Aleksandra Mileva

Orcid: 0000-0003-0706-6355

According to our database1, Aleksandra Mileva authored at least 22 papers between 2009 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Guest editorial: Information security methodology and replication studies.
it Inf. Technol., 2022

Security and Privacy Issues of Home Globalization.
IEEE Secur. Priv., 2022

Information Hiding in the DICOM Message Service and Upper Layer Service with Entropy-Based Detection.
Entropy, 2022

POSTER: Launching a ZIP Bomb on the DICOM-enabled Devices.
Proceedings of the EICC 2022: European Interdisciplinary Cybersecurity Conference, Barcelona, Spain, June 15, 2022

2021
Guest Editorial: Multidisciplinary Solutions to Modern Cybersecurity Challenges.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021

Comprehensive analysis of MQTT 5.0 susceptibility to network covert channels.
Comput. Secur., 2021

A Revised Taxonomy of Steganography Embedding Patterns.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

Risks and Opportunities for Information Hiding in DICOM Standard.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

Catalog and Illustrative Examples of Lightweight Cryptographic Primitives.
Proceedings of the Security of Ubiquitous Computing Systems, 2021

2020
Information Security Methodology, Replication Studies and Information Security Education.
J. Univers. Comput. Sci., 2020

Investigation of Some Cryptographic Properties of the 8x8 S-boxes Created by Quasigroups.
Comput. Sci. J. Moldova, 2020

2019
Covert Channels in the MQTT-Based Internet of Things.
IEEE Access, 2019

Introducing Dead Drops to Network Steganography using ARP-Caches and SNMP-Walks.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2016
Power Consumption Analysis of Application Layer Protocols for the Internet of Things.
Proceedings of the ICT Innovations 2016, 2016

2015
Analysis of the Authenticated Cipher MORUS (v1).
Proceedings of the Cryptography and Information Security in the Balkans, 2015

2014
Multipermutations in Crypto World: Different Faces of the Perfect Diffusion Layer.
IACR Cryptol. ePrint Arch., 2014

SBIM(Q) - a Multivariate Polynomial Trapdoor Function over the Field of Rational Numbers.
IACR Cryptol. ePrint Arch., 2014

Covert channels in TCP/IP protocol stack - extended version-.
Central Eur. J. Comput. Sci., 2014

Computer forensic analisys of some web attacks.
Proceedings of the 2014 World Congress on Internet Security, 2014

2012
Quasigroup Representation of Some Feistel and Generalized Feistel Ciphers.
Proceedings of the ICT Innovations 2012, 2012

2009
On a Conditional Collision Attack on NaSHA-512.
IACR Cryptol. ePrint Arch., 2009

Quasigroup String Transformations and Hash Function Design.
Proceedings of the ICT Innovations 2009, Ohrid, Macedonia, 28-30 September, 2009, 2009


  Loading...