Na FER-u postoji više zaposlenika s imenom
Enhancing Security of Intermediate Devices in the Connection Between IoT Devices and Cloud Service
Error Pattern Discovery in Spellchecking Using Multi-Class Confusion Matrix Analysis for the Croatian Language
10 GBPS flow aggregation using commodity hardware
10 GBPS flow aggregation using commodity hardware
Study of Data Transfer Nodes Infrastructure in Enabling Big Data Movement between Research and Cloud Storage Networks
A Comprehensive Dataset of Spelling Errors and Users’ Corrections in Croatian Language
Evaluation of Inter-Dataset Generalisability of Autoencoders for Network Intrusion Detection
Evaluation of Inter-Dataset Generalisability of Autoencoders for Network Intrusion Detection
Supervisory Control and Data Acquisition (SCADA) Systems in Continuous Manufacturing Process Control
SCADA Systems With Focus on Continuous Manufacturing and Steel Industry: A Survey on Architectures, Standards, Challenges and Industry 5.0
Securing IoT Services Based on Security Requirement Categories
Surgical DDoS Filtering With Fast LPM
Hybrid hardware/software datapath for near real- time reconfigurable high-speed packet filtering
Ranking Network Devices for Alarm Prioritisation: Intrusion Detection Case Study
Anomaly Correction in Time Series Data for Improved Forecasting
Comparison of Cuckoo Hash Table and Bloom Filter for Fast Packet Filtering Using Data Plane Development Kit
Comparison of Cuckoo Hash Table and Bloom Filter for Fast Packet Filtering Using Data Plane Development Kit
Comparison of Cuckoo Hash Table and Bloom Filter for Fast Packet Filtering Using Data Plane Development Kit
Adaptable secure communication for the Cloud of Things
Security research and learning environment based on scalable network emulation
Pushing the envelope: Beyond two billion IP routing lookups per second on commodity CPUs
Lightweight and adaptable solution for security agility
Smart Detection and Classification of Application-Layer Intrusions in Web Directories
A network testbed for commercial telecommunications product testing
Modularne programske platforme za obradu mrežnog prometa u jezgri operacijskih sustava
DXR : towards a billion routing lookups per second in software
Implementacija protokola za dogovaranje parametara neovisna o transportnom sloju
Forensic analysis of the Mac OS X keychain
Prilagodba upravljačkog sučelja sustava IMUNES virtualizacijskoj okolini "Linux Containers"
NgP - Protokol za dogovor parametara
Implementing Certificate-based Authentication Protocol on Smart Cards
Quality of service mechanisms and priority management in HSPA system
Security Agility Solution Independent of the Underlaying Protocol Architecture
Improving distributed traffic generation performance by using IMUNES network emulator
Scalable software architecture for distributed MMORPG traffic generation based on integration of UrBBaN-Gen and IMUNES
Mjerenje i analiza performansi sustava za emulaciju računalnih mreža
Model regulacije SMS prometa u signalnoj tranzitnoj točki u svrhu povećanja sigurnosti mobilne mreže
Deploying New Hash Algorithms in Secure Neighbor Discovery
Mehanizmi kvalitete usluge i upravljanje prioritetima u sustavu UMTS i HSPA
Sigurnosne mjere za zaštitu čvora DNS/ENUM u višemedijskom podsustavu zasnovanom na internetskom protokolu
60 godina Zavoda za telekomunikacije
Opportunistic Authentication Methods In New Generation Networks
Uspostava komunikacije protokolom SIP kroz heterogene mreže IPv6/IPv4 bez narušavanja kvalitete usluge
Procjena standardiziranih rješenja za glasovne i SMS usluge u prijelaznom periodu na mrežu LTE
Modularno upravljanje parametrima virtualnih čvorova u sustavu IMUNES
P2P-PODRŠKA ZA RASPODIJELJENU SIMULACIJU/EMULACIJU BRZIH IP MREŽA
Izvedba sklopa za IPv4 usmjeravanje korištenjem programirljivih logičkih sklopova (FPGA)
Izvedba komunikacijskih funkcija programirljivim logičkim sklopovima (FPGA)
Izvedba sklopa za odašiljanje sintetičkog IP / Ethernet prometa korištenjem programirljivih logičkih sklopova (FPGA)
Metoda određivanja otpornosti višemedijskog podsustava zasnovanog na internetskom protokolu na distribuirane napade uskraćivanja resursa
Implementacija mehanizama upravljanja virtualnim čvorovima kroz pozive udaljenih procedura u sustavu IMUNES
Proširenje internih programskih sučelja upravljačkog sloja sustava IMUNES
Implementacija podrške za upravljanje višeodredišnim prosljeđivanjem paketa pasivnim IGMP slušanjem u programskom Ethernet prospojniku
SEND-based Source Address Validation for IPv6
Dijagnosticiranje i rješavanje problema u prijenosu audio signala internet protokolom
Razmjena povjerljivih korisničkih podataka između sustava za upravljanje elektroničkim identitetima
Sigurnost u privatnim komunikacijskim mrežama
Upravljanje rizikom u sustavu upravljanja sigurnošću informacijskih resursa
DISTRIBUTED REAL-TIME SIMULATION OF HIGH SPEED IP NETWORKS
PROCJENA PERFORMANSI POSREDNIČKIH INTERNETSKIH SUSTAVA
Clustering Network Simulation: Graph Partitioning Approach
Operating System Support for Integrated Network Emulation in IMUNES
Proceedings of the 7th International Conference on Telecommunications - ConTEL2003 Volume 2 of 2
Proceedings of the 7th International Conference on Telecommunications - ConTEL2003 Volume 1 of 2
Proceedings of the 7th International Conference on Telecommunications - ConTEL2003
Real-Time IP Network Simulation at Gigabit Data Rates
Klonirajući mrežni stog - koncepti i mogućnosti primjene
An approach to education oriented TCP simulation
Estimating the Impact of Interrupt Coalescing Delays on Steady State TCP Throughput
Automatic Translation From SDL Specification To Distributed Erlang Implementation
Telephone Traffic Routing Simulation Using Learning Automata
WWW.HR - Experiences with Web-server development and maintenance
Automatic Erlang Code Generation from SDL Specification
From the SDL Specification Toward the Erlang Implementation
Object Orientation in SDL
Laboratory for Telecommunications Software Technologies at the Faculty of Electrical Engineering and Computing at Zagreb
Specification of Erlang Applications
Postupci provjere ispravnosti specifikacije telekomunikacijskih procesa
SDL graphical editor
Implementation of a distributed hypermedia information system based on the WWW concept
Programski jezici - modeli, tehnike i primjene
Oblikovanje radne stanice za primjenu modela automata sa svojstvima učenja u objektno orijentiranoj simulaciji metoda adaptivnog usmjeravanja informacijskih tokova
First experiences with the World-Wide Web in Croatia
Experimental Model of Operation and Maintenance Workstation: Expert System Module for Alarm Analysis
PBX-LAN Based Local Communication System
Experimental Expert Tools for Diagnostic in Telecommunication System and Network Management
Funkcijski model algoritama obrade poziva i usluga
Nastava
Sveučilišni preddiplomski
- Digitalna logika (Nositelj)
- Digitalna logika (Nositelj)
- Mrežno programiranje (Nositelj)
- Mrežno programiranje (Nositelj)
- Sigurnost računalnih sustava (Nositelj)
- Sigurnost računalnih sustava (Nositelj)
- Projekt iz programske potpore (Predavanja)
- Projekt iz programske potpore (Predavanja)
- Projekt iz programske potpore (Predavanja)
- Projekt R (Predavanja)
- Projekt R (Predavanja)
- Završni rad (Predavanja)
- Završni rad (Predavanja)
- Završni rad (Predavanja)
- Završni rad (Predavanja)
- Završni rad (Predavanja)
Sveučilišni diplomski
- SCADA sustavi (Nositelj)
- Sigurnosne prijetnje na Internetu (Nositelj)
- Sigurnost komunikacija (Nositelj)
- Upravljanje mrežom i uslugama (Nositelj)
- Diplomski projekt (Predavanja)
- Diplomski projekt (Predavanja)
- Diplomski projekt (Predavanja)
- Diplomski projekt (Predavanja)
- Diplomski rad (Predavanja)
- Diplomski rad (Predavanja)
- Diplomski rad (Predavanja)
- Projekt (Predavanja)
- Seminar 1 (Predavanja)
- Seminar 2 (Predavanja)
Poslijediplomski doktorski
- Formalizmi u telekomunikacijama (Nositelj)
- Odabrana poglavlja komunikacijskih protokola (Nositelj)
Poslijediplomski specijalistički
- Sigurnost računalnih mreža (Nositelj)
Kompetencije
-
Circuits and systems
Logic circuits Programmable circuits Logic devices -
Computers and information processing
Computer networks Internet security IP networks Network security Computer security Denial-of-service attack Firewalls (computing) Honey pot (computing) Internet security Mobile security Penetration testing Software engineering Formal verification -
Communications technology
Communication networks Communication system security Computer networks Network security Internet security IP networks Mobile security Protocols Telecommunications