Na FER-u postoji više zaposlenika s imenom
Error Pattern Discovery in Spellchecking Using Multi-Class Confusion Matrix Analysis for the Croatian Language
Enhancing Security of Intermediate Devices in the Connection Between IoT Devices and Cloud Service
Evaluation of Inter-Dataset Generalisability of Autoencoders for Network Intrusion Detection
Enhancing Mitigation of Volumetric DDoS Attacks: A Hybrid FPGA/Software Filtering Datapath
10 GBPS flow aggregation using commodity hardware
A Comprehensive Dataset of Spelling Errors and Users’ Corrections in Croatian Language
Evaluation of Inter-Dataset Generalisability of Autoencoders for Network Intrusion Detection
Study of Data Transfer Nodes Infrastructure in Enabling Big Data Movement between Research and Cloud Storage Networks
10 GBPS flow aggregation using commodity hardware
Hybrid hardware/software datapath for near real- time reconfigurable high-speed packet filtering
Securing IoT Services Based on Security Requirement Categories
Surgical DDoS Filtering With Fast LPM
Supervisory Control and Data Acquisition (SCADA) Systems in Continuous Manufacturing Process Control
SCADA Systems With Focus on Continuous Manufacturing and Steel Industry: A Survey on Architectures, Standards, Challenges and Industry 5.0
Ranking Network Devices for Alarm Prioritisation: Intrusion Detection Case Study
Anomaly Correction in Time Series Data for Improved Forecasting
Comparison of Cuckoo Hash Table and Bloom Filter for Fast Packet Filtering Using Data Plane Development Kit
Comparison of Cuckoo Hash Table and Bloom Filter for Fast Packet Filtering Using Data Plane Development Kit
Comparison of Cuckoo Hash Table and Bloom Filter for Fast Packet Filtering Using Data Plane Development Kit
Pushing the envelope: Beyond two billion IP routing lookups per second on commodity CPUs
Adaptable secure communication for the Cloud of Things
Security research and learning environment based on scalable network emulation
Lightweight and adaptable solution for security agility
Smart Detection and Classification of Application-Layer Intrusions in Web Directories
A network testbed for commercial telecommunications product testing
NgP - Protokol za dogovor parametara
Implementing Certificate-based Authentication Protocol on Smart Cards
Quality of service mechanisms and priority management in HSPA system
Modularne programske platforme za obradu mrežnog prometa u jezgri operacijskih sustava
Implementacija protokola za dogovaranje parametara neovisna o transportnom sloju
Prilagodba upravljačkog sučelja sustava IMUNES virtualizacijskoj okolini "Linux Containers"
Improving distributed traffic generation performance by using IMUNES network emulator
Scalable software architecture for distributed MMORPG traffic generation based on integration of UrBBaN-Gen and IMUNES
Security Agility Solution Independent of the Underlaying Protocol Architecture
Forensic analysis of the Mac OS X keychain
DXR : towards a billion routing lookups per second in software
Deploying New Hash Algorithms in Secure Neighbor Discovery
Mjerenje i analiza performansi sustava za emulaciju računalnih mreža
Model regulacije SMS prometa u signalnoj tranzitnoj točki u svrhu povećanja sigurnosti mobilne mreže
Sigurnosne mjere za zaštitu čvora DNS/ENUM u višemedijskom podsustavu zasnovanom na internetskom protokolu
Procjena standardiziranih rješenja za glasovne i SMS usluge u prijelaznom periodu na mrežu LTE
Mehanizmi kvalitete usluge i upravljanje prioritetima u sustavu UMTS i HSPA
Opportunistic Authentication Methods In New Generation Networks
Uspostava komunikacije protokolom SIP kroz heterogene mreže IPv6/IPv4 bez narušavanja kvalitete usluge
60 godina Zavoda za telekomunikacije
Izvedba sklopa za odašiljanje sintetičkog IP / Ethernet prometa korištenjem programirljivih logičkih sklopova (FPGA)
Metoda određivanja otpornosti višemedijskog podsustava zasnovanog na internetskom protokolu na distribuirane napade uskraćivanja resursa
P2P SUPPORT FOR DISTRIBUTED SIMULATION/EMULATION OF HIGH SPEED IP NETWORKS
Implementation of multicast forwarding management support using passive IGMP snooping in software Ethernet switch
Proširenje internih programskih sučelja upravljačkog sloja sustava IMUNES
Implementacija mehanizama upravljanja virtualnim čvorovima kroz pozive udaljenih procedura u sustavu IMUNES
Izvedba komunikacijskih funkcija programirljivim logičkim sklopovima (FPGA)
Modularno upravljanje parametrima virtualnih čvorova u sustavu IMUNES
Izvedba sklopa za IPv4 usmjeravanje korištenjem programirljivih logičkih sklopova (FPGA)
Dijagnosticiranje i rješavanje problema u prijenosu audio signala internet protokolom
SEND-based Source Address Validation for IPv6
Razmjena povjerljivih korisničkih podataka između sustava za upravljanje elektroničkim identitetima
Upravljanje rizikom u sustavu upravljanja sigurnošću informacijskih resursa
Sigurnost u privatnim komunikacijskim mrežama
DISTRIBUTED REAL-TIME SIMULATION OF HIGH SPEED IP NETWORKS
Clustering Network Simulation: Graph Partitioning Approach
PROCJENA PERFORMANSI POSREDNIČKIH INTERNETSKIH SUSTAVA
Operating System Support for Integrated Network Emulation in IMUNES
Proceedings of the 7th International Conference on Telecommunications - ConTEL2003 Volume 1 of 2
Klonirajući mrežni stog - koncepti i mogućnosti primjene
Real-Time IP Network Simulation at Gigabit Data Rates
Proceedings of the 7th International Conference on Telecommunications - ConTEL2003 Volume 2 of 2
Proceedings of the 7th International Conference on Telecommunications - ConTEL2003
An approach to education oriented TCP simulation
Estimating the Impact of Interrupt Coalescing Delays on Steady State TCP Throughput
Automatic Translation From SDL Specification To Distributed Erlang Implementation
Telephone Traffic Routing Simulation Using Learning Automata
Automatic Erlang Code Generation from SDL Specification
WWW.HR - Experiences with Web-server development and maintenance
From the SDL Specification Toward the Erlang Implementation
Specification of Erlang Applications
Object Orientation in SDL
Laboratory for Telecommunications Software Technologies at the Faculty of Electrical Engineering and Computing at Zagreb
SDL graphical editor
Postupci provjere ispravnosti specifikacije telekomunikacijskih procesa
Oblikovanje radne stanice za primjenu modela automata sa svojstvima učenja u objektno orijentiranoj simulaciji metoda adaptivnog usmjeravanja informacijskih tokova
Implementation of a distributed hypermedia information system based on the WWW concept
Programski jezici - modeli, tehnike i primjene
First experiences with the World-Wide Web in Croatia
Experimental Model of Operation and Maintenance Workstation: Expert System Module for Alarm Analysis
PBX-LAN Based Local Communication System
Experimental Expert Tools for Diagnostic in Telecommunication System and Network Management
Funkcijski model algoritama obrade poziva i usluga
Nastava
Sveučilišni preddiplomski
- Digitalna logika (Nositelj)
- Digitalna logika (Nositelj)
- Mrežno programiranje (Nositelj)
- Mrežno programiranje (Nositelj)
- Sigurnost računalnih sustava (Nositelj)
- Sigurnost računalnih sustava (Nositelj)
- Projekt iz programske potpore (Predavanja)
- Projekt iz programske potpore (Predavanja)
- Projekt iz programske potpore (Predavanja)
- Projekt R (Predavanja)
- Projekt R (Predavanja)
- Završni rad (Predavanja)
- Završni rad (Predavanja)
- Završni rad (Predavanja)
Sveučilišni diplomski
- SCADA sustavi (Nositelj)
- Sigurnosne prijetnje na Internetu (Nositelj)
- Sigurnost komunikacija (Nositelj)
- Sigurnost komunikacija (Nositelj)
- Upravljanje mrežom i uslugama (Nositelj)
- Diplomski projekt (Predavanja)
- Diplomski projekt (Predavanja)
- Mentorski seminar (Predavanja)
- Prezentacijski seminar (Predavanja)
Poslijediplomski doktorski
- Formalizmi u telekomunikacijama (Nositelj)
- Odabrana poglavlja komunikacijskih protokola (Nositelj)
Poslijediplomski specijalistički
- Sigurnost računalnih mreža (Nositelj)
Kompetencije
-
Circuits and systems
Logic circuits Programmable circuits Logic devices -
Computers and information processing
Computer networks Internet security IP networks Network security Computer security Denial-of-service attack Firewalls (computing) Honey pot (computing) Internet security Mobile security Penetration testing Software engineering Formal verification -
Communications technology
Communication networks Communication system security Computer networks Network security Internet security IP networks Mobile security Protocols Telecommunications
Pristupačnost