Mladen Veinović | University Singidunum, Belgrade, Serbia (original) (raw)
Papers by Mladen Veinović
IEEE Sensors Journal, 2021
In this paper, a tailoring process for a High Frequency Surface Wave Radar (HFSWR) transmitter an... more In this paper, a tailoring process for a High Frequency Surface Wave Radar (HFSWR) transmitter antenna array is presented. The process is done in order to achieve optimal HFSWR performance in equatorial environments, defined by a low altitude coastline, frequent storms, and heavy rainfall which lead to frequent site flooding. Simultaneously, the price of the final design needed to be as low as possible in order to make it affordable for developing countries, since the majority of countries in the equatorial area fits in that category. Initially, the tailoring process was started with mathematical formulations, continued in EM simulation software, and then tested in the field. Based on the findings obtained during the tailoring process, the transmitting antenna arrays are installed and the HFSWRs are operationally used afterward. Final confirmation of the tailoring process presented in this paper came through everyday usage of the installed HFSWRs during a period that lasted several years in the Equatorial environment, namely the Gulf of Guinea.
Proceedings of the International Scientific Conference - Sinteza 2017, 2017
The paper focuses on the problem of managing multiple identities and access to them. Detailed ins... more The paper focuses on the problem of managing multiple identities and access to them. Detailed insight in the field of research shows the concept and importance of federated identities and the necessity for their implementation into a business ecosystem. The solution for identity federation is presented, including detailed explanation of functionality and infrastructure of the security product. The significance and benefits of the security open standards are underlined. Recommendations and predictions are made, implying the need for change and different approach to IT security.
Sensors, 2022
In this paper, we present a hardware and software platform for signal processing (SPP) in long-ra... more In this paper, we present a hardware and software platform for signal processing (SPP) in long-range, multi-spectral, electro-optical systems (MSEOS). Such systems integrate various cameras such as lowlight color, medium or long-wave-infrared thermal and short-wave-infrared cameras together with other sensors such as laser range finders, radars, GPS receivers, etc. on rotational pan-tilt positioner platforms. An SPP is designed with the main goal to control all components of an MSEOS and execute complex signal processing algorithms such as video stabilization, artificial intelligence-based target detection, target tracking, video enhancement, target illumination, multi-sensory image fusion, etc. Such algorithms might be very computationally demanding, so an SPP enables them to run by splitting processing tasks between a field-programmable gate array (FPGA) unit, a multicore microprocessor (MCuP) and a graphic processing unit (GPU). Additionally, multiple SPPs can be linked together ...
Proceedings of the International Scientific Conference - Sinteza 2021, 2021
Proceedings of the International Scientific Conference - Sinteza 2021, 2021
Serbian Journal of Electrical Engineering, 2020
Intrusions into the computer systems are becoming increasingly sophisticated. Command and Control... more Intrusions into the computer systems are becoming increasingly sophisticated. Command and Control (C2) infrastructure, which enables attackers to remotely control infected devices, is a critical component. Malware is set to connect to C2 servers to receive commands and payloads, or upload logs or stolen files. Since techniques for detecting traditional C2 servers are also advancing, attackers look for ways to make C2 communication stealth and resilient. Increasingly, they hide C2 communications in plain sight, in particular on social media and other cloud-based public services. In this paper, we identify several emerging trends in the use of social media for C2 communications by providing a review of the existing research, discuss how attackers could combine these trends in the future to create a stealth and resilient server-less C2 model, look at possible defence aspects, and suggest further research.
Proceedings of the International Scientific Conference - Sinteza 2019, 2019
E-band radars EBR are very promising short distance high-resolution sensors for safety and smart ... more E-band radars EBR are very promising short distance high-resolution sensors for safety and smart city solutions. In order to achieve larger scale coverage, we have investigated possibility of gaining raw signal from multiple EBRs for purpose of centralized data processing and fusion. Based on publicly available data about EBR ranges, resolution and data formats, we have considered requirements for implementation of communication and power network for them. We have presented data for both static and dynamic scenario. In static scenario EBR positions are fixed, while in dynamic scenario some of EBRs are located on vehicles with known position obtained by GPS.
Proceedings of the International Scientific Conference - Sinteza 2019, 2019
The aim of this paper is to describe the application of Matlab for the design of the sensor netwo... more The aim of this paper is to describe the application of Matlab for the design of the sensor network within a real-world Maritime Surveillance System. In the phase of planning and solution preparation of new Maritime Surveillance System project, it is necessary to analyse the zones of monitoring, sensors arrangement, and spatial distribution in order to make the best decision. With a goal to define the observation zone of interest, a software solution is made in Matlab using built-in functions for location computing in World Geodetic System, a graphical representation in Google Earth and a library that supports working with Google Earth formats for export. The sensors supported in this Maritime Surveillance System are Electro-Optical systems-multi-sensor cameras, X-band and Ku-band microwave radars and High Frequency Over The Horizon Radars. With this software solution, a particular sensor's observation zones, along with global coverage zone are determined at the real location. Coverage diagrams are plotted as Google Earth objects, generating a KML export file. In this way, easy manipulation over potential solutions is provided, with high flexibility and portability, leading to a more detailed assessment and decision making in Maritime Surveillance System design.
Proceedings of the International Scientific Conference - Sinteza 2018, 2018
The aim of this paper is The General Data Protection Regulation (GDPR), an overview of current ac... more The aim of this paper is The General Data Protection Regulation (GDPR), an overview of current achievements in this domain within the framework of existing knowledge in literature, international standards and the best practice as far as the GDPR is concerned. This paper is particularly dedicated to GDPR who harmonizes data protection requirements across all 28 Member States, introduces new rights for data subjects, and applies extraterritorially to any organization controlling or processing data on natural persons in the European Union.
Tehnicki vjesnik - Technical Gazette, 2018
Mathematical calculation over ciphertext during homomorphic encryption makes result of the calcul... more Mathematical calculation over ciphertext during homomorphic encryption makes result of the calculation in a form of ciphertext. Obtained result can be decrypted with an appropriate key for further usage. In the era of cloud computing, this feature can be used to solve problems of storing and processing sensitive data in the cloud. Also, use of homomorphic encryption keeps both, data and results of processing, highly secured at the same time. Considering the overwhelming presence of computers with limited resources, the presence of the Internet and the ultimate practical need for use of cloud and its resources, in this paper we explored and presented the characteristics of a practical use of partial homomorphic encryption and its processing of ciphertext in the cloud on computer system with limited resources.
ZBORNIK RADOVA UNIVERZITETA SINERGIJA, 2016
Sažetak — U ovom radu proučava se oblast zaštite podataka na udaljenim serverima u oblaku i tokom... more Sažetak — U ovom radu proučava se oblast zaštite podataka na udaljenim serverima u oblaku i tokom prenosa komunikacionim kanalima. Vrši se pregled najkvalitetnijih komercijalnih rešenja iz ove oblasti. Pažnja će biti posvećena onim rešenjima koja imaju implementiranu end-to-end zaštitu. Fokus će biti stavljen na razvoj sopstvenog rešenja u kome će biti implementiran predstavljeni bezbednosni mehanizam uz modul za generisanje kriptoloških ključeva.
2016 24th Telecommunications Forum (TELFOR), 2016
The example of how to create and organize the ETL process on isolated small scale database system... more The example of how to create and organize the ETL process on isolated small scale database system which is the part of the larger information system is given in this paper. We have given short description of the database, ETL process and given directions on how to expand classic ETL process with intermediate steps in order to automatize complete process and prepare it for loading into main data warehouse upon which the business intelligence tools can be used to further analyze the data.
Wireless Personal Communications, 2016
Quality of true random number generators (TRNGs) based on a sound card depends of two components:... more Quality of true random number generators (TRNGs) based on a sound card depends of two components: an ''unpredictable'' source with high entropy, and a post processing function which, when used on a digitalized form of a random signal source, produces a result that is statistically very close to the uniform distribution. This paper presents a method of obtaining true random bits using hardware of a computer sound card, on whose audio input through the use of a microphone a random environmental noise signal is brought and for post-processing a new procedure of distributing bits is used or so called ''Mixing Bits in Steps and XORing of Adjacent Bits'' (MiBiS&XOR). With the presented distillation procedure, in a simple and efficient way, adjacent input bits, who are in a certain correlation, are separated and divided one from another, by which reduces the total autocorrelation and then in this new sequence, adjacent bits are XORed which increases the entropy and reduces bias of output bit sequence. Experimental statistical randomness tests performed on sequences of bits obtained as a result of the proposed method, confirm the excellent quality of the TRNGs output.
Proceedings of the International Scientific Conference - Sinteza 2016, 2016
Being the key Internet infrastructure component, DNS (Domain Name System) is vital for any organi... more Being the key Internet infrastructure component, DNS (Domain Name System) is vital for any organization that requires external visibility and availability of its services. Public administration is especially sensitive, due to the nature of services offered to citizens. This paper describes the strategy, implemented to the administration of the city of Nis, for making external domain space more robust and resilient, as well as securing it with DNSSEC (DNS Security Extensions).
Computer Applications in Engineering Education, 2016
This paper analyzed WMN routing protocols, modeling, and implementation of software environment f... more This paper analyzed WMN routing protocols, modeling, and implementation of software environment for emulation of nodes in WMN network in education area. Use of emulators would enable students and teachers to research performance of the WMN (Wireless Mesh Network) protocol. This concept would contribute to an easier understanding of the WMN protocol related to different algorithms for transfer of routing traffic between nodes.
Proceedings of the International Scientific Conference - Synthesis 2015, 2015
ABSTRACT Privacy policy based on biometric data, in conjunction with cryptography is very importa... more ABSTRACT Privacy policy based on biometric data, in conjunction with cryptography is very important as it provides unique protection of biometric data. The usual solutions use only one biometric template, analyzing its entropy and defining the method for error correction, because biometric data are nosy by its nature. The main disadvantage of these methods is a limited quantity of information that template contains. We propose an original approach using two independently created templates, which significantly increase the total amount of information (the entropy of two templates) and thereby reduce the errors. Using our approach, the more reliable and more secure system for privacy protection and using biometrics in cryptographic operations can be achieved.
Proceedings of the 1st International Scientific Conference - Sinteza 2014, 2014
Internet robotic appliactions, also known as "bots", have a broad sprectrum of usage. Bots are gr... more Internet robotic appliactions, also known as "bots", have a broad sprectrum of usage. Bots are growing in numbers exponentially, following the expansion of Internet and it's massive usage. Best known bots are for example Google search bots, which access internet pages content, browse the data, and sends selected data in appropriate form to central database, where that data get categorised and organised for indexing purposes. This enables effective search and reporting results of a search by some terms. However, bots can have much more sophisticated applications: To replace living person in some simple or complex operations, both for purpose of acquiring wanted data, or update/insert some data in behalf of some business system/software. This way that operations goes faster, more efficient, and without human error factor. This makes bots very actuel segment of internet software, both for users and programers. In this paper, potential of bots is illustrated on example of automatic access, search and presenting multilayered, heterogenous data of business subjects in Republic of Serbia, regarding public available data from databases of APR and NBS.
IEEE Sensors Journal, 2021
In this paper, a tailoring process for a High Frequency Surface Wave Radar (HFSWR) transmitter an... more In this paper, a tailoring process for a High Frequency Surface Wave Radar (HFSWR) transmitter antenna array is presented. The process is done in order to achieve optimal HFSWR performance in equatorial environments, defined by a low altitude coastline, frequent storms, and heavy rainfall which lead to frequent site flooding. Simultaneously, the price of the final design needed to be as low as possible in order to make it affordable for developing countries, since the majority of countries in the equatorial area fits in that category. Initially, the tailoring process was started with mathematical formulations, continued in EM simulation software, and then tested in the field. Based on the findings obtained during the tailoring process, the transmitting antenna arrays are installed and the HFSWRs are operationally used afterward. Final confirmation of the tailoring process presented in this paper came through everyday usage of the installed HFSWRs during a period that lasted several years in the Equatorial environment, namely the Gulf of Guinea.
Proceedings of the International Scientific Conference - Sinteza 2017, 2017
The paper focuses on the problem of managing multiple identities and access to them. Detailed ins... more The paper focuses on the problem of managing multiple identities and access to them. Detailed insight in the field of research shows the concept and importance of federated identities and the necessity for their implementation into a business ecosystem. The solution for identity federation is presented, including detailed explanation of functionality and infrastructure of the security product. The significance and benefits of the security open standards are underlined. Recommendations and predictions are made, implying the need for change and different approach to IT security.
Sensors, 2022
In this paper, we present a hardware and software platform for signal processing (SPP) in long-ra... more In this paper, we present a hardware and software platform for signal processing (SPP) in long-range, multi-spectral, electro-optical systems (MSEOS). Such systems integrate various cameras such as lowlight color, medium or long-wave-infrared thermal and short-wave-infrared cameras together with other sensors such as laser range finders, radars, GPS receivers, etc. on rotational pan-tilt positioner platforms. An SPP is designed with the main goal to control all components of an MSEOS and execute complex signal processing algorithms such as video stabilization, artificial intelligence-based target detection, target tracking, video enhancement, target illumination, multi-sensory image fusion, etc. Such algorithms might be very computationally demanding, so an SPP enables them to run by splitting processing tasks between a field-programmable gate array (FPGA) unit, a multicore microprocessor (MCuP) and a graphic processing unit (GPU). Additionally, multiple SPPs can be linked together ...
Proceedings of the International Scientific Conference - Sinteza 2021, 2021
Proceedings of the International Scientific Conference - Sinteza 2021, 2021
Serbian Journal of Electrical Engineering, 2020
Intrusions into the computer systems are becoming increasingly sophisticated. Command and Control... more Intrusions into the computer systems are becoming increasingly sophisticated. Command and Control (C2) infrastructure, which enables attackers to remotely control infected devices, is a critical component. Malware is set to connect to C2 servers to receive commands and payloads, or upload logs or stolen files. Since techniques for detecting traditional C2 servers are also advancing, attackers look for ways to make C2 communication stealth and resilient. Increasingly, they hide C2 communications in plain sight, in particular on social media and other cloud-based public services. In this paper, we identify several emerging trends in the use of social media for C2 communications by providing a review of the existing research, discuss how attackers could combine these trends in the future to create a stealth and resilient server-less C2 model, look at possible defence aspects, and suggest further research.
Proceedings of the International Scientific Conference - Sinteza 2019, 2019
E-band radars EBR are very promising short distance high-resolution sensors for safety and smart ... more E-band radars EBR are very promising short distance high-resolution sensors for safety and smart city solutions. In order to achieve larger scale coverage, we have investigated possibility of gaining raw signal from multiple EBRs for purpose of centralized data processing and fusion. Based on publicly available data about EBR ranges, resolution and data formats, we have considered requirements for implementation of communication and power network for them. We have presented data for both static and dynamic scenario. In static scenario EBR positions are fixed, while in dynamic scenario some of EBRs are located on vehicles with known position obtained by GPS.
Proceedings of the International Scientific Conference - Sinteza 2019, 2019
The aim of this paper is to describe the application of Matlab for the design of the sensor netwo... more The aim of this paper is to describe the application of Matlab for the design of the sensor network within a real-world Maritime Surveillance System. In the phase of planning and solution preparation of new Maritime Surveillance System project, it is necessary to analyse the zones of monitoring, sensors arrangement, and spatial distribution in order to make the best decision. With a goal to define the observation zone of interest, a software solution is made in Matlab using built-in functions for location computing in World Geodetic System, a graphical representation in Google Earth and a library that supports working with Google Earth formats for export. The sensors supported in this Maritime Surveillance System are Electro-Optical systems-multi-sensor cameras, X-band and Ku-band microwave radars and High Frequency Over The Horizon Radars. With this software solution, a particular sensor's observation zones, along with global coverage zone are determined at the real location. Coverage diagrams are plotted as Google Earth objects, generating a KML export file. In this way, easy manipulation over potential solutions is provided, with high flexibility and portability, leading to a more detailed assessment and decision making in Maritime Surveillance System design.
Proceedings of the International Scientific Conference - Sinteza 2018, 2018
The aim of this paper is The General Data Protection Regulation (GDPR), an overview of current ac... more The aim of this paper is The General Data Protection Regulation (GDPR), an overview of current achievements in this domain within the framework of existing knowledge in literature, international standards and the best practice as far as the GDPR is concerned. This paper is particularly dedicated to GDPR who harmonizes data protection requirements across all 28 Member States, introduces new rights for data subjects, and applies extraterritorially to any organization controlling or processing data on natural persons in the European Union.
Tehnicki vjesnik - Technical Gazette, 2018
Mathematical calculation over ciphertext during homomorphic encryption makes result of the calcul... more Mathematical calculation over ciphertext during homomorphic encryption makes result of the calculation in a form of ciphertext. Obtained result can be decrypted with an appropriate key for further usage. In the era of cloud computing, this feature can be used to solve problems of storing and processing sensitive data in the cloud. Also, use of homomorphic encryption keeps both, data and results of processing, highly secured at the same time. Considering the overwhelming presence of computers with limited resources, the presence of the Internet and the ultimate practical need for use of cloud and its resources, in this paper we explored and presented the characteristics of a practical use of partial homomorphic encryption and its processing of ciphertext in the cloud on computer system with limited resources.
ZBORNIK RADOVA UNIVERZITETA SINERGIJA, 2016
Sažetak — U ovom radu proučava se oblast zaštite podataka na udaljenim serverima u oblaku i tokom... more Sažetak — U ovom radu proučava se oblast zaštite podataka na udaljenim serverima u oblaku i tokom prenosa komunikacionim kanalima. Vrši se pregled najkvalitetnijih komercijalnih rešenja iz ove oblasti. Pažnja će biti posvećena onim rešenjima koja imaju implementiranu end-to-end zaštitu. Fokus će biti stavljen na razvoj sopstvenog rešenja u kome će biti implementiran predstavljeni bezbednosni mehanizam uz modul za generisanje kriptoloških ključeva.
2016 24th Telecommunications Forum (TELFOR), 2016
The example of how to create and organize the ETL process on isolated small scale database system... more The example of how to create and organize the ETL process on isolated small scale database system which is the part of the larger information system is given in this paper. We have given short description of the database, ETL process and given directions on how to expand classic ETL process with intermediate steps in order to automatize complete process and prepare it for loading into main data warehouse upon which the business intelligence tools can be used to further analyze the data.
Wireless Personal Communications, 2016
Quality of true random number generators (TRNGs) based on a sound card depends of two components:... more Quality of true random number generators (TRNGs) based on a sound card depends of two components: an ''unpredictable'' source with high entropy, and a post processing function which, when used on a digitalized form of a random signal source, produces a result that is statistically very close to the uniform distribution. This paper presents a method of obtaining true random bits using hardware of a computer sound card, on whose audio input through the use of a microphone a random environmental noise signal is brought and for post-processing a new procedure of distributing bits is used or so called ''Mixing Bits in Steps and XORing of Adjacent Bits'' (MiBiS&XOR). With the presented distillation procedure, in a simple and efficient way, adjacent input bits, who are in a certain correlation, are separated and divided one from another, by which reduces the total autocorrelation and then in this new sequence, adjacent bits are XORed which increases the entropy and reduces bias of output bit sequence. Experimental statistical randomness tests performed on sequences of bits obtained as a result of the proposed method, confirm the excellent quality of the TRNGs output.
Proceedings of the International Scientific Conference - Sinteza 2016, 2016
Being the key Internet infrastructure component, DNS (Domain Name System) is vital for any organi... more Being the key Internet infrastructure component, DNS (Domain Name System) is vital for any organization that requires external visibility and availability of its services. Public administration is especially sensitive, due to the nature of services offered to citizens. This paper describes the strategy, implemented to the administration of the city of Nis, for making external domain space more robust and resilient, as well as securing it with DNSSEC (DNS Security Extensions).
Computer Applications in Engineering Education, 2016
This paper analyzed WMN routing protocols, modeling, and implementation of software environment f... more This paper analyzed WMN routing protocols, modeling, and implementation of software environment for emulation of nodes in WMN network in education area. Use of emulators would enable students and teachers to research performance of the WMN (Wireless Mesh Network) protocol. This concept would contribute to an easier understanding of the WMN protocol related to different algorithms for transfer of routing traffic between nodes.
Proceedings of the International Scientific Conference - Synthesis 2015, 2015
ABSTRACT Privacy policy based on biometric data, in conjunction with cryptography is very importa... more ABSTRACT Privacy policy based on biometric data, in conjunction with cryptography is very important as it provides unique protection of biometric data. The usual solutions use only one biometric template, analyzing its entropy and defining the method for error correction, because biometric data are nosy by its nature. The main disadvantage of these methods is a limited quantity of information that template contains. We propose an original approach using two independently created templates, which significantly increase the total amount of information (the entropy of two templates) and thereby reduce the errors. Using our approach, the more reliable and more secure system for privacy protection and using biometrics in cryptographic operations can be achieved.
Proceedings of the 1st International Scientific Conference - Sinteza 2014, 2014
Internet robotic appliactions, also known as "bots", have a broad sprectrum of usage. Bots are gr... more Internet robotic appliactions, also known as "bots", have a broad sprectrum of usage. Bots are growing in numbers exponentially, following the expansion of Internet and it's massive usage. Best known bots are for example Google search bots, which access internet pages content, browse the data, and sends selected data in appropriate form to central database, where that data get categorised and organised for indexing purposes. This enables effective search and reporting results of a search by some terms. However, bots can have much more sophisticated applications: To replace living person in some simple or complex operations, both for purpose of acquiring wanted data, or update/insert some data in behalf of some business system/software. This way that operations goes faster, more efficient, and without human error factor. This makes bots very actuel segment of internet software, both for users and programers. In this paper, potential of bots is illustrated on example of automatic access, search and presenting multilayered, heterogenous data of business subjects in Republic of Serbia, regarding public available data from databases of APR and NBS.