Публикации за сајбер безбедност

Листа на трудови објавени од кадарот на ФИНКИ на теми поврзани со сајбер безбедноста

  • Karafiloski, E., & Mishev, A. (2017, July). Blockchain solutions for big data challenges: A literature review. In Smart Technologies, IEEE EUROCON 2017-17th International Conference on (pp. 763-768). IEEE.
  • Dimitrova, V., Kostadinoski, M., Trajcheska, Z., Petkovska, M., & Buhov, D. Some Cryptanalysis of the Block Cipher BCMPQ.
  • Kavun, E. B., Mihajloska, H., & Yalçin, T. (2017). A Survey on Authenticated Encryption--ASIC Designer’s Perspective. ACM Computing Surveys (CSUR)50(6), 88.
  • Mileva, A., Dimitrova, V., Bakeva, V., Samardziska, S., Popovska-Mitrovikj, A., Mihajloska, H., ... & Markovski, S. (2016). Application of Quasigroups in Cryptography and Data Communications.
  • KOTESKA, B., KARAFILOSKI, E., & MISHEV, A. Blockchain Implementation Quality Challenges: A Literature.
  • Hülsing, A., Rijneveld, J., Samardjiska, S., & Schwabe, P. (2016). From 5-pass MQ-based identification to MQ-based signatures. IACR Cryptology ePrint Archive2016, 708.
  • Dimitrova, V., & Petkovska, M. Application of quasigroups for encrypting audio files.
  • Gligoroski, D., Mihajloska, H., Samardjiska, S., Jacobsen, H., Jensen, R. E., & El-Hadedy, M. (2014, October). π-cipher: Authenticated encryption for big data. In Nordic Conference on Secure IT Systems (pp. 110-128). Springer, Cham.
  • Ristov, S., Gusev, M., & Donevski, A. (2013). Openstack cloud security vulnerabilities from inside and outside. Cloud Computing, 101-107.
  • Mihajloska, H. (2013). The Hardware Performance of Authenticated Encryption Modes.
  • Donevski, A., Ristov, S., & Gušev, M. (2013). Nessus or Metasploit: Security Assessment of OpenStack Cloud.
  • Mishkovski, I., Filiposka, S., Trajanov, D., & Kocarev, L. Measuring Vulnerability of Complex Networks by Simulating DDoS Attacks.
  • Donevski, A., Ristov, S., & Gusev, M. (2013, May). Security assessment of virtual machines in open source clouds. In Information & Communication Technology Electronics & Microelectronics (MIPRO), 2013 36th International Convention on (pp. 1094-1099). IEEE.
  • Gligoroski, D., Mihajloska, H., & Jacobsen, H. OWCM: One-Way Counter Mode.
  • Gusev, M., Ristov, S., & Donevski, A. (2013, September). Security vulnerabilities from inside and outside the eucalyptus cloud. In Proceedings of the 6th Balkan Conference in Informatics (pp. 95-101). ACM.
  • Ristov, S., & Gusev, M. (2013, July). Security evaluation of open source clouds. In EUROCON, 2013 IEEE (pp. 73-80). IEEE.
  • Bozhinovski, R., Dimitrova, V., Jakimovski, B., & Ristov, S. (2013). Security Penetration Test On Fcse's It Services.
  • Ristov, S., Gushev, M., & Kostoska, M. (2012). Information Security Management System for Cloud Computing. ICT Innovations 2011, Web Proceedings ISSN 1857-7288, 49.
  • Gavrilov, G., & Trajkovik, V. (2012). Security and privacy issues and requirements for healthcare cloud computing. ICT Innovations, 143-152.
  • Ristov, S., Gusev, M., & Kostoska, M. (2012, May). A new methodology for security evaluation in cloud computing. In MIPRO, 2012 Proceedings of the 35th International Convention (pp. 1484-1489). IEEE.
  • Trajcheska, Z., & Dimitrova, V. (2012). Research, Implementation and Application of the SQBC Block Cipher in the Area of Encrypting Images. ICT Innovations 2012, Web Proceedings ISSN 1857-7288, 291.
  • Ribarski, P., & Antovski, L. (2012). Mixnets: Implementation and performance evaluation of decryption and re-encryption types. Journal of computing and information technology20(3), 225-231.
  • Igor, M., Filiposka, S., Gramatikov, S., Trajanov, D., & Kocarev, L. (2010). Game theoretic approach for discovering vulnerable links in complex networks. In Novel Algorithms and Techniques in Telecommunications and Networking (pp. 211-216). Springer, Dordrecht.
  • Ristov, S., Gusev, M., & Kostoska, M. (2012). Cloud computing security in business information systems. arXiv preprint arXiv:1204.1140.
  • Markoska, E., Ristov, S., Zdravkova, K., & Gusev, M. Overview of Cloud Computing Security Standards and Challenges. 
  • Popovska-Mitrovikj, A., Bakeva, V., & Markovski, S. (2011). On random error correcting codes based on quasigroups. Quasigroups and Related Systems19(2), 301-316.
Close Menu