Search Results - "Grigorescu, Octavian"

  • Showing 1 - 15 results of 15
Refine Results
  1. 1

    Automated Mapping of Common Vulnerabilities and Exposures to MITRE ATT&CK Tactics by Branescu, Ioana, Grigorescu, Octavian, Dascalu, Mihai

    Published in Information (Basel) (01-04-2024)
    “…Effectively understanding and categorizing vulnerabilities is vital in the ever-evolving cybersecurity landscape, since only one exposure can have a…”
    Get full text
    Journal Article
  2. 2

    Automated Mapping of Common Vulnerabilities and Exposures to MITRE ATT CK Tactics by Ioana Branescu, Octavian Grigorescu, Mihai Dascalu

    Published in Information (Basel) (01-04-2024)
    “…Effectively understanding and categorizing vulnerabilities is vital in the ever-evolving cybersecurity landscape, since only one exposure can have a…”
    Get full text
    Journal Article
  3. 3

    CVE2ATT&CK: BERT-Based Mapping of CVEs to MITRE ATT&CK Techniques by Grigorescu, Octavian, Nica, Andreea, Dascalu, Mihai, Rughinis, Razvan

    Published in Algorithms (01-09-2022)
    “…Since cyber-attacks are ever-increasing in number, intensity, and variety, a strong need for a global, standardized cyber-security knowledge database has…”
    Get full text
    Journal Article
  4. 4

    CVE2ATT CK: BERT-Based Mapping of CVEs to MITRE ATT CK Techniques by Octavian Grigorescu, Andreea Nica, Mihai Dascalu, Razvan Rughinis

    Published in Algorithms (01-08-2022)
    “…Since cyber-attacks are ever-increasing in number, intensity, and variety, a strong need for a global, standardized cyber-security knowledge database has…”
    Get full text
    Journal Article
  5. 5

    Probability and Attack Graph models in Contextual Risk Scoring System by Grigorescu, Octavian, Minea, Alexandra, Dumitru, Tiberiu, Rughinis, Razvan

    “…The interest of attackers is expanding in response to the on-growing enthusiasm for rapid development, so seeking ways to quantify and manage the risks has…”
    Get full text
    Conference Proceeding
  6. 6

    Severity Prediction of Software Vulnerabilities based on their Text Description by Babalau, Ion, Corlatescu, Dragos, Grigorescu, Octavian, Sandescu, Cristian, Dascalu, Mihai

    “…Software vulnerabilities represent a real challenge nowadays, often resulting in disruption of vital systems and data loss. Due to the multitude of software…”
    Get full text
    Conference Proceeding
  7. 7

    Web Application Honeypot Published in the Wild by Grigorescu, Octavian, Sandescu, Cristian, Caba, Alexandru

    “…The goal of this project is to create an intelligent system that will be installed under a cybernetic infrastructure, with the purpose of detecting…”
    Get full text
    Conference Proceeding
  8. 8

    Analyzing Risk Evaluation Frameworks and Risk Assessment Methods by Radu, Raluca, Sandescu, Cristian, Grigorescu, Octavian, Rughinis, Razvan

    “…Over the recent years, cyber insurance has become increasingly important, as our society has relied more and more on the cyber domain for almost all aspects of…”
    Get full text
    Conference Proceeding
  9. 9

    Yggdrasil - Early Detection of Cybernetic Vulnerabilities from Twitter by Iorga, Denis, Corlatescu, Dragos-Georgian, Grigorescu, Octavian, Sandescu, Cristian, Dascalu, Mihai, Rughinis, Razvan

    “…The use of computational systems for enhancing collaborative learning is widely spread. While interest in the application of Computer-Supported Collaborative…”
    Get full text
    Conference Proceeding
  10. 10

    What are the Latest Cybersecurity Trends? A Case Study Grounded in Language Models by Vladescu, Cristiana, Dinisor, Maria-Alexandra, Grigorescu, Octavian, Corlatescu, Dragos, Sandescu, Cristian, Dascalu, Mihai

    “…The year 2020 marked an important moment when the COVID-19 pandemic promoted Internet as a necessity even more than before, especially for school activities…”
    Get full text
    Conference Proceeding
  11. 11

    Early Detection of Vulnerabilities from News Websites using Machine Learning Models by Iorga, Denis, Corlatescu, Dragos, Grigorescu, Octavian, Sandescu, Cristian, Dascalu, Mihai, Rughinis, Razvan

    “…The drawbacks of traditional methods of cybernetic vulnerability detection relate to the required time to identify new threats, to register them in the Common…”
    Get full text
    Conference Proceeding
  12. 12

    Direction of Arrival Estimation System Using Two Separate Receivers by Dumitrache, Daniela Andreea, Grigorescu, Octavian, Rughinis, Razvan Victor

    “…Direction of arrival refers to finding the angle at which an incoming signal impinges on a receiver. The purpose of this paper is the implementation of a radio…”
    Get full text
    Conference Proceeding
  13. 13

    Security News Aggregator by Radu, Raluca Elena, Grigorescu, Octavian, Rughinis, Razvan Victor

    “…The total cost of cyber-attacks reached in 2018 at a global level the total sum of one trillion dollars, 95% of those attacks being due to human errors…”
    Get full text
    Conference Proceeding
  14. 14

    CODA footprint continuous security management platform by Grigorescu, Octavian, Sandescu, Cristian, Rughinis, Razvan

    “…World wide data infrastructure has increased in dimension and complexity due to consolidation, centralization and virtualization trends during the last 10…”
    Get full text
    Conference Proceeding
  15. 15

    Why IoT security is failing. The Need of a Test Driven Security Approach by Sandescu, Cristian, Grigorescu, Octavian, Rughinis, Razvan, Deaconescu, Razvan, Calin, Mihnea

    “…Internet of Things has evolved very quickly in recent years, being used by more and more people in many industries such as medical, automotive, energy, etc…”
    Get full text
    Conference Proceeding