- Document2014 – Year of Broken Name Generator(s)uploaded byMiroslav Stampar
- DocumentOptimizacija De Casteljauovog algoritma vektorizacijomuploaded byMiroslav Stampar
- DocumentPraktični primjeri gdje do izražaja dolaze pogreške prenošenjauploaded byMiroslav Stampar
- DocumentAlgoritmi za sažimanje podataka bez gubitka informacijeuploaded byMiroslav Stampar
- DocumentHeurističke metode pretrageuploaded byMiroslav Stampar
- DocumentOpenMPuploaded byMiroslav Stampar
- DocumentOtkrivanje znanja primjenom neuronskih mrežauploaded byMiroslav Stampar
- DocumentSpot the Web Vulnerabilityuploaded byMiroslav Stampar
- DocumentDNS Exfiltration Using Sqlmapuploaded byMiroslav Stampar
- DocumentAnalysis of Mass SQLi Attacksuploaded byMiroslav Stampar
- DocumentIt all starts with the ' (SQL injection from attacker's point of view)uploaded byMiroslav Stampar
- Documentsqlmap - security development in Pythonuploaded byMiroslav Stampar
- DocumentData Retrieval over DNS in SQL Injection Attacksuploaded byMiroslav Stampar
- DocumentOcjena kvalitete algoritama za šifriranjeuploaded byMiroslav Stampar