Study on Information Security Awareness using the Behavioral-Cognitive Internet Security Questionnaire
A Survey on User Profiling, Data Collection, and Privacy Issues of Internet Services
Study on Information Security Awareness using the Behavioral-Cognitive Internet Security Questionnaire
Study on Information Security Awareness using the Behavioral-Cognitive Internet Security Questionnaire
Anonymization-Based Method for Privacy-Preservation of Users in Internet Services
Digital Cultural Heritage, Cybersecurity, and the Human Factor
2023 17th International Conference on Telecommunications (ConTEL)
A federated authentication and authorization approach for IoT farming
Predicting Vulnerabilities in Web Applications Based on Website Security Model
Predicting Vulnerabilities in Web Applications Based on Website Security Model
Securing IoT Services Based on Security Requirement Categories
Digital accessibility – "stairs" on the way to the accessible web
N-gram Based Croatian Language Network: Application in a Smart Environment
A distributed geospatial publish/subscribe system on Apache Spark
Spoken notifications in smart environments using Croatian language
N-gram Based Croatian Language Network
Speech Controlled IoT System Based on Context- Driven Rule Engine
Natural Language Agents in a Smart Environment
User Authentication Based on Contactless High and Ultra-High Frequency RFID Tags
Using Gamification for Solving Resource Allocation and Serving in Employee Attendance Tracking System
Context-Aware Service Orchestration in Smart Environments
Requirements Engineering Challenges in Building AI-Based Complex Systems
Croatian n-gram system
Internet Security and Safety Learning via an Innovative Educational Game
Anomaly Detection Based on Fixed and Wearable Sensors in Assisted Living Environments
An Iterative Automatic Final Alignment Method in the Ontology Matching System
Personal security and malware on the Internet
Building National Capacity to support Augmentative and Alternative Communication as an Early Intervention Method in Croatia
Internet of Things Cyber Security: Smart Door Lock System
Rule-Based System for Data Leak Threat Estimation
Building National Capacity to support Augmentative and Alternative Communication (AAC) as an Early Intervention Method for Children aged 0-8 years with Developmental Delay/Disabilities
User interface adaptation for ICT based alternative and augmentative applications
Towards Overall Information Security and Privacy (IS&P) Taxonomy
Smartwatch as an Assistive Technology: Tracking System for Detecting Irregular User Movement
Analysis of credit card attacks using the NFC technology
Enabling Text-To-Speech Functionality for Websites and Applications Using a Content-Derived Model
Location-based Smartwatch Application for People with Complex Communication Needs
Internet, digital space and cyber security
Lightweight and adaptable solution for security agility
Clustering approach for user location data privacy in telecommunication services
Evaluation of Keyword Search in Affective Multimedia Databases
Augmentative Requirements Engineering: Getting Closer to Sensitive User’s Needs
Usability Analysis of Gesture Based User Interfaces
Voice Controlled Quiz for People with Hearing Impairment
Agent-based Movement Analysis and Location Prediction in Cellular Networks
A system for active intruder detection on WWW.HR
Behavior Analysis of a Web Catalog Users
Estimating real world privacy risk scenarios
e-Consultation: Automatic system for online consultations
Smart Detection and Classification of Application-Layer Intrusions in Web Directories
Requirements and Architecture Modeling in Software Engineering Courses
Front-end solution for enhancing web sites accessibility
User Experiences from Croatian ICT Competence Network for Innovative Services for Persons with Complex Communication Needs
User Privacy Risk Calculator
Innovative information and communication services for persons with complex communication needs
Analysing e-accessibility on selected web sites from catalogue WWW.HR
Detecting and geocoding addresses from web sites in catalogue WWW.HR
From web to native application - WWW.HR example
Support System for Development of Educational Applications Based on Augmentative and Alternative Communication
Cache and prefetch mechanisms for improving symbol usage in symbol based applications
Categorization of telecommunication services from regulatory point of view
e-Accessible service system: Calibrator and Communicator
Securing web applications and social networks
Alternative and augmentative communication in early intervention
Extracting and Geocoding Local Addresses from Websites
Business intelligence and electronic commerce
AAC Services Development: From Usability Requirements to the Reusable Components
Discovering shoppers’ journey in retail environment by using RFID
Application of RFID and NFC technologies
Detecting malicious web sites
Network neutrality: CARnet case study
Technical aspects of network neutrality
User Movement Prediction Based on Traffic Topology for Value Added Services
Automatic tagging of unavailable and changed web pages in www.hr catalog
Multi-touch : Familiarizing Seniors to ICT
Business intelligence and electronic commerce
A Platform Model for Symbol Based Communication Services
Adaptive location information management for value-added telecommunication services
Automatic Hoax Detection System
Data Stream Filtering on the Internet
An automatic hoax detection system
Business intelligence and electronic commerce
Vessel Tracking and Movement Radius Notification
Adaptive user movement prediction for advanced location-aware services
Early Forest Fire Detection with Sensor Networks: Sliding Window Skylines Approach
Predicting user movement with intelligent GPS location scaling
User movement prediction for location aware services
Wireless sensor networks for early forest fire detection
Predicting User Movement for Advanced Location-aware Services
Location Name Extraction for User Created Digital Content Services
Web content management systems - how to choose?
Delivering Location-specific Content to Mobile Users
Teaching
University undergraduate
- Computer Security (Lecturer in charge)
- Computer Security (Lecturer in charge)
- Human Factors in Computing (Lecturer in charge)
- Human Factors in Computing (Lecturer in charge)
- Information Theory (Lecturer in charge)
- Information Theory (Lecturer in charge)
- Service and application development for iOS (Lecturer in charge, Lecturer in charge)
- BSc Thesis (Lecturers)
- BSc Thesis (Lecturers)
- BSc Thesis (Lecturers)
- Final BSc Thesis (Lecturers)
- Final BSc Thesis (Lecturers)
- Project (Lecturers)
- Project C (Lecturers)
- Project C (Lecturers)
- Software Design Project (Lecturers)
- Software Design Project (Lecturers)
- Software Design Project (Lecturers)
University graduate
- Advanced Architectures of Telecommunication Networks (Lecturer in charge)
- Advanced Architectures of Telecommunication Networks (Lecturer in charge)
- Communication Security (Lecturer in charge)
- Communication Software Development (Lecturer in charge)
- Offensive Security (Lecturer in charge)
- Operating Systems and Applications Security (Lecturer in charge)
- Optical Communication Networks (Lecturer in charge)
- Security Threats on the Internet (Lecturer in charge)
- Graduation Thesis (Lecturers)
- Graduation Thesis (Lecturers)
- Graduation Thesis (Lecturers)
- Project (Lecturers)
- Project (Lecturers)
- Project (Lecturers)
- Project (Lecturers)
- Seminar 1 (Lecturers)
- Seminar 2 (Lecturers)
Postgraduate doctoral study programme
- Selected Topics in WWW Technologies & Applications (Lecturer in charge)
- Software Processes (Lecturer in charge)
Postgraduate spec. study
- Security of computer networks (Lecturer in charge)
- Web application security (Lecturer in charge)
Competences
-
Computational and artificial intelligence
Context awareness Learning (artificial intelligence) Backpropagation Learning automata Semisupervised learning Supervised learning Unsupervised learning Machine learning Predictive models -
Mathematics
Machine learning algorithms