Natalija Vlajic

Orcid: 0000-0001-9921-0128

According to our database1, Natalija Vlajic authored at least 62 papers between 1998 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Risk-Based Methodology for Optimal Cryptoperiod Calculation in ICSs Under Data Siphoning Attack.
Proceedings of the 2024 Workshop on Re-design Industrial Control Systems with Security, 2024

Data Siphoning in ICSs: Attack Tree and Role of Cryptoperiods.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024

ReBotDetector: A Detection Model with LSTM Feature Extractor for Session-Replay Web Bot Attacks.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024

Novel Approach to Tor User De-Anonymization: Client-Side Generated Watermark.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024

2023
Guest Editorial: Security of Communication Protocols in Industrial Control Systems (ICSs).
IEEE Commun. Mag., June, 2023

ReMouse Dataset: On the Efficacy of Measuring the Similarity of Human-Generated Trajectories for the Detection of Session-Replay Bots.
J. Cybersecur. Priv., March, 2023

Poster: Novel Client-Side Watermarking Technique for Tor User De-Anonymization.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023

PIRAT - Tool for Automated Cyber-risk Assessment of PLC Components & Systems Deploying NVD CVE & MITRE ATT&CK Databases.
Proceedings of the ACM/IEEE 14th International Conference on Cyber-Physical Systems, 2023

RanABD: MTD-Based Technique for Detection of Advanced Session-Replay Web Bots.
Proceedings of the 10th ACM Workshop on Moving Target Defense, 2023

Analysis of Novel Mouse Dynamics Dataset with Repeat Sessions: Helpful Observations for Tackling Session-Replay Bot.
Proceedings of the 20th IEEE Consumer Communications & Networking Conference, 2023

2022
ReMouse - mouse dynamic dataset.
Dataset, August, 2022

Randomized Moving Target Approach for MAC-Layer Spoofing Detection and Prevention in IoT Systems.
DTRAP, 2022

Survey of Remote TLS Vulnerability Scanning Tools and Snapshot of TLS Use in Banking Sector.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

Real World Snapshot of Trends in IoT Device and Protocol Deployment: IEEE CNS 22 Poster.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

Poster: ReMouse Dataset: Measuring Similarity of Human-Generated Trajectories as an Important Step in Dealing with Session-Replay Bots.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Effective Segmentation of RSSI Timeseries Produced by Stationary IoT Nodes: Comparative Study.
Proceedings of the Attacks and Defenses for the Internet-of-Things, 2022

2021
Ads and Fraud: A Comprehensive Survey of Fraud in Online Advertising.
J. Cybersecur. Priv., December, 2021

RSSI-Based MAC-Layer Spoofing Detection: Deep Learning Approach.
J. Cybersecur. Priv., August, 2021

Click Fraud in Digital Advertising: A Comprehensive Survey.
Comput., 2021

Mozi IoT Malware and Its Botnets: From Theory To Real-World Observations.
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2021

Unsupervised ML Based Detection of Malicious Web Sessions with Automated Feature Selection: Design and Real-World Validation.
Proceedings of the 18th IEEE Annual Consumer Communications & Networking Conference, 2021

2020
MAC-Layer Spoofing Detection and Prevention in IoT Systems: Randomized Moving Target Approach.
Proceedings of the CPSIOTSEC'20: Proceedings of the 2020 Joint Workshop on CPS&IoT Security and Privacy, 2020

2019
IP Spoofing In and Out of the Public Cloud: From Policy to Practice.
Comput., 2019

Near-optimal Evasion of Randomized Convex-inducing Classifiers in Adversarial Environments.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
IoT as a Land of Opportunity for DDoS Hackers.
Computer, 2018

Malwareless Web-Analytics Pollution (MWAP): A Very Simple Yet Invincible Attack.
Proceedings of the 20th IEEE Conference on Business Informatics, 2018

IoT Cameras and DVRs as DDoS Reflectors: Pros and Cons from Hacker's Perspective.
Proceedings of the IEEE International Conference on Industrial Internet, 2018

Robustness of deep autoencoder in intrusion detection under adversarial contamination.
Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, 2018

Online Tracking of Kids and Teens by Means of Invisible Images: COPPA vs. GDPR.
Proceedings of the 2nd International Workshop on Multimedia Privacy and Security, 2018

Can Browser Add-Ons Protect Your Children from Online Tracking?
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Rethinking the Use of Resource Hints in HTML5: Is Faster Always Better!?
J. Cyber Secur. Mobil., 2017

Current state of client-side extensions aimed at protecting against CSRF-like attacks.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

Resource Hints in HTML5: A New Pandora's Box of Security Nightmares.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Towards sequencing malicious system calls.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

2015
Next Generation of Impersonator Bots: Mimicking Human Browsing on Previously Unvisited Sites.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Web bots that mimic human browsing behavior on previously unvisited web-sites: Feasibility study and security implications.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
Next Generation Application-Layer DDoS Defences: Applying the Concepts of Outlier Detection in Data Streams with Concept Drift.
Proceedings of the 13th International Conference on Machine Learning and Applications, 2014

Performance and economies of 'bot-less' application-layer DDoS attacks.
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014

Web bugs in the cloud: Feasibility study of a new form of EDoS attack.
Proceedings of the 2014 IEEE GLOBECOM Workshops, Austin, TX, USA, December 8-12, 2014, 2014

Application-layer DDoS in dynamic Web-domains: Building defenses against next-generation attack behavior.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

2013
Detection of malicious and non-malicious website visitors using unsupervised neural network learning.
Appl. Soft Comput., 2013

2012
The Role of DNS TTL Values in Potential DDoS Attacks: What Do the Major Banks Know About It?
Proceedings of the 3rd International Conference on Ambient Systems, 2012

Feature evaluation for web crawler detection with data mining techniques.
Expert Syst. Appl., 2012

VLUS: Visual location-based URL screening tool for improved WWW security.
Proceedings of the 2012 World Congress on Internet Security, 2012

Smart crawlers for flash-crowd DDoS: The attacker's perspective.
Proceedings of the 2012 World Congress on Internet Security, 2012

Dirt Jumper: A key player in today's botnet-for-DDoS market.
Proceedings of the 2012 World Congress on Internet Security, 2012

2011
Unsupervised Clustering of Web Sessions to Detect Malicious and Non-malicious Website Users.
Proceedings of the 2nd International Conference on Ambient Systems, 2011

Strategies for improving performance of IEEE 802.15.4/ZigBee WSNs with path-constrained mobile sink(s).
Comput. Commun., 2011

Detecting Web Crawlers from Web Server Access Logs with Data Mining Classifiers.
Proceedings of the Foundations of Intelligent Systems - 19th International Symposium, 2011

2009
Sink mobility in wireless sensor networks: a (mis)match between theory and practice.
Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, 2009

A Simulation-Based Performance Analysis of Various Multipath Routing Techniques in ZigBee Sensor Networks.
Proceedings of the Ad Hoc Networks, First International Conference, 2009

2008
Performance of IEEE 802.15.4 in wireless sensor networks with a mobile sink implementing various mobility strategies.
Proceedings of the LCN 2008, 2008

2007
Comprehensive Study of Node Clustering in Wireless Sensor Networks for Environment Monitoring.
Ad Hoc Sens. Wirel. Networks, 2007

Near-Optimal Node Clustering in Wireless sensor Networks for Environment Monitoring.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Wireless Sensor Networks: To Cluster or Not To Cluster?.
Proceedings of the 2006 International Symposium on a World of Wireless, 2006

Analytical and Simulation Based Evaluation of Wireless-to-Wireline TCP-SYN Attacks.
Proceedings of the Canadian Conference on Electrical and Computer Engineering, 2006

2004
Performance aspects of data broadcast in wireless networks with user retrials.
IEEE/ACM Trans. Netw., 2004

2003
Wireless data broadcast in systems of hierarchical cellular organization.
Proceedings of IEEE International Conference on Communications, 2003

2001
Vector quantization of images using modified adaptive resonance algorithm for hierarchical clustering.
IEEE Trans. Neural Networks, 2001

2000
Image-Compression for Wireless World Wide Web Browsing: A Neural Network Approach.
Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks, 2000

1999
An adaptive neural network approach to hypertext clustering.
Proceedings of the International Joint Conference Neural Networks, 1999

1998
Categorizing Web pages on the subject of neural networks.
J. Netw. Comput. Appl., 1998


  Loading...