How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
Drones have been used in recent years more and more in various economic sectors (e.g., military, agriculture, retail, transport), but also for personal use and entertainment. The current legislative framework and cyber security standards do not fully address the identification of liable stakeholders in the drone ecosystem for cyber-incidents and th...
Cyber threats regarding drones have increased in the previous years due to the extended use and to the lack of proper preventive measures, not necessarily in the military domain, but in various civil sectors. The legal requirements in place and the best practices in the IoT or drone specific field emphasize specific cybersecurity requirements, howe...
Specialty literature and solutions in the market have been focusing in the last decade on collecting and aggregating significant amounts of data about transactions (and user behavior) and on refining the algorithms used to identify fraud. At the same time, legislation in the European Union has been adopted in the same direction (e.g., PSD2) in orde...
The use of Internet of Things devices (IoT) by individuals in their homes has led to new opportunities for companies, to adapt their products, services and offers, based on the user profile. At the same time, these new services involve the reinterpretation of existing requirements regarding data protection, especially in terms of the ethics of usin...
Project supported by a grant of the Romanian Ministry of Education and Research, CNCS - UEFISCDI, project number PN-III-P4-ID-PCE-2020-2174, within PNCDI III titled “Intelligent analysis and prediction of the economic and financial crime in a cyber-dominated and interconnected business world”, conducted over the period 2021-2023