default search action
Kemal Hajdarevic
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2017
- [c13]Kemal Hajdarevic, Adna Kozic, Indira Avdagic, Zerina Masetic, Nejdet Dogru:
Training network managers in ethical hacking techniques to manage resource starvation attacks using GNS3 simulator. ICAT 2017: 1-6 - [c12]Zerina Masetic, Kemal Hajdarevic, Nejdet Dogru:
Cloud computing threats classification model based on the detection feasibility of machine learning algorithms. MIPRO 2017: 1314-1318 - 2015
- [c11]Kemal Hajdarevic, Vahidin Dzaltur:
Internal penetration testing of Bring Your Own Device (BYOD) for preventing vulnerabilities exploitation. ICAT 2015: 1-6 - [c10]Kemal Hajdarevic, Samim Konjicija:
A low energy computer infrastructure for radio VOIP supported communication and SDR APRS in education and disaster relief situations. MIPRO 2015: 556-561 - [c9]Kemal Hajdarevic, Vahidin Dzaltur:
An approach to digital evidence collection for successful forensic application: An investigation of blackmail case. MIPRO 2015: 1387-1392 - 2012
- [c8]Emir Kremic, Abdulhamit Subasi, Kemal Hajdarevic:
Face recognition implementation for client server mobile application using PCA. ITI 2012: 435-440 - [c7]Kemal Hajdarevic, Colin Pattinson, Kemal Kozaric, Amela Hadzic:
Information security measurement infrastructure for KPI visualization. MIPRO 2012: 1543-1548 - [c6]Amela Hadzic, Tadej Mateljan, Kemal Hajdarevic:
New generation operations systems and software and SOA improving the business of telecom operator. MIPRO 2012: 1699-1704 - 2011
- [c5]Kemal Hajdarevic, Colin Pattinson, Amela Hadzic, Jasmin Hadzigrahic:
New forensic method for measuring dynamic changes of EMF level limits using smart dust. ICAT 2011: 1-5 - [c4]Kemal Hajdarevic, Ersin Kurtanovic:
Simulation application for Sleep-Awake Probabilistic Forwarding Protocol for Smart Dust environments. MIPRO 2011: 468-471 - [c3]Kemal Hajdarevic, Colin Pattinson:
EMF hot-spot creation avoidance in office and home-office environments. MIPRO 2011: 658-663
2000 – 2009
- 2009
- [c2]Colin Pattinson, Kemal Hajdarevic:
Trojan detection using MIB-based IDS / IPS system. ICAT 2009: 1-5 - 2008
- [b1]Kemal Hajdarevic:
Early detection of network problems using existing network indicators : local agent based approach. Leeds Beckett University, UK, 2008 - 2007
- [j1]Colin Pattinson, Kemal Hajdarevic:
Timing considerations in detecting resource starvation attacks using statistical profiles. Int. J. Electron. Secur. Digit. Forensics 1(2): 194-205 (2007) - 2004
- [c1]Colin Pattinson, Kemal Hajdarevic:
Training Network Managers to Recognise Intrusion Attacks. ICETE (2) 2004: 269-274
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:46 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint