Main publications: |
-
J. Golić, S. Petrović, “Correlation attacks on clock-controlled shift registers in keystream generators”, IEEE Trans. on Computers, 45:4 (1996), 482-486
-
J. Golić, S. Petrović, “Constrained many-to-one string editing with memory”, Information Sciences, 86 (1995), 61-76
-
J. Golić, S. Petrović, “String editing under a combination of constraints”, Information Sciences, 74 (1993), 151-163
-
J. Golić, S. Petrović, “A generalized correlation attack with a probabilistic constrained edit-distance” (Advances in Cryptology - EUROCRYPT '92), Lecture Notes in Computer Science, 658, Springer Verlag, 1993, 472-476
-
H. Nguyen, S. Petrović, and K. Franke, “A comparison of feature selection methods for intrusion detection” (2010 International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 2010), Lecture Notes in Computer Science, 6258, Springer Verlag, 2010, 242-255
|