Natalija Vlajic
Orcid: 0000-0001-9921-0128
According to our database1,
Natalija Vlajic
authored at least 62 papers
between 1998 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Risk-Based Methodology for Optimal Cryptoperiod Calculation in ICSs Under Data Siphoning Attack.
Proceedings of the 2024 Workshop on Re-design Industrial Control Systems with Security, 2024
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024
ReBotDetector: A Detection Model with LSTM Feature Extractor for Session-Replay Web Bot Attacks.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024
2023
Guest Editorial: Security of Communication Protocols in Industrial Control Systems (ICSs).
IEEE Commun. Mag., June, 2023
ReMouse Dataset: On the Efficacy of Measuring the Similarity of Human-Generated Trajectories for the Detection of Session-Replay Bots.
J. Cybersecur. Priv., March, 2023
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023
PIRAT - Tool for Automated Cyber-risk Assessment of PLC Components & Systems Deploying NVD CVE & MITRE ATT&CK Databases.
Proceedings of the ACM/IEEE 14th International Conference on Cyber-Physical Systems, 2023
Proceedings of the 10th ACM Workshop on Moving Target Defense, 2023
Analysis of Novel Mouse Dynamics Dataset with Repeat Sessions: Helpful Observations for Tackling Session-Replay Bot.
Proceedings of the 20th IEEE Consumer Communications & Networking Conference, 2023
2022
Randomized Moving Target Approach for MAC-Layer Spoofing Detection and Prevention in IoT Systems.
DTRAP, 2022
Survey of Remote TLS Vulnerability Scanning Tools and Snapshot of TLS Use in Banking Sector.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022
Real World Snapshot of Trends in IoT Device and Protocol Deployment: IEEE CNS 22 Poster.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022
Poster: ReMouse Dataset: Measuring Similarity of Human-Generated Trajectories as an Important Step in Dealing with Session-Replay Bots.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Effective Segmentation of RSSI Timeseries Produced by Stationary IoT Nodes: Comparative Study.
Proceedings of the Attacks and Defenses for the Internet-of-Things, 2022
2021
J. Cybersecur. Priv., December, 2021
J. Cybersecur. Priv., August, 2021
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2021
Unsupervised ML Based Detection of Malicious Web Sessions with Automated Feature Selection: Design and Real-World Validation.
Proceedings of the 18th IEEE Annual Consumer Communications & Networking Conference, 2021
2020
MAC-Layer Spoofing Detection and Prevention in IoT Systems: Randomized Moving Target Approach.
Proceedings of the CPSIOTSEC'20: Proceedings of the 2020 Joint Workshop on CPS&IoT Security and Privacy, 2020
2019
Near-optimal Evasion of Randomized Convex-inducing Classifiers in Adversarial Environments.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
2018
Proceedings of the 20th IEEE Conference on Business Informatics, 2018
Proceedings of the IEEE International Conference on Industrial Internet, 2018
Robustness of deep autoencoder in intrusion detection under adversarial contamination.
Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, 2018
Proceedings of the 2nd International Workshop on Multimedia Privacy and Security, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
J. Cyber Secur. Mobil., 2017
Current state of client-side extensions aimed at protecting against CSRF-like attacks.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
2016
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
2015
Next Generation of Impersonator Bots: Mimicking Human Browsing on Previously Unvisited Sites.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
Web bots that mimic human browsing behavior on previously unvisited web-sites: Feasibility study and security implications.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
2014
Next Generation Application-Layer DDoS Defences: Applying the Concepts of Outlier Detection in Data Streams with Concept Drift.
Proceedings of the 13th International Conference on Machine Learning and Applications, 2014
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014
Proceedings of the 2014 IEEE GLOBECOM Workshops, Austin, TX, USA, December 8-12, 2014, 2014
Application-layer DDoS in dynamic Web-domains: Building defenses against next-generation attack behavior.
Proceedings of the IEEE Conference on Communications and Network Security, 2014
2013
Detection of malicious and non-malicious website visitors using unsupervised neural network learning.
Appl. Soft Comput., 2013
2012
The Role of DNS TTL Values in Potential DDoS Attacks: What Do the Major Banks Know About It?
Proceedings of the 3rd International Conference on Ambient Systems, 2012
Expert Syst. Appl., 2012
Proceedings of the 2012 World Congress on Internet Security, 2012
Proceedings of the 2012 World Congress on Internet Security, 2012
Proceedings of the 2012 World Congress on Internet Security, 2012
2011
Unsupervised Clustering of Web Sessions to Detect Malicious and Non-malicious Website Users.
Proceedings of the 2nd International Conference on Ambient Systems, 2011
Strategies for improving performance of IEEE 802.15.4/ZigBee WSNs with path-constrained mobile sink(s).
Comput. Commun., 2011
Proceedings of the Foundations of Intelligent Systems - 19th International Symposium, 2011
2009
Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, 2009
A Simulation-Based Performance Analysis of Various Multipath Routing Techniques in ZigBee Sensor Networks.
Proceedings of the Ad Hoc Networks, First International Conference, 2009
2008
Performance of IEEE 802.15.4 in wireless sensor networks with a mobile sink implementing various mobility strategies.
Proceedings of the LCN 2008, 2008
2007
Comprehensive Study of Node Clustering in Wireless Sensor Networks for Environment Monitoring.
Ad Hoc Sens. Wirel. Networks, 2007
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
2006
Proceedings of the 2006 International Symposium on a World of Wireless, 2006
Proceedings of the Canadian Conference on Electrical and Computer Engineering, 2006
2004
IEEE/ACM Trans. Netw., 2004
2003
Proceedings of IEEE International Conference on Communications, 2003
2001
Vector quantization of images using modified adaptive resonance algorithm for hierarchical clustering.
IEEE Trans. Neural Networks, 2001
2000
Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks, 2000
1999
Proceedings of the International Joint Conference Neural Networks, 1999
1998
J. Netw. Comput. Appl., 1998