Researchers
Veinović, Mladen
Type
- 142 Conference Paper
- 72 Article
- 25 Text book
- 12 Monograph
- 3 Technical reports
- 2 Other
- 1 Book parts
Date issued
- 31 2020 - 2025
- 157 2010 - 2019
- 55 2000 - 2009
- 14 1990 - 1999
Mp-cat.
- 3 M80
- 2 M53
- < previous
Date issued - custom
| Issue Date | Title | Author(s) | Type | Мp-cat. |
|---|---|---|---|---|
| 2014 | Implications of information systems use on the development of Web 2.0 based knowledge management system framework![]() | Opačić, Mladen; Veinović, Mladen | Conference Paper | Mp. category will be shown later |
| 2014 | An Open-Source Solution for Protecting PHP Source Code![]() | Jevremović, Aleksandar | Conference Paper | Mp. category will be shown later |
| 2014 | Primena OPNET simulacionog softvera za izradu PKI simulacionog modela![]() | Veinović, Mladen | Conference Paper | Mp. category will be shown later |
| 2014 | Suffix Tree Clustering - Data mining algorithm![]() | Milos Ilic; Spalević, Petar | Conference Paper | Mp. category will be shown later |
| 2014 | Mousetracking visitors to evaluate efficacy of web site design![]() | Jevremović, Aleksandar | Article | 24M24 |
| 2014 | Information technologies in knowledge economy![]() | Đorđević Boljanović, Jelena | Article | 52M52 |
| 2014 | Inverted Index Search in data Mining![]() | Ilic, Milos; Spalević, Petar | Conference Paper | Mp. category will be shown later |
| 2014 | ANALYZING BEHAVIOR OF STUDENTS DURING THE ELECTRONIC TESTING![]() | Jevremović, Aleksandar | Conference Paper | Mp. category will be shown later |
| 2014 | Softverski proizvod | Veinović, Mladen | Technical reports | Mp. category will be shown later |
| 2014 | An Interactive and Collaborative Approach to Teaching Cryptology![]() | Adamović, Saša | Article | 21M21 |
| 2014 | Bezbednosna proširenja DNS-a (DNSSEC)![]() | Veinović, Mladen | Technical reports | Mp. category will be shown later |
| 2014 | Managing Semi-Structured Data Using XPath, XML Trees and Tree Tuples over a Wireless Network![]() | Hesham Elzentani; Veinović, Mladen | Article | Mp. category will be shown later |
| 2014 | Application steganography methods of replacement and insertion technique![]() | M. Ćajić; M. Veinović | Conference Paper | Mp. category will be shown later |
| 2014 | Performance evaluation of WPA2 security protocol in modern wireless networks![]() | Tepsic, Dejan; Veinović, Mladen | Conference Paper | Mp. category will be shown later |
| 2013 | Uticaj bezbednosti informacionih sistema na kvalitet hotelskih usluga![]() | Veinović, Mladen | Conference Paper | Mp. category will be shown later |
| 2013 | Safety Assessment of Android Operating Systems![]() | Miroslav Ćajić; Bogdan Brkić; Šarac, Marko | Article | 23M23 |
| 2013 | Kriptologija I : osnove za analizu i sintezu šifarskih sistema![]() | Mladen Veinović | Article | Mp. category will be shown later |
| 2013 | Using Cryptology Models for Protecting PHP Source Code![]() | A. Jevremović | Conference Paper | Mp. category will be shown later |
| 2013 | Informatika![]() | Milosavljević, Milan | Text book | Mp. category will be shown later |
| 2013 | Praćenje kursora miša posetilaca kao evaluacija efikasnosti dizajna Veb sajta![]() | Adamović, Saša | Conference Paper | Mp. category will be shown later |
