Jelena Milosevic

Orcid: 0000-0003-4166-0083

According to our database1, Jelena Milosevic authored at least 18 papers between 2013 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
synERGY: Cross-correlation of operational and contextual data to timely detect and mitigate attacks to cyber-physical systems.
J. Inf. Secur. Appl., 2020

2019
Fuzzy classification boundaries against adversarial network attacks.
Fuzzy Sets Syst., 2019

Time, accuracy and power consumption tradeoff in mobile malware detection systems.
Comput. Secur., 2019

2018
It All Matters: Reporting Accuracy, Inference Time and Power Consumption for Face Emotion Recognition on Embedded Systems.
CoRR, 2018

Time Series Kernel Similarities for Predicting Paroxysmal Atrial Fibrillation from ECGs.
Proceedings of the 2018 International Joint Conference on Neural Networks, 2018

2017
Extinguishing Ransomware - A Hybrid Approach to Android Ransomware Detection.
Proceedings of the Foundations and Practice of Security - 10th International Symposium, 2017

2016
A Friend or a Foe? Detecting Malware using Memory and CPU Features.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

Runtime Classification of Mobile Malware for Resource-Constrained Devices.
Proceedings of the E-Business and Telecommunications - 13th International Joint Conference, 2016

MalAware: Effective and Efficient Run-Time Mobile Malware Detector.
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016

What does the memory say? Towards the most indicative features for efficient malware detection.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016

Spotting the Malicious Moment: Characterizing Malware Behavior Using Dynamic Features.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
A general practitioner or a specialist for your infected smartphone?
CoRR, 2015

2014
Intermediate solutions of fourth order quasilinear differential equations in the framework of regular variation.
Appl. Math. Comput., 2014

Modeling Requirements for Security-enhanced Design of Embedded Systems.
Proceedings of the SECRYPT 2014, 2014

Risk Assessment of Atrial Fibrillation: a Failure Prediction Approach.
Proceedings of the Computing in Cardiology, CinC 2014, 2014

A Resource-Optimized Approach to Efficient Early Detection of Mobile Malware.
Proceedings of the Ninth International Conference on Availability, 2014

2013
Intermediate solutions of second order quasilinear ordinary differential equations in the framework of regular variation.
Appl. Math. Comput., 2013

A Security-enhanced Design Methodology for Embedded Systems.
Proceedings of the SECRYPT 2013, 2013


  Loading...