Securing IoT Services Based on Security Requirement Categories
Digital accessibility – "stairs" on the way to the accessible web
Predicting Vulnerabilities in Web Applications Based on Website Security Model
N-gram Based Croatian Language Network: Application in a Smart Environment
A distributed geospatial publish/subscribe system on Apache Spark
N-gram Based Croatian Language Network
Spoken notifications in smart environments using Croatian language
Natural Language Agents in a Smart Environment
Speech Controlled IoT System Based on Context- Driven Rule Engine
Using Gamification for Solving Resource Allocation and Serving in Employee Attendance Tracking System
Croatian n-gram system
Requirements Engineering Challenges in Building AI-Based Complex Systems
Context-Aware Service Orchestration in Smart Environments
Internet Security and Safety Learning via an Innovative Educational Game
User Authentication Based on Contactless High and Ultra-High Frequency RFID Tags
Anomaly Detection Based on Fixed and Wearable Sensors in Assisted Living Environments
Personal security and malware on the Internet
Building National Capacity to support Augmentative and Alternative Communication as an Early Intervention Method in Croatia
An Iterative Automatic Final Alignment Method in the Ontology Matching System
Internet of Things Cyber Security: Smart Door Lock System
Analysis of credit card attacks using the NFC technology
Towards Overall Information Security and Privacy (IS&P) Taxonomy
Rule-Based System for Data Leak Threat Estimation
User interface adaptation for ICT based alternative and augmentative applications
Enabling Text-To-Speech Functionality for Websites and Applications Using a Content-Derived Model
Smartwatch as an Assistive Technology: Tracking System for Detecting Irregular User Movement
Building National Capacity to support Augmentative and Alternative Communication (AAC) as an Early Intervention Method for Children aged 0-8 years with Developmental Delay/Disabilities
Internet, digital space and cyber security
Clustering approach for user location data privacy in telecommunication services
Lightweight and adaptable solution for security agility
Evaluation of Keyword Search in Affective Multimedia Databases
Location-based Smartwatch Application for People with Complex Communication Needs
Augmentative Requirements Engineering: Getting Closer to Sensitive User’s Needs
Usability Analysis of Gesture Based User Interfaces
Voice Controlled Quiz for People with Hearing Impairment
Smart Detection and Classification of Application-Layer Intrusions in Web Directories
Agent-based Movement Analysis and Location Prediction in Cellular Networks
e-Consultation: Automatic system for online consultations
Estimating real world privacy risk scenarios
Requirements and Architecture Modeling in Software Engineering Courses
A system for active intruder detection on WWW.HR
Front-end solution for enhancing web sites accessibility
User Privacy Risk Calculator
User Experiences from Croatian ICT Competence Network for Innovative Services for Persons with Complex Communication Needs
Innovative information and communication services for persons with complex communication needs
Detecting and geocoding addresses from web sites in catalogue WWW.HR
From web to native application - WWW.HR example
Cache and prefetch mechanisms for improving symbol usage in symbol based applications
Analysing e-accessibility on selected web sites from catalogue WWW.HR
Support System for Development of Educational Applications Based on Augmentative and Alternative Communication
AAC Services Development: From Usability Requirements to the Reusable Components
Securing web applications and social networks
Categorization of telecommunication services from regulatory point of view
Discovering shoppers’ journey in retail environment by using RFID
e-Accessible service system: Calibrator and Communicator
Alternative and augmentative communication in early intervention
Business intelligence and electronic commerce
Multi-touch : Familiarizing Seniors to ICT
Adaptive location information management for value-added telecommunication services
User Movement Prediction Based on Traffic Topology for Value Added Services
Network neutrality: CARnet case study
Detecting malicious web sites
A Platform Model for Symbol Based Communication Services
Automatic tagging of unavailable and changed web pages in www.hr catalog
Application of RFID and NFC technologies
Technical aspects of network neutrality
Business intelligence and electronic commerce
Automatic Hoax Detection System
Data Stream Filtering on the Internet
An automatic hoax detection system
Business intelligence and electronic commerce
Adaptive user movement prediction for advanced location-aware services
Vessel Tracking and Movement Radius Notification
User movement prediction for location aware services
Early Forest Fire Detection with Sensor Networks: Sliding Window Skylines Approach
Wireless sensor networks for early forest fire detection
Predicting user movement with intelligent GPS location scaling
Web content management systems - how to choose?
Predicting User Movement for Advanced Location-aware Services
Location Name Extraction for User Created Digital Content Services
Delivering Location-specific Content to Mobile Users
DEVICE AND METHOD FOR RECOGNIZING WORDS AND PHRASES AND THEIR MEANING FROM FREE TEXT IN FORM OF ELECTRONIC CONTENTS
Teaching
University undergraduate
- Computer Security (Lecturer in charge)
- Computer Security (Lecturer in charge)
- Human Factors in Computing (Lecturer in charge)
- Human Factors in Computing (Lecturer in charge)
- Information Theory (Lecturer in charge)
- Information Theory (Lecturer in charge)
- Service and application development for iOS (Lecturer in charge)
- BSc Thesis (Lectures)
- BSc Thesis (Lectures)
- BSc Thesis (Lectures)
- Final BSc Thesis (Lectures)
- Project (Lectures)
- Project C (Lectures)
- Project C (Lectures)
- Software Design Project (Lectures)
- Software Design Project (Lectures)
- Software Design Project (Lectures)
University graduate
- Advanced Architectures of Telecommunication Networks (Lecturer in charge)
- Advanced Architectures of Telecommunication Networks (Lecturer in charge)
- Cognitive Communication Networks (Lecturer in charge)
- Communication Security (Lecturer in charge)
- Communication Software Development (Lecturer in charge)
- Internet Security (Lecturer in charge)
- Offensive Security (Lecturer in charge)
- Operating Systems and Applications Security (Lecturer in charge)
- Optical Communication Networks (Lecturer in charge)
- Photonic Telecommunication Networks (Lecturer in charge)
- Security Threats on the Internet (Lecturer in charge)
- Service and application development for iOS (Lecturer in charge)
- Software for Communication Systems (Lecturer in charge)
- Graduation Thesis (Lectures)
- Graduation Thesis (Lectures)
- Graduation Thesis (Lectures)
- Project (Lectures)
- Project (Lectures)
- Project (Lectures)
- Project (Lectures)
- Seminar 1 (Lectures)
Postgraduate doctoral study programme
- Selected Topics in WWW Technologies & Applications (Lecturer in charge)
- Software Processes (Lecturer in charge)
Postgraduate spec. study
- Security of computer networks (Lecturer in charge)
- Web application security (Lecturer in charge)
Competences
-
Computational and artificial intelligence
Context awareness Learning (artificial intelligence) Backpropagation Learning automata Semisupervised learning Supervised learning Unsupervised learning Machine learning Predictive models -
Mathematics
Machine learning algorithms