default search action
Ilija Basicevic
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Miroslav Popovic, Marko Popovic, Ivan Kastelan, Miodrag Djukic, Ilija Basicevic:
PTB-FLA development paradigm adaptation for ChatGPT. Comput. Sci. Inf. Syst. 21(4): 1269-1292 (2024) - [i4]Miroslav Popovic, Marko Popovic, Ivan Kastelan, Miodrag Djukic, Ilija Basicevic:
MicroPython Testbed for Federated Learning Algorithms. CoRR abs/2405.09423 (2024) - 2023
- [c18]Miroslav Popovic, Marko Popovic, Ivan Kastelan, Miodrag Djukic, Ilija Basicevic:
A Federated Learning Algorithms Development Paradigm. ECBS 2023: 26-41 - [c17]Ilija Basicevic:
An analysis of the TR069 (CWMP) protocol. MIPRO 2023: 460-465 - [i3]Miroslav Popovic, Marko Popovic, Ivan Kastelan, Miodrag Djukic, Ilija Basicevic:
A Federated Learning Algorithms Development Paradigm. CoRR abs/2310.05102 (2023) - [i2]Miroslav Popovic, Marko Popovic, Ivan Kastelan, Miodrag Djukic, Ilija Basicevic:
Developing Elementary Federated Learning Algorithms Leveraging the ChatGPT. CoRR abs/2312.04412 (2023) - 2022
- [j12]Ilija Basicevic, Nikola Blazic, Stanislav Ocovaj:
On the use of principal component analysis in the entropy based detection of denial-of-service attacks. Secur. Priv. 5(2) (2022) - 2021
- [j11]Ilija Basicevic, Nikola Blazic, Stanislav Ocovaj:
On the use of generalized entropy formulas in detection of denial-of-service attacks. Secur. Priv. 4(1) (2021)
2010 – 2019
- 2019
- [j10]Petar D. Bojovic, Ilija Basicevic, Stanislav Ocovaj, Miroslav Popovic:
A practical approach to detection of distributed denial-of-service attacks using a hybrid detection method. Comput. Electr. Eng. 73: 84-96 (2019) - [j9]Ilija Basicevic, Stanislav Ocovaj:
Application of entropy formulas in detection of denial-of-service attacks. Int. J. Commun. Syst. 32(15) (2019) - [j8]Nemanja Fimic, Ilija Basicevic, Nikola Teslic:
Reducing Channel Change Time by System Architecture Changes in DVB-S/C/T Set Top Boxes. IEEE Trans. Consumer Electron. 65(3): 312-321 (2019) - 2018
- [j7]Miodrag Petkovic, Ilija Basicevic, Dragan Kukolj, Miroslav Popovic:
Evaluation of Takagi-Sugeno-Kang fuzzy method in entropy-based detection of DDoS attacks. Comput. Sci. Inf. Syst. 15(1): 139-162 (2018) - [j6]Ilija Basicevic, Dragan Kukolj, Stanislav Ocovaj, Gordana Cmiljanovic, Nemanja Fimic:
A Fast Channel Change Technique Based on Channel Prediction. IEEE Trans. Consumer Electron. 64(4): 418-423 (2018) - [c16]Mila Kotur, Marko Dragojevic, Gordana Velikic, Ilija Basicevic:
Digital Cockpit in AUTOSAR Adaptive Context. ICCE-Berlin 2018: 1-4 - [i1]Petar D. Bojovic, Ilija Basicevic, Stanislav Ocovaj, Miroslav Popovic:
A practical approach to detection of distributed denial-of-service attacks using a hybrid detection method. CoRR abs/1812.05450 (2018) - 2017
- [c15]Branislav Kordic, Miroslav Popovic, Silvia Ghilezan, Ilija Basicevic:
An approach to formal verification of python software transactional memory. ECBS 2017: 13:1-13:10 - [c14]Marina Vuckovic, Nenad Soskic, Miroslav Dimitraskovic, Ilija Basicevic:
Software upgrade of multi-streaming feature in Common Interface plus V1.4. ICCE 2017: 33-36 - 2016
- [j5]Ilija Basicevic, Stanislav Ocovaj, Miroslav Popovic:
The value of flow size distribution in entropy-based detection of DoS attacks. Secur. Commun. Networks 9(10): 958-965 (2016) - 2015
- [j4]Ilija Basicevic, Stanislav Ocovaj, Miroslav Popovic:
Evaluation of entropy-based detection of outbound denial-of-service attacks in edge networks. Secur. Commun. Networks 8(5): 837-844 (2015) - [j3]Ilija Basicevic, Stanislav Ocovaj, Miroslav Popovic:
Use of Tsallis entropy in detection of SYN flood DoS attacks. Secur. Commun. Networks 8(18): 3634-3640 (2015) - [c13]Miroslav Popovic, Branislav Kordic, Ilija Basicevic:
Work, Span, and Parallelism of Transactional Memory Programs. ECBS-EERC 2015: 59-66 - [c12]Branislav Kordic, Miroslav Popovic, Ilija Basicevic:
DPM-PSTM: Dual-Port Memory Based Python Software Transactional Memory. ECBS-EERC 2015: 126-129 - [c11]Krsto Lazic, Ilija Basicevic, Jelena Kovacevic:
Bandwidth estimation in adapti1v e video streaming over HTTP. ICCE 2015: 62-65 - 2014
- [c10]Krsto Lazic, Jelena Kovacevic, Ilija Basicevic, Milan Acanski:
Sat>IP client integration in a DVB software stack. ICCE-Berlin 2014: 367-370 - [c9]Stefan Pijetlovic, Nevena Jovanov, Violeta Vukobrat, Ilija Basicevic:
One solution of a RESTful API for a cloud based DTV content provider. ICCE-Berlin 2014: 384-387 - [c8]Krsto Lazic, Jelena Kovacevic, Ilija Basicevic, Milan Acanski:
Sat>IP server implementation on an embedded platform. ICCE-Berlin 2014: 480-483 - 2012
- [c7]Miodrag Petkovic, Miroslav Popovic, Ilija Basicevic, Djordje Saric:
A Host Based Method for Data Leak Protection by Tracking Sensitive Data Flow. ECBS 2012: 267-274 - 2011
- [j2]Ilija Basicevic, Dragan Kukolj, Miroslav Popovic:
On the application of fuzzy-based flow control approach to High Altitude Platform communications. Appl. Intell. 34(2): 199-210 (2011) - 2010
- [j1]Miroslav Popovic, Ilija Basicevic:
Test case generation for the task tree type of architecture. Inf. Softw. Technol. 52(6): 697-706 (2010) - [c6]Ilija Basicevic, Miroslav Popovic, Ivan Velikic:
Use of Finite State Machine Based Framework in Implementation of Communication Protocols - A Case Study. AICT 2010: 161-166
2000 – 2009
- 2009
- [c5]Miroslav Popovic, Ilija Basicevic, Vladislav Vrtunski:
A Task Tree Executor: New Runtime for Parallelized Legacy Software. ECBS 2009: 41-47 - [c4]Ilija Basicevic, Sabina Jovanovic, Branislav Drapsin, Miroslav Popovic, Vladislav Vrtunski:
An Approach to Parallelization of Legacy Software. ECBS-EERC 2009: 42-48 - 2007
- [c3]Ilija Basicevic, Miroslav Popovic, Vladimir Kovacevic:
Use of Publisher-Subscriber Design Pattern in Infrastructure of Distributed IDS Systems. ICNS 2007: 56 - 2006
- [c2]Miroslav Popovic, Ilija Basicevic, Ivan Velikic, Jelena Tatic:
A Model-Based Statistical Usage Testing of Communication Protocols. ECBS 2006: 377-386 - 2005
- [c1]Ilija Basicevic, Miroslav Popovic, Vladimir Kovacevic:
The Use of Distributed Network-Based IDS Systems in Detection of Evasion Attacks. AICT/SAPIR/ELETE 2005: 78-82
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 21:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint