Description
Chair Florin Bogdan Manolache
NM & OSER Virtual Room B
SSL/TLS certificates are used by more and more
network services, but their lifespan keeps decreasing. Managing
certificates on a large network is extremely time consuming,
both as manpower and as complexity. This paper presents
an automatic SSL/TLS certificate management system based
on a single certificate manager, which makes generation and
distribution of certificates efficient and...
The current paper proposes a system architecture where a distributed environment of wireless sensor networks (WSNs) can selectively receive software updates when enhanced with a Software-Defined Network (SDN) control environment. In the context of IoT, the current work aims to facilitate the deployment of software updates on WSNs in an automated fashion and also proposes the usage of this...
Extensive research encompassing steganography has been carried out in the past couple of decades and has spurred numerous studies. Research regarding steganography and steganalysis has recently shifted, and impressive progress has been carried out with the aid of the emerging popularity of deep convolutional neural networks. This paper addresses a new branch of steganography, namely...
FAIR principles of scientific data represent a relatively new direction in research that is best described as an initiative to encourage and help researches in making their data more available and easier to reproduce and reuse. Most importantly, the principles emphasize machine actionability, meaning the data requires strict guidelines so that automatic systems can read, retrieve and use the...
The Linux kernel is implemented in C, an unsafe programming language, which puts the burden of memory management, type and bounds checking, and error handling in the hands of the developer. Hundreds of buffer overflow bugs have compromised Linux systems over the years, leading to endless layers of mitigations applied on top of C.
In contrast, the D programming language offers automated...
Image segmentation is one of the most frequently used computer vision techniques. Whether we talk about medical imaging or autonomous driving, image segmentation algorithms are required to obtain the desired result. Therefore, a variety of algorithms have been implemented so far. Being based on different approaches, each of these algorithms has its own advantages and disadvantages. No...