Kemal Hajdarevic
According to our database1,
Kemal Hajdarevic
authored at least 15 papers
between 2004 and 2017.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2017
Cloud computing threats classification model based on the detection feasibility of machine learning algorithms.
Proceedings of the 40th International Convention on Information and Communication Technology, 2017
Training network managers in ethical hacking techniques to manage resource starvation attacks using GNS3 simulator.
Proceedings of the XXVI International Conference on Information, 2017
2015
A low energy computer infrastructure for radio VOIP supported communication and SDR APRS in education and disaster relief situations.
Proceedings of the 38th International Convention on Information and Communication Technology, 2015
An approach to digital evidence collection for successful forensic application: An investigation of blackmail case.
Proceedings of the 38th International Convention on Information and Communication Technology, 2015
Internal penetration testing of Bring Your Own Device (BYOD) for preventing vulnerabilities exploitation.
Proceedings of the XXV International Conference on Information, 2015
2012
Proceedings of the 2012 Proceedings of the 35th International Convention, 2012
New generation operations systems and software and SOA improving the business of telecom operator.
Proceedings of the 2012 Proceedings of the 35th International Convention, 2012
Proceedings of the 34th International Conference on Information Technology Interfaces, 2012
2011
Proceedings of the MIPRO, 2011
Simulation application for Sleep-Awake Probabilistic Forwarding Protocol for Smart Dust environments.
Proceedings of the MIPRO, 2011
New forensic method for measuring dynamic changes of EMF level limits using smart dust.
Proceedings of the XXIII International Symposium on Information, 2011
2009
Proceedings of the XXII International Symposium on Information, 2009
2008
Early detection of network problems using existing network indicators : local agent based approach.
PhD thesis, 2008
2007
Timing considerations in detecting resource starvation attacks using statistical profiles.
Int. J. Electron. Secur. Digit. Forensics, 2007
2004
Training Network Managers to Recognise Intrusion Attacks.
Proceedings of the ICETE 2004, 2004