Threat model for IEC 61850 based substation automation system
Innovating Cyber Defense with Tactical Simulators for Management-Level Incident Response
Threat model for IEC 61850 based substation automation system
2024 47th MIPRO ICT and Electronics Convention (MIPRO) : Proceedings
Comparing Threshold Selection Methods for Network Anomaly Detection
Devising Framework for Assessing Usability of Cybersecurity Solutions in Industrial Automation and Control Systems
Comparative Analysis of Anomaly Detection Approaches in Firewall Logs: Integrating Light-Weight Synthesis of Security Logs and Artificially Generated Attack Detection
Enhancing Industrial Automation and Control Systems Cybersecurity Using Endpoint Detection and Response Tools
Devising Framework for Assessing Usability of Cybersecurity Solutions in Industrial Automation and Control Systems
2023 46th ICT and Electronics Convention (MIPRO)
Simulation based education system for cyber incident response
Detecting JavaScript libraries using identifiers and hashes
Detection and Analysis of Obfuscated and Minified JavaScript in the Croatian Web Space
Protecting Modbus/TCP-Based Industrial Automation and Control Systems Using Message Authentication Codes
Detecting Anomalies in Firewall Logs Using Artificially Generated Attacks
Light-Weight Synthesis of Security Logs for Evaluation of Anomaly Detection and Security Related Experiments
JavaScript Library Version Detection
MIPRO 2023 : 46th MIPRO ICT and Electronics Convention (MIPRO): Proceedings
Towards a Method for Evaluating Realism of Randomly Generated Models of IT Systems
2022 45th Jubilee International Convention on Information, Communication and Electronic Technology (MIPRO)
Enhancing Modbus/TCP-Based Industrial Automation and Control Systems Cybersecurity Using a Misuse- Based Intrusion Detection System
CYBER ATTACKS Modern battles: you hit me with IP packet, I you with a rocket
Automatically generating models of IT systems
Detecting network applications using firewall logs
Systematic review of automatic translation of high- level security policy into firewall rules
Predicting Vulnerabilities in Web Applications Based on Website Security Model
Off-the-Shelf Solutions as Potential Cyber Threats to Industrial Environments and Simple-To-Implement Protection Methodology
Predicting Vulnerabilities in Web Applications Based on Website Security Model
Use of a non-peer reviewed sources in cyber-security scientific research
Analysis of the Design Space for Cybersecurity Visualizations in VizSec
A Critical View on CIS Controls
Confidential Computing as an Attempt to Secure Service Provider's Confidential Client Data in a Multi-Tenant Cloud Environment
2021 44th International Convention on Information, Communication and Electronic Technology (MIPRO): Proceedings
Review of National and International Cybersecurity Exercises Conducted in 2019
A Survey on Applications of Formal Methods in Analysis of SCADA Systems
Security Risk Optimization for Multi-cloud Applications
2020 43rd International Convention on Information, Communication and Electronic Technology (MIPRO)
Red Teams - Pentesters, APTs, or Neither
Systematic Review and Quantitative Comparison of Cyberattack Scenario Detection and Projection
42nd International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)
41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)
40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)
2016 39th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) : Proceedings
38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)
Android-Powered Web Server for Volunteer-Based Environment Sensing
Feasibility study of connecting OSSIM tool with tools for machine learning and statistical analysis.
system for collecting data from Web browser and its analysis using machine learning
Improvement of a system for determining autonomous system reputation based on BGP traffic
A process for conducting forensic analysis of Android operating system
Developing environment for testing Groningen tool
Application vulnerability and exploit analysis
2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) : Proceedings
Benu: Operating System Increments for Embedded Systems Engineer’s Education
Customization of OpenWRT Linux distribution for the use in the Terastream architecture.
A system for software quality estimation based on Bugzilla entries
Security analysis of Croatia’s receipt registration and verification system
Building sandbox for executing and monitoring unknown applications
Improvement of permission management on Android operating system.
Generating and replying network traffic for testing IPTables rules
Monitoring network traffic within Linux operating system kernel
Network traffic flow within Linux kernel
Determining Autonomous Systems Reputation based on DNS measurements
Modification of TCP Protocol to Support Quality of Service
Tor Anonymity Network and Reputation Systems
Security risk assessment of TeamViewer application
Determination of Autonomous Systems Reputation Based on BGP Traffic
Complex Systems and Risk Management
Determination of Autonomous Systems Reputation Based on Unwanted Traffic Monitoring
Determining Autonomous Systems Reputation based on DNS measurements
Spam Based Determination of Autonomous Systems Reputation
Testing task schedulers on Linux system
TOR Protocol Simulator
Testing Task Schedulers on Linux System
Adding MOBIKE support into IKEv2 implementation
A method for identifying Web applications
Smanjenje sigurnosnih rizika informacijske infrastrukture zasnovano na vrednovanju razine prijetnje
Managing IPsec subsystem on Linux using NETLINK interface
Detecting Vulnerabilities in Web Applications by Clustering Web Pages
Using Trust on the Internet
Distributed Intrusion Detection System
Key exchange for SRTP based on DTLS
StudTest – A Platform Supporting Complex and Interactive Knowledge Assessment
Load Balancing MPI Algorithm for High Throughput Applications
AJAX Web Application Security
Evaluation of Tools for Assessing Web Applications
Certificate based authentication in IKEv2 protocol
Test Editing System Based on the Eclipse Development Environment
Implementation of the LUSCA System for Testing Network Applications
Interface for Using the Lusca System from the Eclipse Development Environment
Extensible Authentication Protocol in IKEv2 Environment
Automatic Web Application Detection
Architecture of an IKEv2 Protocol Implementation
Implementation of Certificate Based Authentication in IKEv2 Protocol
Nescume - A System for Managing Student Assignments
WODLS - A Web Oriented Distance Learning System
Distance Learning System Based on Service Oriented Architecture
Modeling and Simulation of a Hard Real-Time Processor
A Simple and Effective Method for Developing Web Applications
An Experimental Workflow System in Business Automation
Automated Generation of VHDL Behavioral Models for Testing Purposes
VHDL-Based Modeling of a Hard Real-Time Task Processor
Behavioral and Structural Modeling of a Real-Time Processor
Teaching
University undergraduate
- Competitive skills in cybersecurity (Lecturer in charge, Lecturer in charge)
- Computer Security (Lecturer in charge)
- Computer Security (Lecturer in charge)
- BSc Thesis (Lecturers)
- BSc Thesis (Lecturers)
- Final BSc Thesis (Lecturers)
- Project C (Lecturers)
- Software Design Project (Lecturers)
- Software Design Project (Lecturers)
- Software Design Project (Lecturers)
University graduate
- Communication Security (Lecturer in charge)
- Communication Security (Lecturer in charge)
- Offensive Security (Lecturer in charge)
- Operating Systems and Applications Security (Lecturer in charge)
- Protection and Security of Information Systems (Lecturer in charge)
- SCADA Systems (Lecturer in charge)
- Security Threats on the Internet (Lecturer in charge)
- Master Project (Lecturers)
- Mentorship Seminar (Lecturers)
- Presentation Seminar (Lecturers)
- Project (Lecturers)
Postgraduate doctoral study programme
- Application of artificial intelligence in cyber security (Lecturer in charge)
- Sigurnost operacijskih sustava i aplikacija (Lecturer in charge)
Postgraduate spec. study
- Fundamentals of Information security (Lecturer in charge)
- Managing security risks (Lecturer in charge)
- Security of computer networks (Lecturer in charge)
Competences
-
Computers and information processing
Internet security Network security Computer security Application security Authentication Cloud computing security Computer crime Computer hacking Cyber espionage Cyber warfare Cyberattack Denial-of-service attack Firewalls (computing) Honey pot (computing) Internet security Mobile security Penetration testing Permission Phishing Botnet Internet security Bot (Internet) Botnet Internet security -
Engineering management
Security management Research and development management -
Industry applications
Security Digital signatures Information security Network security Security management -
Communications technology
Communication system security Network security Internet security Mobile security -
Professional communication
Information security
Pristupačnost