Kuk, Kristijan

Link to this page

Authority KeyName Variants
orcid::0000-0001-8910-791X
  • Kuk, Kristijan (24)
Projects

Author's Bibliography

Analysis of DDoS Attack Detection Techniques for Securing Software- Defined Networks

Čabarkapa, Danijel; Popović, Brankica; Čisar, Petar; Kuk, Kristijan

(Belgrade : University of Criminal Investigation and Police Studies, 2023)

TY  - CONF
AU  - Čabarkapa, Danijel
AU  - Popović, Brankica
AU  - Čisar, Petar
AU  - Kuk, Kristijan
PY  - 2023
UR  - http://jakov.kpu.edu.rs/handle/123456789/1530
AB  - Software-Defined Networks (SDN) is an important technology that enables a new approach to how we develop and manage networks. SDN divides the data plane and control plane and supports the logical centralization of network control. However, the centralized architecture of SDN is also a potential vulnerability for various types of malicious attacks. The paper elaborates on the security aspects of virtualization as a basic concept of SDN architecture. Among the many types of attack, one of the most frequent and destructive are Distributed Denial of Service (DDoS) attacks. This paper presents an analysis of techniques to detect DDoS attacks in SDN networks. It first describes the SDN architecture and then elaborates on different detection techniques for DDoS attacks. Additionally, this paper emphasizes the types, components, and categories of detection solutions according to the techniques or methods used. The important approaches and those that can answer the complexity of detecting DDoS attacks in SDN are the detection schemes based on entropy and machine learning principles. This paper in general focuses on these two detection techniques and summarizes their benefits and drawbacks and finally provides a guideline for future research directions related to DDoS detection techniques in SDN networks.
PB  - Belgrade : University of Criminal Investigation and Police Studies
C3  - International scientific conference “Archibald Reiss Days”
T1  - Analysis of DDoS Attack Detection Techniques for Securing Software- Defined Networks
SP  - 17
EP  - 35
UR  - https://hdl.handle.net/21.15107/rcub_jakov_1530
ER  - 
@conference{
author = "Čabarkapa, Danijel and Popović, Brankica and Čisar, Petar and Kuk, Kristijan",
year = "2023",
abstract = "Software-Defined Networks (SDN) is an important technology that enables a new approach to how we develop and manage networks. SDN divides the data plane and control plane and supports the logical centralization of network control. However, the centralized architecture of SDN is also a potential vulnerability for various types of malicious attacks. The paper elaborates on the security aspects of virtualization as a basic concept of SDN architecture. Among the many types of attack, one of the most frequent and destructive are Distributed Denial of Service (DDoS) attacks. This paper presents an analysis of techniques to detect DDoS attacks in SDN networks. It first describes the SDN architecture and then elaborates on different detection techniques for DDoS attacks. Additionally, this paper emphasizes the types, components, and categories of detection solutions according to the techniques or methods used. The important approaches and those that can answer the complexity of detecting DDoS attacks in SDN are the detection schemes based on entropy and machine learning principles. This paper in general focuses on these two detection techniques and summarizes their benefits and drawbacks and finally provides a guideline for future research directions related to DDoS detection techniques in SDN networks.",
publisher = "Belgrade : University of Criminal Investigation and Police Studies",
journal = "International scientific conference “Archibald Reiss Days”",
title = "Analysis of DDoS Attack Detection Techniques for Securing Software- Defined Networks",
pages = "17-35",
url = "https://hdl.handle.net/21.15107/rcub_jakov_1530"
}
Čabarkapa, D., Popović, B., Čisar, P.,& Kuk, K.. (2023). Analysis of DDoS Attack Detection Techniques for Securing Software- Defined Networks. in International scientific conference “Archibald Reiss Days”
Belgrade : University of Criminal Investigation and Police Studies., 17-35.
https://hdl.handle.net/21.15107/rcub_jakov_1530
Čabarkapa D, Popović B, Čisar P, Kuk K. Analysis of DDoS Attack Detection Techniques for Securing Software- Defined Networks. in International scientific conference “Archibald Reiss Days”. 2023;:17-35.
https://hdl.handle.net/21.15107/rcub_jakov_1530 .
Čabarkapa, Danijel, Popović, Brankica, Čisar, Petar, Kuk, Kristijan, "Analysis of DDoS Attack Detection Techniques for Securing Software- Defined Networks" in International scientific conference “Archibald Reiss Days” (2023):17-35,
https://hdl.handle.net/21.15107/rcub_jakov_1530 .

Asymptotic Properties and Application of GSB Process : A Case Study of the COVID‐19 Dynamics in Serbia

Jovanović, Mihailo; Stojanović, Vladica; Kuk, Kristijan; Popović, Brankica; Čisar, Petar

(Basel, Switzerland : MDPI, 2022)

TY  - JOUR
AU  - Jovanović, Mihailo
AU  - Stojanović, Vladica
AU  - Kuk, Kristijan
AU  - Popović, Brankica
AU  - Čisar, Petar
PY  - 2022
UR  - http://jakov.kpu.edu.rs/handle/123456789/1519
AB  - This paper describes one of the non-linear (and non-stationary) stochastic models, the GSB (Gaussian, or Generalized, Split-BREAK) process, which is used in the analysis of time series with pronounced and accentuated fluctuations. In the beginning, the stochastic structure of the GSB process and its important distributional and asymptotic properties are given. To that end, a method based on characteristic functions (CFs) was used. Various procedures for the estimation of model parameters, asymptotic properties, and numerical simulations of the obtained estimators are also investigated. Finally, as an illustration of the practical application of the GSB process, an analysis is presented of the dynamics and stochastic distribution of the infected and immunized population in relation to the disease COVID-19 in the territory of the Republic of Serbia.
PB  - Basel, Switzerland : MDPI
T2  - Mathematics
T1  - Asymptotic Properties and Application of GSB Process : A Case Study of the COVID‐19 Dynamics in Serbia
VL  - 10
IS  - 20
SP  - 3849
DO  - 10.3390/math10203849
ER  - 
@article{
author = "Jovanović, Mihailo and Stojanović, Vladica and Kuk, Kristijan and Popović, Brankica and Čisar, Petar",
year = "2022",
abstract = "This paper describes one of the non-linear (and non-stationary) stochastic models, the GSB (Gaussian, or Generalized, Split-BREAK) process, which is used in the analysis of time series with pronounced and accentuated fluctuations. In the beginning, the stochastic structure of the GSB process and its important distributional and asymptotic properties are given. To that end, a method based on characteristic functions (CFs) was used. Various procedures for the estimation of model parameters, asymptotic properties, and numerical simulations of the obtained estimators are also investigated. Finally, as an illustration of the practical application of the GSB process, an analysis is presented of the dynamics and stochastic distribution of the infected and immunized population in relation to the disease COVID-19 in the territory of the Republic of Serbia.",
publisher = "Basel, Switzerland : MDPI",
journal = "Mathematics",
title = "Asymptotic Properties and Application of GSB Process : A Case Study of the COVID‐19 Dynamics in Serbia",
volume = "10",
number = "20",
pages = "3849",
doi = "10.3390/math10203849"
}
Jovanović, M., Stojanović, V., Kuk, K., Popović, B.,& Čisar, P.. (2022). Asymptotic Properties and Application of GSB Process : A Case Study of the COVID‐19 Dynamics in Serbia. in Mathematics
Basel, Switzerland : MDPI., 10(20), 3849.
https://doi.org/10.3390/math10203849
Jovanović M, Stojanović V, Kuk K, Popović B, Čisar P. Asymptotic Properties and Application of GSB Process : A Case Study of the COVID‐19 Dynamics in Serbia. in Mathematics. 2022;10(20):3849.
doi:10.3390/math10203849 .
Jovanović, Mihailo, Stojanović, Vladica, Kuk, Kristijan, Popović, Brankica, Čisar, Petar, "Asymptotic Properties and Application of GSB Process : A Case Study of the COVID‐19 Dynamics in Serbia" in Mathematics, 10, no. 20 (2022):3849,
https://doi.org/10.3390/math10203849 . .
5

Application of Artificial Immune Networks in Continuous Function Optimizations

Čisar, Petar; Maravić Čisar, Sanja; Popović, Brankica; Kuk, Kristijan; Vuković, Igor

(Budapest : Óbuda University, 2022)

TY  - JOUR
AU  - Čisar, Petar
AU  - Maravić Čisar, Sanja
AU  - Popović, Brankica
AU  - Kuk, Kristijan
AU  - Vuković, Igor
PY  - 2022
UR  - http://jakov.kpu.edu.rs/handle/123456789/1446
AB  - This paper deals with the application of artificial immune networks in continuous
function optimizations. The performance of the immunological algorithms is analyzed using
the Optimization Algorithm Toolkit. It is shown that the CLIGA algorithm has, by far, the
fastest convergence and the best score - in terms of the number of required iterations, for the
analyzed continuous function. Also, based on the test results, it was concluded, that the lowest
total number of iterations for the defined run time was achieved with the opt-IA algorithm,
followed by the CLONALG and CLIGA algorithms.
PB  - Budapest : Óbuda University
T2  - Acta Polytechnica Hungarica
T1  - Application of Artificial Immune Networks in Continuous Function Optimizations
VL  - 19
IS  - 7
SP  - 153
EP  - 164
DO  - 10.12700/APH.19.7.2022.7.8
ER  - 
@article{
author = "Čisar, Petar and Maravić Čisar, Sanja and Popović, Brankica and Kuk, Kristijan and Vuković, Igor",
year = "2022",
abstract = "This paper deals with the application of artificial immune networks in continuous
function optimizations. The performance of the immunological algorithms is analyzed using
the Optimization Algorithm Toolkit. It is shown that the CLIGA algorithm has, by far, the
fastest convergence and the best score - in terms of the number of required iterations, for the
analyzed continuous function. Also, based on the test results, it was concluded, that the lowest
total number of iterations for the defined run time was achieved with the opt-IA algorithm,
followed by the CLONALG and CLIGA algorithms.",
publisher = "Budapest : Óbuda University",
journal = "Acta Polytechnica Hungarica",
title = "Application of Artificial Immune Networks in Continuous Function Optimizations",
volume = "19",
number = "7",
pages = "153-164",
doi = "10.12700/APH.19.7.2022.7.8"
}
Čisar, P., Maravić Čisar, S., Popović, B., Kuk, K.,& Vuković, I.. (2022). Application of Artificial Immune Networks in Continuous Function Optimizations. in Acta Polytechnica Hungarica
Budapest : Óbuda University., 19(7), 153-164.
https://doi.org/10.12700/APH.19.7.2022.7.8
Čisar P, Maravić Čisar S, Popović B, Kuk K, Vuković I. Application of Artificial Immune Networks in Continuous Function Optimizations. in Acta Polytechnica Hungarica. 2022;19(7):153-164.
doi:10.12700/APH.19.7.2022.7.8 .
Čisar, Petar, Maravić Čisar, Sanja, Popović, Brankica, Kuk, Kristijan, Vuković, Igor, "Application of Artificial Immune Networks in Continuous Function Optimizations" in Acta Polytechnica Hungarica, 19, no. 7 (2022):153-164,
https://doi.org/10.12700/APH.19.7.2022.7.8 . .
1
2

Multi-Agent System Observer: Intelligent Support for Engaged E-Learning

Vuković, Igor; Kuk, Kristijan; Čisar, Petar; Banđur, Miloš; Banđur, Đoko; Milić, Nenad; Popović, Brankica

(Basel : MDPI, 2021)

TY  - JOUR
AU  - Vuković, Igor
AU  - Kuk, Kristijan
AU  - Čisar, Petar
AU  - Banđur, Miloš
AU  - Banđur, Đoko
AU  - Milić, Nenad
AU  - Popović, Brankica
PY  - 2021
UR  - http://jakov.kpu.edu.rs/handle/123456789/1531
AB  - Moodle is a widely deployed distance learning platform that provides numerous opportunities to enhance the learning process. Moodle’s importance in maintaining the continuity of education in states of emergency and other circumstances has been particularly demonstrated in the context of the COVID-19 virus’ rapid spread. However, there is a problem with personalizing the learning and monitoring of students’ work. There is room for upgrading the system by applying data mining and different machine-learning methods. The multi-agent Observer system proposed in our paper supports students engaged in learning by monitoring their work and making suggestions based on the prediction of their final course success, using indicators of engagement and machine-learning algorithms. A novelty is that Observer collects data independently of the Moodle database, autonomously creates a training set, and learns from gathered data. Since the data are anonymized, researchers and lecturers can freely use them for purposes broader than that specified for Observer. The paper shows how the methodology, technologies, and techniques used in Observer provide an autonomous system of personalized assistance for students within Moodle platforms.
PB  - Basel : MDPI
T2  - Electronics
T1  - Multi-Agent System Observer: Intelligent Support for Engaged E-Learning
VL  - 10
IS  - 12
SP  - 1370
DO  - 10.3390/electronics10121370
ER  - 
@article{
author = "Vuković, Igor and Kuk, Kristijan and Čisar, Petar and Banđur, Miloš and Banđur, Đoko and Milić, Nenad and Popović, Brankica",
year = "2021",
abstract = "Moodle is a widely deployed distance learning platform that provides numerous opportunities to enhance the learning process. Moodle’s importance in maintaining the continuity of education in states of emergency and other circumstances has been particularly demonstrated in the context of the COVID-19 virus’ rapid spread. However, there is a problem with personalizing the learning and monitoring of students’ work. There is room for upgrading the system by applying data mining and different machine-learning methods. The multi-agent Observer system proposed in our paper supports students engaged in learning by monitoring their work and making suggestions based on the prediction of their final course success, using indicators of engagement and machine-learning algorithms. A novelty is that Observer collects data independently of the Moodle database, autonomously creates a training set, and learns from gathered data. Since the data are anonymized, researchers and lecturers can freely use them for purposes broader than that specified for Observer. The paper shows how the methodology, technologies, and techniques used in Observer provide an autonomous system of personalized assistance for students within Moodle platforms.",
publisher = "Basel : MDPI",
journal = "Electronics",
title = "Multi-Agent System Observer: Intelligent Support for Engaged E-Learning",
volume = "10",
number = "12",
pages = "1370",
doi = "10.3390/electronics10121370"
}
Vuković, I., Kuk, K., Čisar, P., Banđur, M., Banđur, Đ., Milić, N.,& Popović, B.. (2021). Multi-Agent System Observer: Intelligent Support for Engaged E-Learning. in Electronics
Basel : MDPI., 10(12), 1370.
https://doi.org/10.3390/electronics10121370
Vuković I, Kuk K, Čisar P, Banđur M, Banđur Đ, Milić N, Popović B. Multi-Agent System Observer: Intelligent Support for Engaged E-Learning. in Electronics. 2021;10(12):1370.
doi:10.3390/electronics10121370 .
Vuković, Igor, Kuk, Kristijan, Čisar, Petar, Banđur, Miloš, Banđur, Đoko, Milić, Nenad, Popović, Brankica, "Multi-Agent System Observer: Intelligent Support for Engaged E-Learning" in Electronics, 10, no. 12 (2021):1370,
https://doi.org/10.3390/electronics10121370 . .
4

Influence of Image Enhancement Techniques on Effectiveness of Unconstrained Face Detection and Identification

Vuković, Igor; Čisar, Petar; Kuk, Kristijan; Banđur, Miloš; Popović, Brankica

(Kaunas : Kauno Technologijos Universitetas, 2021)

TY  - JOUR
AU  - Vuković, Igor
AU  - Čisar, Petar
AU  - Kuk, Kristijan
AU  - Banđur, Miloš
AU  - Popović, Brankica
PY  - 2021
UR  - http://jakov.kpu.edu.rs/handle/123456789/1522
AB  - In a criminal investigation, along with processing forensic evidence, different investigative techniques are used to identify the perpetrator of the crime. It includes collecting and analyzing unconstrained face images, mostly with low resolution and various qualities, making identification difficult. Since police organizations have limited resources, in this paper, we propose a novel method that utilizes off-the-shelf solutions (Dlib library Histogram of Oriented Gradients-HOG face detectors and the ResNet faces feature vector extractor) to provide practical assistance in unconstrained face identification. Our experiment aimed to establish which one (if any) of the basic image enhancement techniques should be applied to increase the effectiveness. Results obtained from three publicly available databases and one created for this research (simulating police investigators’ database) showed that resizing the image (especially with a resolution lower than 150 pixels) should always precede enhancement to improve face detection accuracy. The best results in determining whether they are the same or different persons in images were obtained by applying sharpening with a high-pass filter, whereas normalization gives the highest classification scores when a single weight value is applied to data from all four databases.
PB  - Kaunas : Kauno Technologijos Universitetas
T2  - Elektronika Ir Elektrotechnika
T1  - Influence of Image Enhancement Techniques on Effectiveness of Unconstrained Face Detection and Identification
VL  - 27
IS  - 5
SP  - 49
EP  - 58
DO  - 10.5755/j02.eie.29081
ER  - 
@article{
author = "Vuković, Igor and Čisar, Petar and Kuk, Kristijan and Banđur, Miloš and Popović, Brankica",
year = "2021",
abstract = "In a criminal investigation, along with processing forensic evidence, different investigative techniques are used to identify the perpetrator of the crime. It includes collecting and analyzing unconstrained face images, mostly with low resolution and various qualities, making identification difficult. Since police organizations have limited resources, in this paper, we propose a novel method that utilizes off-the-shelf solutions (Dlib library Histogram of Oriented Gradients-HOG face detectors and the ResNet faces feature vector extractor) to provide practical assistance in unconstrained face identification. Our experiment aimed to establish which one (if any) of the basic image enhancement techniques should be applied to increase the effectiveness. Results obtained from three publicly available databases and one created for this research (simulating police investigators’ database) showed that resizing the image (especially with a resolution lower than 150 pixels) should always precede enhancement to improve face detection accuracy. The best results in determining whether they are the same or different persons in images were obtained by applying sharpening with a high-pass filter, whereas normalization gives the highest classification scores when a single weight value is applied to data from all four databases.",
publisher = "Kaunas : Kauno Technologijos Universitetas",
journal = "Elektronika Ir Elektrotechnika",
title = "Influence of Image Enhancement Techniques on Effectiveness of Unconstrained Face Detection and Identification",
volume = "27",
number = "5",
pages = "49-58",
doi = "10.5755/j02.eie.29081"
}
Vuković, I., Čisar, P., Kuk, K., Banđur, M.,& Popović, B.. (2021). Influence of Image Enhancement Techniques on Effectiveness of Unconstrained Face Detection and Identification. in Elektronika Ir Elektrotechnika
Kaunas : Kauno Technologijos Universitetas., 27(5), 49-58.
https://doi.org/10.5755/j02.eie.29081
Vuković I, Čisar P, Kuk K, Banđur M, Popović B. Influence of Image Enhancement Techniques on Effectiveness of Unconstrained Face Detection and Identification. in Elektronika Ir Elektrotechnika. 2021;27(5):49-58.
doi:10.5755/j02.eie.29081 .
Vuković, Igor, Čisar, Petar, Kuk, Kristijan, Banđur, Miloš, Popović, Brankica, "Influence of Image Enhancement Techniques on Effectiveness of Unconstrained Face Detection and Identification" in Elektronika Ir Elektrotechnika, 27, no. 5 (2021):49-58,
https://doi.org/10.5755/j02.eie.29081 . .
5

Challenges of contemporary predictive policing

Vuković, Igor; Čisar, Petar; Kuk, Kristijan; Popović, Brankica

(Belgrade : University of Criminal Investigation and Police Studies, 2021)

TY  - CONF
AU  - Vuković, Igor
AU  - Čisar, Petar
AU  - Kuk, Kristijan
AU  - Popović, Brankica
PY  - 2021
UR  - http://eskup.kpu.edu.rs/dar/issue/view/6/4
UR  - http://jakov.kpu.edu.rs/handle/123456789/1290
AB  - Big data algorithms developed for predictive policing are increasingly present in the everyday work of law enforcement. There are various applications of such technologies to pre-dict crimes, potential crime scenes, profiles of perpetrators, and more. In this way, police officers are  provided  with  appropriate  assistance  in  their  work,  increasing  their  efficiency  or  entirely  replacing them in specific tasks. Although technologically advanced, police use force and arrest, so  prediction  algorithms  can  have  significantly  different,  more  drastic  consequences  as  com-pared to those that similar technologies would produce in agriculture, industry, or health. For further development of predictive policing, it is necessary to have a clear picture of the problems it can cause. This paper discusses modern predictive policing from the perspective of challenges that negatively affect its application.
PB  - Belgrade : University of Criminal Investigation and Police Studies
C3  - Thematic conference proceedings of international significance [Elektronski izvor] / International Scientific Conference "Archibald Reiss Days", Belgrade, 9-10 November 2021
T1  - Challenges of contemporary predictive policing
SP  - 513
EP  - 526
UR  - https://hdl.handle.net/21.15107/rcub_jakov_1290
ER  - 
@conference{
author = "Vuković, Igor and Čisar, Petar and Kuk, Kristijan and Popović, Brankica",
year = "2021",
abstract = "Big data algorithms developed for predictive policing are increasingly present in the everyday work of law enforcement. There are various applications of such technologies to pre-dict crimes, potential crime scenes, profiles of perpetrators, and more. In this way, police officers are  provided  with  appropriate  assistance  in  their  work,  increasing  their  efficiency  or  entirely  replacing them in specific tasks. Although technologically advanced, police use force and arrest, so  prediction  algorithms  can  have  significantly  different,  more  drastic  consequences  as  com-pared to those that similar technologies would produce in agriculture, industry, or health. For further development of predictive policing, it is necessary to have a clear picture of the problems it can cause. This paper discusses modern predictive policing from the perspective of challenges that negatively affect its application.",
publisher = "Belgrade : University of Criminal Investigation and Police Studies",
journal = "Thematic conference proceedings of international significance [Elektronski izvor] / International Scientific Conference "Archibald Reiss Days", Belgrade, 9-10 November 2021",
title = "Challenges of contemporary predictive policing",
pages = "513-526",
url = "https://hdl.handle.net/21.15107/rcub_jakov_1290"
}
Vuković, I., Čisar, P., Kuk, K.,& Popović, B.. (2021). Challenges of contemporary predictive policing. in Thematic conference proceedings of international significance [Elektronski izvor] / International Scientific Conference "Archibald Reiss Days", Belgrade, 9-10 November 2021
Belgrade : University of Criminal Investigation and Police Studies., 513-526.
https://hdl.handle.net/21.15107/rcub_jakov_1290
Vuković I, Čisar P, Kuk K, Popović B. Challenges of contemporary predictive policing. in Thematic conference proceedings of international significance [Elektronski izvor] / International Scientific Conference "Archibald Reiss Days", Belgrade, 9-10 November 2021. 2021;:513-526.
https://hdl.handle.net/21.15107/rcub_jakov_1290 .
Vuković, Igor, Čisar, Petar, Kuk, Kristijan, Popović, Brankica, "Challenges of contemporary predictive policing" in Thematic conference proceedings of international significance [Elektronski izvor] / International Scientific Conference "Archibald Reiss Days", Belgrade, 9-10 November 2021 (2021):513-526,
https://hdl.handle.net/21.15107/rcub_jakov_1290 .

Empirical Analysis of Silent Mining Operation in the Monero System

Purkovic, Safet; Mekic, Edis; Kuk, Kristijan; Gostimirovic, Ladin

(Bucharest : ICI Bucharest, 2021)

TY  - JOUR
AU  - Purkovic, Safet
AU  - Mekic, Edis
AU  - Kuk, Kristijan
AU  - Gostimirovic, Ladin
PY  - 2021
UR  - http://jakov.kpu.edu.rs/handle/123456789/1532
AB  - This paper analyses three important issues regarding Blockchain systems. The first one is related to the existence, success and mitigation of silent mining activity achieved through the development of Application-specific Integrated Circuits (ASICs). The second one lies in the mathematical modelling of Blockchain systems affected by ASIC mining machines and in the mathematical modelling of Blockchain with suppressed ASICs. Finally, this paper presents the economic parameters related to the rate of Return on Investment (ROI) and the possibility of calculating them based on the obtained results. Three different Blockchain systems were analysed, two of which allow the usage of ASIC machines, while one of them by definition does not support this type of mining activity. The analysis showed that the systems which involve ASIC machines can be described by means of linear regression models, while suppressing ASICs mining would provide a different statistical model. Successful mitigation activities can provide reliable data for the calculation of the economic parameters related to the rate of Return on Investment (ROI) based on silent mining.
PB  - Bucharest : ICI Bucharest
T2  - Studies in Informatics and Control
T1  - Empirical Analysis of Silent Mining Operation in the Monero System
VL  - 30
IS  - 4
SP  - 99
EP  - 108
DO  - 10.24846/v30i4y202109
ER  - 
@article{
author = "Purkovic, Safet and Mekic, Edis and Kuk, Kristijan and Gostimirovic, Ladin",
year = "2021",
abstract = "This paper analyses three important issues regarding Blockchain systems. The first one is related to the existence, success and mitigation of silent mining activity achieved through the development of Application-specific Integrated Circuits (ASICs). The second one lies in the mathematical modelling of Blockchain systems affected by ASIC mining machines and in the mathematical modelling of Blockchain with suppressed ASICs. Finally, this paper presents the economic parameters related to the rate of Return on Investment (ROI) and the possibility of calculating them based on the obtained results. Three different Blockchain systems were analysed, two of which allow the usage of ASIC machines, while one of them by definition does not support this type of mining activity. The analysis showed that the systems which involve ASIC machines can be described by means of linear regression models, while suppressing ASICs mining would provide a different statistical model. Successful mitigation activities can provide reliable data for the calculation of the economic parameters related to the rate of Return on Investment (ROI) based on silent mining.",
publisher = "Bucharest : ICI Bucharest",
journal = "Studies in Informatics and Control",
title = "Empirical Analysis of Silent Mining Operation in the Monero System",
volume = "30",
number = "4",
pages = "99-108",
doi = "10.24846/v30i4y202109"
}
Purkovic, S., Mekic, E., Kuk, K.,& Gostimirovic, L.. (2021). Empirical Analysis of Silent Mining Operation in the Monero System. in Studies in Informatics and Control
Bucharest : ICI Bucharest., 30(4), 99-108.
https://doi.org/10.24846/v30i4y202109
Purkovic S, Mekic E, Kuk K, Gostimirovic L. Empirical Analysis of Silent Mining Operation in the Monero System. in Studies in Informatics and Control. 2021;30(4):99-108.
doi:10.24846/v30i4y202109 .
Purkovic, Safet, Mekic, Edis, Kuk, Kristijan, Gostimirovic, Ladin, "Empirical Analysis of Silent Mining Operation in the Monero System" in Studies in Informatics and Control, 30, no. 4 (2021):99-108,
https://doi.org/10.24846/v30i4y202109 . .

Production of linked government datasets using enhanced LIRE architecture

Veljković, Nataša; Milić, Petar; Stoimenov, Leonid; Kuk, Kristijan

(Novi Sad : ComSIS Consortium, 2020)

TY  - JOUR
AU  - Veljković, Nataša
AU  - Milić, Petar
AU  - Stoimenov, Leonid
AU  - Kuk, Kristijan
PY  - 2020
UR  - http://jakov.kpu.edu.rs/handle/123456789/1533
AB  - This paper describes the enhanced LIRE (LInked RElations) architecture for creating relations between datasets available on open government portals. The architecture is improved to be applicable on different open government data platforms using minimal configuration at the Data processing layer. We evaluated the applicability of enhanced LIRE, its advantages and disadvantages, which resulted in necessary recommendations for the publication of dataset’s metadata to obtain better associations between datasets. Moreover, we introduced a LINDAT indicator that reflects the percentage of linked data in the total possible number of linked data on open government data portals.
PB  - Novi Sad : ComSIS Consortium
T2  - Computer Science and Information Systems
T1  - Production of linked government datasets using enhanced LIRE architecture
VL  - 17
IS  - 2
SP  - 599
EP  - 617
DO  - 10.2298/CSIS190420001M
ER  - 
@article{
author = "Veljković, Nataša and Milić, Petar and Stoimenov, Leonid and Kuk, Kristijan",
year = "2020",
abstract = "This paper describes the enhanced LIRE (LInked RElations) architecture for creating relations between datasets available on open government portals. The architecture is improved to be applicable on different open government data platforms using minimal configuration at the Data processing layer. We evaluated the applicability of enhanced LIRE, its advantages and disadvantages, which resulted in necessary recommendations for the publication of dataset’s metadata to obtain better associations between datasets. Moreover, we introduced a LINDAT indicator that reflects the percentage of linked data in the total possible number of linked data on open government data portals.",
publisher = "Novi Sad : ComSIS Consortium",
journal = "Computer Science and Information Systems",
title = "Production of linked government datasets using enhanced LIRE architecture",
volume = "17",
number = "2",
pages = "599-617",
doi = "10.2298/CSIS190420001M"
}
Veljković, N., Milić, P., Stoimenov, L.,& Kuk, K.. (2020). Production of linked government datasets using enhanced LIRE architecture. in Computer Science and Information Systems
Novi Sad : ComSIS Consortium., 17(2), 599-617.
https://doi.org/10.2298/CSIS190420001M
Veljković N, Milić P, Stoimenov L, Kuk K. Production of linked government datasets using enhanced LIRE architecture. in Computer Science and Information Systems. 2020;17(2):599-617.
doi:10.2298/CSIS190420001M .
Veljković, Nataša, Milić, Petar, Stoimenov, Leonid, Kuk, Kristijan, "Production of linked government datasets using enhanced LIRE architecture" in Computer Science and Information Systems, 17, no. 2 (2020):599-617,
https://doi.org/10.2298/CSIS190420001M . .
3

Protection of user credentials in web application

Kartunov, Stefan; Milić, Petar; Kuk, Kristijan; Dinić, Uroš

(Belgrade : University of Criminal Investigation and Police Studies, 2020)

TY  - CONF
AU  - Kartunov, Stefan
AU  - Milić, Petar
AU  - Kuk, Kristijan
AU  - Dinić, Uroš
PY  - 2020
UR  - http://jakov.kpu.edu.rs/handle/123456789/1334
AB  - Protecting user data in web applications is a challenge that developers face. Enabling secure user login and overcoming vulnerabilities without exposing sensitive data to attackers, is based on the application of modern methods and techniques for protection. This paper first reviews the current situation in this area with an emphasis on important security features. Then, the available systems are evaluated and the obtained results are quantified, from where their advantages and disadvantages can be seen. Another goal of the paper is a deeper insight into the field of user data security. Special attention is given to the importance of password protection for access in web applications.
PB  - Belgrade : University of Criminal Investigation and Police Studies
C3  - Thematic conference proceedings of international significance [Elektronski izvor] / International Scientific Conference "Archibald Reiss Days", Belgrade, 18-19 November 2020.
T1  - Protection of user credentials in web application
SP  - 603
EP  - 610
UR  - https://hdl.handle.net/21.15107/rcub_jakov_1334
ER  - 
@conference{
author = "Kartunov, Stefan and Milić, Petar and Kuk, Kristijan and Dinić, Uroš",
year = "2020",
abstract = "Protecting user data in web applications is a challenge that developers face. Enabling secure user login and overcoming vulnerabilities without exposing sensitive data to attackers, is based on the application of modern methods and techniques for protection. This paper first reviews the current situation in this area with an emphasis on important security features. Then, the available systems are evaluated and the obtained results are quantified, from where their advantages and disadvantages can be seen. Another goal of the paper is a deeper insight into the field of user data security. Special attention is given to the importance of password protection for access in web applications.",
publisher = "Belgrade : University of Criminal Investigation and Police Studies",
journal = "Thematic conference proceedings of international significance [Elektronski izvor] / International Scientific Conference "Archibald Reiss Days", Belgrade, 18-19 November 2020.",
title = "Protection of user credentials in web application",
pages = "603-610",
url = "https://hdl.handle.net/21.15107/rcub_jakov_1334"
}
Kartunov, S., Milić, P., Kuk, K.,& Dinić, U.. (2020). Protection of user credentials in web application. in Thematic conference proceedings of international significance [Elektronski izvor] / International Scientific Conference "Archibald Reiss Days", Belgrade, 18-19 November 2020.
Belgrade : University of Criminal Investigation and Police Studies., 603-610.
https://hdl.handle.net/21.15107/rcub_jakov_1334
Kartunov S, Milić P, Kuk K, Dinić U. Protection of user credentials in web application. in Thematic conference proceedings of international significance [Elektronski izvor] / International Scientific Conference "Archibald Reiss Days", Belgrade, 18-19 November 2020.. 2020;:603-610.
https://hdl.handle.net/21.15107/rcub_jakov_1334 .
Kartunov, Stefan, Milić, Petar, Kuk, Kristijan, Dinić, Uroš, "Protection of user credentials in web application" in Thematic conference proceedings of international significance [Elektronski izvor] / International Scientific Conference "Archibald Reiss Days", Belgrade, 18-19 November 2020. (2020):603-610,
https://hdl.handle.net/21.15107/rcub_jakov_1334 .

Implementation of an electronic service “e-Criminal record” on portal e-Administration

Ilijazi, Venezija; Popović, Brankica; Kuk, Kristijan; Milić, Petar

(Belgrade : University of Criminal Investigation and Police Studies, 2019)

TY  - CONF
AU  - Ilijazi, Venezija
AU  - Popović, Brankica
AU  - Kuk, Kristijan
AU  - Milić, Petar
PY  - 2019
UR  - http://jakov.kpu.edu.rs/handle/123456789/1364
AB  - In order to exchange information more efficiently and faster, transparency in the provision of public services and simpler communication between citizens and the public sector, Web services for obtaining data and information are increasingly being used, which provide easier exchange of
information in relation to traditional “paper” systems and therefore significantly accelerate the process and save the time of citizens and legal entities.
Bearing in mind the public administration reform in the Republic of Serbia, which is primarily reflected in the utilization of the potentials offered by modern information communication technologies, benefits for citizens,business and the public sector, the Ministry of Internal Affairs (MUP) strives to digitize its administrative processes to contribute to these aspirations. In this paper a new web service “eCriminal record” was presented for obtaining data on punishment and impunity for the needs of State authorities, enterprises, other organizations or entrepreneurs, along with a reasoned request
and justified interest based on the law.
PB  - Belgrade : University of Criminal Investigation and Police Studies
C3  - Thematic conference proceedings of international significance. Vol. 2 / International scientific conference "Archibald Reiss Days", Belgrade, 6-7 November 2019.
T1  - Implementation of an electronic service “e-Criminal record” on portal e-Administration
SP  - 321
EP  - 335
UR  - https://hdl.handle.net/21.15107/rcub_jakov_1364
ER  - 
@conference{
author = "Ilijazi, Venezija and Popović, Brankica and Kuk, Kristijan and Milić, Petar",
year = "2019",
abstract = "In order to exchange information more efficiently and faster, transparency in the provision of public services and simpler communication between citizens and the public sector, Web services for obtaining data and information are increasingly being used, which provide easier exchange of
information in relation to traditional “paper” systems and therefore significantly accelerate the process and save the time of citizens and legal entities.
Bearing in mind the public administration reform in the Republic of Serbia, which is primarily reflected in the utilization of the potentials offered by modern information communication technologies, benefits for citizens,business and the public sector, the Ministry of Internal Affairs (MUP) strives to digitize its administrative processes to contribute to these aspirations. In this paper a new web service “eCriminal record” was presented for obtaining data on punishment and impunity for the needs of State authorities, enterprises, other organizations or entrepreneurs, along with a reasoned request
and justified interest based on the law.",
publisher = "Belgrade : University of Criminal Investigation and Police Studies",
journal = "Thematic conference proceedings of international significance. Vol. 2 / International scientific conference "Archibald Reiss Days", Belgrade, 6-7 November 2019.",
title = "Implementation of an electronic service “e-Criminal record” on portal e-Administration",
pages = "321-335",
url = "https://hdl.handle.net/21.15107/rcub_jakov_1364"
}
Ilijazi, V., Popović, B., Kuk, K.,& Milić, P.. (2019). Implementation of an electronic service “e-Criminal record” on portal e-Administration. in Thematic conference proceedings of international significance. Vol. 2 / International scientific conference "Archibald Reiss Days", Belgrade, 6-7 November 2019.
Belgrade : University of Criminal Investigation and Police Studies., 321-335.
https://hdl.handle.net/21.15107/rcub_jakov_1364
Ilijazi V, Popović B, Kuk K, Milić P. Implementation of an electronic service “e-Criminal record” on portal e-Administration. in Thematic conference proceedings of international significance. Vol. 2 / International scientific conference "Archibald Reiss Days", Belgrade, 6-7 November 2019.. 2019;:321-335.
https://hdl.handle.net/21.15107/rcub_jakov_1364 .
Ilijazi, Venezija, Popović, Brankica, Kuk, Kristijan, Milić, Petar, "Implementation of an electronic service “e-Criminal record” on portal e-Administration" in Thematic conference proceedings of international significance. Vol. 2 / International scientific conference "Archibald Reiss Days", Belgrade, 6-7 November 2019. (2019):321-335,
https://hdl.handle.net/21.15107/rcub_jakov_1364 .

Noise-indicator nonnegative integer-valued autoregressive time series of the first order

Stojanović, Vladica; Ranđelović, Dragan; Kuk, Kristijan

(Brazilian Statistical Association, Sao Paulo, 2018)

TY  - JOUR
AU  - Stojanović, Vladica
AU  - Ranđelović, Dragan
AU  - Kuk, Kristijan
PY  - 2018
UR  - http://jakov.kpu.edu.rs/handle/123456789/846
AB  - This paper presents a modification and, at the same time, a generalization of the linear first order nonnegative integer-valued autoregressive processes, well-known as INAR(1) processes. By using the so-called Noise-Indicator, a nonlinear model with the threshold regime and with more complex structure than the appropriate linear models was obtained. The new model, named NIINAR(1) process, has been investigated in terms of the most general, the power series distribution of its innovations. Basic stochastic properties of the NIINAR(1) model (e.g., correlation structure, over-dispersion conditions and distributional properties) are given. Also, besides of some standard parameters estimators, a novel estimation techniques, together with the asymptotic properties of the obtained estimates is described. At last, a Monte Carlo study of this process is also given, as well as its application in the analysis of dynamics of two empirical dataset.
PB  - Brazilian Statistical Association, Sao Paulo
T2  - Brazilian journal of probability and statistics
T1  - Noise-indicator nonnegative integer-valued autoregressive time series of the first order
VL  - 32
IS  - 1
SP  - 147
EP  - 171
DO  - 10.1214/16-BJPS335
ER  - 
@article{
author = "Stojanović, Vladica and Ranđelović, Dragan and Kuk, Kristijan",
year = "2018",
abstract = "This paper presents a modification and, at the same time, a generalization of the linear first order nonnegative integer-valued autoregressive processes, well-known as INAR(1) processes. By using the so-called Noise-Indicator, a nonlinear model with the threshold regime and with more complex structure than the appropriate linear models was obtained. The new model, named NIINAR(1) process, has been investigated in terms of the most general, the power series distribution of its innovations. Basic stochastic properties of the NIINAR(1) model (e.g., correlation structure, over-dispersion conditions and distributional properties) are given. Also, besides of some standard parameters estimators, a novel estimation techniques, together with the asymptotic properties of the obtained estimates is described. At last, a Monte Carlo study of this process is also given, as well as its application in the analysis of dynamics of two empirical dataset.",
publisher = "Brazilian Statistical Association, Sao Paulo",
journal = "Brazilian journal of probability and statistics",
title = "Noise-indicator nonnegative integer-valued autoregressive time series of the first order",
volume = "32",
number = "1",
pages = "147-171",
doi = "10.1214/16-BJPS335"
}
Stojanović, V., Ranđelović, D.,& Kuk, K.. (2018). Noise-indicator nonnegative integer-valued autoregressive time series of the first order. in Brazilian journal of probability and statistics
Brazilian Statistical Association, Sao Paulo., 32(1), 147-171.
https://doi.org/10.1214/16-BJPS335
Stojanović V, Ranđelović D, Kuk K. Noise-indicator nonnegative integer-valued autoregressive time series of the first order. in Brazilian journal of probability and statistics. 2018;32(1):147-171.
doi:10.1214/16-BJPS335 .
Stojanović, Vladica, Ranđelović, Dragan, Kuk, Kristijan, "Noise-indicator nonnegative integer-valued autoregressive time series of the first order" in Brazilian journal of probability and statistics, 32, no. 1 (2018):147-171,
https://doi.org/10.1214/16-BJPS335 . .
3
2
4

Comprehensive forensic examination with Belkasoft evidence center

Popović, Brankica; Kuk, Kristijan; Kovačević, Ana

(Belgrade : Academy of Criminalistic and Police Studies, 2018)

TY  - CONF
AU  - Popović, Brankica
AU  - Kuk, Kristijan
AU  - Kovačević, Ana
PY  - 2018
UR  - http://jakov.kpu.edu.rs/handle/123456789/921
AB  - The enhancement and proliferation of information and communication technology (ICT) has tackled every aspect of human activity: work, leisure, sport, communication, medicine, etc. All around us we can see mobile phones and other connected devices that are now ubiquitous, changing trends in consumer behaviour. Therefore, there is no surprise in fact that such technologies can play a significant role in committing or assisting a crime, since data held on digital devices can give a detailed insight into people’s lives, communications, contacts, friends, family and acquaintances. In order to help law enforcement investigation of such crimes, digital forensic is performed with the aim of collecting crime-related evidence from various digital media and analyse it. Investigators use various forensic techniques to search hidden folders, retrieve deleted data, decrypt the data or restore damaged files, etc. Obtaining evidence such as location data, photos, messages or internet searches can be beneficial, if not crucial, in assisting the police with criminal investigations. Since advances in technologies have led to an increase in the volume, variety, velocity, and veracity of data available for digital forensic analysis, without efficient techniques and tools such investigation would require a tremendous amount of effort and time. That is the reason for expansion in the market of digital forensic tools, both proprietary and free for use, that are available today. In this paper an insight of digital forensic process is given, emphasizing the role of digital forensic tools in providing digital evidence. The possibility of one particular tool, Belkasoft Evidence Center – BEC, in acquisition and analysis of digital evidence was briefly described.
PB  - Belgrade : Academy of Criminalistic and Police Studies
C3  - International Scientific Conference "Archibald Reiss Days", Belgrade, 2-3 October 2018. Vol. 2
T1  - Comprehensive forensic examination with Belkasoft evidence center
SP  - 419
EP  - 433
UR  - https://hdl.handle.net/21.15107/rcub_jakov_921
ER  - 
@conference{
author = "Popović, Brankica and Kuk, Kristijan and Kovačević, Ana",
year = "2018",
abstract = "The enhancement and proliferation of information and communication technology (ICT) has tackled every aspect of human activity: work, leisure, sport, communication, medicine, etc. All around us we can see mobile phones and other connected devices that are now ubiquitous, changing trends in consumer behaviour. Therefore, there is no surprise in fact that such technologies can play a significant role in committing or assisting a crime, since data held on digital devices can give a detailed insight into people’s lives, communications, contacts, friends, family and acquaintances. In order to help law enforcement investigation of such crimes, digital forensic is performed with the aim of collecting crime-related evidence from various digital media and analyse it. Investigators use various forensic techniques to search hidden folders, retrieve deleted data, decrypt the data or restore damaged files, etc. Obtaining evidence such as location data, photos, messages or internet searches can be beneficial, if not crucial, in assisting the police with criminal investigations. Since advances in technologies have led to an increase in the volume, variety, velocity, and veracity of data available for digital forensic analysis, without efficient techniques and tools such investigation would require a tremendous amount of effort and time. That is the reason for expansion in the market of digital forensic tools, both proprietary and free for use, that are available today. In this paper an insight of digital forensic process is given, emphasizing the role of digital forensic tools in providing digital evidence. The possibility of one particular tool, Belkasoft Evidence Center – BEC, in acquisition and analysis of digital evidence was briefly described.",
publisher = "Belgrade : Academy of Criminalistic and Police Studies",
journal = "International Scientific Conference "Archibald Reiss Days", Belgrade, 2-3 October 2018. Vol. 2",
title = "Comprehensive forensic examination with Belkasoft evidence center",
pages = "419-433",
url = "https://hdl.handle.net/21.15107/rcub_jakov_921"
}
Popović, B., Kuk, K.,& Kovačević, A.. (2018). Comprehensive forensic examination with Belkasoft evidence center. in International Scientific Conference "Archibald Reiss Days", Belgrade, 2-3 October 2018. Vol. 2
Belgrade : Academy of Criminalistic and Police Studies., 419-433.
https://hdl.handle.net/21.15107/rcub_jakov_921
Popović B, Kuk K, Kovačević A. Comprehensive forensic examination with Belkasoft evidence center. in International Scientific Conference "Archibald Reiss Days", Belgrade, 2-3 October 2018. Vol. 2. 2018;:419-433.
https://hdl.handle.net/21.15107/rcub_jakov_921 .
Popović, Brankica, Kuk, Kristijan, Kovačević, Ana, "Comprehensive forensic examination with Belkasoft evidence center" in International Scientific Conference "Archibald Reiss Days", Belgrade, 2-3 October 2018. Vol. 2 (2018):419-433,
https://hdl.handle.net/21.15107/rcub_jakov_921 .

An Approach to Determining the Importance of Model Criteria in Certifying a City as Business-Friendly

Ranđelović, Milan; Stanković, Jelena; Kuk, Kristijan; Savić, Gordana; Ranđelović, Dragan

(Informs, Catonsville, 2018)

TY  - JOUR
AU  - Ranđelović, Milan
AU  - Stanković, Jelena
AU  - Kuk, Kristijan
AU  - Savić, Gordana
AU  - Ranđelović, Dragan
PY  - 2018
UR  - http://jakov.kpu.edu.rs/handle/123456789/845
AB  - One of the key problems in the application of multicriteria analysis methods is identifying the importance of the model criteria. The relevance and validity of the decisions are directly conditioned by the relevance of a given set of criteria used for evaluating alternatives, and the correct determination of the weights of these criteria. Several methodologies have been developed to calculate the importance of each criterion for a given problem. All methodologies are classified into two main groups: subjective and objective. In this paper, we present a new procedure to integrate two recognized methods for determining the weights of factors-the analytic hierarchy method as a subjective method and entropy as an objective method. We apply our methodology to a contemporary local economic problem in Serbia-the process of certifying cities and municipalities as favorable to business. We also discuss its implementation in a software tool on a local government website.
PB  - Informs, Catonsville
T2  - Interfaces
T1  - An Approach to Determining the Importance of Model Criteria in Certifying a City as Business-Friendly
VL  - 48
IS  - 2
SP  - 156
EP  - 165
DO  - 10.1287/inte.2017.0923
ER  - 
@article{
author = "Ranđelović, Milan and Stanković, Jelena and Kuk, Kristijan and Savić, Gordana and Ranđelović, Dragan",
year = "2018",
abstract = "One of the key problems in the application of multicriteria analysis methods is identifying the importance of the model criteria. The relevance and validity of the decisions are directly conditioned by the relevance of a given set of criteria used for evaluating alternatives, and the correct determination of the weights of these criteria. Several methodologies have been developed to calculate the importance of each criterion for a given problem. All methodologies are classified into two main groups: subjective and objective. In this paper, we present a new procedure to integrate two recognized methods for determining the weights of factors-the analytic hierarchy method as a subjective method and entropy as an objective method. We apply our methodology to a contemporary local economic problem in Serbia-the process of certifying cities and municipalities as favorable to business. We also discuss its implementation in a software tool on a local government website.",
publisher = "Informs, Catonsville",
journal = "Interfaces",
title = "An Approach to Determining the Importance of Model Criteria in Certifying a City as Business-Friendly",
volume = "48",
number = "2",
pages = "156-165",
doi = "10.1287/inte.2017.0923"
}
Ranđelović, M., Stanković, J., Kuk, K., Savić, G.,& Ranđelović, D.. (2018). An Approach to Determining the Importance of Model Criteria in Certifying a City as Business-Friendly. in Interfaces
Informs, Catonsville., 48(2), 156-165.
https://doi.org/10.1287/inte.2017.0923
Ranđelović M, Stanković J, Kuk K, Savić G, Ranđelović D. An Approach to Determining the Importance of Model Criteria in Certifying a City as Business-Friendly. in Interfaces. 2018;48(2):156-165.
doi:10.1287/inte.2017.0923 .
Ranđelović, Milan, Stanković, Jelena, Kuk, Kristijan, Savić, Gordana, Ranđelović, Dragan, "An Approach to Determining the Importance of Model Criteria in Certifying a City as Business-Friendly" in Interfaces, 48, no. 2 (2018):156-165,
https://doi.org/10.1287/inte.2017.0923 . .
6
4
6

Intelligent e-service for detecting malicious code based agent technology

Kuk, Kristijan; Stanojević, A.; Nedeljković, S.; Jovanović, M.

(2018)

TY  - CONF
AU  - Kuk, Kristijan
AU  - Stanojević, A.
AU  - Nedeljković, S.
AU  - Jovanović, M.
PY  - 2018
UR  - http://jakov.kpu.edu.rs/handle/123456789/838
AB  - Implementation of new ICT technologies aims at improving government services all over the world. The main agent technology in ICT technology based artificial intelligence in the proposed e-service is that it recognizes a cyber-attack after the state has completed the e-form on the website approved by any citizen and sends out the obtained results of the computer scan. Intelligent e-service decides whether to post the threat to a computer emergency response team of the Ministry of Interior or reject it after the final danger parameters have been obtained. This 1paper presents possible support decision system in the process that detects malicious code.
C3  - ACM International Conference Proceeding Series
T1  - Intelligent e-service for detecting malicious code based agent technology
DO  - 10.1145/3227609.3227684
ER  - 
@conference{
author = "Kuk, Kristijan and Stanojević, A. and Nedeljković, S. and Jovanović, M.",
year = "2018",
abstract = "Implementation of new ICT technologies aims at improving government services all over the world. The main agent technology in ICT technology based artificial intelligence in the proposed e-service is that it recognizes a cyber-attack after the state has completed the e-form on the website approved by any citizen and sends out the obtained results of the computer scan. Intelligent e-service decides whether to post the threat to a computer emergency response team of the Ministry of Interior or reject it after the final danger parameters have been obtained. This 1paper presents possible support decision system in the process that detects malicious code.",
journal = "ACM International Conference Proceeding Series",
title = "Intelligent e-service for detecting malicious code based agent technology",
doi = "10.1145/3227609.3227684"
}
Kuk, K., Stanojević, A., Nedeljković, S.,& Jovanović, M.. (2018). Intelligent e-service for detecting malicious code based agent technology. in ACM International Conference Proceeding Series.
https://doi.org/10.1145/3227609.3227684
Kuk K, Stanojević A, Nedeljković S, Jovanović M. Intelligent e-service for detecting malicious code based agent technology. in ACM International Conference Proceeding Series. 2018;.
doi:10.1145/3227609.3227684 .
Kuk, Kristijan, Stanojević, A., Nedeljković, S., Jovanović, M., "Intelligent e-service for detecting malicious code based agent technology" in ACM International Conference Proceeding Series (2018),
https://doi.org/10.1145/3227609.3227684 . .
1

The Design of the Personal Enemy - MIMLeBot as an Intelligent Agent in a Game-based Learning Environment

Kuk, Kristijan; Milentijević, Ivan Z.; Ranđelović, Dragan; Popović, Brankica; Čisar, Petar

(Budapest Tech, Budapest, 2017)

TY  - JOUR
AU  - Kuk, Kristijan
AU  - Milentijević, Ivan Z.
AU  - Ranđelović, Dragan
AU  - Popović, Brankica
AU  - Čisar, Petar
PY  - 2017
UR  - http://jakov.kpu.edu.rs/handle/123456789/756
AB  - A bot is one of the main elements of all computer video games, frequently used for the creation of various opponent characters within a game. Opponent modeling is the problem of predicting the agent actions in a gaming environment. This paper proposes and describes the implementation of a bot as a personal opponent in a small educational game. In order to increase the efficiency when using such a small educational application/module, artificial intelligence was added in the form of a bot competing with the students. Pedagogical elements of the intelligent learning system are introduced through the pedagogical model and the student model. This paper demonstrates the use of the student model to present the player model built by the experience of a human teacher, with true/false questions incorporated with the bot strategy into the opponent model. The authors use the Monte Carlo approach in this implementation, known as artificial intelligence technique and a best-first search method used in most video games, but to the best of their knowledge, it has not been used for prediction in educational games based on bot strategy. The results highlight that the Monte Carlo approach presented via the BFTree classifier provides the best classification accuracy compared with other predictive models based on data mining classifiers. It was shown that the training data from the human player can help in creating a bot strategy for a personalized game-based learning system. The Help option can be used for the assessment of the students' current knowledge by counting the number of Help option accesses, the player relies on Help as a 'source of knowledge' needed to complete the game task successfully. The obtained results show that the bot (personal opponent) stimulated players to replay the game multiple times, which may contribute to the increase of the students' knowledge.
PB  - Budapest Tech, Budapest
T2  - Acta polytechnica hungarica
T1  - The Design of the Personal Enemy - MIMLeBot as an Intelligent Agent in a Game-based Learning Environment
VL  - 14
IS  - 4
SP  - 121
EP  - 139
DO  - 10.12700/APH.14.4.2017.4.7
ER  - 
@article{
author = "Kuk, Kristijan and Milentijević, Ivan Z. and Ranđelović, Dragan and Popović, Brankica and Čisar, Petar",
year = "2017",
abstract = "A bot is one of the main elements of all computer video games, frequently used for the creation of various opponent characters within a game. Opponent modeling is the problem of predicting the agent actions in a gaming environment. This paper proposes and describes the implementation of a bot as a personal opponent in a small educational game. In order to increase the efficiency when using such a small educational application/module, artificial intelligence was added in the form of a bot competing with the students. Pedagogical elements of the intelligent learning system are introduced through the pedagogical model and the student model. This paper demonstrates the use of the student model to present the player model built by the experience of a human teacher, with true/false questions incorporated with the bot strategy into the opponent model. The authors use the Monte Carlo approach in this implementation, known as artificial intelligence technique and a best-first search method used in most video games, but to the best of their knowledge, it has not been used for prediction in educational games based on bot strategy. The results highlight that the Monte Carlo approach presented via the BFTree classifier provides the best classification accuracy compared with other predictive models based on data mining classifiers. It was shown that the training data from the human player can help in creating a bot strategy for a personalized game-based learning system. The Help option can be used for the assessment of the students' current knowledge by counting the number of Help option accesses, the player relies on Help as a 'source of knowledge' needed to complete the game task successfully. The obtained results show that the bot (personal opponent) stimulated players to replay the game multiple times, which may contribute to the increase of the students' knowledge.",
publisher = "Budapest Tech, Budapest",
journal = "Acta polytechnica hungarica",
title = "The Design of the Personal Enemy - MIMLeBot as an Intelligent Agent in a Game-based Learning Environment",
volume = "14",
number = "4",
pages = "121-139",
doi = "10.12700/APH.14.4.2017.4.7"
}
Kuk, K., Milentijević, I. Z., Ranđelović, D., Popović, B.,& Čisar, P.. (2017). The Design of the Personal Enemy - MIMLeBot as an Intelligent Agent in a Game-based Learning Environment. in Acta polytechnica hungarica
Budapest Tech, Budapest., 14(4), 121-139.
https://doi.org/10.12700/APH.14.4.2017.4.7
Kuk K, Milentijević IZ, Ranđelović D, Popović B, Čisar P. The Design of the Personal Enemy - MIMLeBot as an Intelligent Agent in a Game-based Learning Environment. in Acta polytechnica hungarica. 2017;14(4):121-139.
doi:10.12700/APH.14.4.2017.4.7 .
Kuk, Kristijan, Milentijević, Ivan Z., Ranđelović, Dragan, Popović, Brankica, Čisar, Petar, "The Design of the Personal Enemy - MIMLeBot as an Intelligent Agent in a Game-based Learning Environment" in Acta polytechnica hungarica, 14, no. 4 (2017):121-139,
https://doi.org/10.12700/APH.14.4.2017.4.7 . .
4
2
5

Modelling the System of Receiving Quick Answers for e-Government Services: Study for the Crime Domain in the Republic of Serbia

Nikolić, Vojkan; Markoski, Branko; Kuk, Kristijan; Ranđelović, Dragan; Čisar, Petar

(Budapest Tech, Budapest, 2017)

TY  - JOUR
AU  - Nikolić, Vojkan
AU  - Markoski, Branko
AU  - Kuk, Kristijan
AU  - Ranđelović, Dragan
AU  - Čisar, Petar
PY  - 2017
UR  - http://jakov.kpu.edu.rs/handle/123456789/750
AB  - Today, e-Governments services operate quick answer systems in many different domains in order to help citizens receive answers to their questions at any time and within a very short time. The automatic mapping of relevant documents stands out as an important application for automatic questions-documents classification strategies. This paper presents a contribution to the identification concepts in text comprehension in unstructured documents as an important step towards clarifying the role of explicit concepts in information retrieval in general. The most common representational scheme in text categorization is the Bag of Words approach when the dictionary, as incorporating background knowledge, is large. The authors introduce a new approach to create conceptbased text representations, and apply it to a text categorization collection to create predefined classes in the case of short text document analysis problem. Further in this paper, a classification-based algorithm for questions matching topic modelling is presented. The paper also describes the weighting of concepts that present terms with high frequency of occurrence in questions is based on their similarity relevance in the predefined classes of documents. The results of the experiment within the criminal law domain in the present case study show that the performance of concept-based text representations has proven to be satisfactory in the case when there is no dictionary for this domain.
PB  - Budapest Tech, Budapest
T2  - Acta polytechnica hungarica
T1  - Modelling the System of Receiving Quick Answers for e-Government Services: Study for the Crime Domain in the Republic of Serbia
VL  - 14
IS  - 8
SP  - 143
EP  - 163
DO  - 10.12700/APH.14.8.2017.8.8
ER  - 
@article{
author = "Nikolić, Vojkan and Markoski, Branko and Kuk, Kristijan and Ranđelović, Dragan and Čisar, Petar",
year = "2017",
abstract = "Today, e-Governments services operate quick answer systems in many different domains in order to help citizens receive answers to their questions at any time and within a very short time. The automatic mapping of relevant documents stands out as an important application for automatic questions-documents classification strategies. This paper presents a contribution to the identification concepts in text comprehension in unstructured documents as an important step towards clarifying the role of explicit concepts in information retrieval in general. The most common representational scheme in text categorization is the Bag of Words approach when the dictionary, as incorporating background knowledge, is large. The authors introduce a new approach to create conceptbased text representations, and apply it to a text categorization collection to create predefined classes in the case of short text document analysis problem. Further in this paper, a classification-based algorithm for questions matching topic modelling is presented. The paper also describes the weighting of concepts that present terms with high frequency of occurrence in questions is based on their similarity relevance in the predefined classes of documents. The results of the experiment within the criminal law domain in the present case study show that the performance of concept-based text representations has proven to be satisfactory in the case when there is no dictionary for this domain.",
publisher = "Budapest Tech, Budapest",
journal = "Acta polytechnica hungarica",
title = "Modelling the System of Receiving Quick Answers for e-Government Services: Study for the Crime Domain in the Republic of Serbia",
volume = "14",
number = "8",
pages = "143-163",
doi = "10.12700/APH.14.8.2017.8.8"
}
Nikolić, V., Markoski, B., Kuk, K., Ranđelović, D.,& Čisar, P.. (2017). Modelling the System of Receiving Quick Answers for e-Government Services: Study for the Crime Domain in the Republic of Serbia. in Acta polytechnica hungarica
Budapest Tech, Budapest., 14(8), 143-163.
https://doi.org/10.12700/APH.14.8.2017.8.8
Nikolić V, Markoski B, Kuk K, Ranđelović D, Čisar P. Modelling the System of Receiving Quick Answers for e-Government Services: Study for the Crime Domain in the Republic of Serbia. in Acta polytechnica hungarica. 2017;14(8):143-163.
doi:10.12700/APH.14.8.2017.8.8 .
Nikolić, Vojkan, Markoski, Branko, Kuk, Kristijan, Ranđelović, Dragan, Čisar, Petar, "Modelling the System of Receiving Quick Answers for e-Government Services: Study for the Crime Domain in the Republic of Serbia" in Acta polytechnica hungarica, 14, no. 8 (2017):143-163,
https://doi.org/10.12700/APH.14.8.2017.8.8 . .
2
1
2

Knowledge discovery in cyberspace: Statistical analysis and predictive modeling

Kuk, Kristijan; Ranđelović, Dragan

(2017)

TY  - BOOK
AU  - Kuk, Kristijan
AU  - Ranđelović, Dragan
PY  - 2017
UR  - http://jakov.kpu.edu.rs/handle/123456789/784
AB  - This book is a practical handbook of research on dealing with mathematical methods in crime prevention for special agents, and discusses their capabilities and benefits that stem from integrating statistical analysis and predictive modeling. It consists of a current collection of research with contributions by authors from different nations in different disciplines. After reading this book, the reader should be able to understand the fundamental nature of cyberspace; understand the role of cyber-attacks; learn analytical techniques and the challenges of predicting events; learn how languages and culture are influenced by cyberspace; and learn techniques of the cyberspace public opinion detection and tracking process. Understanding cyberspace is the key to defending against digital attacks. This book takes a global perspective, examining the skills needed to collect and analyze event information and perform threat or target analysis duties in an effort to identify sources for signs of compromise, unauthorized activity and poor security practices. The ability to understand and react to events in cyberspace in a timely and appropriate manner will be key to future success. Most of the collections are research-based practices that have been done throughout the years. The authors hope that the presented work will be of great use to police investigators and cyber special agents interested in predictive analytics.
T2  - Knowledge Discovery in Cyberspace: Statistical Analysis and Predictive Modeling
T1  - Knowledge discovery in cyberspace: Statistical analysis and predictive modeling
SP  - 1
EP  - 206
UR  - https://hdl.handle.net/21.15107/rcub_jakov_784
ER  - 
@book{
author = "Kuk, Kristijan and Ranđelović, Dragan",
year = "2017",
abstract = "This book is a practical handbook of research on dealing with mathematical methods in crime prevention for special agents, and discusses their capabilities and benefits that stem from integrating statistical analysis and predictive modeling. It consists of a current collection of research with contributions by authors from different nations in different disciplines. After reading this book, the reader should be able to understand the fundamental nature of cyberspace; understand the role of cyber-attacks; learn analytical techniques and the challenges of predicting events; learn how languages and culture are influenced by cyberspace; and learn techniques of the cyberspace public opinion detection and tracking process. Understanding cyberspace is the key to defending against digital attacks. This book takes a global perspective, examining the skills needed to collect and analyze event information and perform threat or target analysis duties in an effort to identify sources for signs of compromise, unauthorized activity and poor security practices. The ability to understand and react to events in cyberspace in a timely and appropriate manner will be key to future success. Most of the collections are research-based practices that have been done throughout the years. The authors hope that the presented work will be of great use to police investigators and cyber special agents interested in predictive analytics.",
journal = "Knowledge Discovery in Cyberspace: Statistical Analysis and Predictive Modeling",
title = "Knowledge discovery in cyberspace: Statistical analysis and predictive modeling",
pages = "1-206",
url = "https://hdl.handle.net/21.15107/rcub_jakov_784"
}
Kuk, K.,& Ranđelović, D.. (2017). Knowledge discovery in cyberspace: Statistical analysis and predictive modeling. in Knowledge Discovery in Cyberspace: Statistical Analysis and Predictive Modeling, 1-206.
https://hdl.handle.net/21.15107/rcub_jakov_784
Kuk K, Ranđelović D. Knowledge discovery in cyberspace: Statistical analysis and predictive modeling. in Knowledge Discovery in Cyberspace: Statistical Analysis and Predictive Modeling. 2017;:1-206.
https://hdl.handle.net/21.15107/rcub_jakov_784 .
Kuk, Kristijan, Ranđelović, Dragan, "Knowledge discovery in cyberspace: Statistical analysis and predictive modeling" in Knowledge Discovery in Cyberspace: Statistical Analysis and Predictive Modeling (2017):1-206,
https://hdl.handle.net/21.15107/rcub_jakov_784 .

Preface

Kuk, Kristijan; Ranđelović, Dragan

(2017)

TY  - JOUR
AU  - Kuk, Kristijan
AU  - Ranđelović, Dragan
PY  - 2017
UR  - http://jakov.kpu.edu.rs/handle/123456789/779
T2  - Knowledge Discovery in Cyberspace: Statistical Analysis and Predictive Modeling
T1  - Preface
UR  - https://hdl.handle.net/21.15107/rcub_jakov_779
ER  - 
@article{
author = "Kuk, Kristijan and Ranđelović, Dragan",
year = "2017",
journal = "Knowledge Discovery in Cyberspace: Statistical Analysis and Predictive Modeling",
title = "Preface",
url = "https://hdl.handle.net/21.15107/rcub_jakov_779"
}
Kuk, K.,& Ranđelović, D.. (2017). Preface. in Knowledge Discovery in Cyberspace: Statistical Analysis and Predictive Modeling.
https://hdl.handle.net/21.15107/rcub_jakov_779
Kuk K, Ranđelović D. Preface. in Knowledge Discovery in Cyberspace: Statistical Analysis and Predictive Modeling. 2017;.
https://hdl.handle.net/21.15107/rcub_jakov_779 .
Kuk, Kristijan, Ranđelović, Dragan, "Preface" in Knowledge Discovery in Cyberspace: Statistical Analysis and Predictive Modeling (2017),
https://hdl.handle.net/21.15107/rcub_jakov_779 .

Intelligent Agents and Game-Based Learning Modules in a Learning Management System

Kuk, Kristijan; Rančić, Dejan; Pronić-Rančić, Olivera; Ranđelović, Dragan

(Springer Int Publishing Ag, Cham, 2016)

TY  - CONF
AU  - Kuk, Kristijan
AU  - Rančić, Dejan
AU  - Pronić-Rančić, Olivera
AU  - Ranđelović, Dragan
PY  - 2016
UR  - http://jakov.kpu.edu.rs/handle/123456789/722
AB  - Many researchers have taken a great deal of effort to promote high quality game-based learning applications, such as educational games, animations, simulations, animated or interactive simulation mechanisms in learning management system (LMS), and so on. The Bloom's taxonomy strategy was successfully implemented as effective gaming model in two different game-based learning applications (puzzle and platformer games) that motivate and actively engage college students in order to make learning process more enjoyable. During using the game-based modules in LMS Moodle, special attention was paid both to the integration of game-play aspects and the relationship between learning styles and game genres. In this paper we shall describe the proposed approach and introduce an adaptation and personalization of player as student model based on game genres. We have analyzed learning styles and teaching strategies that match the game features which resulted in embedding the analysis personalization and teaching strategies into the game. This article presents the effectiveness of agent-based approach in teaching strategies of Moodle gaming education resources.
PB  - Springer Int Publishing Ag, Cham
C3  - Agent and multi-agent systems: technology and applications, Kes-Amsta 2016
T1  - Intelligent Agents and Game-Based Learning Modules in a Learning Management System
VL  - 58
SP  - 233
EP  - 245
DO  - 10.1007/978-3-319-39883-9_19
ER  - 
@conference{
author = "Kuk, Kristijan and Rančić, Dejan and Pronić-Rančić, Olivera and Ranđelović, Dragan",
year = "2016",
abstract = "Many researchers have taken a great deal of effort to promote high quality game-based learning applications, such as educational games, animations, simulations, animated or interactive simulation mechanisms in learning management system (LMS), and so on. The Bloom's taxonomy strategy was successfully implemented as effective gaming model in two different game-based learning applications (puzzle and platformer games) that motivate and actively engage college students in order to make learning process more enjoyable. During using the game-based modules in LMS Moodle, special attention was paid both to the integration of game-play aspects and the relationship between learning styles and game genres. In this paper we shall describe the proposed approach and introduce an adaptation and personalization of player as student model based on game genres. We have analyzed learning styles and teaching strategies that match the game features which resulted in embedding the analysis personalization and teaching strategies into the game. This article presents the effectiveness of agent-based approach in teaching strategies of Moodle gaming education resources.",
publisher = "Springer Int Publishing Ag, Cham",
journal = "Agent and multi-agent systems: technology and applications, Kes-Amsta 2016",
title = "Intelligent Agents and Game-Based Learning Modules in a Learning Management System",
volume = "58",
pages = "233-245",
doi = "10.1007/978-3-319-39883-9_19"
}
Kuk, K., Rančić, D., Pronić-Rančić, O.,& Ranđelović, D.. (2016). Intelligent Agents and Game-Based Learning Modules in a Learning Management System. in Agent and multi-agent systems: technology and applications, Kes-Amsta 2016
Springer Int Publishing Ag, Cham., 58, 233-245.
https://doi.org/10.1007/978-3-319-39883-9_19
Kuk K, Rančić D, Pronić-Rančić O, Ranđelović D. Intelligent Agents and Game-Based Learning Modules in a Learning Management System. in Agent and multi-agent systems: technology and applications, Kes-Amsta 2016. 2016;58:233-245.
doi:10.1007/978-3-319-39883-9_19 .
Kuk, Kristijan, Rančić, Dejan, Pronić-Rančić, Olivera, Ranđelović, Dragan, "Intelligent Agents and Game-Based Learning Modules in a Learning Management System" in Agent and multi-agent systems: technology and applications, Kes-Amsta 2016, 58 (2016):233-245,
https://doi.org/10.1007/978-3-319-39883-9_19 . .
4
2
4

Information Retrieval for Unstructured Text Documents in Serbian into the Crime Domain

Nikolić, Vojkan; Markoski, Branko; Ivković, Miodrag; Kuk, Kristijan; Đikanović, Predrag

(IEEE, New York, 2015)

TY  - CONF
AU  - Nikolić, Vojkan
AU  - Markoski, Branko
AU  - Ivković, Miodrag
AU  - Kuk, Kristijan
AU  - Đikanović, Predrag
PY  - 2015
UR  - http://jakov.kpu.edu.rs/handle/123456789/670
AB  - The reform and modernisation of public sector based on wide application of information-communication technologies (ICT) is considered as one the key elements of futher development of information society in the Republic of Serbia. The trends of development of many e-Government services for many countries in the world, indicate the necessity of application natural language processing - NLP and in e-Government services Republic of Serbia. When performing many of the natural language processing tasks it is needed that all forms of a word with the same meaning has the same form. In general, many documents that are available e-Government services are not structured, so from them is very difficult to isolate some forms (knowledge) that exist in them. The process of finding useful information from such documents in Serbian language, which normally represents highly inflectional language, is one of the key elements of the modern information society in the Republic of Serbia.
PB  - IEEE, New York
C3  - 2015 16th IEEE international symposium on computational intelligence and informatics (CINTI)
T1  - Information Retrieval for Unstructured Text Documents in Serbian into the Crime Domain
SP  - 267
EP  - 271
DO  - 10.1109/CINTI.2015.7382934
ER  - 
@conference{
author = "Nikolić, Vojkan and Markoski, Branko and Ivković, Miodrag and Kuk, Kristijan and Đikanović, Predrag",
year = "2015",
abstract = "The reform and modernisation of public sector based on wide application of information-communication technologies (ICT) is considered as one the key elements of futher development of information society in the Republic of Serbia. The trends of development of many e-Government services for many countries in the world, indicate the necessity of application natural language processing - NLP and in e-Government services Republic of Serbia. When performing many of the natural language processing tasks it is needed that all forms of a word with the same meaning has the same form. In general, many documents that are available e-Government services are not structured, so from them is very difficult to isolate some forms (knowledge) that exist in them. The process of finding useful information from such documents in Serbian language, which normally represents highly inflectional language, is one of the key elements of the modern information society in the Republic of Serbia.",
publisher = "IEEE, New York",
journal = "2015 16th IEEE international symposium on computational intelligence and informatics (CINTI)",
title = "Information Retrieval for Unstructured Text Documents in Serbian into the Crime Domain",
pages = "267-271",
doi = "10.1109/CINTI.2015.7382934"
}
Nikolić, V., Markoski, B., Ivković, M., Kuk, K.,& Đikanović, P.. (2015). Information Retrieval for Unstructured Text Documents in Serbian into the Crime Domain. in 2015 16th IEEE international symposium on computational intelligence and informatics (CINTI)
IEEE, New York., 267-271.
https://doi.org/10.1109/CINTI.2015.7382934
Nikolić V, Markoski B, Ivković M, Kuk K, Đikanović P. Information Retrieval for Unstructured Text Documents in Serbian into the Crime Domain. in 2015 16th IEEE international symposium on computational intelligence and informatics (CINTI). 2015;:267-271.
doi:10.1109/CINTI.2015.7382934 .
Nikolić, Vojkan, Markoski, Branko, Ivković, Miodrag, Kuk, Kristijan, Đikanović, Predrag, "Information Retrieval for Unstructured Text Documents in Serbian into the Crime Domain" in 2015 16th IEEE international symposium on computational intelligence and informatics (CINTI) (2015):267-271,
https://doi.org/10.1109/CINTI.2015.7382934 . .
1
1

Artificial intelligence in process of collecting and analyzing data within police works

Kuk, Kristijan

(Kriminalističko- policijska akademija, Beograd, 2015)

TY  - JOUR
AU  - Kuk, Kristijan
PY  - 2015
UR  - http://jakov.kpu.edu.rs/handle/123456789/628
AB  - Complex real problems increasingly require intelligent systems that combine knowledge, techniques and methodologies from various sources. Intelligent systems based on artificial intelligence techniques that are associated with the behavior of people can perform the processes of learning, reasoning and solving all kinds of problems. Such systems, which automatically can perform tasks set by the user or other software, today thankfully called intelligent agents. Independent, intelligent agents on the Internet can be very successful to perform some search work on behalf of and for the needs of different users. For efficient collection, manipulation and management of data, such software can be very interesting from the standpoint of intelligent data analysis in many areas the police. Analysis of the data collected by an intelligent agent (a software robot-bot) can be successfully utilized, among many jobs in the police, and in the field of crime and in particular manifestation of cyber­crime, traffic safety, emergencies, etc. To make the collection and analysis of data from criminal activities on the Internet effective, it is necessary to examine the existing artificial intelligence techniques to be used for the conclusion of the intelligent agents. On the other hand, using of methods of artificial intelligence in finding data along with intelligent data analysis (data mining) should be used, which has found wide use in the area of business, economics, mechanics, medicine, genetics, transport etc.
AB  - Kompleksni realni problemi sve češće zahtevaju inteligentne sisteme koji kombinuju znanje, tehnike i metodologije iz različitih izvora. Inteligentni sistemi bazirani na tehnikama veštačke inteligencije koje asociraju na ponašanje ljudi mogu da obavljaju procese učenja, zaključivanja i rešavanje raznovrsnih problema. Ovakvi sistemi, koji automatski mogu da izvrše zadatke zadate od strane korisnika ili drugih softvera, danas se sreću pod imenom inteligentni agenti. Samostalno, inteligentni agenti na Internetu mogu veoma uspešno da izvode neki pretraživački posao u ime i za potrebe raznih korisnika. Zbog efikasnog sakupljanja, manipulisanja i upravljanja podacima, ovakvi softveri mogu biti veoma interesantni sa stanovišta inteligentne analize podataka u mnogim oblastima policije. Analiza podataka sakupljenih od strane inteligentnog agenta (softverskog robota - bota) može se uspešno iskoristiti, između mnogih poslova u policiji, i na polju kriminala i naročito pojavnog oblika sajber kriminala, bezbednosti saobraćaja, vanrednih situacija itd. Kako bi sakupljanje i analiza podataka iz kriminalnih aktivnosti na Internetu bila efikasna, neophodno je sagledati postojeće tehnike veštačke inteligencije koje se koriste za zaključivanje u inteligentnim agentima. S druge strane, treba iskoristiti metode veštačke inteligencije u pronalaženju podataka pri inteligentnoj analizi podataka (data mining-u) koja je našla široku primenu u oblasti poslovanja preduzeća, ekonomije, mehanike, medicine, genetike, saobraćaja i sl.
PB  - Kriminalističko- policijska akademija, Beograd
T2  - Nauka, bezbednost, policija
T1  - Artificial intelligence in process of collecting and analyzing data within police works
T1  - Veštačka intelegencija u prikupljanju i analizi podataka u policiji
VL  - 20
IS  - 3
SP  - 131
EP  - 148
DO  - 10.5937/NBP1503131K
ER  - 
@article{
author = "Kuk, Kristijan",
year = "2015",
abstract = "Complex real problems increasingly require intelligent systems that combine knowledge, techniques and methodologies from various sources. Intelligent systems based on artificial intelligence techniques that are associated with the behavior of people can perform the processes of learning, reasoning and solving all kinds of problems. Such systems, which automatically can perform tasks set by the user or other software, today thankfully called intelligent agents. Independent, intelligent agents on the Internet can be very successful to perform some search work on behalf of and for the needs of different users. For efficient collection, manipulation and management of data, such software can be very interesting from the standpoint of intelligent data analysis in many areas the police. Analysis of the data collected by an intelligent agent (a software robot-bot) can be successfully utilized, among many jobs in the police, and in the field of crime and in particular manifestation of cyber­crime, traffic safety, emergencies, etc. To make the collection and analysis of data from criminal activities on the Internet effective, it is necessary to examine the existing artificial intelligence techniques to be used for the conclusion of the intelligent agents. On the other hand, using of methods of artificial intelligence in finding data along with intelligent data analysis (data mining) should be used, which has found wide use in the area of business, economics, mechanics, medicine, genetics, transport etc., Kompleksni realni problemi sve češće zahtevaju inteligentne sisteme koji kombinuju znanje, tehnike i metodologije iz različitih izvora. Inteligentni sistemi bazirani na tehnikama veštačke inteligencije koje asociraju na ponašanje ljudi mogu da obavljaju procese učenja, zaključivanja i rešavanje raznovrsnih problema. Ovakvi sistemi, koji automatski mogu da izvrše zadatke zadate od strane korisnika ili drugih softvera, danas se sreću pod imenom inteligentni agenti. Samostalno, inteligentni agenti na Internetu mogu veoma uspešno da izvode neki pretraživački posao u ime i za potrebe raznih korisnika. Zbog efikasnog sakupljanja, manipulisanja i upravljanja podacima, ovakvi softveri mogu biti veoma interesantni sa stanovišta inteligentne analize podataka u mnogim oblastima policije. Analiza podataka sakupljenih od strane inteligentnog agenta (softverskog robota - bota) može se uspešno iskoristiti, između mnogih poslova u policiji, i na polju kriminala i naročito pojavnog oblika sajber kriminala, bezbednosti saobraćaja, vanrednih situacija itd. Kako bi sakupljanje i analiza podataka iz kriminalnih aktivnosti na Internetu bila efikasna, neophodno je sagledati postojeće tehnike veštačke inteligencije koje se koriste za zaključivanje u inteligentnim agentima. S druge strane, treba iskoristiti metode veštačke inteligencije u pronalaženju podataka pri inteligentnoj analizi podataka (data mining-u) koja je našla široku primenu u oblasti poslovanja preduzeća, ekonomije, mehanike, medicine, genetike, saobraćaja i sl.",
publisher = "Kriminalističko- policijska akademija, Beograd",
journal = "Nauka, bezbednost, policija",
title = "Artificial intelligence in process of collecting and analyzing data within police works, Veštačka intelegencija u prikupljanju i analizi podataka u policiji",
volume = "20",
number = "3",
pages = "131-148",
doi = "10.5937/NBP1503131K"
}
Kuk, K.. (2015). Artificial intelligence in process of collecting and analyzing data within police works. in Nauka, bezbednost, policija
Kriminalističko- policijska akademija, Beograd., 20(3), 131-148.
https://doi.org/10.5937/NBP1503131K
Kuk K. Artificial intelligence in process of collecting and analyzing data within police works. in Nauka, bezbednost, policija. 2015;20(3):131-148.
doi:10.5937/NBP1503131K .
Kuk, Kristijan, "Artificial intelligence in process of collecting and analyzing data within police works" in Nauka, bezbednost, policija, 20, no. 3 (2015):131-148,
https://doi.org/10.5937/NBP1503131K . .
1

The vulnerability of operating systems to malicious programs

Kuk, Kristijan

(Ministarstvo unutrašnjih poslova Republike Srbije, Beograd, 2015)

TY  - JOUR
AU  - Kuk, Kristijan
PY  - 2015
UR  - http://jakov.kpu.edu.rs/handle/123456789/622
AB  - Although there are many things that need protection, the main ones are those that appear on the Internet. Many harmful programs instal themselves surreptitiously on the user’s computer and their infiltration cannot be influenced without proper protection. When this happens, it is usually too late and a thorough inspection of the whole computer is needed. Many viruses and hackers on many mobile devices are becoming an increasing problem in today’s protection of personal information. Viruses for mobile phones have been known for a long time, yet the majority of users of these devices infected with malware are not aware of the infection because they do not know for the existence of security vulnerabilities of their operating systems. This paper presents an overview of the corresponding operating systems that support encryption in relation to the selected mobile phone, which can lead to a greater level of security of the device. There are many different types of harmful software that affect the security of mobile devices as well as personal computer systems of users, such as viruses, Trojans, malware, bootkits and others. Master boot sector, the first sector of the hard disk in a computer system which contains the code needed to run the operating system is often the target of specific types of viruses called bootkits or rootkits. Since they are invisible to the operating system it is very difficult to remove them from an infected computer. Therefore the review of the existence of vulnerabilities in operating systems offered in this paper is an attempt at drawing attention to their possible attacks.
AB  - Iako postoji veliki broj stvari od kojih je potrebna zaštita, glavne su one koje se pojavljuju sa Interneta. Mnogo štetnih programa se instalira neprimetno na računar korisnika i na njihovu instalaciju bez odgovarajuće zaštite ne može da se utiče. Kad se to dogodi, obično je kasno i potrebna je detaljna provera celog računara. Mnogi virusi i brojni hakeri na mobilnim uređajima postaju danas sve veći problem u zaštiti ličnih informacija. Virusi za mobilne telefone odavno nisu novost, većina korisnika ovih uređaja zaraženih malverom ne zna za infekciju zato što ne znaju za bezbednosne propuste njihovih operativnih sistema. U ovom radu prikazan je pregled odgovarajućih operativnih sistema koji podržavaju šifrovanje u odnosu na izabrani mobilni telefon, što može dovesti do većeg nivo bezbednosti samog uređaja. Postoji mnogo različitih vrsta štetnih softvera koji utiču na bezbednost mobilnih uređaja ali i na personalne (lične) računarske sisteme korisnika, kao što su: virusi, trojanci, malveri, bootkit-oeu i drugi. Master boot sektor, prvi sektor hard diska u računarskom sistemu na kome se nalazi kod potreban za pokretanje operativnog sistema, često je meta napada specifične vrste virusa, tzv. bootkit-oea ili rootkit-oea. Pošto su nevidljivi za operativni sistem, veoma ih je teško ukloniti sa zaraženog računara, pa se u radu, kroz pregled ranjivosti operativnih sistema, skreće pažnja na njihov mogući napad.
PB  - Ministarstvo unutrašnjih poslova Republike Srbije, Beograd
T2  - Bezbednost, Beograd
T1  - The vulnerability of operating systems to malicious programs
T1  - Ranjivost operativnih sistema na zlonamerne programe
VL  - 57
IS  - 2
SP  - 76
EP  - 91
DO  - 10.5937/bezbednost1502076K
ER  - 
@article{
author = "Kuk, Kristijan",
year = "2015",
abstract = "Although there are many things that need protection, the main ones are those that appear on the Internet. Many harmful programs instal themselves surreptitiously on the user’s computer and their infiltration cannot be influenced without proper protection. When this happens, it is usually too late and a thorough inspection of the whole computer is needed. Many viruses and hackers on many mobile devices are becoming an increasing problem in today’s protection of personal information. Viruses for mobile phones have been known for a long time, yet the majority of users of these devices infected with malware are not aware of the infection because they do not know for the existence of security vulnerabilities of their operating systems. This paper presents an overview of the corresponding operating systems that support encryption in relation to the selected mobile phone, which can lead to a greater level of security of the device. There are many different types of harmful software that affect the security of mobile devices as well as personal computer systems of users, such as viruses, Trojans, malware, bootkits and others. Master boot sector, the first sector of the hard disk in a computer system which contains the code needed to run the operating system is often the target of specific types of viruses called bootkits or rootkits. Since they are invisible to the operating system it is very difficult to remove them from an infected computer. Therefore the review of the existence of vulnerabilities in operating systems offered in this paper is an attempt at drawing attention to their possible attacks., Iako postoji veliki broj stvari od kojih je potrebna zaštita, glavne su one koje se pojavljuju sa Interneta. Mnogo štetnih programa se instalira neprimetno na računar korisnika i na njihovu instalaciju bez odgovarajuće zaštite ne može da se utiče. Kad se to dogodi, obično je kasno i potrebna je detaljna provera celog računara. Mnogi virusi i brojni hakeri na mobilnim uređajima postaju danas sve veći problem u zaštiti ličnih informacija. Virusi za mobilne telefone odavno nisu novost, većina korisnika ovih uređaja zaraženih malverom ne zna za infekciju zato što ne znaju za bezbednosne propuste njihovih operativnih sistema. U ovom radu prikazan je pregled odgovarajućih operativnih sistema koji podržavaju šifrovanje u odnosu na izabrani mobilni telefon, što može dovesti do većeg nivo bezbednosti samog uređaja. Postoji mnogo različitih vrsta štetnih softvera koji utiču na bezbednost mobilnih uređaja ali i na personalne (lične) računarske sisteme korisnika, kao što su: virusi, trojanci, malveri, bootkit-oeu i drugi. Master boot sektor, prvi sektor hard diska u računarskom sistemu na kome se nalazi kod potreban za pokretanje operativnog sistema, često je meta napada specifične vrste virusa, tzv. bootkit-oea ili rootkit-oea. Pošto su nevidljivi za operativni sistem, veoma ih je teško ukloniti sa zaraženog računara, pa se u radu, kroz pregled ranjivosti operativnih sistema, skreće pažnja na njihov mogući napad.",
publisher = "Ministarstvo unutrašnjih poslova Republike Srbije, Beograd",
journal = "Bezbednost, Beograd",
title = "The vulnerability of operating systems to malicious programs, Ranjivost operativnih sistema na zlonamerne programe",
volume = "57",
number = "2",
pages = "76-91",
doi = "10.5937/bezbednost1502076K"
}
Kuk, K.. (2015). The vulnerability of operating systems to malicious programs. in Bezbednost, Beograd
Ministarstvo unutrašnjih poslova Republike Srbije, Beograd., 57(2), 76-91.
https://doi.org/10.5937/bezbednost1502076K
Kuk K. The vulnerability of operating systems to malicious programs. in Bezbednost, Beograd. 2015;57(2):76-91.
doi:10.5937/bezbednost1502076K .
Kuk, Kristijan, "The vulnerability of operating systems to malicious programs" in Bezbednost, Beograd, 57, no. 2 (2015):76-91,
https://doi.org/10.5937/bezbednost1502076K . .
1

Agent-Based Approach for Game-Based Learning Applications: Case Study in Agent-Personalized Trend in Engineering Education

Rančić, Dejan; Kuk, Kristijan; Pronić-Rančić, Olivera; Ranđelović, Dragan

(Springer-Verlag Berlin, Berlin, 2015)

TY  - CONF
AU  - Rančić, Dejan
AU  - Kuk, Kristijan
AU  - Pronić-Rančić, Olivera
AU  - Ranđelović, Dragan
PY  - 2015
UR  - http://jakov.kpu.edu.rs/handle/123456789/620
PB  - Springer-Verlag Berlin, Berlin
C3  - Agent and multi-agent systems: technologies and applications
T1  - Agent-Based Approach for Game-Based Learning Applications: Case Study in Agent-Personalized Trend in Engineering Education
VL  - 38
SP  - 453
EP  - 466
DO  - 10.1007/978-3-319-19728-9_38
ER  - 
@conference{
author = "Rančić, Dejan and Kuk, Kristijan and Pronić-Rančić, Olivera and Ranđelović, Dragan",
year = "2015",
publisher = "Springer-Verlag Berlin, Berlin",
journal = "Agent and multi-agent systems: technologies and applications",
title = "Agent-Based Approach for Game-Based Learning Applications: Case Study in Agent-Personalized Trend in Engineering Education",
volume = "38",
pages = "453-466",
doi = "10.1007/978-3-319-19728-9_38"
}
Rančić, D., Kuk, K., Pronić-Rančić, O.,& Ranđelović, D.. (2015). Agent-Based Approach for Game-Based Learning Applications: Case Study in Agent-Personalized Trend in Engineering Education. in Agent and multi-agent systems: technologies and applications
Springer-Verlag Berlin, Berlin., 38, 453-466.
https://doi.org/10.1007/978-3-319-19728-9_38
Rančić D, Kuk K, Pronić-Rančić O, Ranđelović D. Agent-Based Approach for Game-Based Learning Applications: Case Study in Agent-Personalized Trend in Engineering Education. in Agent and multi-agent systems: technologies and applications. 2015;38:453-466.
doi:10.1007/978-3-319-19728-9_38 .
Rančić, Dejan, Kuk, Kristijan, Pronić-Rančić, Olivera, Ranđelović, Dragan, "Agent-Based Approach for Game-Based Learning Applications: Case Study in Agent-Personalized Trend in Engineering Education" in Agent and multi-agent systems: technologies and applications, 38 (2015):453-466,
https://doi.org/10.1007/978-3-319-19728-9_38 . .
1
2
1
2

Impact of video games on children's behavior and possible forms of their abuse on the Internet

Kuk, Kristijan

(Ministarstvo unutrašnjih poslova Republike Srbije, Beograd, 2014)

TY  - JOUR
AU  - Kuk, Kristijan
PY  - 2014
UR  - http://jakov.kpu.edu.rs/handle/123456789/576
AB  - Modern life implies daily use of computers for various purposes. Children spend more and more time playing games or using the Internet, and consequences of this addiction are reflected not only in inappropriate social conduct, but also raise the question of their personal security, as well as security of data stored on the computer. It may be complicated to protect children on the Internet, but availability of computer software for family security can be of assistance to many parents. The paper gives an overview and meaning of some more prominent options within these programs as a measure of prevention against possible abuse of children by means of video games. Since certain games can bring about aggressive behavior in younger users, their contents can be of vital importance for choosing the genre of video games that the children use. The labels provided by the Pan European Game Information (PEGI) rating system may play an important part in this, since they offer information on the contents of the video game. The paper therefore gives a survey of game genres and draws attention to the importance of proper interpretation of the images used in the guidance.
AB  - Savremeni život podrazumeva svakodnevnu upotrebu kompjutera u različite svrhe. Deca svaki dan provode sve više vremena uz igrice i Internet, a posledice ove zavisnosti se ne ogledaju samo u lošem socijalnom ponašanju, već se dovodi u pitanje i njihova lična bezbednost, kao i bezbednost podataka na računaru. U radu je prikazan skup potencijalnih mesta na koja roditelji treba da obrate pažnju prilikom korišćenja Internetu od stane njihove dece. Zaštita dece na Internetu može biti komplikovana, ali postojanje računarskih programa za porodičnu bezbednost mnogim roditeljima mogu biti od velike pomoći. Pregled i značenje važnijih opcija ovih programa dat je kao preventivna mera u potencijalno mogućoj zloupotrebi dece putem video igara. Kako određene igre mogu uticati na agresivno ponašanje njihovih mlađih korisnika, njihov sadržaj može da bude od značajne važnosti prilikom izbora žanra video igre koju deca koriste. Važnu ulogu u tome može da ima PEGI (Pan European Game Information system) oznaka, koja daje informacije o sadržaju video igrice, na se u radu pored pregleda vrste žanra igre skreće pažnja na značaj pravilnog tumačenje samih slika na datoj oznaci.
PB  - Ministarstvo unutrašnjih poslova Republike Srbije, Beograd
T2  - Bezbednost, Beograd
T1  - Impact of video games on children's behavior and possible forms of their abuse on the Internet
T1  - Uticaj video igara na ponašanje dece i mogući oblici njihove zloupotrebe na internetu
VL  - 56
IS  - 2
SP  - 122
EP  - 136
DO  - 10.5937/bezbednost1402122K
ER  - 
@article{
author = "Kuk, Kristijan",
year = "2014",
abstract = "Modern life implies daily use of computers for various purposes. Children spend more and more time playing games or using the Internet, and consequences of this addiction are reflected not only in inappropriate social conduct, but also raise the question of their personal security, as well as security of data stored on the computer. It may be complicated to protect children on the Internet, but availability of computer software for family security can be of assistance to many parents. The paper gives an overview and meaning of some more prominent options within these programs as a measure of prevention against possible abuse of children by means of video games. Since certain games can bring about aggressive behavior in younger users, their contents can be of vital importance for choosing the genre of video games that the children use. The labels provided by the Pan European Game Information (PEGI) rating system may play an important part in this, since they offer information on the contents of the video game. The paper therefore gives a survey of game genres and draws attention to the importance of proper interpretation of the images used in the guidance., Savremeni život podrazumeva svakodnevnu upotrebu kompjutera u različite svrhe. Deca svaki dan provode sve više vremena uz igrice i Internet, a posledice ove zavisnosti se ne ogledaju samo u lošem socijalnom ponašanju, već se dovodi u pitanje i njihova lična bezbednost, kao i bezbednost podataka na računaru. U radu je prikazan skup potencijalnih mesta na koja roditelji treba da obrate pažnju prilikom korišćenja Internetu od stane njihove dece. Zaštita dece na Internetu može biti komplikovana, ali postojanje računarskih programa za porodičnu bezbednost mnogim roditeljima mogu biti od velike pomoći. Pregled i značenje važnijih opcija ovih programa dat je kao preventivna mera u potencijalno mogućoj zloupotrebi dece putem video igara. Kako određene igre mogu uticati na agresivno ponašanje njihovih mlađih korisnika, njihov sadržaj može da bude od značajne važnosti prilikom izbora žanra video igre koju deca koriste. Važnu ulogu u tome može da ima PEGI (Pan European Game Information system) oznaka, koja daje informacije o sadržaju video igrice, na se u radu pored pregleda vrste žanra igre skreće pažnja na značaj pravilnog tumačenje samih slika na datoj oznaci.",
publisher = "Ministarstvo unutrašnjih poslova Republike Srbije, Beograd",
journal = "Bezbednost, Beograd",
title = "Impact of video games on children's behavior and possible forms of their abuse on the Internet, Uticaj video igara na ponašanje dece i mogući oblici njihove zloupotrebe na internetu",
volume = "56",
number = "2",
pages = "122-136",
doi = "10.5937/bezbednost1402122K"
}
Kuk, K.. (2014). Impact of video games on children's behavior and possible forms of their abuse on the Internet. in Bezbednost, Beograd
Ministarstvo unutrašnjih poslova Republike Srbije, Beograd., 56(2), 122-136.
https://doi.org/10.5937/bezbednost1402122K
Kuk K. Impact of video games on children's behavior and possible forms of their abuse on the Internet. in Bezbednost, Beograd. 2014;56(2):122-136.
doi:10.5937/bezbednost1402122K .
Kuk, Kristijan, "Impact of video games on children's behavior and possible forms of their abuse on the Internet" in Bezbednost, Beograd, 56, no. 2 (2014):122-136,
https://doi.org/10.5937/bezbednost1402122K . .