Search Results - "Simić, Dejan"
-
1
Fishbone model and universal authentication framework for evaluation of multifactor authentication in mobile environment
Published in Computers & security (01-08-2019)“…•Fishbone model provides UAF for quantifying MFA methods in mobile environment.•This paper gives the comparison of contemporary user mobile authentication…”
Get full text
Journal Article -
2
A model of digital identity for better information security in e-learning systems
Published in The Journal of supercomputing (01-02-2022)“…The trend of rapid development of information technologies is creating new challenges in information security such as security management of identities in…”
Get full text
Journal Article -
3
Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks
Published in Ingeniería e investigación (2018)“…Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the security issue…”
Get full text
Journal Article -
4
Correction to: A model of digital identity for better information security in e-learning systems
Published in The Journal of supercomputing (2022)Get full text
Journal Article -
5
A hybrid XSS attack (HYXSSA) based on fusion approach: Challenges, threats and implications in cybersecurity
Published in Journal of King Saud University. Computer and information sciences (01-11-2022)“…Cross-site scripting (XSS) attacks have been extensively studied in the literature, although mitigating such attacks remain a challenge for cyber defenders. In…”
Get full text
Journal Article -
6
Effect of Different ET-Based Irrigation Scheduling on Grain Yield and Water Use Efficiency of Drip Irrigated Maize
Published in Agriculture (Basel) (01-10-2023)“…The development of irrigation schedules based on water balance implies a study of daily plant water requirements. A properly selected irrigation method is also…”
Get full text
Journal Article -
7
Improving student engagement in a biometric classroom: the contribution of gamification
Published in Universal access in the information society (01-08-2019)“…This paper presents the use of gamification for educating engineers in the field of biometrics. A learning platform with gamification elements was developed…”
Get full text
Journal Article -
8
Comparison of oncologic outcomes between elective partial and radical nephrectomy in patients with renal cell carcinoma in CT1B stadium
Published in Vojnosanitetski pregled (2022)“…Background/Aim. In renal cell carcinoma (RCC), the choice of surgical technique, radical (RN) or partial nephrectomy (PN), is still center-dependent because…”
Get full text
Journal Article -
9
An Application of Partial Homomorphic Encryption in Computer System with Limited Resources
Published in Tehnički vjesnik (01-06-2018)“…Mathematical calculation over ciphertext during homomorphic encryption makes result of the calculation in a form of ciphertext. Obtained result can be…”
Get full text
Journal Article Paper -
10
Tweakable parallel OFB mode of operation with delayed thread synchronization
Published in Security and communication networks (10-07-2016)“…Introduction of various cryptographic modes of operation is induced with noted imperfections of symmetric block algorithms. Design of some cryptographic modes…”
Get full text
Journal Article -
11
Calculation of maize evapotranspiration using evaporation and reference evapotranspiration methods
Published in Zemljište i biljka (2020)“…Analysis of irrigation scheduling of maize was done by using evaporation from the free water surface (Eo) and correction coefficients (k) and reference…”
Get full text
Journal Article -
12
Scoring system development for prediction of extravesical bladder cancer
Published in Vojnosanitetski pregled (01-09-2014)“…Staging of bladder cancer is crucial for optimal management of the disease. However, clinical staging is not perfectly accurate. The aim of this study was to…”
Get full text
Journal Article -
13
The clinical course of non-muscle invasive bladder cancer after transurethral resection of the tumor with or without subsequent intravesical application of bacillus Calmette-Guérin: The influence of patients gender and age
Published in Vojnosanitetski pregled (01-07-2015)“…BACGROUND/AIM: The therapy with intravesical instillation of bacillus Calmette-Guérin (BCG) after transurethral resection (TUR) of tumor is the gold standard…”
Get full text
Journal Article -
14
The clinical course of non-muscle invasive bladder cancer after transuretral resection of the tumor with or without subsequent intravesical application of bacillus Calmette-Guérin: The influence of patients gender and age
Published in Vojnosanitetski pregled (2015)“…Bacground/Aim. The therapy with intravesical instillation of bacillus Calmette-Gu?rin (BCG) after transurethral resection (TUR) of tumor is the gold standard…”
Get full text
Journal Article -
15
-
16
Newly synthesized palladium(II) complexes with aminothiazole derivatives: in vitro study of antimicrobial activity and antitumor activity on the human prostate cancer cell line
Published in Dalton transactions : an international journal of inorganic chemistry (17-01-2022)“…Five new complexes of the palladium(II) ion (C1-C5) having the general formula [(PdL )]Cl with some 2-aminothiazoles (L1-L5), where L1 =…”
Get more information
Journal Article -
17
Reducing e-commerce risks using digital certificates
Published in Yugoslav Journal of Operations Research (01-01-2009)“…E-commerce means buying and selling goods and services across the Internet. Secured communication in e-commerce, across unsecured medium, such as the Internet,…”
Get full text
Journal Article -
18
Designing Laboratory for IoT Communication Infrastructure Environment for Remote Maritime Surveillance in Equatorial Areas Based on the Gulf of Guinea Field Experiences
Published in Sensors (Basel, Switzerland) (29-02-2020)“…The steady increase of the world population and economy leads to an increase in both types and amounts of goods transported over seas, which further inevitably…”
Get full text
Journal Article -
19
Geostrategy of transition and security challenges
Published in Vojno delo (2017)“…On the one hand, during its recent history Serbia has undergone many transitional processes of historical proportions, and on the other hand, all those…”
Get full text
Journal Article -
20
Neoliberal globalism, sovereignty and national defense
Published in Vojno delo (2016)“…This paper examines the direct and indirect impacts of neoliberalism and globalization on national defense and security of a sovereign state. Different…”
Get full text
Journal Article