Na FER-u postoji više zaposlenika s imenom
Error Pattern Discovery in Spellchecking Using Multi-Class Confusion Matrix Analysis for the Croatian Language
Enhancing Security of Intermediate Devices in the Connection Between IoT Devices and Cloud Service
10 GBPS flow aggregation using commodity hardware
Evaluation of Inter-Dataset Generalisability of Autoencoders for Network Intrusion Detection
A Comprehensive Dataset of Spelling Errors and Users’ Corrections in Croatian Language
Enhancing Mitigation of Volumetric DDoS Attacks: A Hybrid FPGA/Software Filtering Datapath
Evaluation of Inter-Dataset Generalisability of Autoencoders for Network Intrusion Detection
Study of Data Transfer Nodes Infrastructure in Enabling Big Data Movement between Research and Cloud Storage Networks
10 GBPS flow aggregation using commodity hardware
Surgical DDoS Filtering With Fast LPM
SCADA Systems With Focus on Continuous Manufacturing and Steel Industry: A Survey on Architectures, Standards, Challenges and Industry 5.0
Securing IoT Services Based on Security Requirement Categories
Hybrid hardware/software datapath for near real- time reconfigurable high-speed packet filtering
Supervisory Control and Data Acquisition (SCADA) Systems in Continuous Manufacturing Process Control
Ranking Network Devices for Alarm Prioritisation: Intrusion Detection Case Study
Anomaly Correction in Time Series Data for Improved Forecasting
Comparison of Cuckoo Hash Table and Bloom Filter for Fast Packet Filtering Using Data Plane Development Kit
Comparison of Cuckoo Hash Table and Bloom Filter for Fast Packet Filtering Using Data Plane Development Kit
Comparison of Cuckoo Hash Table and Bloom Filter for Fast Packet Filtering Using Data Plane Development Kit
Adaptable secure communication for the Cloud of Things
Pushing the envelope: Beyond two billion IP routing lookups per second on commodity CPUs
Security research and learning environment based on scalable network emulation
Lightweight and adaptable solution for security agility
Smart Detection and Classification of Application-Layer Intrusions in Web Directories
A network testbed for commercial telecommunications product testing
Forensic analysis of the Mac OS X keychain
Security Agility Solution Independent of the Underlaying Protocol Architecture
Implementing Certificate-based Authentication Protocol on Smart Cards
NgP - Protokol za dogovor parametara
Quality of service mechanisms and priority management in HSPA system
Scalable software architecture for distributed MMORPG traffic generation based on integration of UrBBaN-Gen and IMUNES
Improving distributed traffic generation performance by using IMUNES network emulator
Modularne programske platforme za obradu mrežnog prometa u jezgri operacijskih sustava
Implementacija protokola za dogovaranje parametara neovisna o transportnom sloju
Prilagodba upravljačkog sučelja sustava IMUNES virtualizacijskoj okolini "Linux Containers"
DXR : towards a billion routing lookups per second in software
Uspostava komunikacije protokolom SIP kroz heterogene mreže IPv6/IPv4 bez narušavanja kvalitete usluge
Opportunistic Authentication Methods In New Generation Networks
60 godina Zavoda za telekomunikacije
Mehanizmi kvalitete usluge i upravljanje prioritetima u sustavu UMTS i HSPA
Model regulacije SMS prometa u signalnoj tranzitnoj točki u svrhu povećanja sigurnosti mobilne mreže
Sigurnosne mjere za zaštitu čvora DNS/ENUM u višemedijskom podsustavu zasnovanom na internetskom protokolu
Procjena standardiziranih rješenja za glasovne i SMS usluge u prijelaznom periodu na mrežu LTE
Mjerenje i analiza performansi sustava za emulaciju računalnih mreža
Deploying New Hash Algorithms in Secure Neighbor Discovery
Implementation of multicast forwarding management support using passive IGMP snooping in software Ethernet switch
Izvedba komunikacijskih funkcija programirljivim logičkim sklopovima (FPGA)
Izvedba sklopa za odašiljanje sintetičkog IP / Ethernet prometa korištenjem programirljivih logičkih sklopova (FPGA)
Izvedba sklopa za IPv4 usmjeravanje korištenjem programirljivih logičkih sklopova (FPGA)
Modularno upravljanje parametrima virtualnih čvorova u sustavu IMUNES
Implementacija mehanizama upravljanja virtualnim čvorovima kroz pozive udaljenih procedura u sustavu IMUNES
Metoda određivanja otpornosti višemedijskog podsustava zasnovanog na internetskom protokolu na distribuirane napade uskraćivanja resursa
Proširenje internih programskih sučelja upravljačkog sloja sustava IMUNES
P2P SUPPORT FOR DISTRIBUTED SIMULATION/EMULATION OF HIGH SPEED IP NETWORKS
Dijagnosticiranje i rješavanje problema u prijenosu audio signala internet protokolom
SEND-based Source Address Validation for IPv6
Sigurnost u privatnim komunikacijskim mrežama
Razmjena povjerljivih korisničkih podataka između sustava za upravljanje elektroničkim identitetima
Upravljanje rizikom u sustavu upravljanja sigurnošću informacijskih resursa
DISTRIBUTED REAL-TIME SIMULATION OF HIGH SPEED IP NETWORKS
Clustering Network Simulation: Graph Partitioning Approach
PROCJENA PERFORMANSI POSREDNIČKIH INTERNETSKIH SUSTAVA
Operating System Support for Integrated Network Emulation in IMUNES
Real-Time IP Network Simulation at Gigabit Data Rates
Proceedings of the 7th International Conference on Telecommunications - ConTEL2003 Volume 1 of 2
Proceedings of the 7th International Conference on Telecommunications - ConTEL2003 Volume 2 of 2
Proceedings of the 7th International Conference on Telecommunications - ConTEL2003
Klonirajući mrežni stog - koncepti i mogućnosti primjene
Estimating the Impact of Interrupt Coalescing Delays on Steady State TCP Throughput
An approach to education oriented TCP simulation
Telephone Traffic Routing Simulation Using Learning Automata
Automatic Translation From SDL Specification To Distributed Erlang Implementation
WWW.HR - Experiences with Web-server development and maintenance
Automatic Erlang Code Generation from SDL Specification
Specification of Erlang Applications
Laboratory for Telecommunications Software Technologies at the Faculty of Electrical Engineering and Computing at Zagreb
Object Orientation in SDL
From the SDL Specification Toward the Erlang Implementation
SDL graphical editor
Postupci provjere ispravnosti specifikacije telekomunikacijskih procesa
Oblikovanje radne stanice za primjenu modela automata sa svojstvima učenja u objektno orijentiranoj simulaciji metoda adaptivnog usmjeravanja informacijskih tokova
Implementation of a distributed hypermedia information system based on the WWW concept
Programski jezici - modeli, tehnike i primjene
First experiences with the World-Wide Web in Croatia
Experimental Model of Operation and Maintenance Workstation: Expert System Module for Alarm Analysis
PBX-LAN Based Local Communication System
Experimental Expert Tools for Diagnostic in Telecommunication System and Network Management
Funkcijski model algoritama obrade poziva i usluga
Nastava
Sveučilišni preddiplomski
- Digitalna logika (Nositelj)
- Digitalna logika (Nositelj)
- Mrežno programiranje (Nositelj)
- Mrežno programiranje (Nositelj)
- Sigurnost računalnih sustava (Nositelj)
- Sigurnost računalnih sustava (Nositelj)
- Projekt iz programske potpore (Predavanja)
- Projekt iz programske potpore (Predavanja)
- Projekt iz programske potpore (Predavanja)
- Projekt R (Predavanja)
- Projekt R (Predavanja)
- Završni rad (Predavanja)
- Završni rad (Predavanja)
- Završni rad (Predavanja)
Sveučilišni diplomski
- SCADA sustavi (Nositelj)
- Sigurnosne prijetnje na Internetu (Nositelj)
- Sigurnost komunikacija (Nositelj)
- Sigurnost komunikacija (Nositelj)
- Upravljanje mrežom i uslugama (Nositelj)
- Diplomski projekt (Predavanja)
- Diplomski projekt (Predavanja)
- Mentorski seminar (Predavanja)
- Prezentacijski seminar (Predavanja)
Poslijediplomski doktorski
- Formalizmi u telekomunikacijama (Nositelj)
- Odabrana poglavlja komunikacijskih protokola (Nositelj)
Poslijediplomski specijalistički
- Sigurnost računalnih mreža (Nositelj)
Kompetencije
-
Circuits and systems
Logic circuits Programmable circuits Logic devices -
Computers and information processing
Computer networks Internet security IP networks Network security Computer security Denial-of-service attack Firewalls (computing) Honey pot (computing) Internet security Mobile security Penetration testing Software engineering Formal verification -
Communications technology
Communication networks Communication system security Computer networks Network security Internet security IP networks Mobile security Protocols Telecommunications
Pristupačnost