default search action
Jelena Milosevic
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j5]Florian Skopik, Max Landauer, Markus Wurzenberger, Gernot Vormayr, Jelena Milosevic, Joachim Fabini, Wolfgang Prüggler, Oskar Kruschitz, Benjamin Widmann, Kevin Truckenthanner, Stefan Rass, Michael Simmer, Christoph Zauner:
synERGY: Cross-correlation of operational and contextual data to timely detect and mitigate attacks to cyber-physical systems. J. Inf. Secur. Appl. 54: 102544 (2020)
2010 – 2019
- 2019
- [j4]Jelena Milosevic, Miroslaw Malek, Alberto Ferrante:
Time, accuracy and power consumption tradeoff in mobile malware detection systems. Comput. Secur. 82: 314-328 (2019) - [j3]Félix Iglesias, Jelena Milosevic, Tanja Zseby:
Fuzzy classification boundaries against adversarial network attacks. Fuzzy Sets Syst. 368: 20-35 (2019) - 2018
- [c11]Filippo Maria Bianchi, Lorenzo Livi, Alberto Ferrante, Jelena Milosevic, Miroslaw Malek:
Time Series Kernel Similarities for Predicting Paroxysmal Atrial Fibrillation from ECGs. IJCNN 2018: 1-8 - [i3]Filippo Maria Bianchi, Lorenzo Livi, Alberto Ferrante, Jelena Milosevic, Miroslaw Malek:
Time series kernel similarities for predicting Paroxysmal Atrial Fibrillation from ECGs. CoRR abs/1801.06845 (2018) - [i2]Jelena Milosevic, Dexmont Peña, Andrew Forembsky, David Moloney, Miroslaw Malek:
It All Matters: Reporting Accuracy, Inference Time and Power Consumption for Face Emotion Recognition on Embedded Systems. CoRR abs/1807.00046 (2018) - 2017
- [c10]Alberto Ferrante, Miroslaw Malek, Fabio Martinelli, Francesco Mercaldo, Jelena Milosevic:
Extinguishing Ransomware - A Hybrid Approach to Android Ransomware Detection. FPS 2017: 242-258 - 2016
- [c9]Alberto Ferrante, Eric Medvet, Francesco Mercaldo, Jelena Milosevic, Corrado Aaron Visaggio:
Spotting the Malicious Moment: Characterizing Malware Behavior Using Dynamic Features. ARES 2016: 372-381 - [c8]Jelena Milosevic, Alberto Ferrante, Miroslaw Malek:
What does the memory say? Towards the most indicative features for efficient malware detection. CCNC 2016: 759-764 - [c7]Jelena Milosevic, Alberto Ferrante, Miroslaw Malek:
MalAware: Effective and Efficient Run-Time Mobile Malware Detector. DASC/PiCom/DataCom/CyberSciTech 2016: 270-277 - [c6]Jelena Milosevic, Miroslaw Malek, Alberto Ferrante:
Runtime Classification of Mobile Malware for Resource-Constrained Devices. ICETE (Selected Papers) 2016: 195-215 - [c5]Jelena Milosevic, Miroslaw Malek, Alberto Ferrante:
A Friend or a Foe? Detecting Malware using Memory and CPU Features. SECRYPT 2016: 73-84 - 2015
- [i1]Jelena Milosevic, Alberto Ferrante, Miroslaw Malek:
A general practitioner or a specialist for your infected smartphone? CoRR abs/1505.03329 (2015) - 2014
- [j2]Takasi Kusano, Jelena V. Manojlovic, Jelena Milosevic:
Intermediate solutions of fourth order quasilinear differential equations in the framework of regular variation. Appl. Math. Comput. 248: 246-272 (2014) - [c4]Jelena Milosevic, Andreas Dittrich, Alberto Ferrante, Miroslaw Malek:
A Resource-Optimized Approach to Efficient Early Detection of Mobile Malware. ARES 2014: 333-340 - [c3]Jelena Milosevic, Andreas Dittrich, Alberto Ferrante, Miroslaw Malek, Camilo Rojas Quiros, Rubén Braojos, Giovanni Ansaloni, David Atienza:
Risk Assessment of Atrial Fibrillation: a Failure Prediction Approach. CinC 2014: 801-804 - [c2]Alberto Ferrante, Igor Kaitovic, Jelena Milosevic:
Modeling Requirements for Security-enhanced Design of Embedded Systems. SECRYPT 2014: 315-320 - 2013
- [j1]Takasi Kusano, Jelena V. Manojlovic, Jelena Milosevic:
Intermediate solutions of second order quasilinear ordinary differential equations in the framework of regular variation. Appl. Math. Comput. 219(15): 8178-8191 (2013) - [c1]Alberto Ferrante, Jelena Milosevic, Marija Janjusevic:
A Security-enhanced Design Methodology for Embedded Systems. SECRYPT 2013: 39-50
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint