Pregled po znanstveniku: Marin Golub (MB: 206824)
-
1.Evolutionary Hyper-heuristic for Solving the Strip-Packing Problem // The Journal of the Textile Institute, 110 (2018), 8; 1141-1151 doi:10.1080/00405000.2018.1550136 (međunarodna recenzija, članak, znanstveni)
-
2.Stabile Usage of Export Regulatory Standards in Data Security Process // Proceedings of the Information Systems Security, MIPRO / Skala, Karolj (ur.).
Rijeka: GRAFIK, 2018. str. 1334-1339 (predavanje, međunarodna recenzija, cjeloviti rad (in extenso), stručni) -
3.Automatic marker making method for apparel industry // Book of Full Text 18th World Textile Conference AUTEX 2018 / Kalaoğlu, Fatma (ur.).
Istanbul: Istanbul Technical University, 2018. str. 1013-1018 (poster, međunarodna recenzija, cjeloviti rad (in extenso), znanstveni) -
4.Hyper-heuristic Approach for Improving Marker Efficiency // AUTEX research journal, 18 (2018), 4; 348-363 doi:10.1515/aut-2018-0026 (međunarodna recenzija, članak, znanstveni)
-
5.Measuring performance of optimization algorithms in evolutionary computation // International Journal of Machine Learning and Computing, 6 (2016), 3; 167-171 doi:10.18178/ijmlc.2016.6.3.593 (podatak o recenziji nije dostupan, članak, znanstveni)
-
6.Bottom-Left and Sequence Pair for Solving Packing Problems // MIPRO 2016. Proceedings / Biljanović, Petar (ur.).
Rijeka: Croatian Society for Information and Communication Technology, Electronics and Microelectronics - MIPRO, 2016. str. 1591-1596 (predavanje, međunarodna recenzija, cjeloviti rad (in extenso), znanstveni) -
7.Designing DNA Microarrays with Ant Colony Optimization // Journal of computers, 11 (2016), 6; 528-536 doi:10.17706/jcp.11.6.528-536 (međunarodna recenzija, članak, znanstveni)
-
8.The information systems' security level assessment model based on an ontology and evidential reasoning approach // Computers & security, 55 (2014), 100-112 doi:10.1016/j.cose.2015.08.004 (međunarodna recenzija, članak, znanstveni)
-
9.A New Ant Colony Optimization Algorithm : Three Bound Ant System // Lecture Notes in Computer Science, 8667 (2014), 280-281 (međunarodna recenzija, kratko priopcenje, znanstveni)
-
10.S-box, SET, Match: A Toolbox for S-box Analysis // Lecture Notes in Computer Science, 8501 (2014), 140-149 doi:10.1007/978-3-662-43826-8_10 (međunarodna recenzija, članak, znanstveni)
-
11.Glitch it if you can: parameter search strategies for successful fault injection // Lecture Notes in Computer Science, 8419 (2014), 236-252 doi:10.1007/978-3-319-08302-5_16 (međunarodna recenzija, članak, znanstveni)
-
12.On Using Genetic Algorithms for Intrinsic Side-channel Resistance: The Case of AES S-box // Proceedings of the First Workshop on Cryptography and Security in Computing Systems
Austrija: ACM, 2014. str. 13-18 (predavanje, međunarodna recenzija, cjeloviti rad (in extenso), znanstveni) -
13.Asynchronous and implicitly parallel evolutionary computation models // Soft computing, 18 (2014), 6; 1225-1236 doi:10.1007/s00500-013-1140-5 (međunarodna recenzija, članak, znanstveni)
-
14.On the Recombination Operator in the Real-Coded Genetic Algorithms // Proceedings of the 2013 IEEE Congress on Evolutionary Computation
Cancun, Meksiko, 2013. str. 3103-3110 (poster, međunarodna recenzija, cjeloviti rad (in extenso), znanstveni) -
15.Evolving Cryptographically Sound Boolean Functions // Proceedings of the Genetic and Evolutionary Computation Conference 2013
Amsterdam: ACM, 2013. str. 191-192 (poster, međunarodna recenzija, cjeloviti rad (in extenso), znanstveni) -
16.Conceptual Modeling of Information Systems within the Information Security Policies // Journal of Economics, Business and Management, 1 (2013), 4; 371-376 doi:10.7763/JOEBM.2013.V1.80 (podatak o recenziji nije dostupan, članak, znanstveni)
-
17.Conceptual Information Modelling within the Contemporary Information Security Policies // Proceedings of the Information Systems Security, MIPRO 2013 / Biljanović, Petar (ur.).
Rijeka: GRAFIK, Rijeka, 2013. str. 1386-1391 (predavanje, međunarodna recenzija, cjeloviti rad (in extenso), ostalo) -
18.Influence of the Crossover Operator in the Performance of the Hybrid Taguchi GA // Proceedings of the 2012 IEEE Congress on Evolutionary Computation / Xiaodong Li (ur.).
Brisbane, 2012. str. 1480-1487 (predavanje, međunarodna recenzija, cjeloviti rad (in extenso), znanstveni) -
19.On the Analysis of Experimental Results in Evolutionary Computation // MIPRO 2012 International Convention
Opatija, 2012. str. 1245-1250 (predavanje, međunarodna recenzija, cjeloviti rad (in extenso), znanstveni) -
20.Evaluation of Crossover Operator Performance in Genetic Algorithms with Binary Representation // Lecture Notes in Computer Science, 6840 (2011), 223-230 (međunarodna recenzija, članak, znanstveni)
-
21.Extended Trail Reinforcement Strategies for Ant Colony Optimization // Swarm, Evolutionary, and Memetic Computing, Lecture Notes in Computer Science, 7076 (2011), 1; 662-669 doi:10.1007/978-3-642-27172-4_78 (međunarodna recenzija, članak, znanstveni)
-
22.A Pheromone Trails Model for MAX-MIN Ant System // 10th Biennal International Conference on Artificial Evolution / Jim-Kao Hao, Pierrick Legrand, Pierre Collet, Nicolas Monmarche, Evelyne Lutton, Marc Schoenauer (ur.).
Angers, 2011. str. 34-46 (predavanje, međunarodna recenzija, cjeloviti rad (in extenso), znanstveni) -
23.On Evolutionary Computation Methods in Cryptography, Proceedings of the Information Systems Security // Proceedings of the Information Systems Security / Čišić, Dragan ; Hutinski, Željko ; Baranović, Mirta ; Mauher, Mladen ; Ordanić, Lea (ur.).
Zagreb: MIPRO, 2011. str. 154-159 (predavanje, međunarodna recenzija, cjeloviti rad (in extenso), znanstveni) -
24.Applying ai-techniques as help for faculty administration - a case study // Proceedings of 21th Central European Conference on Information and Intelligent Systems, September 22-24, 2010, Varaždin, Croatia / Aurer, Boris ; Bača, Miroslav ; Schatten, Markus (ur.).
Varaždin: Faculty of Organization and Informatics, 2010. str. 163-170 (predavanje, međunarodna recenzija, cjeloviti rad (in extenso), znanstveni) -
25.Comparison of a Crossover Operator in Binary-coded Genetic Algorithms // WSEAS transactions on computers, 9 (2010), 1064-1073 (međunarodna recenzija, članak, znanstveni)