Search Results - "Grigorescu, Octavian"
-
1
Automated Mapping of Common Vulnerabilities and Exposures to MITRE ATT&CK Tactics
Published in Information (Basel) (01-04-2024)“…Effectively understanding and categorizing vulnerabilities is vital in the ever-evolving cybersecurity landscape, since only one exposure can have a…”
Get full text
Journal Article -
2
Automated Mapping of Common Vulnerabilities and Exposures to MITRE ATT CK Tactics
Published in Information (Basel) (01-04-2024)“…Effectively understanding and categorizing vulnerabilities is vital in the ever-evolving cybersecurity landscape, since only one exposure can have a…”
Get full text
Journal Article -
3
CVE2ATT&CK: BERT-Based Mapping of CVEs to MITRE ATT&CK Techniques
Published in Algorithms (01-09-2022)“…Since cyber-attacks are ever-increasing in number, intensity, and variety, a strong need for a global, standardized cyber-security knowledge database has…”
Get full text
Journal Article -
4
CVE2ATT CK: BERT-Based Mapping of CVEs to MITRE ATT CK Techniques
Published in Algorithms (01-08-2022)“…Since cyber-attacks are ever-increasing in number, intensity, and variety, a strong need for a global, standardized cyber-security knowledge database has…”
Get full text
Journal Article -
5
Probability and Attack Graph models in Contextual Risk Scoring System
Published in 2022 21st RoEduNet Conference: Networking in Education and Research (RoEduNet) (15-09-2022)“…The interest of attackers is expanding in response to the on-growing enthusiasm for rapid development, so seeking ways to quantify and manage the risks has…”
Get full text
Conference Proceeding -
6
Severity Prediction of Software Vulnerabilities based on their Text Description
Published in 2021 23rd International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC) (01-12-2021)“…Software vulnerabilities represent a real challenge nowadays, often resulting in disruption of vital systems and data loss. Due to the multitude of software…”
Get full text
Conference Proceeding -
7
Web Application Honeypot Published in the Wild
Published in 2020 19th RoEduNet Conference: Networking in Education and Research (RoEduNet) (11-12-2020)“…The goal of this project is to create an intelligent system that will be installed under a cybernetic infrastructure, with the purpose of detecting…”
Get full text
Conference Proceeding -
8
Analyzing Risk Evaluation Frameworks and Risk Assessment Methods
Published in 2020 19th RoEduNet Conference: Networking in Education and Research (RoEduNet) (11-12-2020)“…Over the recent years, cyber insurance has become increasingly important, as our society has relied more and more on the cyber domain for almost all aspects of…”
Get full text
Conference Proceeding -
9
Yggdrasil - Early Detection of Cybernetic Vulnerabilities from Twitter
Published in 2021 23rd International Conference on Control Systems and Computer Science (CSCS) (01-05-2021)“…The use of computational systems for enhancing collaborative learning is widely spread. While interest in the application of Computer-Supported Collaborative…”
Get full text
Conference Proceeding -
10
What are the Latest Cybersecurity Trends? A Case Study Grounded in Language Models
Published in 2021 23rd International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC) (01-12-2021)“…The year 2020 marked an important moment when the COVID-19 pandemic promoted Internet as a necessity even more than before, especially for school activities…”
Get full text
Conference Proceeding -
11
Early Detection of Vulnerabilities from News Websites using Machine Learning Models
Published in 2020 19th RoEduNet Conference: Networking in Education and Research (RoEduNet) (11-12-2020)“…The drawbacks of traditional methods of cybernetic vulnerability detection relate to the required time to identify new threats, to register them in the Common…”
Get full text
Conference Proceeding -
12
Direction of Arrival Estimation System Using Two Separate Receivers
Published in 2019 18th RoEduNet Conference: Networking in Education and Research (RoEduNet) (01-10-2019)“…Direction of arrival refers to finding the angle at which an incoming signal impinges on a receiver. The purpose of this paper is the implementation of a radio…”
Get full text
Conference Proceeding -
13
Security News Aggregator
Published in 2019 18th RoEduNet Conference: Networking in Education and Research (RoEduNet) (01-10-2019)“…The total cost of cyber-attacks reached in 2018 at a global level the total sum of one trillion dollars, 95% of those attacks being due to human errors…”
Get full text
Conference Proceeding -
14
CODA footprint continuous security management platform
Published in 2016 15th RoEduNet Conference: Networking in Education and Research (01-09-2016)“…World wide data infrastructure has increased in dimension and complexity due to consolidation, centralization and virtualization trends during the last 10…”
Get full text
Conference Proceeding -
15
Why IoT security is failing. The Need of a Test Driven Security Approach
Published in 2018 17th RoEduNet Conference: Networking in Education and Research (RoEduNet) (01-09-2018)“…Internet of Things has evolved very quickly in recent years, being used by more and more people in many industries such as medical, automotive, energy, etc…”
Get full text
Conference Proceeding