Conveners
Cloud Computing and Network Virtualisation
- Mihai CARABAȘ (Agency ARNIEC/RoEduNet, University Politehnica of Bucharest)
Cloud Computing and Network Virtualisation
- Mihai CARABAȘ (Agency ARNIEC/RoEduNet, University Politehnica of Bucharest)
Nowadays, one of the most discussed technology-related issues in the networking domain is how a highly performant and easily accessible to everyone implementation can look like. To reach this target, hardware acceleration comes into the game by offering high performance, programmability capabilities, and a minimal design of a network protocol stack. The Field-Programmable Gate Array (FPGA) is...
Abstract: Quantum computing opens new frontiers for modeling intelligence at the physical level. This paper investigates Quantum Neural Networks (QNNs) not just as tools for classification, but as circuit-based analogues of biological neurons, inspired by classical transistor-based implementations. Starting with reviewing current QNN architectures, and then focusing on quantum perceptrons...
Blockchain technology has gained significant traction in recent years. These decentralised databases offer security, immutability, and scalability across various applications. These properties are ideal for building decentralised applications, which are solutions that combine off-chain components (traditional web services, frontend, and backend) with on-chain components (smart contracts). This...
Networks usually face the challenges of high traffic volume and diverse user behaviours, which makes analyzing and preventing security incidents particularly difficult. Another major drawback is that traffic is often encrypted, so the data you can analyse is very limited. This paper presents an approach to network monitoring tooling, using Zeek for inspection on encrypted traffic. The system...
Incident response teams and security engineers are often overwhelmed by the large number of compromised artifacts requiring investigation and mitigation within short timeframes. This critical demand for speed and scalability emphasizes the important role of automation in modern post-incident processes.
This paper presents an automated forensic investigation pipeline specifically designed for...
Abstract
In today's rapidly evolving technological landscape, practical experience is essential for students seeking to study IT
infrastructure, networking, and cybersecurity. This article presents a comprehensive guide to building a robust virtual
laboratory environment, leveraging Proxmox Virtual Environment (VE) as the core hypervisor and EVE-NG
(Emulated Virtual Environment Next...
Among NoSQL databases, Neo4j has become a leading solution for managing graph-structured data, particularly known for its flexibility in handling complex relationships. However, the performance characteristics of Neo4j in analytical (OLAP) workloads deployed within cloud-based environments, such as OpenStack, remain underexplored. In this paper, we present an analysis of OLAP performance for...
This article presents the development, implementation, and validation of an integrated monitoring and security platform for Proxmox virtual environments. The platform utilizes lightweight host agents to gather high-frequency CPU, memory, and network I/O measurements using the Proxmox API, and to analyze outgoing traffic against a centralized trust registry for the real-time detection of...
Smart contracts power a vast array of blockchain applications, securing billions of dollars on decentralized finance, but their immutable nature turns every vulnerability into a permanent and highly exploitable liability. Although automated security tools can efficiently detect many issues, their high false-positive rates and lack of trust still require manual audits, which are costly and...
Geospatial data play a fundamental role in decision-making processes within government entities, private sector organizations and in the context of natural resource management. The integration and harmonization of geospatial data from heterogeneous sources represents a significant challenge in the context of the implementation of the INSPIRE (Infrastructure for Spatial Information in Europe)...
Rapid production rollout of new features, vulnerability patches, and critical bug fixes is essential to maintaining a market advantage in today's competitive landscape. However, this need for speed introduces increased risks, as demonstrated by the 2025 Google Cloud incident, where a software deployment containing an undetected bug resulted in cascading service disruptions in major platforms,...
The proliferation of fake news in the digital age poses a critical threat to informed public discourse and societal stability. This paper introduces VERIT-ALBERT, a novel fine-tuned LLM-based solution designed to enhance fake news detection by utilizing the lightweight architecture of the ALBERT transformer.
Through benchmarking on multiple real-world Fake News datasets, we demonstrate the...