default search action
Slobodan Petrovic
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j13]Samson O. Oruma, Slobodan Petrovic:
Security Threats to 5G Networks for Social Robots in Public Spaces: A Survey. IEEE Access 11: 63205-63237 (2023) - [j12]Mohammad Mahmudul Hasan, Michael Cheffena, Slobodan Petrovic:
Physical-Layer Security Improvement in MIMO OFDM Systems Using Multilevel Chaotic Encryption. IEEE Access 11: 64468-64475 (2023) - [j11]Petter Solnør, Slobodan Petrovic, Thor I. Fossen:
Towards Oblivious Guidance Systems for Autonomous Vehicles. IEEE Trans. Veh. Technol. 72(6): 7067-7081 (2023) - 2022
- [j10]Petter Solnør, Øystein Volden, Kristoffer Gryte, Slobodan Petrovic, Thor I. Fossen:
Hijacking of unmanned surface vehicles: A demonstration of attacks and countermeasures in the field. J. Field Robotics 39(5): 631-649 (2022) - [j9]Álvaro Herrero, Emilio Corchado, Michal Wozniak, Sung-Bae Cho, Slobodan Petrovic:
Cybersecurity applications of computational intelligence. Neural Comput. Appl. 34(23): 20447-20448 (2022) - 2021
- [j8]Øystein Volden, Petter Solnør, Slobodan Petrovic, Thor I. Fossen:
Secure and Efficient Transmission of Vision-Based Feedback Control Signals. J. Intell. Robotic Syst. 103(2): 26 (2021) - 2020
- [j7]Slobodan Petrovic, Eklas Hossain:
Development of a Novel Technological Readiness Assessment Tool for Fuel Cell Technology. IEEE Access 8: 132237-132252 (2020)
2010 – 2019
- 2019
- [j6]Lelai Shi, Suhui Liu, Slobodan Petrovic:
Cryptanalysis of a Pseudorandom Generator for Cross-Border E-Commerce. Ingénierie des Systèmes d Inf. 24(4): 361-365 (2019) - 2018
- [c24]Ambika Shrestha Chitrakar, Slobodan Petrovic:
Analyzing Digital Evidence Using Parallel k-means with Triangle Inequality on Spark. IEEE BigData 2018: 3049-3058 - [c23]Kyle Porter, Slobodan Petrovic:
Obtaining Precision-Recall Trade-Offs in Fuzzy Searches of Large Email Corpora. IFIP Int. Conf. Digital Forensics 2018: 67-85 - [c22]Ambika Shrestha Chitrakar, Slobodan Petrovic:
Collecting Network Evidence Using Constrained Approximate Search Algorithms. IFIP Int. Conf. Digital Forensics 2018: 141-160 - [p1]Slobodan Petrovic:
Approximate Search in Digital Forensics. Computer and Network Security Essentials 2018: 355-367 - 2017
- [c21]Ambika Shrestha Chitrakar, Slobodan Petrovic:
CRBP-OpType: A Constrained Approximate Search Algorithm for Detecting Similar Attack Patterns. CyberICPS/SECPRE@ESORICS 2017: 163-176 - 2014
- [c20]Bian Yang, Huiguang Chu, Guoqiang Li, Slobodan Petrovic, Christoph Busch:
Cloud Password Manager Using Privacy-Preserved Biometrics. IC2E 2014: 505-509 - 2013
- [j5]Hai Thanh Nguyen, Carmen Torrano-Gimenez, Gonzalo Álvarez, Katrin Franke, Slobodan Petrovic:
Enhancing the effectiveness of Web Application Firewalls by generic feature selection. Log. J. IGPL 21(4): 560-570 (2013) - [c19]Sebastian Abt, Christian Dietz, Harald Baier, Slobodan Petrovic:
Passive Remote Source NAT Detection Using Behavior Statistics Derived from NetFlow. AIMS 2013: 148-159 - 2012
- [c18]Knut Wold, Slobodan Petrovic:
Security properties of oscillator rings in true random number generators. DDECS 2012: 145-150 - 2011
- [j4]Hai Thanh Nguyen, Katrin Franke, Slobodan Petrovic:
Improving Effectiveness of Intrusion Detection by Correlation Feature Selection. Int. J. Mob. Comput. Multim. Commun. 3(1): 21-34 (2011) - [c17]Daniel Hartung, Knut Wold, Kalman Graffi, Slobodan Petrovic:
Towards a Biometric RandomNumber Generator - A General Approach For True Random Extraction FromBiometric Samples. BIOSIG 2011: 267-274 - [c16]Hai Thanh Nguyen, Carmen Torrano-Gimenez, Gonzalo Álvarez, Slobodan Petrovic, Katrin Franke:
Application of the Generic Feature Selection Measure in Detection of Web Attacks. CISIS 2011: 25-32 - [c15]Knut Wold, Slobodan Petrovic:
Behavioral model of TRNG based on oscillator rings implemented in FPGA. DDECS 2011: 163-166 - [c14]Hai Thanh Nguyen, Katrin Franke, Slobodan Petrovic:
A new ensemble-feature-selection framework for intrusion detection. ISDA 2011: 213-218 - 2010
- [c13]Hai Nguyen, Katrin Franke, Slobodan Petrovic:
Improving Effectiveness of Intrusion Detection by Correlation Feature Selection. ARES 2010: 17-24 - [c12]Hai Thanh Nguyen, Katrin Franke, Slobodan Petrovic:
Towards a Generic Feature-Selection Measure for Intrusion Detection. ICPR 2010: 1529-1532 - [c11]Hai Thanh Nguyen, Slobodan Petrovic, Katrin Franke:
A Comparison of Feature-Selection Methods for Intrusion Detection. MMM-ACNS 2010: 242-255
2000 – 2009
- 2008
- [c10]Slobodan Petrovic, Sverre Bakke:
Improving the Efficiency of Misuse Detection by Means of the q-gram Distance. IAS 2008: 205-208 - [c9]Slobodan Petrovic, Sverre Bakke:
Application of q-Gram Distance in Digital Forensic Search. IWCF 2008: 159-168 - 2007
- [c8]Vidar Evenrud Seeberg, Slobodan Petrovic:
A New Classification Scheme for Anonymization of Real Data Used in IDS Benchmarking. ARES 2007: 385-390 - [c7]Slobodan Petrovic, Katrin Franke:
Improving the Efficiency of Digital Forensic Search by Means of the Constrained Edit Distance. IAS 2007: 405-410 - [c6]Slobodan Petrovic, Katrin Franke:
A New Two-Stage Search Procedure for Misuse Detection. FGCN (2) 2007: 418-422 - [c5]Slobodan Petrovic, Amparo Fúster-Sabater:
Reconstruction of Suboptimal Paths in the Constrained Edit Distance Array with Application in Cryptanalysis. ICCSA (3) 2007: 597-610 - [c4]Slobodan Petrovic:
Clock Control Sequence Reconstruction in the Generalized Shrinking Generator. SECRYPT 2007: 259-262 - 2006
- [j3]Slobodan Bojanic, Gabriel Caffarena, Slobodan Petrovic, Octavio Nieto-Taladriz:
FPGA for pseudorandom generator cryptanalysis. Microprocess. Microsystems 30(2): 63-71 (2006) - [c3]Slobodan Petrovic, Gonzalo Álvarez, Agustín Orfila, Javier Ignacio Carbó Rubiera:
Labelling Clusters in an Intrusion Detection System Using a Combination of Clustering Evaluation Techniques. HICSS 2006 - 2004
- [c2]Slobodan Petrovic, Amparo Fúster-Sabater:
Clock Control Sequence Reconstruction in the Ciphertext Only Attack Scenario. ICICS 2004: 427-439 - 2003
- [j2]Gonzalo Álvarez, Slobodan Petrovic:
A new taxonomy of Web attacks suitable for efficient encoding. Comput. Secur. 22(5): 435-449 (2003) - [c1]Gonzalo Álvarez, Slobodan Petrovic:
A Taxonomy of Web Attacks. ICWE 2003: 295-298 - [i3]Slobodan Petrovic, Gonzalo Álvarez:
A Method for Clustering Web Attacks Using Edit Distance. CoRR cs.IR/0304007 (2003) - 2002
- [i2]Gonzalo Álvarez, Slobodan Petrovic:
Encoding a Taxonomy of Web Attacks with Different-Length Vectors. CoRR cs.CR/0210026 (2002) - 2000
- [i1]Slobodan Petrovic, Amparo Fúster-Sabater:
CRYPTANALYSIS OF THE A5/2 ALGORITHM. IACR Cryptol. ePrint Arch. 2000: 52 (2000)
1990 – 1999
- 1998
- [j1]Slobodan Petrovic, Adan Ramirez, Theresa Maudie, Dennis Stanerson, John Wertz, Gordon Bitko, Jeanene Matkin, David J. Monk:
Reliability test methods for media-compatible pressure sensors. IEEE Trans. Ind. Electron. 45(6): 877-885 (1998)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:50 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint