Na FER-u postoji više zaposlenika s imenom
- Prikaži radove
- Izabrane publikacije
- Nastava
- Područja istraživanja
- Profesionalni interesi i članstva
- Osobni podaci
- Izabrani projekti
Threat model for IEC 61850 based substation automation system
Innovating Cyber Defense with Tactical Simulators for Management-Level Incident Response
Threat model for IEC 61850 based substation automation system
Enhancing Industrial Automation and Control Systems Cybersecurity Using Endpoint Detection and Response Tools
Devising Framework for Assessing Usability of Cybersecurity Solutions in Industrial Automation and Control Systems
Comparative Analysis of Anomaly Detection Approaches in Firewall Logs: Integrating Light-Weight Synthesis of Security Logs and Artificially Generated Attack Detection
Comparing Threshold Selection Methods for Network Anomaly Detection
2024 47th MIPRO ICT and electronics convention (MIPRO): Proceedings
Devising Framework for Assessing Usability of Cybersecurity Solutions in Industrial Automation and Control Systems
Simulation based education system for cyber incident response
Towards a Method for Evaluating Realism of Randomly Generated Models of IT Systems
2023 46th ICT and Electronics Convention (MIPRO)
Light-Weight Synthesis of Security Logs for Evaluation of Anomaly Detection and Security Related Experiments
Detecting Anomalies in Firewall Logs Using Artificially Generated Attacks
MIPRO 2023 : 46th MIPRO ICT and Electronics Convention (MIPRO): Proceedings
Protecting Modbus/TCP-Based Industrial Automation and Control Systems Using Message Authentication Codes
JavaScript Library Version Detection
Detecting JavaScript libraries using identifiers and hashes
Detection and Analysis of Obfuscated and Minified JavaScript in the Croatian Web Space
Off-the-Shelf Solutions as Potential Cyber Threats to Industrial Environments and Simple-To-Implement Protection Methodology
Predicting Vulnerabilities in Web Applications Based on Website Security Model
Detecting network applications using firewall logs
Systematic review of automatic translation of high- level security policy into firewall rules
Automatically generating models of IT systems
Enhancing Modbus/TCP-Based Industrial Automation and Control Systems Cybersecurity Using a Misuse- Based Intrusion Detection System
Analysis of the Design Space for Cybersecurity Visualizations in VizSec
2022 45th Jubilee International Convention on Information, Communication and Electronic Technology (MIPRO)
Predicting Vulnerabilities in Web Applications Based on Website Security Model
Use of a non-peer reviewed sources in cyber-security scientific research
KIBERNETIČKI NAPADI Moderne bitke: ti mene IP- paketom, ja tebe raketom
A Critical View on CIS Controls
Review of National and International Cybersecurity Exercises Conducted in 2019
2021 44th International Convention on Information, Communication and Electronic Technology (MIPRO): Proceedings
A Survey on Applications of Formal Methods in Analysis of SCADA Systems
Confidential Computing as an Attempt to Secure Service Provider's Confidential Client Data in a Multi-Tenant Cloud Environment
Security Risk Optimization for Multi-cloud Applications
Systematic Review and Quantitative Comparison of Cyberattack Scenario Detection and Projection
2020 43rd International Convention on Information, Communication and Electronic Technology (MIPRO)
Red Teams - Pentesters, APTs, or Neither
42nd International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)
41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)
40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)
2016 39th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) : Proceedings
Android-Powered Web Server for Volunteer-Based Environment Sensing
38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)
Sustav za procjenu kvalitete programske podrške na temelju zapisa u bazi Bugzilla
Analiza mogućnosti povezivanja alata OSSIM s alatima za strojno učenje i statističku analizu
Benu: Operating System Increments for Embedded Systems Engineer’s Education
Sustav za prikupljanje podataka o ponašanju Web preglednika i njihovu analizu strojnim učenjem
Poboljšanje sustava određivanja reputacije autonomnih sustava temeljeno na BGP prometu
Proces provođenja forenzičke analize Android operacijskog sustava
Razvoj okruženja za ispitivanje alata Groningen
Analiza ranjivosti u aplikacijama i zloćudnog koda za njihovo iskorištavanje
2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) : Proceedings
Prilagodba OpenWRT distribucije Linux operacijskog sustava za upotrebu u Terastream arhitekturi
Security analysis of Croatia’s receipt registration and verification system
Poboljšanje upravljanja dozvolama na operacijskom sustavu Android
Izgradnja zaštićene okoline za izvršavanje i praćenje nepoznatih aplikacija
Determining Autonomous Systems Reputation based on DNS measurements
Praćenje mrežnog prometa unutar jezgre operacijskog sustava Linux
Tok mrežnih paketa kroz jezgru operacijskog sustava Linux
Generiranje i ponavljanje snimljenog mrežnog prometa za potrebe ispitivanja IPTables pravila
Određivanje reputacije autonomnih sustava temeljeno na praćenju upravljačkog prometa rubnih usmjernika
Poboljšanje sigurnosti anonimne mreže Tor uporabom reputacijskog sustava
Security risk assessment of TeamViewer application
Complex Systems and Risk Management
Modifikacija protokola TCP za podršku kvalitete usluge
Određivanje reputacije autonomnih sustava temeljeno na praćenju neželjenog prometa
Ugradnja MOBIKE podrške u IKEv2 implementaciju
Testing task schedulers on Linux system
Simulator protokola TOR
Određivanje reputacije autonomnih sustava temeljeno na praćenju sustava DNS
Testing Task Schedulers on Linux System
Određivanje reputacije autonomnih sustava zasnovano na praćenju neželjene pošte
Upravljanje IPsec podsustavom u Linux okruženju uz pomoć NETLINK sučelja
A method for identifying Web applications
Decreasing Security Risks within the Information Infrastructure based on Risk Level Assessment
Raspodijeljeni sustav za spriječavanje mrežnih napada
Razmjena ključeva za protokol SRTP temeljena na protokolu DTLS
Using Trust on the Internet
Detecting Vulnerabilities in Web Applications by Clustering Web Pages
StudTest – A Platform Supporting Complex and Interactive Knowledge Assessment
Load Balancing MPI Algorithm for High Throughput Applications
Sigurnost Web aplikacija zasnovanih na AJAX tehnologiji
Architecture of an IKEv2 Protocol Implementation
Automatizirano određivanje vrste Web aplikacije
Proširivi autentifikacijski protokol u IKEv2 okruženju
Sučelje za korištenje sustava Lusca iz razvojnog okruženja Eclipse
Ovjera temeljena na certifikatima u protokolu IKEv2
Evaluation of Tools for Assessing Web Applications
Implementation of Certificate Based Authentication in IKEv2 Protocol
Sustav za uređivanje testova temeljen na razvojnom okruženju Eclipse
Izrada sustava Lusca za ispitivanje mrežnih aplikacija
Nescume - A System for Managing Student Assignments
Sustav obrazovanja na daljinu zasnovan na arhitekturi temeljenoj na uslugama
WODLS - A Web Oriented Distance Learning System
An Experimental Workflow System in Business Automation
Modeling and Simulation of a Hard Real-Time Processor
A Simple and Effective Method for Developing Web Applications
VHDL-Based Modeling of a Hard Real-Time Task Processor
Automated Generation of VHDL Behavioral Models for Testing Purposes
Ponašajno i strukturno modeliranje procesora za rad u stvarnom vremenu
Nastava
Sveučilišni preddiplomski
- Natjecateljske vještine u kibernetičkoj sigurnosti (Nositelj, Nositelj)
- Sigurnost računalnih sustava (Nositelj)
- Sigurnost računalnih sustava (Nositelj)
- Projekt iz programske potpore (Predavanja)
- Projekt iz programske potpore (Predavanja)
- Projekt iz programske potpore (Predavanja)
- Projekt R (Predavanja)
- Završni rad (Predavanja)
- Završni rad (Predavanja)
- Završni rad (Predavanja)
Sveučilišni diplomski
- Ofenzivna sigurnost (Nositelj)
- SCADA sustavi (Nositelj)
- Sigurnosne prijetnje na Internetu (Nositelj)
- Sigurnost komunikacija (Nositelj)
- Sigurnost komunikacija (Nositelj)
- Sigurnost operacijskih sustava i aplikacija (Nositelj)
- Zaštita i sigurnost informacijskih sustava (Nositelj)
- Diplomski projekt (Predavanja)
- Diplomski projekt (Predavanja)
- Mentorski seminar (Predavanja)
- Prezentacijski seminar (Predavanja)
Poslijediplomski doktorski
Poslijediplomski specijalistički
- Osnove informacijske sigurnosti (Nositelj)
- Sigurnost računalnih mreža (Nositelj)
- Upravljanje sigurnosnim rizicima (Nositelj)
Kompetencije
-
Computers and information processing
Internet security Network security Computer security Application security Authentication Cloud computing security Computer crime Computer hacking Cyber espionage Cyber warfare Cyberattack Denial-of-service attack Firewalls (computing) Honey pot (computing) Internet security Mobile security Penetration testing Permission Phishing Botnet Internet security Bot (Internet) Botnet Internet security -
Engineering management
Security management Research and development management -
Industry applications
Security Digital signatures Information security Network security Security management -
Communications technology
Communication system security Network security Internet security Mobile security -
Professional communication
Information security
Profesionalni interesi i članstva
Računalna sigurnost, kibernetička sigurnost, informacijska sigurnost. Ofenzivna i defenzivna sigurnost. Planiranje i provođenje napada u kibernetičkom prostoru. Obavještajni rad u kibernetičkom prostoru.
Član udruga ACM i MIPRO.
Pristupačnost