Protecting Modbus/TCP-Based Industrial Automation and Control Systems Using Message Authentication Codes
2022 45th Jubilee International Convention on Information, Communication and Electronic Technology (MIPRO)
Use of a non-peer reviewed sources in cyber-security scientific research
Predicting Vulnerabilities in Web Applications Based on Website Security Model
Analysis of the Design Space for Cybersecurity Visualizations in VizSec
Off-the-Shelf Solutions as Potential Cyber Threats to Industrial Environments and Simple-To-Implement Protection Methodology
CYBER ATTACKS Modern battles: you hit me with IP packet, I you with a rocket
Detecting network applications using firewall logs
Systematic review of automatic translation of high- level security policy into firewall rules
Enhancing Modbus/TCP-Based Industrial Automation and Control Systems Cybersecurity Using a Misuse- Based Intrusion Detection System
Automatically generating models of IT systems
2021 44th International Convention on Information, Communication and Electronic Technology (MIPRO)
A Survey on Applications of Formal Methods in Analysis of SCADA Systems
A Critical View on CIS Controls
Confidential Computing as an Attempt to Secure Service Provider's Confidential Client Data in a Multi-Tenant Cloud Environment
Review of National and International Cybersecurity Exercises Conducted in 2019
2020 43rd International Convention on Information, Communication and Electronic Technology (MIPRO)
Systematic Review and Quantitative Comparison of Cyberattack Scenario Detection and Projection
Red Teams - Pentesters, APTs, or Neither
Security Risk Optimization for Multi-cloud Applications
42nd International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)
41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)
40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)
Android-Powered Web Server for Volunteer-Based Environment Sensing
38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)
Benu: Operating System Increments for Embedded Systems Engineer’s Education
37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), 2014
Security analysis of Croatia’s receipt registration and verification system
Determining Autonomous Systems Reputation based on DNS measurements
Complex Systems and Risk Management
Security risk assessment of TeamViewer application
Testing task schedulers on Linux system
Testing Task Schedulers on Linux System
Decreasing Security Risks within the Information Infrastructure based on Risk Level Assessment
A method for identifying Web applications
StudTest – A Platform Supporting Complex and Interactive Knowledge Assessment
Using Trust on the Internet
Load Balancing MPI Algorithm for High Throughput Applications
Detecting Vulnerabilities in Web Applications by Clustering Web Pages
Evaluation of Tools for Assessing Web Applications
Implementation of Certificate Based Authentication in IKEv2 Protocol
Architecture of an IKEv2 Protocol Implementation
Nescume - A System for Managing Student Assignments
Distance Learning System Based on Service Oriented Architecture
WODLS - A Web Oriented Distance Learning System
Modeling and Simulation of a Hard Real-Time Processor
An Experimental Workflow System in Business Automation
A Simple and Effective Method for Developing Web Applications
Automated Generation of VHDL Behavioral Models for Testing Purposes
VHDL-Based Modeling of a Hard Real-Time Task Processor
Behavioral and Structural Modeling of a Real-Time Processor
Teaching
University undergraduate
- Computer Security (Lecturer in charge)
- Computer Security (Lecturer in charge)
- BSc Thesis (Lectures)
- BSc Thesis (Lectures)
- Final BSc Thesis (Lectures)
- Project C (Lectures)
- Software Design Project (Lectures)
- Software Design Project (Lectures)
- Software Design Project (Lectures)
University graduate
- Communication Security (Lecturer in charge)
- Offensive Security (Lecturer in charge)
- Operating Systems and Applications Security (Lecturer in charge)
- Protection and Security of Information Systems (Lecturer in charge)
- SCADA Systems (Lecturer in charge)
- Security Threats on the Internet (Lecturer in charge)
- Graduation Thesis (Lectures)
- Graduation Thesis (Lectures)
- Project (Lectures)
- Project (Lectures)
- Project (Lectures)
- Project (Lectures)
- Seminar 1 (Lectures)
- Seminar 2 (Lectures)
Postgraduate spec. study
- Fundamentals of Information security (Lecturer in charge)
- Security of computer networks (Lecturer in charge)
Competences
-
Computers and information processing
Internet security Network security Computer security Application security Authentication Cloud computing security Computer crime Computer hacking Cyber espionage Cyber warfare Cyberattack Denial-of-service attack Firewalls (computing) Honey pot (computing) Internet security Mobile security Penetration testing Permission Phishing Botnet Internet security Bot (Internet) Botnet Internet security -
Engineering management
Security management Research and development management -
Industry applications
Security Digital signatures Information security Network security Security management -
Communications technology
Communication system security Network security Internet security Mobile security -
Professional communication
Information security