Search Results - "Bacivarov, Ioan C."

  • Showing 1 - 7 results of 7
Refine Results
  1. 1

    Detecting Phishing Websites Through Domain and Content Analysis by Pascariu, Cristian, Bacivarov, Ioan C.

    “…Many security incidents within the digital space focus on deceiving human users through the use of phishing websites that are built to capture and steal…”
    Get full text
    Conference Proceeding
  2. 2

    The paradigm of utilizing robots in the teaching process: a comparative study by Bacivarov, Ioan C., Ilian, Virgil L. M.

    “…This paper discusses a comparative study of the effects of using a humanoid robot for introducing students to personal robotics. Even if a humanoid robot is…”
    Get full text
    Journal Article
  3. 3

    Reliability enhancements for high-availability systems using distributed event streaming platforms by Dinca, Ana-Maria, Axinte, Sabina-Daniela, Bacivarov, Ioan C., Petrica, Gabriel

    “…The effectiveness of a performant high-availability system can be measured by the transaction operations' execution speed and reliability metrics. The…”
    Get full text
    Conference Proceeding
  4. 4

    In-Memory Versus On-Disk Databases: Best Practices, Use Cases and Architectural Designs by Dinca, Ana-Maria, Axinte, Sabina-Daniela, Bacivarov, Ioan C.

    “…The performance of an information system is first and foremost determined by the database architecture's design. An unresponsive software application or an…”
    Get full text
    Conference Proceeding
  5. 5

    Improving the Quality of Web Applications Through Targeted Usability Enhancements by AXINTE, Sabina-Daniela, BACIVAROV, Ioan C.

    “…In the competitive software industry, companies are starting to see the advantage of investing in user-oriented, as opposed to technology-oriented, products in…”
    Get full text
    Conference Proceeding
  6. 6

    Studying cyber security threats to web platforms using attack tree diagrams by Petrica, Gabriel, Axinte, Sabina-Daniela, Bacivarov, Ioan C., Firoiu, Marian, Mihai, Ioan-Cosmin

    “…Used by both information systems designers and security personnel, the Attack Tree method provides a graphical analysis of the ways in which an entity (a…”
    Get full text
    Conference Proceeding
  7. 7

    Intruder monitoring system for local networks using Python by Barbu, Ionut-Daniel, Pascariu, Cristian, Bacivarov, Ioan C., Axinte, Sabina-Daniela, Firoiu, Marian

    “…Nowadays, Information Security specialists focus on the development of complex solutions for monitoring large enterprise networks. This paper is intended to…”
    Get full text
    Conference Proceeding