Papers |
An Implementation of Ransomware Malicious Software in Python
Bojan Vujanić, Nemanja Maček, Saša Adamović
|
Blocking Tor - Insight Approach
Vladimir Stanojević
|
Managing Risks by Federating Identities in Digital Economy
Marko Tmušić, Mladen Veinović
|
Social Engineering Attack Method on ICT Systems Using USB Stick
Goran Kunjadić, Marina Savković, Suzana Radović
|
Using the Military Geographical Institute Photogrammetric Documentation Archive Data for Scientific and Other Research - The Necessity and Importance of Digitization
Saša Bakrač, Zlatan Milonjić, Dejan Đorđević, Zoran Srdić, Slaviša Tatomirović
|
Application of Biometrics in Automotive Industry - Case Study Based on Iris Recognition
Edin Ćatović, Saša Adamović
|
Robustness of Two-Layered Feedforward Neural Network
Maja Sarevska
|
Digital Image Watermarking Techniques and Biometrics Data Security: A Review
Jelena Tašić, Saša Adamović
|
Payment Cards Counterfeiting Methods and Pin Uncovering
Goran Kunjadić, Mladen Veinović, Milan Milosavljević
|
Cyber Terrorism on The Internet and Social Networking: A Threat to Global Security
Vida Vilić
|
The Right to Privacy, Informational Privacy and the Right to Information in the Cyberspace
Vida Vilić, Ivan Radenković
|
Zaštita računarske bezbednosti putem krivičnog prava
Miodrag Simović, Dragan Jovašević, Vladimir M. Simović
|