Browsing eNauka
Browsing by Author Vuletić, Pavle
Showing results 1 to 20 of 49
next >
Issue Date | Title | Author(s) | Type | Мp-cat. |
---|---|---|---|---|
2010 | A Network Management Architecture proposal for the GÉANT NREN environment | Vuletić, Pavle ![]() ![]() | Conference Paper | Mp. category will be shown later |
2017 | A Systematic Approach to Generation of New Ideas for PhD Research in Computing![]() | Blagojević, V.; Bojić, Dragan ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() | Article | 22M22 |
2016 | A transparent and scalable anomaly-based DoS detection method | Joldzic, Ognjen; Djuric, Zoran; Vuletić, Pavle ![]() ![]() | Article | 21M21 |
2017 | Adding practical experience to computer security course | Stanisavljević, Žarko ![]() ![]() ![]() ![]() | Article | 22M22 |
2024 | Advanced Network and System Security Teaching | M. Ogrizović ![]() ![]() ![]() ![]() ![]() ![]() | Article | 22M22 |
2020 | Analysis and Characterization of IoT Malware Command and Control Communication | Jovanović, Đorđe ![]() ![]() ![]() ![]() | Article | 53M53 |
2019 | Analysis and Characterization of IoT Malware Command and Control Communication![]() | Jovanović, Đorđe ![]() ![]() ![]() ![]() | Conference Paper | Mp. category will be shown later |
2024 | Analysis of Security Mechanisms Used in ETL Tools | M. Jeftović; P. Vuletić ![]() ![]() ![]() ![]() | Conference Paper | Mp. category will be shown later |
2024 | Blockchain Programming Languages Vulnerabilities and Error Mitigation Strategies | M. Obradović ![]() ![]() ![]() ![]() | Conference Paper | Mp. category will be shown later |
2014 | COALA - System for Visual Representation of Cryptography Algorithms | Stanisavljević, Žarko ![]() ![]() ![]() ![]() ![]() ![]() ![]() | Article | 21M21 |
2025 | Comparative Analysis of Machine Learning and Federated Learning in Healthcare | S. Stanković; P. Vuletić ![]() ![]() ![]() ![]() | Conference Paper | Mp. category will be shown later |
2004 | CWDM technology in Serbian Research and Education Network | P. Vuletić ![]() ![]() | Conference Paper | Mp. category will be shown later |
2022 | Detekcija napada u računarskim mrežama zasnovana na analizi strukture saobraćaja primenom kombinovanih algoritama mašinskog učenja | Timčenko, Valentina | Doctoral theses | 70M70 |
2023 | DNS exfiltration detection in the presence of adversarial attacks and modified exfiltrator behaviour | К. Жижа ![]() ![]() ![]() ![]() ![]() ![]() | Article | 21M21 |
2022 | Early web application attack detection using network traffic analysis | B. Rajić; Ž. Stanisavljević ![]() ![]() ![]() ![]() | Article | 21M21 |
2023 | Educational system for demonstrating Remote attacks on Android Devices | M. Ogrizović ![]() ![]() ![]() ![]() ![]() ![]() | Conference Paper | Mp. category will be shown later |
2014 | eduroam - infrastruktura za mobilnost u oblasti nauke i istraživanja | М. Вермезовић; P. Vuletić ![]() ![]() | Article | Mp. category will be shown later |
2014 | eduroam – infrastruktura za mobilnost u oblasti nauke i obrazovanja | M Vermezović; Vuletić, Pavle ![]() ![]() | Article | Mp. category will be shown later |
2018 | Efikasan mehanizam kriptografske sinhronizacije u algoritmima selektivnog šifrovanja multimedijalnih sistema nove generacije | Jovanović, Boriša Ž. | Doctoral theses | 70M70 |
2025 | Exploring Unlabeled Network Monitoring Data in Large-Scale Active Monitoring Systems | М. Настић; P. Vuletić ![]() ![]() | Conference Paper | Mp. category will be shown later |