Smart Blue Tourism: Towards Smart Marinas and Tourist Boats
Detecting Disinformation in Croatian Social Media Comments
A Survey on User Profiling, Data Collection, and Privacy Issues of Internet Services
Study on Information Security Awareness using the Behavioral-Cognitive Internet Security Questionnaire
Study on Information Security Awareness using the Behavioral-Cognitive Internet Security Questionnaire
Study on Information Security Awareness using the Behavioral-Cognitive Internet Security Questionnaire
Anonymization-Based Method for Privacy-Preservation of Users in Internet Services
A federated authentication and authorization approach for IoT farming
2023 17th International Conference on Telecommunications (ConTEL)
Digital Cultural Heritage, Cybersecurity, and the Human Factor
A federated authentication and authorization approach for IoT farming
Digital accessibility – "stairs" on the way to the accessible web
A distributed geospatial publish/subscribe system on Apache Spark
Predicting Vulnerabilities in Web Applications Based on Website Security Model
Securing IoT Services Based on Security Requirement Categories
N-gram Based Croatian Language Network: Application in a Smart Environment
Predicting Vulnerabilities in Web Applications Based on Website Security Model
Spoken notifications in smart environments using Croatian language
N-gram Based Croatian Language Network
Natural Language Agents in a Smart Environment
Speech Controlled IoT System Based on Context- Driven Rule Engine
Context-Aware Service Orchestration in Smart Environments
Croatian n-gram system
Anomaly Detection Based on Fixed and Wearable Sensors in Assisted Living Environments
Using Gamification for Solving Resource Allocation and Serving in Employee Attendance Tracking System
User Authentication Based on Contactless High and Ultra-High Frequency RFID Tags
Requirements Engineering Challenges in Building AI-Based Complex Systems
Internet Security and Safety Learning via an Innovative Educational Game
An Iterative Automatic Final Alignment Method in the Ontology Matching System
Internet of Things Cyber Security: Smart Door Lock System
Personal security and malware on the Internet
Building National Capacity to support Augmentative and Alternative Communication as an Early Intervention Method in Croatia
Building National Capacity to support Augmentative and Alternative Communication (AAC) as an Early Intervention Method for Children aged 0-8 years with Developmental Delay/Disabilities
Smartwatch as an Assistive Technology: Tracking System for Detecting Irregular User Movement
Towards Overall Information Security and Privacy (IS&P) Taxonomy
Analysis of credit card attacks using the NFC technology
Rule-Based System for Data Leak Threat Estimation
Enabling Text-To-Speech Functionality for Websites and Applications Using a Content-Derived Model
User interface adaptation for ICT based alternative and augmentative applications
Augmentative Requirements Engineering: Getting Closer to Sensitive User’s Needs
Evaluation of Keyword Search in Affective Multimedia Databases
Internet, digital space and cyber security
Lightweight and adaptable solution for security agility
Location-based Smartwatch Application for People with Complex Communication Needs
Clustering approach for user location data privacy in telecommunication services
Usability Analysis of Gesture Based User Interfaces
Voice Controlled Quiz for People with Hearing Impairment
e-Consultation: Automatic system for online consultations
Requirements and Architecture Modeling in Software Engineering Courses
Smart Detection and Classification of Application-Layer Intrusions in Web Directories
A system for active intruder detection on WWW.HR
Estimating real world privacy risk scenarios
Behavior Analysis of a Web Catalog Users
Agent-based Movement Analysis and Location Prediction in Cellular Networks
Front-end solution for enhancing web sites accessibility
User Privacy Risk Calculator
User Experiences from Croatian ICT Competence Network for Innovative Services for Persons with Complex Communication Needs
Innovative information and communication services for persons with complex communication needs
Analysing e-accessibility on selected web sites from catalogue WWW.HR
Detecting and geocoding addresses from web sites in catalogue WWW.HR
Support System for Development of Educational Applications Based on Augmentative and Alternative Communication
Cache and prefetch mechanisms for improving symbol usage in symbol based applications
From web to native application - WWW.HR example
e-Accessible service system: Calibrator and Communicator
Business intelligence and electronic commerce
Potpomognuta komunikacija u ranoj intervenciji
Securing web applications and social networks
Categorization of telecommunication services from regulatory point of view
Discovering shoppers’ journey in retail environment by using RFID
AAC Services Development: From Usability Requirements to the Reusable Components
A Platform Model for Symbol Based Communication Services
Detecting malicious web sites
Network neutrality: CARnet case study
Multi-touch : Familiarizing Seniors to ICT
Technical aspects of network neutrality
Application of RFID and NFC technologies
User Movement Prediction Based on Traffic Topology for Value Added Services
Business intelligence and electronic commerce
Automatic tagging of unavailable and changed web pages in www.hr catalog
Automatic Hoax Detection System
An automatic hoax detection system
Business intelligence and electronic commerce
Data Stream Filtering on the Internet
Vessel Tracking and Movement Radius Notification
Adaptive user movement prediction for advanced location-aware services
Early Forest Fire Detection with Sensor Networks: Sliding Window Skylines Approach
Predicting user movement with intelligent GPS location scaling
Wireless sensor networks for early forest fire detection
User movement prediction for location aware services
Predicting User Movement for Advanced Location-aware Services
Location Name Extraction for User Created Digital Content Services
Web content management systems - how to choose?
Teaching
University undergraduate
- Competitive skills in cybersecurity (Lecturer in charge, Lecturer in charge)
- Computer Security (Lecturer in charge)
- Computer Security (Lecturer in charge)
- Human Factors in Computing (Lecturer in charge)
- Human Factors in Computing (Lecturer in charge)
- Information Theory (Lecturer in charge)
- Information Theory (Lecturer in charge)
- Service and application development for iOS (Lecturer in charge, Lecturer in charge)
- BSc Thesis (Lecturers)
- BSc Thesis (Lecturers)
- Final BSc Thesis (Lecturers)
- Final BSc Thesis (Lecturers)
- Project (Lecturers)
- Project C (Lecturers)
- Project C (Lecturers)
- Software Design Project (Lecturers)
- Software Design Project (Lecturers)
- Software Design Project (Lecturers)
University graduate
- Advanced Architectures of Telecommunication Networks (Lecturer in charge)
- Advanced Architectures of Telecommunication Networks (Lecturer in charge)
- Communication Security (Lecturer in charge)
- Communication Security (Lecturer in charge)
- Communication Software Development (Lecturer in charge)
- Offensive Security (Lecturer in charge)
- Operating Systems and Applications Security (Lecturer in charge)
- Optical Communication Networks (Lecturer in charge)
- Security Threats on the Internet (Lecturer in charge)
- Graduation Thesis (Lecturers)
- Master Project (Lecturers)
- Mentored Seminar (Lecturers)
- Presentation Seminar (Lecturers)
- Project (Lecturers)
Postgraduate doctoral study programme
- Selected Topics in WWW Technologies & Applications (Lecturer in charge)
- Software Processes (Lecturer in charge)
Postgraduate spec. study
- Security of computer networks (Lecturer in charge)
- Web application security (Lecturer in charge)
Competences
-
Computational and artificial intelligence
Context awareness Learning (artificial intelligence) Backpropagation Learning automata Semisupervised learning Supervised learning Unsupervised learning Machine learning Predictive models -
Mathematics
Machine learning algorithms
Pristupačnost