|
Reference
|
|
Behl, A., Behl, K. (2012) An analysis of cloud computing security issues. u: 2012 World Congress on Information and Communication Technologies, 30 Oct.-2 Nov, Trivandrum, India: Institute of Electrical and Electronics Engineers (IEEE), 109-114
|
1
|
Booz, H.A. (2011) Cyber operations maturity framework: A model for collaborative, dynamic cybersecurity
|
4
|
Charney, S. (2009) Rethinking the Cyber Threat: A Framework and Path Forward. Microsoft Corp
|
|
Delgado, A. (2015) Ensuring our Children's Safety While Connected. US Air Force Central Command, [Internet], The WEB source: http://www.afcent.af.mil/Units/379thAirExpeditionaryWing/Ne ws/Display/tabid/298/Article/622136/ensuring-ourchildrens-safety-while-connected.aspx
|
|
Đekić, M. (2011) The use of video detection as a function of traffic safety. Tehnika, vol. 66, br. 3, str. 471-475
|
2
|
Đekić, M.D. (2017) How a modern business could respond to the phishing attack challenges. Tehnika, vol. 72, br. 3, str. 455-459
|
2
|
Đekić, M.D. (2017) The application of marketing for small and medium-sized enterprises competiveness rise in the Republic of Serbia. Tehnika, vol. 72, br. 4, str. 587-590
|
2
|
Đekić, M.D. (2016) A smart configuration of computer as a prevention from hacking and cyber espionage. Tehnika, vol. 71, br. 5, str. 761-764
|
2
|
Đekić, M.D. (2016) How to create training for the IT industry's staffs?. Tehnika, vol. 71, br. 4, str. 644-647
|
2
|
Đekić, M.D. (2015) How to maintain a business continuity despite cyber incidents?. Tehnika, vol. 70, br. 2, str. 346-349
|
5
|
Đekić, M.D. (2015) Kako sačuvati kontinuitet u poslovanju uprkos cyber incidentima?. Tehnika, vol. 70, br. 2, str. 346-349
|
3
|
Đekić, M.D. (2016) Cyber procedure za poslovno okruženje u Srbiji. Tehnika, vol. 71, br. 3, str. 471-474
|
2
|
Đekić, M.D. (2018) The cloud's computing security. Tehnika, vol. 73, br. 2, str. 300-304
|
2
|
Đekić, M.D. (2017) The Internet of Things Security. Tehnika, vol. 72, br. 2, str. 309-312
|
2
|
Đekić, M.D. (2016) The commerce crime and ways of conducting a financial security. Tehnika, vol. 71, br. 5, str. 782-786
|
3
|
Đekić, M.D. (2016) Cyber procedures for a business environment in Serbia. Tehnika, vol. 71, br. 3, str. 471-474
|
2
|
Đekić, M.D. (2019) The Internet of Things cybersecurity standardization. Tehnika, vol. 74, br. 4, str. 603-607
|
|
European Police Office (Europol) (2014) The Internet Organized Crime Threat Assessment
|
|
Frye, J.N., Veitch, C.K., Mateski, M.E., Michalski, J.T., Harris, J.M., Trevino, C.M., Maruoka, S. (2012) Cyber threat metrics. United States: Sandia National Laboratories, Technical Report
|
|
Jason, H. (2015) Cloud Attack: Unsharing Your Business in The Cloud. BrightTALK
|
1
|
Kasac, J., Milić, V., Stepanić, J., Mester, G. (2014) A computational approach to parameter identification of spatially distributed nonlinear systems with unknown initial conditions. u: IEEE Symposium on Robotic Intelligence in Informationally Structured Space RiiSS (2014), Orlando, Florida, USA, 9-12 December, Proceedings, ISBN: 9781479944-637, p. 154, Vol. 1, pp. 55-61
|
|
Khalil, I.M., Khreishah, A., Bouktif, S., Ahmad, A. (2013) Security Concerns in Cloud Computing. u: 2013 International Conference on Information Technology: New Generations (10th), Proc, Las Vegas, NV, USA: IEEE, 411-416
|
1
|
Lenkala, S.R., Shetty, S., Kaiqi, X. (2013) Security Risk Assessment of Cloud Carrier. u: 2013 IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing (13th), Proc, Delft, Netherlands: IEEE, 442-449
|
|
Liu, W. (2012) Research on cloud computing security problem and strategy. u: International Conference on Consumer Electronics, Communications and Networks (CECNet) (2nd), Yichang, China, Proc, pp. 1216-1219
|
|
Meghanathan, N. (2013) Review of Access Control Models for Cloud Computing. u: Computer Science & Information Technology (CS & IT), Academy & Industry Research Collaboration Center (AIRCC
|
1
|
Mester, G., Rodić, R. (2012) Navigation of an autonomous outdoor quadrotor helicopter. u: International Conference on Internet Society Technologie and Management ICIST (2nd), 01-03.03.2012, Kopaonik, Serbia, Proc, ISBN: 978-86-85525-10-0, pp. 259-262
|
1
|
Mester, G. (2009) Obstacle-slope avoidance and velocity control of wheeled mobile robots using fuzzy reasoning. u: IEEE International Conference on Intelligent Engineering Systems (13th), INES 2009, April 16-18, 2009, Barbados, Proc, IEEE, ISBN: 978-1-4244-4113-6, 245-249
|
3
|
Mester, G. (2015) Backstepping control for hexa-rotor microcopter. Acta Technica Corviniensis: Bulletin of Engineering, Tome VIII, Fascicule 3, pp. 121-125, July-September
|
1
|
Mester, G., Rodić, A. (2013) Simulation of quad-rotor flight dynamics for the analysis of control, spatial navigation and obstacle avoidance. u: The International Workshop on Advanced Computational Intelligence and Intelligent Informatics (3rd), IWACIII, October 18 to 21 in 2013, Shanghai, China, Proceedings of, ISSN: 2185-758X, pp. 1-4
|
1
|
Mester, G. (2016) Massive open online courses in education of robotics. Interdisciplinary Description of Complex Systems, 14(2), 182-187
|
2
|
Mester, G. (2013) Metode naučne metrike i rangiranja naučnih rezultata. u: ETRAN Conference (57th), Zlatibor, Serbia, 3-6. June, Proc, pp. RO3.5.1-3
|
2
|
Mester, G. (2015) New Trends in Scientometrics. u: SIP 2015, International Conference Science in Practice (33nd), Schweinfurt, Germany, 07-08.05.2015, Proc, pp. 22-27
|
2
|
Mester, G. (2015) Cloud Robotics Model. Interdisciplinary Description of Complex Systems, Vol. 13, No. 1, pp. 1-8
|
3
|
Mester, Gy. (2015) Modeling of autonomous hexa-rotor microcopter. u: International Conference and Workshop Mechatronics in Practice and Education (IIIrd), MechEdu 2015, Subotica, Serbia, May 14-16, Proceedings, pp. 88-91, ISBN 978-86-918815-0-4
|
3
|
Mester, G. (2011) Academic Ranking of World Universities 2009/2010. IPSI Journal, Transactions on Internet Research (TIR), Volume 7, Number 1, pp. 44-47
|
|
Mester, G.G. (2015) Novi trendovi naučne metrike. u: Skup (XXI) Trendovi Razvoja: 'Univerzitet u Promenama...', TREND 2015, 23-26 02.2015, Zlatibor, Serbia, Proc, ISBN 978-86-7892-680-8, paper No. UP 1-3, pp. 23-30
|
1
|
Mester, G.L. (2015) Merenje rezultata naučnog rada. Tehnika, vol. 70, br. 3, str. 445-454
|
1
|
Ngo, H.N., Wu, X., le Dung, P., Wilson, C., Srinivasan, B. (2010) Dynamic Key Cryptography and Applications. International Journal of Network Security, Vol.10, No.3, pp.161-174, May
|
|
Omari, A., Al-Kasasbeh, B., Al-Qutaish, R., Muhairat, M. (2009) DEA-RTA: A Dynamic Encryption Algorithm for the Real-Time Applications. International journal of computers, Vol. 3, Issue 1, pp. 191-199
|
|
Payne, S.C. (2007) A Guide to Security Metrics. SANS Institute
|
|
Peterson, M. (2005) Intelligence-Led Policing: The New Intelligence Architecture. Bureau of Justice Assistance
|
3
|
Rodic, A., Mester, G. (2013) Control of a quadrotor flight. u: ICIST Conference, 03-06.03.2013, Kopaonik, Serbia, 03-06.03.2013, Proc, ISBN: 978-86-85525-12-4, pp. 61-66
|
|
Rodić, A., Mester, G. (2011) Ambientally aware bi-functional ground-aerial robot-sensor networked system for remote environmental surveillance and monitoring tasks. u: The ETRAN Conference (55th), Section Robotics, Society for Electronics, Telecommunications, Computers, Automatic Control and Nuclear Engineering, Banja Vrućica, Bosnia and Herzegovina, Jun 6-9, Procee, Vol. RO2.5, ISBN 978-86-80509-66-2, pp. 1-4
|
|
Schulze, H. (2015) Insider Threat Report. Crowd Research Partners
|
1
|
White, G. (2007) The Community Cyber Security Maturity Model. u: Annual Hawaii International Conference on System Sciences (HICSS'07) (40th), Proc, Academic Press
|
|
Zhang, N., Liu, D., Zhang, Y. (2013) A Research on Cloud Computing Security. u: 2013 International Conference on Information Technology and Applications, Proc, IEEE, 370-373
|
|
|
|