Researchers



Results 21-40 of 94
Issue DateTitleAuthor(s)TypeМp-cat.
2019EWMA Statistics and Fuzzy Logic in Function of Network Anomaly DetectionČisar, Petar  ; Maravić Čisar, SanjaArticle
24M24
2019Heuristic scanning and sandbox approach in malware detectionČisar, Petar  ; Joksimović, Dušan  Conference Paper
14documentMNO za filozofiju, psihologiju, pedagogiju i sociologiju (25.09.2025.)
M14
2019Supervisory system for physical objects spatial location detectionBorović, Vladan; Spalević, Petar  ; Čisar, Petar  ; Rančić, Dejan  ; Jović, Srđan  Article
21M21
2018Ethical Hacking of Wireless Networks in Kali Linux EnvironmentČisar, P.  ; Maravić Čisar, S.Article
Mp. category will be shown later
2018Overview of Some Security Aspectsof Smart PhonesČisar, Petar  ; Rudas, ImreConference Paper
Mp. category will be shown later
2018Implementation of Software-Defined Networks Using Open-Source EnvironmentČisar, Petar  ; Erlenvajn, Dragan; Maravić-Cisar, SanjaArticle
22M22
2017Основи телекомуникацијаГлигоријевић, Милан; Чисар, Петар  Text book
Mp. category will be shown later
2017The Design of the Personal Enemy - MIMLeBot as an Intelligent Agent in a Game-based Learning EnvironmentKuk, Kristijan  ; Milentijević, Ivan Z.  ; Ranđelović, Dragan  ; Popović, Brankica  ; Čisar, Petar  Article
22M22
2017Measuring team member performance in Scrum - case studyPinter, Robert; Maravić-Cisar, Sanja; Čisar, Petar  Conference Paper
Mp. category will be shown later
2017Security Assessment with Kali LinuxČisar, Petar J.  ; Maravić Čisar, Sanja I.; Firstner, Igor S.Conference Paper
Mp. category will be shown later
2017Modelling the System of Receiving Quick Answers for e-Government Services: Study for the Crime Domain in the Republic of SerbiaNikolić, Vojkan  ; Markoski, Branko  ; Kuk, Kristijan  ; Ranđelović, Dragan  ; Čisar, Petar  Article
22M22
2017Vulnerability testing using Metasploit frameworkM. Živković; Čisar, Petar J.  ; I. RudasBook parts
Mp. category will be shown later
2017General aspects of application it securityČisar, Petar  Article
51M51
2016The Framework of Runtime Application Self-Protection TechnologyČisar, Petar  ; Maravić-Cisar, SanjaConference Paper
Mp. category will be shown later
2016Scoring System as a Method of Improving IT Vulnerability StatusČisar, Petar  ; Z. Rajnai; Maravić Čisar, Sanja; R. PinterArticle
Mp. category will be shown later
2016Evaluation of knowledge in Object Oriented Programming course with computer adaptive testsMaravić-Cisar, Sanja; Čisar, Petar  ; Pinter, RobertArticle
21a+M21a+
2016The position and role of the internet complaint centers in managing cyber crimeRanđelović, Dragan  ; Kuk, Kristijan  ; Popović, Brankica  ; Čisar, Petar  Book parts
Mp. category will be shown later
2016CVSS in Function of Improving IT SecurityČisar, Petar  ; Z. RajnaiBook parts
14documentMNO za filozofiju, psihologiju, pedagogiju i sociologiju (25.09.2025.)
M14
2016Smartphone Application for Tracking Students' Class AttendanceMaravić-Cisar, Sanja; Pinter, Robert; Vojnić, Viktor; Tumbas, Vanja; Čisar, Petar  Conference Paper
Mp. category will be shown later
2016Statistical Quality Control in Function of Threshold Determining in Network Anomaly DetectionČisar, Petar  ; Maravić Čisar, SanjaConference Paper
Mp. category will be shown later