Web
Education
PERSONAL INFORMATION Cristian Valeriu TOMA
Curriculum Vitae Cristian Valeriu TOMA - , – – – –,
Cristian Valeriu Toma - Google Scholar Citations
Journal of Mobile, Embedded and Distributed Systems 6 (4), 135-146, 2014. 7: 2014: Using genetic algorithms in software optimization. I Ivan, C Boja, M Vochin, I Nitescu, C Toma, M Popa. Proc. Of the 6th WSEAS Int. Conference on Telecommunications and Informatics ...
Issues in WiFi Networks - 123seminarsonly.com
Journal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN 2067 – 4074 Key Page 7 If the device sends a encrypted packet over WiFi using WEP in IEEE 802.11 secure architecture then the user insert a symmetric encryption key (the same as the one from
Page:Approaches on Internet of Things Solutions.pdf/2 ...
Figure 1. Internet of Things components. A Smart Object contains IoT data and information, also metadata and software agent code resources, such as application software event handler. Samples of Smart Objects are embedded devices such as Rasberry Pi, Arduino, BeagleBone/Ninja Blocks. The data model for broad interoperability is represented by the Smart Object API.
File:Approaches on Internet of Things Solutions.pdf ...
This file is licensed under the Creative Commons Attribution 3.0 Unported license.: You are free: to share – to copy, distribute and transmit the work; to remix – to adapt the work; Under the following conditions: attribution – You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way ...
Single Page Web Applications Security
Journal of Mobile, Embedded and Distributed Systems, vol. VII, no. 2, 2015 ISSN 2067 – 4074 57 Social engineering is another way to gather sensitive information from users but it relies entirely on user weaknesses. One important principle in keeping sensitive data secure is avoid keeping it. Sensitive data should be kept only if it is
Database Versioning 2.0, a Transparent SQL Approach Used ...
References [1] Cosmin Cioranu, Marius Cioca, Database Versioning, a Transparent SQL Approach, Journal of Mobile, Embedded and Distributed Systems; vol. V, no. 1, 2013, ISSN 2067-4074. [2] Filip F.G., A decision-making perspective for designing and building information systems, International Journal of Computers Communications and Control, 7(2 ...
[1201.0397] Hiding Malicious Content in PDF Documents
Abstract: This paper is a proof-of-concept demonstration for a specific digital signatures vulnerability that shows the ineffectiveness of the WYSIWYS (What You See Is What You Sign) concept. The algorithm is fairly simple: the attacker generates a polymorphic file that has two different types of content (text, as a PDF document for example, and image: TIFF - two of the most widely used file ...
Methods and Techniques of Quality Management for ICT Audit ...
Journal of Mobile, Embedded and Distributed Systems, vol. III, no. 3, 2011 ISSN 2067 – 4074 103 External quality – aims to meet customer expectations for a product or service; Internal quality – corresponds to the improvement of the organization’s internal operations; its beneficiaries are management and employees.
Applied Computer Science and Cyber Security Team - www.acs ...
Assoc. Prof. Catalin BOJA Ph.D. is a member of Department of Economic Informatics and Cybernetics / Computer Science Department, Faculty of C.S.I.E/C.S.E.I, @ The Bucharest University of Economic Studies, Romania.Starting with October 2011, he is the Head of the D.I.C.E / D.E.I.C, and in April 2008 he has received, from the Academy of Economic Studies of Bucharest, his Ph.D. diploma in the ...
|
iSEEK provides users with a Favorites library that allows them easy access to their most-used websites from any computer. If you have an iSEEK account, the content you just selected can be added to your Favorites page to be revisited any time you want.
If you would like to join the iSEEK community, click the "Register" button below to create your free iSEEK account. The resource you have selected will be added to your new Favorites library after you sign in for the first time.
If you already have an iSEEK account, click the button below to sign in and add the resource to your Favorites library.