Na FER-u postoji više zaposlenika s imenom
Improving monolithic kernel security and robustness through intra-kernel sandboxing
SoK: Secure Memory Allocation
Confidential Computing as an Attempt to Secure Service Provider's Confidential Client Data in a Multi-Tenant Cloud Environment
Optimizing physical protection system using domain experienced exploration method
Hyper-heuristic Approach for Improving Marker Efficiency
Stabile Usage of Export Regulatory Standards in Data Security Process
Evolutionary Hyper-heuristic for Solving the Strip-Packing Problem
Designing DNA Microarrays with Ant Colony Optimization
Bottom-Left and Sequence Pair for Solving Packing Problems
Measuring performance of optimization algorithms in evolutionary computation
The information systems' security level assessment model based on an ontology and evidential reasoning approach
Asynchronous and implicitly parallel evolutionary computation models
On Using Genetic Algorithms for Intrinsic Side-channel Resistance: The Case of AES S-box
Glitch it if you can: parameter search strategies for successful fault injection
S-box, SET, Match: A Toolbox for S-box Analysis
A New Ant Colony Optimization Algorithm : Three Bound Ant System
Conceptual Information Modelling within the Contemporary Information Security Policies
Conceptual Modeling of Information Systems within the Information Security Policies
Evolving Cryptographically Sound Boolean Functions
On the Recombination Operator in the Real-Coded Genetic Algorithms
On the Analysis of Experimental Results in Evolutionary Computation
Influence of the Crossover Operator in the Performance of the Hybrid Taguchi GA
On Evolutionary Computation Methods in Cryptography, Proceedings of the Information Systems Security
A Pheromone Trails Model for MAX-MIN Ant System
Extended Trail Reinforcement Strategies for Ant Colony Optimization
Evaluation of Crossover Operator Performance in Genetic Algorithms with Binary Representation
Generic System for Remote Testing and Calibration of Measuring Instruments: Security Architecture
Neuronska kriptografija kao odgovor na napad kvantnim računalom
On the Efficiency of Crossover Operators in Genetic Algorithms with Binary Representation
Comparison of a Crossover Operator in Binary-coded Genetic Algorithms
Applying ai-techniques as help for faculty administration - a case study
Operacijski sustavi
The New Negative Slope Coefficient Measure
Kvantna kriptografija: razvoj i protokoli
Dealings with Problem Hardness in Genetic Algorithms
Exam Timetabling Using Genetic Algorithm
Adaptive mutation operator cycling
A method for identifying Web applications
Using Trust on the Internet
Evolutionary Algorithms for the Resource Constrained Scheduling Problem
Implementation of EAP Authentication into IKEv2 Protocol
Sinkronizacijski problemi
An Overview of Port-Based Network Access Control
Implementing Automated Vulnerability Assessment in Large Network Environments
An overview of distributed programming techniques
Security in mobile digital rights management
Identification of Individual Over-The-Air Generic Content Download for Mobile Phones
Using a set of elite individuals in a genetic algorithm
Quantum cryptography and security of information systems
Solving Timetable Scheduling Problem Using Genetic Algorithms
Solving n-Queen Problem Using Global Parallel Genetic Algorithm
Scheduling Multiprocessor Tasks with Genetic Algorithms
Parallelization of Elimination Tournament Selection without Synchronization
Poboljšavanje djelotvornosti paralelnih genetskih algoritama
A New Model of Global Parallel Genetic Algorithm
An Asynchronous Model of Global Parallel Genetic Algorithms
Genetic Algorithms in Real-Time Imprecise Computing
Adaptive Genetic Algorithm
Genetic Algorithms in Real-Time Imprecise Computing
A Few Implementations of Parallel Genetic Algorithm
Adaptive Genetic Algorithm
Parallel Adaptive Genetic Algorithm
Using Genetic Algorithms for Adapting Approximation Functions
Vrednovanje uporabe genetskih algoritama za aproksimaciju vremenskih nizova
An Implementation of Binary and Floating Point Chromosome Representation in Genetic Algorithm
Traditional Techniques of Genetic Algorithms Applied to Floating-Point Chromosome Representations
Nastava
Sveučilišni preddiplomski
- Operacijski sustavi (Nositelj)
- Operating Systems (Nositelj)
- Projekt iz programske potpore (Predavanja)
- Projekt iz programske potpore (Predavanja)
- Projekt iz programske potpore (Predavanja)
- Projekt R (Predavanja)
- Završni rad (Predavanja)
- Završni rad (Predavanja)
Sveučilišni diplomski
- Kriptografija i kriptoanaliza (Nositelj)
- Laboratorij računarske znanosti 2 (Nositelj)
- Napredni operacijski sustavi (Nositelj)
- Diplomski projekt (Predavanja)
- Diplomski projekt (Predavanja)
- Projekt (Predavanja)
- Seminar 1 (Predavanja)
Poslijediplomski doktorski
- Sigurnost računalnih sustava (Nositelj)
Poslijediplomski specijalistički
- Primijenjena kriptografija (Nositelj)
Kompetencije
-
Computers and information processing
Computer security -
Mathematics
Genetic algorithms Heuristic algorithms Optimization Cost function Optimal scheduling Optimization methods -
Computational and artificial intelligence
Evolutionary computation Genetic algorithms -
Industry applications
Cryptography Ciphers Encryption Public key -
Communications technology
Cryptographic protocols -
Engineering management
Security management