Čisar, Petar

Link to this page

Authority KeyName Variants
orcid::0000-0002-8129-288X
  • Čisar, Petar (36)
  • Čisar, P. (2)
Projects

Author's Bibliography

Analysis of DDoS Attack Detection Techniques for Securing Software- Defined Networks

Čabarkapa, Danijel; Popović, Brankica; Čisar, Petar; Kuk, Kristijan

(Belgrade : University of Criminal Investigation and Police Studies, 2023)

TY  - CONF
AU  - Čabarkapa, Danijel
AU  - Popović, Brankica
AU  - Čisar, Petar
AU  - Kuk, Kristijan
PY  - 2023
UR  - http://jakov.kpu.edu.rs/handle/123456789/1530
AB  - Software-Defined Networks (SDN) is an important technology that enables a new approach to how we develop and manage networks. SDN divides the data plane and control plane and supports the logical centralization of network control. However, the centralized architecture of SDN is also a potential vulnerability for various types of malicious attacks. The paper elaborates on the security aspects of virtualization as a basic concept of SDN architecture. Among the many types of attack, one of the most frequent and destructive are Distributed Denial of Service (DDoS) attacks. This paper presents an analysis of techniques to detect DDoS attacks in SDN networks. It first describes the SDN architecture and then elaborates on different detection techniques for DDoS attacks. Additionally, this paper emphasizes the types, components, and categories of detection solutions according to the techniques or methods used. The important approaches and those that can answer the complexity of detecting DDoS attacks in SDN are the detection schemes based on entropy and machine learning principles. This paper in general focuses on these two detection techniques and summarizes their benefits and drawbacks and finally provides a guideline for future research directions related to DDoS detection techniques in SDN networks.
PB  - Belgrade : University of Criminal Investigation and Police Studies
C3  - International scientific conference “Archibald Reiss Days”
T1  - Analysis of DDoS Attack Detection Techniques for Securing Software- Defined Networks
SP  - 17
EP  - 35
UR  - https://hdl.handle.net/21.15107/rcub_jakov_1530
ER  - 
@conference{
author = "Čabarkapa, Danijel and Popović, Brankica and Čisar, Petar and Kuk, Kristijan",
year = "2023",
abstract = "Software-Defined Networks (SDN) is an important technology that enables a new approach to how we develop and manage networks. SDN divides the data plane and control plane and supports the logical centralization of network control. However, the centralized architecture of SDN is also a potential vulnerability for various types of malicious attacks. The paper elaborates on the security aspects of virtualization as a basic concept of SDN architecture. Among the many types of attack, one of the most frequent and destructive are Distributed Denial of Service (DDoS) attacks. This paper presents an analysis of techniques to detect DDoS attacks in SDN networks. It first describes the SDN architecture and then elaborates on different detection techniques for DDoS attacks. Additionally, this paper emphasizes the types, components, and categories of detection solutions according to the techniques or methods used. The important approaches and those that can answer the complexity of detecting DDoS attacks in SDN are the detection schemes based on entropy and machine learning principles. This paper in general focuses on these two detection techniques and summarizes their benefits and drawbacks and finally provides a guideline for future research directions related to DDoS detection techniques in SDN networks.",
publisher = "Belgrade : University of Criminal Investigation and Police Studies",
journal = "International scientific conference “Archibald Reiss Days”",
title = "Analysis of DDoS Attack Detection Techniques for Securing Software- Defined Networks",
pages = "17-35",
url = "https://hdl.handle.net/21.15107/rcub_jakov_1530"
}
Čabarkapa, D., Popović, B., Čisar, P.,& Kuk, K.. (2023). Analysis of DDoS Attack Detection Techniques for Securing Software- Defined Networks. in International scientific conference “Archibald Reiss Days”
Belgrade : University of Criminal Investigation and Police Studies., 17-35.
https://hdl.handle.net/21.15107/rcub_jakov_1530
Čabarkapa D, Popović B, Čisar P, Kuk K. Analysis of DDoS Attack Detection Techniques for Securing Software- Defined Networks. in International scientific conference “Archibald Reiss Days”. 2023;:17-35.
https://hdl.handle.net/21.15107/rcub_jakov_1530 .
Čabarkapa, Danijel, Popović, Brankica, Čisar, Petar, Kuk, Kristijan, "Analysis of DDoS Attack Detection Techniques for Securing Software- Defined Networks" in International scientific conference “Archibald Reiss Days” (2023):17-35,
https://hdl.handle.net/21.15107/rcub_jakov_1530 .

Asymptotic Properties and Application of GSB Process : A Case Study of the COVID‐19 Dynamics in Serbia

Jovanović, Mihailo; Stojanović, Vladica; Kuk, Kristijan; Popović, Brankica; Čisar, Petar

(Basel, Switzerland : MDPI, 2022)

TY  - JOUR
AU  - Jovanović, Mihailo
AU  - Stojanović, Vladica
AU  - Kuk, Kristijan
AU  - Popović, Brankica
AU  - Čisar, Petar
PY  - 2022
UR  - http://jakov.kpu.edu.rs/handle/123456789/1519
AB  - This paper describes one of the non-linear (and non-stationary) stochastic models, the GSB (Gaussian, or Generalized, Split-BREAK) process, which is used in the analysis of time series with pronounced and accentuated fluctuations. In the beginning, the stochastic structure of the GSB process and its important distributional and asymptotic properties are given. To that end, a method based on characteristic functions (CFs) was used. Various procedures for the estimation of model parameters, asymptotic properties, and numerical simulations of the obtained estimators are also investigated. Finally, as an illustration of the practical application of the GSB process, an analysis is presented of the dynamics and stochastic distribution of the infected and immunized population in relation to the disease COVID-19 in the territory of the Republic of Serbia.
PB  - Basel, Switzerland : MDPI
T2  - Mathematics
T1  - Asymptotic Properties and Application of GSB Process : A Case Study of the COVID‐19 Dynamics in Serbia
VL  - 10
IS  - 20
SP  - 3849
DO  - 10.3390/math10203849
ER  - 
@article{
author = "Jovanović, Mihailo and Stojanović, Vladica and Kuk, Kristijan and Popović, Brankica and Čisar, Petar",
year = "2022",
abstract = "This paper describes one of the non-linear (and non-stationary) stochastic models, the GSB (Gaussian, or Generalized, Split-BREAK) process, which is used in the analysis of time series with pronounced and accentuated fluctuations. In the beginning, the stochastic structure of the GSB process and its important distributional and asymptotic properties are given. To that end, a method based on characteristic functions (CFs) was used. Various procedures for the estimation of model parameters, asymptotic properties, and numerical simulations of the obtained estimators are also investigated. Finally, as an illustration of the practical application of the GSB process, an analysis is presented of the dynamics and stochastic distribution of the infected and immunized population in relation to the disease COVID-19 in the territory of the Republic of Serbia.",
publisher = "Basel, Switzerland : MDPI",
journal = "Mathematics",
title = "Asymptotic Properties and Application of GSB Process : A Case Study of the COVID‐19 Dynamics in Serbia",
volume = "10",
number = "20",
pages = "3849",
doi = "10.3390/math10203849"
}
Jovanović, M., Stojanović, V., Kuk, K., Popović, B.,& Čisar, P.. (2022). Asymptotic Properties and Application of GSB Process : A Case Study of the COVID‐19 Dynamics in Serbia. in Mathematics
Basel, Switzerland : MDPI., 10(20), 3849.
https://doi.org/10.3390/math10203849
Jovanović M, Stojanović V, Kuk K, Popović B, Čisar P. Asymptotic Properties and Application of GSB Process : A Case Study of the COVID‐19 Dynamics in Serbia. in Mathematics. 2022;10(20):3849.
doi:10.3390/math10203849 .
Jovanović, Mihailo, Stojanović, Vladica, Kuk, Kristijan, Popović, Brankica, Čisar, Petar, "Asymptotic Properties and Application of GSB Process : A Case Study of the COVID‐19 Dynamics in Serbia" in Mathematics, 10, no. 20 (2022):3849,
https://doi.org/10.3390/math10203849 . .
5

Application of Artificial Immune Networks in Continuous Function Optimizations

Čisar, Petar; Maravić Čisar, Sanja; Popović, Brankica; Kuk, Kristijan; Vuković, Igor

(Budapest : Óbuda University, 2022)

TY  - JOUR
AU  - Čisar, Petar
AU  - Maravić Čisar, Sanja
AU  - Popović, Brankica
AU  - Kuk, Kristijan
AU  - Vuković, Igor
PY  - 2022
UR  - http://jakov.kpu.edu.rs/handle/123456789/1446
AB  - This paper deals with the application of artificial immune networks in continuous
function optimizations. The performance of the immunological algorithms is analyzed using
the Optimization Algorithm Toolkit. It is shown that the CLIGA algorithm has, by far, the
fastest convergence and the best score - in terms of the number of required iterations, for the
analyzed continuous function. Also, based on the test results, it was concluded, that the lowest
total number of iterations for the defined run time was achieved with the opt-IA algorithm,
followed by the CLONALG and CLIGA algorithms.
PB  - Budapest : Óbuda University
T2  - Acta Polytechnica Hungarica
T1  - Application of Artificial Immune Networks in Continuous Function Optimizations
VL  - 19
IS  - 7
SP  - 153
EP  - 164
DO  - 10.12700/APH.19.7.2022.7.8
ER  - 
@article{
author = "Čisar, Petar and Maravić Čisar, Sanja and Popović, Brankica and Kuk, Kristijan and Vuković, Igor",
year = "2022",
abstract = "This paper deals with the application of artificial immune networks in continuous
function optimizations. The performance of the immunological algorithms is analyzed using
the Optimization Algorithm Toolkit. It is shown that the CLIGA algorithm has, by far, the
fastest convergence and the best score - in terms of the number of required iterations, for the
analyzed continuous function. Also, based on the test results, it was concluded, that the lowest
total number of iterations for the defined run time was achieved with the opt-IA algorithm,
followed by the CLONALG and CLIGA algorithms.",
publisher = "Budapest : Óbuda University",
journal = "Acta Polytechnica Hungarica",
title = "Application of Artificial Immune Networks in Continuous Function Optimizations",
volume = "19",
number = "7",
pages = "153-164",
doi = "10.12700/APH.19.7.2022.7.8"
}
Čisar, P., Maravić Čisar, S., Popović, B., Kuk, K.,& Vuković, I.. (2022). Application of Artificial Immune Networks in Continuous Function Optimizations. in Acta Polytechnica Hungarica
Budapest : Óbuda University., 19(7), 153-164.
https://doi.org/10.12700/APH.19.7.2022.7.8
Čisar P, Maravić Čisar S, Popović B, Kuk K, Vuković I. Application of Artificial Immune Networks in Continuous Function Optimizations. in Acta Polytechnica Hungarica. 2022;19(7):153-164.
doi:10.12700/APH.19.7.2022.7.8 .
Čisar, Petar, Maravić Čisar, Sanja, Popović, Brankica, Kuk, Kristijan, Vuković, Igor, "Application of Artificial Immune Networks in Continuous Function Optimizations" in Acta Polytechnica Hungarica, 19, no. 7 (2022):153-164,
https://doi.org/10.12700/APH.19.7.2022.7.8 . .
1
2

Multi-Agent System Observer: Intelligent Support for Engaged E-Learning

Vuković, Igor; Kuk, Kristijan; Čisar, Petar; Banđur, Miloš; Banđur, Đoko; Milić, Nenad; Popović, Brankica

(Basel : MDPI, 2021)

TY  - JOUR
AU  - Vuković, Igor
AU  - Kuk, Kristijan
AU  - Čisar, Petar
AU  - Banđur, Miloš
AU  - Banđur, Đoko
AU  - Milić, Nenad
AU  - Popović, Brankica
PY  - 2021
UR  - http://jakov.kpu.edu.rs/handle/123456789/1531
AB  - Moodle is a widely deployed distance learning platform that provides numerous opportunities to enhance the learning process. Moodle’s importance in maintaining the continuity of education in states of emergency and other circumstances has been particularly demonstrated in the context of the COVID-19 virus’ rapid spread. However, there is a problem with personalizing the learning and monitoring of students’ work. There is room for upgrading the system by applying data mining and different machine-learning methods. The multi-agent Observer system proposed in our paper supports students engaged in learning by monitoring their work and making suggestions based on the prediction of their final course success, using indicators of engagement and machine-learning algorithms. A novelty is that Observer collects data independently of the Moodle database, autonomously creates a training set, and learns from gathered data. Since the data are anonymized, researchers and lecturers can freely use them for purposes broader than that specified for Observer. The paper shows how the methodology, technologies, and techniques used in Observer provide an autonomous system of personalized assistance for students within Moodle platforms.
PB  - Basel : MDPI
T2  - Electronics
T1  - Multi-Agent System Observer: Intelligent Support for Engaged E-Learning
VL  - 10
IS  - 12
SP  - 1370
DO  - 10.3390/electronics10121370
ER  - 
@article{
author = "Vuković, Igor and Kuk, Kristijan and Čisar, Petar and Banđur, Miloš and Banđur, Đoko and Milić, Nenad and Popović, Brankica",
year = "2021",
abstract = "Moodle is a widely deployed distance learning platform that provides numerous opportunities to enhance the learning process. Moodle’s importance in maintaining the continuity of education in states of emergency and other circumstances has been particularly demonstrated in the context of the COVID-19 virus’ rapid spread. However, there is a problem with personalizing the learning and monitoring of students’ work. There is room for upgrading the system by applying data mining and different machine-learning methods. The multi-agent Observer system proposed in our paper supports students engaged in learning by monitoring their work and making suggestions based on the prediction of their final course success, using indicators of engagement and machine-learning algorithms. A novelty is that Observer collects data independently of the Moodle database, autonomously creates a training set, and learns from gathered data. Since the data are anonymized, researchers and lecturers can freely use them for purposes broader than that specified for Observer. The paper shows how the methodology, technologies, and techniques used in Observer provide an autonomous system of personalized assistance for students within Moodle platforms.",
publisher = "Basel : MDPI",
journal = "Electronics",
title = "Multi-Agent System Observer: Intelligent Support for Engaged E-Learning",
volume = "10",
number = "12",
pages = "1370",
doi = "10.3390/electronics10121370"
}
Vuković, I., Kuk, K., Čisar, P., Banđur, M., Banđur, Đ., Milić, N.,& Popović, B.. (2021). Multi-Agent System Observer: Intelligent Support for Engaged E-Learning. in Electronics
Basel : MDPI., 10(12), 1370.
https://doi.org/10.3390/electronics10121370
Vuković I, Kuk K, Čisar P, Banđur M, Banđur Đ, Milić N, Popović B. Multi-Agent System Observer: Intelligent Support for Engaged E-Learning. in Electronics. 2021;10(12):1370.
doi:10.3390/electronics10121370 .
Vuković, Igor, Kuk, Kristijan, Čisar, Petar, Banđur, Miloš, Banđur, Đoko, Milić, Nenad, Popović, Brankica, "Multi-Agent System Observer: Intelligent Support for Engaged E-Learning" in Electronics, 10, no. 12 (2021):1370,
https://doi.org/10.3390/electronics10121370 . .
4

Influence of Image Enhancement Techniques on Effectiveness of Unconstrained Face Detection and Identification

Vuković, Igor; Čisar, Petar; Kuk, Kristijan; Banđur, Miloš; Popović, Brankica

(Kaunas : Kauno Technologijos Universitetas, 2021)

TY  - JOUR
AU  - Vuković, Igor
AU  - Čisar, Petar
AU  - Kuk, Kristijan
AU  - Banđur, Miloš
AU  - Popović, Brankica
PY  - 2021
UR  - http://jakov.kpu.edu.rs/handle/123456789/1522
AB  - In a criminal investigation, along with processing forensic evidence, different investigative techniques are used to identify the perpetrator of the crime. It includes collecting and analyzing unconstrained face images, mostly with low resolution and various qualities, making identification difficult. Since police organizations have limited resources, in this paper, we propose a novel method that utilizes off-the-shelf solutions (Dlib library Histogram of Oriented Gradients-HOG face detectors and the ResNet faces feature vector extractor) to provide practical assistance in unconstrained face identification. Our experiment aimed to establish which one (if any) of the basic image enhancement techniques should be applied to increase the effectiveness. Results obtained from three publicly available databases and one created for this research (simulating police investigators’ database) showed that resizing the image (especially with a resolution lower than 150 pixels) should always precede enhancement to improve face detection accuracy. The best results in determining whether they are the same or different persons in images were obtained by applying sharpening with a high-pass filter, whereas normalization gives the highest classification scores when a single weight value is applied to data from all four databases.
PB  - Kaunas : Kauno Technologijos Universitetas
T2  - Elektronika Ir Elektrotechnika
T1  - Influence of Image Enhancement Techniques on Effectiveness of Unconstrained Face Detection and Identification
VL  - 27
IS  - 5
SP  - 49
EP  - 58
DO  - 10.5755/j02.eie.29081
ER  - 
@article{
author = "Vuković, Igor and Čisar, Petar and Kuk, Kristijan and Banđur, Miloš and Popović, Brankica",
year = "2021",
abstract = "In a criminal investigation, along with processing forensic evidence, different investigative techniques are used to identify the perpetrator of the crime. It includes collecting and analyzing unconstrained face images, mostly with low resolution and various qualities, making identification difficult. Since police organizations have limited resources, in this paper, we propose a novel method that utilizes off-the-shelf solutions (Dlib library Histogram of Oriented Gradients-HOG face detectors and the ResNet faces feature vector extractor) to provide practical assistance in unconstrained face identification. Our experiment aimed to establish which one (if any) of the basic image enhancement techniques should be applied to increase the effectiveness. Results obtained from three publicly available databases and one created for this research (simulating police investigators’ database) showed that resizing the image (especially with a resolution lower than 150 pixels) should always precede enhancement to improve face detection accuracy. The best results in determining whether they are the same or different persons in images were obtained by applying sharpening with a high-pass filter, whereas normalization gives the highest classification scores when a single weight value is applied to data from all four databases.",
publisher = "Kaunas : Kauno Technologijos Universitetas",
journal = "Elektronika Ir Elektrotechnika",
title = "Influence of Image Enhancement Techniques on Effectiveness of Unconstrained Face Detection and Identification",
volume = "27",
number = "5",
pages = "49-58",
doi = "10.5755/j02.eie.29081"
}
Vuković, I., Čisar, P., Kuk, K., Banđur, M.,& Popović, B.. (2021). Influence of Image Enhancement Techniques on Effectiveness of Unconstrained Face Detection and Identification. in Elektronika Ir Elektrotechnika
Kaunas : Kauno Technologijos Universitetas., 27(5), 49-58.
https://doi.org/10.5755/j02.eie.29081
Vuković I, Čisar P, Kuk K, Banđur M, Popović B. Influence of Image Enhancement Techniques on Effectiveness of Unconstrained Face Detection and Identification. in Elektronika Ir Elektrotechnika. 2021;27(5):49-58.
doi:10.5755/j02.eie.29081 .
Vuković, Igor, Čisar, Petar, Kuk, Kristijan, Banđur, Miloš, Popović, Brankica, "Influence of Image Enhancement Techniques on Effectiveness of Unconstrained Face Detection and Identification" in Elektronika Ir Elektrotechnika, 27, no. 5 (2021):49-58,
https://doi.org/10.5755/j02.eie.29081 . .
5

Challenges of contemporary predictive policing

Vuković, Igor; Čisar, Petar; Kuk, Kristijan; Popović, Brankica

(Belgrade : University of Criminal Investigation and Police Studies, 2021)

TY  - CONF
AU  - Vuković, Igor
AU  - Čisar, Petar
AU  - Kuk, Kristijan
AU  - Popović, Brankica
PY  - 2021
UR  - http://eskup.kpu.edu.rs/dar/issue/view/6/4
UR  - http://jakov.kpu.edu.rs/handle/123456789/1290
AB  - Big data algorithms developed for predictive policing are increasingly present in the everyday work of law enforcement. There are various applications of such technologies to pre-dict crimes, potential crime scenes, profiles of perpetrators, and more. In this way, police officers are  provided  with  appropriate  assistance  in  their  work,  increasing  their  efficiency  or  entirely  replacing them in specific tasks. Although technologically advanced, police use force and arrest, so  prediction  algorithms  can  have  significantly  different,  more  drastic  consequences  as  com-pared to those that similar technologies would produce in agriculture, industry, or health. For further development of predictive policing, it is necessary to have a clear picture of the problems it can cause. This paper discusses modern predictive policing from the perspective of challenges that negatively affect its application.
PB  - Belgrade : University of Criminal Investigation and Police Studies
C3  - Thematic conference proceedings of international significance [Elektronski izvor] / International Scientific Conference "Archibald Reiss Days", Belgrade, 9-10 November 2021
T1  - Challenges of contemporary predictive policing
SP  - 513
EP  - 526
UR  - https://hdl.handle.net/21.15107/rcub_jakov_1290
ER  - 
@conference{
author = "Vuković, Igor and Čisar, Petar and Kuk, Kristijan and Popović, Brankica",
year = "2021",
abstract = "Big data algorithms developed for predictive policing are increasingly present in the everyday work of law enforcement. There are various applications of such technologies to pre-dict crimes, potential crime scenes, profiles of perpetrators, and more. In this way, police officers are  provided  with  appropriate  assistance  in  their  work,  increasing  their  efficiency  or  entirely  replacing them in specific tasks. Although technologically advanced, police use force and arrest, so  prediction  algorithms  can  have  significantly  different,  more  drastic  consequences  as  com-pared to those that similar technologies would produce in agriculture, industry, or health. For further development of predictive policing, it is necessary to have a clear picture of the problems it can cause. This paper discusses modern predictive policing from the perspective of challenges that negatively affect its application.",
publisher = "Belgrade : University of Criminal Investigation and Police Studies",
journal = "Thematic conference proceedings of international significance [Elektronski izvor] / International Scientific Conference "Archibald Reiss Days", Belgrade, 9-10 November 2021",
title = "Challenges of contemporary predictive policing",
pages = "513-526",
url = "https://hdl.handle.net/21.15107/rcub_jakov_1290"
}
Vuković, I., Čisar, P., Kuk, K.,& Popović, B.. (2021). Challenges of contemporary predictive policing. in Thematic conference proceedings of international significance [Elektronski izvor] / International Scientific Conference "Archibald Reiss Days", Belgrade, 9-10 November 2021
Belgrade : University of Criminal Investigation and Police Studies., 513-526.
https://hdl.handle.net/21.15107/rcub_jakov_1290
Vuković I, Čisar P, Kuk K, Popović B. Challenges of contemporary predictive policing. in Thematic conference proceedings of international significance [Elektronski izvor] / International Scientific Conference "Archibald Reiss Days", Belgrade, 9-10 November 2021. 2021;:513-526.
https://hdl.handle.net/21.15107/rcub_jakov_1290 .
Vuković, Igor, Čisar, Petar, Kuk, Kristijan, Popović, Brankica, "Challenges of contemporary predictive policing" in Thematic conference proceedings of international significance [Elektronski izvor] / International Scientific Conference "Archibald Reiss Days", Belgrade, 9-10 November 2021 (2021):513-526,
https://hdl.handle.net/21.15107/rcub_jakov_1290 .

Application of artificial intelligence in detection of DDos attacks

Vuković, Igor; Popović, Brankica; Čisar, Petar

(Belgrade : University of Criminal Investigation and Police Studies, 2020)

TY  - CONF
AU  - Vuković, Igor
AU  - Popović, Brankica
AU  - Čisar, Petar
PY  - 2020
UR  - https://jakov.kpu.edu.rs/handle/123456789/1618
AB  - Services distributed over the Internet are ranging from entertaining and informative to those whose availability must not be interrupted because it affects the quality of life, but also safety and health. Due to its importance, the global computer network is a desirable target, attacks are continually taking place, and the damage is more than considerable. Among the many types of attacks, one of the most effective, given the relationship between the damage done and the challenge to be prevented, detect and control, are DDoS attacks. This paper discusses the phases, components, categories, and types of DDoS attacks and emphasizes detection approaches. The standout approach and one that can answer the complexity of detecting DDoS attacks is the classification with artificial intelligence techniques. This work shows why artificial intelligence represents the starting point for further research in information security.
PB  - Belgrade : University of Criminal Investigation and Police Studies
C3  - Thematic conference proceedings of international significance [Elektronski izvor]
T1  - Application of artificial intelligence in detection of DDos attacks
VL  - 10
SP  - 557
EP  - 566
UR  - https://hdl.handle.net/21.15107/rcub_jakov_1618
ER  - 
@conference{
author = "Vuković, Igor and Popović, Brankica and Čisar, Petar",
year = "2020",
abstract = "Services distributed over the Internet are ranging from entertaining and informative to those whose availability must not be interrupted because it affects the quality of life, but also safety and health. Due to its importance, the global computer network is a desirable target, attacks are continually taking place, and the damage is more than considerable. Among the many types of attacks, one of the most effective, given the relationship between the damage done and the challenge to be prevented, detect and control, are DDoS attacks. This paper discusses the phases, components, categories, and types of DDoS attacks and emphasizes detection approaches. The standout approach and one that can answer the complexity of detecting DDoS attacks is the classification with artificial intelligence techniques. This work shows why artificial intelligence represents the starting point for further research in information security.",
publisher = "Belgrade : University of Criminal Investigation and Police Studies",
journal = "Thematic conference proceedings of international significance [Elektronski izvor]",
title = "Application of artificial intelligence in detection of DDos attacks",
volume = "10",
pages = "557-566",
url = "https://hdl.handle.net/21.15107/rcub_jakov_1618"
}
Vuković, I., Popović, B.,& Čisar, P.. (2020). Application of artificial intelligence in detection of DDos attacks. in Thematic conference proceedings of international significance [Elektronski izvor]
Belgrade : University of Criminal Investigation and Police Studies., 10, 557-566.
https://hdl.handle.net/21.15107/rcub_jakov_1618
Vuković I, Popović B, Čisar P. Application of artificial intelligence in detection of DDos attacks. in Thematic conference proceedings of international significance [Elektronski izvor]. 2020;10:557-566.
https://hdl.handle.net/21.15107/rcub_jakov_1618 .
Vuković, Igor, Popović, Brankica, Čisar, Petar, "Application of artificial intelligence in detection of DDos attacks" in Thematic conference proceedings of international significance [Elektronski izvor], 10 (2020):557-566,
https://hdl.handle.net/21.15107/rcub_jakov_1618 .

Development Concepts of Virtual Reality Software

Čisar, Petar; Maravić Čisar, Sanja

(Timisoara : Faculty Engineering Hunedoara, University Politehnica Timisoara, 2020)

TY  - JOUR
AU  - Čisar, Petar
AU  - Maravić Čisar, Sanja
PY  - 2020
UR  - http://jakov.kpu.edu.rs/handle/123456789/1529
AB  - The evolution of appropriate hardware and software platforms has resulted in intensive increase in suchapplications that have placed their action in the virtual world. This enables users a special experience – the experience of virtual reality (VR). The software for developing VR is in many ways specific and demanding. Having in mind its great diversity, this paper gives an overview of categorizations, general characteristics and evaluation methods. In addition, general principles of VR software development are especially elaborated, with an emphasis on creating and testing games.
PB  - Timisoara : Faculty Engineering Hunedoara, University Politehnica Timisoara
T2  - Acta Technica Corviniensis – Bulletin of Engineering
T1  - Development Concepts of Virtual Reality Software
VL  - 13
IS  - 3
SP  - 23
EP  - 29
UR  - https://hdl.handle.net/21.15107/rcub_jakov_1529
ER  - 
@article{
author = "Čisar, Petar and Maravić Čisar, Sanja",
year = "2020",
abstract = "The evolution of appropriate hardware and software platforms has resulted in intensive increase in suchapplications that have placed their action in the virtual world. This enables users a special experience – the experience of virtual reality (VR). The software for developing VR is in many ways specific and demanding. Having in mind its great diversity, this paper gives an overview of categorizations, general characteristics and evaluation methods. In addition, general principles of VR software development are especially elaborated, with an emphasis on creating and testing games.",
publisher = "Timisoara : Faculty Engineering Hunedoara, University Politehnica Timisoara",
journal = "Acta Technica Corviniensis – Bulletin of Engineering",
title = "Development Concepts of Virtual Reality Software",
volume = "13",
number = "3",
pages = "23-29",
url = "https://hdl.handle.net/21.15107/rcub_jakov_1529"
}
Čisar, P.,& Maravić Čisar, S.. (2020). Development Concepts of Virtual Reality Software. in Acta Technica Corviniensis – Bulletin of Engineering
Timisoara : Faculty Engineering Hunedoara, University Politehnica Timisoara., 13(3), 23-29.
https://hdl.handle.net/21.15107/rcub_jakov_1529
Čisar P, Maravić Čisar S. Development Concepts of Virtual Reality Software. in Acta Technica Corviniensis – Bulletin of Engineering. 2020;13(3):23-29.
https://hdl.handle.net/21.15107/rcub_jakov_1529 .
Čisar, Petar, Maravić Čisar, Sanja, "Development Concepts of Virtual Reality Software" in Acta Technica Corviniensis – Bulletin of Engineering, 13, no. 3 (2020):23-29,
https://hdl.handle.net/21.15107/rcub_jakov_1529 .

Teaching spread spectrum in the course Telecommunication Systems using Octave

Čisar, Petar; Odry, Peter; Maravić Čisar, Sanja; Stankov, Gordana

(Hoboken; NJ : John Wiley & Sons, Inc., 2020)

TY  - JOUR
AU  - Čisar, Petar
AU  - Odry, Peter
AU  - Maravić Čisar, Sanja
AU  - Stankov, Gordana
PY  - 2020
UR  - http://jakov.kpu.edu.rs/handle/123456789/1521
AB  - Spread spectrum is a technique used for transmitting telecommunications signals. This topic is relatively complex and can be challenging for students. Thus, programming language Octave has been introduced in the course curriculum of Telecommunication Systems as one of the powerful tools that aid in student understanding of the spread-spectrum principles. The purpose of this paper is to elaborate on the teaching method of spread-spectrum technique and its application in telecommunications, with the aim to make this topic understandable to students. The participants of the experiment were fifth-semester electrical engineering students (N = 86) at a college of applied sciences. To test the previous knowledge of students needed to understand the theory of spread spectrum, a pretest was carried out which refers to general terms from the fundamentals of telecommunications. With the aim to deeper apprehend the necessary theory from this area, the students had to solve examples from engineering practice using open source software Octave, as well as computational tasks, regarding both methods in spread-spectrum technology. It has been shown that thanks to the visualization of appropriate material, students of the experimental group understood in more detail the method of generating spread-spectrum signals and the influence of individual parameters on partial signals, in relation to students who did not have the opportunity to use Octave. The results of the research lead us to conclude that software like Octave should be included in courses like Telecommunication Systems as a supplement to the traditional teaching and learning methods.
PB  - Hoboken; NJ : John Wiley & Sons, Inc.
PB  - Chichester, West Sussex : John Wiley & Sons Ltd.
T2  - Computer Applications in Engineering Education
T1  - Teaching spread spectrum in the course Telecommunication Systems using Octave
VL  - 28
IS  - 2
SP  - 367
EP  - 383
DO  - 10.1002/cae.22199
ER  - 
@article{
author = "Čisar, Petar and Odry, Peter and Maravić Čisar, Sanja and Stankov, Gordana",
year = "2020",
abstract = "Spread spectrum is a technique used for transmitting telecommunications signals. This topic is relatively complex and can be challenging for students. Thus, programming language Octave has been introduced in the course curriculum of Telecommunication Systems as one of the powerful tools that aid in student understanding of the spread-spectrum principles. The purpose of this paper is to elaborate on the teaching method of spread-spectrum technique and its application in telecommunications, with the aim to make this topic understandable to students. The participants of the experiment were fifth-semester electrical engineering students (N = 86) at a college of applied sciences. To test the previous knowledge of students needed to understand the theory of spread spectrum, a pretest was carried out which refers to general terms from the fundamentals of telecommunications. With the aim to deeper apprehend the necessary theory from this area, the students had to solve examples from engineering practice using open source software Octave, as well as computational tasks, regarding both methods in spread-spectrum technology. It has been shown that thanks to the visualization of appropriate material, students of the experimental group understood in more detail the method of generating spread-spectrum signals and the influence of individual parameters on partial signals, in relation to students who did not have the opportunity to use Octave. The results of the research lead us to conclude that software like Octave should be included in courses like Telecommunication Systems as a supplement to the traditional teaching and learning methods.",
publisher = "Hoboken; NJ : John Wiley & Sons, Inc., Chichester, West Sussex : John Wiley & Sons Ltd.",
journal = "Computer Applications in Engineering Education",
title = "Teaching spread spectrum in the course Telecommunication Systems using Octave",
volume = "28",
number = "2",
pages = "367-383",
doi = "10.1002/cae.22199"
}
Čisar, P., Odry, P., Maravić Čisar, S.,& Stankov, G.. (2020). Teaching spread spectrum in the course Telecommunication Systems using Octave. in Computer Applications in Engineering Education
Hoboken; NJ : John Wiley & Sons, Inc.., 28(2), 367-383.
https://doi.org/10.1002/cae.22199
Čisar P, Odry P, Maravić Čisar S, Stankov G. Teaching spread spectrum in the course Telecommunication Systems using Octave. in Computer Applications in Engineering Education. 2020;28(2):367-383.
doi:10.1002/cae.22199 .
Čisar, Petar, Odry, Peter, Maravić Čisar, Sanja, Stankov, Gordana, "Teaching spread spectrum in the course Telecommunication Systems using Octave" in Computer Applications in Engineering Education, 28, no. 2 (2020):367-383,
https://doi.org/10.1002/cae.22199 . .
5

Heuristic scanning and sandbox approach in malware detection

Čisar, Petar; Joksimović, Dušan

(Belgrade : University of Criminal Investigation and Police Studies, 2019)

TY  - CONF
AU  - Čisar, Petar
AU  - Joksimović, Dušan
PY  - 2019
UR  - http://jakov.kpu.edu.rs/handle/123456789/1360
AB  - A heuristic approach in malware detection is similar to the method of detecting anomalies applied to the intrusion detection system (IDS). It speeds up the process of finding sufficiently good solution in situations where the implementation of detailed research is not practical or is very time-consuming - for example, using various general rules, informed speculation, intuition and common sense. Instead of looking for matches (like in static signature-based detection), heuristic intrusion detection looks for behavior that is out of ordinary, with regards to a baseline of the normal network traffic and activity. Heuristic scanning uses rules and/or algorithms to look for commands which may indicate malicious intent without needing a signature. Analysis of static signatures will fail to catch new types of attacks but have usually less false positives. Heuristics might catch more new malware but this usually comes with higher false positive rate. Because of that, most modern and efficient IDS software uses both signature and heuristic-based methods in combination, with the goal of increasing the chance to detect and remove malware. In parallel with the heuristic and signature-based method, sandboxing approach is also used in detection of network anomalies. This is a software management technique that isolates examined applications from critical system resources and other programs. Without sandboxing, an application may have unrestricted access to all system resources and user data
on a computer. Similar to heuristics, this method also has its benefits and limitations. The general conclusion is that the best network security can be achieved utilizing more methods simultaneously - by multi-scanning (scanning with multiple anti-malware engines).
PB  - Belgrade : University of Criminal Investigation and Police Studies
C3  - Thematic conference proceedings of international significance. Vol. 2 / International scientific conference "Archibald Reiss Days", Belgrade, 6-7 November 2019.
T1  - Heuristic scanning and sandbox approach in malware detection
SP  - 299
EP  - 308
UR  - https://hdl.handle.net/21.15107/rcub_jakov_1360
ER  - 
@conference{
author = "Čisar, Petar and Joksimović, Dušan",
year = "2019",
abstract = "A heuristic approach in malware detection is similar to the method of detecting anomalies applied to the intrusion detection system (IDS). It speeds up the process of finding sufficiently good solution in situations where the implementation of detailed research is not practical or is very time-consuming - for example, using various general rules, informed speculation, intuition and common sense. Instead of looking for matches (like in static signature-based detection), heuristic intrusion detection looks for behavior that is out of ordinary, with regards to a baseline of the normal network traffic and activity. Heuristic scanning uses rules and/or algorithms to look for commands which may indicate malicious intent without needing a signature. Analysis of static signatures will fail to catch new types of attacks but have usually less false positives. Heuristics might catch more new malware but this usually comes with higher false positive rate. Because of that, most modern and efficient IDS software uses both signature and heuristic-based methods in combination, with the goal of increasing the chance to detect and remove malware. In parallel with the heuristic and signature-based method, sandboxing approach is also used in detection of network anomalies. This is a software management technique that isolates examined applications from critical system resources and other programs. Without sandboxing, an application may have unrestricted access to all system resources and user data
on a computer. Similar to heuristics, this method also has its benefits and limitations. The general conclusion is that the best network security can be achieved utilizing more methods simultaneously - by multi-scanning (scanning with multiple anti-malware engines).",
publisher = "Belgrade : University of Criminal Investigation and Police Studies",
journal = "Thematic conference proceedings of international significance. Vol. 2 / International scientific conference "Archibald Reiss Days", Belgrade, 6-7 November 2019.",
title = "Heuristic scanning and sandbox approach in malware detection",
pages = "299-308",
url = "https://hdl.handle.net/21.15107/rcub_jakov_1360"
}
Čisar, P.,& Joksimović, D.. (2019). Heuristic scanning and sandbox approach in malware detection. in Thematic conference proceedings of international significance. Vol. 2 / International scientific conference "Archibald Reiss Days", Belgrade, 6-7 November 2019.
Belgrade : University of Criminal Investigation and Police Studies., 299-308.
https://hdl.handle.net/21.15107/rcub_jakov_1360
Čisar P, Joksimović D. Heuristic scanning and sandbox approach in malware detection. in Thematic conference proceedings of international significance. Vol. 2 / International scientific conference "Archibald Reiss Days", Belgrade, 6-7 November 2019.. 2019;:299-308.
https://hdl.handle.net/21.15107/rcub_jakov_1360 .
Čisar, Petar, Joksimović, Dušan, "Heuristic scanning and sandbox approach in malware detection" in Thematic conference proceedings of international significance. Vol. 2 / International scientific conference "Archibald Reiss Days", Belgrade, 6-7 November 2019. (2019):299-308,
https://hdl.handle.net/21.15107/rcub_jakov_1360 .

Security Aspects of 5G Mobile Networks

Čisar, Petar; Maravić Čisar, Sanja

(Timisoara : University Politehnica, 2019)

TY  - JOUR
AU  - Čisar, Petar
AU  - Maravić Čisar, Sanja
PY  - 2019
UR  - http://jakov.kpu.edu.rs/handle/123456789/1527
AB  - 5G (or fifth generation) represents the latest generation of mobile network technology, whose implementation is underway in some countries. This mobile system has undeniable advantages over its predecessors. This paper gives an overview of security aspects of 5G networks, based on data derived from available literature. Authentication and key management are fundamental processes to the security of cellular networks. That is why the emphasis in the paper is put on elaborating these security methods and comparing features with the previous 4G system. Authentication components in 5G are different in regard to 4G because of the new service–based architecture. Further, 3GPP and non–3GPP access networks are treated more equally. Also, in case of 5G, the user equipment uses the public key of the home network to encrypt permanent identifier before it is sent to a network. In 4G, this identifier is sent as clear text (unencrypted). Key structure is longer in 5G than in 4G because of the implementation of two additional keys. Despite the evident advantages, consideration must be given to the security challenges brought to 5G networks by new services, architectures and technologies. For example, authentication in 5G is not without deficiencies. Namely, user tracking ability in 5G may still be possible.
PB  - Timisoara : University Politehnica
T2  - ANNALS of the Faculty Engineering Hunedoara – International Journal of Engineering (Online)
T1  - Security Aspects of 5G Mobile Networks
VL  - 17
IS  - 4
SP  - 137
EP  - 143
UR  - https://hdl.handle.net/21.15107/rcub_jakov_1527
ER  - 
@article{
author = "Čisar, Petar and Maravić Čisar, Sanja",
year = "2019",
abstract = "5G (or fifth generation) represents the latest generation of mobile network technology, whose implementation is underway in some countries. This mobile system has undeniable advantages over its predecessors. This paper gives an overview of security aspects of 5G networks, based on data derived from available literature. Authentication and key management are fundamental processes to the security of cellular networks. That is why the emphasis in the paper is put on elaborating these security methods and comparing features with the previous 4G system. Authentication components in 5G are different in regard to 4G because of the new service–based architecture. Further, 3GPP and non–3GPP access networks are treated more equally. Also, in case of 5G, the user equipment uses the public key of the home network to encrypt permanent identifier before it is sent to a network. In 4G, this identifier is sent as clear text (unencrypted). Key structure is longer in 5G than in 4G because of the implementation of two additional keys. Despite the evident advantages, consideration must be given to the security challenges brought to 5G networks by new services, architectures and technologies. For example, authentication in 5G is not without deficiencies. Namely, user tracking ability in 5G may still be possible.",
publisher = "Timisoara : University Politehnica",
journal = "ANNALS of the Faculty Engineering Hunedoara – International Journal of Engineering (Online)",
title = "Security Aspects of 5G Mobile Networks",
volume = "17",
number = "4",
pages = "137-143",
url = "https://hdl.handle.net/21.15107/rcub_jakov_1527"
}
Čisar, P.,& Maravić Čisar, S.. (2019). Security Aspects of 5G Mobile Networks. in ANNALS of the Faculty Engineering Hunedoara – International Journal of Engineering (Online)
Timisoara : University Politehnica., 17(4), 137-143.
https://hdl.handle.net/21.15107/rcub_jakov_1527
Čisar P, Maravić Čisar S. Security Aspects of 5G Mobile Networks. in ANNALS of the Faculty Engineering Hunedoara – International Journal of Engineering (Online). 2019;17(4):137-143.
https://hdl.handle.net/21.15107/rcub_jakov_1527 .
Čisar, Petar, Maravić Čisar, Sanja, "Security Aspects of 5G Mobile Networks" in ANNALS of the Faculty Engineering Hunedoara – International Journal of Engineering (Online), 17, no. 4 (2019):137-143,
https://hdl.handle.net/21.15107/rcub_jakov_1527 .

EWMA Statistics and Fuzzy Logic in Function of Network Anomaly Detection

Čisar, Petar; Maravić Čisar, Sanja

(Niš: Faculty of Electronic Engineering, University of Niš, 2019)

TY  - JOUR
AU  - Čisar, Petar
AU  - Maravić Čisar, Sanja
PY  - 2019
UR  - http://jakov.kpu.edu.rs/handle/123456789/1525
AB  - Anomaly detection is used to monitor and capture traffic anomalies in network systems. Many anomalies manifest in changes in the intensity of network events. Because of the ability of EWMA control chart to monitor the rate of occurrences of events based on their intensity, this statistic is appropriate for implementation in control limits based algorithms. The performance of standard EWMA algorithm can be made more effective combining the logic of adaptive threshold algorithm and adequate application of fuzzy theory. This paper analyzes the theoretical possibility of applying EWMA statistics and fuzzy logic to detect network anomalies. Different aspects of fuzzy rules are discussed as well as different membership functions, trying to find the most adequate choice. It is shown that the introduction of fuzzy logic in standard EWMA algorithm for anomaly detection opens the possibility of previous warning from a network attack. Besides, fuzzy logic enables precise determination of degree of the risk.
PB  - Niš: Faculty of Electronic Engineering, University of Niš
T2  - Facta Universitatis. Series: Mechanical Engineering (Online)
T1  - EWMA Statistics and Fuzzy Logic in Function of Network Anomaly Detection
VL  - 32
IS  - 2
SP  - 249
EP  - 265
DO  - 10.2298/FUEE1902249C
ER  - 
@article{
author = "Čisar, Petar and Maravić Čisar, Sanja",
year = "2019",
abstract = "Anomaly detection is used to monitor and capture traffic anomalies in network systems. Many anomalies manifest in changes in the intensity of network events. Because of the ability of EWMA control chart to monitor the rate of occurrences of events based on their intensity, this statistic is appropriate for implementation in control limits based algorithms. The performance of standard EWMA algorithm can be made more effective combining the logic of adaptive threshold algorithm and adequate application of fuzzy theory. This paper analyzes the theoretical possibility of applying EWMA statistics and fuzzy logic to detect network anomalies. Different aspects of fuzzy rules are discussed as well as different membership functions, trying to find the most adequate choice. It is shown that the introduction of fuzzy logic in standard EWMA algorithm for anomaly detection opens the possibility of previous warning from a network attack. Besides, fuzzy logic enables precise determination of degree of the risk.",
publisher = "Niš: Faculty of Electronic Engineering, University of Niš",
journal = "Facta Universitatis. Series: Mechanical Engineering (Online)",
title = "EWMA Statistics and Fuzzy Logic in Function of Network Anomaly Detection",
volume = "32",
number = "2",
pages = "249-265",
doi = "10.2298/FUEE1902249C"
}
Čisar, P.,& Maravić Čisar, S.. (2019). EWMA Statistics and Fuzzy Logic in Function of Network Anomaly Detection. in Facta Universitatis. Series: Mechanical Engineering (Online)
Niš: Faculty of Electronic Engineering, University of Niš., 32(2), 249-265.
https://doi.org/10.2298/FUEE1902249C
Čisar P, Maravić Čisar S. EWMA Statistics and Fuzzy Logic in Function of Network Anomaly Detection. in Facta Universitatis. Series: Mechanical Engineering (Online). 2019;32(2):249-265.
doi:10.2298/FUEE1902249C .
Čisar, Petar, Maravić Čisar, Sanja, "EWMA Statistics and Fuzzy Logic in Function of Network Anomaly Detection" in Facta Universitatis. Series: Mechanical Engineering (Online), 32, no. 2 (2019):249-265,
https://doi.org/10.2298/FUEE1902249C . .
6

Supervisory system for physical objects spatial location detection

Borović, V.; Spalević, P.; Čisar, Petar; Rančić, Dejan; Jović, Srđan

(2019)

TY  - JOUR
AU  - Borović, V.
AU  - Spalević, P.
AU  - Čisar, Petar
AU  - Rančić, Dejan
AU  - Jović, Srđan
PY  - 2019
UR  - http://jakov.kpu.edu.rs/handle/123456789/873
AB  - In this paper was proposed the simple concept and realization of the technical system, for physical objects spatial location detection, with optimization methods for low quality hardware. This computer system consists of computers, software applications, video cameras, computer network, active and passive network equipment. The basic idea of the system is the principle of triangulation by the visual images and time data from at least 4 cameras with high number of frames per second. The system then creates photorealistic graphical 3D animation of object trajectory and space, using the calculated spatial location data. Experimental results and a computer simulation of a real system indicated that the proposed concept improves objects spatial location detection and 3D graphics on medium quality technical equipment.
T2  - Physica A: Statistical Mechanics and its Applications
T1  - Supervisory system for physical objects spatial location detection
VL  - 521
SP  - 781
EP  - 795
DO  - 10.1016/j.physa.2019.01.023
ER  - 
@article{
author = "Borović, V. and Spalević, P. and Čisar, Petar and Rančić, Dejan and Jović, Srđan",
year = "2019",
abstract = "In this paper was proposed the simple concept and realization of the technical system, for physical objects spatial location detection, with optimization methods for low quality hardware. This computer system consists of computers, software applications, video cameras, computer network, active and passive network equipment. The basic idea of the system is the principle of triangulation by the visual images and time data from at least 4 cameras with high number of frames per second. The system then creates photorealistic graphical 3D animation of object trajectory and space, using the calculated spatial location data. Experimental results and a computer simulation of a real system indicated that the proposed concept improves objects spatial location detection and 3D graphics on medium quality technical equipment.",
journal = "Physica A: Statistical Mechanics and its Applications",
title = "Supervisory system for physical objects spatial location detection",
volume = "521",
pages = "781-795",
doi = "10.1016/j.physa.2019.01.023"
}
Borović, V., Spalević, P., Čisar, P., Rančić, D.,& Jović, S.. (2019). Supervisory system for physical objects spatial location detection. in Physica A: Statistical Mechanics and its Applications, 521, 781-795.
https://doi.org/10.1016/j.physa.2019.01.023
Borović V, Spalević P, Čisar P, Rančić D, Jović S. Supervisory system for physical objects spatial location detection. in Physica A: Statistical Mechanics and its Applications. 2019;521:781-795.
doi:10.1016/j.physa.2019.01.023 .
Borović, V., Spalević, P., Čisar, Petar, Rančić, Dejan, Jović, Srđan, "Supervisory system for physical objects spatial location detection" in Physica A: Statistical Mechanics and its Applications, 521 (2019):781-795,
https://doi.org/10.1016/j.physa.2019.01.023 . .
1

Overview of Some Security Aspectsof Smart Phones

Čisar, Petar; Rudas, Imre

(Belgrade : Academy of Criminalistic and Police Studies, 2018)

TY  - CONF
AU  - Čisar, Petar
AU  - Rudas, Imre
PY  - 2018
UR  - http://jakov.kpu.edu.rs/handle/123456789/935
AB  - Smart phones or mobile phones with advanced capabilities are used by more people. Their popularity and relatively weaker security level have made them attractive targets for attackers. Mobile phone security in the beginning has not kept pace with traditional computer security. Security methods, such as firewalls, antivirus software and encryption, were insufficiently represented on mobile phones, and mobile operating systems were not updated as frequently as those on personal computers. However, mobile security nowadays is a rapidly growing field in the security area. With the increase in the number of mobile devices and their applications, the need for mobile security has increased extremely over the past several years. This paper gives an overview of some of the security aspects that must be considered when choosing a particular model of a smart phone with a satisfactory level of security: biometrics, encryption, hardware-assisted security, sandboxed user data, VPN possibility etc. A special accent in the paper is placed on newer types of processors as one of the most important components of the mobile device and their security possibilities. A comparative analysis of the key technical characteristics of the most commonly used newer processors is also given. In addition, the paper also focuses on the use of mobile security software and Android browsers, pointing out its numerous useful features.
PB  - Belgrade : Academy of Criminalistic and Police Studies
C3  - Thematic conference proceedings of international significance. Vol. 2 / International Scientific Conference "Archibald Reiss Days", Belgrade, 2-3 October 2018
T1  - Overview of Some Security Aspectsof Smart Phones
SP  - 383
EP  - 393
UR  - https://hdl.handle.net/21.15107/rcub_jakov_935
ER  - 
@conference{
author = "Čisar, Petar and Rudas, Imre",
year = "2018",
abstract = "Smart phones or mobile phones with advanced capabilities are used by more people. Their popularity and relatively weaker security level have made them attractive targets for attackers. Mobile phone security in the beginning has not kept pace with traditional computer security. Security methods, such as firewalls, antivirus software and encryption, were insufficiently represented on mobile phones, and mobile operating systems were not updated as frequently as those on personal computers. However, mobile security nowadays is a rapidly growing field in the security area. With the increase in the number of mobile devices and their applications, the need for mobile security has increased extremely over the past several years. This paper gives an overview of some of the security aspects that must be considered when choosing a particular model of a smart phone with a satisfactory level of security: biometrics, encryption, hardware-assisted security, sandboxed user data, VPN possibility etc. A special accent in the paper is placed on newer types of processors as one of the most important components of the mobile device and their security possibilities. A comparative analysis of the key technical characteristics of the most commonly used newer processors is also given. In addition, the paper also focuses on the use of mobile security software and Android browsers, pointing out its numerous useful features.",
publisher = "Belgrade : Academy of Criminalistic and Police Studies",
journal = "Thematic conference proceedings of international significance. Vol. 2 / International Scientific Conference "Archibald Reiss Days", Belgrade, 2-3 October 2018",
title = "Overview of Some Security Aspectsof Smart Phones",
pages = "383-393",
url = "https://hdl.handle.net/21.15107/rcub_jakov_935"
}
Čisar, P.,& Rudas, I.. (2018). Overview of Some Security Aspectsof Smart Phones. in Thematic conference proceedings of international significance. Vol. 2 / International Scientific Conference "Archibald Reiss Days", Belgrade, 2-3 October 2018
Belgrade : Academy of Criminalistic and Police Studies., 383-393.
https://hdl.handle.net/21.15107/rcub_jakov_935
Čisar P, Rudas I. Overview of Some Security Aspectsof Smart Phones. in Thematic conference proceedings of international significance. Vol. 2 / International Scientific Conference "Archibald Reiss Days", Belgrade, 2-3 October 2018. 2018;:383-393.
https://hdl.handle.net/21.15107/rcub_jakov_935 .
Čisar, Petar, Rudas, Imre, "Overview of Some Security Aspectsof Smart Phones" in Thematic conference proceedings of international significance. Vol. 2 / International Scientific Conference "Archibald Reiss Days", Belgrade, 2-3 October 2018 (2018):383-393,
https://hdl.handle.net/21.15107/rcub_jakov_935 .

Implementation of Software-Defined Networks Using Open-Source Environment

Čisar, Petar; Erlenvajn, Dragan; Maravić-Cisar, Sanja

(Faculty of Mechanical Engineering in Slavonski Brod, Faculty of Electrical Engineering in Osijek, Faculty of Civil Engineering in Osijek, 2018)

TY  - JOUR
AU  - Čisar, Petar
AU  - Erlenvajn, Dragan
AU  - Maravić-Cisar, Sanja
PY  - 2018
UR  - http://jakov.kpu.edu.rs/handle/123456789/842
AB  - The paper gives an overview and analysis of software-defined technologies in the context of the actual problems of conventional computer networks. The virtualization process lies at the basis of software-defined network architecture. The basic concepts of software-defined networks are elaborated, as well as their implementation and configuration in cloud environment using OpenStack open-source software with Microsoft Hyper-V hypervisor. The practical part of this research showed that the implementation of a software-defined network into an existing standard network is relatively simple to realize, remaining all the time in open-source framework. All existing network functionalities were held, and it is also possible to provide additional network operations such as traffic monitoring in a completely open-source environment.
PB  - Faculty of Mechanical Engineering in Slavonski Brod, Faculty of Electrical Engineering in Osijek, Faculty of Civil Engineering in Osijek
T2  - Tehnicki vjesnik - Technical gazette
T1  - Implementation of Software-Defined Networks Using Open-Source Environment
VL  - 25
SP  - 222
EP  - 230
DO  - 10.17559/TV-20160928094756
ER  - 
@article{
author = "Čisar, Petar and Erlenvajn, Dragan and Maravić-Cisar, Sanja",
year = "2018",
abstract = "The paper gives an overview and analysis of software-defined technologies in the context of the actual problems of conventional computer networks. The virtualization process lies at the basis of software-defined network architecture. The basic concepts of software-defined networks are elaborated, as well as their implementation and configuration in cloud environment using OpenStack open-source software with Microsoft Hyper-V hypervisor. The practical part of this research showed that the implementation of a software-defined network into an existing standard network is relatively simple to realize, remaining all the time in open-source framework. All existing network functionalities were held, and it is also possible to provide additional network operations such as traffic monitoring in a completely open-source environment.",
publisher = "Faculty of Mechanical Engineering in Slavonski Brod, Faculty of Electrical Engineering in Osijek, Faculty of Civil Engineering in Osijek",
journal = "Tehnicki vjesnik - Technical gazette",
title = "Implementation of Software-Defined Networks Using Open-Source Environment",
volume = "25",
pages = "222-230",
doi = "10.17559/TV-20160928094756"
}
Čisar, P., Erlenvajn, D.,& Maravić-Cisar, S.. (2018). Implementation of Software-Defined Networks Using Open-Source Environment. in Tehnicki vjesnik - Technical gazette
Faculty of Mechanical Engineering in Slavonski Brod, Faculty of Electrical Engineering in Osijek, Faculty of Civil Engineering in Osijek., 25, 222-230.
https://doi.org/10.17559/TV-20160928094756
Čisar P, Erlenvajn D, Maravić-Cisar S. Implementation of Software-Defined Networks Using Open-Source Environment. in Tehnicki vjesnik - Technical gazette. 2018;25:222-230.
doi:10.17559/TV-20160928094756 .
Čisar, Petar, Erlenvajn, Dragan, Maravić-Cisar, Sanja, "Implementation of Software-Defined Networks Using Open-Source Environment" in Tehnicki vjesnik - Technical gazette, 25 (2018):222-230,
https://doi.org/10.17559/TV-20160928094756 . .
3
4

Ethical Hacking of Wireless Networks in Kali Linux Environment

Čisar, P.; Maravić Čisar, S.

(Timisoara : University Politehnica, 2018)

TY  - JOUR
AU  - Čisar, P.
AU  - Maravić Čisar, S.
PY  - 2018
UR  - http://jakov.kpu.edu.rs/handle/123456789/1528
AB  - The topic of this paper is related to the wireless network security problems. For identifying existing security weaknesses, there is a variety of approaches among which is Kali Linux operating system. General cracking procedure of wireless networks consists of several steps. The efficiency of cracking the key and determining the password are the two essentials on which the effectivenss of the procedure depends on. This phase of cracking is also the most demanding. A large collection of different tools for vulnerability assessment and penetration testing designed primarily for ethical hacking is undoubtedly the benefit of this operating system.
PB  - Timisoara : University Politehnica
T2  - ANNALS of the Faculty Engineering Hunedoara – International Journal of Engineering (Online)
T1  - Ethical Hacking of Wireless Networks in Kali Linux Environment
VL  - 16
IS  - 3
SP  - 181
EP  - 186
UR  - https://hdl.handle.net/21.15107/rcub_jakov_1528
ER  - 
@article{
author = "Čisar, P. and Maravić Čisar, S.",
year = "2018",
abstract = "The topic of this paper is related to the wireless network security problems. For identifying existing security weaknesses, there is a variety of approaches among which is Kali Linux operating system. General cracking procedure of wireless networks consists of several steps. The efficiency of cracking the key and determining the password are the two essentials on which the effectivenss of the procedure depends on. This phase of cracking is also the most demanding. A large collection of different tools for vulnerability assessment and penetration testing designed primarily for ethical hacking is undoubtedly the benefit of this operating system.",
publisher = "Timisoara : University Politehnica",
journal = "ANNALS of the Faculty Engineering Hunedoara – International Journal of Engineering (Online)",
title = "Ethical Hacking of Wireless Networks in Kali Linux Environment",
volume = "16",
number = "3",
pages = "181-186",
url = "https://hdl.handle.net/21.15107/rcub_jakov_1528"
}
Čisar, P.,& Maravić Čisar, S.. (2018). Ethical Hacking of Wireless Networks in Kali Linux Environment. in ANNALS of the Faculty Engineering Hunedoara – International Journal of Engineering (Online)
Timisoara : University Politehnica., 16(3), 181-186.
https://hdl.handle.net/21.15107/rcub_jakov_1528
Čisar P, Maravić Čisar S. Ethical Hacking of Wireless Networks in Kali Linux Environment. in ANNALS of the Faculty Engineering Hunedoara – International Journal of Engineering (Online). 2018;16(3):181-186.
https://hdl.handle.net/21.15107/rcub_jakov_1528 .
Čisar, P., Maravić Čisar, S., "Ethical Hacking of Wireless Networks in Kali Linux Environment" in ANNALS of the Faculty Engineering Hunedoara – International Journal of Engineering (Online), 16, no. 3 (2018):181-186,
https://hdl.handle.net/21.15107/rcub_jakov_1528 .

The Design of the Personal Enemy - MIMLeBot as an Intelligent Agent in a Game-based Learning Environment

Kuk, Kristijan; Milentijević, Ivan Z.; Ranđelović, Dragan; Popović, Brankica; Čisar, Petar

(Budapest Tech, Budapest, 2017)

TY  - JOUR
AU  - Kuk, Kristijan
AU  - Milentijević, Ivan Z.
AU  - Ranđelović, Dragan
AU  - Popović, Brankica
AU  - Čisar, Petar
PY  - 2017
UR  - http://jakov.kpu.edu.rs/handle/123456789/756
AB  - A bot is one of the main elements of all computer video games, frequently used for the creation of various opponent characters within a game. Opponent modeling is the problem of predicting the agent actions in a gaming environment. This paper proposes and describes the implementation of a bot as a personal opponent in a small educational game. In order to increase the efficiency when using such a small educational application/module, artificial intelligence was added in the form of a bot competing with the students. Pedagogical elements of the intelligent learning system are introduced through the pedagogical model and the student model. This paper demonstrates the use of the student model to present the player model built by the experience of a human teacher, with true/false questions incorporated with the bot strategy into the opponent model. The authors use the Monte Carlo approach in this implementation, known as artificial intelligence technique and a best-first search method used in most video games, but to the best of their knowledge, it has not been used for prediction in educational games based on bot strategy. The results highlight that the Monte Carlo approach presented via the BFTree classifier provides the best classification accuracy compared with other predictive models based on data mining classifiers. It was shown that the training data from the human player can help in creating a bot strategy for a personalized game-based learning system. The Help option can be used for the assessment of the students' current knowledge by counting the number of Help option accesses, the player relies on Help as a 'source of knowledge' needed to complete the game task successfully. The obtained results show that the bot (personal opponent) stimulated players to replay the game multiple times, which may contribute to the increase of the students' knowledge.
PB  - Budapest Tech, Budapest
T2  - Acta polytechnica hungarica
T1  - The Design of the Personal Enemy - MIMLeBot as an Intelligent Agent in a Game-based Learning Environment
VL  - 14
IS  - 4
SP  - 121
EP  - 139
DO  - 10.12700/APH.14.4.2017.4.7
ER  - 
@article{
author = "Kuk, Kristijan and Milentijević, Ivan Z. and Ranđelović, Dragan and Popović, Brankica and Čisar, Petar",
year = "2017",
abstract = "A bot is one of the main elements of all computer video games, frequently used for the creation of various opponent characters within a game. Opponent modeling is the problem of predicting the agent actions in a gaming environment. This paper proposes and describes the implementation of a bot as a personal opponent in a small educational game. In order to increase the efficiency when using such a small educational application/module, artificial intelligence was added in the form of a bot competing with the students. Pedagogical elements of the intelligent learning system are introduced through the pedagogical model and the student model. This paper demonstrates the use of the student model to present the player model built by the experience of a human teacher, with true/false questions incorporated with the bot strategy into the opponent model. The authors use the Monte Carlo approach in this implementation, known as artificial intelligence technique and a best-first search method used in most video games, but to the best of their knowledge, it has not been used for prediction in educational games based on bot strategy. The results highlight that the Monte Carlo approach presented via the BFTree classifier provides the best classification accuracy compared with other predictive models based on data mining classifiers. It was shown that the training data from the human player can help in creating a bot strategy for a personalized game-based learning system. The Help option can be used for the assessment of the students' current knowledge by counting the number of Help option accesses, the player relies on Help as a 'source of knowledge' needed to complete the game task successfully. The obtained results show that the bot (personal opponent) stimulated players to replay the game multiple times, which may contribute to the increase of the students' knowledge.",
publisher = "Budapest Tech, Budapest",
journal = "Acta polytechnica hungarica",
title = "The Design of the Personal Enemy - MIMLeBot as an Intelligent Agent in a Game-based Learning Environment",
volume = "14",
number = "4",
pages = "121-139",
doi = "10.12700/APH.14.4.2017.4.7"
}
Kuk, K., Milentijević, I. Z., Ranđelović, D., Popović, B.,& Čisar, P.. (2017). The Design of the Personal Enemy - MIMLeBot as an Intelligent Agent in a Game-based Learning Environment. in Acta polytechnica hungarica
Budapest Tech, Budapest., 14(4), 121-139.
https://doi.org/10.12700/APH.14.4.2017.4.7
Kuk K, Milentijević IZ, Ranđelović D, Popović B, Čisar P. The Design of the Personal Enemy - MIMLeBot as an Intelligent Agent in a Game-based Learning Environment. in Acta polytechnica hungarica. 2017;14(4):121-139.
doi:10.12700/APH.14.4.2017.4.7 .
Kuk, Kristijan, Milentijević, Ivan Z., Ranđelović, Dragan, Popović, Brankica, Čisar, Petar, "The Design of the Personal Enemy - MIMLeBot as an Intelligent Agent in a Game-based Learning Environment" in Acta polytechnica hungarica, 14, no. 4 (2017):121-139,
https://doi.org/10.12700/APH.14.4.2017.4.7 . .
4
2
5

General aspects of application it security

Čisar, Petar

(Kriminalističko- policijska akademija, Beograd, 2017)

TY  - JOUR
AU  - Čisar, Petar
PY  - 2017
UR  - http://jakov.kpu.edu.rs/handle/123456789/769
AB  - To achieve a satisfactory level of security of an information system, different system and application methods are applied. The paper has a focus on general aspects of application IT security, thereby giving an overview of security methods applied to the web and mobile applications. In accordance with the OWASP report, out of web vulnerabilities the most common include SQL Injection and Cross-site Scripting type of attacks. The paper also emphasizes the role of code analysis tools, which contribute to the detection of vulnerabilities of analyzed application. In the context of mobile applications, Android operating system is especially featured, as one of the most commonly used. The necessary environment and tools for testing the security of Android applications are elaborate, vulnerabilities highlighted and a greater number of security recommendations are offered. In the field of application security, some of the newer solutions are shown, such as RASP approach. The paper particularly emphasizes the importance of security testing of applications, with accent on testing phase. Finally, in addition to the previously explained application of security methods, an overview of security methods of a general character is given.
AB  - Za postizanje zadovoljavajućeg nivoa bezbednosti jednog informacionog sistema primenjuju se sistemske i aplikativne mere. Rad je fokusiran na opšte aspekte aplikativne IT bezbednosti, uz pregled bezbednosnih metoda primenjenih na veb i mobilne aplikacije. U skladu sa izveštajem OWASP, od veb-ranjivosti izdvojeni su, kao najčešći, napadi tipa SQL Injection i Cross-site Scripting. U radu je istaknuta i uloga alata za analizu koda, koji doprinose detekciji bezbednosnih propusta analizirane aplikacije. U kontekstu mobilnih aplikacija, posebno je izdvojen operativni sistem Android, kao jedan od najčešće korišćenih. Elaborirani su neophodni alati i okruženja za ispitivanje bezbednosti Android aplikacija, istaknute su ranjivosti i dat je veći broj bezbednosnih preporuka. U domenu aplikativne bezbednosti prikazana su i neka od novijih rešenja, kao što je pristup RASP. U radu je posebno istaknut značaj testiranja bezbednosti aplikacija, s akcentom na faze testiranja. Na kraju je, pored prethodno objašnjenih aplikativnih bezbednosnih metoda, dat i pregled metoda zaštite opšteg karaktera.
PB  - Kriminalističko- policijska akademija, Beograd
T2  - Nauka, bezbednost, policija
T1  - General aspects of application it security
T1  - Opšti aspekti aplikativne it bezbednosti
VL  - 22
IS  - 2
SP  - 33
EP  - 46
DO  - 10.5937/nabepo22-13128
ER  - 
@article{
author = "Čisar, Petar",
year = "2017",
abstract = "To achieve a satisfactory level of security of an information system, different system and application methods are applied. The paper has a focus on general aspects of application IT security, thereby giving an overview of security methods applied to the web and mobile applications. In accordance with the OWASP report, out of web vulnerabilities the most common include SQL Injection and Cross-site Scripting type of attacks. The paper also emphasizes the role of code analysis tools, which contribute to the detection of vulnerabilities of analyzed application. In the context of mobile applications, Android operating system is especially featured, as one of the most commonly used. The necessary environment and tools for testing the security of Android applications are elaborate, vulnerabilities highlighted and a greater number of security recommendations are offered. In the field of application security, some of the newer solutions are shown, such as RASP approach. The paper particularly emphasizes the importance of security testing of applications, with accent on testing phase. Finally, in addition to the previously explained application of security methods, an overview of security methods of a general character is given., Za postizanje zadovoljavajućeg nivoa bezbednosti jednog informacionog sistema primenjuju se sistemske i aplikativne mere. Rad je fokusiran na opšte aspekte aplikativne IT bezbednosti, uz pregled bezbednosnih metoda primenjenih na veb i mobilne aplikacije. U skladu sa izveštajem OWASP, od veb-ranjivosti izdvojeni su, kao najčešći, napadi tipa SQL Injection i Cross-site Scripting. U radu je istaknuta i uloga alata za analizu koda, koji doprinose detekciji bezbednosnih propusta analizirane aplikacije. U kontekstu mobilnih aplikacija, posebno je izdvojen operativni sistem Android, kao jedan od najčešće korišćenih. Elaborirani su neophodni alati i okruženja za ispitivanje bezbednosti Android aplikacija, istaknute su ranjivosti i dat je veći broj bezbednosnih preporuka. U domenu aplikativne bezbednosti prikazana su i neka od novijih rešenja, kao što je pristup RASP. U radu je posebno istaknut značaj testiranja bezbednosti aplikacija, s akcentom na faze testiranja. Na kraju je, pored prethodno objašnjenih aplikativnih bezbednosnih metoda, dat i pregled metoda zaštite opšteg karaktera.",
publisher = "Kriminalističko- policijska akademija, Beograd",
journal = "Nauka, bezbednost, policija",
title = "General aspects of application it security, Opšti aspekti aplikativne it bezbednosti",
volume = "22",
number = "2",
pages = "33-46",
doi = "10.5937/nabepo22-13128"
}
Čisar, P.. (2017). General aspects of application it security. in Nauka, bezbednost, policija
Kriminalističko- policijska akademija, Beograd., 22(2), 33-46.
https://doi.org/10.5937/nabepo22-13128
Čisar P. General aspects of application it security. in Nauka, bezbednost, policija. 2017;22(2):33-46.
doi:10.5937/nabepo22-13128 .
Čisar, Petar, "General aspects of application it security" in Nauka, bezbednost, policija, 22, no. 2 (2017):33-46,
https://doi.org/10.5937/nabepo22-13128 . .

Modelling the System of Receiving Quick Answers for e-Government Services: Study for the Crime Domain in the Republic of Serbia

Nikolić, Vojkan; Markoski, Branko; Kuk, Kristijan; Ranđelović, Dragan; Čisar, Petar

(Budapest Tech, Budapest, 2017)

TY  - JOUR
AU  - Nikolić, Vojkan
AU  - Markoski, Branko
AU  - Kuk, Kristijan
AU  - Ranđelović, Dragan
AU  - Čisar, Petar
PY  - 2017
UR  - http://jakov.kpu.edu.rs/handle/123456789/750
AB  - Today, e-Governments services operate quick answer systems in many different domains in order to help citizens receive answers to their questions at any time and within a very short time. The automatic mapping of relevant documents stands out as an important application for automatic questions-documents classification strategies. This paper presents a contribution to the identification concepts in text comprehension in unstructured documents as an important step towards clarifying the role of explicit concepts in information retrieval in general. The most common representational scheme in text categorization is the Bag of Words approach when the dictionary, as incorporating background knowledge, is large. The authors introduce a new approach to create conceptbased text representations, and apply it to a text categorization collection to create predefined classes in the case of short text document analysis problem. Further in this paper, a classification-based algorithm for questions matching topic modelling is presented. The paper also describes the weighting of concepts that present terms with high frequency of occurrence in questions is based on their similarity relevance in the predefined classes of documents. The results of the experiment within the criminal law domain in the present case study show that the performance of concept-based text representations has proven to be satisfactory in the case when there is no dictionary for this domain.
PB  - Budapest Tech, Budapest
T2  - Acta polytechnica hungarica
T1  - Modelling the System of Receiving Quick Answers for e-Government Services: Study for the Crime Domain in the Republic of Serbia
VL  - 14
IS  - 8
SP  - 143
EP  - 163
DO  - 10.12700/APH.14.8.2017.8.8
ER  - 
@article{
author = "Nikolić, Vojkan and Markoski, Branko and Kuk, Kristijan and Ranđelović, Dragan and Čisar, Petar",
year = "2017",
abstract = "Today, e-Governments services operate quick answer systems in many different domains in order to help citizens receive answers to their questions at any time and within a very short time. The automatic mapping of relevant documents stands out as an important application for automatic questions-documents classification strategies. This paper presents a contribution to the identification concepts in text comprehension in unstructured documents as an important step towards clarifying the role of explicit concepts in information retrieval in general. The most common representational scheme in text categorization is the Bag of Words approach when the dictionary, as incorporating background knowledge, is large. The authors introduce a new approach to create conceptbased text representations, and apply it to a text categorization collection to create predefined classes in the case of short text document analysis problem. Further in this paper, a classification-based algorithm for questions matching topic modelling is presented. The paper also describes the weighting of concepts that present terms with high frequency of occurrence in questions is based on their similarity relevance in the predefined classes of documents. The results of the experiment within the criminal law domain in the present case study show that the performance of concept-based text representations has proven to be satisfactory in the case when there is no dictionary for this domain.",
publisher = "Budapest Tech, Budapest",
journal = "Acta polytechnica hungarica",
title = "Modelling the System of Receiving Quick Answers for e-Government Services: Study for the Crime Domain in the Republic of Serbia",
volume = "14",
number = "8",
pages = "143-163",
doi = "10.12700/APH.14.8.2017.8.8"
}
Nikolić, V., Markoski, B., Kuk, K., Ranđelović, D.,& Čisar, P.. (2017). Modelling the System of Receiving Quick Answers for e-Government Services: Study for the Crime Domain in the Republic of Serbia. in Acta polytechnica hungarica
Budapest Tech, Budapest., 14(8), 143-163.
https://doi.org/10.12700/APH.14.8.2017.8.8
Nikolić V, Markoski B, Kuk K, Ranđelović D, Čisar P. Modelling the System of Receiving Quick Answers for e-Government Services: Study for the Crime Domain in the Republic of Serbia. in Acta polytechnica hungarica. 2017;14(8):143-163.
doi:10.12700/APH.14.8.2017.8.8 .
Nikolić, Vojkan, Markoski, Branko, Kuk, Kristijan, Ranđelović, Dragan, Čisar, Petar, "Modelling the System of Receiving Quick Answers for e-Government Services: Study for the Crime Domain in the Republic of Serbia" in Acta polytechnica hungarica, 14, no. 8 (2017):143-163,
https://doi.org/10.12700/APH.14.8.2017.8.8 . .
2
1
2

Measuring team member performance in Scrum - case study

Pinter, Robert; Maravić-Cisar, Sanja; Čisar, Petar

(IEEE, New York, 2017)

TY  - CONF
AU  - Pinter, Robert
AU  - Maravić-Cisar, Sanja
AU  - Čisar, Petar
PY  - 2017
UR  - http://jakov.kpu.edu.rs/handle/123456789/749
AB  - Based upon information received from the industry, one can define the knowledge and skills that are required for an engineer aiming to work in the IT industry. In this paper the authors present a possible method by which the learning process can be made more efficient. The authors highlight some advantages of the project-oriented approach in a programming course at Subotica Tech, an institution that educates professional engineers. In that course the students are developing applications for mobile devices. This novel method is based on the inclusion of the great number of demands from the industry, which the future engineers meet upon entering this sector.
PB  - IEEE, New York
C3  - 2017 IEEE 15th international symposium on intelligent systems and informatics (SISY)
T1  - Measuring team member performance in Scrum - case study
SP  - 309
EP  - 314
DO  - 10.1109/SISY.2017.8080573
ER  - 
@conference{
author = "Pinter, Robert and Maravić-Cisar, Sanja and Čisar, Petar",
year = "2017",
abstract = "Based upon information received from the industry, one can define the knowledge and skills that are required for an engineer aiming to work in the IT industry. In this paper the authors present a possible method by which the learning process can be made more efficient. The authors highlight some advantages of the project-oriented approach in a programming course at Subotica Tech, an institution that educates professional engineers. In that course the students are developing applications for mobile devices. This novel method is based on the inclusion of the great number of demands from the industry, which the future engineers meet upon entering this sector.",
publisher = "IEEE, New York",
journal = "2017 IEEE 15th international symposium on intelligent systems and informatics (SISY)",
title = "Measuring team member performance in Scrum - case study",
pages = "309-314",
doi = "10.1109/SISY.2017.8080573"
}
Pinter, R., Maravić-Cisar, S.,& Čisar, P.. (2017). Measuring team member performance in Scrum - case study. in 2017 IEEE 15th international symposium on intelligent systems and informatics (SISY)
IEEE, New York., 309-314.
https://doi.org/10.1109/SISY.2017.8080573
Pinter R, Maravić-Cisar S, Čisar P. Measuring team member performance in Scrum - case study. in 2017 IEEE 15th international symposium on intelligent systems and informatics (SISY). 2017;:309-314.
doi:10.1109/SISY.2017.8080573 .
Pinter, Robert, Maravić-Cisar, Sanja, Čisar, Petar, "Measuring team member performance in Scrum - case study" in 2017 IEEE 15th international symposium on intelligent systems and informatics (SISY) (2017):309-314,
https://doi.org/10.1109/SISY.2017.8080573 . .
10
12
13

Evaluation of knowledge in Object Oriented Programming course with computer adaptive tests

Maravić-Cisar, Sanja; Čisar, Petar; Pinter, Robert

(Pergamon-Elsevier Science Ltd, Oxford, 2016)

TY  - JOUR
AU  - Maravić-Cisar, Sanja
AU  - Čisar, Petar
AU  - Pinter, Robert
PY  - 2016
UR  - http://jakov.kpu.edu.rs/handle/123456789/696
AB  - This paper presents and analyzes the results of the application of computer-adaptive testing in knowledge evaluation of the programming language C++. The participants of the research were college students majoring in computer engineering from a polytechnic college (Republic of Serbia) with an average age of 20. The research was conducted over a two-year period. Overall 199 students took part in this research. Two groups of students, the experimental, and the control one were observed. The students in the experimental group took the computer adaptive test and the students from the control group did the paper-and-pencil test. For the purposes of determining the effects of applying the computer adaptive test for knowledge evaluation, the adaptive test was realized in the MATLAB software package. The test consists of multiple choice questions with five possible answers. The questions for the test are divided into three clusters according to the level of difficulty (easy, medium and hard). The score is calculated from the level of difficulty. The difficult questions earn more points than the easy ones. The examinees may answer the same percentage of questions correctly, but an examinee will gain a better score assuming they correctly answered more difficult items. The results of the research show that there is a statistically significant difference between the results of the control and experimental group. The students who worked on a computer-adaptive test achieved a higher average score than the students who did the traditional test.
PB  - Pergamon-Elsevier Science Ltd, Oxford
T2  - Computers & education
T1  - Evaluation of knowledge in Object Oriented Programming course with computer adaptive tests
SP  - 142
EP  - 160
DO  - 10.1016/j.compedu.2015.10.016
ER  - 
@article{
author = "Maravić-Cisar, Sanja and Čisar, Petar and Pinter, Robert",
year = "2016",
abstract = "This paper presents and analyzes the results of the application of computer-adaptive testing in knowledge evaluation of the programming language C++. The participants of the research were college students majoring in computer engineering from a polytechnic college (Republic of Serbia) with an average age of 20. The research was conducted over a two-year period. Overall 199 students took part in this research. Two groups of students, the experimental, and the control one were observed. The students in the experimental group took the computer adaptive test and the students from the control group did the paper-and-pencil test. For the purposes of determining the effects of applying the computer adaptive test for knowledge evaluation, the adaptive test was realized in the MATLAB software package. The test consists of multiple choice questions with five possible answers. The questions for the test are divided into three clusters according to the level of difficulty (easy, medium and hard). The score is calculated from the level of difficulty. The difficult questions earn more points than the easy ones. The examinees may answer the same percentage of questions correctly, but an examinee will gain a better score assuming they correctly answered more difficult items. The results of the research show that there is a statistically significant difference between the results of the control and experimental group. The students who worked on a computer-adaptive test achieved a higher average score than the students who did the traditional test.",
publisher = "Pergamon-Elsevier Science Ltd, Oxford",
journal = "Computers & education",
title = "Evaluation of knowledge in Object Oriented Programming course with computer adaptive tests",
pages = "142-160",
doi = "10.1016/j.compedu.2015.10.016"
}
Maravić-Cisar, S., Čisar, P.,& Pinter, R.. (2016). Evaluation of knowledge in Object Oriented Programming course with computer adaptive tests. in Computers & education
Pergamon-Elsevier Science Ltd, Oxford., 142-160.
https://doi.org/10.1016/j.compedu.2015.10.016
Maravić-Cisar S, Čisar P, Pinter R. Evaluation of knowledge in Object Oriented Programming course with computer adaptive tests. in Computers & education. 2016;:142-160.
doi:10.1016/j.compedu.2015.10.016 .
Maravić-Cisar, Sanja, Čisar, Petar, Pinter, Robert, "Evaluation of knowledge in Object Oriented Programming course with computer adaptive tests" in Computers & education (2016):142-160,
https://doi.org/10.1016/j.compedu.2015.10.016 . .
19
12
20

The Framework of Runtime Application Self-Protection Technology

Čisar, Petar; Maravić-Cisar, Sanja

(IEEE, New York, 2016)

TY  - CONF
AU  - Čisar, Petar
AU  - Maravić-Cisar, Sanja
PY  - 2016
UR  - http://jakov.kpu.edu.rs/handle/123456789/690
AB  - This paper describes the basic concepts of a relatively new security approach - Runtime Application Self-Protection Technology (RASP), whose wider implementation is expected in the near future. The current focus of this technology is on the vulnerabilities of Java and. NET platforms. In addition to typification, the paper presents the advantages and disadvantages of RASP. Despite the undoubted advantages, it is not an independent and comprehensive solution to ensure the security of the software. In combination with the tried and tested conventional methods, RASP provides an efficient way to prevent malicious activities.
PB  - IEEE, New York
C3  - 2016 17th IEEE international symposium on computational intelligence and informatics (CINTI 2016)
T1  - The Framework of Runtime Application Self-Protection Technology
SP  - 81
EP  - 85
DO  - 10.1109/CINTI.2016.7846383
ER  - 
@conference{
author = "Čisar, Petar and Maravić-Cisar, Sanja",
year = "2016",
abstract = "This paper describes the basic concepts of a relatively new security approach - Runtime Application Self-Protection Technology (RASP), whose wider implementation is expected in the near future. The current focus of this technology is on the vulnerabilities of Java and. NET platforms. In addition to typification, the paper presents the advantages and disadvantages of RASP. Despite the undoubted advantages, it is not an independent and comprehensive solution to ensure the security of the software. In combination with the tried and tested conventional methods, RASP provides an efficient way to prevent malicious activities.",
publisher = "IEEE, New York",
journal = "2016 17th IEEE international symposium on computational intelligence and informatics (CINTI 2016)",
title = "The Framework of Runtime Application Self-Protection Technology",
pages = "81-85",
doi = "10.1109/CINTI.2016.7846383"
}
Čisar, P.,& Maravić-Cisar, S.. (2016). The Framework of Runtime Application Self-Protection Technology. in 2016 17th IEEE international symposium on computational intelligence and informatics (CINTI 2016)
IEEE, New York., 81-85.
https://doi.org/10.1109/CINTI.2016.7846383
Čisar P, Maravić-Cisar S. The Framework of Runtime Application Self-Protection Technology. in 2016 17th IEEE international symposium on computational intelligence and informatics (CINTI 2016). 2016;:81-85.
doi:10.1109/CINTI.2016.7846383 .
Čisar, Petar, Maravić-Cisar, Sanja, "The Framework of Runtime Application Self-Protection Technology" in 2016 17th IEEE international symposium on computational intelligence and informatics (CINTI 2016) (2016):81-85,
https://doi.org/10.1109/CINTI.2016.7846383 . .
6
10
2
14

Smartphone Application for Tracking Students' Class Attendance

Maravić-Cisar, Sanja; Pinter, Robert; Vojnić, Viktor; Tumbas, Vanja; Čisar, Petar

(IEEE, New York, 2016)

TY  - CONF
AU  - Maravić-Cisar, Sanja
AU  - Pinter, Robert
AU  - Vojnić, Viktor
AU  - Tumbas, Vanja
AU  - Čisar, Petar
PY  - 2016
UR  - http://jakov.kpu.edu.rs/handle/123456789/677
AB  - The Bologna system makes class attendance mandatory. Recording attendance is inefficient and takes up too much class time especially with larger groups of students. If a professor records student attendance manually, they have to look at student, write it down and go to the next student. If the check takes five minutes of a 45-minute class, that means the teachers lose approximately 10 percent of the class just on attendance instead spending it on teaching. The majority of students have some kind of smart device and these can be used to make an application so that students can log in their attendance. One possible solution for this is the application called Muffin. Muffin consists of a mobile application that students have on their personal mobile devices, an Arduino Uno board with Bluetooth module, and a desktop application. The basic idea is that when students want to log in their attendance, all they need to do is send some log in data to the Arduino board, which is then forwarded to the application on the desktop PC that is directly connected to the board.
PB  - IEEE, New York
C3  - 2016 IEEE 14th international symposium on intelligent systems and informatics (SISY)
T1  - Smartphone Application for Tracking Students' Class Attendance
SP  - 227
EP  - 231
DO  - 10.1109/SISY.2016.7601502
ER  - 
@conference{
author = "Maravić-Cisar, Sanja and Pinter, Robert and Vojnić, Viktor and Tumbas, Vanja and Čisar, Petar",
year = "2016",
abstract = "The Bologna system makes class attendance mandatory. Recording attendance is inefficient and takes up too much class time especially with larger groups of students. If a professor records student attendance manually, they have to look at student, write it down and go to the next student. If the check takes five minutes of a 45-minute class, that means the teachers lose approximately 10 percent of the class just on attendance instead spending it on teaching. The majority of students have some kind of smart device and these can be used to make an application so that students can log in their attendance. One possible solution for this is the application called Muffin. Muffin consists of a mobile application that students have on their personal mobile devices, an Arduino Uno board with Bluetooth module, and a desktop application. The basic idea is that when students want to log in their attendance, all they need to do is send some log in data to the Arduino board, which is then forwarded to the application on the desktop PC that is directly connected to the board.",
publisher = "IEEE, New York",
journal = "2016 IEEE 14th international symposium on intelligent systems and informatics (SISY)",
title = "Smartphone Application for Tracking Students' Class Attendance",
pages = "227-231",
doi = "10.1109/SISY.2016.7601502"
}
Maravić-Cisar, S., Pinter, R., Vojnić, V., Tumbas, V.,& Čisar, P.. (2016). Smartphone Application for Tracking Students' Class Attendance. in 2016 IEEE 14th international symposium on intelligent systems and informatics (SISY)
IEEE, New York., 227-231.
https://doi.org/10.1109/SISY.2016.7601502
Maravić-Cisar S, Pinter R, Vojnić V, Tumbas V, Čisar P. Smartphone Application for Tracking Students' Class Attendance. in 2016 IEEE 14th international symposium on intelligent systems and informatics (SISY). 2016;:227-231.
doi:10.1109/SISY.2016.7601502 .
Maravić-Cisar, Sanja, Pinter, Robert, Vojnić, Viktor, Tumbas, Vanja, Čisar, Petar, "Smartphone Application for Tracking Students' Class Attendance" in 2016 IEEE 14th international symposium on intelligent systems and informatics (SISY) (2016):227-231,
https://doi.org/10.1109/SISY.2016.7601502 . .
9
4
11

Optimization Algorithms in Function of Binary Character Recognition

Čisar, Petar; Maravić-Cisar, Sanja; Subošić, Dane; Đikanović, Predrag; Đukanović, Slaviša

(Budapest Tech, Budapest, 2015)

TY  - JOUR
AU  - Čisar, Petar
AU  - Maravić-Cisar, Sanja
AU  - Subošić, Dane
AU  - Đikanović, Predrag
AU  - Đukanović, Slaviša
PY  - 2015
UR  - http://jakov.kpu.edu.rs/handle/123456789/660
AB  - The paper gives an analysis of some optimization algorithms in computer sciences and their implementation in solving the problem of binary character recognition. The performance of these algorithms is analyzed using the Optimization Algorithm Toolkit, with emphasis on determining the impact of parameter values. It is shown that these types of algorithms have shown a significant sensitivity as far as the choosing of the parameters was concerned which would have an effect on how the algorithm functions. In this sense, the existence of optimal value was found, as well as extremely unacceptable values.
PB  - Budapest Tech, Budapest
T2  - Acta polytechnica hungarica
T1  - Optimization Algorithms in Function of Binary Character Recognition
VL  - 12
IS  - 7
SP  - 77
EP  - 87
UR  - https://hdl.handle.net/21.15107/rcub_jakov_660
ER  - 
@article{
author = "Čisar, Petar and Maravić-Cisar, Sanja and Subošić, Dane and Đikanović, Predrag and Đukanović, Slaviša",
year = "2015",
abstract = "The paper gives an analysis of some optimization algorithms in computer sciences and their implementation in solving the problem of binary character recognition. The performance of these algorithms is analyzed using the Optimization Algorithm Toolkit, with emphasis on determining the impact of parameter values. It is shown that these types of algorithms have shown a significant sensitivity as far as the choosing of the parameters was concerned which would have an effect on how the algorithm functions. In this sense, the existence of optimal value was found, as well as extremely unacceptable values.",
publisher = "Budapest Tech, Budapest",
journal = "Acta polytechnica hungarica",
title = "Optimization Algorithms in Function of Binary Character Recognition",
volume = "12",
number = "7",
pages = "77-87",
url = "https://hdl.handle.net/21.15107/rcub_jakov_660"
}
Čisar, P., Maravić-Cisar, S., Subošić, D., Đikanović, P.,& Đukanović, S.. (2015). Optimization Algorithms in Function of Binary Character Recognition. in Acta polytechnica hungarica
Budapest Tech, Budapest., 12(7), 77-87.
https://hdl.handle.net/21.15107/rcub_jakov_660
Čisar P, Maravić-Cisar S, Subošić D, Đikanović P, Đukanović S. Optimization Algorithms in Function of Binary Character Recognition. in Acta polytechnica hungarica. 2015;12(7):77-87.
https://hdl.handle.net/21.15107/rcub_jakov_660 .
Čisar, Petar, Maravić-Cisar, Sanja, Subošić, Dane, Đikanović, Predrag, Đukanović, Slaviša, "Optimization Algorithms in Function of Binary Character Recognition" in Acta polytechnica hungarica, 12, no. 7 (2015):77-87,
https://hdl.handle.net/21.15107/rcub_jakov_660 .
1
2

General aspects of quantum cryptography

Čisar, Petar

(Fakultet organizacionih nauka, Beograd, 2015)

TY  - JOUR
AU  - Čisar, Petar
PY  - 2015
UR  - http://jakov.kpu.edu.rs/handle/123456789/650
AB  - Quantum cryptography is a relatively new area of computer security that deals with providing secure communication between the sender and recipient of information, using quantum-mechanical approach. It represents the vision of overcoming the classical methods of cryptography: asymmetric and symmetric algorithms, which have been used for several decades. It involves the establishment of a quantum channel between the participants, in which the transmission of information is realized using photons. The base of the quantum cryptography is formed by appropriate protocols that define the algorithm and method of exchanging and interpreting information. This type of security mechanisms has its undeniable theoretical advantages, but there are a number of problems related to the practical realization. The paper presents an overview of the general quantum principles and their characteristics underlying this form of cryptography and highlights the current advantages and disadvantages of quantum distribution security key.
AB  - Kvantna kriptografija je relativno novija oblast računarske sigurnosti koja se bavi obezbeđenjem sigurne komunikacije između pošiljaoca i primaoca informacije, koristeći kvantno-mehanički pristup. Ona predstavlja vid prevazilaženja metoda klasične kriptografije: asimetričnih i simetričnih algoritama, koji se koriste već više desetina godina. Podrazumeva uspostavljanje kvantnog kanala između učesnika, u kome se za prenos informacija koriste fotoni. Bazu kvantne kriptografije čine odgovarajući protokoli, koji definišu algoritam i način razmene i tumačenja informacija. Ovaj vid sigurnosnih mehanizama ima svoje nesumnjive teoretske prednosti, ali ima i čitav niz problema u vezi sa praktičnom realizacijom. Rad predstavlja pregled opštih kvantnih principa i njihovih karakteristika na kojima počiva ova forma kriptografije i u kome se ukazuje na trenutne prednosti i nedostatke kvantne distribucije sigurnosnog ključa.
PB  - Fakultet organizacionih nauka, Beograd
T2  - Info M
T1  - General aspects of quantum cryptography
T1  - Opšti aspekti kvantne kriptografije
VL  - 14
IS  - 54
SP  - 37
EP  - 42
UR  - https://hdl.handle.net/21.15107/rcub_jakov_650
ER  - 
@article{
author = "Čisar, Petar",
year = "2015",
abstract = "Quantum cryptography is a relatively new area of computer security that deals with providing secure communication between the sender and recipient of information, using quantum-mechanical approach. It represents the vision of overcoming the classical methods of cryptography: asymmetric and symmetric algorithms, which have been used for several decades. It involves the establishment of a quantum channel between the participants, in which the transmission of information is realized using photons. The base of the quantum cryptography is formed by appropriate protocols that define the algorithm and method of exchanging and interpreting information. This type of security mechanisms has its undeniable theoretical advantages, but there are a number of problems related to the practical realization. The paper presents an overview of the general quantum principles and their characteristics underlying this form of cryptography and highlights the current advantages and disadvantages of quantum distribution security key., Kvantna kriptografija je relativno novija oblast računarske sigurnosti koja se bavi obezbeđenjem sigurne komunikacije između pošiljaoca i primaoca informacije, koristeći kvantno-mehanički pristup. Ona predstavlja vid prevazilaženja metoda klasične kriptografije: asimetričnih i simetričnih algoritama, koji se koriste već više desetina godina. Podrazumeva uspostavljanje kvantnog kanala između učesnika, u kome se za prenos informacija koriste fotoni. Bazu kvantne kriptografije čine odgovarajući protokoli, koji definišu algoritam i način razmene i tumačenja informacija. Ovaj vid sigurnosnih mehanizama ima svoje nesumnjive teoretske prednosti, ali ima i čitav niz problema u vezi sa praktičnom realizacijom. Rad predstavlja pregled opštih kvantnih principa i njihovih karakteristika na kojima počiva ova forma kriptografije i u kome se ukazuje na trenutne prednosti i nedostatke kvantne distribucije sigurnosnog ključa.",
publisher = "Fakultet organizacionih nauka, Beograd",
journal = "Info M",
title = "General aspects of quantum cryptography, Opšti aspekti kvantne kriptografije",
volume = "14",
number = "54",
pages = "37-42",
url = "https://hdl.handle.net/21.15107/rcub_jakov_650"
}
Čisar, P.. (2015). General aspects of quantum cryptography. in Info M
Fakultet organizacionih nauka, Beograd., 14(54), 37-42.
https://hdl.handle.net/21.15107/rcub_jakov_650
Čisar P. General aspects of quantum cryptography. in Info M. 2015;14(54):37-42.
https://hdl.handle.net/21.15107/rcub_jakov_650 .
Čisar, Petar, "General aspects of quantum cryptography" in Info M, 14, no. 54 (2015):37-42,
https://hdl.handle.net/21.15107/rcub_jakov_650 .