Abstract is missing.
- Architecture for Inspecting Bluetooth Traffic in Software-Defined NetworksRadu Bouaru, Adrian Peculea, Sorin Buzura, Emil Cebuc, Bogdan Iancu, Vasile Dadarlat. 1-7 [doi]
- VXLAN - A practical approach to cloud computing scalabilityClaudiu Traistaru. 1-4 [doi]
- Approaches to teaching embedded developmentRadu Mantu, Florin-Alexandru Stancu, Mihai Chiroiu, Nicolae Tapus. 1-5 [doi]
- Limit order for Decentralized Exchanges on BlockchainRazvan-Andrei Tanase, Costin Carabas, Nicolae Tapus. 1-11 [doi]
- A Conceptual Model for a Cloud-Based Digital Signing ServiceMarius Marian, Adelin Cusman, Ilie Borcosi, Florin Stînga, Corina-Ana Borcosi, Alexandru Toma. 1-5 [doi]
- Smart grid advancements using a HummingBoardGeorge Suciu, Mari-Anais Sachian, Cosmina Stalidi, Robert Florescu, Cristian Gheorghe, Alex-Ionut Jujan. 1-4 [doi]
- Malicious Short URLs Detection TechniqueRazvan Stoleriu, Catalin Negru, Bogdan-Costel Mocanu, Florin Pop. 1-6 [doi]
- Practical Approach to Design and Implement a P2P and E2EE Instant Messaging SystemAdam Godra, Sorin Buzura, Adrian Peculea, Emil Cebuc, Vasile Dadarlat. 1-7 [doi]
- Awareness on Spear Phishing Attacks using Novel TLD names in Research and Academic FieldCristiana Constantinescu. 1-6 [doi]
- Removing individuals from video streams throught facial recognitionEcaterina-Nicoleta Hrib, Lenuta Alboaie. 1-4 [doi]
- Task Scheduling Policies in a Cloud Computing EnvironmentCatalina Mancas, Eugen Dumitrascu, Eugen Ganea, Nicolae Enescu, Gabriel-Catalin Nedianu. 1-5 [doi]
- Assisting students to compose music with deep neural networks and aesthetic measurement feedbackRazvan Paroiu, Stefan Trausan-Matu. 1-5 [doi]
- Low-code solutions integration for digital process automation - application in managementLiviu Ciucan-Rusu, Mihai Timus, Daniel Stefan, Calin-Adrian Comes, Elena Bunduchi, Maria-Alexandra Poptamas. 1-5 [doi]
- Hybrid Quantum-Classical Networks characteristics and optimization for Error Correction and Noise MitigationClaudiu Ionut Popirlan, Gabriel-Cosmin Buzatu. 1-7 [doi]
- Design and Implementation of a Distributed Firewall Management System for Improved SecurityAndrei-Daniel Tudosi, Adrian Graur, Doru Gabriel Balan, Alin Dan Potorac. 1-6 [doi]
- The Significance of Enhancing Data Fairness in Educational Recommender SystemsAlexandra Vultureanu-Albisi, Costin Badica. 1-6 [doi]
- Enterprise Data Collection and Cross-Referencing SystemFlorin B. Manolache, Octavian Rusu. 1-6 [doi]
- Improved Speech Activity Detection Model Using Convolutional Neural NetworksCostin-Alexandru Deonise, Taisia-Maria Coconu, Traian Rebedea, Florin Pop. 1-8 [doi]
- QGP-VPN: QKD enhanced VPN solution for general-purpose encrypted communicationsAlin-Bogdan Popa. 1-6 [doi]
- An Email Classification Framework for Phishing Detection in Virtualized Network EnvironmentsAndrei-Daniel Tudosi, Adrian Graur, Doru Gabriel Balan, Alin Dan Potorac. 1-5 [doi]
- Real-Time Notifier for Blockchain EventsCristian Tanase-Paris, Costin Carabas, Nicolae Tapus. 1-14 [doi]
- Data Acquisition System for Forecasting Applications of Photovoltaic Power ProductionVladimir Voicu, Dorin Petreus, Emil Cebuc, Radu Etz. 1-4 [doi]
- A Case Study on Extending the Use of Cloud-Based Services within two Romanian Higher-Education InstitutionsMarius Marian, Ilie Borcosi, Corina-Ana Borcosi, Adelin Cusman, Alexandru Toma, Dragos Ionica. 1-6 [doi]
- Graphical Programming Environment for Creating Simulation ScenariosEugen Ganea, Lucian Barbulescu, Eugen Dumitrascu, Mircea-Aurelian Badoi. 1-5 [doi]
- Architecture, Design and Implementation of a Modular Solution Prototype for Flood and Fire Risk Mitigation in WetlandsEduard Cristian Popovici, Alexandru Vulpe, Laurentiu Boicescu, George Suciu, Cosmin A. Contu. 1-6 [doi]
- Optimizing large data transfers for the ALICE experiment in Run 3Sergiu Weisz, Costin Grigoras, Alice Florenta Suiu, Latchezar Betev, Mihai Carabas, Nicolae Tapus. 1-8 [doi]
- A Survey on Security Issues in Cloud SystemsDiyar Jamal Hamad, Khirota Gorgees Yalda, Nicolae Tapus, Ibrahim Taner Okumus. 1-8 [doi]
- Investigating User Characteristics and Behaviors on Social Media as Prequel for Fake News DetectionClaudiu Ionut Popirlan, Cristina-Mihaela Tudorache, Irina-Valentina Tudor, Constantin-Cristian Dinu, Mihaela Colhon, Gabriel Stoian, Daniela Danciulescu, Cristina Popirlan. 1-5 [doi]
- Electronic steering wheel development for a Formula Student race carJan-Alexandru Vaduva, Angelo-Ionel Zavalas, Razvan Rughinis. 1-6 [doi]
- Improving Network Security Using DD-WRT as a Solution for SOHO RoutersTimofte Edi Marian, Balan Doru. 1-5 [doi]
- Overcoming Challenges in Migrating Modular Monolith from On-Premises to AWS CloudFlorin Olariu. 1-6 [doi]
- Automated Infrastructure ProvisioningMihai Carabas, Darius Mihai, Andrei Brebene. 1-5 [doi]
- Automated script-based engine for Apache Kafka messaging systemLucian-Florentin Barbulescu, Eugen Ganea, Nicolae Enescu. 1-4 [doi]
- A Study of GPU Memory VulnerabilitiesCristina Cismaru, Ruxandra Chiroiu Trandafir, Emil-Ioan Slusanschi. 1-9 [doi]
- Mobile Application for Real-Time monitoring of an Air Quality StationGabriel-Catalin Nedianu, Nicolae Iulian Enescu, Catalina Mancas. 1-4 [doi]
- Sliding Window Method for Imputing Missing DataMihaela Colhon, Gabriel Stoian, Constantin-Cristian Dinu, Cristina Popirlan, Cristina-Mihaela Tudorache, Irina-Valentina Tudor, Daniela Danciulescu. 1-6 [doi]