Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Daniel P. Kennedy
Dan Graur
Barbara Aquilani
Maximilian Dürr
Jhonathan Pinzon
Liangliang Shang
Yang Xie
Chen Ma
Yoichi Hayashi
Gaurvi Goyal
Home
/
Author
/
BOSTJAN BRUMEN
Author Info
Open Visualization
Name
Affiliation
Papers
BOSTJAN BRUMEN
Faculty of Electrical Engineering and Computer Science, University of Maribor, Smetanova ulica 17, SI-2000 Maribor, Slovenia, e-mail: ales.zivkovic@uni-mb.si
42
Collaborators
Citations
PageRank
44
260
25.48
Referers
Referees
References
609
628
333
Search Limit
100
628
Publications (42 rows)
Collaborators (44 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
Overview Of Machine Learning Process Modelling
0
0.34
2021
Shoulder Surfing Experiments: A Systematic Literature Review
0
0.34
2020
Shoulder Surfing: From An Experimental Study to a Comparative Framework.
1
0.37
2019
Rejecting the death of passwords: Advice for the future.
0
0.34
2019
Security analysis of Game Changer Password System.
0
0.34
2019
Examining Security And Usability Aspects Of Knowledge-Based Authentication Methods
0
0.34
2019
Brute-Force And Dictionary Attack On Hashed Real-World Passwords
0
0.34
2018
Improving the Evaluation of Shoulder Surfing Attacks.
0
0.34
2018
Modeling of a Data Warehouse Based on ETL Process Performance.
0
0.34
2017
Analysing Real Students' Passwords And Students' Passwords Characteristics Received From A Questionnaire
0
0.34
2016
What Do Students Do With Their Assigned Default Passwords?
0
0.34
2016
Laws Describing Artificial Learning.
0
0.34
2016
Performance Analysis Of Two Open Source Intrusion Detection Systems
0
0.34
2016
Impact Of Security Education On Password Change
1
0.41
2015
Moore'S Curse On Textual Passwords
3
0.39
2015
Artificial Classification Models and Real Data.
0
0.34
2015
The Effect of Educating Users on Passwords: a Preliminary Study.
0
0.34
2014
A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion.
111
2.61
2014
Brute force analysis of PsychoPass-generated Passwords
1
0.35
2014
Comparisons between Three Cross-Validation Methods for Measuring Learners' Performances.
0
0.34
2014
Observing a Naïve Bayes Classifier's Performance on Multiple Datasets.
0
0.34
2014
Predicting Grades Based on Students' Online Course Activities.
0
0.34
2014
Modeling of classification error rate based on neural networks learners.
0
0.34
2014
Password security — No change in 35 years?
2
0.41
2014
Best-Fit Learning Curve Model for the C4.5 Algorithm
1
0.35
2014
Learning Process Termination Criteria
4
0.67
2012
Attacks and Improvement of an Efficient Remote Mutual Authentication and Key Agreement Scheme
4
0.46
2010
Medical Personal Data in Secure Information Systems
0
0.34
2009
WSDL and UDDI extensions for version support in web services
37
1.90
2009
Comparative Study Of Tripartite Identity-Based Authenticated Key Agreement Protocols
3
0.40
2009
Conceptual Model - Meeting of Cultures
0
0.34
2008
Teaching IT in Health Care and Nursing Program--Experiences
0
0.34
2007
Teaching of Information Security in the "Health Care and Nursing" Postgraduate program
2
0.55
2007
Comparison of performance of Web services, WS-Security, RMI, and RMI-SSL
51
2.75
2006
The Impact of Details in the Class Diagram on Software Size Estimation
7
0.59
2005
Internationalization Content in Intelligent Systems - How to Teach it?
2
0.49
2004
Early Assessment of Classification Performance
5
0.56
2004
Data protection for outsourced data mining
5
0.58
2002
Protecting medical data for analyses
3
0.39
2002
Predicting Sample Size in Data Mining Tasks: Using Additive Incremental Approach
2
0.45
2000
Computing Science Research Activities at the Faculty of Electrical Engineering, Computer Science and Informatics
0
0.34
2000
Performance Assesment Framework for Distributed Object Architectures
15
3.37
1999
1