Anca D JurcutUniversity College Dublin | UCD · School of Computer Science
Anca D Jurcut
Doctor of Engineering
Assistant Professor,
University College Dublin, Ireland
About
123
Publications
102,756
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,115
Citations
Introduction
Anca D Jurcut currently works at the School of Computer Science, University College Dublin. Anca does research in Computer Communications (Networks), Computer Security and Reliability and Information Systems (Business Informatics). Their current project is 'Indoor living space improvement: Smart Habitat for the Elderly (SHELD-ON)'.
Publications
Publications (123)
Ransomware is a type of malicious software that encrypts a victim’s files and demands payment in exchange for the decryption key. It is a rapidly growing and evolving threat that has caused significant damage and disruption to individuals and organizations around the world. In this paper, we propose a comprehensive ransomware classification approac...
The Internet of Things (IoT) is rapidly growing and is projected to develop in future years. The IoT connects everything from Closed Circuit Television (CCTV) cameras to medical equipment to smart home appliances to smart automobiles and many more gadgets. Connecting these gadgets is revolutionizing our lives today by offering higher efficiency, be...
Privacy protection in online social networks (OSNs) has received a great deal of attention in recent years. One way of circumventing conventional privacy protection is privacy inference based on data that can be easily obtained in OSNs. Previous work on privacy inference has studied the issue mostly from the viewpoint of the attackers and methods t...
The rapid advancement of network architectures, protocols, and tools poses significant challenges to network security, especially due to the use of AI-based tools by cybercriminals. It is crucial to develop a versatile malicious traffic detection system capable of identifying attacks across diverse traffic types. This paper presents an enhanced sys...
Edge computing paradigms were an expedient innovation for elevating the contemporary standards of mobile and Internet networks. As specified in Multi-Access Edge Computing (MEC) standardization, edge computing serviceable infrastructures are running on virtualization technologies to provide dynamic and flexible service instances. Since the inceptio...
The internet of things (IoT) has prepared the way for a highly linked world, in which everything is interconnected, and information exchange has become more easily accessible via the internet, making it feasible for various applications that enrich the quality of human life. Despite such a potential vision, users’ privacy on these IoT devices is a...
Supervisory control and data acquisition (SCADA) attacks have increased due to the digital transformation of many industrial control systems (ICS). Operational technology (OT) operators should use the defense-in-depth concept to secure their operations from cyber attacks and reduce the surface that can be attacked. Layers of security, such as firew...
Ransomware is a critical security concern, and developing applications for ransomware detection is paramount. Machine learning models are helpful in detecting and classifying ransomware. However, the high dimensionality of ransomware datasets divided into various feature groups such as API calls, Directory, and Registry logs has made it difficult f...
Nowadays, networks play a critical role in business,
education, and daily life, allowing people to communicate
via different platforms across long distances. However, such
communication contains many potential dangers and security
vulnerabilities that can compromise the confidentiality, integrity,
and privacy of data. Network attacks, malware, hack...
A mobile ad hoc network (MANET) is an infrastructure-less network where mobile nodes can share information through wireless links without dedicated hardware that handles the network routing. MANETs’ nodes create on-the-fly connections with each other to share information, and they frequently join and leave MANET during run time. Therefore, flexibil...
Driving behavior is an important aspect of maintaining and sustaining safe transport on the roads. It also directly affects fuel consumption, traffic flow, public health, and air pollution along with psychology and personal mental health. For advanced driving assistance systems (ADAS) and autonomous vehicles, predicting driver behavior helps to fac...
Mobile ad hoc networks (MANETs) are now key in today’s new world. They are critically needed in many situations when it is crucial to form a network on the fly while not having the luxury of time or resources to configure devices, build infrastructure, or even have human interventions. Ad hoc networks have many applications. For instance, they can...
The demand for electric vehicles (EVs) is growing rapidly. This requires an ecosystem that meets the user’s needs while preserving security. The rich data obtained from electric vehicle stations are powered by the Internet of Things (IoT) ecosystem. This is achieved through us of electric vehicle charging station management systems (EVCSMSs). Howev...
The market for Electric Vehicles (EVs) has expanded tremendously as seen in the recent Conference of the Parties 27 (COP27) held at Sharm El Sheikh, Egypt in November 2022. This needs the creation of an ecosystem that is user-friendly and secure. Internet-connected Electric Vehicle Charging Stations (EVCSs) provide a rich user experience and add-on...
The rapid development of cyberattacks in the field of the Internet of things (IoT) introduces new security challenges regarding zero-day attacks. Intrusion-detection systems (IDS) are usually trained on specific attacks to protect the IoT application, but the attacks that are yet unknown for IDS (i.e., zero-day attacks) still represent challenges a...
Code-Reuse Attacks (CRAs) are solid mechanisms to bypass advanced software and hardware defenses because they use the software’s own code and they are very hard to be detected without significant overhead. Numerous methods have been proposed to protect against memory-based attacks that result from reusing parts of the attacked binary code. In this...
Skin, the body’s biggest organ and a barrier against heat, light, damage, and infection can be affected by many diseases. However, a correct diagnosis can lead to proper treatment. Skin diseases must be identified early to reduce skin lesion growth and spread. The medical field has a significant dependency on Information Technology and in this era,...
Software Defined Networking (SDN) is an emerging network platform, which facilitates centralised network management. The SDN enables the network operators to manage the overall network consistently and holistically, regardless the complexity of infrastructure devices. The promising features of the SDN enhance network security and facilitate the impl...
Multi-Access Edge Computing (MEC) is a novel edge computing paradigm that enhances the access level capacity of mobile networks by shifting the serviceable Data center infrastructure proximate to the end devices. With this proximate placement and service provisioning, migration of a service from one edge enabled gNodeB (gNB) to another is intrinsic...
Machine Learning (ML) based Intrusion Detection Systems (IDSs) have rapidly overtaken other solutions for securing networks. Robust and varied datasets are required to train the ML models to perform this role. The separation of the control plane from the forwarding plane within Software Defined Networks (SDNs) results in differences in network traf...
The exploitation of internet networks through denial of services (DoS) attacks has experienced a continuous surge over the past few years. Despite the development of advanced intrusion detection and protection systems, network security remains a challenging problem and necessitates the development of efficient and effective defense mechanisms to de...
In finance, machine learning helps the business by improving its abilities and flexibility to prevent risks, errors and to accept such challenges. This research analyses and forecasts the interest rate risk of Pakistan using machine learning models. It took the financial dataset of 10 years Pakistan investment bonds from the State Bank of Pakistan...
Rivers play a major role within ecosystems and society, including for domestic, industrial, and agricultural uses, and in power generation. Forecasting of suspended sediment yield (SSY) is critical for design, management, planning, and disaster prevention in river basin systems. It is difficult to forecast the SSY using conventional methods because...
The Industrial Internet of Things (IIoT) remains an inevitable system in various applications that require data collection and processing in the modern industrial revolution. The IIoTs are responsible for critical data collection and transmission to cloud servers to address life-dependent problems. However, these cyber-physical devices are vulnerab...
There has been an increase in attacks on mobile devices, such as smartphones and tablets, due to their growing popularity. Mobile malware is one of the most dangerous threats, causing both security breaches and financial losses. Mobile malware is likely to continue to evolve and proliferate to carry out a variety of cybercrimes on mobile devices. M...
Ransomware is a strain of malware that disables access to the user’s resources after infiltrating a victim’s system. Ransomware is one of the most dangerous malware organizations face by blocking data access or publishing private data over the internet. The major challenge of any entity is how to decrypt the files encrypted by ransomware. Ransomwar...
InSDN dataset
Elsayed, Mahmoud Said, Nhien-An Le-Khac, and Anca D. Jurcut. "InSDN: A novel SDN intrusion dataset." IEEE Access 8 (2020): 165263-165284.
With the increased proliferation of internet-enabled mobile devices and large internet use, cybercrime incidents have grown exponentially, often leading to huge financial losses. Most cybercrimes are launched through malware attacks, phishing attacks, denial/distributed denial of attacks, looting people's money, stealing credential information for...
The growing popularity of online social networks (OSNs) in recent years has generated a lot of concern on personal privacy. One approach of protecting privacy in OSNs is to intervene in the flow of privacy information, making the study of the dynamics of privacy information propagation necessary for the design of effective privacy protection mechan...
Today, one of the most popular ways organizations use to provide their services, or broadly speaking, interact with their customers, is through web applications. Those applications should be protected and meet all security requirements. Penetration testers need to make sure that the attacker cannot find any weaknesses to destroy, exploit, or disclo...
Active Directory Domain is a Microsoft service that allows and facilitates the centralized administration of all workstations and servers in any environment. Due to the wide use and adoption of this service, it has become a target for many attackers. Active Directory attacks have evolved through years. The attacks target different functions and fea...
In this era of explosive growth in technology, the internet of things (IoT) has become the game changer when we consider technologies like smart homes and cities, smart energy, security and surveillance, and healthcare. The numerous benefits provided by IoT have become attractive technologies for users and cybercriminals. Cybercriminals of today ha...
It is critical to successfully identify, mitigate, and fight against Android malware assaults, since Android malware has long been a significant threat to the security of Android applications. Identifying and categorizing dangerous applications into categories that are similar to one another are especially important in the development of a safe And...
The explosive growth of the Internet of Things (IoT) applications has imposed a dramatic increase of network data and placed a high computation complexity across various connected devices. The IoT devices capture valuable information, which allows the industries or individual users to make critical live dependent decisions. Most of these IoT device...
Nowadays, due to the exponential and continuous expansion of new paradigms such as Internet of Things (IoT), Internet of Vehicles (IoV) and 6G, the world is witnessing a tremendous and sharp increase of network traffic. In such large‐scale, heterogeneous, and complex networks, the volume of transferred data, as big data, is considered a challenge c...
With the rapid growth of the Internet of Things (IoT) applications in Maritime Transportation Systems (MTS), cyber-attacks and challenges in data safety have also increased extensively. Meanwhile, the IoT devices are resource-constrained and cannot implement the existing security systems, making them susceptible to various types of debilitating cyb...
The entire world progression has ceased with the unexpected outbreak of the COVID-19 pandemic, and urges the requirement for contact-less and autonomous services and applications. Realizing these predominantly Internet of Things (IoT) based applications demands a holistic pervasive computing infrastructure. In this paper, we conduct a survey to det...
Modern networks generate a massive amount of traffic data streams. Analysing this data is essential for various purposes, such as network resources management and cyber-security analysis. There is an urgent need for data analytic methods that can perform network data processing in an online manner based on the arrival of new data. Online machine le...
The rapid increase in the Industrial Internet of Things (IIoT) use-cases plays a significant role in Industry 4.0 development. However, IIoT systems face resource constraints problems and are vulnerable to cyber-attacks due to their inability to implement existing sophisticated security systems. One way of alleviating these resource constraints is...
Due to the value and importance of patient health records (PHR), security is the most critical feature of encryption over the Internet. Users that perform keyword searches to gain access to the PHR stored in the database are more susceptible to security risks. Although a blockchain-based healthcare system can guarantee security, present schemes hav...
The industrial internet of things (IIoT) should be equipped with computational resources to detect network intrusions, types of attacks, and update their models automatically in real-time. The most challenging aspect of machine learning-based network intrusion detection system (NIDS) design to secure IIoT is the continuous need for up-to-date defin...
The fast expansion of the Internet of Things (IoT) in the technology and communication industries necessitates a continuously updated cyber-security mechanism to keep protecting the systems’ users from any possible attack that might target their data and privacy. Botnets pose a severe risk to the IoT, they use malicious nodes in order to compromise...
The COVID-19 pandemic has affected almost every country causing devastating economic and social disruption and stretching healthcare systems to the limit. Furthermore, while being the current gold standard, existing test methods including NAAT (Nucleic Acid Amplification Tests), clinical analysis of chest CT (Computer Tomography) scan images, and b...
Network Traffic Classification (NTC) has become an important feature in various network management operations, e.g., Quality of Service (QoS) provisioning and security services. Machine Learning (ML) algorithms as a popular approach for NTC can promise reasonable accuracy in classification and deal with encrypted traffic. However, ML-based NTC tech...
Software-Defined Networking (SDN) is a promising technology for the future Internet. However, the SDN paradigm introduces new attack vectors that do not exist in the conventional distributed networks. This paper develops a hybrid Intrusion Detection System (IDS) by combining the Convolutional Neural Network (CNN) and Long Short-Term Memory Network...
A correction to this paper has been published: https://doi.org/10.1007/s11277-021-08606-w
The future of mobile and internet technologies are manifesting advancements beyond the existing scope of science. The concepts of
automated driving, augmented-reality, and machine-type-communication are quite sophisticated; and requires an elevation of the current mobile infrastructure for launching. The 5G mobile technology serves as the solution;...
Software-defined networking (SDN) is a new networking paradigm that separates the controller from the network devices i.e. routers and switches. The centralised architecture of the SDN facilitates the overall network management and addresses the requirement of current data centres. While there are high benefits offered by the SDN architecture, the...
Internet of bio-nano things (IoBNT) is a novel communication paradigm where tiny, biocompatible and non-intrusive devices collect and sense biological signals from the environment and send them to data centers for processing through the internet. The concept of the IoBNT has stemmed from the combination of synthetic biology and nanotechnology tools...
An intrusion detection system (IDS) is an essential component of computer networks to detect and secure the system and environment from malicious activities and anomalous attacks. The convolutional neural network (CNN) is a popular deep learning algorithm that has been broadly applied in the field of computer vision. More recently, several research...
Nanonetwork has given rise to many other disciplines like agriculture, defense, health care, and industrial applications. With nanonetwork there exist tiny nanodevices or nanomachines. The interconnection of tiny nanodevices with internet helps to make an entire network i.e. the next generation of network, named nanonetwork. Nanodevices, due to the...
Nanonetwork has given rise to many other disciplines like agriculture, defense, health care, and industrial applications. With nanonetwork there exist tiny nanodevices or nanomachines. The interconnection of tiny nanodevices with internet helps to make an entire network i.e the next generation of network, named nanonetwork. Nanodevices, due to thei...
Network Traffic Classification (NTC) has become an important component in a wide variety of network management operations, e.g., Quality of Service (QoS) provisioning and security purposes. Machine Learning (ML) algorithms as a common approach for NTC methods can achieve reasonable accuracy and handle encrypted traffic. However, ML-based NTC techni...
In the scenarios of specific conditions and crises such as the coronavirus pandemic, the availability of e-learning ecosystem elements is further highlighted. The growing importance for securing such an ecosystem can be seen from DDoS (Distributed Denial of Service) attacks on e-learning components of the Croatian e-learning system. The negative im...
Edge computing is a novel concept proposed to overcome the limitations of the prevailing cloud-based telecommunication networks. Various concepts have emerged with edge computing that requires proper investigation prior to deployment. Migration of services within the edge computing nodes/ base stations is an imminent aspect of the envisaged paradig...
An intrusion detection system (IDS) is an essential component of computer networks to detect and secure the system and environment from malicious activities and anomalous attacks. The convolu-tional neural network (CNN) is a popular deep learning algorithm that has been broadly applied in the field of computer vision. More recently, several researc...
Social media is a cybersecurity risk for every business. What do people share on the Internet? Almost everything about oneself is shared: friendship, demographics, family, activities and work-related information. This could become a potential risk in every business if the organisation’s policies, training and technology fail to properly address the...
Present-day wireless methods are necessary to support a variety of higher-speed data communication facilities for its subscribers such as cloud-based video streaming facilities. One method to attain this is by using efficient resource allocation systems for transmitters and receivers using wireless communication methods. Wireless strategies and tec...