Publications

  1. Architecture and Infrastructure for Governing Information Security in Central Banks, Journal of Central Banking Theory and Practice,Volume 1, Number 2, pp. 5-17,K. Hajdarevic, K. Kozaric, J. Hadzigrahic,  Published in October 2012. WEB Link
  2. Information Security Measurement Infrastructure for KPI Visualization, K. Hajdarevic, C. Pattinson, K. Kozaric, A. Hadzic, MIPRO 35 Proceedings of the 35th International Convention, Publication Year: 2012, Page(s): 1543 – 1548, IEEE Conference Publications. WEB Link
  3. Face Recognition Implementation for Client Server Mobile Application using PCA, E. Kremic,A. Subasi, K. Hajdarevic, Information Technology Interfaces (ITI), Proceedings of the ITI 2011 33rd International Conference on Publication Year: 2012, Page(s): 435 – 440,  IEEE Conference Publications, WEB Link
  4. New Generation Operations Systems and Software and SOA Improving the Business of Telecom Operator, A. Hadzic , T. Mateljan, K. Hajdarevic, MIPRO 35 Proceedings of the 35th International Convention, Publication Year: 2012, Page(s): 1699 – 1704, IEEE Conference Publications. WEB Link
  5. Simulation application for Sleep-Awake Probabilistic Forwarding Protocol for Smart Dust environments, Hajdarevic, K.; Kurtanovic, MIPRO, 2011 Proceedings of the 34th International Convention, Publication Year: 2011 , Page(s): 468 – 471, IEEE Conference Publications. WEB Link
  6. New forensic method for measuring dynamic changes of EMF level limits using smart dust Hajdarevic, K.; Pattinson, C.; Hadzic, A.; Hadzigrahic, J. Information, Communication and Automation Technologies (ICAT), 2011 XXIII International Symposium on Digital Object Identifier: 10.1109/ICAT.2011.6102097 Publication Year: 2011, IEEE Conference Publications. WEB Link 
  7. EMF hot-spot creation avoidance in office and home-office environments, Hajdarevic, K.; Pattinson, C., MIPRO, 2011 Proceedings of the 34th International Convention, Publication Year: 2011, Page(s): 658 – 663, IEEE Conference Publications. WEB Link 
  8. The time element in proactive network defense systems, Pattinson, C.; Hajdarevic, K.; Hadzic, A. Information Technology Interfaces (ITI), Proceedings of the ITI 2011 33rd International Conference on Publication Year: 2011 , Page(s): 427 – 432 IEEE Conference Publications. WEB Link 
  9. Trojan detection using MIB-based IDS / IPS system, Pattinson, C.; Hajdarevic, K. Information, Communication and Automation Technologies, 2009. ICAT 2009. XXII International Symposium on, Digital Object Identifier: 10.1109/ICAT.2009.5348410, Publication Year: 2009, IEEE Conference Publications. WEB Link 
  10. Timing considerations in detecting resource starvation attacks using statistical profiles, International Journal of Electronic Security and Digital Forensics (IJESDF), Pattinson, C.; Hajdarevic, K. 2007, Copyright © 2004-2008 Inderscience Enterprises Limited, Pages 194 –205. WEB Link 
  11. Timing Considerations in Detecting Resource Starvation Attacks, Pattinson, C.; Hajdarevic, K.  International Conference on Global e-Security University of East London, London , England, 18-20 April 2007
  12. Disaster Recovery Plan Support for Enterprise’s Business Continuity Plan, Hajdarevic, K.  Conference on Information Systems Security held at the University “Džemal Bijedić”, Mostar Bosnia and Herzegovina 10 – 12, September 2006. Mostar, Bosnia and Herzegovina. WEB Link
  13. Proactive Detection and Prevention Intrusion Attacks (Poster presentation), Hajdarevic, K.  Innovation North Research Conference Leeds Metropolitan University – Leeds, England, 10 – 12 July2006
  14. Timing considerations in the detection of intrusion attacks, Pattinson, C.; Hajdarevic, K. International Conference onGlobale-SecurityUniversity of EastLondon,London ,England, 20 – 22 April 2006
  15. Developing tool and simulator for recognizing DoS attacks in early stages, E-Learning Conference, Mostar 2004
  16. Training network managers to recognize intrusion detection, Pattinson, C.; Hajdarevic, K.  – ICETE conference inSetubal,Portugal 25-28 August 2004. WEB Link 
  17. Spanning tree protocol usage risks. Hajdarevic, K. 5th International Telecommunications Symposium in BiH, BIHTEL 2004, Sarajevo, November 2004, Sarajevo. WEB Link 
  18. Network Management Using Open Source Solutions, Hajdarevic, K 4th International Telecommunications Symposium in BiH, BIHTEL 2002, Sarajevo, November 2002, Sarajevo.
  19. Firewall Implementation on Linux, Hajdarevic, K, 26-28.November 2001, XVIII Interantional Symposium on Information and Communication Technlogies IKT pp. 225-233, Sarajevo. WEB Link 
In Archive