default search action
Natalija Vlajic
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c45]Shadi Sadeghpour, Natalija Vlajic:
ReBotDetector: A Detection Model with LSTM Feature Extractor for Session-Replay Web Bot Attacks. CSR 2024: 16-21 - [c44]Daniel Brown, Natalija Vlajic:
Novel Approach to Tor User De-Anonymization: Client-Side Generated Watermark. CSR 2024: 90-95 - [c43]Natalija Vlajic, Gabriele Cianfarani, Robert Noce:
Data Siphoning in ICSs: Attack Tree and Role of Cryptoperiods. CSR 2024: 193-199 - 2023
- [j15]Natalija Vlajic, Jelena Mirkovic, Robert Noce:
Guest Editorial: Security of Communication Protocols in Industrial Control Systems (ICSs). IEEE Commun. Mag. 61(6): 20 (2023) - [j14]Shadi Sadeghpour, Natalija Vlajic:
ReMouse Dataset: On the Efficacy of Measuring the Similarity of Human-Generated Trajectories for the Detection of Session-Replay Bots. J. Cybersecur. Priv. 3(1): 95-117 (2023) - [c42]Shadi Sadeghpour, Natalija Vlajic:
Analysis of Novel Mouse Dynamics Dataset with Repeat Sessions: Helpful Observations for Tackling Session-Replay Bot. CCNC 2023: 790-797 - [c41]Shadi Sadeghpour, Natalija Vlajic:
RanABD: MTD-Based Technique for Detection of Advanced Session-Replay Web Bots. MTD@CCS 2023: 17-23 - [c40]Natalija Vlajic, Stefan Petrovic, Gabriele Cianfarani:
PIRAT - Tool for Automated Cyber-risk Assessment of PLC Components & Systems Deploying NVD CVE & MITRE ATT&CK Databases. ICCPS 2023: 237-238 - [c39]Natalija Vlajic, Daniel Brown:
Poster: Novel Client-Side Watermarking Technique for Tor User De-Anonymization. IMC 2023: 720-721 - 2022
- [c38]Pooria Madani, Natalija Vlajic:
Effective Segmentation of RSSI Timeseries Produced by Stationary IoT Nodes: Comparative Study. ADIoT 2022: 84-101 - [c37]Shadi Sadeghpour, Natalija Vlajic:
Poster: ReMouse Dataset: Measuring Similarity of Human-Generated Trajectories as an Important Step in Dealing with Session-Replay Bots. CCS 2022: 3447-3449 - [c36]Daniel Brown, Gabriele Cianfarani, Natalija Vlajic:
Real World Snapshot of Trends in IoT Device and Protocol Deployment: IEEE CNS 22 Poster. CNS 2022: 1-2 - [c35]Jay Chung, Natalija Vlajic:
Survey of Remote TLS Vulnerability Scanning Tools and Snapshot of TLS Use in Banking Sector. CNS 2022: 1-2 - [d1]Shadi Sadeghpour, Natalija Vlajic:
ReMouse - mouse dynamic dataset. IEEE DataPort, 2022 - 2021
- [j13]Shadi Sadeghpour, Natalija Vlajic:
Click Fraud in Digital Advertising: A Comprehensive Survey. Comput. 10(12): 164 (2021) - [j12]Pooria Madani, Natalija Vlajic:
RSSI-Based MAC-Layer Spoofing Detection: Deep Learning Approach. J. Cybersecur. Priv. 1(3): 453-469 (2021) - [j11]Shadi Sadeghpour, Natalija Vlajic:
Ads and Fraud: A Comprehensive Survey of Fraud in Online Advertising. J. Cybersecur. Priv. 1(4): 804-832 (2021) - [c34]Shadi Sadeghpour, Natalija Vlajic, Pooria Madani, Dusan Stevanovic:
Unsupervised ML Based Detection of Malicious Web Sessions with Automated Feature Selection: Design and Real-World Validation. CCNC 2021: 1-9 - [c33]Josh Sahota, Natalija Vlajic:
Mozi IoT Malware and Its Botnets: From Theory To Real-World Observations. CSCI 2021: 698-703 - 2020
- [c32]Pooria Madani, Natalija Vlajic, Shadi Sadeghpour:
MAC-Layer Spoofing Detection and Prevention in IoT Systems: Randomized Moving Target Approach. CPSIOTSEC@CCS 2020: 71-80
2010 – 2019
- 2019
- [j10]Natalija Vlajic, Mashruf Chowdhury, Marin Litoiu:
IP Spoofing In and Out of the Public Cloud: From Policy to Practice. Comput. 8(4): 81 (2019) - [c31]Pooria Madani, Natalija Vlajic:
Near-optimal Evasion of Randomized Convex-inducing Classifiers in Adversarial Environments. ARES 2019: 32:1-32:6 - 2018
- [j9]Natalija Vlajic, Daiwei Zhou:
IoT as a Land of Opportunity for DDoS Hackers. Computer 51(7): 26-34 (2018) - [c30]Natalija Vlajic, Marmara El Masri, Gianluigi M. Riva, Marguerite Barry, Derek Doran:
Online Tracking of Kids and Teens by Means of Invisible Images: COPPA vs. GDPR. MPS@CCS 2018: 96-103 - [c29]Zachary Matthews, Natalija Vlajic:
Can Browser Add-Ons Protect Your Children from Online Tracking? CCS 2018: 2243-2245 - [c28]Pooria Madani, Natalija Vlajic:
Robustness of deep autoencoder in intrusion detection under adversarial contamination. HotSoS 2018: 1:1-1:8 - [c27]Natalija Vlajic, Daiwei Zhou, Jonathan Tung:
IoT Cameras and DVRs as DDoS Reflectors: Pros and Cons from Hacker's Perspective. ICII 2018: 181-187 - [c26]Natalija Vlajic, Shun-Nam Wilson Chow, Xavon Charles:
Malwareless Web-Analytics Pollution (MWAP): A Very Simple Yet Invincible Attack. CBI (2) 2018: 100-107 - 2017
- [j8]Xue Ying Shi, Natalija Vlajic, Hamzeh Roumani, Pooria Madani:
Rethinking the Use of Resource Hints in HTML5: Is Faster Always Better!? J. Cyber Secur. Mobil. 6(2): 195-226 (2017) - [c25]Natalija Vlajic, Xue Ying Shi, Hamzeh Roumani, Pooria Madani:
Resource Hints in HTML5: A New Pandora's Box of Security Nightmares. ARES 2017: 61:1-61:9 - [c24]Marmara El Masri, Natalija Vlajic:
Current state of client-side extensions aimed at protecting against CSRF-like attacks. CNS 2017: 390-391 - 2016
- [c23]Pooria Madani, Natalija Vlajic:
Towards sequencing malicious system calls. CNS 2016: 376-377 - 2015
- [c22]Y. Yang, Natalija Vlajic, Uyen Trang Nguyen:
Web bots that mimic human browsing behavior on previously unvisited web-sites: Feasibility study and security implications. CNS 2015: 757-758 - [c21]Yang Yang, Natalija Vlajic, Uyen Trang Nguyen:
Next Generation of Impersonator Bots: Mimicking Human Browsing on Previously Unvisited Sites. CSCloud 2015: 356-361 - 2014
- [c20]Dusan Stevanovic, Natalija Vlajic:
Application-layer DDoS in dynamic Web-domains: Building defenses against next-generation attack behavior. CNS 2014: 490-491 - [c19]Natalija Vlajic, Armin Slopek:
Web bugs in the cloud: Feasibility study of a new form of EDoS attack. GLOBECOM Workshops 2014: 64-69 - [c18]Natalija Vlajic, Armin Slopek:
Performance and economies of 'bot-less' application-layer DDoS attacks. ICITST 2014: 318-323 - [c17]Dusan Stevanovic, Natalija Vlajic:
Next Generation Application-Layer DDoS Defences: Applying the Concepts of Outlier Detection in Data Streams with Concept Drift. ICMLA 2014: 456-462 - 2013
- [j7]Dusan Stevanovic, Natalija Vlajic, Aijun An:
Detection of malicious and non-malicious website visitors using unsupervised neural network learning. Appl. Soft Comput. 13(1): 698-708 (2013) - 2012
- [j6]Dusan Stevanovic, Aijun An, Natalija Vlajic:
Feature evaluation for web crawler detection with data mining techniques. Expert Syst. Appl. 39(10): 8707-8717 (2012) - [c16]Dimitry Drinfeld, Natalija Vlajic:
Smart crawlers for flash-crowd DDoS: The attacker's perspective. WorldCIS 2012: 37-44 - [c15]Alex Naumov, Natalija Vlajic, Hamzeh Roumani:
VLUS: Visual location-based URL screening tool for improved WWW security. WorldCIS 2012: 132-138 - [c14]Maria Angel Marquez Andrade, Natalija Vlajic:
Dirt Jumper: A key player in today's botnet-for-DDoS market. WorldCIS 2012: 239-244 - [c13]Natalija Vlajic, Maria Angel Marquez Andrade, Uyen Trang Nguyen:
The Role of DNS TTL Values in Potential DDoS Attacks: What Do the Major Banks Know About It? ANT/MobiWIS 2012: 466-473 - 2011
- [j5]Natalija Vlajic, Dusan Stevanovic, George Spanogiannopoulos:
Strategies for improving performance of IEEE 802.15.4/ZigBee WSNs with path-constrained mobile sink(s). Comput. Commun. 34(6): 743-757 (2011) - [c12]Dusan Stevanovic, Aijun An, Natalija Vlajic:
Detecting Web Crawlers from Web Server Access Logs with Data Mining Classifiers. ISMIS 2011: 483-489 - [c11]Dusan Stevanovic, Natalija Vlajic, Aijun An:
Unsupervised Clustering of Web Sessions to Detect Malicious and Non-malicious Website Users. ANT/MobiWIS 2011: 123-131
2000 – 2009
- 2009
- [c10]George Spanogiannopoulos, Natalija Vlajic, Dusan Stevanovic:
A Simulation-Based Performance Analysis of Various Multipath Routing Techniques in ZigBee Sensor Networks. ADHOCNETS 2009: 300-315 - [c9]Natalija Vlajic, Dusan Stevanovic:
Sink mobility in wireless sensor networks: a (mis)match between theory and practice. IWCMC 2009: 386-393 - 2008
- [c8]Dusan Stevanovic, Natalija Vlajic:
Performance of IEEE 802.15.4 in wireless sensor networks with a mobile sink implementing various mobility strategies. LCN 2008: 680-688 - 2007
- [j4]Dawei Xia, Natalija Vlajic:
Comprehensive Study of Node Clustering in Wireless Sensor Networks for Environment Monitoring. Ad Hoc Sens. Wirel. Networks 4(3): 199-228 (2007) - [c7]Dawei Xia, Natalija Vlajic:
Near-Optimal Node Clustering in Wireless sensor Networks for Environment Monitoring. AINA 2007: 632-641 - 2006
- [c6]Ting Xue, Natalija Vlajic:
Analytical and Simulation Based Evaluation of Wireless-to-Wireline TCP-SYN Attacks. CCECE 2006: 746-749 - [c5]Dawei Xia, Natalija Vlajic:
Near-Optimal Node Clustering in Wireless Sensor Networks for Environment Monitoring. CCECE 2006: 1825-1829 - [c4]Natalija Vlajic, David Xia:
Wireless Sensor Networks: To Cluster or Not To Cluster?. WOWMOM 2006: 258-268 - 2004
- [j3]Natalija Vlajic, Charalambos D. Charalambous, Dimitrios Makrakis:
Performance aspects of data broadcast in wireless networks with user retrials. IEEE/ACM Trans. Netw. 12(4): 620-633 (2004) - 2003
- [c3]Natalija Vlajic, Charalambos D. Charalambous, Dimitrios Makrakis:
Wireless data broadcast in systems of hierarchical cellular organization. ICC 2003: 1863-1869 - 2001
- [j2]Natalija Vlajic, Howard C. Card:
Vector quantization of images using modified adaptive resonance algorithm for hierarchical clustering. IEEE Trans. Neural Networks 12(5): 1147-1162 (2001) - 2000
- [c2]Natalija Vlajic, Thomas Kunz, Howard C. Card:
Image-Compression for Wireless World Wide Web Browsing: A Neural Network Approach. IJCNN (1) 2000: 169-176
1990 – 1999
- 1999
- [c1]Natalija Vlajic, Howard C. Card:
An adaptive neural network approach to hypertext clustering. IJCNN 1999: 3722-3726 - 1998
- [j1]Natalija Vlajic, Howard C. Card:
Categorizing Web pages on the subject of neural networks. J. Netw. Comput. Appl. 21(2): 91-105 (1998)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint