Two factor authentication using EEG augmented passwords I Švogor, T Kišasondi Proceedings of the ITI 2012 34th International Conference on Information …, 2012 | 45 | 2012 |
Interoperability and lightweight security for simple IoT devices D Andročec, B Tomaš, T Kišasondi 2017 40th International Convention on Information and Communication …, 2017 | 18 | 2017 |
Efficiency and security of docker based honeypot systems D Sever, T Kišasondi 2018 41st International Convention on Information and Communication …, 2018 | 17 | 2018 |
Analysis of phishing attacks against students J Andrić, D Oreški, T Kišasondi 2016 39th international convention on information and communication …, 2016 | 14 | 2016 |
Modelling functional dependencies in databases using mathematical logic A Lovrencic, M Cubrilo, T Kisasondi 2007 11th International Conference on Intelligent Engineering Systems, 307-312, 2007 | 14 | 2007 |
Korporativna informacijska sigurnost Z Krakar, S Tomić Rotim, M Žgela, K Arbanas, T Kišasondi | 8 | 2014 |
Detecting anomalous Web server usage through mining access logs T Gržinic, T Kišasondi, J Šaban, HAABI AG Central European Conference on Information and Intelligent Systems, 228-296, 2013 | 8 | 2013 |
Biometric cryptography and network authentication T Kišasondi, M Bača, A Lovrenčić Journal of information and organizational sciences 31 (1), 91-99, 2007 | 5 | 2007 |
Improving computer authentication systems with biometric technologies T Kišasondi, M Bača, M Schatten Information Systems Security, MIPRO 2006, 2006 | 4 | 2006 |
A lightweight eportfolio artifact integrity method I Balaban, T Kišasondi Interactive Computer Aided Learning: The Challenges of Life Long Learning …, 2009 | 3 | 2009 |
Prstom otključaj vrata M Bača, M Schatten, T Kišasondi Zaštita 2, 2006 | 3 | 2006 |
Detecting anomalous Web server usage through mining access logs T Grzinic, T Kisasondi, J Saban Central European Conference on Information and Intelligent Systems, 228, 2013 | 2 | 2013 |
A multiple layered approach to malware identification and classification problem T Kisasondi, D Klasic, Z Hutinski Central european conference on information and intelligent systems, 429, 2010 | 2 | 2010 |
Cryptographic routing protocol for secure distribution and multiparty negotiatiated access control T Kisasondi, Z Hutinski Central European COnference on Information and Intelligent systems, 267, 2009 | 2 | 2009 |
Selecting neural network architecture for investment profitability predictions T Kišasondi, A Lovrenčić Journal of Information and Organizational Sciences 30 (1), 93-103, 2006 | 2 | 2006 |
Accelerating penetration testing with distributed computing T Kišasondi, Ž Hutinski Information Systems Security: MIPRO 2008, 100-103, 2008 | 1 | 2008 |
Domain Specific Honeytokens Based on Natural Language Processing–A Conceptual Model T Turek, T Kišasondi, M Schatten Central European Conference on Information and Intelligent Systems, 207-211, 2018 | | 2018 |
Metoda analize otpornosti i kvalitete lozinki zaštićenih pomoću kriptografskih jednosmjernih funkcija T Kišasondi University of Zagreb. Faculty of Organization and Informatics Varaždin, 2014 | | 2014 |
Korporativna informacijska sigurnost i nove tehnologije T Kišasondi | | 2014 |
Social networks and security of their users J Ćosić, Z Ćosić, M Bača, T Gržinić, T Kišasondi, J Šaban, M Strbo, ... Central European Conference on Information and Intelligent Systems, 2013 | | 2013 |