izv. prof. dr. sc. Stjepan Groš

Associate professor, Department of Electronics, Microelectronics, Computer and Intelligent Systems

Location:
Public phone number:
6129-952
Internal phone number:
452

Comparative Analysis of Anomaly Detection Approaches in Firewall Logs: Integrating Light-Weight Synthesis of Security Logs and Artificially Generated Attack Detection

Komadina, Adrian; Kovačević, Ivan; Štengl, Bruno; Groš, Stjepan
2024.
Sensors

Comparing Threshold Selection Methods for Network Anomaly Detection

Komadina, Adrian; Martinić, Mislav; Groš, Stjepan; Mihajlović, Željka
2024.
IEEE access

Devising Framework for Assessing Usability of Cybersecurity Solutions in Industrial Automation and Control Systems

Katulić, Filip; Sumina, Damir; Groš, Stjepan; Erceg, Igor;
2024.

Devising Framework for Assessing Usability of Cybersecurity Solutions in Industrial Automation and Control Systems

Katulić, Filip; Sumina, Damir; Groš, Stjepan; Erceg, Igor;
2024.

Enhancing Industrial Automation and Control Systems Cybersecurity Using Endpoint Detection and Response Tools

Katulić, Filip; Groš, Stjepan; Sumina, Damir; Erceg, Igor:
2024.

2024 47th MIPRO ICT and Electronics Convention (MIPRO) : Proceedings


2024.

Protecting Modbus/TCP-Based Industrial Automation and Control Systems Using Message Authentication Codes

Katulić, Filip ; Sumina, Damir ; Groš, Stjepan ; Erceg, Igor
2023.
IEEE access

MIPRO 2023 : 46th MIPRO ICT and Electronics Convention (MIPRO): Proceedings


2023.

Detecting Anomalies in Firewall Logs Using Artificially Generated Attacks

Komadina, Adrian; Kovačević, Ivan; Groš, Stjepan
2023.

Towards a Method for Evaluating Realism of Randomly Generated Models of IT Systems

Kovačević, Ivan; Groš, Stjepan
2023.

JavaScript Library Version Detection

Pagon, Vilim; Skendrovć, Bruno; Kovačević, Ivan; Groš, Stjepan
2023.

Detecting JavaScript libraries using identifiers and hashes

Lončarević, Saša; Skendrović, Bruno; Kovačević, Ivan; Groš, Stjepan
2023.

Detection and Analysis of Obfuscated and Minified JavaScript in the Croatian Web Space

Dujmović, Toni; Skendrović, Bruno; Kovačević, Ivan; Groš, Stjepan
2023.

Light-Weight Synthesis of Security Logs for Evaluation of Anomaly Detection and Security Related Experiments

Kovačević, Ivan; Komadina, Adrian; Groš, Stjepan
2023.

2023 46th ICT and Electronics Convention (MIPRO)


2023.

Off-the-Shelf Solutions as Potential Cyber Threats to Industrial Environments and Simple-To-Implement Protection Methodology

Slunjski, Marko ; Sumina, Damir ; Groš, Stjepan ; Erceg, Igor
2022.
IEEE access

CYBER ATTACKS Modern battles: you hit me with IP packet, I you with a rocket

Patricija Turkalj, Stjepan Groš, Marko Rakar, Damir Delija,
2022.

2022 45th Jubilee International Convention on Information, Communication and Electronic Technology (MIPRO)


2022.

Systematic review of automatic translation of high- level security policy into firewall rules

Kovačević, Ivan ; Štengl, Bruno ; Groš, Stjepan
2022.

Analysis of the Design Space for Cybersecurity Visualizations in VizSec

Komadina, Adrian ; Mihajlović, Željka ; Groš, Stjepan
2022.

Predicting Vulnerabilities in Web Applications Based on Website Security Model

Kovacevic, Ivan; Marovic, Mihael; Gros, Stjepan; Vukovic, Marin
2022.

Predicting Vulnerabilities in Web Applications Based on Website Security Model

Kovačević, Ivan ; Marović, Mihael ; Groš, Stjepan ; Vuković, Marin
2022.

Use of a non-peer reviewed sources in cyber-security scientific research

Gernhardt, D. ; Gros, S.
2022.

Automatically generating models of IT systems

Kovačević, Ivan ; Groš, Stjepan ; Đerek, Ante
2022.
IEEE access

Detecting network applications using firewall logs

Adrian Komadina, Mihael Marović, Stjepan Groš
2022.

Enhancing Modbus/TCP-Based Industrial Automation and Control Systems Cybersecurity Using a Misuse- Based Intrusion Detection System

Katulić, Filip ; Sumina, Damir ; Erceg, Igor ; Groš, Stjepan
2022.

Confidential Computing as an Attempt to Secure Service Provider's Confidential Client Data in a Multi-Tenant Cloud Environment

Novković, Bojan ; Božić, Anita ; Golub, Marin ; Groš, Stjepan
2021.

2021 44th International Convention on Information, Communication and Electronic Technology (MIPRO): Proceedings


2021.

Review of National and International Cybersecurity Exercises Conducted in 2019

Brajdić, Ivona ; Kovačević, Ivan ; Groš, Stjepan
2021.

A Critical View on CIS Controls

Groš, Stjepan
2021.

A Survey on Applications of Formal Methods in Analysis of SCADA Systems

Mihael Marović, Ante Đerek, Stjepan Groš
2021.

Systematic Review and Quantitative Comparison of Cyberattack Scenario Detection and Projection

Kovačević, Ivan ; Groš, Stjepan ; Slovenec, Karlo
2020.
Electronics (Basel)

Security Risk Optimization for Multi-cloud Applications

Lovrenčić, Rudolf ; Jakobović, Domagoj ; Škvorc, Dejan ; Groš, Stjepan
2020.

2020 43rd International Convention on Information, Communication and Electronic Technology (MIPRO)


2020.

Red Teams - Pentesters, APTs, or Neither

Kovačević, Ivan ; Groš, Stjepan
2020.

42nd International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)


2019.

41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)


2018.

40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)


2017.

2016 39th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) : Proceedings


2016.

38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)


2015.

Android-Powered Web Server for Volunteer-Based Environment Sensing

Škvorc, Dejan ; Oršić, Marin ; Groš, Stjepan
2015.

Application vulnerability and exploit analysis

Kuman, Stipe
2014.

Developing environment for testing Groningen tool

Ratkaj, Marko
2014.

A process for conducting forensic analysis of Android operating system

Šimić, Valerija
2014.

system for collecting data from Web browser and its analysis using machine learning

Jukić, Filip
2014.

Customization of OpenWRT Linux distribution for the use in the Terastream architecture.

Alilović, Petar
2014.

Feasibility study of connecting OSSIM tool with tools for machine learning and statistical analysis.

Dino Sulić
2014.

2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) : Proceedings


2014.

A system for software quality estimation based on Bugzilla entries

Pereglin, Domagoj
2014.

Benu: Operating System Increments for Embedded Systems Engineer’s Education

Jelenković, Leonardo ; Jakobović, Domagoj ; Groš, Stjepan
2014.

Improvement of a system for determining autonomous system reputation based on BGP traffic

Matetić, Luka
2014.

Security analysis of Croatia’s receipt registration and verification system

Groš, Stjepan
2013.

Improvement of permission management on Android operating system.

Osvald, Denis
2013.

Building sandbox for executing and monitoring unknown applications

Kurtović, Frane
2013.

Network traffic flow within Linux kernel

Humić, Bruno
2012.

Generating and replying network traffic for testing IPTables rules

Kovačević, Goran
2012.

Determining Autonomous Systems Reputation based on DNS measurements

Groš, Stjepan ; Stublić, Mislav ; Jelenković, Leonardo
2012.

Monitoring network traffic within Linux operating system kernel

Alilović, Petar
2012.

Complex Systems and Risk Management

Groš, Stjepan
2011.

Tor Anonymity Network and Reputation Systems

Salkić, Marko
2011.

Security risk assessment of TeamViewer application

Groš, Stjepan
2011.

Determination of Autonomous Systems Reputation Based on Unwanted Traffic Monitoring

Eklić, Domagoj
2011.

Modification of TCP Protocol to Support Quality of Service

Varga, Ivan
2011.

Determination of Autonomous Systems Reputation Based on BGP Traffic

Dejdar, Tomislav
2011.

Testing task schedulers on Linux system

Jelenković, Leonardo ; Groš, Stjepan ; Jakobović, Domagoj
2010.

Testing Task Schedulers on Linux System

Jelenković, Leonardo ; Groš, Stjepan ; Jakobović, Domagoj
2010.

Adding MOBIKE support into IKEv2 implementation

Dimjašević, Marko
2010.

TOR Protocol Simulator

Šipka, Ivan
2010.

Determining Autonomous Systems Reputation based on DNS measurements

Stublić, Mislav
2010.

Spam Based Determination of Autonomous Systems Reputation

Friščić, Tomislav
2010.

A method for identifying Web applications

Kozina, Mario ; Golub, Marin ; Groš, Stjepan
2009.
International Journal of Information Security

Decreasing Security Risks within the Information Infrastructure based on Risk Level Assessment

Groš, Stjepan
2009.

Managing IPsec subsystem on Linux using NETLINK interface

Dukić, Dalibor
2009.

Key exchange for SRTP based on DTLS

Vladić, Martin
2008.

Using Trust on the Internet

Groš, Stjepan ; Golub, Marin ; Glavinić, Vlado
2008.

Distributed Intrusion Detection System

Požgaj, Igor
2008.

StudTest – A Platform Supporting Complex and Interactive Knowledge Assessment

Glavinić, Vlado ; Čupić, Marko ; Groš, Stjepan
2008.
International journal: emerging technologies in learning

Load Balancing MPI Algorithm for High Throughput Applications

Grudenić, Igor ; Groš, Stjepan ; Bogunović Nikola
2008.

Detecting Vulnerabilities in Web Applications by Clustering Web Pages

Suhina, Vanja ; Groš, Stjepan ; Kalafatić, Zoran
2008.

Architecture of an IKEv2 Protocol Implementation

Groš, Stjepan ; Glavinić, Vlado
2007.

Test Editing System Based on the Eclipse Development Environment

Slaviček, Hrvoje
2007.

Interface for Using the Lusca System from the Eclipse Development Environment

Nežić, Dražen
2007.

Certificate based authentication in IKEv2 protocol

Kukec, Ana
2007.

Implementation of the LUSCA System for Testing Network Applications

Rastić, Jure
2007.

Implementation of Certificate Based Authentication in IKEv2 Protocol

Kukec, Ana ; Groš, Stjepan ; Glavinić, Vlado
2007.

Evaluation of Tools for Assessing Web Applications

Suhina, Vanja ; Kozina, Mario ; Groš, Stjepan
2007.

AJAX Web Application Security

Zeman, Matija
2007.

Extensible Authentication Protocol in IKEv2 Environment

Vučak, Jelena
2007.

Automatic Web Application Detection

Kozina, Mario
2007.

Nescume - A System for Managing Student Assignments

Glavinić, Vlado ; Čupić, Marko ; Groš, Stjepan
2005.

Distance Learning System Based on Service Oriented Architecture

Groš, Stjepan
2004.

WODLS - A Web Oriented Distance Learning System

Glavinić, Vlado ; Čupić, Marko ; Groš, Stjepan
2004.

Modeling and Simulation of a Hard Real-Time Processor

Glavinić, Vlado ; Groš, Stjepan ; Colnarič, Matjaž
2000.
CIT. Journal of computing and information technology

An Experimental Workflow System in Business Automation

Glavinić, Vlado ; Poljak, Joško ; Groš, Stjepan
2000.

A Simple and Effective Method for Developing Web Applications

Glavinić, Vlado ; Groš, Stjepan ; Poljak, Joško
2000.

VHDL-Based Modeling of a Hard Real-Time Task Processor

Glavinić, Vlado ; Groš, Stjepan ; Colnarič, Matjaž
1999.

Automated Generation of VHDL Behavioral Models for Testing Purposes

Glavinić, Vlado ; Groš, Stjepan ; Colnarič, Matjaž
1999.

Behavioral and Structural Modeling of a Real-Time Processor

Groš, Stjepan
1998.

Teaching

University undergraduate

University graduate

Postgraduate doctoral study programme

Postgraduate spec. study

Competences

  • Computers and information processing
    Internet security Network security Computer security Application security Authentication Cloud computing security Computer crime Computer hacking Cyber espionage Cyber warfare Cyberattack Denial-of-service attack Firewalls (computing) Honey pot (computing) Internet security Mobile security Penetration testing Permission Phishing Botnet Internet security Bot (Internet) Botnet Internet security
  • Engineering management
    Security management Research and development management 
  • Industry applications
    Security Digital signatures Information security Network security Security management
  • Communications technology
    Communication system security Network security Internet security Mobile security
  • Professional communication
    Information security

Personal data

Personal web page:
Graduation year:
1998.
mr.sc. graduation year:
2004.
PhD graduation year:
2009.
Employed in this institution since:
1999.