Kemal Hajdarevic

According to our database1, Kemal Hajdarevic authored at least 15 papers between 2004 and 2017.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Cloud computing threats classification model based on the detection feasibility of machine learning algorithms.
Proceedings of the 40th International Convention on Information and Communication Technology, 2017

Training network managers in ethical hacking techniques to manage resource starvation attacks using GNS3 simulator.
Proceedings of the XXVI International Conference on Information, 2017

2015
A low energy computer infrastructure for radio VOIP supported communication and SDR APRS in education and disaster relief situations.
Proceedings of the 38th International Convention on Information and Communication Technology, 2015

An approach to digital evidence collection for successful forensic application: An investigation of blackmail case.
Proceedings of the 38th International Convention on Information and Communication Technology, 2015

Internal penetration testing of Bring Your Own Device (BYOD) for preventing vulnerabilities exploitation.
Proceedings of the XXV International Conference on Information, 2015

2012
Information security measurement infrastructure for KPI visualization.
Proceedings of the 2012 Proceedings of the 35th International Convention, 2012

New generation operations systems and software and SOA improving the business of telecom operator.
Proceedings of the 2012 Proceedings of the 35th International Convention, 2012

Face recognition implementation for client server mobile application using PCA.
Proceedings of the 34th International Conference on Information Technology Interfaces, 2012

2011
EMF hot-spot creation avoidance in office and home-office environments.
Proceedings of the MIPRO, 2011

Simulation application for Sleep-Awake Probabilistic Forwarding Protocol for Smart Dust environments.
Proceedings of the MIPRO, 2011

New forensic method for measuring dynamic changes of EMF level limits using smart dust.
Proceedings of the XXIII International Symposium on Information, 2011

2009
Trojan detection using MIB-based IDS / IPS system.
Proceedings of the XXII International Symposium on Information, 2009

2008
Early detection of network problems using existing network indicators : local agent based approach.
PhD thesis, 2008

2007
Timing considerations in detecting resource starvation attacks using statistical profiles.
Int. J. Electron. Secur. Digit. Forensics, 2007

2004
Training Network Managers to Recognise Intrusion Attacks.
Proceedings of the ICETE 2004, 2004


  Loading...