Search Results - "Bacivarov, Ioan C."
-
1
Detecting Phishing Websites Through Domain and Content Analysis
Published in 2021 13th International Conference on Electronics, Computers and Artificial Intelligence (ECAI) (01-07-2021)“…Many security incidents within the digital space focus on deceiving human users through the use of phishing websites that are built to capture and steal…”
Get full text
Conference Proceeding -
2
The paradigm of utilizing robots in the teaching process: a comparative study
Published in International journal of technology and design education (01-11-2012)“…This paper discusses a comparative study of the effects of using a humanoid robot for introducing students to personal robotics. Even if a humanoid robot is…”
Get full text
Journal Article -
3
Reliability enhancements for high-availability systems using distributed event streaming platforms
Published in 2023 IEEE 29th International Symposium for Design and Technology in Electronic Packaging (SIITME) (18-10-2023)“…The effectiveness of a performant high-availability system can be measured by the transaction operations' execution speed and reliability metrics. The…”
Get full text
Conference Proceeding -
4
In-Memory Versus On-Disk Databases: Best Practices, Use Cases and Architectural Designs
Published in 2023 15th International Conference on Electronics, Computers and Artificial Intelligence (ECAI) (29-06-2023)“…The performance of an information system is first and foremost determined by the database architecture's design. An unresponsive software application or an…”
Get full text
Conference Proceeding -
5
Improving the Quality of Web Applications Through Targeted Usability Enhancements
Published in 2018 10th International Conference on Electronics, Computers and Artificial Intelligence (ECAI) (01-06-2018)“…In the competitive software industry, companies are starting to see the advantage of investing in user-oriented, as opposed to technology-oriented, products in…”
Get full text
Conference Proceeding -
6
Studying cyber security threats to web platforms using attack tree diagrams
Published in 2017 9th International Conference on Electronics, Computers and Artificial Intelligence (ECAI) (01-06-2017)“…Used by both information systems designers and security personnel, the Attack Tree method provides a graphical analysis of the ways in which an entity (a…”
Get full text
Conference Proceeding -
7
Intruder monitoring system for local networks using Python
Published in 2017 9th International Conference on Electronics, Computers and Artificial Intelligence (ECAI) (01-06-2017)“…Nowadays, Information Security specialists focus on the development of complex solutions for monitoring large enterprise networks. This paper is intended to…”
Get full text
Conference Proceeding