Researchers
Čisar, Petar
Results 21-40 of 94
| Issue Date | Title | Author(s) | Type | Мp-cat. |
|---|---|---|---|---|
| 2019 | EWMA Statistics and Fuzzy Logic in Function of Network Anomaly Detection | Čisar, Petar | Article | 24M24 |
| 2019 | Heuristic scanning and sandbox approach in malware detection | Čisar, Petar | Conference Paper | 14 MNO za filozofiju, psihologiju, pedagogiju i sociologiju (25.09.2025.)M14 |
| 2019 | Supervisory system for physical objects spatial location detection![]() | Borović, Vladan; Spalević, Petar | Article | 21M21 |
| 2018 | Ethical Hacking of Wireless Networks in Kali Linux Environment | Čisar, P. | Article | Mp. category will be shown later |
| 2018 | Overview of Some Security Aspectsof Smart Phones | Čisar, Petar | Conference Paper | Mp. category will be shown later |
| 2018 | Implementation of Software-Defined Networks Using Open-Source Environment | Čisar, Petar | Article | 22M22 |
| 2017 | Основи телекомуникација | Глигоријевић, Милан; Чисар, Петар | Text book | Mp. category will be shown later |
| 2017 | The Design of the Personal Enemy - MIMLeBot as an Intelligent Agent in a Game-based Learning Environment![]() | Kuk, Kristijan | Article | 22M22 |
| 2017 | Measuring team member performance in Scrum - case study | Pinter, Robert; Maravić-Cisar, Sanja; Čisar, Petar | Conference Paper | Mp. category will be shown later |
| 2017 | Security Assessment with Kali Linux | Čisar, Petar J. | Conference Paper | Mp. category will be shown later |
| 2017 | Modelling the System of Receiving Quick Answers for e-Government Services: Study for the Crime Domain in the Republic of Serbia![]() | Nikolić, Vojkan | Article | 22M22 |
| 2017 | Vulnerability testing using Metasploit framework | M. Živković; Čisar, Petar J. | Book parts | Mp. category will be shown later |
| 2017 | General aspects of application it security | Čisar, Petar | Article | 51M51 |
| 2016 | The Framework of Runtime Application Self-Protection Technology | Čisar, Petar | Conference Paper | Mp. category will be shown later |
| 2016 | Scoring System as a Method of Improving IT Vulnerability Status | Čisar, Petar | Article | Mp. category will be shown later |
| 2016 | Evaluation of knowledge in Object Oriented Programming course with computer adaptive tests | Maravić-Cisar, Sanja; Čisar, Petar | Article | 21a+M21a+ |
| 2016 | The position and role of the internet complaint centers in managing cyber crime | Ranđelović, Dragan | Book parts | Mp. category will be shown later |
| 2016 | CVSS in Function of Improving IT Security | Čisar, Petar | Book parts | 14 MNO za filozofiju, psihologiju, pedagogiju i sociologiju (25.09.2025.)M14 |
| 2016 | Smartphone Application for Tracking Students' Class Attendance | Maravić-Cisar, Sanja; Pinter, Robert; Vojnić, Viktor; Tumbas, Vanja; Čisar, Petar | Conference Paper | Mp. category will be shown later |
| 2016 | Statistical Quality Control in Function of Threshold Determining in Network Anomaly Detection | Čisar, Petar | Conference Paper | Mp. category will be shown later |

