Name
Affiliation
Papers
BOSTJAN BRUMEN
Faculty of Electrical Engineering and Computer Science, University of Maribor, Smetanova ulica 17, SI-2000 Maribor, Slovenia, e-mail: ales.zivkovic@uni-mb.si
42
Collaborators
Citations 
PageRank 
44
260
25.48
Referers 
Referees 
References 
609
628
333
Search Limit
100628
Title
Citations
PageRank
Year
Overview Of Machine Learning Process Modelling00.342021
Shoulder Surfing Experiments: A Systematic Literature Review00.342020
Shoulder Surfing: From An Experimental Study to a Comparative Framework.10.372019
Rejecting the death of passwords: Advice for the future.00.342019
Security analysis of Game Changer Password System.00.342019
Examining Security And Usability Aspects Of Knowledge-Based Authentication Methods00.342019
Brute-Force And Dictionary Attack On Hashed Real-World Passwords00.342018
Improving the Evaluation of Shoulder Surfing Attacks.00.342018
Modeling of a Data Warehouse Based on ETL Process Performance.00.342017
Analysing Real Students' Passwords And Students' Passwords Characteristics Received From A Questionnaire00.342016
What Do Students Do With Their Assigned Default Passwords?00.342016
Laws Describing Artificial Learning.00.342016
Performance Analysis Of Two Open Source Intrusion Detection Systems00.342016
Impact Of Security Education On Password Change10.412015
Moore'S Curse On Textual Passwords30.392015
Artificial Classification Models and Real Data.00.342015
The Effect of Educating Users on Passwords: a Preliminary Study.00.342014
A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion.1112.612014
Brute force analysis of PsychoPass-generated Passwords10.352014
Comparisons between Three Cross-Validation Methods for Measuring Learners' Performances.00.342014
Observing a Naïve Bayes Classifier's Performance on Multiple Datasets.00.342014
Predicting Grades Based on Students' Online Course Activities.00.342014
Modeling of classification error rate based on neural networks learners.00.342014
Password security — No change in 35 years?20.412014
Best-Fit Learning Curve Model for the C4.5 Algorithm10.352014
Learning Process Termination Criteria40.672012
Attacks and Improvement of an Efficient Remote Mutual Authentication and Key Agreement Scheme40.462010
Medical Personal Data in Secure Information Systems00.342009
WSDL and UDDI extensions for version support in web services371.902009
Comparative Study Of Tripartite Identity-Based Authenticated Key Agreement Protocols30.402009
Conceptual Model - Meeting of Cultures00.342008
Teaching IT in Health Care and Nursing Program--Experiences00.342007
Teaching of Information Security in the "Health Care and Nursing" Postgraduate program20.552007
Comparison of performance of Web services, WS-Security, RMI, and RMI-SSL512.752006
The Impact of Details in the Class Diagram on Software Size Estimation70.592005
Internationalization Content in Intelligent Systems - How to Teach it?20.492004
Early Assessment of Classification Performance50.562004
Data protection for outsourced data mining50.582002
Protecting medical data for analyses30.392002
Predicting Sample Size in Data Mining Tasks: Using Additive Incremental Approach20.452000
Computing Science Research Activities at the Faculty of Electrical Engineering, Computer Science and Informatics00.342000
Performance Assesment Framework for Distributed Object Architectures153.371999