Na FER-u postoji više zaposlenika s imenom
- Bibliografija (CROSBI)
- Izabrane publikacije
- Nastava
- Područja istraživanja
- Profesionalni interesi i članstva
- Osobni podaci
- Izabrani projekti
Comparative Analysis of Anomaly Detection Approaches in Firewall Logs: Integrating Light-Weight Synthesis of Security Logs and Artificially Generated Attack Detection
Comparing Threshold Selection Methods for Network Anomaly Detection
Devising Framework for Assessing Usability of Cybersecurity Solutions in Industrial Automation and Control Systems
Devising Framework for Assessing Usability of Cybersecurity Solutions in Industrial Automation and Control Systems
Enhancing Industrial Automation and Control Systems Cybersecurity Using Endpoint Detection and Response Tools
2024 47th MIPRO ICT and Electronics Convention (MIPRO) : Proceedings
Protecting Modbus/TCP-Based Industrial Automation and Control Systems Using Message Authentication Codes
MIPRO 2023 : 46th MIPRO ICT and Electronics Convention (MIPRO): Proceedings
Detecting Anomalies in Firewall Logs Using Artificially Generated Attacks
Towards a Method for Evaluating Realism of Randomly Generated Models of IT Systems
JavaScript Library Version Detection
Detecting JavaScript libraries using identifiers and hashes
Detection and Analysis of Obfuscated and Minified JavaScript in the Croatian Web Space
Light-Weight Synthesis of Security Logs for Evaluation of Anomaly Detection and Security Related Experiments
2023 46th ICT and Electronics Convention (MIPRO)
Off-the-Shelf Solutions as Potential Cyber Threats to Industrial Environments and Simple-To-Implement Protection Methodology
KIBERNETIČKI NAPADI Moderne bitke: ti mene IP- paketom, ja tebe raketom
2022 45th Jubilee International Convention on Information, Communication and Electronic Technology (MIPRO)
Systematic review of automatic translation of high- level security policy into firewall rules
Analysis of the Design Space for Cybersecurity Visualizations in VizSec
Predicting Vulnerabilities in Web Applications Based on Website Security Model
Predicting Vulnerabilities in Web Applications Based on Website Security Model
Use of a non-peer reviewed sources in cyber-security scientific research
Automatically generating models of IT systems
Detecting network applications using firewall logs
Enhancing Modbus/TCP-Based Industrial Automation and Control Systems Cybersecurity Using a Misuse- Based Intrusion Detection System
Confidential Computing as an Attempt to Secure Service Provider's Confidential Client Data in a Multi-Tenant Cloud Environment
2021 44th International Convention on Information, Communication and Electronic Technology (MIPRO): Proceedings
Review of National and International Cybersecurity Exercises Conducted in 2019
A Critical View on CIS Controls
A Survey on Applications of Formal Methods in Analysis of SCADA Systems
Systematic Review and Quantitative Comparison of Cyberattack Scenario Detection and Projection
Security Risk Optimization for Multi-cloud Applications
2020 43rd International Convention on Information, Communication and Electronic Technology (MIPRO)
Red Teams - Pentesters, APTs, or Neither
42nd International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)
41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)
40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)
2016 39th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) : Proceedings
38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)
Android-Powered Web Server for Volunteer-Based Environment Sensing
Analiza ranjivosti u aplikacijama i zloćudnog koda za njihovo iskorištavanje
Razvoj okruženja za ispitivanje alata Groningen
Proces provođenja forenzičke analize Android operacijskog sustava
Sustav za prikupljanje podataka o ponašanju Web preglednika i njihovu analizu strojnim učenjem
Prilagodba OpenWRT distribucije Linux operacijskog sustava za upotrebu u Terastream arhitekturi
Analiza mogućnosti povezivanja alata OSSIM s alatima za strojno učenje i statističku analizu
2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) : Proceedings
Sustav za procjenu kvalitete programske podrške na temelju zapisa u bazi Bugzilla
Benu: Operating System Increments for Embedded Systems Engineer’s Education
Poboljšanje sustava određivanja reputacije autonomnih sustava temeljeno na BGP prometu
Security analysis of Croatia’s receipt registration and verification system
Poboljšanje upravljanja dozvolama na operacijskom sustavu Android
Izgradnja zaštićene okoline za izvršavanje i praćenje nepoznatih aplikacija
Tok mrežnih paketa kroz jezgru operacijskog sustava Linux
Generiranje i ponavljanje snimljenog mrežnog prometa za potrebe ispitivanja IPTables pravila
Determining Autonomous Systems Reputation based on DNS measurements
Praćenje mrežnog prometa unutar jezgre operacijskog sustava Linux
Complex Systems and Risk Management
Poboljšanje sigurnosti anonimne mreže Tor uporabom reputacijskog sustava
Security risk assessment of TeamViewer application
Određivanje reputacije autonomnih sustava temeljeno na praćenju neželjenog prometa
Modifikacija protokola TCP za podršku kvalitete usluge
Određivanje reputacije autonomnih sustava temeljeno na praćenju upravljačkog prometa rubnih usmjernika
Testing task schedulers on Linux system
Testing Task Schedulers on Linux System
Ugradnja MOBIKE podrške u IKEv2 implementaciju
Simulator protokola TOR
Određivanje reputacije autonomnih sustava temeljeno na praćenju sustava DNS
Određivanje reputacije autonomnih sustava zasnovano na praćenju neželjene pošte
A method for identifying Web applications
Smanjenje sigurnosnih rizika informacijske infrastrukture zasnovano na vrednovanju razine prijetnje
Upravljanje IPsec podsustavom u Linux okruženju uz pomoć NETLINK sučelja
Razmjena ključeva za protokol SRTP temeljena na protokolu DTLS
Using Trust on the Internet
Raspodijeljeni sustav za spriječavanje mrežnih napada
StudTest – A Platform Supporting Complex and Interactive Knowledge Assessment
Load Balancing MPI Algorithm for High Throughput Applications
Detecting Vulnerabilities in Web Applications by Clustering Web Pages
Architecture of an IKEv2 Protocol Implementation
Sustav za uređivanje testova temeljen na razvojnom okruženju Eclipse
Sučelje za korištenje sustava Lusca iz razvojnog okruženja Eclipse
Ovjera temeljena na certifikatima u protokolu IKEv2
Izrada sustava Lusca za ispitivanje mrežnih aplikacija
Implementation of Certificate Based Authentication in IKEv2 Protocol
Evaluation of Tools for Assessing Web Applications
Sigurnost Web aplikacija zasnovanih na AJAX tehnologiji
Proširivi autentifikacijski protokol u IKEv2 okruženju
Automatizirano određivanje vrste Web aplikacije
Nescume - A System for Managing Student Assignments
Sustav obrazovanja na daljinu zasnovan na arhitekturi temeljenoj na uslugama
WODLS - A Web Oriented Distance Learning System
Modeling and Simulation of a Hard Real-Time Processor
An Experimental Workflow System in Business Automation
A Simple and Effective Method for Developing Web Applications
VHDL-Based Modeling of a Hard Real-Time Task Processor
Automated Generation of VHDL Behavioral Models for Testing Purposes
Ponašajno i strukturno modeliranje procesora za rad u stvarnom vremenu
Nastava
Sveučilišni preddiplomski
- Natjecateljske vještine u kibernetičkoj sigurnosti (Nositelj, Nositelj)
- Sigurnost računalnih sustava (Nositelj)
- Sigurnost računalnih sustava (Nositelj)
- Projekt iz programske potpore (Predavanja)
- Projekt iz programske potpore (Predavanja)
- Projekt iz programske potpore (Predavanja)
- Projekt R (Predavanja)
- Završni rad (Predavanja)
- Završni rad (Predavanja)
- Završni rad (Predavanja)
Sveučilišni diplomski
- Ofenzivna sigurnost (Nositelj)
- SCADA sustavi (Nositelj)
- Sigurnosne prijetnje na Internetu (Nositelj)
- Sigurnost komunikacija (Nositelj)
- Sigurnost operacijskih sustava i aplikacija (Nositelj)
- Zaštita i sigurnost informacijskih sustava (Nositelj)
- Diplomski projekt (Predavanja)
- Diplomski projekt (Predavanja)
- Diplomski projekt (Predavanja)
- Diplomski rad (Predavanja)
- Diplomski rad (Predavanja)
- Projekt (Predavanja)
- Seminar 1 (Predavanja)
- Seminar 2 (Predavanja)
Poslijediplomski doktorski
Poslijediplomski specijalistički
- Osnove informacijske sigurnosti (Nositelj)
- Sigurnost računalnih mreža (Nositelj)
Kompetencije
-
Computers and information processing
Internet security Network security Computer security Application security Authentication Cloud computing security Computer crime Computer hacking Cyber espionage Cyber warfare Cyberattack Denial-of-service attack Firewalls (computing) Honey pot (computing) Internet security Mobile security Penetration testing Permission Phishing Botnet Internet security Bot (Internet) Botnet Internet security -
Engineering management
Security management Research and development management -
Industry applications
Security Digital signatures Information security Network security Security management -
Communications technology
Communication system security Network security Internet security Mobile security -
Professional communication
Information security
Profesionalni interesi i članstva
Računalna sigurnost, kibernetička sigurnost, informacijska sigurnost. Ofenzivna i defenzivna sigurnost. Planiranje i provođenje napada u kibernetičkom prostoru. Obavještajni rad u kibernetičkom prostoru.
Član udruga ACM i MIPRO.