Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks Z Gavric, D Simic Ingeniería e Investigación 38 (1), 130-138, 2018 | 45 | 2018 |
A survey of wireless security D Simic, R Prodanovic Journal of computing and information technology 15 (3), 237-255, 2007 | 34 | 2007 |
Applying MVC and PAC patterns in mobile applications D Plakalovic, D Simic arXiv preprint arXiv:1001.3489, 2010 | 33 | 2010 |
Common web application attack types and security using asp. net B Jovičić, D Simić Computer Science and Information Systems 3 (2), 83-96, 2006 | 25 | 2006 |
Fishbone model and universal authentication framework for evaluation of multifactor authentication in mobile environment D Korać, D Simić Computers & Security 85, 313-332, 2019 | 23 | 2019 |
An Approach to Access Control in Electronic Health Record DS Snezana Sucurovic JOURNAL OF MEDICAL SYSTEMS 34 (4), 659-666, 2010 | 21 | 2010 |
Defense strategies against modern botnets S Stankovic, D Simic arXiv preprint arXiv:0906.3768, 2009 | 21 | 2009 |
A model of digital identity for better information security in e-learning systems D Korać, B Damjanović, D Simić The Journal of Supercomputing, 1-30, 2022 | 19 | 2022 |
Information security in M-learning systems: Challenges and threats of using cookies D Korać, B Damjanović, D Simić 2020 19th International Symposium INFOTEH-JAHORINA (INFOTEH), 1-6, 2020 | 18 | 2020 |
Designing laboratory for IoT communication infrastructure environment for remote maritime surveillance in equatorial areas based on the Gulf of Guinea field experiences R Petrovic, D Simic, D Drajic, Z Cica, D Nikolic, M Peric Sensors 20 (5), 1349, 2020 | 14 | 2020 |
Bringing biometric sensors to the classroom: a fingerprint acquisition laboratory for improving student motivation and commitment M Bogicevic Sretenovic, I Milenkovic, B Jovanovic, D Simic, M Minovic, ... Applied Sciences 10 (3), 880, 2020 | 14 | 2020 |
Improving student engagement in a biometric classroom: the contribution of gamification I Milenković, U Šošević, D Simić, M Minović, M Milovanović Universal Access in the Information Society 18, 523-532, 2019 | 13 | 2019 |
A novel approach to building secure systems D Vidakovic, D Simic The Second International Conference on Availability, Reliability and …, 2007 | 13 | 2007 |
An intrusion prevention system as a proactive security mechanism in network infrastructure SD Dulanović, Nenad, Hinić Dane Yugoslav Journal of Operations Research 18 (1), 109-122, 2008 | 12 | 2008 |
Reducing fraud in electronic payment systems D Simic The 7th Balkan Conference on Operational Research, available at http://fmi …, 2005 | 11 | 2005 |
Design of fuzzy expert system for evaluation of contemporary user authentication methods intended for mobile devices SD Korac, Dragan Journal of Control Engineering and Applied Informatics 19 (4), 93-100, 2017 | 9 | 2017 |
Choosing authentication techniques in e-procurement system in Serbia M Milovanovic, M Bogicevic, M Lazovic, D Simic, D Starcevic 2010 International Conference on Availability, Reliability and Security, 374-379, 2010 | 9 | 2010 |
Man-in-the-middle attack based on ARP spoofing in IoT educational platform R Petrović, D Simić, S Stanković, M Perić 2021 15th International Conference on Advanced Technologies, Systems and …, 2021 | 8 | 2021 |
Iot oth maritime surveillance service over satellite network in equatorial environment: Analysis, design and deployment R Petrovic, D Simic, Z Cica, D Drajic, M Nerandzic, D Nikolic Electronics 10 (17), 2070, 2021 | 8 | 2021 |
Using Kerberos protocol for single sign-on in identity management systems I Milenković, O Latinović, D Simić JITA-APEIRON 5 (1), 2013 | 8 | 2013 |