Analysis of Mirai malicious software H Sinanović, S Mrdovic 2017 25th International Conference on Software, Telecommunications and …, 2017 | 133 | 2017 |
A survey of denial-of-service attacks and solutions in the smart grid A Huseinović, S Mrdović, K Bicakci, S Uludag IEEE Access 8, 177447-177470, 2020 | 125 | 2020 |
A preliminary review of blockchain-based solutions in higher education A Kamišalić, M Turkanović, S Mrdović, M Heričko Learning Technology for Education Challenges: 8th International Workshop …, 2019 | 105 | 2019 |
Combining static and live digital forensic analysis in virtual environment S Mrdovic, A Huseinovic, E Zajko 2009 XXII International Symposium on Information, Communication and …, 2009 | 70 | 2009 |
Geographic profiling for serial cybercrime investigation A Butkovic, S Mrdovic, S Uludag, A Tanovic Digital investigation 28, 176-182, 2019 | 41 | 2019 |
Kerckhoffs' principle for intrusion detection S Mrdovic, B Perunicic Networks 2008-The 13th International Telecommunications Network Strategy and …, 2008 | 41 | 2008 |
IoT honeypot: A multi-component solution for handling manual and Mirai-based attacks H Šemić, S Mrdovic 2017 25th Telecommunication Forum (TELFOR), 1-4, 2017 | 37 | 2017 |
A taxonomy of the emerging Denial-of-Service attacks in the smart grid and countermeasures A Huseinovic, S Mrdovic, K Bicakci, S Uludag 2018 26th Telecommunications Forum (TELFOR), 1-4, 2018 | 25 | 2018 |
Towards the classification of self-sovereign identity properties Š Čučko, Š Bećirović, A Kamišalić, S Mrdović, M Turkanović Ieee Access 10, 88306-88329, 2022 | 23 | 2022 |
Manual IoT forensics of a samsung gear S3 frontier smartwatch S Becirovic, S Mrdovic 2019 International Conference on Software, Telecommunications and Computer …, 2019 | 22 | 2019 |
SIP server security with TLS: Relative performance evaluation M Kulin, T Kazaz, S Mrdovic Telecommunications (BIHTEL), 2012 IX International Symposium on, 1-6, 2012 | 22 | 2012 |
KIDS–Keyed Intrusion Detection System S Mrdovic, B Drazenovic Detection of Intrusions and Malware, and Vulnerability Assessment: 7th …, 2010 | 22 | 2010 |
Identification of IoT actors S Hadzovic, S Mrdovic, M Radonjic Sensors 21 (6), 2093, 2021 | 20 | 2021 |
IPv4/IPv6 transition using DNS64/NAT64: Deployment issues E Hodzic, S Mrdovic 2012 IX International Symposium on Telecommunications (BIHTEL), 1-6, 2012 | 20 | 2012 |
A path towards an internet of things and artificial intelligence regulatory framework S Hadzovic, S Mrdovic, M Radonjic IEEE Communications Magazine, 2023 | 16 | 2023 |
An implementation of secure key exchange by using QR codes D Omerasevic, N Behlilovic, S Mrdovic Proceedings ELMAR-2014, 1-4, 2014 | 16 | 2014 |
Secured intrusion detection system infrastructure S Mrdović, E Zajko | 14 | 2005 |
Forensic analysis of encrypted volumes using hibernation file S Mrdovic, A Huseinovic 2011 19thTelecommunications Forum (TELFOR) Proceedings of Papers, 1277-1280, 2011 | 13 | 2011 |
IoT forensics S Mrdovic Security of Ubiquitous Computing Systems: Selected Topics, 215-229, 2021 | 10 | 2021 |
Data mining meets network analysis: Traffic prediction models T Eterovic, S Mrdovic, D Donko, Z Juric 2014 37th International Convention on Information and Communication …, 2014 | 8 | 2014 |