|
Reference
|
|
Cheng, H., Ding, Q. (2012) Overview of the block cipher. u: Second International Conference on Instrumentation, Measurement, Computer, Communication and Control, Harbin, China, Proc, IEEE, 1628-1631
|
2
|
Đekić, M.D. (2018) The cloud's computing security. Tehnika, vol. 73, br. 2, str. 300-304
|
2
|
Đekić, M.D. (2016) The commerce crime and ways of conducting a financial security. Tehnika, vol. 71, br. 5, str. 782-786
|
3
|
Đekić, M.D. (2016) Cyber procedures for a business environment in Serbia. Tehnika, vol. 71, br. 3, str. 471-474
|
2
|
Đekić, M.D. (2019) The Internet of Things cybersecurity standardization. Tehnika, vol. 74, br. 4, str. 603-607
|
2
|
Đekić, M.D. (2017) The application of marketing for small and medium-sized enterprises competiveness rise in the Republic of Serbia. Tehnika, vol. 72, br. 4, str. 587-590
|
2
|
Đekić, M.D. (2016) A smart configuration of computer as a prevention from hacking and cyber espionage. Tehnika, vol. 71, br. 5, str. 761-764
|
2
|
Đekić, M.D. (2016) How to create training for the IT industry's staffs?. Tehnika, vol. 71, br. 4, str. 644-647
|
2
|
Đekić, M.D. (2015) How to maintain a business continuity despite cyber incidents?. Tehnika, vol. 70, br. 2, str. 346-349
|
1
|
Đekić, M.D. (2011) The use of video detection as a function of traffic safety. Tehnika, vol. 66, br. 3, str. 471-475
|
5
|
Đekić, M.D. (2015) Kako sačuvati kontinuitet u poslovanju uprkos cyber incidentima?. Tehnika, vol. 70, br. 2, str. 346-349
|
2
|
Đekić, M.D. (2017) How a modern business could respond to the phishing attack challenges. Tehnika, vol. 72, br. 3, str. 455-459
|
2
|
Đekić, M.D. (2017) The Internet of Things Security. Tehnika, vol. 72, br. 2, str. 309-312
|
|
Geler, J. (2010) Designing and developing 802.1 1n wireless networks. Cisco Systems Inc
|
|
Mester, G. (2013) Metode naučne metrike i rangiranja naučnih rezultata. u: 57th ETRAN Conference, Zlatibor, Serbia, 3-6.06.2013, Proc, pp. RO3.5.1-3
|
|
Mester, G. (2008) Obstacle avoidance and velocity control of mobile robots. u: 2008 6th International Symposium on Intelligent Systems and Informatics, Proc, 1-5
|
|
Mester, G. (2006) Modeling of the control strategies of wheeled mobile robots. u: Kandó Conference 2006, pp. 1-3, Budapest, Hungary, January 12-13, Proc, 12-13
|
|
Mester, G. (2009) Obstacle-slope avoidance and velocity control of wheeled mobile robots using fuzzy reasoning. u: IEEE 13 th International Conference on Intelligent Engineering Systems, INES 2009, Barbados, 16-18.04.2009, Proc, 245-249
|
|
Mester, G. (2015) Novi trendovi naučne metrike. u: XXI Skup Trendovi Razvoja: 'Univerzitet u Promenama...', TREND 2015, paper No. UP 1-3, Zlatibor, Serbia, 23-26.02.2015, Proc, pp. 23-30
|
|
Mester, G. (2015) Backstepping control for hexa-rotor microcopter. Acta Technica Corviniensis-Bulletin of Engineering, Faculty Engineering Hunedoara, Vol. 8, No. 3, pp. 121-125, July-September
|
|
Mester, G. (2015) Modeling of autonomous hexa-rotor microcopter. u: (MechEdu 2015), Subotica, Serbia, May 14-16, 2015, Proc, pp. 88-91, ISBN 978-86-918815-0-4
|
|
Mester, G., Rodić, A. (2012) Navigation of an autonomous outdoor quadrotor helicopter. u: 2nd International Conference on Internet Society Technologies and Management ICIST, Kopaonik, Serbia, 1-3.03.2012, Proc, ISBN 978-86-85525-10-0, pp. 259-262
|
|
Mester, G. (2015) New trends in scientometrics. u: SIP 2015, 33 nd International Conference Science in Practice, Schweinfurt, Germany, 07-08.05.2015, Proc, pp. 22-27
|
|
Mester, Gy. (2010) Sensor-based control of autonomous wheeled mobile robots. IpsiBgD Transactions on Internet Research, TIR, Vol. 6, No. 2, pp. 29-34
|
|
Phan, R.C.-W., Umar, S.M. (2006) A framework for describing block cipher cryptanalysis. IEEE Transactions on Computers, 55(11), 1402-1409
|
|
Rodic, A., Mester, G. (2013) Control of a quadrotor flight. u: ICIST Conference, Kopaonik, Serbia, 03-06.03.2013, Proc, 61-66
|
|
Rodić, A., Katić, D., Mešter, G. (2009) Ambient intelligent robot-sensor networks for environmental surveillance and remote sensing. u: IEEE SISY, Proc, IEEE, 39-44
|
|
Ronald, J.T., Widmer, N.S. (1998) Digital systems: Principles and applications. Prentice-Hall International, Inc
|
|
Stallings, W. (1999) Cryptography and network security: Principles and practice. New Jersey: Prentice-Hall, Inc
|
|
Zhang, Y., Luo, J., Hu, H. (2007) Wireless mesh networking: Architectures, protocols and standards. New York: Taylor & Francis Group
|
|
|
|