Search Results - "Potorac, Alin Dan"

  • Showing 1 - 14 results of 14
Refine Results
  1. 1
  2. 2

    Research on Security Weakness Using Penetration Testing in a Distributed Firewall by Tudosi, Andrei-Daniel, Graur, Adrian, Balan, Doru Gabriel, Potorac, Alin Dan

    Published in Sensors (Basel, Switzerland) (01-03-2023)
    “…The growing number of cyber-crimes is affecting all industries worldwide, as there is no business or industry that has maximum protection in this domain. This…”
    Get full text
    Journal Article
  3. 3

    Increasing Vehicular Visible Light Communications Range Based on LED Current Overdriving: Experimental Demonstration in Outdoor Conditions by Beguni, Catalin, Cailean, Alin-Mihai, Avatamanitei, Sebastian-Andrei, Zadobrischi, Eduard, Potorac, Alin-Dan

    “…Wireless communication sensors are on the way of becoming the new normal on future intelligent and semiautonomous vehicles. In this context, this paper…”
    Get full text
    Conference Proceeding
  4. 4

    An Email Classification Framework for Phishing Detection in Virtualized Network Environments by Tudosi, Andrei-Daniel, Graur, Adrian, Balan, Doru Gabriel, Potorac, Alin Dan

    “…Phishing attacks pose a significant threat to network security, and effective detection and mitigation techniques are crucial to safeguarding sensitive…”
    Get full text
    Conference Proceeding
  5. 5

    Design and Implementation of a Distributed Firewall Management System for Improved Security by Tudosi, Andrei-Daniel, Graur, Adrian, Balan, Doru Gabriel, Potorac, Alin Dan

    “…Network security is the practice of protecting computer networks and devices from unauthorized access, attacks, and threats. These threats can come from a…”
    Get full text
    Conference Proceeding
  6. 6

    Efficiency Consideration for Data Packets Encryption within Wireless VPN Tunneling for Video Streaming by Simion, Daniel, Ursuleanu, Mihai Florentin, Graur, Adrian, Potorac, Alin Dan, Lavric, Alexandru

    “…With the help of the Internet today we can communicate with anyone from anyplace to access all types of data with a high level of QoS. This mobility is…”
    Get full text
    Journal Article
  7. 7

    Distributed Firewall Traffic Filtering and Intrusion Detection Using Snort on pfSense Firewalls with Random Forest Classification by Tudosi, Andrei-Daniel, Graur, Adrian, Balan, Doru Gabriel, Dan Potorac, Alin, Tarabuta, Radu

    “…In today's interconnected world, network security is of utmost importance for individuals, corporations, and governments. Traditional security measures are…”
    Get full text
    Conference Proceeding
  8. 8

    Design and Implementation of an Automated Dynamic Rule System for Distributed Firewalls by TUDOSI, A.-D., GRAUR, A., BALAN, D. G., POTORAC, A. D., TARABUTA, R.-C.

    “…Zero-day vulnerabilities are undisclosed security flaws exploited by attackers to gain unauthorized access to vulnerable systems. Firewalls and antivirus…”
    Get full text
    Journal Article
  9. 9

    Secure network architecture based on distributed firewalls by Tudosi, Andrei-Daniel, Balan, Doru Gabriel, Potorac, Alin Dan

    “…Firewalls are essential for networking, because they are security devices designed to help protect an infrastructure from unwanted traffic, malicious attacks…”
    Get full text
    Conference Proceeding
  10. 10

    New Snort rule for detection and prevention of SMTP e-mail bomb attacks by Tudosi, Andrei-Daniel, Balan, Doru Gabriel, Dan Potorac, Alin

    “…Cyberattacks on networks are launched in every moment nowadays. Due to the advancement of digitalization and technology, these types of attacks are present in…”
    Get full text
    Conference Proceeding
  11. 11

    Network Congestion Solution for FTP Services Based on Distributed Firewall and Snort by Tudosi, Andrei-Daniel, Graur, Adrian, Balan, Doru Gabriel, Dan Potorac, Alin

    “…The exploit of network traffic has become common due to the increased flow of web traffic from services like Hypertext Transfer Protocol (HTTP), File Transfer…”
    Get full text
    Conference Proceeding
  12. 12

    An evaluation of an ultra-high frequency electromagnetic fields energy and recovery solutions by Chirap, Aurel, Coca, Eugen, Potorac, Dan Alin

    “…The unprecedented development of wireless communications has led to a steady increase in the number of electromagnetic field generators. Thus, the environment…”
    Get full text
    Conference Proceeding
  13. 13

    A study on light energy harvesting from indoor environment: The autonomous sensor nodes by Chirap, Aurel, Popa, Valentin, Coca, Eugen, Potorac, Dan Alin

    “…Micro-level energy sources from the ambient environment can be a viable alternative to increase the life of the sensor nodes from a WSN network. Harvesting…”
    Get full text
    Conference Proceeding
  14. 14

    Linux HTB queuing discipline implementations by Balan, D.G., Potorac, D.A.

    “…In computer networks the traffic control is an essential management issue and a permanent challenge for network engineers. The paper is evaluating the main QoS…”
    Get full text
    Conference Proceeding