Slobodan V. Petrovic
Slobodan V. Petrovic
Gjøvik
Verified email at hig.no
TitleCited byYear
A new taxonomy of web attacks suitable for efficient encoding
G Álvarez, S Petrović
Computers & Security 22 (5), 435-449, 2003
1052003
Improving effectiveness of intrusion detection by correlation feature selection
H Nguyen, K Franke, S Petrovic
2010 International Conference on Availability, Reliability and Security, 17-24, 2010
882010
Towards a generic feature-selection measure for intrusion detection
HT Nguyen, K Franke, S Petrovic
2010 20th International Conference on Pattern Recognition, 1529-1532, 2010
472010
Application of the generic feature selection measure in detection of web attacks
HT Nguyen, C Torrano-Gimenez, G Alvarez, S Petrović, K Franke
Computational Intelligence in Security for Information Systems, 25-32, 2011
422011
A generalized correlation attack with a probabilistic constrained edit distance
JD Golić, SV Petrović
Workshop on the Theory and Application of of Cryptographic Techniques, 472-476, 1992
411992
A comparison of feature-selection methods for intrusion detection
HT Nguyen, S Petrović, K Franke
International Conference on Mathematical Methods, Models, and Architectures …, 2010
352010
Labelling clusters in an intrusion detection system using a combination of clustering evaluation techniques
S Petrovic, G Alvarez, A Orfila, J Carbo
Proceedings of the 39th Annual Hawaii International Conference on System …, 2006
312006
Optimizing speed of a true random number generator in FPGA by spectral analysis
K Wold, S Petrovic
2009 Fourth International Conference on Computer Sciences and Convergence …, 2009
202009
Applying feature selection to payload-based web application firewalls
C Torrano-Gimenez, HT Nguyen, G Alvarez, S Petrović, K Franke
2011 Third International Workshop on Security and Communication Networks …, 2011
172011
A new classification scheme for anonymization of real data used in ids benchmarking
VE Seeberg, S Petrovic
The Second International Conference on Availability, Reliability and …, 2007
172007
Clock control sequence reconstruction in the ciphertext only attack scenario
S Petrović, A Fúster-Sabater
International Conference on Information and Communications Security, 427-439, 2004
152004
FPGA for pseudorandom generator cryptanalysis
S Bojanić, G Caffarena, S Petrović, O Nieto-Taladriz
Microprocessors and Microsystems 30 (2), 63-71, 2006
142006
Correlation attacks on clock-controlled shift registers in keystream generators
JD Golic, SV Petrovic
IEEE transactions on computers 45 (4), 482-486, 1996
141996
String editing under a combination of constraints
SV Petrović, JDJ Golić
Information sciences 74 (1-2), 151-163, 1993
141993
Enhancing the effectiveness of web application firewalls by generic feature selection
HT Nguyen, C Torrano-Gimenez, G Alvarez, K Franke, S Petrović
Logic Journal of IGPL 21 (4), 560-570, 2013
132013
Security properties of oscillator rings in true random number generators
K Wold, S Petrović
2012 IEEE 15th International Symposium on Design and Diagnostics of …, 2012
112012
Passive remote source nat detection using behavior statistics derived from netflow
S Abt, C Dietz, H Baier, S Petrović
IFIP International Conference on Autonomous Infrastructure, Management and …, 2013
102013
Behavioral model of TRNG based on oscillator rings implemented in FPGA
K Wold, S Petrović
14th IEEE International Symposium on Design and Diagnostics of Electronic …, 2011
102011
Reliability in a feature-selection process for intrusion detection
HT Nguyen, K Franke, S Petrović
Reliable Knowledge Discovery, 203-218, 2012
92012
A new two-stage search procedure for misuse detection
S Petrovic, K Franke
Future Generation Communication and Networking (FGCN 2007) 2, 418-422, 2007
72007
The system can't perform the operation now. Try again later.
Articles 1–20