Ilija Basicevic

Orcid: 0000-0001-8824-5560

According to our database1, Ilija Basicevic authored at least 34 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Towards Formal Verification of Federated Learning Orchestration Protocols on Satellites.
CoRR, 2024

MicroPython Testbed for Federated Learning Algorithms.
CoRR, 2024

PTB-FLA development paradigm adaptation for ChatGPT.
Comput. Sci. Inf. Syst., 2024

2023
Developing Elementary Federated Learning Algorithms Leveraging the ChatGPT.
CoRR, 2023

An analysis of the TR069 (CWMP) protocol.
Proceedings of the 46th MIPRO ICT and Electronics Convention, 2023

A Federated Learning Algorithms Development Paradigm.
Proceedings of the Engineering of Computer-Based Systems - 8th International Conference, 2023

2022
On the use of principal component analysis in the entropy based detection of denial-of-service attacks.
Secur. Priv., 2022

2021
On the use of generalized entropy formulas in detection of denial-of-service attacks.
Secur. Priv., 2021

2019
Reducing Channel Change Time by System Architecture Changes in DVB-S/C/T Set Top Boxes.
IEEE Trans. Consumer Electron., 2019

Application of entropy formulas in detection of denial-of-service attacks.
Int. J. Commun. Syst., 2019

A practical approach to detection of distributed denial-of-service attacks using a hybrid detection method.
Comput. Electr. Eng., 2019

2018
A Fast Channel Change Technique Based on Channel Prediction.
IEEE Trans. Consumer Electron., 2018

Evaluation of Takagi-Sugeno-Kang fuzzy method in entropy-based detection of DDoS attacks.
Comput. Sci. Inf. Syst., 2018

Digital Cockpit in AUTOSAR Adaptive Context.
Proceedings of the 8th IEEE International Conference on Consumer Electronics - Berlin, 2018

2017
Software upgrade of multi-streaming feature in Common Interface plus V1.4.
Proceedings of the IEEE International Conference on Consumer Electronics, 2017

An approach to formal verification of python software transactional memory.
Proceedings of the Fifth European Conference on the Engineering of Computer-Based Systems, 2017

2016
The value of flow size distribution in entropy-based detection of DoS attacks.
Secur. Commun. Networks, 2016

2015
Use of Tsallis entropy in detection of SYN flood DoS attacks.
Secur. Commun. Networks, 2015

Evaluation of entropy-based detection of outbound denial-of-service attacks in edge networks.
Secur. Commun. Networks, 2015

Bandwidth estimation in adapti1v e video streaming over HTTP.
Proceedings of the IEEE International Conference on Consumer Electronics, 2015

Work, Span, and Parallelism of Transactional Memory Programs.
Proceedings of the 2015 4th Eastern European Regional Conference on the Engineering of Computer Based Systems, 2015

DPM-PSTM: Dual-Port Memory Based Python Software Transactional Memory.
Proceedings of the 2015 4th Eastern European Regional Conference on the Engineering of Computer Based Systems, 2015

2014
One solution of a RESTful API for a cloud based DTV content provider.
Proceedings of the IEEE Fourth International Conference on Consumer Electronics Berlin, 2014

Sat>IP server implementation on an embedded platform.
Proceedings of the IEEE Fourth International Conference on Consumer Electronics Berlin, 2014

Sat>IP client integration in a DVB software stack.
Proceedings of the IEEE Fourth International Conference on Consumer Electronics Berlin, 2014

2012
A Host Based Method for Data Leak Protection by Tracking Sensitive Data Flow.
Proceedings of the IEEE 19th International Conference and Workshops on Engineering of Computer-Based Systems, 2012

2011
On the application of fuzzy-based flow control approach to High Altitude Platform communications.
Appl. Intell., 2011

2010
Test case generation for the task tree type of architecture.
Inf. Softw. Technol., 2010

Use of Finite State Machine Based Framework in Implementation of Communication Protocols - A Case Study.
Proceedings of the Sixth Advanced International Conference on Telecommunications, 2010

2009
A Task Tree Executor: New Runtime for Parallelized Legacy Software.
Proceedings of the 16th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems, 2009

An Approach to Parallelization of Legacy Software.
Proceedings of the First IEEE Eastern European Conference on the Engineering of Computer Based Systems, 2009

2007
Use of Publisher-Subscriber Design Pattern in Infrastructure of Distributed IDS Systems.
Proceedings of the Third International Conference on Networking and Services (ICNS 2007), 2007

2006
A Model-Based Statistical Usage Testing of Communication Protocols.
Proceedings of the 13th Annual IEEE International Conference and Workshop on Engineering of Computer Based Systems (ECBS 2006), 2006

2005
The Use of Distributed Network-Based IDS Systems in Detection of Evasion Attacks.
Proceedings of the Telecommunications 2005: Advanced Industrial Conference on Telecommunications / Service Assurance with Partial and Intermittent Resources Conference / E-Learning on Telecommunications Workshop (AICT / SAPIR / ELETE 2005), 2005


  Loading...