Comparative Analysis of Anomaly Detection Approaches in Firewall Logs: Integrating Light-Weight Synthesis of Security Logs and Artificially Generated Attack Detection
Comparing Threshold Selection Methods for Network Anomaly Detection
Devising Framework for Assessing Usability of Cybersecurity Solutions in Industrial Automation and Control Systems
Devising Framework for Assessing Usability of Cybersecurity Solutions in Industrial Automation and Control Systems
Enhancing Industrial Automation and Control Systems Cybersecurity Using Endpoint Detection and Response Tools
2024 47th MIPRO ICT and Electronics Convention (MIPRO) : Proceedings
Protecting Modbus/TCP-Based Industrial Automation and Control Systems Using Message Authentication Codes
MIPRO 2023 : 46th MIPRO ICT and Electronics Convention (MIPRO): Proceedings
Detecting Anomalies in Firewall Logs Using Artificially Generated Attacks
Towards a Method for Evaluating Realism of Randomly Generated Models of IT Systems
JavaScript Library Version Detection
Detecting JavaScript libraries using identifiers and hashes
Detection and Analysis of Obfuscated and Minified JavaScript in the Croatian Web Space
Light-Weight Synthesis of Security Logs for Evaluation of Anomaly Detection and Security Related Experiments
2023 46th ICT and Electronics Convention (MIPRO)
Off-the-Shelf Solutions as Potential Cyber Threats to Industrial Environments and Simple-To-Implement Protection Methodology
CYBER ATTACKS Modern battles: you hit me with IP packet, I you with a rocket
2022 45th Jubilee International Convention on Information, Communication and Electronic Technology (MIPRO)
Systematic review of automatic translation of high- level security policy into firewall rules
Analysis of the Design Space for Cybersecurity Visualizations in VizSec
Predicting Vulnerabilities in Web Applications Based on Website Security Model
Predicting Vulnerabilities in Web Applications Based on Website Security Model
Use of a non-peer reviewed sources in cyber-security scientific research
Automatically generating models of IT systems
Detecting network applications using firewall logs
Enhancing Modbus/TCP-Based Industrial Automation and Control Systems Cybersecurity Using a Misuse- Based Intrusion Detection System
Confidential Computing as an Attempt to Secure Service Provider's Confidential Client Data in a Multi-Tenant Cloud Environment
2021 44th International Convention on Information, Communication and Electronic Technology (MIPRO): Proceedings
Review of National and International Cybersecurity Exercises Conducted in 2019
A Critical View on CIS Controls
A Survey on Applications of Formal Methods in Analysis of SCADA Systems
Systematic Review and Quantitative Comparison of Cyberattack Scenario Detection and Projection
Security Risk Optimization for Multi-cloud Applications
2020 43rd International Convention on Information, Communication and Electronic Technology (MIPRO)
Red Teams - Pentesters, APTs, or Neither
42nd International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)
41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)
40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)
2016 39th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) : Proceedings
38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)
Android-Powered Web Server for Volunteer-Based Environment Sensing
Application vulnerability and exploit analysis
Developing environment for testing Groningen tool
A process for conducting forensic analysis of Android operating system
system for collecting data from Web browser and its analysis using machine learning
Customization of OpenWRT Linux distribution for the use in the Terastream architecture.
Feasibility study of connecting OSSIM tool with tools for machine learning and statistical analysis.
2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) : Proceedings
A system for software quality estimation based on Bugzilla entries
Benu: Operating System Increments for Embedded Systems Engineer’s Education
Improvement of a system for determining autonomous system reputation based on BGP traffic
Security analysis of Croatia’s receipt registration and verification system
Improvement of permission management on Android operating system.
Building sandbox for executing and monitoring unknown applications
Network traffic flow within Linux kernel
Generating and replying network traffic for testing IPTables rules
Determining Autonomous Systems Reputation based on DNS measurements
Monitoring network traffic within Linux operating system kernel
Complex Systems and Risk Management
Tor Anonymity Network and Reputation Systems
Security risk assessment of TeamViewer application
Determination of Autonomous Systems Reputation Based on Unwanted Traffic Monitoring
Modification of TCP Protocol to Support Quality of Service
Determination of Autonomous Systems Reputation Based on BGP Traffic
Testing task schedulers on Linux system
Testing Task Schedulers on Linux System
Adding MOBIKE support into IKEv2 implementation
TOR Protocol Simulator
Determining Autonomous Systems Reputation based on DNS measurements
Spam Based Determination of Autonomous Systems Reputation
A method for identifying Web applications
Decreasing Security Risks within the Information Infrastructure based on Risk Level Assessment
Managing IPsec subsystem on Linux using NETLINK interface
Key exchange for SRTP based on DTLS
Using Trust on the Internet
Distributed Intrusion Detection System
StudTest – A Platform Supporting Complex and Interactive Knowledge Assessment
Load Balancing MPI Algorithm for High Throughput Applications
Detecting Vulnerabilities in Web Applications by Clustering Web Pages
Architecture of an IKEv2 Protocol Implementation
Test Editing System Based on the Eclipse Development Environment
Interface for Using the Lusca System from the Eclipse Development Environment
Certificate based authentication in IKEv2 protocol
Implementation of the LUSCA System for Testing Network Applications
Implementation of Certificate Based Authentication in IKEv2 Protocol
Evaluation of Tools for Assessing Web Applications
AJAX Web Application Security
Extensible Authentication Protocol in IKEv2 Environment
Automatic Web Application Detection
Nescume - A System for Managing Student Assignments
Distance Learning System Based on Service Oriented Architecture
WODLS - A Web Oriented Distance Learning System
Modeling and Simulation of a Hard Real-Time Processor
An Experimental Workflow System in Business Automation
A Simple and Effective Method for Developing Web Applications
VHDL-Based Modeling of a Hard Real-Time Task Processor
Automated Generation of VHDL Behavioral Models for Testing Purposes
Behavioral and Structural Modeling of a Real-Time Processor
Teaching
University undergraduate
- Competitive skills in cybersecurity (Lecturer in charge, Lecturer in charge)
- Computer Security (Lecturer in charge)
- Computer Security (Lecturer in charge)
- BSc Thesis (Lecturers)
- BSc Thesis (Lecturers)
- Final BSc Thesis (Lecturers)
- Project C (Lecturers)
- Software Design Project (Lecturers)
- Software Design Project (Lecturers)
- Software Design Project (Lecturers)
University graduate
- Communication Security (Lecturer in charge)
- Offensive Security (Lecturer in charge)
- Operating Systems and Applications Security (Lecturer in charge)
- Protection and Security of Information Systems (Lecturer in charge)
- SCADA Systems (Lecturer in charge)
- Security Threats on the Internet (Lecturer in charge)
- Graduation Thesis (Lecturers)
- Graduation Thesis (Lecturers)
- Project (Lecturers)
- Project (Lecturers)
- Project (Lecturers)
- Project (Lecturers)
- Seminar 1 (Lecturers)
- Seminar 2 (Lecturers)
Postgraduate doctoral study programme
- Application of artificial intelligence in cyber security (Lecturer in charge)
- Sigurnost operacijskih sustava i aplikacija (Lecturer in charge)
Postgraduate spec. study
- Fundamentals of Information security (Lecturer in charge)
- Security of computer networks (Lecturer in charge)
Competences
-
Computers and information processing
Internet security Network security Computer security Application security Authentication Cloud computing security Computer crime Computer hacking Cyber espionage Cyber warfare Cyberattack Denial-of-service attack Firewalls (computing) Honey pot (computing) Internet security Mobile security Penetration testing Permission Phishing Botnet Internet security Bot (Internet) Botnet Internet security -
Engineering management
Security management Research and development management -
Industry applications
Security Digital signatures Information security Network security Security management -
Communications technology
Communication system security Network security Internet security Mobile security -
Professional communication
Information security