Analysis of the SYN flood DoS attack M Bogdanoski, T Suminoski, A Risteski International Journal of Computer Network and Information Security (IJCNIS …, 2013 | 154 | 2013 |
Overview and analysis of the performances of ZigBee-based wireless sensor networks B Mihajlov, M Bogdanoski International Journal of Computer Applications 29 (12), 28-35, 2011 | 118 | 2011 |
Cyber terrorism–global security threat M Bogdanoski, D Petreski Contemporary Macedonian Defense-International Scientific Defense, Security …, 2013 | 47 | 2013 |
IEEE 802.16 security issues: a survey M Bogdanoski, P Latkoski, A Risteski, B Popovski | 40 | 2008 |
Wireless network behavior under icmp ping flooddos attack and mitigation techniques M Bogdanoski, A Risteski International Journal of Communication Networks and Information Security …, 2011 | 31 | 2011 |
Multimodal biometric authentication in IoT: Single camera case study N Maček, I Franc, M Bogdanoski, A Mirković | 20 | 2016 |
Future 5G Mobile Broadband Networks Using Cloud-based Services with Advanced Security and QoS Framework M Bogdanoski, T Shuminoski, M Hadji-Janev, A Risteski, T Janevski Acta Polytechnica Hungarica 17 (10), 20, 2020 | 14 | 2020 |
Analysis of the WSN MAC Protocols under Jamming DoS Attack. B Mihajlov, M Bogdanoski Int. J. Netw. Secur. 16 (4), 304-312, 2014 | 14 | 2014 |
A novel approach for mitigating the effects of the TCP SYN flood DDoS attacks M Bogdanoski, A Toshevski, D Bogatinov, M Bogdanoski World Journal of Modelling and Simulation 12 (3), 217-230, 2016 | 13 | 2016 |
AI-based cyber defense for more secure cyberspace DS Bogatinov, M Bogdanoski, S Angelevski Handbook of research on civil society and national security in the era of …, 2016 | 12 | 2016 |
Security and QoS framework for 5G and next generation mobile broadband networks T Shuminoski, T Janevski, A Risteski, M Bogdanoski IEEE EUROCON 2017-17th International Conference on Smart Technologies, 104-109, 2017 | 9 | 2017 |
Steganalysis—A way forward against cyber terrorism M Bogdanoski, A Risteski, S Pejoski 2012 20th Telecommunications Forum (TELFOR), 681-684, 2012 | 9 | 2012 |
Handbook of research on civil society and national security in the era of cyber warfare M Hadji-Janev, M Bogdanoski IGI Global, 2015 | 8 | 2015 |
Steganography in Support of the Global Terrorism. M Bogdanoski, A Risteski, M Bogdanoski Terrorist Use of Cyberspace and Cyber Terrorism, 15-28, 2015 | 8 | 2015 |
Swarming-based cyber defence under the framework of collective security M Hadji-Janev, M Bogdanoski Security Journal 30, 39-59, 2017 | 7 | 2017 |
TCP-SYN Flooding Attack in Wireless Networks M Bogdanoski, T Suminoski, A Risteski | 7 | 2012 |
Countering Terrorist Activities in Cyberspace Z Minchev, M Bogdanoski IOS Press, 2018 | 5 | 2018 |
Online radicalization, the west, and the “web 2.0”: A case study analysis J Whittaker Countering terrorist activities in cyberspace, 106-120, 2018 | 5 | 2018 |
Detecting malicious anomalies in IoT: Ensemble learners and incomplete datasets I Franc, N Maček, M Bogdanoski, D Đokić | 5 | 2016 |
Cyber security issues of telecommunication infrastructure A Risteski, M Bogdanoski, M Stoilkovski, M Jovanovic Cyber Security and Resiliency Policy Framework, 18-35, 2014 | 5 | 2014 |