| A security authorization scheme for smart home Internet of Things devices BC Chifor, I Bica, VV Patriciu, F Pop Future Generation Computer Systems 86, 740-749, 2018 | 185 | 2018 |
| IoT botnet anomaly detection using unsupervised deep learning I Apostol, M Preda, C Nila, I Bica Electronics 10 (16), 1876, 2021 | 98 | 2021 |
| RASSH-Reinforced adaptive SSH honeypot A Pauna, I Bica 2014 10th International Conference on Communications (COMM), 1-6, 2014 | 62 | 2014 |
| Qrassh-a self-adaptive ssh honeypot driven by q-learning A Pauna, AC Iacob, I Bica 2018 international conference on communications (COMM), 441-446, 2018 | 48 | 2018 |
| Security analysis of LTE access network CE Vintilă, VV Patriciu, I Bica Proceedings of the 10th international conference on network, 29-34, 2011 | 48 | 2011 |
| On the rewards of self-adaptive IoT honeypots A Pauna, I Bica, F Pop, A Castiglione Annals of Telecommunications 74 (7), 501-515, 2019 | 39 | 2019 |
| DLT based authentication framework for industrial IoT devices C Lupascu, A Lupascu, I Bica Sensors (Basel, Switzerland) 20 (9), 2621, 2020 | 36 | 2020 |
| Sensing service architecture for smart cities using social network platforms BC Chifor, I Bica, VV Patriciu Soft Computing 21 (16), 4513-4522, 2017 | 35 | 2017 |
| Simulation and modeling of telocytes behavior in signaling and intercellular communication processes D Cretoiu, S Roatesi, I Bica, C Plesca, A Stefan, O Bajenaru, CE Condrat, ... International Journal of Molecular Sciences 21 (7), 2615, 2020 | 32 | 2020 |
| Mitigating DoS attacks in publish-subscribe IoT networks BC Chifor, I Bica, VV Patriciu 2017 9th international conference on electronics, computers and artificial …, 2017 | 31 | 2017 |
| A structured approach for implementing cyber security exercises A Furtună, VV Patriciu, I Bica 2010 8th International Conference on Communications, 415-418, 2010 | 30 | 2010 |
| Multi-layer IoT security framework for ambient intelligence environments I Bica, BC Chifor, ȘC Arseni, I Matei Sensors 19 (18), 4038, 2019 | 27 | 2019 |
| Cyber attacks detection using open source elk stack R Stoleriu, A Puncioiu, I Bica 2021 13th International Conference on Electronics, Computers and Artificial …, 2021 | 26 | 2021 |
| Semnături electronice şi securitate informatică VV Patriciu, M Pietroşanu, I Bica, J Priescu Editura All, Bucureşti, 2006 | 25* | 2006 |
| MAC protocol for data gathering in wireless sensor networks with the aid of unmanned aerial vehicles AV Vlăduţă, ML Pură, I Bica Advances in Electrical and Computer Engineering 16 (2), 2016 | 22 | 2016 |
| Network traffic anomaly detection using shallow packet inspection and parallel k-means data clustering R Velea, C Ciobanu, L Margarit, I Bica Studies in Informatics and Control 26 (4), 387-396, 2017 | 21 | 2017 |
| Odin ivr-interactive solution for emergency calls handling BC Mocanu, ID Filip, RD Ungureanu, C Negru, M Dascalu, SA Toma, ... Applied Sciences 12 (21), 10844, 2022 | 20 | 2022 |
| Security-oriented framework for internet of things smart-home applications BC Chifor, SC Arseni, I Matei, I Bica 2019 22nd International Conference on Control Systems and Computer Science …, 2019 | 17 | 2019 |
| Modeling and formal verification of implicit on-demand secure ad hoc routing protocols in HLPSL and AVISPA M Pura, V Patriciu, I Bica International Journal of Computers and Communications 2 (3), 25-32, 2009 | 17 | 2009 |
| Performance of parallel ChaCha20 stream cipher R Velea, F Gurzău, L Mărgărit, I Bica, VV Patriciu 2016 IEEE 11th International Symposium on Applied Computational Intelligence …, 2016 | 16 | 2016 |