Părți din această metodologie au fost publicate prin
- C. Toma, B. Talpiga, C. Boja, M. Popa, B. Iancu and M. Zurini, “Secure IoT Supply Chain Management Solution using Blockchain and Smart Contracts Technology”, SECITC 2018: Innovative Security Solutions for Information Technology and Communications, Lecture Notes in Computer Science, vol. 11359, pp. 288-299, Springer, 2019, DOI: 10.1007/978-3-030-12942-2_22 (Conferință BDI: Scopus, eid=2-s2.0-85062961611)
- C. Toma and M. Popa, “IoT security issues for Industry 4.0 – Oil & Gas Solution,” in Proceedings of the 17th International Conference on Informatics in Economy (IE 2018) Education, Research & Business Technologies, Iasi, Romania, 2018, pp. 113 – 118, ISSN 2284-7472;
- C. Boja and M. Zurini, “IoT security architecture based on device fingerprinting,” in Proceedings of the 17th International Conference on Informatics in Economy (IE 2018) Education, Research & Business Technologies, Iasi, Romania, 2018, pp. 157 – 162, ISSN 2284-7472;
- C. Toma and M. Popa, “IoT Security Approaches in Oil & Gas Solution Industry 4.0”, Informatica Economică vol. 22, no. 3/2018, pp. 46 – 61, DOI: 10.12948/issn14531305/22.3.2018.05.
- A. Zamfiroiu, B. Iancu, C. Boja, T.-M. Georgescu, and C. Cartas, “IoT Architectures for Critical Infrastructures Protection,” 18th European Conference on Cyber Warfare and Security (ECCWS), Coimbra, Portugal, July 2019, pp. 613-619 (Conferință ISI, WOS:000560821500074);
- C. Toma, A. Alexandru, M. Popa, and A. Zamfiroiu, “IoT Solution for Smart Cities’ Pollution Monitoring and the Security Challenges,” Sensors, vol. 19, no. 15, Aug. 2019, DOI: 10.3390/s19153401 (Jurnal ISI, IF/2019: 3,275, WOS:000483198900156);
- T.-M. Georgescu, B. Iancu, and M. Zurini, “Named-Entity-Recognition-Based Automated System for Diagnosing Cybersecurity Situations in IoT Networks,” Sensors, vol. 19, no. 15, Aug. 2019, DOI: 10.3390/s19153380 (Jurnal ISI, IF/2019: 3,275, WOS:000483198900135);
- T.-M. Georgescu, B. Iancu, A. Zamfiroiu, M. Doinea, C. E. Boja, and C. Cartas, “A Survey on Named Entity Recognition Solutions Applied for Cybersecurity-Related Text Processing,” Advances in Intelligent Systems and Computing, vol. 1184, 2021, pp. 316–325, Oct. 2020, DOI: 10.1007/978-981-15-5859-7_31 (Conferință BDI: Scopus, eid=2-s2.0-85091910290);
- C. Toma, M. Popa, M. Doinea, “A.I. neural networks inference into the IoT embedded devices using TinyML for pattern detection within a security system,” Proceedings of the IE 2020 International Conference, May 2020, DOI:10.24818/ie2020.01.03;
- C. Boja, “Methodology for evaluating IoT security based on devices behavior,” Proceedings of the IE 2020 International Conference, May 2020, DOI:10.24818/ie2020.01.08;
- A. Zamfiroiu, B. Iancu, C. Boja, T.-M. Georgescu, C. Cartas, M. Popa, and C. V. Toma, “IoT Communication Security Issues for Companies: Challenges, Protocols and The Web of Data,” Proceedings of the International Conference on Business Excellence, vol. 14, no. 1, pp. 1109–1120, Jul. 2020, DOI: 10.2478/picbe-2020-0104 (Conferință ISI, WOS:000556549000104);
- T.-M. Georgescu, “Natural Language Processing Model for Automatic Analysis of Cybersecurity-Related Documents,” Symmetry, vol. 12, no. 3, p. 354, Mar. 2020, DOI: 10.3390/sym12030354 (Jurnal ISI, IF/2019: 2,645, WOS:000525824300029);