Sasa Mrdovic

Sasa Mrdovic
University of Sarajevo | UNSA · Faculty of Electrical Engineering

PhD

About

47
Publications
17,855
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
369
Citations
Additional affiliations
October 2020 - October 2020
University of Sarajevo
Position
  • Professor

Publications

Publications (47)
Preprint
Full-text available
Multimedia streaming over the Internet (live and on demand) is the cornerstone of modern Internet carrying more than 60% of all traffic. With such high demand, delivering outstanding user experience is a crucial and challenging task. To evaluate user QoE many researchers deploy subjective quality assessments where participants watch and rate videos...
Article
Full-text available
Self-Sovereign Identity (SSI) is a novel and emerging, decentralized digital identity approach that enables entities to control and manage their digital identifiers and associated identity data fully while enhancing trust, privacy, security, and the many other properties identified and analyzed in this paper. The paper provides an overview and clas...
Preprint
Full-text available
Self-Sovereign Identity (SSI) is a novel and emerging, decentralized identity approach that enables entities to fully control and manage their digital identifiers and associated identity data while enhances trust, privacy, security, and many other properties analyzed in this paper. The paper provides an overview of the SSI properties, focusing on a...
Article
Full-text available
The Internet of Things (IoT) is a leading trend with numerous opportunities accompanied by advantages as well as disadvantages. Parallel with IoT development, significant privacy and personal data protection challenges are also growing. In this regard, the General Data Protection Regulation (GDPR) is often considered the world’s strongest set of da...
Chapter
Full-text available
This chapter provides an overview of research opportunities and issues in IoT forensics. It gives a quick introduction to forensics and digital forensics. Key specifics of IoT forensics are explained. Issues that arise from IoT related challenges in all phases of a forensic investigation are presented. Some opportunities that IoT brings to forensic...
Article
Full-text available
The scope, scale, and intensity of real, as well as potential attacks, on the Smart Grid have been increasing and thus gaining more attention. An important component of Smart Grid cybersecurity efforts addresses the availability and access to the power and related information and communications infrastructures. We overload the term, Denial-of-Servi...
Article
Full-text available
The main goal of our paper is to show how to save energy in the network by turning off underutilized ports/links/modules/devices without compromising QoS. The idea is to use only the best path for transmitting packets and turn off other network components in order to save energy. If congestion on the best path occurs, the second-best path is powere...
Article
This paper describes a test platform for verifying the functionality of network protocols as well as optimizing their parameters. The test bed is made by using combined OPNET simulator and MATLAB development environment. This test platform connects OPNET network protocols simulator with MATLAB development environment in the way that OPNET runs simu...
Chapter
Full-text available
Blockchain technology is showing its potential to disrupt established business processes. Four types of blockchain initiatives have been identified: Record keeper, efficiency play, digital asset market, and blockchain disruptor. Many different applications have also been emerging within the educational domain, following a student or institution-cen...
Book
Full-text available
Priručnik za obuku nastavnika i nastavnica u primjeni Operativnog nastavnog plana i programa za STEM kompetencije, ima za cilj poslužiti kao temelj profesionalnom usavršavanju nastavnika i jačanju nastavničkih kompetencija u domeni primjene nastavnih metoda baziranih na ishodima učenja tijekom realizacije nastave iz oblasti STEM disciplina. Osnovni...
Book
Full-text available
Operativne smjernice za implementaciju Operativnog nastavnog plana i programa za STEM kompetencije (u daljem tekstu: Smjernice) izrađene su s ciljem boljeg razumijevanja ONPP i njegove primjene u nastavnoj praksi, ali i prilikom donošenja novih dokumenata vezanih za formalno obrazovanje. Smjernice su namijenjene svim nastavnicima koji su zainteresi...
Article
In this paper we evaluate a commonly used testing tool of Internet applications and services – PlanetLab. PlanetLab is a large-scale network of Linux servers used for Internet development and research. The geographical diversity of the servers allows engineers and researchers to test networking applications in the real Internet worldwide. In the pa...
Conference Paper
The paper proposes key management between two parties, based on set of multimedia files shared by sender and recipient. The method is simple, fast, secure and robust. Possible key sizes are virtually limitless. One implementation, which uses YouTube website as a source of multimedia files, is presented.
Article
Full-text available
This paper proposes a novel steganographic method which uses Discrete Wavelet Transformation (DWT) for hiding secret messages. The secret message is embedded in the QR Code. The QR Code carries a secret message, which is created by a GNU Privacy Guard (GPG), which is signed and encrypted by RSA keys.
Conference Paper
Smart Grid (SG) communication become very hot topic for smart, intelligent and distributed transmission systems for electric power. However, security issues are still open and this is one of main concerns to the deployment of SG. In order to cope with this challenging concern, we propose secure message exchange protocol in this paper, for secure co...
Conference Paper
Users of triple-play systems expect to be able to use their services on different locations. That opens an issue of extending security to include mobile triple-play users. Mobile users need to authenticate to the system and vice-versa. Users expect confidentiality of their communications. Content providers request copyrights to be respected. Protoc...
Conference Paper
Full-text available
Most research on network traffic prediction has been done on small datasets based on statistical methodologies. This research analyzes an internet traffic dataset spanning multiple months using the data mining process. Each data mining phase was carefully fitted to the network analysis domain and systematized in context of data mining. The second p...
Conference Paper
Most research on network traffic prediction has been done on small datasets based on statistical methodologies. This research analyzes an internet traffic dataset spanning multiple months using the data mining process. Each data mining phase was carefully fitted to the network analysis domain and systematized in context of data mining. The second p...
Conference Paper
This paper analyses randomness in various video and audio media file types, like: Joint Photographic Experts Group (JPEG), Waveform Audio File Format (WAV), Flash video (FLV), high-quality, free and open video format for the web (WEBM) and MPEG-1 Audio Layer 3 (MP3). Analysis is done by executing different statistical test. Statistical tests are us...
Conference Paper
Full-text available
As the Internet and electronic mail continue to be utilized by an ever increasing number of users, so does fraudulent and criminal activity via the Internet and email increase. The negative effects of cybercrime activities on the use of the Internet for e-business and secure communications increased interest in studying the factors that motivate th...
Conference Paper
This paper proposes a cryptographic key establishment method based on set of images shared by sender and receiver. The method is simple, fast and secure. We call it CryptoStego. Possible key sizes are virtually limitless. Proposed method is implemented in C programming language. The implementation is compared with (A)RC4 stream cipher, by comparing...
Conference Paper
Full-text available
The fundamental concepts of this work are related to the proxy signature delegation in workflow systems. Many business processes rely on electronic documents. Therefore, organizations must properly protect the contents of an electronic document throughout its entire life cycle. Proxy digital scheme does not provide control over whether the proxy si...
Conference Paper
Full-text available
VoIP (Voice over Internet) provides delivery of voice information over unsecured IP-based networks like the Internet. VoIP data, signaling and voice, needs to be secured in such an environment. Security mechanisms take their toll on VoIP system performance. SIP is dominant signaling protocol for VoIP. This paper measures relative decrease in VoIP p...
Conference Paper
IPv4 address space is almost exhausted. Usage of IPv6 address by client end hosts is limited due to small percentage of domain names that have IPv6 address. This paper presents practical testing in ISP that gives its users IPv6 addresses and provides them transparent access to both IPv4 and IPv6 Internet locations. DNS64/NAT64 translation mechanism...
Article
Nowadays, software tools are commonly used to encrypt data on hard disk. Those tools keep encryption keys in system memory to provide the user easy access to plain text of encrypted files. Key possesion enables data decryption. A procedure that includes usage of hibernation file as a source of memory content is described. Publicly available tools a...
Conference Paper
Full-text available
Since most current network attacks happen at the application layer, analysis of packet payload is necessary for their detection. Unfortunately malicious packets may be crafted to mimic normal payload, and so avoid detection if the anomaly detection method is known. This paper proposes keyed packet payload anomaly detection NIDS. Model of normal pay...
Conference Paper
Full-text available
Traditional digital forensics is performed through static analysis of data preserved on permanent storage media. Not all data needed to understand the state of examined system exists in nonvolatile memory. Live analysis uses running system to obtain volatile data for deeper understanding of events going on. Sampling running system might irreversibl...
Conference Paper
Full-text available
This paper presents a novel payload analysis method. Consecutive bytes are separated by boundary symbols and defined as words. The frequencies of word appearance and word to word transitions are used to build a model of normal behavior. A simple anomaly score calculation is designed for fast attack detection. The method was tested using real traffi...
Article
Full-text available
A collection of slides from the authorpsilas seminar presentation is given. The following topics are discussed: intrusion detection system (IDS) - detective security mechanism, host or network based, signature or anomaly detection; network IDS with anomaly detection - new detection method (new attacks), arms race.
Article
Full-text available
Network intrusion detection based on packet payload analysis is presented. Quick overview of current IDS state of the art is given. Current prevailing methods for network intrusion detection based on packet meta data, headers, will are compared with method proposed in paper. Reasoning behind packed payload analysis for intrusion detection are prese...
Article
Full-text available
This paper will present building of secured intrusion detection system (IDS) infrastructure. Fo r its function IDS is often the first target of intruders and must be properly secured. Main components of IDS and principles for their hardening will be explained. A pplication of these principles in practice will be shown on th e secured IDS infrastruc...
Article
This paper presents possible path for securing public IT services. Public sector IT services deployment issues are presented. Security needs are defined. Possible gains from ICT in public sector are quoted. Simple services with highest impact that should be secured and offered are defined. Public key infrastructure (PKI) is proposed as basis of sol...
Article
This paper explores possibility of detecting intrusions into computer networks using network packet payload analysis. Quick overview of current IDS state of the art is given. Issues with IDS are explained. Integrated approach to IDS building is suggested. Anomaly detection process improvements are recomended. Current prevailing methods for network...
Article
The paper examines the security of e-banking fat client. Strong authentication built in fat client is not always applied to overall system. Fat clients store data locally, and that data might not be protected with the same strong authentication. It is possible to bypass such a fat client and access e-banking data stored locally directly, and in thi...

Network

Cited By

Projects

Project (1)
Archived project