Maravić Čisar, S.

Link to this page

Authority KeyName Variants
99df6163-132d-4855-b88e-7a712c1bfa38
  • Maravić Čisar, S. (2)
Projects
No records found.

Author's Bibliography

Ethical Hacking of Wireless Networks in Kali Linux Environment

Čisar, P.; Maravić Čisar, S.

(Timisoara : University Politehnica, 2018)

TY  - JOUR
AU  - Čisar, P.
AU  - Maravić Čisar, S.
PY  - 2018
UR  - http://jakov.kpu.edu.rs/handle/123456789/1528
AB  - The topic of this paper is related to the wireless network security problems. For identifying existing security weaknesses, there is a variety of approaches among which is Kali Linux operating system. General cracking procedure of wireless networks consists of several steps. The efficiency of cracking the key and determining the password are the two essentials on which the effectivenss of the procedure depends on. This phase of cracking is also the most demanding. A large collection of different tools for vulnerability assessment and penetration testing designed primarily for ethical hacking is undoubtedly the benefit of this operating system.
PB  - Timisoara : University Politehnica
T2  - ANNALS of the Faculty Engineering Hunedoara – International Journal of Engineering (Online)
T1  - Ethical Hacking of Wireless Networks in Kali Linux Environment
VL  - 16
IS  - 3
SP  - 181
EP  - 186
UR  - https://hdl.handle.net/21.15107/rcub_jakov_1528
ER  - 
@article{
author = "Čisar, P. and Maravić Čisar, S.",
year = "2018",
abstract = "The topic of this paper is related to the wireless network security problems. For identifying existing security weaknesses, there is a variety of approaches among which is Kali Linux operating system. General cracking procedure of wireless networks consists of several steps. The efficiency of cracking the key and determining the password are the two essentials on which the effectivenss of the procedure depends on. This phase of cracking is also the most demanding. A large collection of different tools for vulnerability assessment and penetration testing designed primarily for ethical hacking is undoubtedly the benefit of this operating system.",
publisher = "Timisoara : University Politehnica",
journal = "ANNALS of the Faculty Engineering Hunedoara – International Journal of Engineering (Online)",
title = "Ethical Hacking of Wireless Networks in Kali Linux Environment",
volume = "16",
number = "3",
pages = "181-186",
url = "https://hdl.handle.net/21.15107/rcub_jakov_1528"
}
Čisar, P.,& Maravić Čisar, S.. (2018). Ethical Hacking of Wireless Networks in Kali Linux Environment. in ANNALS of the Faculty Engineering Hunedoara – International Journal of Engineering (Online)
Timisoara : University Politehnica., 16(3), 181-186.
https://hdl.handle.net/21.15107/rcub_jakov_1528
Čisar P, Maravić Čisar S. Ethical Hacking of Wireless Networks in Kali Linux Environment. in ANNALS of the Faculty Engineering Hunedoara – International Journal of Engineering (Online). 2018;16(3):181-186.
https://hdl.handle.net/21.15107/rcub_jakov_1528 .
Čisar, P., Maravić Čisar, S., "Ethical Hacking of Wireless Networks in Kali Linux Environment" in ANNALS of the Faculty Engineering Hunedoara – International Journal of Engineering (Online), 16, no. 3 (2018):181-186,
https://hdl.handle.net/21.15107/rcub_jakov_1528 .

Cybercrime and digital forensics – technologies and approaches

Čisar, P.; Maravić Čisar, S.; Bošnjak, S.

(Vienna : DAAAM International Vienna, 2014)

TY  - CONF
AU  - Čisar, P.
AU  - Maravić Čisar, S.
AU  - Bošnjak, S.
PY  - 2014
UR  - http://jakov.kpu.edu.rs/handle/123456789/1512
AB  - This chapter deals with two key terms: cybercrime and digital (computer) forensics. The first part of the chapter introduces the term “cybercrime”, defines and explains the categories and the anatomy of different types of attacks as the main form of cybercrime and provides typical examples. In addition, some characteristic cybercrime statistics and trends, such as documented cases of cybercrime are presented. Creating an environment for today’s cybercrime prevention is also elaborated on. The second part of this chapter is related to digital forensics – the main procedure of digital crime scene investigation. Finally, this chapter deals with general methodology of computer forensics, forensic framework and process models.
PB  - Vienna : DAAAM International Vienna
C3  - DAAAM International Scientific Book, 2014, Chapter 42
T1  - Cybercrime and digital forensics – technologies and approaches
SP  - 525
EP  - 542
DO  - 10.2507/daaam.scibook.2014.42
ER  - 
@conference{
author = "Čisar, P. and Maravić Čisar, S. and Bošnjak, S.",
year = "2014",
abstract = "This chapter deals with two key terms: cybercrime and digital (computer) forensics. The first part of the chapter introduces the term “cybercrime”, defines and explains the categories and the anatomy of different types of attacks as the main form of cybercrime and provides typical examples. In addition, some characteristic cybercrime statistics and trends, such as documented cases of cybercrime are presented. Creating an environment for today’s cybercrime prevention is also elaborated on. The second part of this chapter is related to digital forensics – the main procedure of digital crime scene investigation. Finally, this chapter deals with general methodology of computer forensics, forensic framework and process models.",
publisher = "Vienna : DAAAM International Vienna",
journal = "DAAAM International Scientific Book, 2014, Chapter 42",
title = "Cybercrime and digital forensics – technologies and approaches",
pages = "525-542",
doi = "10.2507/daaam.scibook.2014.42"
}
Čisar, P., Maravić Čisar, S.,& Bošnjak, S.. (2014). Cybercrime and digital forensics – technologies and approaches. in DAAAM International Scientific Book, 2014, Chapter 42
Vienna : DAAAM International Vienna., 525-542.
https://doi.org/10.2507/daaam.scibook.2014.42
Čisar P, Maravić Čisar S, Bošnjak S. Cybercrime and digital forensics – technologies and approaches. in DAAAM International Scientific Book, 2014, Chapter 42. 2014;:525-542.
doi:10.2507/daaam.scibook.2014.42 .
Čisar, P., Maravić Čisar, S., Bošnjak, S., "Cybercrime and digital forensics – technologies and approaches" in DAAAM International Scientific Book, 2014, Chapter 42 (2014):525-542,
https://doi.org/10.2507/daaam.scibook.2014.42 . .