{"id":61459,"date":"2025-11-11T01:53:06","date_gmt":"2025-11-11T00:53:06","guid":{"rendered":"https:\/\/virtual-routes.org\/?page_id=61459"},"modified":"2025-11-17T23:01:43","modified_gmt":"2025-11-17T22:01:43","slug":"ai-in-apararea-cibernetica","status":"publish","type":"page","link":"https:\/\/virtual-routes.org\/ro\/ai-in-setul-de-instrumente-de-securitate-cibernetica\/ai-in-apararea-cibernetica\/","title":{"rendered":"AI \u00een ap\u0103rarea cibernetic\u0103"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"61459\" class=\"elementor elementor-61459\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6c36906 e-flex e-con-boxed e-con e-parent\" data-id=\"6c36906\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-969c1a1 e-con-full e-flex e-con e-child\" data-id=\"969c1a1\" data-element_type=\"container\">\n\t\t\t\t<div data-dce-title-color=\"#0E093A\" class=\"elementor-element elementor-element-7ed3c90 elementor-widget elementor-widget-heading\" data-id=\"7ed3c90\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">AI \u00een domeniul ap\u0103r\u0103rii cibernetice<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7a0a132 elementor-widget elementor-widget-text-editor\" data-id=\"7a0a132\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cum schimb\u0103 AI ap\u0103rarea cibernetic\u0103 de-a lungul ciclului de via\u021b\u0103 al incidentelor cibernetice<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-df4d47b elementor-absolute dce_masking-none elementor-invisible elementor-widget elementor-widget-image\" data-id=\"df4d47b\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;,&quot;_animation&quot;:&quot;slideInRight&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img alt=\"\" loading=\"lazy\" decoding=\"async\" width=\"767\" height=\"773\" src=\"https:\/\/virtual-routes.org\/wp-content\/uploads\/2024\/11\/white-stair.svg\" class=\"attachment-full size-full wp-image-10938\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4a69b68 e-flex e-con-boxed e-con e-parent\" data-id=\"4a69b68\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;sticky&quot;:&quot;top&quot;,&quot;sticky_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;],&quot;sticky_offset&quot;:0,&quot;sticky_effects_offset&quot;:0,&quot;sticky_anchor_link_offset&quot;:0}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<a class=\"elementor-element elementor-element-e5fc1cf e-con-full e-flex e-con e-child\" data-id=\"e5fc1cf\" data-element_type=\"container\" href=\"https:\/\/virtual-routes.org\/ro\/ai-in-setul-de-instrumente-de-securitate-cibernetica\/\">\n\t\t\t\t<div class=\"elementor-element elementor-element-86ab8e5 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"86ab8e5\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">Acas\u0103<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/a>\n\t\t<a class=\"elementor-element elementor-element-c6e7cb4 e-con-full e-flex e-con e-child\" data-id=\"c6e7cb4\" data-element_type=\"container\" href=\"https:\/\/virtual-routes.org\/ro\/ai-in-setul-de-instrumente-de-securitate-cibernetica\/ai-in-apararea-cibernetica\/\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7a93047 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"7a93047\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">AI \u00een domeniul ap\u0103r\u0103rii cibernetice<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/a>\n\t\t<a class=\"elementor-element elementor-element-bc6c7e0 e-con-full e-flex e-con e-child\" data-id=\"bc6c7e0\" data-element_type=\"container\" href=\"https:\/\/virtual-routes.org\/ro\/ai-in-setul-de-instrumente-de-securitate-cibernetica\/ai-in-infractiunile-cibernetice\/\">\n\t\t\t\t<div class=\"elementor-element elementor-element-27f751c elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"27f751c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">AI \u00een Infrac\u021biuni cibernetice<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0eb59e1 p e-flex e-con-boxed e-con e-child\" data-id=\"0eb59e1\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d3fade3 elementor-widget elementor-widget-text-editor\" data-id=\"d3fade3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Ap\u0103rarea cibernetic\u0103 urm\u0103re\u0219te s\u0103 protejeze sistemele, re\u021belele \u0219i datele \u00eempotriva infiltr\u0103rii, perturb\u0103rii sau distrugerii. Protec\u021bia <a href=\"https:\/\/www.enisa.europa.eu\/publications\/best-practices-for-cyber-crisis-management\">ciclul de via\u021b\u0103 al incidentelor cibernetice<\/a> ofer\u0103 o modalitate util\u0103 de a \u00een\u021belege ap\u0103rarea cibernetic\u0103, defalc\u00e2nd-o \u00een patru faze:<\/p><ul><li><strong>Prevenire:<\/strong> prevenirea \u0219i reducerea riscului de incidente \u0219i minimizarea efectelor poten\u021biale ale acestora.<\/li><li><strong>Preg\u0103tire:<\/strong> dezvoltarea de planuri, instrumente \u0219i capacit\u0103\u021bi pentru a sprijini un r\u0103spuns eficient.<\/li><li><strong>R\u0103spuns:<\/strong> oprirea incidentului \u0219i prevenirea altor daune.<\/li><li><strong>Recuperare:<\/strong> restabilirea rapid\u0103 a opera\u021biunilor \u0219i revenirea la un nivel de securitate normal sau mai ridicat.<\/li><\/ul><p>\u00a0<\/p><p style=\"margin-top: -22px;\">Inteligen\u021ba artificial\u0103 (AI) a devenit relevant\u0103 \u00een toate cele patru etape. Spre deosebire de instrumentele tradi\u021bionale care se \u00eencadreaz\u0103 perfect \u00eentr-o singur\u0103 etap\u0103, multe dintre capacit\u0103\u021bile AI acoper\u0103 \u00eentregul ciclu de via\u021b\u0103: aceea\u0219i tehnic\u0103 care sprijin\u0103 preg\u0103tirea poate, de asemenea, s\u0103 permit\u0103 un r\u0103spuns mai rapid sau s\u0103 ajute la recuperare. Aceast\u0103 integrare face ca AI s\u0103 fie at\u00e2t puternic\u0103, c\u00e2t \u0219i dificil de clasificat: valoarea sa const\u0103 nu numai \u00een \u00eembun\u0103t\u0103\u021birea sarcinilor individuale, ci \u0219i \u00een conectarea mai perfect\u0103 a fazelor \u00eentre ele.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a607854 e-flex e-con-boxed e-con e-parent\" data-id=\"a607854\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-31fca9f e-con-full main-phase-container e-flex e-con e-child\" data-id=\"31fca9f\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-ca621e9 e-con-full e-flex e-con e-child\" data-id=\"ca621e9\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9a88f20 elementor-widget elementor-widget-heading\" data-id=\"9a88f20\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Prevenire<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-303cf24 elementor-view-stacked elementor-absolute elementor-shape-circle elementor-widget elementor-widget-icon\" data-id=\"303cf24\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-arrow-circle-right\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8c137 0 248 111 248 248S393 504 256 504 8 393 8 256 119 8 256 8zm-28.9 143.6l75.5 72.4H120c-13.3 0-24 10.7-24 24v16c0 13.3 10.7 24 24 24h182.6l-75.5 72.4c-9.7 9.3-9.9 24.8-.4 34.3l11 10.9c9.4 9.4 24.6 9.4 33.9 0L404.3 273c9.4-9.4 9.4-24.6 0-33.9L271.6 106.3c-9.4-9.4-24.6-9.4-33.9 0l-11 10.9c-9.5 9.6-9.3 25.1.4 34.4z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2db387b e-con-full e-flex e-con e-child\" data-id=\"2db387b\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2391c85 elementor-widget elementor-widget-heading\" data-id=\"2391c85\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Preg\u0103tire<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8a92426 elementor-view-stacked elementor-absolute elementor-shape-circle elementor-widget elementor-widget-icon\" data-id=\"8a92426\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-arrow-circle-right\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8c137 0 248 111 248 248S393 504 256 504 8 393 8 256 119 8 256 8zm-28.9 143.6l75.5 72.4H120c-13.3 0-24 10.7-24 24v16c0 13.3 10.7 24 24 24h182.6l-75.5 72.4c-9.7 9.3-9.9 24.8-.4 34.3l11 10.9c9.4 9.4 24.6 9.4 33.9 0L404.3 273c9.4-9.4 9.4-24.6 0-33.9L271.6 106.3c-9.4-9.4-24.6-9.4-33.9 0l-11 10.9c-9.5 9.6-9.3 25.1.4 34.4z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0d9534e e-con-full e-flex e-con e-child\" data-id=\"0d9534e\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a6a6575 elementor-widget elementor-widget-heading\" data-id=\"a6a6575\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">R\u0103spuns<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4087432 elementor-view-stacked elementor-absolute elementor-shape-circle elementor-widget elementor-widget-icon\" data-id=\"4087432\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-arrow-circle-right\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8c137 0 248 111 248 248S393 504 256 504 8 393 8 256 119 8 256 8zm-28.9 143.6l75.5 72.4H120c-13.3 0-24 10.7-24 24v16c0 13.3 10.7 24 24 24h182.6l-75.5 72.4c-9.7 9.3-9.9 24.8-.4 34.3l11 10.9c9.4 9.4 24.6 9.4 33.9 0L404.3 273c9.4-9.4 9.4-24.6 0-33.9L271.6 106.3c-9.4-9.4-24.6-9.4-33.9 0l-11 10.9c-9.5 9.6-9.3 25.1.4 34.4z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-839c49e e-con-full e-flex e-con e-child\" data-id=\"839c49e\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3295fd5 elementor-widget elementor-widget-heading\" data-id=\"3295fd5\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Recuperare<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6f42479 e-con-full attack-surface-mapping clickable e-flex e-con e-child\" data-id=\"6f42479\" data-element_type=\"container\">\n\t\t\t\t<div data-dce-title-color=\"#0E093A\" class=\"elementor-element elementor-element-c73cfa4 elementor-widget-mobile__width-auto sticky-text elementor-widget__width-auto elementor-widget elementor-widget-heading\" data-id=\"c73cfa4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cartografierea suprafe\u021bei de atac<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ff904ab e-con-full e-flex e-con e-child\" data-id=\"ff904ab\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d00fac6 e-con-full code-scanning-evaluation clickable e-flex e-con e-child\" data-id=\"d00fac6\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cbcf670 sticky-text elementor-widget elementor-widget-heading\" data-id=\"cbcf670\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Scanarea codurilor<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eea2e6c e-con-full e-flex e-con e-child\" data-id=\"eea2e6c\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7f7e850 e-con-full e-flex e-con e-child\" data-id=\"7f7e850\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4fa3d2e e-con-full data-summarisation clickable e-flex e-con e-child\" data-id=\"4fa3d2e\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4a150e8 sticky-text elementor-widget elementor-widget-heading\" data-id=\"4a150e8\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Rezumarea datelor<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1d2c163 e-con-full data-classification clickable e-flex e-con e-child\" data-id=\"1d2c163\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b697400 sticky-text elementor-widget elementor-widget-heading\" data-id=\"b697400\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Clasificarea datelor<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7c80cc5 e-con-full e-flex e-con e-child\" data-id=\"7c80cc5\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-743b8e3 e-con-full e-flex e-con e-child\" data-id=\"743b8e3\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bdedb58 e-con-full anomaly-detection clickable e-flex e-con e-child\" data-id=\"bdedb58\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e3f59ea sticky-text elementor-widget elementor-widget-heading\" data-id=\"e3f59ea\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Detectarea anomaliilor<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-549b0c9 e-con-full e-flex e-con e-child\" data-id=\"549b0c9\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5879f26 e-con-full writing-analysis clickable e-flex e-con e-child\" data-id=\"5879f26\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9f69ecd sticky-text elementor-widget elementor-widget-heading\" data-id=\"9f69ecd\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Scriere \u0219i analiz\u0103<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-834de9f e-con-full synthetic-data clickable e-flex e-con e-child\" data-id=\"834de9f\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2d005a9 sticky-text elementor-widget elementor-widget-heading\" data-id=\"2d005a9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Date sintetice<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eb7d2bd e-con-full e-flex e-con e-child\" data-id=\"eb7d2bd\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1f2cf9a e-con-full iam clickable e-flex e-con e-child\" data-id=\"1f2cf9a\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fbb11d8 sticky-text elementor-widget elementor-widget-heading\" data-id=\"fbb11d8\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Gestionarea identit\u0103\u021bii \u0219i a accesului<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-40b7c74 e-con-full e-flex e-con e-child\" data-id=\"40b7c74\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-01cfe51 e-con-full iam clickable e-flex e-con e-child\" data-id=\"01cfe51\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1c50afa sticky-text elementor-widget elementor-widget-heading\" data-id=\"1c50afa\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Gestionarea identit\u0103\u021bii \u0219i a accesului<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-58a0990 e-con-full e-flex e-con e-child\" data-id=\"58a0990\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-31ce5a8 e-con-full e-flex e-con e-child\" data-id=\"31ce5a8\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d0508bb e-con-full log-analysis clickable e-flex e-con e-child\" data-id=\"d0508bb\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8b52d2c sticky-text elementor-widget elementor-widget-heading\" data-id=\"8b52d2c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Analiza jurnalului<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8950b27 e-con-full e-flex e-con e-child\" data-id=\"8950b27\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8ae99fb e-con-full malware-analysis clickable e-flex e-con e-child\" data-id=\"8ae99fb\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b56a73c sticky-text elementor-widget elementor-widget-heading\" data-id=\"b56a73c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Analiza programelor malware<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a65861b e-con-full e-flex e-con e-child\" data-id=\"a65861b\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8855a07 e-con-full training-labs clickable e-flex e-con e-child\" data-id=\"8855a07\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e3e3eef training-labs clickable elementor-widget elementor-widget-heading\" data-id=\"e3e3eef\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Formare \u0219i laboratoare<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-77fa5b0 e-con-full e-flex e-con e-child\" data-id=\"77fa5b0\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8fcc7f0 e-con-full training-labs clickable e-flex e-con e-child\" data-id=\"8fcc7f0\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ceafbc7 elementor-widget elementor-widget-heading\" data-id=\"ceafbc7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Formare \u0219i laboratoare<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-259dc75 e-flex e-con-boxed e-con e-parent\" data-id=\"259dc75\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f52437e elementor-widget elementor-widget-html\" data-id=\"f52437e\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<script>\n(function() {\n    'use strict';\n    \n    if (typeof window === 'undefined' || !window.requestAnimationFrame) {\n        return;\n    }\n    \n    const stickyElements = document.querySelectorAll('.sticky-text');\n    \n    if (!stickyElements || stickyElements.length === 0) {\n        return;\n    }\n    \n    const elementsData = [];\n    const BUFFER = 30;\n    let rafId = null;\n    let isRunning = false;\n    \n    stickyElements.forEach((element) => {\n        if (!element || !element.parentElement) {\n            return;\n        }\n        \n        const parent = element.parentElement;\n        const originalLeft = element.offsetLeft || 0;\n        \n        elementsData.push({\n            element,\n            parent,\n            originalLeft\n        });\n    });\n    \n    if (elementsData.length === 0) {\n        return;\n    }\n    \n    function updateLoop() {\n        if (!isRunning) {\n            return;\n        }\n        \n        try {\n            elementsData.forEach(data => {\n                const { element, parent, originalLeft } = data;\n                \n                if (!element || !parent || !element.getBoundingClientRect) {\n                    return;\n                }\n                \n                const elementRect = element.getBoundingClientRect();\n                const parentRect = parent.getBoundingClientRect();\n                \n                const parentLeft = parentRect.left;\n                const elementWidth = element.offsetWidth || 0;\n                const parentWidth = parent.offsetWidth || 0;\n                \n                if (parentLeft < 0) {\n                    const targetOffset = -parentLeft + originalLeft;\n                    const maxOffset = Math.max(0, parentWidth - elementWidth - BUFFER);\n                    const finalOffset = Math.max(0, Math.min(targetOffset, maxOffset));\n                    \n                    element.style.position = 'relative';\n                    element.style.left = finalOffset + 'px';\n                } else {\n                    element.style.position = '';\n                    element.style.left = '';\n                }\n            });\n        } catch (error) {\n            isRunning = false;\n            if (rafId) {\n                cancelAnimationFrame(rafId);\n            }\n            return;\n        }\n        \n        rafId = requestAnimationFrame(updateLoop);\n    }\n    \n    function startMonitoring() {\n        if (isRunning) {\n            return;\n        }\n        isRunning = true;\n        rafId = requestAnimationFrame(updateLoop);\n    }\n    \n    function stopMonitoring() {\n        isRunning = false;\n        if (rafId) {\n            cancelAnimationFrame(rafId);\n            rafId = null;\n        }\n    }\n    \n    if (document.readyState === 'loading') {\n        document.addEventListener('DOMContentLoaded', startMonitoring);\n    } else {\n        startMonitoring();\n    }\n    \n    window.addEventListener('beforeunload', stopMonitoring);\n    \n    if (typeof document.hidden !== 'undefined') {\n        document.addEventListener('visibilitychange', function() {\n            if (document.hidden) {\n                stopMonitoring();\n            } else {\n                startMonitoring();\n            }\n        });\n    }\n})();\n<\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-91dd04e pb-0 e-flex e-con-boxed e-con e-child\" data-id=\"91dd04e\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7019a6d elementor-widget elementor-widget-text-editor\" data-id=\"7019a6d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u00cen sec\u021biunile care urmeaz\u0103, examin\u0103m aplica\u021biile concrete AI pentru ap\u0103rarea cibernetic\u0103, ar\u0103t\u00e2nd cum acestea se potrivesc cu diferite faze ale ciclului de via\u021b\u0103 al incidentului \u0219i, \u00een multe cazuri, acoper\u0103 mai multe \u00een acela\u0219i timp.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-73dfa464 e-flex e-con-boxed e-con e-parent\" data-id=\"73dfa464\" data-element_type=\"container\" id=\"tab-activator\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div data-dce-background-color=\"#FFFFFF00\" class=\"elementor-element elementor-element-6e8d52db e-con-full e-flex e-con e-child\" data-id=\"6e8d52db\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-14be7a26 e-n-tabs-mobile elementor-widget elementor-widget-n-tabs\" data-id=\"14be7a26\" data-element_type=\"widget\" data-widget_type=\"nested-tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-tabs\" data-widget-number=\"348027430\" aria-label=\"Fi\u0219ier. Deschizi elementele cu tasta Enter sau Spa\u021biu, le \u00eenchizi cu Esc \u0219i navighezi folosind tastele s\u0103ge\u021bi.\">\n\t\t\t<div class=\"e-n-tabs-heading\" role=\"tablist\">\n\t\t\t\t\t<button id=\"attack-surface-mapping\" data-tab-title-id=\"e-n-tab-title-3480274301\" class=\"e-n-tab-title\" aria-selected=\"true\" data-tab-index=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"e-n-tab-content-3480274301\" style=\"--n-tabs-title-order: 1;\">\n\t\t\t\t\t<span class=\"e-n-tab-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t<\/span>\n\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tCartografierea suprafe\u021bei de atac\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"code-scanning-evaluation\" data-tab-title-id=\"e-n-tab-title-3480274302\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-3480274302\" style=\"--n-tabs-title-order: 2;\">\n\t\t\t\t\t<span class=\"e-n-tab-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t<\/span>\n\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tScanarea \u0219i evaluarea codurilor\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"data-summarisation\" data-tab-title-id=\"e-n-tab-title-3480274303\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-3480274303\" style=\"--n-tabs-title-order: 3;\">\n\t\t\t\t\t<span class=\"e-n-tab-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t<\/span>\n\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tRezumarea datelor\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"data-classification\" data-tab-title-id=\"e-n-tab-title-3480274304\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-3480274304\" style=\"--n-tabs-title-order: 4;\">\n\t\t\t\t\t<span class=\"e-n-tab-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t<\/span>\n\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tClasificarea datelor\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"anomaly-detection\" data-tab-title-id=\"e-n-tab-title-3480274305\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"5\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-3480274305\" style=\"--n-tabs-title-order: 5;\">\n\t\t\t\t\t<span class=\"e-n-tab-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t<\/span>\n\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tDetectarea anomaliilor la nivelul punctelor finale sau al re\u021belei\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"writing-analysis\" data-tab-title-id=\"e-n-tab-title-3480274306\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"6\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-3480274306\" style=\"--n-tabs-title-order: 6;\">\n\t\t\t\t\t<span class=\"e-n-tab-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t<\/span>\n\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tSarcini generale de redactare \u0219i de colectare\/analiz\u0103 a datelor\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"synthetic-data\" data-tab-title-id=\"e-n-tab-title-3480274307\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"7\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-3480274307\" style=\"--n-tabs-title-order: 7;\">\n\t\t\t\t\t<span class=\"e-n-tab-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t<\/span>\n\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tGenerarea de date sintetice\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"iam\" data-tab-title-id=\"e-n-tab-title-3480274308\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"8\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-3480274308\" style=\"--n-tabs-title-order: 8;\">\n\t\t\t\t\t<span class=\"e-n-tab-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t<\/span>\n\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tGestionarea identit\u0103\u021bii \u0219i a accesului (IAM)\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"log-analysis\" data-tab-title-id=\"e-n-tab-title-3480274309\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"9\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-3480274309\" style=\"--n-tabs-title-order: 9;\">\n\t\t\t\t\t<span class=\"e-n-tab-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t<\/span>\n\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tAnaliza jurnalului\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"malware-analysis\" data-tab-title-id=\"e-n-tab-title-34802743010\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"10\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-34802743010\" style=\"--n-tabs-title-order: 10;\">\n\t\t\t\t\t<span class=\"e-n-tab-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t<\/span>\n\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tAnaliza programelor malware\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"training-labs\" data-tab-title-id=\"e-n-tab-title-34802743011\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"11\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-34802743011\" style=\"--n-tabs-title-order: 11;\">\n\t\t\t\t\t<span class=\"e-n-tab-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t<\/span>\n\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tFormare \u0219i laboratoare\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-34802743012\" data-tab-title-id=\"e-n-tab-title-34802743012\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"12\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-34802743012\" style=\"--n-tabs-title-order: 12;\">\n\t\t\t\t\t<span class=\"e-n-tab-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t<\/span>\n\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\t\u00centreb\u0103ri pentru discu\u021bii\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-34802743013\" data-tab-title-id=\"e-n-tab-title-34802743013\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"13\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-34802743013\" style=\"--n-tabs-title-order: 13;\">\n\t\t\t\t\t<span class=\"e-n-tab-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t<\/span>\n\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tBibliografie\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t\t<\/div>\n\t\t\t<div class=\"e-n-tabs-content\">\n\t\t\t\t<div id=\"e-n-tab-content-3480274301\" role=\"tabpanel\" aria-labelledby=\"attack-surface-mapping\" data-tab-index=\"1\" style=\"--n-tabs-title-order: 1;\" class=\"e-active elementor-element elementor-element-5e5c189b e-con-full e-flex e-con e-child\" data-id=\"5e5c189b\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-64f20660 e-con-full e-flex e-con e-child\" data-id=\"64f20660\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4fae0df0 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"4fae0df0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cartografierea suprafe\u021bei de atac<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-79cc8aff elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"79cc8aff\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-77d14d7e elementor-widget elementor-widget-text-editor\" data-id=\"77d14d7e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cartografierea suprafe\u021bei de atac identific\u0103 toate activele, punctele de intrare \u0219i vulnerabilit\u0103\u021bile pe care un adversar le-ar putea exploata \u00een cadrul unui atac. Aceasta ofer\u0103 ap\u0103r\u0103torilor vizibilitate asupra expunerii lor \u0219i \u00eei ajut\u0103 s\u0103 stabileasc\u0103 priorit\u0103\u021bile \u00een ceea ce prive\u0219te elementele care trebuie securizate.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-656111a9 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"656111a9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cum schimb\u0103 AI cartografierea suprafe\u021bei de atac:<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-531f42db elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"531f42db\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div>AI transform\u0103 cartografierea suprafe\u021belor de atac prin automatizarea scan\u0103rilor la scar\u0103 larg\u0103 ale re\u021belelor \u0219i activelor, reduc\u00e2nd dramatic efortul manual. Cu ajutorul recunoa\u0219terii avansate a modelelor, poate detecta puncte finale ascunse sau uitate, pe care metodele tradi\u021bionale le rateaz\u0103 adesea. Sistemele AI pot actualiza h\u0103r\u021bile \u00een mod continuu pe m\u0103sur\u0103 ce infrastructurile evolueaz\u0103, reduc\u00e2nd punctele moarte \u0219i asigur\u00e2ndu-se c\u0103 ap\u0103r\u0103torii men\u021bin o imagine exact\u0103, \u00een timp real, a mediului lor.<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-dce-text-color=\"#E8EEFF\" class=\"elementor-element elementor-element-4ba4a5ef elementor-widget__width-auto elementor-widget elementor-widget-text-editor\" data-id=\"4ba4a5ef\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Prevenire.<\/strong> Reduce expunerile \u00eenainte ca atacatorii s\u0103 le exploateze.<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-dce-text-color=\"#E8EEFF\" class=\"elementor-element elementor-element-1b049691 elementor-widget__width-auto elementor-widget elementor-widget-text-editor\" data-id=\"1b049691\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Preg\u0103tire.<\/strong> Men\u021bine o imagine actualizat\u0103 a infrastructurii pentru planificarea incidentelor.<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-dce-background-color=\"#FFFFFF\" class=\"elementor-element elementor-element-46eb4add e-con-full e-flex e-con e-child\" data-id=\"46eb4add\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4612b0e4 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"4612b0e4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Caz eviden\u021biat: Utilizarea LLM-urilor pentru descoperirea activelor \u00een infrastructurile critice<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-447f550a elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"447f550a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u00cen 2025, <a href=\"https:\/\/doi.org\/10.3390\/electronics14163267\">Luigi Coppolino et al <\/a>a publicat un studiu care arat\u0103 modul \u00een care modelele lingvistice mari (LLM) pot \u00eembun\u0103t\u0103\u021bi descoperirea activelor din infrastructurile critice. Instrumentele tradi\u021bionale, cum ar fi Nmap sau platformele de securitate industrial\u0103, fie risc\u0103 s\u0103 perturbe sistemele sensibile prin scan\u0103ri active, fie nu reu\u0219esc s\u0103 detecteze dispozitivele ascunse atunci c\u00e2nd se bazeaz\u0103 doar pe monitorizarea pasiv\u0103.<\/p><p>Cercet\u0103torii au propus un cadru \"Mixture of Experts\" bazat pe LLM, care combin\u0103 date din observarea pasiv\u0103 a traficului, sondaje active atent limitate \u0219i semnale fizice precum emisiile electromagnetice. Agen\u021bi LLM specializa\u021bi interpreteaz\u0103 apoi aceste date: unul se concentreaz\u0103 asupra protocoalelor industriale, altul asupra vulnerabilit\u0103\u021bilor din re\u021belele IT\/OT, iar altul asupra arhitecturii \u0219i dependen\u021belor sistemului.<\/p><p>De asemenea, sistemul se poate baza pe surse externe de informa\u021bii (cum ar fi MITRE ATT&amp;CK sau bazele de date CVE) pentru a identifica punctele slabe \u0219i a recomanda m\u0103suri de securitate. \u00cen testele efectuate pe o re\u021bea industrial\u0103 simulat\u0103, sistemul a clasificat cu succes active precum controlere logice programabile, bra\u021be robotizate \u0219i imprimante, semnal\u00e2nd \u00een acela\u0219i timp practici nesigure precum traficul Modbus necriptat.<\/p><p>O astfel de abordare transform\u0103 cartografierea suprafe\u021bei de atac \u00eentr-un proces adaptiv \u0219i con\u0219tient de context care ofer\u0103 vizibilitate \u00een timp real \u0219i reduce riscurile scan\u0103rii tradi\u021bionale. Prin reducerea barierelor tehnice pentru ap\u0103r\u0103tori, aceasta permite o monitorizare mai cuprinz\u0103toare \u0219i consolideaz\u0103 pozi\u021bia general\u0103 de securitate a infrastructurii critice.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-314b18b e-con-full e-flex e-con e-child\" data-id=\"314b18b\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ebd483e elementor-widget elementor-widget-marcs-collapsible-content\" data-id=\"ebd483e\" data-element_type=\"widget\" data-widget_type=\"marcs-collapsible-content.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"marcs-collapsible-wrapper\" data-widget-id=\"ebd483e\" data-default-state=\"closed\" data-animation-duration=\"300\">\n\t\t\t<div class=\"marcs-collapsible-heading-wrapper\">\n\t\t\t\t<div class=\"marcs-collapsible-heading\">\n\t\t\t\t\tLecturi suplimentare\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle\" role=\"button\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"marcs-collapsible-content-ebd483e\">\n\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-closed\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-opened\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<!-- First nested container: Content Area -->\n\t\t\t<div class=\"marcs-collapsible-content-area elementor-element elementor-element-3f6e4dc e-con-full e-flex e-con e-child\" data-id=\"3f6e4dc\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t\n\t\t\t<!-- Second nested container: Collapsible Content -->\n\t\t\t<div id=\"marcs-collapsible-content-ebd483e\" class=\"marcs-collapsible-content-wrapper marcs-collapsible-hidden elementor-element elementor-element-64b8356 e-con-full e-flex e-con e-child\" data-id=\"64b8356\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e2562f7 elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"e2562f7\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Impactul AI pentru detectarea amenin\u021b\u0103rilor - <a href=\"https:\/\/doi.org\/10.1007\/979-8-8688-0947-7_3\">\"AI pentru ap\u0103rare\" (Donnie W. Wendt 2024)<\/a><br> Capitolul arat\u0103 modul \u00een care AI a avansat \u00een detectarea \u0219i triajul amenin\u021b\u0103rilor, unde modelele de \u00eenv\u0103\u021bare automat\u0103 prelucreaz\u0103 cantit\u0103\u021bi mari de date eterogene pentru a identifica poten\u021bialele atacuri. Rezultatele eviden\u021biaz\u0103 modul \u00een care primele aplica\u021bii din anii 2000-2010 s-au axat pe detectarea programelor malware, a intruziunilor \u0219i a spam-ului, demonstr\u00e2nd puterea AI de a analiza seturi mari de date \u0219i de a \u00eembun\u0103t\u0103\u021bi sistemele de detectare existente, \u00eembun\u0103t\u0103\u021bind \u00een acela\u0219i timp \u00een mod progresiv func\u021biile de securitate cibernetic\u0103 de lung\u0103 durat\u0103.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Detectarea amenin\u021b\u0103rilor de ultim\u0103 genera\u021bie - <a href=\"https:\/\/doi.org\/10.56726\/IRJMETS32644\">\"Revolu\u021bionarea securit\u0103\u021bii cibernetice: Dezl\u0103n\u021buirea puterii inteligen\u021bei artificiale \u0219i a \u00eenv\u0103\u021b\u0103rii automate\" (Manoharan &amp; Sarker 2022)<\/a><br>Lucrarea arat\u0103 modul \u00een care AI \u0219i \u00eenv\u0103\u021barea automat\u0103 revolu\u021bioneaz\u0103 detectarea amenin\u021b\u0103rilor, permi\u021b\u00e2nd organiza\u021biilor s\u0103 identifice anomalii, s\u0103 analizeze modele comportamentale \u0219i s\u0103 prezic\u0103 poten\u021biale atacuri. Rezultatele eviden\u021biaz\u0103 modul \u00een care tehnici precum NLP pentru extragerea informa\u021biilor despre amenin\u021b\u0103ri \u0219i \u00eenv\u0103\u021barea profund\u0103 pentru recunoa\u0219terea modelelor pot automatiza detectarea \u0219i r\u0103spunsul, \u00een timp ce studii de caz din lumea real\u0103 confirm\u0103 eficacitatea acestora.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-3480274302\" role=\"tabpanel\" aria-labelledby=\"code-scanning-evaluation\" data-tab-index=\"2\" style=\"--n-tabs-title-order: 2;\" class=\"elementor-element elementor-element-102f5cf2 e-con-full e-flex e-con e-child\" data-id=\"102f5cf2\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-2091fc35 e-con-full e-flex e-con e-child\" data-id=\"2091fc35\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-20a4d496 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"20a4d496\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Scanarea \u0219i evaluarea codurilor<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b5b7f0c elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"b5b7f0c\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2c82968c elementor-widget elementor-widget-text-editor\" data-id=\"2c82968c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Scanarea codului analizeaz\u0103 codul surs\u0103 pentru a detecta vulnerabilit\u0103\u021bile, bibliotecile nesigure sau practicile de securitate deficitare \u00eenainte ca acestea s\u0103 poat\u0103 fi exploatate.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2696f42d elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"2696f42d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cum schimb\u0103 AI scanarea \u0219i evaluarea codurilor:<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-34e6457 elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"34e6457\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>AI accelereaz\u0103 detectarea vulnerabilit\u0103\u021bilor prin eviden\u021bierea func\u021biilor nesigure \u0219i identificarea modelelor de codare riscante \u00eenv\u0103\u021bate din exploat\u0103rile anterioare. De asemenea, ofer\u0103 sugestii automate de remediere, sprijinind dezvoltatorii \u00een scrierea unui cod mai sigur \u0219i reduc\u00e2nd fereastra de oportunitate pentru atacatori.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-dce-text-color=\"#E8EEFF\" class=\"elementor-element elementor-element-1f8901c5 elementor-widget__width-auto elementor-widget elementor-widget-text-editor\" data-id=\"1f8901c5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Prevenire.<\/strong> Repar\u0103 punctele slabe \u00eenainte ca atacatorii s\u0103 le descopere.<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-dce-text-color=\"#E8EEFF\" class=\"elementor-element elementor-element-210bebc elementor-widget__width-auto elementor-widget elementor-widget-text-editor\" data-id=\"210bebc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Preg\u0103tire.<\/strong> Consolidarea posturii de securitate de baz\u0103 \u00een vederea preg\u0103tirii pentru incidente.<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-dce-background-color=\"#FFFFFF\" class=\"elementor-element elementor-element-5de58f28 e-con-full e-flex e-con e-child\" data-id=\"5de58f28\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-25204f5 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"25204f5\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Caz eviden\u021biat: Utilizarea LLM-urilor pentru scanarea codurilor \u0219i dezvoltarea sigur\u0103<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-59f93f5e elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"59f93f5e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u00cen 2025, <a href=\"https:\/\/doi.org\/10.48550\/arXiv.2504.20814\">Belozerov et al <\/a>a investigat modul \u00een care modelele lingvistice de mari dimensiuni pot sprijini practicile de codificare sigur\u0103. Studiul lor a testat ChatGPT \u00een raport cu setul de date DevGPT, care con\u021binea coduri reale ale dezvoltatorilor, al\u0103turi de vulnerabilit\u0103\u021bi cunoscute semnalate de scanere statice. Din 32 de vulnerabilit\u0103\u021bi confirmate, ChatGPT a detectat corect 18 \u0219i chiar a sugerat solu\u021bii pentru 17 dintre acestea.<\/p><p>Rezultatele arat\u0103 modul \u00een care AI poate reduce efortul manual \u00een revizuirea codului, poate ajuta la triarea modelelor de codare riscante \u0219i poate oferi sugestii automate de remediere. Acest lucru are poten\u021bialul de a extinde practicile de codare sigur\u0103 \u0219i de a scurta intervalul de timp \u00een care vulnerabilit\u0103\u021bile r\u0103m\u00e2n exploatabile.<\/p><p>\u00cen acela\u0219i timp, studiul a eviden\u021biat limit\u0103ri importante: ChatGPT a produs ocazional rezultate prea \u00eencrez\u0103toare, dar incorecte, a introdus noi defecte atunci c\u00e2nd a \u00eencercat remedieri \u0219i a fost mai pu\u021bin fiabil dec\u00e2t analiza static\u0103 sau revizuirea uman\u0103 de c\u0103tre exper\u021bi. O concluzie cheie a acestui studiu este c\u0103 AI poate fi un asistent puternic \u00een evaluarea codului, dar numai atunci c\u00e2nd este combinat cu instrumentele tradi\u021bionale \u0219i cu o supraveghere adecvat\u0103.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bd5bc13 e-con-full e-flex e-con e-child\" data-id=\"bd5bc13\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cfe9a09 elementor-widget elementor-widget-marcs-collapsible-content\" data-id=\"cfe9a09\" data-element_type=\"widget\" data-widget_type=\"marcs-collapsible-content.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"marcs-collapsible-wrapper\" data-widget-id=\"cfe9a09\" data-default-state=\"closed\" data-animation-duration=\"300\">\n\t\t\t<div class=\"marcs-collapsible-heading-wrapper\">\n\t\t\t\t<div class=\"marcs-collapsible-heading\">\n\t\t\t\t\tLecturi suplimentare\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle\" role=\"button\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"marcs-collapsible-content-cfe9a09\">\n\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-closed\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-opened\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<!-- First nested container: Content Area -->\n\t\t\t<div class=\"marcs-collapsible-content-area elementor-element elementor-element-c151b76 e-con-full e-flex e-con e-child\" data-id=\"c151b76\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t\n\t\t\t<!-- Second nested container: Collapsible Content -->\n\t\t\t<div id=\"marcs-collapsible-content-cfe9a09\" class=\"marcs-collapsible-content-wrapper marcs-collapsible-hidden elementor-element elementor-element-bdd0b76 e-con-full e-flex e-con e-child\" data-id=\"bdd0b76\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ca347b6 elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"ca347b6\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Revizuirea automat\u0103 a codului - <a href=\"https:\/\/www.researchgate.net\/publication\/394286736_A_Review_of_Applying_AI_for_Cybersecurity_Opportunities_Risks_and_Mitigation_Strategies\">\"O analiz\u0103 a aplic\u0103rii AI pentru securitatea cibernetic\u0103: Oportunit\u0103\u021bi, riscuri \u0219i strategii de atenuare\" (Ndibe &amp; Ufomba 2024)<\/a><br> Lucrarea arat\u0103 modul \u00een care AI \u0219i modelele lingvistice mari pot sprijini revizuirile automate ale codului \u0219i evalu\u0103rile vulnerabilit\u0103\u021bii, ajut\u00e2nd organiza\u021biile s\u0103 detecteze proactiv punctele slabe din codul surs\u0103 \u0219i s\u0103 reduc\u0103 timpii de r\u0103spuns. Rezultatele eviden\u021biaz\u0103, de asemenea, riscuri precum codul nesigur generat de AI, subliniind necesitatea supravegherii umane \u0219i a cadrelor de guvernan\u021b\u0103.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">\u00cenv\u0103\u021bare profund\u0103 interpretabil\u0103 pentru detectarea vulnerabilit\u0103\u021bilor - <a href=\"https:\/\/doi.org\/10.1145\/3468264.3468597\">\"Detectarea vulnerabilit\u0103\u021bilor cu interpret\u0103ri fine\" (Li et al. 2021)<\/a><br> Aceast\u0103 lucrare prezint\u0103 IVDetect, un model de \u00eenv\u0103\u021bare profund\u0103 care detecteaz\u0103 vulnerabilit\u0103\u021bi \u00een coduri \u0219i identific\u0103 declara\u021biile \u0219i dependen\u021bele specifice responsabile. IVDetect \u00eembun\u0103t\u0103\u021be\u0219te precizia fa\u021b\u0103 de instrumentele de ultim\u0103 genera\u021bie \u0219i ofer\u0103 explica\u021bii detaliate. Rezultatele arat\u0103 c\u00e2\u0219tiguri substan\u021biale \u00een performan\u021ba de detectare \u0219i o identificare mai precis\u0103 a codului vulnerabil, sprijinind at\u00e2t analiza automat\u0103, c\u00e2t \u0219i remedierea de c\u0103tre dezvoltatori.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Detectarea vulnerabilit\u0103\u021bilor codurilor multilingve - <a href=\"https:\/\/doi.org\/10.48550\/arXiv.2508.11710\">\"Detectarea vulnerabilit\u0103\u021bii codului \u00een diferite limbaje de programare cu modele AI\" (Humran &amp; Sonmez 2025)<\/a><br> Aceast\u0103 lucrare investigheaz\u0103 modele bazate pe transformare, inclusiv CodeBERT \u0219i CodeLlama, pentru detectarea vulnerabilit\u0103\u021bilor \u00een mai multe limbaje de programare. Prin reglarea fin\u0103 pe diverse seturi de date, modelele capteaz\u0103 at\u00e2t sintaxa, c\u00e2t \u0219i semantica, ob\u021bin\u00e2nd o precizie de p\u00e2n\u0103 la 97%. Studiul \u00eencorporeaz\u0103, de asemenea, metode de ansamblu \u0219i AI explicabile pentru a reduce falsurile pozitive \u0219i a \u00eembun\u0103t\u0103\u021bi \u00eencrederea dezvoltatorilor. Studiul demonstreaz\u0103 c\u0103 modelele AI pot dep\u0103\u0219i performan\u021bele analizoarelor statice tradi\u021bionale \u00een contexte multilingve, de\u0219i r\u0103m\u00e2n provoc\u0103ri \u00een ceea ce prive\u0219te robuste\u021bea, precizia \u0219i capacitatea de implementare.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-3480274303\" role=\"tabpanel\" aria-labelledby=\"data-summarisation\" data-tab-index=\"3\" style=\"--n-tabs-title-order: 3;\" class=\"elementor-element elementor-element-12cf6159 e-con-full e-flex e-con e-child\" data-id=\"12cf6159\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-4e4a8ee3 e-con-full e-flex e-con e-child\" data-id=\"4e4a8ee3\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2ef820e7 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"2ef820e7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Rezumarea datelor<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-17f46d3d elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"17f46d3d\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-67670e0f elementor-widget elementor-widget-text-editor\" data-id=\"67670e0f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Rezumarea datelor condenseaz\u0103 volume mari de date tehnice (de exemplu, jurnale, rapoarte \u0219i informa\u021bii privind amenin\u021b\u0103rile) \u00een informa\u021bii accesibile.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-167eb8ed elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"167eb8ed\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cum schimb\u0103 AI rezumarea datelor:<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5a0a8def elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"5a0a8def\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>AI reduce supra\u00eenc\u0103rcarea cognitiv\u0103 prin transformarea informa\u021biilor brute \u0219i nestructurate \u00een informa\u021bii utile. Acesta poate identifica tipare recurente sau anomalii \u00een seturi de date fragmentate. De asemenea, poate genera rapoarte \u00een limbaj simplu pentru nespeciali\u0219ti. Prin urmare, AI face informa\u021biile mai u\u0219or de consumat, de comunicat \u0219i de utilizat.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-dce-text-color=\"#E8EEFF\" class=\"elementor-element elementor-element-34ec9b90 elementor-widget__width-auto elementor-widget elementor-widget-text-editor\" data-id=\"34ec9b90\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Preg\u0103tire.<\/strong> Ajut\u0103 la asimilarea informa\u021biilor despre amenin\u021b\u0103ri \u0219i la o planificare mai eficient\u0103.<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-dce-text-color=\"#E8EEFF\" class=\"elementor-element elementor-element-26574200 elementor-widget__width-auto elementor-widget elementor-widget-text-editor\" data-id=\"26574200\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>R\u0103spuns.<\/strong> Ra\u021bionalizeaz\u0103 cunoa\u0219terea situa\u021biei \u00een timp real.<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-dce-text-color=\"#E8EEFF\" class=\"elementor-element elementor-element-1bf0296c elementor-widget__width-auto elementor-widget elementor-widget-text-editor\" data-id=\"1bf0296c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Recuperare.<\/strong> Produce rezumate \u0219i rapoarte pentru lec\u021biile \u00eenv\u0103\u021bate.<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-dce-background-color=\"#FFFFFF\" class=\"elementor-element elementor-element-5d710aca e-con-full e-flex e-con e-child\" data-id=\"5d710aca\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-730d8f43 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"730d8f43\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Caz eviden\u021biat: AI pentru rezumarea jurnalelor \u0219i cunoa\u0219terea situa\u021biei<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-237f8832 elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"237f8832\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u00cen 2024, <a href=\"https:\/\/doi.org\/10.48550\/arXiv.2403.17160\">Balasubramanian et al <\/a>a prezentat CYGENT, un agent conversa\u021bional bazat pe GPT-3 care poate analiza \u0219i rezuma jurnalele de sistem. \u00cen loc s\u0103 le cear\u0103 anali\u0219tilor s\u0103 treac\u0103 prin mii de intr\u0103ri brute \u00een jurnal, CYGENT le condenseaz\u0103 \u00een rezultate scurte, u\u0219or de citit de c\u0103tre om, care eviden\u021biaz\u0103 evenimentele \u0219i anomaliile cheie.<\/p><p>\u00cen cadrul evalu\u0103rilor, CYGENT a dep\u0103\u0219it alte modele lingvistice de mari dimensiuni \u00een producerea de rezumate clare \u0219i utile. Sistemul a redus suprasolicitarea cognitiv\u0103, a sprijinit con\u0219tientizarea situa\u021biei \u00een timpul incidentelor reale \u0219i a permis luarea mai rapid\u0103 a deciziilor.<\/p><p>Acest caz ilustreaz\u0103 modul \u00een care AI poate transforma datele tehnice brute \u00een informa\u021bii accesibile. F\u0103c\u00e2nd jurnalele mai u\u0219or de interpretat, ajut\u0103 ap\u0103r\u0103torii s\u0103 se preg\u0103teasc\u0103 mai eficient, s\u0103 r\u0103spund\u0103 mai rapid \u0219i s\u0103 se recupereze cu o documenta\u021bie mai bun\u0103 dup\u0103 incidente.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-642d19a e-con-full e-flex e-con e-child\" data-id=\"642d19a\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-615af78 elementor-widget elementor-widget-marcs-collapsible-content\" data-id=\"615af78\" data-element_type=\"widget\" data-widget_type=\"marcs-collapsible-content.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"marcs-collapsible-wrapper\" data-widget-id=\"615af78\" data-default-state=\"closed\" data-animation-duration=\"300\">\n\t\t\t<div class=\"marcs-collapsible-heading-wrapper\">\n\t\t\t\t<div class=\"marcs-collapsible-heading\">\n\t\t\t\t\tLecturi suplimentare\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle\" role=\"button\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"marcs-collapsible-content-615af78\">\n\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-closed\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-opened\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<!-- First nested container: Content Area -->\n\t\t\t<div class=\"marcs-collapsible-content-area elementor-element elementor-element-d3b225a e-con-full e-flex e-con e-child\" data-id=\"d3b225a\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t\n\t\t\t<!-- Second nested container: Collapsible Content -->\n\t\t\t<div id=\"marcs-collapsible-content-615af78\" class=\"marcs-collapsible-content-wrapper marcs-collapsible-hidden elementor-element elementor-element-203b012 e-con-full e-flex e-con e-child\" data-id=\"203b012\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-06f217f elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"06f217f\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Seturi de date de rezumare CTI - <a href=\"https:\/\/doi.org\/10.48550\/arXiv.2408.06576\">\"CTISum: Un nou set de date de referin\u021b\u0103 pentru sumarizarea informa\u021biilor privind amenin\u021b\u0103rile cibernetice\" (Peng et al. 2024)<\/a><br> Lucrarea prezint\u0103 CTISum, un set de date pentru rezumarea rapoartelor de informa\u021bii privind amenin\u021b\u0103rile cibernetice (CTI), care permite rezumarea rapoartelor complexe de informa\u021bii pentru a ajuta ap\u0103r\u0103torii s\u0103 planifice \u0219i s\u0103 \u00eenregistreze mai eficient lec\u021biile \u00eenv\u0103\u021bate.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Extrac\u021bia TTP - <a href=\"https:\/\/doi.org\/10.1145\/3696427\">\"TTPXHunter: Extrac\u021bia de informa\u021bii despre amenin\u021b\u0103ri ac\u021bionabile ca TTP-uri din rapoarte finalizate privind amenin\u021b\u0103rile cibernetice\" (Rani et al. 2024)<\/a> <br> Lucrarea propune TTPXHunter, un instrument bazat pe NLP care extrage tacticile, tehnicile \u0219i procedurile atacatorilor (TTP) din rapoartele privind amenin\u021b\u0103rile pentru a \u00een\u021belege modul lor de operare, transform\u00e2nd informa\u021biile nestructurate \u00een rezumate structurate, utilizabile.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">NLP pentru analiza incidentelor - <a href=\"https:\/\/www.researchgate.net\/publication\/382917950_Natural_Language_Processing_for_Cybersecurity_Incident_Analysis\">\"Procesarea limbajului natural pentru analiza incidentelor de securitate cibernetic\u0103\" (Ogundairo &amp; Broklyn, 2024)<\/a> <br>Lucrarea analizeaz\u0103 aplica\u021biile NLP pentru analiza surselor de date nestructurate, cu tehnici NLP (de exemplu, recunoa\u0219terea entit\u0103\u021bilor, analiza sentimentelor, rezumarea, triajul bazat pe chatbot). Lucrarea constat\u0103 c\u0103 NLP poate automatiza raportarea incidentelor \u0219i rezumatele informa\u021biilor privind amenin\u021b\u0103rile, reduc\u00e2nd timpul de r\u0103spuns \u0219i \u00eembun\u0103t\u0103\u021bind documenta\u021bia post-incident.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-3480274304\" role=\"tabpanel\" aria-labelledby=\"data-classification\" data-tab-index=\"4\" style=\"--n-tabs-title-order: 4;\" class=\"elementor-element elementor-element-2dfdf682 e-con-full e-flex e-con e-child\" data-id=\"2dfdf682\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-62a0ac0c e-con-full e-flex e-con e-child\" data-id=\"62a0ac0c\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-74348399 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"74348399\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Clasificarea datelor<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cd12159 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"cd12159\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5451aafa elementor-widget elementor-widget-text-editor\" data-id=\"5451aafa\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Clasificarea datelor organizeaz\u0103 informa\u021biile \u00een func\u021bie de sensibilitatea acestora sau de cerin\u021bele de conformitate, asigur\u00e2ndu-se c\u0103 activele critice beneficiaz\u0103 de protec\u021bia adecvat\u0103.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5f91a7d0 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"5f91a7d0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cum schimb\u0103 AI clasificarea datelor:<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2ab2deb0 elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"2ab2deb0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>AI utilizeaz\u0103 procesarea limbajului natural pentru etichetarea automat\u0103 a con\u021binutului sensibil \u0219i detectarea datelor clasificate gre\u0219it sau expuse la scar\u0103 larg\u0103.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-dce-text-color=\"#E8EEFF\" class=\"elementor-element elementor-element-3e7eb85f elementor-widget__width-auto elementor-widget elementor-widget-text-editor\" data-id=\"3e7eb85f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Prevenire.<\/strong> Reduce expunerea accidental\u0103 a datelor sensibile.<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-dce-text-color=\"#E8EEFF\" class=\"elementor-element elementor-element-295f104a elementor-widget__width-auto elementor-widget elementor-widget-text-editor\" data-id=\"295f104a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Preg\u0103tire.<\/strong> Sprijin\u0103 conformitatea.<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-dce-background-color=\"#FFFFFF\" class=\"elementor-element elementor-element-1946bb24 e-con-full e-flex e-con e-child\" data-id=\"1946bb24\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-19abb30e elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"19abb30e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Caz eviden\u021biat: AI pentru clasificarea datelor sensibile<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-71ff510c elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"71ff510c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u00cen 2024, <a href=\"https:\/\/ceur-ws.org\/Vol-3643\/paper3.pdf\">De Renzis et al <\/a>a studiat modul \u00een care modelele lingvistice mari ar putea fi utilizate pentru a \u00eembun\u0103t\u0103\u021bi clasificarea informa\u021biilor sensibile. O provocare central\u0103 \u00een acest domeniu este faptul c\u0103 datele personale reale nu pot fi \u00eentotdeauna utilizate pentru instruire din cauza riscurilor legate de confiden\u021bialitate. Autorii au propus generarea de date de formare sintetice care reflect\u0103 \u00een continuare modelele categoriilor sensibile, cum ar fi s\u0103n\u0103tatea, politica sau religia.<\/p><p>Abordarea lor a permis instruirea clasificatorilor exac\u021bi f\u0103r\u0103 expunerea datelor reale ale utilizatorilor, demonstr\u00e2nd modul \u00een care AI poate ajuta organiza\u021biile s\u0103 respecte reglement\u0103ri precum GDPR, sporindu-\u0219i \u00een acela\u0219i timp capacitatea de a detecta \u0219i proteja informa\u021biile sensibile. Acest caz ilustreaz\u0103 modul \u00een care AI consolideaz\u0103 at\u00e2t prevenirea (prin reducerea expunerii accidentale a datelor), c\u00e2t \u0219i preg\u0103tirea (prin sprijinirea cadrelor de conformitate). \u00cen acela\u0219i timp, acesta subliniaz\u0103 importan\u021ba guvernan\u021bei \u0219i a valid\u0103rii pentru a garanta c\u0103 datele sintetice \u0219i modelele rezultate r\u0103m\u00e2n reprezentative \u0219i fiabile.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0f80863 e-con-full e-flex e-con e-child\" data-id=\"0f80863\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-aca4f78 elementor-widget elementor-widget-marcs-collapsible-content\" data-id=\"aca4f78\" data-element_type=\"widget\" data-widget_type=\"marcs-collapsible-content.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"marcs-collapsible-wrapper\" data-widget-id=\"aca4f78\" data-default-state=\"closed\" data-animation-duration=\"300\">\n\t\t\t<div class=\"marcs-collapsible-heading-wrapper\">\n\t\t\t\t<div class=\"marcs-collapsible-heading\">\n\t\t\t\t\tLecturi suplimentare\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle\" role=\"button\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"marcs-collapsible-content-aca4f78\">\n\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-closed\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-opened\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<!-- First nested container: Content Area -->\n\t\t\t<div class=\"marcs-collapsible-content-area elementor-element elementor-element-4b66049 e-con-full e-flex e-con e-child\" data-id=\"4b66049\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t\n\t\t\t<!-- Second nested container: Collapsible Content -->\n\t\t\t<div id=\"marcs-collapsible-content-aca4f78\" class=\"marcs-collapsible-content-wrapper marcs-collapsible-hidden elementor-element elementor-element-f8c541c e-con-full e-flex e-con e-child\" data-id=\"f8c541c\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-add1303 elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"add1303\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Etichetarea pe baz\u0103 de transformator a categoriilor GDPR - <a href=\"https:\/\/doi.org\/10.3390\/fi14080228\">\"Detectarea automat\u0103 a datelor sensibile utiliz\u00e2nd clasificatoare bazate pe transformatoare\" (Petrolini et al. 2022)<\/a><br> Acest studiu aplic\u0103 modelele AI pentru marcarea automat\u0103 a textului sensibil, care acoper\u0103 domenii precum politica, s\u0103n\u0103tatea, religia \u0219i sexualitatea, \u00een cadrul colec\u021biilor mari de documente. Acesta demonstreaz\u0103 c\u0103 abord\u0103rile bazate pe transformatoare pot clasifica \u00een mod fiabil astfel de date, sus\u021bin\u00e2nd conformitatea cu GDPR \u0219i permi\u021b\u00e2nd etichetarea automat\u0103 la scar\u0103 larg\u0103 pentru clasificarea datelor bazat\u0103 pe conformitate.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Analiza semantic\u0103 pentru detectarea automat\u0103 a datelor sensibile - <a href=\"https:\/\/doi.org\/10.1186\/s42400-018-0011-x\">\"Identificarea automat\u0103 a datelor sensibile din specifica\u021biile implicite ale utilizatorului (S3)\" (Yang &amp; Liang 2018)<\/a><br> Aceast\u0103 lucrare prezint\u0103 S3, un sistem care identific\u0103 datele sensibile din aplica\u021biile mobile prin analiza semanticii, mai degrab\u0103 dec\u00e2t baz\u00e2ndu-se pe cuvinte cheie. Prin \u00eenv\u0103\u021barea preferin\u021belor utilizatorilor \u00een materie de confiden\u021bialitate, sistemul ob\u021bine o precizie mai mare dec\u00e2t instrumentele tradi\u021bionale, ilustr\u00e2nd modul \u00een care AI poate adapta clasificarea datelor la contextele din lumea real\u0103. Studiul subliniaz\u0103 faptul c\u0103 sensibilitatea informa\u021biilor depinde at\u00e2t de contextul aplica\u021biei, c\u00e2t \u0219i de preferin\u021bele utilizatorului \u0219i c\u0103 o protec\u021bie eficient\u0103 \u00een era cloud necesit\u0103 mai \u00eent\u00e2i capacitatea de a identifica astfel de date.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-3480274305\" role=\"tabpanel\" aria-labelledby=\"anomaly-detection\" data-tab-index=\"5\" style=\"--n-tabs-title-order: 5;\" class=\"elementor-element elementor-element-7fb93d02 e-con-full e-flex e-con e-child\" data-id=\"7fb93d02\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-56c6ec e-con-full e-flex e-con e-child\" data-id=\"56c6ec\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7c5d609 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"7c5d609\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Detectarea anomaliilor la nivelul punctelor finale sau al re\u021belei<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3c77575e elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"3c77575e\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-172e19ac elementor-widget elementor-widget-text-editor\" data-id=\"172e19ac\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Detectarea anomaliilor monitorizeaz\u0103 punctele finale \u0219i traficul de re\u021bea pentru comportamente neobi\u0219nuite care pot indica compromiterea.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7e03e927 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"7e03e927\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cum schimb\u0103 AI detectarea anomaliilor la nivelul punctelor finale \u0219i al re\u021belelor:<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6e110dcd elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"6e110dcd\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>AI \u00eenva\u021b\u0103 cum arat\u0103 activitatea normal\u0103 \u0219i semnaleaz\u0103 abaterile care ar putea semnala o activitate r\u0103u inten\u021bionat\u0103. Spre deosebire de sistemele bazate pe semn\u0103turi, acesta poate detecta intruziuni mai subtile care scap\u0103 detec\u021biei tradi\u021bionale. AI permite un r\u0103spuns mai rapid \u0219i mai eficient la incidente prin prioritizarea alertelor \u0219i reducerea falselor alerte pozitive.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-dce-text-color=\"#E8EEFF\" class=\"elementor-element elementor-element-6eb78ef2 elementor-widget__width-auto elementor-widget elementor-widget-text-editor\" data-id=\"6eb78ef2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Preg\u0103tire.<\/strong> Stabile\u0219te liniile de baz\u0103 ale activit\u0103\u021bii normale.<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-dce-text-color=\"#E8EEFF\" class=\"elementor-element elementor-element-148acc6f elementor-widget__width-auto elementor-widget elementor-widget-text-editor\" data-id=\"148acc6f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>R\u0103spuns.<\/strong> Detecteaz\u0103 anomaliile \u00een timp real pentru a semnala \u0219i limita atacurile.<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-dce-background-color=\"#FFFFFF\" class=\"elementor-element elementor-element-5c840e71 e-con-full e-flex e-con e-child\" data-id=\"5c840e71\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-51f8235b elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"51f8235b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Caz eviden\u021biat: Utilizarea AI pentru detectarea anomaliilor \u00een sistemele critice<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3f3c9d31 elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"3f3c9d31\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u00cen 2024, <a href=\"https:\/\/www.researchgate.net\/publication\/386080149_AI-Driven_Anomaly_Detection_for_Proactive_Cybersecurity_and_Data_Breach_Prevention\">Nwoye \u0219i Nwagwughiagwu<\/a> a examinat modul \u00een care detectarea anomaliilor bazat\u0103 pe AI ar putea \u00eembun\u0103t\u0103\u021bi ap\u0103rarea cibernetic\u0103 a punctelor finale \u0219i a re\u021belelor. Folosind modele de \u00eenv\u0103\u021bare automat\u0103 formate pe modele normale de comportament al sistemului \u0219i de trafic de re\u021bea, abordarea lor le-a permis s\u0103 identifice abateri subtile pe care sistemele tradi\u021bionale bazate pe semn\u0103turi le-ar rata, inclusiv, de exemplu, semnele timpurii ale amenin\u021b\u0103rilor din interior \u0219i ale \u00eenc\u0103lc\u0103rii securit\u0103\u021bii datelor.<\/p><p>Studiul a prezentat exemple de caz din sectoare critice, ar\u0103t\u00e2nd c\u0103 detectarea anomaliilor cu ajutorul AI a redus timpii de r\u0103spuns \u0219i a contribuit la men\u021binerea continuit\u0103\u021bii activit\u0103\u021bii prin semnalarea activit\u0103\u021bilor suspecte \u00eenainte ca acestea s\u0103 provoace daune grave. Autorii au recunoscut, de asemenea, provoc\u0103rile, inclusiv falsurile pozitive \u0219i nevoia de transparen\u021b\u0103 \u00een modelele complexe AI. Acest caz demonstreaz\u0103 modul \u00een care AI contribuie at\u00e2t la preg\u0103tire (prin stabilirea unor linii de baz\u0103 ale activit\u0103\u021bii normale), c\u00e2t \u0219i la reac\u021bie (prin detectarea \u0219i prioritizarea anomaliilor \u00een timp real).<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0b4e166 e-con-full e-flex e-con e-child\" data-id=\"0b4e166\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e613577 elementor-widget elementor-widget-marcs-collapsible-content\" data-id=\"e613577\" data-element_type=\"widget\" data-widget_type=\"marcs-collapsible-content.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"marcs-collapsible-wrapper\" data-widget-id=\"e613577\" data-default-state=\"closed\" data-animation-duration=\"300\">\n\t\t\t<div class=\"marcs-collapsible-heading-wrapper\">\n\t\t\t\t<div class=\"marcs-collapsible-heading\">\n\t\t\t\t\tLecturi suplimentare\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle\" role=\"button\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"marcs-collapsible-content-e613577\">\n\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-closed\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-opened\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<!-- First nested container: Content Area -->\n\t\t\t<div class=\"marcs-collapsible-content-area elementor-element elementor-element-d32e1e7 e-con-full e-flex e-con e-child\" data-id=\"d32e1e7\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t\n\t\t\t<!-- Second nested container: Collapsible Content -->\n\t\t\t<div id=\"marcs-collapsible-content-e613577\" class=\"marcs-collapsible-content-wrapper marcs-collapsible-hidden elementor-element elementor-element-9f0a795 e-con-full e-flex e-con e-child\" data-id=\"9f0a795\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7d8c8a6 elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"7d8c8a6\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Detectarea anomaliilor bazat\u0103 pe GAN - <a href=\"https:\/\/arxiv.org\/abs\/2009.07769\">\"TadGAN: detectarea anomaliilor \u00een seriile de timp cu ajutorul re\u021belelor generatoare adver\u0219iale\" (Geiger et al. 2020)<\/a><br> Aceast\u0103 lucrare prezint\u0103 TadGAN, un cadru nesupravegheat care aplic\u0103 GAN-uri consecvente ciclului pentru a detecta anomalii \u00een datele seriilor de timp. Prin combinarea erorilor de reconstruc\u021bie cu ie\u0219irile critice, TadGAN genereaz\u0103 scoruri fiabile de anomalii \u0219i reduce falsurile pozitive. Testat pe 11 seturi de date de referin\u021b\u0103 din domenii, acesta a dep\u0103\u0219it \u00een mod constant metodele de ultim\u0103 or\u0103. Studiul arat\u0103 cum GAN-urile pot \u00eembun\u0103t\u0103\u021bi detectarea anomaliilor temporale subtile \u00een diverse sisteme din lumea real\u0103.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">\u00cenv\u0103\u021barea automat\u0103 pentru detectarea anomaliilor \u00een infrastructur\u0103 - <a href=\"https:\/\/dl.gi.de\/handle\/20.500.12116\/45143\">\"AI Defenders: Machine Learning Driven Anomaly Detection in Critical Infrastructures\" (Nebebe et al. 2024)<\/a><br> Aceast\u0103 lucrare compar\u0103 modelele de \u00eenv\u0103\u021bare automat\u0103 pentru detectarea anomaliilor \u00een infrastructurile critice, utiliz\u00e2nd date \u00een serii temporale de la un simulator de sistem hidraulic. Se face distinc\u021bia \u00eentre anomaliile punctuale (anomalii izolate) \u0219i anomaliile contextuale (abateri evidente doar \u00een context) \u0219i se compar\u0103 modele interpretabile simple (de exemplu, regresie logistic\u0103, arbori de decizie) cu modele mai complexe de tip black-box \u00een seturi de date coerente. Scopul este de a evalua care metode sunt cele mai eficiente \u00een contexte industriale din lumea real\u0103. Lucrarea subliniaz\u0103 faptul c\u0103, de\u0219i modelele complexe pot produce rate de detec\u021bie mai ridicate, metodele mai simple ofer\u0103 \u00een continuare avantaje \u00een ceea ce prive\u0219te interpretabilitatea \u0219i robuste\u021bea \u00een domeniile sensibile ale infrastructurii.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-3480274306\" role=\"tabpanel\" aria-labelledby=\"writing-analysis\" data-tab-index=\"6\" style=\"--n-tabs-title-order: 6;\" class=\"elementor-element elementor-element-33781d37 e-con-full e-flex e-con e-child\" data-id=\"33781d37\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-6ad48c1c e-con-full e-flex e-con e-child\" data-id=\"6ad48c1c\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2c54d1e2 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"2c54d1e2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Sarcini generale de redactare \u0219i de colectare\/analiz\u0103 a datelor<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-54ba2073 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"54ba2073\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6dde1cb5 elementor-widget elementor-widget-text-editor\" data-id=\"6dde1cb5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Opera\u021biunile defensive implic\u0103, de asemenea, redactarea, cercetarea \u0219i analiza extensiv\u0103 a datelor pentru documentarea incidentelor, fundamentarea deciziilor \u0219i formarea personalului.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-26c766a elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"26c766a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Modul \u00een care AI modific\u0103 sarcinile generale de scriere \u0219i de colectare sau analiz\u0103 a datelor:<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-47ba4100 elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"47ba4100\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>AI poate redacta rapoarte, politici \u0219i inform\u0103ri privind incidentele, u\u0219ur\u00e2nd sarcina administrativ\u0103 a anali\u0219tilor. Poate automatiza colectarea de informa\u021bii din surse deschise pentru exerci\u021bii, permi\u021b\u00e2nd studen\u021bilor \u0219i profesioni\u0219tilor s\u0103 se concentreze pe analize \u0219i strategii de nivel superior, \u00een locul sarcinilor repetitive.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-dce-text-color=\"#E8EEFF\" class=\"elementor-element elementor-element-26aaf561 elementor-widget__width-auto elementor-widget elementor-widget-text-editor\" data-id=\"26aaf561\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>R\u0103spuns.<\/strong> Sprijin\u0103 raportarea rapid\u0103 \u0219i cunoa\u0219terea situa\u021biei.<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-dce-text-color=\"#E8EEFF\" class=\"elementor-element elementor-element-7a2e16cd elementor-widget__width-auto elementor-widget elementor-widget-text-editor\" data-id=\"7a2e16cd\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Recuperare.<\/strong> Permite documentarea complet\u0103 post incident \u0219i lec\u021biile \u00eenv\u0103\u021bate.<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-dce-background-color=\"#FFFFFF\" class=\"elementor-element elementor-element-34606624 e-con-full e-flex e-con e-child\" data-id=\"34606624\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-17bd8f8a elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"17bd8f8a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Caz eviden\u021biat: Colectarea \u0219i raportarea automatizat\u0103 a informa\u021biilor<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-36065180 elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"36065180\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u00cen 2024, <a href=\"https:\/\/doi.org\/10.48550\/arXiv.2212.10388\">Gao et al<\/a>\u00a0a prezentat ThreatKG, un sistem alimentat de AI care colecteaz\u0103 automat informa\u021bii despre amenin\u021b\u0103rile cibernetice din surse deschise, extrage entit\u0103\u021bile cheie, cum ar fi actorii \u0219i vulnerabilit\u0103\u021bile, \u0219i le organizeaz\u0103 \u00eentr-un graf de cuno\u0219tin\u021be structurat. \u00cen loc ca anali\u0219tii s\u0103 citeasc\u0103 manual rapoarte lungi \u0219i nestructurate, sistemul ofer\u0103 o imagine de ansamblu consolidat\u0103 \u0219i care poate fi c\u0103utat\u0103. Acest lucru reduce sarcina administrativ\u0103 a opera\u021biunilor defensive, permite producerea mai rapid\u0103 a rapoartelor privind incidentele \u0219i \u00eembun\u0103t\u0103\u021be\u0219te cunoa\u0219terea situa\u021biei \u00een timpul amenin\u021b\u0103rilor active. Prin transformarea informa\u021biilor fragmentate \u00een informa\u021bii accesibile, ThreatKG permite personalului s\u0103 petreac\u0103 mai mult timp cu interpretarea \u0219i luarea deciziilor. Studiul ilustreaz\u0103 modul \u00een care AI poate remodela activitatea defensiv\u0103 de zi cu zi, f\u0103c\u00e2nd colectarea de informa\u021bii mai eficient\u0103 \u0219i mai util\u0103, subliniind \u00een acela\u0219i timp nevoia de supraveghere pentru a asigura acurate\u021bea \u0219i relevan\u021ba.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bb66e34 e-con-full e-flex e-con e-child\" data-id=\"bb66e34\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-37d3cdd elementor-widget elementor-widget-marcs-collapsible-content\" data-id=\"37d3cdd\" data-element_type=\"widget\" data-widget_type=\"marcs-collapsible-content.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"marcs-collapsible-wrapper\" data-widget-id=\"37d3cdd\" data-default-state=\"closed\" data-animation-duration=\"300\">\n\t\t\t<div class=\"marcs-collapsible-heading-wrapper\">\n\t\t\t\t<div class=\"marcs-collapsible-heading\">\n\t\t\t\t\tLecturi suplimentare\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle\" role=\"button\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"marcs-collapsible-content-37d3cdd\">\n\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-closed\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-opened\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<!-- First nested container: Content Area -->\n\t\t\t<div class=\"marcs-collapsible-content-area elementor-element elementor-element-0da8550 e-con-full e-flex e-con e-child\" data-id=\"0da8550\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t\n\t\t\t<!-- Second nested container: Collapsible Content -->\n\t\t\t<div id=\"marcs-collapsible-content-37d3cdd\" class=\"marcs-collapsible-content-wrapper marcs-collapsible-hidden elementor-element elementor-element-3017d61 e-con-full e-flex e-con e-child\" data-id=\"3017d61\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0422b87 elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"0422b87\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Implica\u021biile guvernan\u021bei, etice, juridice \u0219i sociale ale AI \u00een OSINT - <a href=\"https:\/\/doi.org\/10.1007\/s00146-023-01628-x\">\"Open Source Intelligence \u0219i AI: o analiz\u0103 sistematic\u0103\" (Ghioni et al. 2023)<\/a><br> Articolul trece \u00een revist\u0103 571 de studii privind AI \u00een OSINT, privind utilizarea AI \u00een informa\u021biile din surse deschise (OSINT), examin\u00e2nd guvernan\u021ba, implica\u021biile etice, juridice \u0219i sociale ale acesteia. Analiza constat\u0103 c\u0103 AI a extins capacit\u0103\u021bile OSINT prin \u00eenv\u0103\u021barea automat\u0103, extragerea de date \u0219i criminalistica vizual\u0103, dar a ridicat, de asemenea, preocup\u0103ri presante cu privire la confiden\u021bialitate, responsabilitate, p\u0103rtinire \u0219i utilizare abuziv\u0103. Autorii eviden\u021biaz\u0103 lacunele \u00een materie de reglementare, supraveghere \u0219i transparen\u021b\u0103, solicit\u00e2nd cadre mai solide pentru a se asigura c\u0103 OSINT bazat pe AI sprijin\u0103 opera\u021biunile de informa\u021bii f\u0103r\u0103 a submina drepturile, \u00eencrederea sau responsabilitatea democratic\u0103.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Generarea automat\u0103 a rapoartelor - <a href=\"https:\/\/doi.org\/10.48550\/arXiv.2310.02655\">\"AGIR: Automatizarea raport\u0103rii informa\u021biilor privind amenin\u021b\u0103rile cibernetice cu ajutorul gener\u0103rii de limbaj natural\" (Perrina et al. 2023)<\/a><br> Lucrarea prezint\u0103 AGIR, un sistem de generare a limbajului natural care creeaz\u0103 rapoarte CTI cuprinz\u0103toare din grafice formale de entit\u0103\u021bi. AGIR reduce timpul de redactare a rapoartelor cu mai mult de 40%, men\u021bin\u00e2nd \u00een acela\u0219i timp o acurate\u021be \u0219i o fluen\u021b\u0103 ridicate, demonstr\u00e2nd modul \u00een care AI poate automatiza sarcinile de redactare \u0219i analiz\u0103 a rapoartelor, eliber\u00e2nd anali\u0219tii pentru a se concentra asupra interpret\u0103rii \u0219i strategiei de nivel superior.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-3480274307\" role=\"tabpanel\" aria-labelledby=\"synthetic-data\" data-tab-index=\"7\" style=\"--n-tabs-title-order: 7;\" class=\"elementor-element elementor-element-7af9ec0d e-con-full e-flex e-con e-child\" data-id=\"7af9ec0d\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-4261140f e-con-full e-flex e-con e-child\" data-id=\"4261140f\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4d77b34d elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"4d77b34d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Generarea de date sintetice<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-59cd38ee elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"59cd38ee\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2ef7c049 elementor-widget elementor-widget-text-editor\" data-id=\"2ef7c049\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Generarea de date sintetice creeaz\u0103 seturi de date artificiale pentru instruire, testare sau simulare f\u0103r\u0103 a expune informa\u021bii sensibile din lumea real\u0103.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4bc6fa61 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"4bc6fa61\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cum schimb\u0103 AI generarea datelor sintetice:<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4ba9ff81 elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"4ba9ff81\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>AI poate produce trafic de re\u021bea realist sau e\u0219antioane de programe malware pentru utilizare \u00een laborator, poate umple golurile \u00een cazul \u00een care datele din lumea real\u0103 nu sunt disponibile \u0219i poate proteja confiden\u021bialitatea \u00een timp ce permite experimentarea. Acest lucru ajut\u0103 educatorii \u0219i ap\u0103r\u0103torii s\u0103 se preg\u0103teasc\u0103 pentru incidente reale f\u0103r\u0103 a risca expunerea datelor sensibile.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-dce-text-color=\"#E8EEFF\" class=\"elementor-element elementor-element-343df702 elementor-widget__width-auto elementor-widget elementor-widget-text-editor\" data-id=\"343df702\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Prevenire.<\/strong> Permite experimentarea \u00een siguran\u021b\u0103 f\u0103r\u0103 a expune informa\u021bii sensibile.<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-dce-text-color=\"#E8EEFF\" class=\"elementor-element elementor-element-19ff8cba elementor-widget__width-auto elementor-widget elementor-widget-text-editor\" data-id=\"19ff8cba\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Preg\u0103tire.<\/strong> Sprijin\u0103 instruirea \u0219i simularea cu seturi de date realiste.<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-dce-text-color=\"#E8EEFF\" class=\"elementor-element elementor-element-60acc920 elementor-widget__width-auto elementor-widget elementor-widget-text-editor\" data-id=\"60acc920\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Recuperare.<\/strong> Recreeaz\u0103 scenarii de atac pentru testarea \u0219i \u00eembun\u0103t\u0103\u021birea post-incident.<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-dce-background-color=\"#FFFFFF\" class=\"elementor-element elementor-element-39cad407 e-con-full e-flex e-con e-child\" data-id=\"39cad407\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-76c7b1c5 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"76c7b1c5\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Caz eviden\u021biat: Utilizarea GAN-urilor pentru producerea de date de formare sigure \u0219i realiste<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-732dcaf8 elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"732dcaf8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u00cen 2022, <a href=\"https:\/\/doi.org\/10.1109\/GLOBECOM48099.2022.10001494\">Nukavarapu et al<\/a>\u00a0a dezvoltat MirageNet, un cadru care utilizeaz\u0103 re\u021bele adversariale generative (GAN) pentru a crea un trafic de re\u021bea sintetic realist. Sistemul poate reproduce modele de trafic DNS \u0219i alte protocoale \u00eentr-un mod care seam\u0103n\u0103 foarte mult cu datele din lumea real\u0103, dar f\u0103r\u0103 a expune informa\u021bii sensibile din re\u021belele active.<\/p><p>Aceast\u0103 inova\u021bie este important\u0103 deoarece ap\u0103r\u0103torii \u0219i educatorii au adesea nevoie de date realiste pentru instruire, testare \u0219i experimentare, dar nu pot utiliza \u00eentotdeauna traficul opera\u021bional din motive de confiden\u021bialitate sau securitate. MirageNet permite simul\u0103ri sigure care preg\u0103tesc anali\u0219tii pentru atacuri reale, evit\u00e2nd \u00een acela\u0219i timp riscurile de divulgare. Utilizarea AI \u0219i, \u00een acest caz, a GAN-urilor, permite o experimentare mai sigur\u0103 \u0219i mai scalabil\u0103. \u00cen acela\u0219i timp, r\u0103m\u00e2ne important s\u0103 se valideze faptul c\u0103 datele sintetice reflect\u0103 cu adev\u0103rat condi\u021biile opera\u021bionale reale, asigur\u00e2ndu-se c\u0103 instruirea \u0219i testarea r\u0103m\u00e2n fiabile.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9868e72 e-con-full e-flex e-con e-child\" data-id=\"9868e72\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b8a7925 elementor-widget elementor-widget-marcs-collapsible-content\" data-id=\"b8a7925\" data-element_type=\"widget\" data-widget_type=\"marcs-collapsible-content.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"marcs-collapsible-wrapper\" data-widget-id=\"b8a7925\" data-default-state=\"closed\" data-animation-duration=\"300\">\n\t\t\t<div class=\"marcs-collapsible-heading-wrapper\">\n\t\t\t\t<div class=\"marcs-collapsible-heading\">\n\t\t\t\t\tLecturi suplimentare\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle\" role=\"button\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"marcs-collapsible-content-b8a7925\">\n\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-closed\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-opened\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<!-- First nested container: Content Area -->\n\t\t\t<div class=\"marcs-collapsible-content-area elementor-element elementor-element-30299e2 e-con-full e-flex e-con e-child\" data-id=\"30299e2\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t\n\t\t\t<!-- Second nested container: Collapsible Content -->\n\t\t\t<div id=\"marcs-collapsible-content-b8a7925\" class=\"marcs-collapsible-content-wrapper marcs-collapsible-hidden elementor-element elementor-element-20cb3f5 e-con-full e-flex e-con e-child\" data-id=\"20cb3f5\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5c30809 elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"5c30809\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">\u00cenv\u0103\u021bare profund\u0103 pentru modelarea sintetic\u0103 a traficului de re\u021bea - <a href=\"https:\/\/doi.org\/10.48550\/arXiv.2009.12740\">\"STAN: Generarea sintetic\u0103 a traficului de re\u021bea cu modele neuronale generative\" (Xu et al. 2021)<\/a><br> Lucrarea prezint\u0103 STAN (Synthetic network Traffic generation with Autoregressive Neural models), o arhitectur\u0103 neuronal\u0103 care modeleaz\u0103 at\u00e2t dependen\u021bele temporale, c\u00e2t \u0219i cele de atribut \u00een traficul de re\u021bea pentru a genera seturi de date realiste. Rezultatele arat\u0103 c\u0103 modelele de detectare a anomaliilor antrenate pe traficul sintetic al STAN au ob\u021binut o precizie aproape comparabil\u0103 cu cele antrenate pe date reale, demonstr\u00e2nd modul \u00een care \u00eenv\u0103\u021barea profund\u0103 permite seturi de date sintetice de \u00eenalt\u0103 calitate pentru formarea \u0219i simularea preg\u0103tirii, p\u0103str\u00e2nd \u00een acela\u0219i timp confiden\u021bialitatea.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Evaluarea metodelor sintetice de generare a traficului - <a href=\"https:\/\/doi.org\/10.48550\/arXiv.2410.16326\">\"Generarea datelor sintetice privind traficul \u00een re\u021bea: A Comparative Study\" (Ammara et al., 2025)<\/a><br> Studiul evalueaz\u0103 dou\u0103sprezece metode de generare a traficului sintetic, inclusiv abord\u0103ri statistice, clasice AI \u0219i generative AI, utiliz\u00e2nd seturi de date standard. Rezultatele arat\u0103 c\u0103 modelele bazate pe GAN ofer\u0103 o fidelitate \u0219i o utilitate superioare, \u00een timp ce metodele statistice men\u021bin echilibrul claselor, dar pierd complexitatea structural\u0103.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-3480274308\" role=\"tabpanel\" aria-labelledby=\"iam\" data-tab-index=\"8\" style=\"--n-tabs-title-order: 8;\" class=\"elementor-element elementor-element-7f370106 e-con-full e-flex e-con e-child\" data-id=\"7f370106\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-e8f1698 e-con-full e-flex e-con e-child\" data-id=\"e8f1698\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7911b5d1 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"7911b5d1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Gestionarea identit\u0103\u021bii \u0219i a accesului (IAM)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5c35df68 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"5c35df68\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-693ad18 elementor-widget elementor-widget-text-editor\" data-id=\"693ad18\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Gestionarea identit\u0103\u021bii \u0219i a accesului (IAM) garanteaz\u0103 c\u0103 numai utilizatorii autoriza\u021bi au acces corespunz\u0103tor la sisteme \u0219i resurse.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-78f251a0 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"78f251a0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cum schimb\u0103 AI gestionarea identit\u0103\u021bii \u0219i a accesului:<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-68fc5b4c elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"68fc5b4c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>AI consolideaz\u0103 IAM prin detectarea tiparelor de autentificare anormale care pot semnala utilizarea abuziv\u0103 a acredit\u0103rilor, recomand\u00e2nd politici de autentificare adaptive \u0219i automatiz\u00e2nd verific\u0103rile de rutin\u0103. \u00cen timpul incidentelor, acesta poate semnala rapid conturile compromise \u0219i poate declan\u0219a controale mai puternice pentru a limita amenin\u021b\u0103rile.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-dce-text-color=\"#E8EEFF\" class=\"elementor-element elementor-element-5936f6e0 elementor-widget__width-auto elementor-widget elementor-widget-text-editor\" data-id=\"5936f6e0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Prevenire.<\/strong> Aplic\u0103 o autentificare mai puternic\u0103 \u0219i reduce accesul neautorizat.<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-dce-text-color=\"#E8EEFF\" class=\"elementor-element elementor-element-7728f889 elementor-widget__width-auto elementor-widget elementor-widget-text-editor\" data-id=\"7728f889\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>R\u0103spuns.<\/strong> Se adapteaz\u0103 \u00een timp real \u00een cazul unei suspiciuni de utilizare necorespunz\u0103toare a acredit\u0103rii.<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-dce-background-color=\"#FFFFFF\" class=\"elementor-element elementor-element-355ae3a8 e-con-full e-flex e-con e-child\" data-id=\"355ae3a8\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-267ae09c elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"267ae09c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Caz eviden\u021biat: Detectarea accesului neobi\u0219nuit \u0219i necorespunz\u0103tor<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5f6a7b86 elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"5f6a7b86\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u00cen 2024, <a href=\"https:\/\/www.diva-portal.org\/smash\/get\/diva2:1943652\/FULLTEXT02.pdf\">V\u00e2nzare<\/a> a efectuat un studiu de prob\u0103 de concept privind aplicarea AI la sistemele IAM. Prin integrarea unui model de detectare a anomaliilor \u00eentr-o platform\u0103 IAM activ\u0103, sistemul a fost capabil s\u0103 semnaleze comportamentul neobi\u0219nuit de conectare \u0219i privilegiile de acces nepotrivite. Aceast\u0103 abordare permite organiza\u021biilor s\u0103 detecteze mai rapid conturile compromise sau utilizarea abuziv\u0103 din interior \u0219i s\u0103 adapteze dinamic politicile de autentificare atunci c\u00e2nd sunt detectate riscuri. Studiul a constatat c\u00e2\u0219tiguri clare de eficien\u021b\u0103, subliniind \u00een acela\u0219i timp nevoia permanent\u0103 de supraveghere uman\u0103 pentru a interpreta anomaliile semnalate \u0219i a evita perturb\u0103rile inutile. Prin urmare, AI permite consolidarea controlului zilnic al accesului \u0219i poate transforma IAM \u00eentr-o linie de ap\u0103rare mai adaptiv\u0103 \u0219i mai proactiv\u0103.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-985150d e-con-full e-flex e-con e-child\" data-id=\"985150d\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7a63260 elementor-widget elementor-widget-marcs-collapsible-content\" data-id=\"7a63260\" data-element_type=\"widget\" data-widget_type=\"marcs-collapsible-content.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"marcs-collapsible-wrapper\" data-widget-id=\"7a63260\" data-default-state=\"closed\" data-animation-duration=\"300\">\n\t\t\t<div class=\"marcs-collapsible-heading-wrapper\">\n\t\t\t\t<div class=\"marcs-collapsible-heading\">\n\t\t\t\t\tLecturi suplimentare\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle\" role=\"button\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"marcs-collapsible-content-7a63260\">\n\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-closed\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-opened\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<!-- First nested container: Content Area -->\n\t\t\t<div class=\"marcs-collapsible-content-area elementor-element elementor-element-bb2356b e-con-full e-flex e-con e-child\" data-id=\"bb2356b\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t\n\t\t\t<!-- Second nested container: Collapsible Content -->\n\t\t\t<div id=\"marcs-collapsible-content-7a63260\" class=\"marcs-collapsible-content-wrapper marcs-collapsible-hidden elementor-element elementor-element-7e76bf7 e-con-full e-flex e-con e-child\" data-id=\"7e76bf7\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bcb67cf elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"bcb67cf\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Auditul infrastructurilor critice - <a href=\"https:\/\/www.researchgate.net\/publication\/390929423_AI-Powered_IAM_Audit_for_Anomaly_Detection_in_Critical_Infrastructure\">\"AI-Powered IAM Audit for Anomaly Detection in Critical Infrastructure\" (Rodriguez et al. 2025)<\/a><br> Lucrarea propune un cadru de audit IAM bazat pe AI care combin\u0103 ingineria caracteristicilor, detectarea nesupravegheat\u0103 a anomaliilor \u0219i clasificarea supravegheat\u0103 pentru a analiza jurnalele IAM. Pe un set de date sintetic modelat dup\u0103 infrastructura critic\u0103, sistemul a ob\u021binut o rat\u0103 de detec\u021bie de 92%, cu o rat\u0103 de fals pozitive sub 3%. Rezultatele demonstreaz\u0103 modul \u00een care AI \u00eembun\u0103t\u0103\u021be\u0219te auditarea jurnalelor IAM, permi\u021b\u00e2nd detectarea proactiv\u0103 a amenin\u021b\u0103rilor din interior \u0219i a anomaliilor subtile de acces pe care metodele tradi\u021bionale le rateaz\u0103 adesea.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-3480274309\" role=\"tabpanel\" aria-labelledby=\"log-analysis\" data-tab-index=\"9\" style=\"--n-tabs-title-order: 9;\" class=\"elementor-element elementor-element-4da48b90 e-con-full e-flex e-con e-child\" data-id=\"4da48b90\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-f78d023 e-con-full e-flex e-con e-child\" data-id=\"f78d023\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-379f2404 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"379f2404\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Analiza jurnalului<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-63586dde elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"63586dde\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-601ab045 elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"601ab045\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Analiza jurnalelor examineaz\u0103 jurnalele de sistem \u0219i de securitate pentru a detecta, investiga \u0219i \u00een\u021belege incidentele.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-140b6275 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"140b6275\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cum schimb\u0103 AI analiza jurnalelor:<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1787a6dd elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"1787a6dd\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>AI poate procesa volume masive de jurnale \u00een timp real, eviden\u021bia secven\u021be neobi\u0219nuite de evenimente \u0219i genera rezumate concise. Acest lucru \u00eembun\u0103t\u0103\u021be\u0219te detectarea \u0219i permite predarea mai rapid\u0103 \u0219i simularea incidentelor.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-dce-text-color=\"#E8EEFF\" class=\"elementor-element elementor-element-11c22472 elementor-widget__width-auto elementor-widget elementor-widget-text-editor\" data-id=\"11c22472\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Preg\u0103tire.<\/strong> Stabile\u0219te liniile de baz\u0103 \u0219i identific\u0103 poten\u021bialele puncte slabe.<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-dce-text-color=\"#E8EEFF\" class=\"elementor-element elementor-element-40785102 elementor-widget__width-auto elementor-widget elementor-widget-text-editor\" data-id=\"40785102\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>R\u0103spuns.<\/strong> Accelereaz\u0103 investiga\u021biile \u0219i sprijin\u0103 gestionarea incidentelor \u00een timp real.<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-dce-text-color=\"#E8EEFF\" class=\"elementor-element elementor-element-63b0357a elementor-widget__width-auto elementor-widget elementor-widget-text-editor\" data-id=\"63b0357a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Recuperare.<\/strong> Informeaz\u0103 revizuirile \u0219i rapoartele post-incident.<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-dce-background-color=\"#FFFFFF\" class=\"elementor-element elementor-element-4c6b8e09 e-con-full e-flex e-con e-child\" data-id=\"4c6b8e09\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1a67221 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"1a67221\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Caz eviden\u021biat: Agen\u021bi AI pentru analizarea jurnalelor \u0219i descoperirea modelelor de amenin\u021b\u0103ri<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-64fcf552 elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"64fcf552\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u00cen 2025, <a href=\"https:\/\/doi.org\/10.48550\/arXiv.2509.05306\">Karaarslan et al<\/a>\u00a0a examinat modul \u00een care agen\u021bii AI ar putea sprijini analiza jurnalelor extinse generate de honeypots Cowrie. Honeypots-urile imit\u0103 \u00een mod deliberat sistemele vulnerabile pentru a atrage atacatorii, dar rezultatul este un volum cople\u0219itor de date brute care reprezint\u0103 o provocare pentru anali\u0219tii umani.<\/p><p>Cercet\u0103torii au ar\u0103tat c\u0103 agen\u021bii AI pot analiza \u0219i rezuma \u00een mod automat aceste jurnale, extr\u0103g\u00e2nd modele de atac recurente \u0219i gener\u00e2nd rapoarte concise. Aceast\u0103 automatizare reduce efortul manual, \u00eembun\u0103t\u0103\u021be\u0219te cunoa\u0219terea situa\u021biei \u0219i permite ap\u0103r\u0103torilor s\u0103 detecteze tendin\u021bele \u0219i s\u0103 ajusteze m\u0103surile de securitate mai rapid. Studiul ilustreaz\u0103 modul \u00een care AI poate transforma seturile de date greu de gestionat \u00een informa\u021bii utile, subliniind \u00een acela\u0219i timp necesitatea de a valida cu aten\u021bie rezultatele, astfel \u00eenc\u00e2t tacticile evolutive sau \u00een\u0219el\u0103toare ale adversarilor s\u0103 nu fie interpretate gre\u0219it.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7fab8e0 e-con-full e-flex e-con e-child\" data-id=\"7fab8e0\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b71c24a elementor-widget elementor-widget-marcs-collapsible-content\" data-id=\"b71c24a\" data-element_type=\"widget\" data-widget_type=\"marcs-collapsible-content.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"marcs-collapsible-wrapper\" data-widget-id=\"b71c24a\" data-default-state=\"closed\" data-animation-duration=\"300\">\n\t\t\t<div class=\"marcs-collapsible-heading-wrapper\">\n\t\t\t\t<div class=\"marcs-collapsible-heading\">\n\t\t\t\t\tLecturi suplimentare\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle\" role=\"button\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"marcs-collapsible-content-b71c24a\">\n\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-closed\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-opened\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<!-- First nested container: Content Area -->\n\t\t\t<div class=\"marcs-collapsible-content-area elementor-element elementor-element-28fdb7c e-con-full e-flex e-con e-child\" data-id=\"28fdb7c\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t\n\t\t\t<!-- Second nested container: Collapsible Content -->\n\t\t\t<div id=\"marcs-collapsible-content-b71c24a\" class=\"marcs-collapsible-content-wrapper marcs-collapsible-hidden elementor-element elementor-element-04be5b3 e-con-full e-flex e-con e-child\" data-id=\"04be5b3\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-77987ab elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"77987ab\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Analiza auto-supravegheat\u0103 a jurnalelor - <a href=\"https:\/\/doi.org\/10.48550\/arXiv.2203.10960\">\"AI-Driven Log Analysis Using Transformer Constructs\" (Pan 2023)<\/a><br> Acest studiu exploreaz\u0103 modul \u00een care AI poate sprijini analiza jurnalelor pentru detectarea \u0219i investigarea incidentelor. Folosind un model Transformer antrenat pe intr\u0103rile normale din jurnal, abordarea aplic\u0103 augmentarea jurnalului pentru \u00eenv\u0103\u021barea autosupravegheat\u0103 a caracteristicilor \u0219i apoi ajusteaz\u0103 modelul cu ajutorul \u00eenv\u0103\u021b\u0103rii prin consolidare pe un mic set de date etichetate. Rezultatele indic\u0103 faptul c\u0103 aceast\u0103 metod\u0103 poate dep\u0103\u0219i provoc\u0103rile legate de sursele eterogene de jurnale \u0219i de datele rare etichetate, fiind promi\u021b\u0103toare pentru implementarea practic\u0103 \u0219i real\u0103 \u00een opera\u021biunile de securitate cibernetic\u0103.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Analiza jurnalelor bazat\u0103 pe \u00eenv\u0103\u021barea profund\u0103 pentru detectarea intruziunilor - <a href=\"https:\/\/doi.org\/10.1016\/j.cose.2024.104222\">\"Clasificarea jurnalelor de evenimente de atacuri cibernetice utiliz\u00e2nd \u00eenv\u0103\u021barea profund\u0103 cu analiza semantic\u0103 a caracteristicilor\" (Alzu'bi et al. 2025)<\/a><br> Acest studiu propune un cadru bazat pe \u00eenv\u0103\u021barea profund\u0103 care utilizeaz\u0103 vectorizarea semantic\u0103 \u0219i \u00eencorpor\u0103rile BERT pentru a analiza jurnalele de evenimente pentru detectarea intruziunilor. Prin clasificarea jurnalelor pe tipuri de evenimente \u0219i atacuri cu AI explicabile, abordarea \u00eembun\u0103t\u0103\u021be\u0219te acurate\u021bea detect\u0103rii, ob\u021bin\u00e2nd peste 99% recall \u0219i precizie, \u0219i dep\u0103\u0219e\u0219te modelele existente.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-34802743010\" role=\"tabpanel\" aria-labelledby=\"malware-analysis\" data-tab-index=\"10\" style=\"--n-tabs-title-order: 10;\" class=\"elementor-element elementor-element-32dcb80 e-con-full e-flex e-con e-child\" data-id=\"32dcb80\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-7e5cf53 e-con-full e-flex e-con e-child\" data-id=\"7e5cf53\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-77b57bdc elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"77b57bdc\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Analiza programelor malware<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6d506f51 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"6d506f51\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1f9b5cc2 elementor-widget elementor-widget-text-editor\" data-id=\"1f9b5cc2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Analiza programelor malware investigheaz\u0103 programele malware pentru a \u00een\u021belege comportamentul, originea \u0219i impactul lor poten\u021bial.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-307d8179 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"307d8179\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cum schimb\u0103 AI analiza malware:<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-23226461 elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"23226461\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>AI accelereaz\u0103 clasificarea prin identificarea similitudinilor de cod \u00eentre familiile de programe malware \u0219i prin generarea de explica\u021bii ale execu\u021biei \u00een sandbox. Aceasta \u00eei ajut\u0103 pe anali\u0219ti s\u0103 \u00een\u021beleag\u0103 rapid modul \u00een care func\u021bioneaz\u0103 programele malware, sprijinind un r\u0103spuns mai rapid \u0219i atenu\u0103ri mai eficiente.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-dce-text-color=\"#E8EEFF\" class=\"elementor-element elementor-element-62f12026 elementor-widget__width-auto elementor-widget elementor-widget-text-editor\" data-id=\"62f12026\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>R\u0103spuns.<\/strong> Accelereaz\u0103 identificarea \u0219i izolarea programelor malware.<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-dce-text-color=\"#E8EEFF\" class=\"elementor-element elementor-element-65714625 elementor-widget__width-auto elementor-widget elementor-widget-text-editor\" data-id=\"65714625\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Recuperare.<\/strong> Contribuie la acumularea de cuno\u0219tin\u021be pentru viitoarele ap\u0103r\u0103ri.<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-dce-background-color=\"#FFFFFF\" class=\"elementor-element elementor-element-742eb9 e-con-full e-flex e-con e-child\" data-id=\"742eb9\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-78a4ba6 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"78a4ba6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Caz eviden\u021biat: Dezasamblare malware asistat\u0103 de AI<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1d945268 elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"1d945268\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u00cen 2025, <a href=\"https:\/\/doi.org\/10.48550\/arXiv.2504.07574\">Apvrille \u0219i Nakov<\/a> a evaluat R2AI, un plugin AI pentru dezasamblatorul Radare2, pe mostre recente de malware Linux \u0219i IoT. Sistemul integreaz\u0103 LLM-urile \u00een procesul de inginerie invers\u0103, ajut\u00e2nd anali\u0219tii s\u0103 descompun\u0103 func\u021bii, s\u0103 redenumeasc\u0103 variabile \u0219i s\u0103 identifice comportamente suspecte. Studiul lor a ar\u0103tat c\u0103 asisten\u021ba AI ar putea reduce timpul de analiz\u0103 de la c\u00e2teva zile la aproximativ jum\u0103tate, men\u021bin\u00e2nd \u00een acela\u0219i timp o calitate egal\u0103 sau mai bun\u0103 dec\u00e2t cea a analizelor efectuate exclusiv de oameni. De exemplu, \u00een cazul malware-ului Linux\/Devura, AI a dedus corect formate de argumente pe care anali\u0219tii umani nu le-au observat. Cu toate acestea, au r\u0103mas limit\u0103ri: modelele au produs ocazional halucina\u021bii, exager\u0103ri sau omisiuni \u0219i au necesitat validarea constant\u0103 de c\u0103tre exper\u021bi califica\u021bi. Constat\u0103rile sugereaz\u0103 c\u0103 dezasamblarea asistat\u0103 de AI este mai eficient\u0103 ca multiplicator de for\u021b\u0103, acceler\u00e2nd triajul \u0219i descoperind detaliile mai rapid, \u00een timp ce se bazeaz\u0103 \u00een continuare pe supravegherea uman\u0103 pentru a asigura acurate\u021bea \u0219i a evita interpret\u0103rile eronate.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-671714c e-con-full e-flex e-con e-child\" data-id=\"671714c\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ea4d306 elementor-widget elementor-widget-marcs-collapsible-content\" data-id=\"ea4d306\" data-element_type=\"widget\" data-widget_type=\"marcs-collapsible-content.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"marcs-collapsible-wrapper\" data-widget-id=\"ea4d306\" data-default-state=\"closed\" data-animation-duration=\"300\">\n\t\t\t<div class=\"marcs-collapsible-heading-wrapper\">\n\t\t\t\t<div class=\"marcs-collapsible-heading\">\n\t\t\t\t\tLecturi suplimentare\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle\" role=\"button\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"marcs-collapsible-content-ea4d306\">\n\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-closed\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-opened\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<!-- First nested container: Content Area -->\n\t\t\t<div class=\"marcs-collapsible-content-area elementor-element elementor-element-ada8024 e-con-full e-flex e-con e-child\" data-id=\"ada8024\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t\n\t\t\t<!-- Second nested container: Collapsible Content -->\n\t\t\t<div id=\"marcs-collapsible-content-ea4d306\" class=\"marcs-collapsible-content-wrapper marcs-collapsible-hidden elementor-element elementor-element-7674b26 e-con-full e-flex e-con e-child\" data-id=\"7674b26\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c2abbc3 elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"c2abbc3\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Segmentarea semantic\u0103 pentru clasificare - <a href=\"https:\/\/doi.org\/10.32604\/cmes.2025.061080\">\"Deep Learning cu segmentare semantic\u0103 pentru clasificarea programelor malware\" (Chen et al. 2025)<\/a><br> Studiul demonstreaz\u0103 c\u0103 aplicarea AI la p\u0103r\u021bi selectate din fi\u0219ierele malware, mai degrab\u0103 dec\u00e2t la secven\u021be \u00eentregi de fi\u0219iere, poate \u00eembun\u0103t\u0103\u021bi semnificativ performan\u021ba. Prin concentrarea asupra datelor de antet ale fi\u0219ierelor executabile portabile, modelul lor a ob\u021binut o precizie de 99,54% \u00een clasificarea familiilor de programe malware. Acest lucru sugereaz\u0103 c\u0103 \u021bintirea celor mai informative sec\u021biuni de cod permite detectarea mai rapid\u0103 \u0219i mai fiabil\u0103 a amenin\u021b\u0103rilor.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">\u00cenv\u0103\u021barea cu c\u00e2teva fotografii pentru malware nou - <a href=\"https:\/\/doi.org\/10.1016\/j.cose.2022.102887\">\"A few-shot malware classification approach for unknown family recognition using malware feature visualization\" (Conti et al. 2022)<\/a><br> Lucrarea propune utilizarea \u00eenv\u0103\u021b\u0103rii \u00een c\u00e2teva momente pentru a clasifica familiile de programe malware cu doar c\u00e2teva exemple, evit\u00e2nd necesitatea de a reantrena modelele ori de c\u00e2te ori apar programe malware noi. Prin vizualizarea binarelor malware ca imagini cu 3 canale \u0219i testarea a dou\u0103 arhitecturi (CSNN \u0219i Shallow-FS), studiul arat\u0103 o acurate\u021be ridicat\u0103 at\u00e2t \u00een clasificarea malware tradi\u021bional\u0103, c\u00e2t \u0219i \u00een cea nou\u0103. Acest lucru demonstreaz\u0103 poten\u021bialul abord\u0103rilor cu c\u00e2teva focare de a \u00eembun\u0103t\u0103\u021bi adaptabilitatea \u0219i viteza \u00een detectarea amenin\u021b\u0103rilor emergente.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-34802743011\" role=\"tabpanel\" aria-labelledby=\"training-labs\" data-tab-index=\"11\" style=\"--n-tabs-title-order: 11;\" class=\"elementor-element elementor-element-2e92139e e-con-full e-flex e-con e-child\" data-id=\"2e92139e\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-7e598b54 e-con-full e-flex e-con e-child\" data-id=\"7e598b54\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5e73c74a elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"5e73c74a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Formare \u0219i laboratoare<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5cf75f74 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"5cf75f74\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5fe07c66 elementor-widget elementor-widget-text-editor\" data-id=\"5fe07c66\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Laboratoarele \u0219i cursurile de formare ofer\u0103 medii controlate pentru exerci\u021bii \u0219i simul\u0103ri practice privind securitatea cibernetic\u0103.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-37e6d6c2 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"37e6d6c2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cum schimb\u0103 AI instruirea \u0219i laboratoarele:<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3791879d elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"3791879d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>AI poate genera scenarii de laborator dinamice adaptate progresului cursantului, poate crea provoc\u0103ri adaptive de dificultate variabil\u0103 \u0219i poate automatiza feedback-ul \u0219i evaluarea. Acest lucru permite o instruire mai realist\u0103 \u0219i scalabil\u0103.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-dce-text-color=\"#E8EEFF\" class=\"elementor-element elementor-element-21cc0925 elementor-widget__width-auto elementor-widget elementor-widget-text-editor\" data-id=\"21cc0925\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Preg\u0103tire.<\/strong> Consolidarea preg\u0103tirii prin simul\u0103ri adaptive.<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-dce-text-color=\"#E8EEFF\" class=\"elementor-element elementor-element-1fc426ad elementor-widget__width-auto elementor-widget elementor-widget-text-editor\" data-id=\"1fc426ad\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Recuperare.<\/strong> \u00cencorporeaz\u0103 lec\u021bii de incidente reale \u00een instruire.<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-dce-background-color=\"#FFFFFF\" class=\"elementor-element elementor-element-200258a6 e-con-full e-flex e-con e-child\" data-id=\"200258a6\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-675846ab elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"675846ab\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Caz eviden\u021biat: Poligoane cibernetice alimentate cu AI pentru instruire adaptiv\u0103<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5f8bc9d6 elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"5f8bc9d6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u00cen 2025, <a href=\"https:\/\/doi.org\/10.1080\/19361610.2025.2518383\">Sisodiya et al<\/a>a prezentat un poligon cibernetic alimentat cu AI, conceput pentru a \u00eembun\u0103t\u0103\u021bi realismul \u0219i eficien\u021ba form\u0103rii \u00een domeniul securit\u0103\u021bii cibernetice. Spre deosebire de laboratoarele statice tradi\u021bionale, platforma utilizeaz\u0103 AI pentru a ajusta dificultatea scenariilor \u00een func\u021bie de progresul cursan\u021bilor, pentru a injecta evenimente de atac realiste \u0219i pentru a oferi feedback automat.<\/p><p>Studiul a ar\u0103tat c\u0103 studen\u021bii instrui\u021bi \u00een acest mediu au ob\u021binut o precizie mai mare de detectare \u0219i au redus timpii de atenuare \u00een compara\u021bie cu abord\u0103rile conven\u021bionale. Pentru cadrele didactice, sistemul face posibil\u0103 extinderea exerci\u021biilor, personalizarea provoc\u0103rilor \u0219i \u00eencorporarea \u00een simul\u0103ri a lec\u021biilor din incidente reale.<\/p><p>Din punct de vedere tehnic, cercetarea a demonstrat, de asemenea, c\u0103 arhitecturile hibride, care combin\u0103 scalabilitatea cloud-ului cu fidelitatea sistemelor fizice, ofer\u0103 scenarii mai realiste \u0219i mai adaptabile. Concluziile eviden\u021biaz\u0103 modul \u00een care AI poate transforma formarea din exerci\u021bii fixe \u00een medii de \u00eenv\u0103\u021bare dinamice care preg\u0103tesc mai bine studen\u021bii \u0219i profesioni\u0219tii pentru amenin\u021b\u0103rile cibernetice reale.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c9a1270 e-con-full e-flex e-con e-child\" data-id=\"c9a1270\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cf5fc34 elementor-widget elementor-widget-marcs-collapsible-content\" data-id=\"cf5fc34\" data-element_type=\"widget\" data-widget_type=\"marcs-collapsible-content.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"marcs-collapsible-wrapper\" data-widget-id=\"cf5fc34\" data-default-state=\"closed\" data-animation-duration=\"300\">\n\t\t\t<div class=\"marcs-collapsible-heading-wrapper\">\n\t\t\t\t<div class=\"marcs-collapsible-heading\">\n\t\t\t\t\tLecturi suplimentare\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle\" role=\"button\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"marcs-collapsible-content-cf5fc34\">\n\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-closed\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-opened\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<!-- First nested container: Content Area -->\n\t\t\t<div class=\"marcs-collapsible-content-area elementor-element elementor-element-b643416 e-con-full e-flex e-con e-child\" data-id=\"b643416\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t\n\t\t\t<!-- Second nested container: Collapsible Content -->\n\t\t\t<div id=\"marcs-collapsible-content-cf5fc34\" class=\"marcs-collapsible-content-wrapper marcs-collapsible-hidden elementor-element elementor-element-4780fe7 e-con-full e-flex e-con e-child\" data-id=\"4780fe7\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-264405a elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"264405a\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Metode de formare \u00een domeniul securit\u0103\u021bii cibernetice - <a href=\"https:\/\/doi.org\/10.1016\/j.cose.2023.103585\">\"O revizuire sistematic\u0103 a metodelor actuale de formare \u00een domeniul securit\u0103\u021bii cibernetice\" (Pr\u00fcmmer et al. 2024)<\/a><br> Lucrarea arat\u0103 c\u0103 o gam\u0103 larg\u0103 de abord\u0103ri de formare \u00een domeniul securit\u0103\u021bii cibernetice, inclusiv metodele bazate pe jocuri, \u00eembun\u0103t\u0103\u021besc comportamentul utilizatorului final \u0219i rezultatele privind securitatea organiza\u021bional\u0103. Rezultatele eviden\u021biaz\u0103 eficacitatea programelor de formare structurate, dar dezv\u0103luie, de asemenea, provoc\u0103ri cum ar fi dimensiunile mici ale e\u0219antioanelor \u0219i modelele neexperimentale. Acest lucru subliniaz\u0103 valoarea integr\u0103rii AI \u00een formare \u0219i \u00een laboratoare pentru a scala interven\u021biile, a personaliza con\u021binutul \u0219i a genera exerci\u021bii adaptive care dep\u0103\u0219esc limitele metodelor tradi\u021bionale.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-34802743012\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-34802743012\" data-tab-index=\"12\" style=\"--n-tabs-title-order: 12;\" class=\"elementor-element elementor-element-be89b33 e-con-full e-flex e-con e-child\" data-id=\"be89b33\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-f6e41c9 e-con-full e-flex e-con e-child\" data-id=\"f6e41c9\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9199c70 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"9199c70\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\u00centreb\u0103ri pentru discu\u021bii<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-23c903c elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"23c903c\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b7b4e39 elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"b7b4e39\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Care faz\u0103 a ciclului de via\u021b\u0103 al incidentelor cibernetice (prevenire, preg\u0103tire, r\u0103spuns, recuperare) este cel mai probabil s\u0103 fie transformat\u0103 de AI \u00een viitor \u0219i care este faza \u00een care AI face cea mai mare diferen\u021b\u0103 \u00een prezent? Unde AI pare cel mai pu\u021bin eficient\u0103?<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Schimb\u0103 AI balan\u021ba puterii \u00een spa\u021biul cibernetic \u00een favoarea ap\u0103r\u0103torilor sau \u00eei ajut\u0103 mai ales pe atacatori s\u0103 p\u0103streze avantajul?<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Instrumentele AI cu surs\u0103 deschis\u0103 \u0219i disponibile pe scar\u0103 larg\u0103 vor echilibra terenul de joc pentru micii ap\u0103r\u0103tori sau sistemele brevetate avansate vor oferi \u00een continuare organiza\u021biilor mari un avantaj cov\u00e2r\u0219itor?<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Cum schimb\u0103 capacitatea AI de a automatiza detec\u021bia, triajul \u0219i r\u0103spunsul viteza \u0219i natura opera\u021biunilor defensive? Ar putea acest lucru s\u0103 fac\u0103 ca \"modelele SOC tradi\u021bionale\" s\u0103 devin\u0103 caduce?<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Ar putea ap\u0103r\u0103torii s\u0103 devin\u0103 prea dependen\u021bi de AI, ceea ce ar putea duce la apari\u021bia unor puncte oarbe \u00een cazul \u00een care modelele e\u0219ueaz\u0103, sunt otr\u0103vite sau sunt \u00een\u0219elate de intr\u0103rile adversarilor?<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Cine poart\u0103 r\u0103spunderea dac\u0103 sistemele AI trec cu vederea amenin\u021b\u0103ri critice sau fac recomand\u0103ri eronate: dezvoltatorii, organiza\u021biile de implementare sau anali\u0219tii umani care se bazeaz\u0103 pe ele?<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Cum ar trebui factorii de decizie politic\u0103 s\u0103 \u00eencurajeze utilizarea responsabil\u0103 a AI \u00een domeniul ap\u0103r\u0103rii f\u0103r\u0103 a sufoca inovarea sau a limita accesul educatorilor \u0219i al organiza\u021biilor mai mici?<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Pe m\u0103sur\u0103 ce at\u00e2t atacatorii, c\u00e2t \u0219i ap\u0103r\u0103torii adopt\u0103 AI, va evolua conflictul cibernetic \u00eentr-un concurs de \"ap\u0103rare autonom\u0103 vs. ofensiv\u0103 autonom\u0103\"?<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-34802743013\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-34802743013\" data-tab-index=\"13\" style=\"--n-tabs-title-order: 13;\" class=\"elementor-element elementor-element-a5f3d08 e-con-full e-flex e-con e-child\" data-id=\"a5f3d08\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-8e85a8a e-con-full e-flex e-con e-child\" data-id=\"8e85a8a\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7fac22a elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"7fac22a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Bibliografie<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d3ba4e4 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"d3ba4e4\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2524929 elementor-widget elementor-widget-text-editor\" data-id=\"2524929\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/www.zotero.org\/google-docs\/?R4KN1l\"><span style=\"font-weight: 400;\">Alzu'bi, Ahmad, Omar Darwish, Amjad Albashayreh \u0219i Yahya Tashtoush. \"Cyberattack Event Logs Classification Using Deep Learning with Semantic Feature Analysis\". <\/span><i><span style=\"font-weight: 400;\">Calculatoare \u0219i securitate<\/span><\/i><span style=\"font-weight: 400;\"> 150 (martie 2025): 104222. https:\/\/doi.org\/10.1016\/j.cose.2024.104222.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?R4KN1l\"><span style=\"font-weight: 400;\">Ammara, Dure Adan, Jianguo Ding \u0219i Kurt Tutschku. 'Synthetic Network Traffic Data Generation: A Comparative Study\". arXiv:2410.16326. Versiunea 2. Preprint, arXiv, 22 februarie 2025. https:\/\/doi.org\/10.48550\/arXiv.2410.16326.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?R4KN1l\"><span style=\"font-weight: 400;\">Balasubramanian, Prasasthy, Justin Seby \u0219i Panos Kostakos. 'CYGENT: A Cybersecurity Conversational Agent with Log Summarization Powered by GPT-3'. arXiv:2403.17160. Preprint, arXiv, 25 martie 2024. https:\/\/doi.org\/10.48550\/arXiv.2403.17160.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?R4KN1l\"><span style=\"font-weight: 400;\">Coppolino, Luigi, Antonio Iannaccone, Roberto Nardone \u0219i Alfredo Petruolo. \"Descoperirea activelor \u00een infrastructurile critice: An LLM-Based Approach\". <\/span><i><span style=\"font-weight: 400;\">Electronic\u0103<\/span><\/i><span style=\"font-weight: 400;\"> 14, nr. 16 (2025): 3267. https:\/\/doi.org\/10.3390\/electronics14163267.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?R4KN1l\"><span style=\"font-weight: 400;\">Gao, Peng, Xiaoyuan Liu, Edward Choi, Sibo Ma, Xinyu Yang \u0219i Dawn Song. ThreatKG: An AI-Powered System for Automated Open-Source Cyber Threat Intelligence Gathering and Management\". arXiv:2212.10388. Preprint, arXiv, 30 octombrie 2024. https:\/\/doi.org\/10.48550\/arXiv.2212.10388.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?R4KN1l\"><span style=\"font-weight: 400;\">Geiger, Alexander, Dongyu Liu, Sarah Alnegheimish, Alfredo Cuesta-Infante \u0219i Kalyan Veeramachaneni. \"TadGAN: Time Series Anomaly Detection Using Generative Adversarial Networks\". arXiv:2009.07769. Preprint, arXiv, 14 noiembrie 2020. https:\/\/doi.org\/10.48550\/arXiv.2009.07769.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?R4KN1l\"><span style=\"font-weight: 400;\">Ghioni, Riccardo, Mariarosaria Taddeo \u0219i Luciano Floridi. \"Open Source Intelligence and AI: A Systematic Review of the GELSI Literature\". <\/span><i><span style=\"font-weight: 400;\">Ai \u0219i societatea<\/span><\/i><span style=\"font-weight: 400;\">, 28 ianuarie 2023, 1-16. https:\/\/doi.org\/10.1007\/s00146-023-01628-x.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?R4KN1l\"><span style=\"font-weight: 400;\">Humran, Hael Abdulhakim Ali \u0219i Ferdi Sonmez. \"Code Vulnerability Detection Across Different Programming Languages with AI Models\". arXiv:2508.11710. Preprint, arXiv, 14 august 2025. https:\/\/doi.org\/10.48550\/arXiv.2508.11710.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?R4KN1l\"><span style=\"font-weight: 400;\">Karaarslan, Enis, Esin G\u00fcler, Efe Emir Y\u00fcce \u0219i Cagatay Coban. 'Towards Log Analysis with AI Agents: Cowrie Case Study'. arXiv:2509.05306. Preprint, arXiv, 22 august 2025. https:\/\/doi.org\/10.48550\/arXiv.2509.05306.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?R4KN1l\"><span style=\"font-weight: 400;\">Nebebe, Betelhem, Pavlina Kr\u00f6ckel, Romarick Yatagha, Natasha Edeh \u0219i Karl Waedt. \"AI Defenders: Machine Learning Driven Anomaly Detection in Critical Infrastructures\". Gesellschaft f\u00fcr Informatik e.V., 2024, 1917-27. https:\/\/dl.gi.de\/handle\/20.500.12116\/45143.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?R4KN1l\"><span style=\"font-weight: 400;\">Nukavarapu, Santosh Kumar, Mohammed Ayyat \u0219i Tamer Nadeem. \"MirageNet - C\u0103tre un cadru bazat pe GAN pentru generarea sintetic\u0103 a traficului de re\u021bea\". <\/span><i><span style=\"font-weight: 400;\">GLOBECOM 2022 - Conferin\u021ba global\u0103 de comunica\u021bii IEEE 2022<\/span><\/i><span style=\"font-weight: 400;\">, IEEE, 4 decembrie 2022, 3089-95. https:\/\/doi.org\/10.1109\/GLOBECOM48099.2022.10001494.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?R4KN1l\"><span style=\"font-weight: 400;\">Nwoye, Chukwujekwu Charles \u0219i Stephen Nwagwughiagwu. \"AI-Driven Anomaly Detection for Proactive Cybersecurity and Data Breach Prevention\". <\/span><i><span style=\"font-weight: 400;\">Revista interna\u021bional\u0103 de cercetare \u0219i management \u00een domeniul tehnologiei inginere\u0219ti<\/span><\/i><span style=\"font-weight: 400;\"> 8, nr. 11 (2024): 339-56.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?R4KN1l\"><span style=\"font-weight: 400;\">Ogundairo, Obaloluwa \u0219i Peter Broklyn. <\/span><i><span style=\"font-weight: 400;\">Procesarea limbajului natural pentru analiza incidentelor de securitate cibernetic\u0103<\/span><\/i><span style=\"font-weight: 400;\">. 2024.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?R4KN1l\"><span style=\"font-weight: 400;\">Peng, Wei, Junmei Ding, Wei Wang, et al. \"CTISum: A New Benchmark Dataset For Cyber Threat Intelligence Summarization\". arXiv:2408.06576. Preprint, arXiv, 30 iunie 2025. https:\/\/doi.org\/10.48550\/arXiv.2408.06576.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?R4KN1l\"><span style=\"font-weight: 400;\">Perrina, Filippo, Francesco Marchiori, Mauro Conti \u0219i Nino Vincenzo Verde. AGIR: Automatizarea raport\u0103rii informa\u021biilor privind amenin\u021b\u0103rile cibernetice cu ajutorul gener\u0103rii de limbaj natural\". arXiv:2310.02655. Preprint, arXiv, 4 octombrie 2023. https:\/\/doi.org\/10.48550\/arXiv.2310.02655.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?R4KN1l\"><span style=\"font-weight: 400;\">Petrolini, Michael, Stefano Cagnoni \u0219i Monica Mordonini. \"Detectarea automat\u0103 a datelor sensibile cu ajutorul clasificatorilor pe baz\u0103 de transformatoare\" (Automatic Detection of Sensitive Data Using Transformer- Based Classifiers). <\/span><i><span style=\"font-weight: 400;\">Internetul viitorului<\/span><\/i><span style=\"font-weight: 400;\"> 14, nr. 8 (2022): 228. https:\/\/doi.org\/10.3390\/fi14080228.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?R4KN1l\"><span style=\"font-weight: 400;\">Rani, Nanda, Bikash Saha, Vikas Maurya \u0219i Sandeep Kumar Shukla. \"TTPXHunter: Actionable Threat Intelligence Extraction as TTPs from Finished Cyber Threat Reports\". <\/span><i><span style=\"font-weight: 400;\">Amenin\u021b\u0103ri digitale: Cercetare \u0219i practic\u0103<\/span><\/i><span style=\"font-weight: 400;\"> 5, nr. 4 (2024): 1\u201319. https:\/\/doi.org\/10.1145\/3696427.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?R4KN1l\"><span style=\"font-weight: 400;\">Rodriguez, David, Sarah Lee, Joshua Wilson \u0219i Sadis Bello. <\/span><i><span style=\"font-weight: 400;\">AI-Powered IAM Audit pentru detectarea anomaliilor \u00een infrastructurile critice<\/span><\/i><span style=\"font-weight: 400;\">. 18 aprilie 2025.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?R4KN1l\"><span style=\"font-weight: 400;\">Selling, Felix. \"Avansarea gestion\u0103rii identit\u0103\u021bii \u0219i accesului cu ajutorul inteligen\u021bei artificiale pentru detectarea anomaliilor: A Proof of Concept Implementation Study\". 2024.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?R4KN1l\"><span style=\"font-weight: 400;\">Xu, Shengzhe, Manish Marwah, Martin Arlitt \u0219i Naren Ramakrishnan. \"STAN: Synthetic Network Traffic Generation with Generative Neural Models\". arXiv:2009.12740. Preprint, arXiv, 3 august 2021. https:\/\/doi.org\/10.48550\/arXiv.2009.12740.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?R4KN1l\"><span style=\"font-weight: 400;\">Yang, Ziqi \u0219i Zhenkai Liang. \"Automated Identification of Sensitive Data from Implicit User Specification\". <\/span><i><span style=\"font-weight: 400;\">Securitatea cibernetic\u0103<\/span><\/i><span style=\"font-weight: 400;\"> 1, nr. 1 (2018): 13. https:\/\/doi.org\/10.1186\/s42400-018-0011-x.<\/span><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-04c0475 e-flex e-con-boxed e-con e-parent\" data-id=\"04c0475\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-84feb62 elementor-widget elementor-widget-html\" data-id=\"84feb62\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<script>\n\/\/ Script to handle click simulation based on class-to-ID matching\ndocument.addEventListener('DOMContentLoaded', function() {\n    \/\/ Add click event listener to the document (event delegation)\n    document.addEventListener('click', function(event) {\n        let currentElement = event.target;\n        \n        \/\/ Traverse up the DOM tree to find an element with a class matching an ID\n        while (currentElement && currentElement !== document.body) {\n            \/\/ Get all classes from the current element\n            const classes = currentElement.classList;\n            \n            \/\/ Check each class to see if there's a matching ID element\n            for (let className of classes) {\n                \/\/ Check if an element exists with an ID matching this class\n                const matchingElement = document.getElementById(className);\n                \n                if (matchingElement) {\n                    \/\/ Find the tab-activator container\n                    const tabActivator = document.getElementById('tab-activator');\n                    \n                    if (tabActivator) {\n                        \/\/ Scroll to the tab-activator container smoothly\n                        tabActivator.scrollIntoView({ \n                            behavior: 'smooth', \n                            block: 'start' \n                        });\n                        \n                        \/\/ Wait a bit for scroll to complete, then simulate click\n                        setTimeout(function() {\n                            \/\/ Simulate click on the element with ID matching the class\n                            if (matchingElement) {\n                                matchingElement.click();\n                            }\n                        }, 300); \/\/ Small delay to allow scroll to complete\n                    } else {\n                        \/\/ If tab-activator doesn't exist, just click the matching element\n                        matchingElement.click();\n                    }\n                    \n                    \/\/ Only process the first matching class to avoid multiple clicks\n                    return;\n                }\n            }\n            \n            \/\/ Move up to the parent element\n            currentElement = currentElement.parentElement;\n        }\n    });\n});\n\n\n<\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>AI \u00een ap\u0103rarea cibernetic\u0103 Cum schimb\u0103 AI ap\u0103rarea cibernetic\u0103 de-a lungul ciclului de via\u021b\u0103 al incidentelor cibernetice Home AI \u00een ap\u0103rarea cibernetic\u0103 AI \u00een infrac\u021biunile cibernetice Ap\u0103rarea cibernetic\u0103 are drept scop protejarea sistemelor, re\u021belelor \u0219i datelor \u00eempotriva infiltr\u0103rii, perturb\u0103rii sau distrugerii. Ciclul de via\u021b\u0103 al incidentelor cibernetice ofer\u0103 o modalitate util\u0103 de a \u00een\u021belege ap\u0103rarea cibernetic\u0103, defalc\u00e2nd-o \u00een patru faze: [...]<\/p>","protected":false},"author":1,"featured_media":55699,"parent":61455,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","inline_featured_image":false,"footnotes":""},"class_list":["post-61459","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/virtual-routes.org\/ro\/wp-json\/wp\/v2\/pages\/61459","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/virtual-routes.org\/ro\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/virtual-routes.org\/ro\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/virtual-routes.org\/ro\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/virtual-routes.org\/ro\/wp-json\/wp\/v2\/comments?post=61459"}],"version-history":[{"count":20,"href":"https:\/\/virtual-routes.org\/ro\/wp-json\/wp\/v2\/pages\/61459\/revisions"}],"predecessor-version":[{"id":62932,"href":"https:\/\/virtual-routes.org\/ro\/wp-json\/wp\/v2\/pages\/61459\/revisions\/62932"}],"up":[{"embeddable":true,"href":"https:\/\/virtual-routes.org\/ro\/wp-json\/wp\/v2\/pages\/61455"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/virtual-routes.org\/ro\/wp-json\/wp\/v2\/media\/55699"}],"wp:attachment":[{"href":"https:\/\/virtual-routes.org\/ro\/wp-json\/wp\/v2\/media?parent=61459"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}