Bostjan Brumen

Orcid: 0000-0002-0560-1230

According to our database1, Bostjan Brumen authored at least 61 papers between 1999 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Responsible Artificial Intelligence: A Structured Literature Review.
CoRR, 2024

2023
User Experience of Croatian National & Nature Parks' Website - A Comparison.
Proceedings of the HCI International 2023 Posters, 2023

Towards a Definition of a Responsible Artificial Intelligence.
Proceedings of the Information Modelling and Knowledge Bases XXXV, 2023

2022
Layered Battleship Game Changer Password System.
Informatica, 2022

Aspects and Views on Responsible Artificial Intelligence.
Proceedings of the Machine Learning, Optimization, and Data Science, 2022

Permissions vs. Privacy Policies of Apps in Google Play Store and Apple App Store.
Proceedings of the Information Modelling and Knowledge Bases XXXIV, 2022

2021
Overview of Machine Learning Process Modelling.
Entropy, 2021

The Use of Intranet in Croatian National Parks.
Proceedings of the 44th International Convention on Information, 2021

Content Analysis of Medical and Health Apps' Privacy Policies.
Proceedings of the Information Modelling and Knowledge Bases XXXIII- Proceedings of the 31st International Conference on Information Modelling and Knowledge Bases, 2021

2020
System-Assigned Passwords: The Disadvantages of the Strict Password Management Policies.
Informatica, 2020

Shoulder surfing experiments: A systematic literature review.
Comput. Secur., 2020

Automated Text Similarities Approach: GDPR and Privacy by Design Principles.
Proceedings of the Information Modelling and Knowledge Bases XXXII, 2020

2019
Security analysis of Game Changer Password System.
Int. J. Hum. Comput. Stud., 2019

Shoulder surfing: From an experimental study to a comparative framework.
Int. J. Hum. Comput. Stud., 2019

Rejecting the death of passwords: Advice for the future.
Comput. Sci. Inf. Syst., 2019

Examining Security and Usability Aspects of Knowledge-based Authentication Methods.
Proceedings of the 42nd International Convention on Information and Communication Technology, 2019

Comparison of Open Source NoSQL Solutions Using Utility Function.
Proceedings of the Information Modelling and Knowledge Bases XXXI, 2019

2017
Resilience of students' passwords against attacks.
Proceedings of the 40th International Convention on Information and Communication Technology, 2017

Modeling of a Data Warehouse Based on ETL Process Performance.
Proceedings of the Information Modelling and Knowledge Bases XXIX, 2017

2016
Analysing real students' passwords and students' passwords characteristics received from a questionnaire.
Proceedings of the 39th International Convention on Information and Communication Technology, 2016

Performance analysis of two open source intrusion detection systems.
Proceedings of the 39th International Convention on Information and Communication Technology, 2016

What do students do with their assigned default passwords?
Proceedings of the 39th International Convention on Information and Communication Technology, 2016

Laws Describing Artificial Learning.
Proceedings of the Information Modelling and Knowledge Bases XXVIII, 2016

2015
Impact of security education on password change.
Proceedings of the 38th International Convention on Information and Communication Technology, 2015

Moore's curse on textual passwords.
Proceedings of the 38th International Convention on Information and Communication Technology, 2015

Artificial Classification Models and Real Data.
Proceedings of the Information Modelling and Knowledge Bases XXVII, 2015

2014
Best-Fit Learning Curve Model for the C4.5 Algorithm.
Informatica, 2014

A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion.
Ad Hoc Networks, 2014

The Effect of Educating Users on Passwords: a Preliminary Study.
Proceedings of the 3rd Workshop on Software Quality Analysis, 2014

Password security - No change in 35 years?
Proceedings of the 37th International Convention on Information and Communication Technology, 2014

Brute force analysis of PsychoPass-generated Passwords.
Proceedings of the 37th International Convention on Information and Communication Technology, 2014

Predicting Grades Based on Students' Online Course Activities.
Proceedings of the Knowledge Management in Organizations - 9th International Conference, 2014

Comparisons between Three Cross-Validation Methods for Measuring Learners' Performances.
Proceedings of the Information Modelling and Knowledge Bases XXVI, 2014

Modeling of classification error rate based on neural networks learners.
Proceedings of the Information Modelling and Knowledge Bases XXVI, 2014

Observing a Naïve Bayes Classifier's Performance on Multiple Datasets.
Proceedings of the Advances in Databases and Information Systems, 2014

2012
An improved two-party identity-based authenticated key agreement protocol using pairings.
J. Comput. Syst. Sci., 2012

Learning Process Termination Criteria.
Informatica, 2012

2010
Attacks and Improvement of an Efficient Remote Mutual Authentication and Key Agreement Scheme.
Cryptologia, 2010

Two proposed identity-based three-party authenticated key agreement protocols from pairings.
Comput. Secur., 2010

Opening the Knowledge Tombs - Web Based Text Mining as Approach for Re-evaluation of Machine Learning Rules.
Proceedings of the Advances in Databases and Information Systems, 2010

2009
WSDL and UDDI extensions for version support in web services.
J. Syst. Softw., 2009

Comparative Study of Tripartite Identity-Based Authenticated Key Agreement Protocols.
Informatica (Slovenia), 2009

Medical Personal Data in Secure Information Systems.
Proceedings of the Information Systems: Modeling, 2009

2008
Improvement of the Peyravian-Jeffries's user authentication protocol and password change protocol.
Comput. Commun., 2008

Conceptual Model - Meeting of Cultures.
Proceedings of the Information Systems and e-Business Technologies, 2008

2007
Assessment of Classification Models with Small Amounts of Data.
Informatica, 2007

Teaching of Information Security in the "Health Care and Nursing" Postgraduate program.
Proceedings of the New Approaches for Security, 2007

The improvement of data quality - a conceptual model.
Proceedings of the Information Modelling and Knowledge Bases XIX, 2007

Teaching IT in Health Care and Nursing Program--Experiences.
Proceedings of the 20th IEEE International Symposium on Computer-Based Medical Systems (CBMS 2007), 2007

2006
Comparison of performance of Web services, WS-Security, RMI, and RMI-SSL.
J. Syst. Softw., 2006

2005
The Impact of Details in the Class Diagram on Software Size Estimation.
Informatica, 2005

2004
Internationalization Content in Intelligent Systems - How to Teach it?
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2004

Early Assessment of Classification Performance.
Proceedings of the ACSW Frontiers 2004, 2004 ACSW Workshops, 2004

2003
An Algorithm for Protecting Knowledge Discovery Data.
Informatica, 2003

2002
Data protection for outsourced data mining.
Informatica (Slovenia), 2002

Medical Diagnostic and Data Quality.
Proceedings of the 15th IEEE Symposium on Computer-Based Medical Systems (CBMS 2002), 2002

Protecting Medical Data for Analyses.
Proceedings of the 15th IEEE Symposium on Computer-Based Medical Systems (CBMS 2002), 2002

2000
Predicting Sample Size in Data Mining Tasks: Using Additive Incremental Approach.
Proceedings of the Information Modelling and Knowledge Bases XII: Tenth European-Japanese Conference on Information Modelling and Knowledge Bases, 2000

Computing Science Research Activities at the Faculty of Electrical Engineering, Computer Science and Informatics.
Proceedings of Chalenges, 2000

1999
Reuse in the Sense of the Rapid Database Prototyping for Intelligent Systems.
Proceedings of the International Conference on Artificial Intelligence, 1999

Performance Assesment Framework for Distributed Object Architectures.
Proceedings of the Advances in Databases and Information Systems, 1999


  Loading...