Association for promotion of innovative technologies - InnovativeFET is established and aims to promote the use of innovative information and communication technologies, fostering innovation development and application of information and communication technologies, raising public awareness about the security aspects of the use of such technologies and to promote awareness of emerging technologies. These goals Association strives to achieve by encouraging innovative thinking, the establishment and development of international cooperation and organizing and holding educational workshops and seminars.

International conference
Industry 4.0

We are proud to announce that 4. international scientific conference - Industry 4.0 will be held from 24. -27.06.2019. in Hotel Atlantis, Burgas, Bulgary under the organization of Scientific-technical union of mechanical engineering Bulgaria "Industry 4.0". InnovativeFET is the co-organizer of this event. More information on official conference web.

EAI Institutional Member

We are proud to inform you that Association has become an Institutional Member of EAI - European Alliance for Innovation. Cooperation with EAI is giving us a global platform for endorsing and promoting our future initiatives and activities. In this way Association is becoming more visible globally and have opportunity to do even more for promotion of future and innovative technologies.

EAI International Conference on
Management of Manufacturing

The 3rd EAI International Conference on Management of Manufacturing (MMS2018) was successfully organized by the European Alliance for Innovation - EAI in Dubrovnik, 6-8. November 2018.
The co-organizers were: Technical University of Košice; Association for promoting innovative technologies - InnovativeFET, Zagreb; Department of Information Communication Traffic of the Faculty of Transport and Traffic Sciences, Zagreb with the partnership of the Croatian Chamber of Traffic and Transport Technology Engineers, Zagreb and the Springer Publishing Company (Springer Nature Switzerland).
Financial assistance to the organization of the conference was given by the companies Transmitters and Communications Ltd., HŽ Infrastruktura Ltd. and the Croatian Post Plc.
During the conference 3 (three) plenary presentations, 2 (two) technical lectures and 26 scientific papers from 105 co-authors from the Czech Republic, Croatia, India, Poland, Portugal, Romania, Slovak Republic and Ukraine were presented.
The next 4th conference will be held from 8. to 10. of October 2019 in Krynica Zdroj, Poland.
More details:

International conference
"Industry 4.0"

Activities and influence of the Association are getting stronger every day, so we are very proud to announce Association's fourth international scientific conference co organization. This time we are co organizing third international scientific conference "Industry 4.0" that will be held in Borovets, Bulgaria from 12 to 15 of December 2018. For more information please visit official conference websit.

RCITD - new deadline

The 6th RCITD 2018 International Virtual Research Conference aimed at Engineering will be held at during 5 - 11 November 2018. Date for full paper submission has been extended till October 12, 2018. For more information visit official conference websit.


We are proud to inform you that the InnovativeFET will once again be partner at International Conference on Design, Simulation, Manufacturing: The Innovation Exchange - DSMIE-2019 that will be held in Lutsk, Ukraine. More details on folowing link.


We are pleased to inform you that we are co-organizer of RCITD 2018 - 6th International Virtual Research Conference. More about Conference, please visit this link.


We are pleased to inform you that we are co-organizer of MMS 2018 - 3rd EAI International Conference on Management of Manufacturing Systems. More about Conference, please visit this link.


We are proud to announce our partnership at International Conference on Design, Simulation, Manufacturing: The Innovation Exchange (DSMIE-2018). More about Conference, please visit this link.

Partners and sponsors of DSMIE-2018

Meet the partners and sponsors of International Conference on Design, Simulation, Manufacturing: The Innovation Exchange - DSMIE-2018 that will be held in Sumy, Ukraine on June 12-15, 2018. For more information please visit following link.


We are proud to inform you that the International Conference on Design, Simulation, Manufacturing: The Innovation Exchange - DSMIE-2018 which was held in Sumy, Ukraine has been successfully completed. InnovativeFET was conference partner alongside many prominent organizations such as Springer, Unicheck, EasyChair, Technical University of KOsice, Kielce University of Technology, University of West Bohemia and TRIZ.

Hrvatska lutrija - tender for donations in 2018

Project title: Research of security application of innovative information and communication services

Project idea description

The reliability of data for users of various information and communications services has been increasing in recent years. Among other things, it is mentioned the result of an increase in the number of innovative information and communication services and the number of users who use that service. A significant number of users do not have enough knowledge about the potential threats of such environments, making them vulnerable to a large number of attacks. With the increasing use of social networks, new attack vectors have been developed, whereby it is possible to use in a number of ways the data that users voluntarily and on their own initiative publish using such services. The proposed project would identify threats directed to users of various information and communication services, as well as services that are most commonly targeted by malicious users. In addition, conducting the survey of users and analyzing the results of the survey will define the most vulnerable groups of users. On the basis of the collected knowledge, the behavior guidelines will be defined when using information and communication services for the most vulnerable groups of users in order to increase the security of their data. Defined guidelines will be disseminated to users via Internet portals, social networks and other media. The results of the research will be presented in the form of scientific work and scientific-professional community at an international scientific conference with the aim of involving and directing a wider scientific community into the subject problem area.

Analysis of DDoS attack trends

The largest number of infrastructure layer attacks in 2013 and 2014 was performed using the TCP protocol with exploitation of the SYN flag (31.22% and 25.73%). The SYN flag represents one of six possible TCP header flags (ACK, SYN, URG, FIN, RST, and PSH) whose function is to synchronize sequential packet numbers when initiating a TCP session, and it is often used for implementation of DDoS attack. Except the SYN and other TCP header flags there are other protocols or protocol parameters that were used in DDoS attacks based on infrastructure and application layer. After 2014, changes in the frequency of certain infrastructure layer protocols use are noticed. Since the third quarter of 2014, the share of SYN based attacks has been in decline, and the use of other protocols such as UDP, NTP (Network Time Protocol) and DNS (Domain Name System) is rising. Figure show the frequency of certain protocols use in the implementation of DDoS attacks, quarterly for the time period from the first quarter of 2013 to the first quarter of 2017. The analyzed data were taken from the company Aakmai Inc., one of the leading firms for protection from DDoS attacks worldwide. There is a noticeable increase in the trend of traffic intensity generated by DDoS attacks since 2012. The most intense attack was recorded at the end of 2016 with amount to 623 Gbps. The reason for the current trend is the development of cloud computing (CC) concept, which also implies the use of processing capacity considerably larger for the inbound traffic than is the case of traditional IC systems. Accordingly, successful disruption of IC resource availability in the CC environment requires generating a higher DDoS traffic intensity

Motivations for the attack on information and
communication services availability

Availability represents one of the key security requirements. Every IC system have the purpose to deliver the data, information or service to end user. User can be human, but it can also be a process, machine or any other entity that can benefit from received data, information or service. If IC system cannot perform delivery of them, then it loses its purpose. If IC resource is not available at requested time, then security requirements such as integrity or confidentiality losses their importance as well. Availability is usually described in “number of nines notation” where one nine denotes 90% availability level or 36.5 days/year of downtime and six nines denotes 99.9999% of availability level or 31.5 sec/year of downtime. Availability is the probability that a system or system element is performing its defined function at a given time. That is why it is important to observe factors that can affect availability of IC resources in ITS system, which implies every element of IC system and not just communication segment. Motivation for conducting an attack can vary, but 24.43% of organization stated that motivation for generating security incident is disruption of service. That information is supporting importance of research oriented towards identification of factors that can have negative affect on IC resources availability.

Smart home as innovative services

The rapid development of hardware, software and communication technologies enabled the development of the IoT (Internet of Things) concept. The IoT concept extends the existing Internet network and implies pervasive network-connected devices that represent the link between the digital and physical environment. Digital environment interacting with the physical through a variety of sensors and actuators that have the function to uniquely represent and manage objects from the physical environment. The sensors and actuators contain resources for communication, processing and storage of data, and enable detection and eventual change of a object state. According to the above-mentioned concept, IoT represents the agglomeration of various technologies that are interrelated with the aim of providing innovative services. The security of a smart home IoT (SHIoT) device is a subject of numerous research. Some shows the first fundamental empirical analysis of the smart home platform security. Applications developed on the Samsung SmartThings platform have been analyzed and vulnerabilities of such applications to numerous security threats were identified such as access rights escalation, unauthorized access to pin code devices, unauthorized device configuration modifications, and so on. Numerous studies have identified the security challenges of a smart home environment associated with unauthorized data modification, inserting malicious code, unauthorized remote device management, eavesdropping, unauthorized routing and others. Authors of paper conducted a vulnerability assessment of SHIoT devices. The research involved a considerable number of vulnerabilities and related threats whose implementation could have a negative impact on user privacy, user data, traffic content, and disabling resource access as a result of DDoS attacks. Due to numerous limitations, IoT devices are a potential target or source of various cyber-attacks. The availability of information and communication resources in a smart home environment is a key security challenge and can often be hindered by DDoS attacks. In addition to be the target of attack, devices in the smart home environment are ever more frequent sources of DDoS attacks, or generators of illegal DDoS traffic through unprotected IoT devices associated with the botnet network. An example of such botnet through which many DDoS attacks are performed is the Mirai botnet. Mirai has controlled more than 100,000 inadequately protected SHIoT devices and thus generated illegitimate network traffic (DDoS traffic) to the desired destinations.

According to forecasts, by 2020 the total number of devices that IoT concept combines will be approximately 31 billion, and by 2025 about 75 billion. the number of IoT devices in certain economic segments. There is a significant increase in the number of IoT devices in the consumer sector (SHIoT) compared to other business sectors. Extrapolation of the SHIoT devices growth trend indicates 12,86 billion devices by 2020. In 2008. the average household was 2.4 SHIoT devices, in 2015 there were 8.6 SHIoT units in the average household, and in 2022 the average household would contain more than 500 SHIoT devices. According to the statistical data presented, it can be concluded that the increase in the number of SHIoT devices will also affect the increase of the DDoS traffic intensity generated by such devices. The above indicates an increase in the need for detection methods and DDoS traffic management generated in the smart home environment.


Address: IV Maksimirsko naselje 30, 10 000 Zagreb, Croatia
IBAN: HR8923600001102654610, Zagrebačka banka d.d.
OIB: 21150435048
ID number: 04831225
Register number: 21012823
RNO: 0412671