context. CoRR abs/1707.07801 (2017) - [i2]Jaouhar Fattahi, Mohamed Mejri, Marwa Ziadia, Takwa Omrani, Emil Pricop:
Witness-Functions versus Interpretation-Functions for Secrecy in Cryptographic Protocols: What to Choose? CoRR abs/1707.09078 (2017) - [i1]Elies Ghayoula, Ridha Ghayoula, Jaouhar Fattahi, Emil Pricop, Jean-Yves Chouinard, Ammar Bouallegue:
Radiation Pattern Synthesis Using Hybrid Fourier- Woodward-Lawson-Neural Networks for Reliable MIMO Antenna Systems. CoRR abs/1710.02633 (2017) - 2016
- [c8]Emil Pricop, Sanda Florentina Mihalache, Nicolae Paraschiv, Jaouhar Fattahi, Florin Zamfir:
Considerations regarding security issues impact on systems availability. ECAI 2016: 1-6 - [c7]Jaouhar Fattahi, Mohamed Mejri, Ridha Ghayoula, Emil Pricop:
Formal reasoning on authentication in security protocols. SMC 2016: 282-289 - [c6]Elies Ghayoula, Jaouhar Fattahi, Ridha Ghayoula, Emil Pricop, G. Stamatescu, Jean-Yves Chouinard, Ammar Bouallegue:
Sidelobe level reduction in linear array pattern synthesis using Taylor-MUSIC algorithm for reliable IEEE 802.11 MIMO applications. SMC 2016: 4700-4705 - [c5]Jaouhar Fattahi, Mohamed Mejri, Emil Pricop:
Authentication by Witness Functions. Trustcom/BigDataSE/ISPA 2016: 1990-1997 - 2015
- [c4]Emil Pricop, Sanda Florentina Mihalache:
Fuzzy approach on modelling cyber attacks patterns on data transfer in industrial control systems. ECAI 2015 - [c3]Jaouhar Fattahi, Mohamed Mejri, Emil Pricop:
Tracking Security Flaws in Cryptographic Protocols Using Witness-Functions. SMC 2015: 1189-1196 - 2014
- [c2]Emil Pricop, Sanda Florentina Mihalache:
Assessing the security risks of a wireless sensor network from a gas compressor station. ECAI 2014: 45-50 - 2013
- [c1]Octavian Ionescu, Emil Pricop:
On the Design of a System for Airport Protection against Terrorist Attacks Using MANPADs. SMC 2013: 4778-4782
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-14 00:52 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint