DIKUL - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov UL. Za polni dostop se PRIJAVITE.

1 2
zadetkov: 19
1.
  • Intrusion detection based o... Intrusion detection based on the artificial immune system
    Protić, Danijela Vojnotehnički glasnik, 10/2020, Letnik: 68, Številka: 4
    Journal Article
    Recenzirano
    Odprti dostop

    Introduction/purpose: The artificial immune system is a computational model inspired by the biological or human immune system. Of particular interest in artificial immune systems is the way the human ...
Celotno besedilo
Dostopno za: ODKLJ, UL

PDF
2.
  • Cybersecurity attacks: Whic... Cybersecurity attacks: Which dataset should be used to evaluate an intrusion detection system?
    Protić, Danijela; Stanković, Miomir Vojnotehnički glasnik, 10/2023, Letnik: 71, Številka: 4
    Journal Article
    Recenzirano
    Odprti dostop

    Introduction: Analyzing the high-dimensional datasets used for intrusion detection becomes a challenge for researchers. This paper presents the most often used data sets. ADFA contains two data sets ...
Celotno besedilo
Dostopno za: ODKLJ, UL
3.
  • Influence of pre-processing... Influence of pre-processing on anomaly-based intrusion detection / Роль предварительного процессирования при обнаружении атак, основанных на аномалиях / Uticaj preprocesuiranja na detekciju napada zasnovanih na anomalijama
    Danijela D. Protić Vojnotehnički glasnik, 07/2020, Letnik: 68, Številka: 3
    Journal Article
    Recenzirano
    Odprti dostop

    Introduction/purpose: The anomaly-based intrusion detection system detects intrusions based on a reference model which identifies the normal behavior of a computer network and flags an anomaly. ...
Celotno besedilo
Dostopno za: ODKLJ, UL

PDF
4.
  • Review of KDD Cup ‘99, NSL-... Review of KDD Cup ‘99, NSL-KDD and Kyoto 2006+ datasets / Обзор KDD Cup ‘99, NSL-KDD и Kyoto 2006+ баз данных / Pregled KDD Cup '99, NSL-KDD i Kyoto 2006+ baza podataka
    Danijela D. Protić Vojnotehnički glasnik, 07/2018, Letnik: 66, Številka: 3
    Journal Article
    Recenzirano
    Odprti dostop

    This paper presents a review of three datasets, namely KDD Cup ‘99, NSL-KDD and Kyoto 2006+ datasets, which are widely used in researching intrusion detection in computer networks. The KDD Cup ‘99 ...
Celotno besedilo
Dostopno za: ODKLJ, UL

PDF
5.
  • SMART monitoring and treatm... SMART monitoring and treatment of fracture healing: Piezoelectric transducers and stepper motor actuators
    Antić, Vladimir; Protić, Danijela; Stanković, Miomir ... Vojnotehnički glasnik, 04/2024, Letnik: 72, Številka: 2
    Journal Article
    Recenzirano
    Odprti dostop

    Introduction/purpose: SMART orthopedic systems use fixators with remote monitoring, processing, and communication capabilities to leverage healing progression data for personalized, real-time ...
Celotno besedilo
Dostopno za: ODKLJ, UL
6.
  • Screen reading: Electromagn... Screen reading: Electromagnetic information leakage from the computer monitor
    Grdović, Milena; Protić, Danijela; Antić, Vladimir ... Vojnotehnički glasnik, 10/2022, Letnik: 70, Številka: 4
    Journal Article
    Recenzirano
    Odprti dostop

    Introduction/purpose: The security of systems can be jeopardized by compromising emanations. This paper provides an overview of computer screen attacks. New technologies can be used to exfiltrate ...
Celotno besedilo
Dostopno za: ODKLJ, UL
7.
  • The strategy for the develo... The strategy for the development of information society in Serbia by 2020: Information security and critical infrastructure
    Protić, Danijela D. Vojnotehnicki glasnik, 10/2012, Letnik: 60, Številka: 4
    Journal Article
    Recenzirano
    Odprti dostop

    The development of technology has changed the world economy and induced new political trends. The European Union (EU) and many non-EU member states apply the strategies of information society ...
Celotno besedilo
Dostopno za: ODKLJ, UL

PDF
8.
  • Security of wireless keyboa... Security of wireless keyboards: Threats, vulnerabilities and countermeasures
    Jovanović, Siniša; Protić, Danijela; Antić, Vladimir ... Vojnotehnički glasnik, 04/2023, Letnik: 71, Številka: 2
    Journal Article
    Recenzirano
    Odprti dostop

    Introduction/purpose: This paper provides an overview of research on computer system vulnerabilities caused by compromised electromagnetic radiation by wireless keyboards. Wireless devices that use ...
Celotno besedilo
Dostopno za: ODKLJ, UL
9.
  • Critical infrastructures: t... Critical infrastructures: threats, vulnerabilities and protection / Критическая инфраструктура: угрозы, уязвимость и защита / Kritične infrastrukture: pretnje, ranjivosti i zaštita
    Danijela D. Protić Vojnotehnički glasnik, 07/2016, Letnik: 64, Številka: 3
    Journal Article
    Recenzirano
    Odprti dostop

    This paper presents six critical infrastructure sectors: electric power systems, energy sources and supply, manufacturing, transport and storage of hazardous substances, traffic and transportation, ...
Celotno besedilo
Dostopno za: ODKLJ, UL

PDF
10.
  • Neural cryptography / Нейро... Neural cryptography / Нейрокриптография / Neuronska kriptografija
    Danijela D. Protić Vojnotehnički glasnik, 04/2016, Letnik: 64, Številka: 2
    Journal Article
    Recenzirano
    Odprti dostop

    Neural cryptography based on the tree parity machine (TPM) is presented in this paper. A mutual learning-based synchronization of two networks is studied. The training of the TPM based on the ...
Celotno besedilo
Dostopno za: ODKLJ, UL

PDF
1 2
zadetkov: 19

Nalaganje filtrov