Strojna tvorba hrvatskoga govora na temelju generiranja prirodnoga jezika iz strukturiranih podataka pametne okoline Interneta stvari
Digital accessibility – "stairs" on the way to the accessible web
Croatian n-gram system
Personal security and malware on the Internet
Internet, digital space and cyber security
A system for active intruder detection on WWW.HR
Behavior Analysis of a Web Catalog Users
Innovative information and communication services for persons with complex communication needs
Detecting and geocoding addresses from web sites in catalogue WWW.HR
From web to native application - WWW.HR example
Analysing e-accessibility on selected web sites from catalogue WWW.HR
Support System for Development of Educational Applications Based on Augmentative and Alternative Communication
Extracting and Geocoding Local Addresses from Websites
Business intelligence and electronic commerce
Potpomognuta komunikacija u ranoj intervenciji
Securing web applications and social networks
Network neutrality: CARnet case study
Detecting malicious web sites
Automatic tagging of unavailable and changed web pages in www.hr catalog
Adaptive location information management for value-added telecommunication services
Business intelligence and electronic commerce
Application of RFID and NFC technologies
Automatic Hoax Detection System
Data Stream Filtering on the Internet
An automatic hoax detection system
Business intelligence and electronic commerce
User movement prediction for location aware services
Wireless sensor networks for early forest fire detection
Web content management systems - how to choose?
Delivering Location-specific Content to Mobile Users
Teaching
University undergraduate
- Competitive skills in cybersecurity (Lecturer in charge, Lecturer in charge)
- Computer Security (Lecturer in charge)
- Computer Security (Lecturer in charge)
- Human Factors in Computing (Lecturer in charge)
- Human Factors in Computing (Lecturer in charge)
- Information Theory (Lecturer in charge)
- Information Theory (Lecturer in charge)
- Service and application development for iOS (Lecturer in charge, Lecturer in charge)
- BSc Thesis (Lecturers)
- BSc Thesis (Lecturers)
- BSc Thesis (Lecturers)
- Final BSc Thesis (Lecturers)
- Final BSc Thesis (Lecturers)
- Project (Lecturers)
- Project C (Lecturers)
- Project C (Lecturers)
- Software Design Project (Lecturers)
- Software Design Project (Lecturers)
- Software Design Project (Lecturers)
University graduate
- Advanced Architectures of Telecommunication Networks (Lecturer in charge)
- Advanced Architectures of Telecommunication Networks (Lecturer in charge)
- Communication Security (Lecturer in charge)
- Communication Software Development (Lecturer in charge)
- Offensive Security (Lecturer in charge)
- Operating Systems and Applications Security (Lecturer in charge)
- Optical Communication Networks (Lecturer in charge)
- Security Threats on the Internet (Lecturer in charge)
- Graduation Thesis (Lecturers)
- Graduation Thesis (Lecturers)
- Graduation Thesis (Lecturers)
- Project (Lecturers)
- Project (Lecturers)
- Project (Lecturers)
- Project (Lecturers)
- Seminar 1 (Lecturers)
- Seminar 2 (Lecturers)
Postgraduate doctoral study programme
- Selected Topics in WWW Technologies & Applications (Lecturer in charge)
- Software Processes (Lecturer in charge)
Postgraduate spec. study
- Security of computer networks (Lecturer in charge)
- Web application security (Lecturer in charge)
Competences
-
Computational and artificial intelligence
Context awareness Learning (artificial intelligence) Backpropagation Learning automata Semisupervised learning Supervised learning Unsupervised learning Machine learning Predictive models -
Mathematics
Machine learning algorithms