Zobrazeno 1 - 10
of 37
pro vyhledávání: '"Adriana-Meda UDROIU"'
Publikováno v:
Revista Română de Informatică și Automatică, Vol 33, Iss 1, Pp 81-92 (2023)
This paper presents a scientific approach regarding the existing technologies and methodologies for establishing the reputation of an Internet domain, as well as some considerations related to the introduction of artificial intelligence techniques fo
Externí odkaz:
https://doaj.org/article/da00076ae40c407d83a84402b512c349
Autor:
Adriana-Meda UDROIU
Publikováno v:
Revista Română de Informatică și Automatică, Vol 30, Iss 1, Pp 101-110 (2020)
Under the complex conditions of the current operational environment, the public institutions face actional difficulties caused by information intensification, accelerating work processes, limiting resources and reducing response times. A solution f
Externí odkaz:
https://doaj.org/article/053ad1369145402b8ec6d279d68c5d8f
Publikováno v:
Revista Română de Informatică și Automatică. 33:81-92
Publikováno v:
Revista Română de Informatică și Automatică, Vol 28, Iss 4, Pp 7-12 (2018)
Cyber attacks have developed and created damage in a wide range of areas. The damage to an attack can lead to costs of tens of millions of dollars or may lead to the complete dissolution of an industry. The problem is that the impact is increasing,
Externí odkaz:
https://doaj.org/article/30e9079fc826482c9e295c96ac046c00
Publikováno v:
Studies in Informatics and Control. 31:25-35
Autor:
Ionuț Sandu, Adriana-Meda Udroiu
Publikováno v:
STRATEGIES XXI - Command and Staff College. 17:293-297
When the COVID-19 epidemic hit Europe at the end of February 2020, most countries enforced a lock down period. In terms of public services, that means that citizens could rely only on digital services provided by the Government or local authorities.
Autor:
Adriana-Meda Udroiu
Publikováno v:
STRATEGIES XXI - Command and Staff College. 17:272-278
The concern for protecting personal data has been raised many years ago and has been kept on sight ever since. People have to trust their devices and the applications they use so smartphone company survive on the market. Apple treats the security sid
Publikováno v:
STRATEGIES XXI - Command and Staff College. 17:287-292
We introduce the term usable security to refer to security systems, models, mechanisms and applications that have as the main goal usability. Secure systems cannot exist without secure authentication methods. Thus we outline biometric authentication
Publikováno v:
2022 14th International Conference on Electronics, Computers and Artificial Intelligence (ECAI).
Publikováno v:
2022 14th International Conference on Electronics, Computers and Artificial Intelligence (ECAI).