Stjepan Gros

Orcid: 0000-0001-6619-2859

According to our database1, Stjepan Gros authored at least 33 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Protecting Modbus/TCP-Based Industrial Automation and Control Systems Using Message Authentication Codes.
IEEE Access, 2023

JavaScript Library Version Detection.
Proceedings of the 46th MIPRO ICT and Electronics Convention, 2023

Detecting JavaScript libraries using identifiers and hashes.
Proceedings of the 46th MIPRO ICT and Electronics Convention, 2023

Detection and Analysis of Obfuscated and Minified JavaScript in the Croatian Web Space.
Proceedings of the 46th MIPRO ICT and Electronics Convention, 2023

Light-Weight Synthesis of Security Logs for Evaluation of Anomaly Detection and Security Related Experiments.
Proceedings of the 16th European Workshop on System Security, 2023

Development of Programmable Logic Controller Emulator With QEMU.
Proceedings of the 20th IEEE International Conference on Smart Technologies, 2023

Detecting Anomalies in Firewall Logs Using Artificially Generated Attacks.
Proceedings of the 17th International Conference on Telecommunications, 2023

2022
Off-the-Shelf Solutions as Potential Cyber Threats to Industrial Environments and Simple-To-Implement Protection Methodology.
IEEE Access, 2022

Automatically Generating Models of IT Systems.
IEEE Access, 2022

Analysis of the Design Space for Cybersecurity Visualizations in VizSec.
Proceedings of the IEEE Symposium on Visualization for Cyber Security, 2022

Predicting Vulnerabilities in Web Applications Based on Website Security Model.
Proceedings of the 30th International Conference on Software, 2022

Systematic review of automatic translation of high-level security policy into firewall rules.
Proceedings of the 45th Jubilee International Convention on Information, 2022

Detecting network applications using firewall logs.
Proceedings of the 45th Jubilee International Convention on Information, 2022

Use of a non-peer reviewed sources in cyber-security scientific research.
Proceedings of the 45th Jubilee International Convention on Information, 2022

2021
Myths and Misconceptions about Attackers and Attacks.
CoRR, 2021

Controlled Update of Software Components using Concurrent Exection of Patched and Unpatched Versions.
CoRR, 2021

Confidential Computing as an Attempt to Secure Service Provider's Confidential Client Data in a Multi-Tenant Cloud Environment.
Proceedings of the 44th International Convention on Information, 2021

A Survey on Applications of Formal Methods in Analysis of SCADA Systems.
Proceedings of the Critical Information Infrastructures Security, 2021

Analyzing Web Security Features using Crawlers: Study of Croatian Web.
Proceedings of the 16th International Conference on Telecommunications, 2021

A Critical View on CIS Controls.
Proceedings of the 16th International Conference on Telecommunications, 2021

2020
Research Directions in Cyber Threat Intelligence.
CoRR, 2020

Red Teams - Pentesters, APTs, or Neither.
Proceedings of the 43rd International Convention on Information, 2020

Security Risk Optimization for Multi-cloud Applications.
Proceedings of the Applications of Evolutionary Computation - 23rd European Conference, 2020

2017
An experiment in using IMUNES and Conpot to emulate honeypot control networks.
Proceedings of the 40th International Convention on Information and Communication Technology, 2017

2016
Can malware analysts be assisted in their work using techniques from machine learning?
Proceedings of the 39th International Convention on Information and Communication Technology, 2016

2015
Android-powered web server for volunteer-based environment sensing.
Proceedings of the 38th International Convention on Information and Communication Technology, 2015

2014
Benu: Operating System Increments for Embedded Systems Engineer's Education.
Proceedings of the 2014 Federated Conference on Computer Science and Information Systems, 2014

2012
Determining autonomous systems reputation based on DNS measurements.
Proceedings of the 2012 Proceedings of the 35th International Convention, 2012

2011
Complex systems and risk management.
Proceedings of the MIPRO, 2011

2009
A method for identifying Web applications.
Int. J. Inf. Sec., 2009

Testing Task Schedulers on Linux System.
Proceedings of the Innovations in Computing Sciences and Software Engineering, 2009

2008
StudTest - A Platform Supporting Complex and Interactive Knowledge Assessment.
Int. J. Emerg. Technol. Learn., 2008

Load balancing MPI algorithm for high throughput applications.
Proceedings of the ITI 2008 30th International Conference on Information Technology Interfaces, 2008


  Loading...