Conveners
Session A
- Răzvan Victor RUGHINIȘ (University Politehnica of Bucharest)
Description
Session A
As the physics scopes of High Energy Physics experiments grow, so do their
storage needs increase. Coming with Run 3 for ALICE and LHCb, and Run 4 for
CMS and ATLAS, the rate and volume of data recorded through the detectors has increased
or will be increased to such a degree that old data management strategies
will not make due. Since the beginning of the WLCG each experiment has had...
Enterprise environments involve a large set of servers and databases
containing fluid and sometime inconsistent information regarding people,
infrastructure, inventory, and organizational structure.
IT support must have access and use all this information
to properly offer the right services and preemptive actions.
This paper presents a flexible and secure data collection
system which...
My diploma project is focused on developing an automated infrastructure provisioning that simplifies the process of setting up and managing a network of virtual machines. The infrastructure will utilize virtualization technologies to create a cluster of machines that can be quickly and easily configured to meet the needs of the user. The system will also provide tools for managing the machines...
As technology and the pace of change continue to
advance, the academy faces the challenge of preparing students
for future employment markets characterized by change and
uncertainty. To succeed in this market, practitioners need to
develop a broad range of skills in addition to more refined
practices within traditional disciplines. In this paper, we discuss
the benefits achieved...
Cloud computing has gained popularity for efficient data storage, processing, and application access. This study focuses on migrating Hermit Portal's modular monolithic web application from on-premises to AWS cloud. The aim is to identify migration patterns, optimize costs, and consider project management constraints (e.g. time, cost, and performance).
Considering the Cloud Computing models...
Abstract—GPUs are a fundamental component of most high
computing environments available nowadays, being a general
solution to various purposes that range from scientific solutions
designed as software applications to clusters that hold and process
sensitive data. In this paper we focus on Buffer Overflow attacks
and memory vulnerability analysis with the intention to prove
that given...
Quantum-resistant encrypted communications is of
particular importance in the context of recent advancements in
quantum computing. Existing technologies such as Quantum Key
Distribution achieve this, but are not suitable for general-purpose
communication due to limited key rates. In this work, we propose
a VPN solution enhanced by QKD for quantum-resistant en-
cryption, we implement it...
—"The cloud" points out to servers, the databases and software that run on those servers. The Internet has always been constructed of infrastructure, servers and clients. Clients send their requests to servers, and servers reply, but cloud computing is distinct in the form that cloud servers are not just replying to requests with on-demand processing but they are saving data and running...
Phishing attacks pose a significant threat to network security, and effective detection and mitigation techniques are crucial to safeguarding sensitive information. This paper presents a novel email classification framework for phishing detection in virtualized network environments with a specific emphasis on distributed firewall architectures. The framework leverages the power of the Naive...