Dejan Simic

According to our database1, Dejan Simic authored at least 16 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Enhancing educational insights: A real-time data analytics stack for project-basedlearning.
Proceedings of the 53. Jahrestagung der Gesellschaft für Informatik, INFORMATIK 2023, Designing Future, 2023

2022
A hybrid XSS attack (H<i><sub>Y</sub></i>XSS<i><sub>A</sub></i>) based on fusion approach: Challenges, threats and implications in cybersecurity.
J. King Saud Univ. Comput. Inf. Sci., November, 2022

Correction to: A model of digital identity for better information security in e-learning systems.
J. Supercomput., 2022

A model of digital identity for better information security in e-learning systems.
J. Supercomput., 2022

2020
Designing Laboratory for IoT Communication Infrastructure Environment for Remote Maritime Surveillance in Equatorial Areas Based on the Gulf of Guinea Field Experiences.
Sensors, 2020

2019
Improving student engagement in a biometric classroom: the contribution of gamification.
Univers. Access Inf. Soc., 2019

Fishbone model and universal authentication framework for evaluation of multifactor authentication in mobile environment.
Comput. Secur., 2019

2016
Tweakable parallel OFB mode of operation with delayed thread synchronization.
Secur. Commun. Networks, 2016

Extending identity management system with multimodal biometric authentication.
Comput. Sci. Inf. Syst., 2016

2010
Extended Software Architecture Based on Security Patterns.
Informatica, 2010

A Holistic Approach to Securing Web Applications
CoRR, 2010

2009
Defense Strategies Against Modern Botnets
CoRR, 2009

2007
A Survey of Wireless Security.
J. Comput. Inf. Technol., 2007

A Novel Approach to Building Secure Systems.
Proceedings of the The Second International Conference on Availability, 2007

2006
Holistic approach to Wep protocol in securing wireless network infrastructure.
Comput. Sci. Inf. Syst., 2006

Common web application attack types and security using ASP.NET.
Comput. Sci. Inf. Syst., 2006


  Loading...