Уноси
Search full-text
"Dragan Korać"
-
A mathematical model for evaluation of intelligence products value (2018)
D. Korac, Dj. Cica, A mathematical model for evaluation of intelligence products value, Journal of Information and Optimization Sciences, Vol. 39, pp. 903 - 926, 2018 -
Elliptic Curve Cryptography with a Curve25519 Short Overview, Platforms for Digital Leadership (2019)
B. Damjanović, P. Kovačević, D. Korać, Elliptic Curve Cryptography with a Curve25519 Short Overview, Platforms for Digital Leadership, Faculty of Information Technology and Engineering University “Union-Nikola Tesla” in Belgrade, Serbia, 2019 -
Zaštita informacija u okviru sistema menadžmenta identiteta i upravljanja pristupom (2022)
D. Korać, Zaštita informacija u okviru sistema menadžmenta identiteta i upravljanja pristupom, Univerzitet u Banjoj Luci, Prirodno – matematički fakultet, 2022 -
Sveobuhvatni pregled i komparacija savremenih korisničkih autentifikacionih metoda za mobilne uređaje (2015)
D. Korać, Sveobuhvatni pregled i komparacija savremenih korisničkih autentifikacionih metoda za mobilne uređaje, INFO M, 2015 -
Komparacija modela zaštite informacija (2015)
D. Korać, Komparacija modela zaštite informacija, INFO M, 2015 -
Design of fuzzy expert system for evaluation of contemporary user authentication methods intended for mobile devices (2017)
D. Korać, D. Simić, Design of fuzzy expert system for evaluation of contemporary user authentication methods intended for mobile devices, CONTROL ENGINEERING AND APPLIED INFORMATICS, 2017 -
A mathematical model for evaluation of intelligence products value (2018)
D. Korać, Đ. Čiča, A mathematical model for evaluation of intelligence products value, Journal of Information and Optimization Sciences, 2018 -
Fishbone model and universal authentication framework for evaluation of multifactor authentication in mobile environment (2019)
D. Korać, D. Simić, Fishbone model and universal authentication framework for evaluation of multifactor authentication in mobile environment, COMPUTERS & SECURITY, 2019 -
Istraživanje izazova i prijetnji od XSS napada (2020)
D. Korać, B. Damjanović, D. Simić, Istraživanje izazova i prijetnji od XSS napada, INFO M, 2020 -
A model of digital identity for better information security in e-learning systems (2022)
D. Korać, B. Damjanović, D. Simić, A model of digital identity for better information security in e-learning systems, JOURNAL OF SUPERCOMPUTING, 2022 -
A hybrid XSS attack (HYXSSA) based on fusion approach: Challenges, threats and implications in cybersecurity (2022)
D. Korać, B. Damjanović, D. Simić, K.K.R. Choo, A hybrid XSS attack (HYXSSA) based on fusion approach: Challenges, threats and implications in cybersecurity, Journal of King Saud University - Computer and Information Sciences, 2022 -
Pregled metoda autentifikacije na mobilnim uredajima (2013)
D. Korać, D. Simić, Pregled metoda autentifikacije na mobilnim uredajima, 2013 -
Digitalni identitet u modelima menadžmenta identiteta (2014)
D. Korać, D. Simić, Digitalni identitet u modelima menadžmenta identiteta, 2014 -
Information Security in M-learning Systems: Challenges and Threats of Using Cookies (2020)
D. Korać, B. Damjanović, D. Simić, Information Security in M-learning Systems: Challenges and Threats of Using Cookies, 2020 -
On the use of scheduled consensus in business applications (2022)
B. Damjanović, D. Korać, N. Stamenković, On the use of scheduled consensus in business applications, 2022 -
Cybersecurity in Mobile Devices: Vector Attacks and Defence in Depth (2023)
D. Korać, Cybersecurity in Mobile Devices: Vector Attacks and Defence in Depth, 2023 -
Приједлог превода основних термина који се односе на рад са великим језичким моделима (2024)
Д.Д. Чвокић, Д. Кораћ, К. Деспотовић, Приједлог превода основних термина који се односе на рад са великим језичким моделима, МАТ-КОЛ, Vol. 30, No. 1, pp. 53 - 68, 2024