Slobodan Petrovic

Orcid: 0000-0002-4435-2716

According to our database1, Slobodan Petrovic authored at least 41 papers between 1998 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Towards Oblivious Guidance Systems for Autonomous Vehicles.
IEEE Trans. Veh. Technol., June, 2023

Security Threats to 5G Networks for Social Robots in Public Spaces: A Survey.
IEEE Access, 2023

Physical-Layer Security Improvement in MIMO OFDM Systems Using Multilevel Chaotic Encryption.
IEEE Access, 2023

2022
Cybersecurity applications of computational intelligence.
Neural Comput. Appl., 2022

Hijacking of unmanned surface vehicles: A demonstration of attacks and countermeasures in the field.
J. Field Robotics, 2022

2021
Secure and Efficient Transmission of Vision-Based Feedback Control Signals.
J. Intell. Robotic Syst., 2021

2020
Development of a Novel Technological Readiness Assessment Tool for Fuel Cell Technology.
IEEE Access, 2020

2019
Cryptanalysis of a Pseudorandom Generator for Cross-Border E-Commerce.
Ingénierie des Systèmes d Inf., 2019

2018
Obtaining Precision-Recall Trade-Offs in Fuzzy Searches of Large Email Corpora.
Proceedings of the Advances in Digital Forensics XIV, 2018

Collecting Network Evidence Using Constrained Approximate Search Algorithms.
Proceedings of the Advances in Digital Forensics XIV, 2018

Analyzing Digital Evidence Using Parallel k-means with Triangle Inequality on Spark.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

Approximate Search in Digital Forensics.
Proceedings of the Computer and Network Security Essentials., 2018

2017
CRBP-OpType: A Constrained Approximate Search Algorithm for Detecting Similar Attack Patterns.
Proceedings of the Computer Security - ESORICS 2017 International Workshops, 2017

2014
Cloud Password Manager Using Privacy-Preserved Biometrics.
Proceedings of the 2014 IEEE International Conference on Cloud Engineering, 2014

2013
Enhancing the effectiveness of Web Application Firewalls by generic feature selection.
Log. J. IGPL, 2013

Passive Remote Source NAT Detection Using Behavior Statistics Derived from NetFlow.
Proceedings of the Emerging Management Mechanisms for the Future Internet, 2013

2012
Security properties of oscillator rings in true random number generators.
Proceedings of the IEEE 15th International Symposium on Design and Diagnostics of Electronic Circuits & Systems, 2012

2011
Improving Effectiveness of Intrusion Detection by Correlation Feature Selection.
Int. J. Mob. Comput. Multim. Commun., 2011

A new ensemble-feature-selection framework for intrusion detection.
Proceedings of the 11th International Conference on Intelligent Systems Design and Applications, 2011

Behavioral model of TRNG based on oscillator rings implemented in FPGA.
Proceedings of the 14th IEEE International Symposium on Design and Diagnostics of Electronic Circuits & Systems, 2011

Application of the Generic Feature Selection Measure in Detection of Web Attacks.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011

Towards a Biometric RandomNumber Generator - A General Approach For True Random Extraction FromBiometric Samples.
Proceedings of the BIOSIG 2011, 2011

2010
A Comparison of Feature-Selection Methods for Intrusion Detection.
Proceedings of the Computer Network Security, 2010

Towards a Generic Feature-Selection Measure for Intrusion Detection.
Proceedings of the 20th International Conference on Pattern Recognition, 2010

Improving Effectiveness of Intrusion Detection by Correlation Feature Selection.
Proceedings of the ARES 2010, 2010

2008
Application of q-Gram Distance in Digital Forensic Search.
Proceedings of the Computational Forensics, Second International Workshop, 2008

Improving the Efficiency of Misuse Detection by Means of the q-gram Distance.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

2007
Clock Control Sequence Reconstruction in the Generalized Shrinking Generator.
Proceedings of the SECRYPT 2007, 2007

Reconstruction of Suboptimal Paths in the Constrained Edit Distance Array with Application in Cryptanalysis.
Proceedings of the Computational Science and Its Applications, 2007

A New Two-Stage Search Procedure for Misuse Detection.
Proceedings of the Future Generation Communication and Networking, 2007

Improving the Efficiency of Digital Forensic Search by Means of the Constrained Edit Distance.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

A New Classification Scheme for Anonymization of Real Data Used in IDS Benchmarking.
Proceedings of the The Second International Conference on Availability, 2007

2006
FPGA for pseudorandom generator cryptanalysis.
Microprocess. Microsystems, 2006

Labelling Clusters in an Intrusion Detection System Using a Combination of Clustering Evaluation Techniques.
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006

2004
Clock Control Sequence Reconstruction in the Ciphertext Only Attack Scenario.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

2003
A Method for Clustering Web Attacks Using Edit Distance
CoRR, 2003

A new taxonomy of Web attacks suitable for efficient encoding.
Comput. Secur., 2003

A Taxonomy of Web Attacks.
Proceedings of the Web Engineering, International Conference, 2003

2002
Encoding a Taxonomy of Web Attacks with Different-Length Vectors
CoRR, 2002

2000
CRYPTANALYSIS OF THE A5/2 ALGORITHM.
IACR Cryptol. ePrint Arch., 2000

1998
Reliability test methods for media-compatible pressure sensors.
IEEE Trans. Ind. Electron., 1998


  Loading...