• Home
  • Alina Madalina Popescu
Alina Madalina Popescu

Alina Madalina Popescu

About

9
Publications
2,589
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
72
Citations

Publications

Publications (9)
Article
Full-text available
In the COVID-19 and post-pandemic business environment, leveraging robust Internet of Things (IoT) security risk management strategies becomes of particular importance to IoT adopters. Thus, given that no research study was found to exclusively focus on the current state of IoT security risk management strategies in organizations, this article aims...
Article
Full-text available
Nowadays, Internet of Things (IoT) adoptions are burgeoning and deemed the lynchpin towards achieving ubiquitous connectivity. In this context, defining and leveraging robust IoT security risk management strategies are paramount for secure IoT adoptions. Thus, this study aims to support IoT adopters from any sector to formulate or reframe their IoT...
Chapter
Organizations are faced with a clear need for increasing the maturity of their cybersecurity capabilities to keep pace with the ever-evolving cyber threats and accelerated institutional digitalization driven by financial reward and competitive edge. In this context, organizations acknowledge the importance of strengthening their cybersecurity progr...
Conference Paper
Organizations are operating in a risky business environment which is subject to an ever-evolving cyber threat landscape. In order to effectively tackle cyber threats and de-risk their cybersecurity postures, organizations need to form a thorough understanding of their cyber threat landscape through pragmatic cybersecurity risk assessments. In this...
Conference Paper
Organizations are striving to achieving compliance with the stringent legal cybersecurity requirements to preventing the sanctions and costly lawsuits following law infringements. In a nutshell, the aim of this paper is to provide a critical evaluation of generally applicable cybersecurity-related legislation pertaining to two areas of statute (i.e...
Article
Full-text available
The widespread adoption of traditional heterogeneous systems has substantially improved the computing power available and, in the meantime, raised optimisation issues related to the processing of task streams across both CPU and GPU cores in heterogeneous systems. Similar to the heterogeneous improvement gained in traditional systems, cloud computi...
Conference Paper
Full-text available
Parallel scientific workloads typically entail highly-customised software environments, involving complex data structures, specialised systems software, and even distinct hardware, where virtualisation is not necessarily supported by third-party providers. Considering the expansion of cloud computing in different domains and the development of diff...
Conference Paper
Full-text available
In this paper we investigate the deployment of FastFlow applications on multi-core virtual platforms. The overhead introduced by the virtual environment has been measured using a well-known application benchmark both in the sequential and in the FastFlow parallel setting. The overhead introduced for both the sequential and the parallel executions o...

Network

Cited By