|
|
|
|
|
State, Radu
University of Luxembourg
Luxembourg, Luxembourg
|
|
|
|
|
|
|
| Radu State is a permanent researcher at INRIA (The French National Institute for Research in Computer Science), France, working on network and security management. He earned a doctorate degree (2001) from Henri-Poincar¿ University, Nancy, France; a master of science in engineering degree (1998) from Johns Hopkins University, Baltimore, MD, USA; and a bachelor of science degree from the University of Bucharest, Romania. He started his research activities in the field of computational biology at Johns Hopkins University, working on automatic gene parsing and protein identification methods. His PhD thesis addressed the issue of information modeling and network management in dynamic ad hoc networks. During his postdoctoral research fellowship with Motorola Labs, he addressed service and network management in next generation (beyond 3G) networks. During that period, he was involved in several European Union-sponsored research projects. Once he joined INRIA, his research work became focused on security management, ad hoc networks, and voice/Internet protocol (IP) security and management. His research addresses three main questions: How can ad hoc networks be managed? How can the management plane be secured? Which security architecture for voice/IP networks will scale up to the new challenges of a global voice/IP service? In addition to his research, State teaches a graduate-level course on network security at a computer science engineering school (ESIAL) in Nancy, France. He has published more than 40 papers on network and service management issues, and serves on the technical program boards of several international journals and conferences, including IFIP/IEEE Integrated Network Management Symposium, IFIP/IEEE Network Operation Management Symposium, and IFIP/IEEE Distributed System and Operation Workshop. He is a reviewer for ACM Computing Reviews, where he reviews research papers and recently published books. In addition to his enthusiasm for computer science books, he is a passionate reader of South American and German literature. When he is at home, Radu and his wife Simona have fun with their newborn daughter, Anna, who seems particularly attracted to grasping and chewing her daddy’s books. |
|
|
|
Date Reviewed |
|
|
1 - 10 of 135
reviews
|
|
|
|
|
|
|
|
Anomaly detection as a service: challenges, advances, and opportunities Yao D., Shu X., Cheng L., Stolfo S., Morgan & Claypool Publishers, San Rafael, CA, 2017. 173 pp. Type: Book (978-1-681731-09-4)
Written by a team of well-known academic researchers and authors of landmark papers in the area of system and network security, this book is a distilled and concise overview of academic and industrial approaches for anomaly detection i...
|
Apr 25 2018 |
|
|
|
|
|
|
Introduction to machine learning with applications in information security Stamp M., Chapman & Hall/CRC, Boca Raton, FL, 2017. 364 pp. Type: Book (978-1-138626-78-2)
Machine learning and information security are well-established disciplines that benefit mutually from their interaction because many modern network and system intrusion and prevention systems rely on advanced anomaly detection models i...
|
Jan 17 2018 |
|
|
|
|
|
|
Fraud analytics using descriptive, predictive, and social network techniques: a guide to data science for fraud detection Baesens B., Van Vlasselaer V., Verbeke W., Wiley Publishing, Hoboken, NJ, 2015. 400 pp. Type: Book (978-1-119133-12-4)
The general scope of fraud analytics comprises a set of both conceptual approaches and appropriate tools for detecting certain anomalies in processes that can be associated with fraud. Fraud can occur in several business domains, spann...
|
Mar 15 2017 |
|
|
|
|
|
|
A primer for financial engineering: financial signal processing and electronic trading Akansu A., Torun M., Academic Press, London, UK, 2015. 156 pp. Type: Book (978-0-128015-61-2)
This concise 140-page introduction to financial engineering is structured in six chapters. The content addresses the most relevant topics required to grasp the basics of financial engineering and high-frequency trading....
|
Nov 8 2016 |
|
|
|
|
|
|
Marketing data science: modeling techniques in predictive analytics with R and Python Miller T., Pearson Education, Old Tappan, NJ, 2015. 480 pp. Type: Book (978-0-133886-55-9)
With his latest book on marketing data science, Thomas Miller continues his series of books on applied data mining and modeling with R and Python. I’ve read his previous book [1] and was pleasantly surprised to rediscover the...
|
Aug 4 2016 |
|
|
|
|
|
|
Computer and communication networks (2nd ed.) Mir N., Prentice Hall Press, Upper Saddle River, NJ, 2014. 912 pp. Type: Book (978-0-133814-74-3), Reviews: (1 of 2)
With this second edition, Nader Mir provides a comprehensive introduction to the most important topics in current networking. The almost 900-page book is composed of 22 chapters addressing packet-switching concepts, the well-known tran...
|
May 26 2016 |
|
|
|
|
|
|
Data mining: the textbook Aggarwal C., Springer Publishing Company, Incorporated, New York, NY, 2015. 734 pp. Type: Book (978-3-319141-41-1)
Written by one of the most prodigious editors and authors in the data mining community, Data mining: the textbook is a comprehensive introduction to the fundamentals and applications of data mining. The recent drive in industry ...
|
Oct 20 2015 |
|
|
|
|
|
|
Realtime data mining: self-learning techniques for recommendation engines Paprotny A., Thess M., Birkhäuser Basel, Cham, Switzerland, 2013. 313 pp. Type: Book (978-3-319013-20-6)
While most existing recommendation engines use static and historical data in order to build a model for online recommendation tasks, more advanced engines might leverage a well-known closed loop approach from control theory in order to...
|
Mar 11 2015 |
|
|
|
|
|
|
Using TRILL, FabricPath, and VXLAN: designing massively scalable data centers (MSDC) with overlays Hooda S., Kapadia S., Krishnan P., Cisco Press, Indianapolis, IN, 2014. 368 pp. Type: Book (978-1-587143-93-9)
The evolution of current data centers is driven by several major forces in terms of end-user and service requirements. Tenants, using infrastructures as a service (IaaS), require large Internet protocol (IP) address spaces operated ove...
|
Dec 16 2014 |
|
|
|
|
|
|
Data center virtualization fundamentals: understanding techniques and designs for highly efficient data centers with Cisco Nexus, UCS, MDS, and beyond Santana G., Cisco Press, Indianapolis, IN, 2013. 900 pp. Type: Book (978-1-587143-24-3)
The design, architectures, and protocols used in modern data centers are the core topics of this book. Published by Cisco Press, it illustrates many examples with Cisco-specific hardware and configuration settings; from a content point...
|
Oct 3 2014 |
|
|
|
|
|
|
|
|
|
|
|