Molecular docking studies involving transitional metal complexes (Zn (II), Co (II), Cu (II), Fe (II), Ni (II) with cholic acid (AC) as ligand against aurora a kinase A Beteringhe, C Racuciu, C Balan, E Stoican, L Patron Advanced Materials Research 787, 236-240, 2013 | 50 | 2013 |
Sniffing attacks on computer networks D Glăvan, C Răcuciu, R Moinescu, S Eftimie Scientific Bulletin" Mircea cel Batran" Naval Academy 23 (1), 202A-207, 2020 | 22 | 2020 |
A new pseudorandom bit generator using compounded chaotic tent maps DA Cristina, B Radu, R Ciprian 2012 9th International Conference on Communications (COMM), 339-342, 2012 | 22 | 2012 |
Spear-phishing susceptibility stemming from personality traits S Eftimie, R Moinescu, C Răcuciu IEEE Access 10, 73548-73561, 2022 | 21 | 2022 |
Honeypot system based on software containers S Eftimie, C Racuciu Scientific Bulletin of Naval Academy 19 (2), 415-418, 2016 | 11 | 2016 |
Security threats and risks in cloud computing C Racuciu, S Eftimie Scientific Bulletin" Mircea cel Batran" Naval Academy 18 (1), 105, 2015 | 10 | 2015 |
Detection of phishing attacks using the anti-phishing framework D Glăvan, C Răcuciu, R Moinescu, S Eftimie Scientific Bulletin" Mircea cel Batran" Naval Academy 23 (1), 208A-212, 2020 | 9 | 2020 |
A multi-factor authentication scheme including biometric characteristics as one factor MI Mihailescu, C Racuciu, DL Grecu, LS Nita Scientific Bulletin" Mircea cel Batran" Naval Academy 18 (1), 346, 2015 | 9 | 2015 |
Man in the middle attack on HTTPS protocol D Glăvan, C Răcuciu, R Moinescu, S Eftimie Scientific Bulletin" Mircea cel Batran" Naval Academy 23 (1), 199A-201, 2020 | 7 | 2020 |
Aspects of Human Weaknesses in Cyber Security. R Moinescu, C Răcuciu, D Glăvan, NF Antonie, S Eftimie Scientific Bulletin'Mircea cel Batran'Naval Academy 22 (1), 2019 | 7 | 2019 |
Using potential field analysis into image artifact detection field M Rogobete, C Răcuciu Indian Journal of Research 3, 2014 | 7 | 2014 |
Boolean applications in aircraft electric power systems reliability analysis N Jula, C Cepisca, M Covrig, C Racuciu, T Ursu Conference on European Computing Conference, 54-59, 2008 | 7 | 2008 |
A novel architecture for authenticating scalable resources in hybrid cloud LA Dumitru, S Eftimie, MI Mihailescu, SL Nita, V Opris, C Racuciu 2016 International Conference on Communications (COMM), 251-254, 2016 | 6 | 2016 |
Biometric multi-factor authentication scheme in cloud computing VN Opris, S Eftimie, C Racuciu Scientific Bulletin of Naval Academy 19 (1), 472-475, 2016 | 6 | 2016 |
Improving LTE EPS-AKA using the security request vector CG Apostol, C Racuciu 2015 7th International Conference on Electronics, Computers and Artificial …, 2015 | 6 | 2015 |
An improved cryptographic method in watermark encoding M Rogobete, C Răcuciu Indian Journal of Research 4 (III), 2015 | 6 | 2015 |
Evaluation method of the sensors errors in an inertial navigation system TL Grigorie, N Jula, C Cepisca, C Racuciu, D Raducanu Wseas Transactions on Circuits and Systems 7 (12), 977-987, 2008 | 6 | 2008 |
Insider threats and thermal stress in the working environment. S Eftimie, C Răcuciu, R Moinescu, D Glăvan Scientific Bulletin'Mircea cel Batran'Naval Academy 23 (1), 2020 | 5 | 2020 |
DDoS Detection and Prevention Based on Artificial Intelligence Techniques. D Glăvan, C Răcuciu, R Moinescu, NF Antonie Scientific Bulletin'Mircea cel Batran'Naval Academy 22 (1), 2019 | 5 | 2019 |
Considerations about the possibilities to improve AES S-box cryptographic properties by Multiplication F Medeleanu, C Racuciu, M Rogobete Proceedings of the Romanian academy 16, 339-344, 2015 | 5 | 2015 |