Milica Stojmenovic

Orcid: 0000-0003-0466-478X

According to our database1, Milica Stojmenovic authored at least 23 papers between 2010 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
What is Beautiful is Secure.
ACM Trans. Priv. Secur., 2022

2020
Player Matching for Social Exergame Retention: A Group Personality Composition Approach.
Proceedings of the CHI PLAY '20: The Annual Symposium on Computer-Human Interaction in Play, Virtual Event, Canada, November 2-4, 2020, 2020

2019
The influence of textual and verbal word-of-mouth on website usability and visual appeal.
J. Supercomput., 2019

Website Identity Notification: Testing the Simplest Thing That Could Possibly Work.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019

Mixed Pictures: Mental Models of Malware.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019

Helping Users Secure Their Data by Supporting Mental Models of VeraCrypt.
Proceedings of the HCI International 2019 - Posters - 21st International Conference, 2019

Learning with Trees: - A Non-linear E-Textbook Format for Deep Learning.
Proceedings of the Learning and Collaboration Technologies. Designing Learning Experiences, 2019

Control and Understanding in Malware and Legitimate Software.
Proceedings of the 2019 APWG Symposium on Electronic Crime Research, 2019

2018
Hide-and-Seek with Website Identity Information.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

Building Website Certificate Mental Models.
Proceedings of the Persuasive Technology - 13th International Conference, 2018

2016
How does information diffuse in large recommendation social networks?
IEEE Netw., 2016

Does textual word-of-mouth affect look and feel?
Proceedings of the 28th Australian Conference on Computer-Human Interaction, 2016

Spreading word: author frequency of app user reviews.
Proceedings of the 28th Australian Conference on Computer-Human Interaction, 2016

2015
ERUPT: A Role-based Neighbor Discovery Protocol for Mobile Social Applications.
Ad Hoc Sens. Wirel. Networks, 2015

2014
Social Network Analysis and Communication in Emergency Response Simulations.
J. Organ. Comput. Electron. Commer., 2014

Social-based Routing in Opportunistic Mobile Networks: A Survey.
Ad Hoc Sens. Wirel. Networks, 2014

Perceived and objective usability and visual appeal in a website domain with a less developed mental model.
Proceedings of the 26th Australian Computer-Human Interaction Conference on Designing Futures, 2014

Probing PROBE: A field study of an advanced decision support prototype for managing chemical, biological, radiological, nuclear, and explosives (CBRNE) events.
Proceedings of the 11th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2014

Patterns and modeling of group growth in online social networks.
Proceedings of the IEEE 33rd International Performance Computing and Communications Conference, 2014

2013
Benefits and Limitations of the Social Network Analysis When Explaining Instances of Ineffective Communication in Two Chemical, Biological, Radiological, Nuclear, and Explosives Simulations.
Proceedings of the 2013 International Conference on Cloud and Green Computing, Karlsruhe, Germany, September 30, 2013

2011
Identifying user requirements for a CBRNE management system: A comparison of data analysis methods.
Proceedings of the 8th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2011

2010
Deriving user requirements for a CBRNE support system.
Proceedings of the 7th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2010

Is a Line Segment Circular?.
Proceedings of the Fifth International Conference on Frontier of Computer Science and Technology, 2010


  Loading...