Browsing by Author "Vevera, Adrian Victor"
Now showing 1 - 18 of 18
Results Per Page
- ItemA Critical Infrastructure protection Perspective on Counter-Terrorism în South-Eastern Europe(Publishing House Ministry of Defence Republic of Slovenia, 2020) Georgescu, Alexandru; Vevera, Adrian Victor; Cîrnu, Carmen Elena
- ItemA multi-criteria weighting approach for Quality of Life evaluation(Elsevier, 2019) Rădulescu, Constanţa Zoie; Rădulescu, Marius; Alexandru, Adriana; Ianculescu, Marilena; Vevera, Adrian VictorEvaluation and analysis in health care is a complex task that may involve handling uncertainties and trade-offs between multiple, often conflicting criteria. In the present paper, a multi-criteria weighting approach is proposed for evaluation and analysis of Quality of Life (QoL) criteria. Based on the evaluations of a group of experts and using a Rough Analytical Hierarchy Process (RAHP) weighting method, the QoL criteria weights are determined. The expert evaluation’s uncertainty is modeled with the rough sets theory. The proposed approach is validated by a case study that performs an analysis of WHOQOL-BREF questionnaire criteria. In the case study, weights are calculated for physical health, psychological, social relations and environment criteria. A comparison between the RAHP weights obtained and the AHP weights is achieved. The result of the analysis shows that the order of importance of criteria from the most important to the least important is the following: physical health, psychological, social relations and environment.
- PublicationA review of machine learning techniques for the cybersecurity of critical infrastructures(2020) Cîrnu, Carmen Elena; Florian, Vladimir; Vevera, Adrian Victor; Ciupercă, Ella Magdalena; Stanciu, Alexandru; SECURITATE CIBERNETICA SI INFRASTRUCTURI CRITICEAn essential component of the National security consists of the protection of its critical infrastructures (CIs), whether they are physical or virtual, as any disruption of their services could have a serious impact on economic well-being, public health or safety, or any combination of these. Any shutdown or delay may determine financial losses and major risks to people and the environment. All modern CIs are controlled by Industrial Control Systems (ICS) being dependent on their correct and continuous undisturbed functioning. Modern ICSs are inherently much less secure and exposed to the majority of cyber-attacks that are becoming more advanced and sophisticated. Consequently, efficient tools for the protection of hardware and software components of ICSs are required. One such class consists of intrusion prevention and detection systems (IPDS). Contemporary IPDSs use machine learning algorithms to detect threats manifested as anomalous behavior of a particular system. To provide robust detection systems with sufficient layers of protection, these must be combined with other methods and extensively tested with good datasets and using appropriate testbeds. Recent research suggests that conventional intrusion detection approaches are unable to cope with the complexity and ever-changing nature of industrial intrusion attacks. Moreover, deep learning methods are achieving state-of-the-art results across a range of difficult problem domains. The objective of our paper is to identify and discuss machine learning-based intrusion detection and protection methods and their implementation in industrial control intrusion detection systems, able to contribute to ensuring national security.
- ItemCritical Space Infrastructures – a comparison to terrestrial CI(IOS Press, 2019) Georgescu, Alexandru; Vevera, Adrian Victor; Cîrnu, Carmen Elena
- ItemCritical Space Infrastructures – a comparison to terrestrial CI(IOS Press, 2020) Georgescu, Alexandru; Vevera, Adrian Victor; Cîrnu, Carmen ElenaSpace systems have become key enablers for a wide variety of applications on Earth through evolving capabilities in navigation, positioning, timing, data gathering and communications. These capabilities have become, in certain instances, critical to the functioning of critical infrastructure systems. These are interconnected sociotechnical systems which provide critical goods and services and whose destruction or disruption would cause significant loss of human life, material damage and other effects. The paper argues that space systems can provide a new category of critical infrastructures and highlights the differences between terrestrial and spaceborne systems from the perspective of the critical infrastructure protection framework.
- ItemCultural Lens of Critical Infrastructure Protection(2019) Ciupercă, Ella Magdalena; Vevera, Adrian VictorThe modern diversification of nowadays risks and threats has led to an expansion of the significance of the concept of national security which is including today elements from the economic, social, technological fields. The importance of critical infrastructure issues was originally discussed by the United States that included it among national security issues as early as the ‘90s. This good practice was soon generalized worldwide, with each state being concerned about developing its own strategy to protect critical national infrastructures and about participating in the optimal operation of transnational ones. However, the mere reading of the legislative texts devoted to critical infrastructures reveals some significant differences between states in the way of approaching this issue. In this study, we propose to conduct a comparative analysis of the critical infrastructure protection strategies of the United States, Germany, Australia, Japan and Romania, having as a filter the model of cultural dimensions proposed by Geert Hofstede (1981). From this perspective, we will try to highlight how the dimensions of cultural software has shaped the way this issue is addressed. We will also analyze the extent to which these differences are elements that facilitate or endanger the protection of critical infrastructure at national and international level.
- ItemCyber as a Transformative Element in the Critical Infrastructure Protection Framework(ICI, 2020-06-30) Georgescu, Alexandru; Vevera, Adrian Victor; Cîrnu, Carmen ElenaCritical Infrastructure Protection represents a comprehensive conceptual framework for the management of risks, vulnerabilities and threats arising from interconnected socio-technical systems termed infrastructures. Their criticality stems from the impact which disruption or destruction would have on a society or a region, whether through human and material losses, or of prestige and trust. Cyber has become an important factor in CIP, a crosscutting issue whose ascent has resulted in significant changes. This article argues that the penetration of cyber into almost every facet of human activity has resulted in fundamental structural changes, describes those changes in a systematized manner and theorizes what may happen to security governance under the new status quo.
- ItemCyberbullying(ICI Publishing House, 2019-06-30) Vevera, Adrian Victor; Albescu, Alexandra RalucaToday's children are the first generation to use the technology to harass, and today's parents are the first to need to learn how to address this problem with their children. The Internet has facilitated the easiness with which young people, today, become aggressors or victims. Most of the time, young people are unaware of the scale and purpose of the public that access the Internet and, therefore, the potential dangers of publishing private information online. In addition, the attitude toward protecting privacy is largely influenced by personal preferences - which can be inspired by parents. An cyberbully has a lot in common with his reallife counterparts, both exploiting power imbalances to harass his victim. The ability to be anonymous in the virtual environment encourages aggressors and allows behaviors that, in real life, would not be put into practice.
- ItemDigital Transformation and Social Innovation Versus the Change of the Inner World(INTED, 2020) Ciupercă, Ella Magdalena; Vevera, Adrian VictorGiven the urgent need for innovation in an era when the pace of technological change is proving to be faster than people's ability to take it over and to internalize change, we propose to analyze in this article a series of specific human psycho-sociological constants that are in fact variables of the digital transformation of the society. While the objective is the modernization of society throughout all the sectors of activity, surely the vector of change is education. Clearly, worldwide the field of education has failed to adapt to the needs of the labor market and to the demands of a sustainable economy. Various analyzes try to decipher the reasons why the situation hasn't improved significantly yet. Although there are several disparate examples of successful educational approaches, such as South Korea, most states are incapable of transforming a deeply inertial pedagogical system, for reasons having macro-social, micro-social and individual sources. Based on the study of literature, we will identify the psycho-sociological factors that we consider to be responsible for accelerating / decelerating digital transformations, social innovation and attitudinal change of people. Beyond understanding the interconnections between variables such as risk taking, conservatism, flexibility and so on and acceptance of digital transformation, the entire approach of our analysis will be confined to how education can benefit from this type of understanding. The resulting conclusions will be implemented in designing a curriculum for long-life learning through which cyber security competencies of operators can be optimized.
- ItemMobile investigations – capture, analyze, and store sensitive data(ICI Publishing House, 2019-03-31) Vevera, Adrian Victor; Onofrei-Riza, Deniss BogdanToday's smart mobile device stores user contacts, social networking data, instant messaging, runs text messaging, retains information about phone calls, the text sent and received in messages, contains attachment emails, navigation logs, and geolocation data, stores images and videos made with your own camera, "holds" cloud passwords, services, forums, online portals, and shopping sites plus many other data stored in memory. Such a smart device (nowadays omnipresent) becomes (as exemplified above) a complex storage of sensitive data. Collecting these data (transformed into digital evidence) is particularly important in situations where the phone (or its owner) may be the subject (s) of criminal, civil, accidental (informative) or corporate investigations. Extracting this information, as well as „intelligently cataloguing” data to turn it into solid and complex evidence, is the ultimate result of applying advanced acquisition and analysis algorithms. With different operating systems and technological expansion, mobile forensics evolved at the same pace, developing new methods practical collection of evidence contained by mobile devices.
- ItemNational Security and Critical Infrastructure Protection(2019) Alexandru, Adriana; Vevera, Adrian Victor; Ciupercă, Ella MagdalenaThe link between national security and the protection of critical infrastructure is vital to the progress of any society and its proper social functioning. The term critical infrastructure was developed by the United States in the 1990s and it has evolved in time; nowadays, most of the current definitions include the security dimension in their content. Along with its many benefits, the technological advancement has brought with it the diversification of threats that could lead to the malfunctioning of critical infrastructures. The new weapons of the 21st century and the new asymmetric threats constitute real dangers to the good functioning of every critical infrastructure. Once they may be interrupted, the normal functioning of the whole society would be endangered because of the domino effects it causes. In this article we will look at how the link between critical infrastructure and national security is reflected in national regulations and crisis scenarios, highlighting the main strengths and the existing legislative gaps along with discussing their applicability.
- ItemNI4OS-Europe project - support for the National Open Science Cloud Initiative(2020-06-30) Vevera, Adrian Victor; Barbu, Dragoș-Cătălin; Neagu, Gabriel; Ciupercă, Ella MagdalenaThe mission and vision of the NI4OS-Europe project lies in making a key contribution to the European Open Science Cloud (EOSC) service portfolio, in the engagement in EOSC governance and in ensuring inclusion at European level. To highlight the importance and timeliness of these contributions, the paper begins with a presentation of the project context by referring to relevant documents adopted at European level for the thematic areas of Open Science / Open Data and EOSC. The brief presentation of the concepts specific of these areas, and of some structures dedicated to their implementation facilitates the detailing of the main lines of action of the project which are focused on the pre-production infrastructure, services and repositories, and the involvement of user communities. The application domains related to generic and thematic services, as well as to data repositories are also highlighted. The end of the paper is dedicated to the approach of the project on the establishment of national OSC initiatives and to the presentation of the preliminary results obtained in this respect.
- ItemOptimization of the Critical Infrastructure Sector - Food Safety and Food Security Through Blockchain(ICI, 2020-06-30) Ciupercă, Ella Magdalena; Crăciun, Ioan; Vevera, Adrian VictorThe study of critical infrastructures in Romania is necessary to surpass the generalist approach, which has been preferred so far in the few specialized studies that have been carried out. Of course, a general view on the sectors, subsectors or criteria that qualify certain entities as critical infrastructure was extremely necessary in order to identify the effects of affecting the activities of these entities or to set up plans for crisis management or clear procedures for their routine operation. But for a country in order to become competitive and to succeed beyond the current level, it is necessary to approach the critical infrastructure subsectors in order to identify and propose new ways to optimize them, especially by incorporating the latest technologies. In this paper we aim to address the need to optimize the traceability of food products using blockchain technology, respectively a chain of blocks that stores information, which once received a timestamp can no longer be modified.
- ItemSecurity and privacy risks for remote healthcare monitoring systems(IEEE, 2020) Ianculescu, Marilena; Coardoș, Dora; Bica, Ovidiu; Vevera, Adrian VictorRemote healthcare monitoring systems have increasingly become a reliable solution for delivering personalized, less intrusive and patient-friendly healthcare services. Internet of Things technology is an important driver for sustaining a large range of the capabilities of these systems, including the access to a huge amount of various health data. As this data are considered highly sensitive due to the personal feature, security and privacy threats and attacks are very likely to target the vulnerabilities of the IoT devices, network connectivity, data storage etc. This presents a brief overview of the vulnerabilities of the above-mentioned systems and a proposed solution for addressing them from the designing stage. For this purpose, a synthesis of security and privacy vulnerabilities, basic requirements and countermeasures associated distinctively with each level of the IoT-based architecture of RO-SmartAgeing system is put forward.
- ItemSocial variables of cyber security educational programmes(2019) Ciupercă, Ella Magdalena; Vevera, Adrian Victor; Cîrnu, Carmen ElenaAs the need for cyber security is growing exponentially along with the development of new technologies, people's resistance to change determine a gap between people's real digital competences and the ideal profile that would allow their optimal functioning in the emerging society. In this article we study how people' perception of technology can be influenced in an era where the use of Internet of Things, social networks, big data is important but the protection of personal data is a must. While Romania introduced coding and IT&C knowledge in gymnasium curricula, the majority of population do not have the chance to attend such courses. The few existent courses in this direction are not enough customized for different social category. Therefore, any attempt to influence the way in which culture is formed must take into account the matching between all the knowledge, opinions, values, norms, signs and symbols that are conveyed in a society with the development stage of that society and with the system of values that its members have internalized. Therefore, comparing traditional teaching and e-learning we will propose a specific blended cyber security educational model for building a proper cyber security culture among Romanian population having in mind the complexity of the factors that influence the results of an effective cyber security strategy. Using such a model it will be possible to transmit basic knowledge to the average citizen and to determine him to adopt a behavior that will allow him the optimal functioning in present days’ society.
- ItemThe Dimensions of CYBER WARFARE in the Sino-Russian Space(ICI Publishing House, 2019-12-20) Vevera, Adrian Victor; Ciupercă, Ella MagdalenaCyber warfare is an indisputable reality of our day. In this paper we have chosen to present some distinctive elements of the Chinese and Russian strategy, as essential competitors of the European Union. For this purpose, we studied the main characteristics of the strategy and hostile operations attributed to China and Russia. Despite the official statements where they define themselves as victims of cyber operations, Russia and China have defined clear ways of cyber intervention on the enemy / competing states.
- ItemThe Proliferation of Cyber Weapons -Theory and Mitigation(ICI Publishing House, 2019-12-20) Georgescu, Alexandru; Vevera, Adrian Victor; Cîrnu, Carmen ElenaCyberspace has been designated by NATO as a new operational domain, but many countries, such as the US, preceded it. Cyber weaponry differs from kinetic weaponry and generate effects through non-kinetic means. Similar to the divide between nuclear weapons and conventional weapons, the availability and potential use of cyber weapons creates new dynamics, constraints and considerations in relations between states. Their usefulness in covert and overt warfare must be balanced with the insecurity they generate in the absence of rules and norms governing their use, which ultimately leads to collective insecurity. The article highlights key considerations on cyber weaponry and discusses the feasibility of non-proliferation efforts.
- ItemThe use of Rasberry Pi devices in the modern technical education system(Editura Universitara, 2020) Ciupercă, Ella Magdalena; Vevera, Adrian Victor; Cîrnu, Carmen Elena; Apostol, MihaiIn a time when technology is advancing with extreme rapidity, perhaps the greatest challenge to be answered by new generations is the development of the skills that allow them to function in a digitized society. This challenge is addressed on the one hand to the average man, for whom mastering the operation in the IT&C field is a functional necessity, as well as to those passionate about programming and electronics. If it is necessary for the first ones to identify the simplest and friendliest ways by which the new technologies can be implemented, the formation of the second category implies the inclusion in the educational process of the newest technologies and the familiarization with them up to the level at which it can unlock creativity and development. In this paper, we aim to address the issue of Single-Board-Computer (SBC) devices in terms of understanding the educational potential that these devices have, but also how they can be leveraged in learning. In fact, these devices have been developed specifically for educational purposes or to be used as embedded systems. They represent small computers having all components embedded on a single silicon board and having CPU, GPU, memory, input / output and other features required for a functional computer. For this purpose, we will analyze comparatively the content of the curriculum of the most important technical universities in Romania and abroad to identify the extent to which such devices are taken over by the universities, highlighting the advantages and disadvantages of their use. Depending on the results obtained, we will develop a set of measures aimed at optimizing the educational potential of SBC devices, especially Raspberry Pi devices which are the most widespread SBC.