Blerim Rexha

Blerim Rexha
University of Prishtina · Faculty of Electrical and Computer Engineering

Professor

About

77
Publications
53,550
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
127
Citations
Citations since 2016
27 Research Items
71 Citations
201620172018201920202021202202468101214
201620172018201920202021202202468101214
201620172018201920202021202202468101214
201620172018201920202021202202468101214
Introduction
#Increasing security and privacy in contemporary software applications supported by Ministry of Education, Science and Technology
Additional affiliations
October 2007 - present
University of Prishtina
Position
  • Head of Department
September 2000 - January 2007
Siemens
Position
  • Software Engineer
Education
October 1997 - April 2004
TU Wien
Field of study
  • Data security

Publications

Publications (77)
Article
Full-text available
Exchange of information through the web took place inside a trusted environment and thus user privacy was assured by default. Nowadays, ensuring user privacy is becoming one of the most desirable features of new technology, and Blockchain is not an exception. The Blockchain is a decentralized technology, open, and public platform where all transact...
Article
Today’s web represents the most extensive engineered system ever created by humankind. Web security is critical to web application providers and end-users. Burp Suite is established as a state-of-the-art and fully featured set of tools for web vulnerability scanners. This paper presents a novel approach using state of the art Machine Learning algor...
Article
Full-text available
Anonymity and privacy in the electoral process are mandatory features found in any democratic society, and many authors consider these fundamental civil liberties and rights. During the election process, every voter must be identified as eligible, but after casting a vote, the voter must stay anonymous, assuring voter and vote unlinkability. Voter...
Preprint
Full-text available
Biometric authentication methods, representing the "something you are" scheme, are considered the most secure approach for gaining access to protected resources. Recent attacks using Machine Learning techniques demand a serious systematic reevaluation of biometric authentication. This paper analyzes and presents the Fast Gradient Sign Method (FGSM)...
Technical Report
This publication is based upon work from COST Action GoodBrother – Network on Privacy-Aware Audioand Video-Based Applications for Active and Assisted Living, supported by COST (European Cooperation in Science and Technology).
Article
Biometric authentication methods, representing the ”something you are” scheme, are considered the most secure approach for gaining access to protected resources. Recent attacks using Machine Learning techniques demand a serious systematic reevaluation of biometric authentication. This paper analyzes and presents the Fast Gradient Sign Method (FGSM)...
Conference Paper
Due to the large population movement, many countries and institutions need to modernize their voting systems to support a moving society that is becoming more oriented towards Internet technologies. Electronic voting is a service that is not only used by governments but can be used by numerous institutions to benefit in time, cost, and distance acc...
Article
Full-text available
Recently crowdsourcing is being established as the new platform for capturing ideas from multiple users, i.e., the crowd. Many companies have already shifted their approach towards utilising the power of the crowd. Transparency and quality of election process is the main factor for acknowledging the general election results. Voters, crowd feedback...
Article
Full-text available
Energy and spectral efficiency are the main challenges in 5th generation of mobile cellular networks. In this paper, we propose an optimization algorithm to optimize the energy efficiency by maximizing the spectral efficiency. Our simulation results show a significant increase in terms of spectral efficiency as well as energy efficiency whenever th...
Article
Full-text available
In the beginning of Bologna’s process and creation of European Higher Education Area (EHEA), great importance has been to the transparency, increase of quality and concurrency between institutions of higher education. Nowadays, hot topic in higher education institutions in Europe are real-time learning outcomes, they are analyzed, projected and are...
Article
Full-text available
Today, we are witnessing increased demand for more speed and capacity in the Internet, and more processing power and storage in every end user device. Demand for greater performance is present in every system. Electronic devices and their hosted applications need to be fast, but not to lose their main security features. Authentication and encryptio...
Article
Full-text available
Information technology (IT) systems have great potential to improve the efficiency and methods of operation in each government organization, providing added convenience and flexibility. Currently, most of government law enforcement agencies have digitized their methods of work by advancing their user services. With this new approach, have come new...
Article
Full-text available
Applications that requires true random number generator (TRNG), which uses raw analog data generated from any noise source in nature, must convert the source normal distribution to uniform distribution. Many up to date implementations convert the raw analog data into digital data by employing a comparator or a Schmitt trigger. This method wastes a...
Article
The mobile networks use femtocells as low power nodes to improve indoor coverage and thus achieve a high network capacity. In this paper, we focus on a combination of macrocells and femtocells in Long Term Evolution (LTE) networks. To achieve a high LTE network performance, we investigate the influence of power allocated to Evolved NodeB (eNodeBs)...
Article
Full-text available
Personal mobile devices currently have access to a significant portion of their user’s private sensitive data and are increasingly used for processing mobile payments. Consequently, securing access to these mobile devices is a requirement for securing access to the sensitive data and potentially costly services. Face authentication is one of the pr...
Article
Teachers' contribution in the process of improving the contemporary school performance is manifold and permanent. This study elaborates the contribution of the Kosovan teachers towards the improvement of the quality of work in primary and lower secondary school. Data were collected from 1080 teachers working in schools located in different areas in...
Conference Paper
Local Loop Unbundling (LLU) is a process which allows the competitive Network Service Providers (NSPs) to use the telecom's incumbent infrastructure to provide the services to their subscribers. In logical LLU, as the traffic passes through the incumbent network infrastructure, security and privacy of the NSP subscribers is of a serious concern. In...
Article
Full-text available
With all features and resources, such as: social actors, social relations, content, communication, and ratings that todays' social networks like Facebook, LinkedIn, Twitter, Google+, etc. offer to users, it still appears that at given point we have to refine and optimize our own accounts within the limits of a certain social network. In line with t...
Article
Full-text available
Quality of election process is the main factor for acknowledging the general election results. In this sense a feedback from voters is critical to maintain a desired quality of the process. Crowdsourcing is establishing as a standard platform for capturing feedback and new ideas from the participating stakeholders. This paper presents an efficient...
Presentation
Full-text available
Invited speaker about password authentication
Article
Full-text available
The rapid growth of Web in recent years has changed everyday life. New applications for sharing social activities on the Web, such us Facebook, Twitter, Google+ etc. are becoming more and more popular. The interactivity and behavior among these users in Web is measured by number of likes, comments, posts and shares and their personal perception. Bu...
Conference Paper
Full-text available
Nowadays all organizations tend to shift their daily business processes into web. This shifting requires from web developer’s detailed knowledge about security techniques, such as Structured Query Language (SQL) injection and Cross Site Scripting Attack (XSS), otherwise the data managed and protected by web application could be exposed to not autho...
Conference Paper
Full-text available
When the Internet was designed in early 70s it main goal was to establish communication between two parties. Few decades later a saying " on the Internet, nobody knows you're a dog " was coined, representing the fundamental user right-freedom of choosing his identity in the Internet. The recent rapid growth of electronic and mobile services over In...
Conference Paper
Full-text available
Nowadays is not important any more to have the fastest processor and largest data capacity installed but instead it has become a necessity to have a fast and reliable Internet connection as all of user data and processing is done somewhere in cloud. Apple, Google, Microsoft, Amazon and many other online service providers have changed their business...
Conference Paper
Full-text available
Short Message Service (SMS) is the oldest application for exchanging messages between communicating parties in cellular network used by mobile phones. These messages are encrypted over-the-air with A5/1 algorithm and stored as clear text at network operator. Recent developments have shown that this algorithm is not secure any more. Compromising...
Conference Paper
Full-text available
Krijimi i aplikacioneve bashkëkohore softuerike të ndryshme për desktop, ueb apo mobile nuk është ndonjë sfidë e madhe pasi që në treg tashmë ekzistojnë vegla me të cilat këto aplikacione mund të ndërtohen dhe përdoren lehtë. Sfida më e madhe për këto lloj aplikacionesh është rritja e sigurisë dhe privatësisë se përdoruesit gjate përdorimit të këty...
Article
Full-text available
Problemi TSP (Travelling Salesman Person) është i njohur si problem NP i vështirë (non-deterministic polynomial-time) dhe për këtë arsye algoritmet janë të detyruara të japin një zgjidhje optimale brenda një kohe të arsyeshme. Qëllimi i TSP është të përcaktojë ose gjejë ciklin më të shkurtër të ashtuquajtur cikli i Hamiltonit a rrugën më të shkurtë...
Article
Full-text available
Information technology is becoming the world's most influential factors in everyday life. It has even large economic impact in family and state budget. Web software systems, due to their friendly network configuration and hardware independence properties ate gaining more and more user acceptance. But, in web systems the authenticity of transmitted...
Conference Paper
Full-text available
Strategjia e Energjisë e Republikës së Kosovës për periudhën 2009–2018 fokus të veçantë përveç sigurisë së furnizimit të qëndrueshëm me energji elektrike ka edhe diversifikimin e burimeve të energjisë elektrike. Linjiti, duke pasur parasysh rezervat e mëdha që posedon Kosova, është burimi parësor me të cilën do të arrihet furnizimi bazik por edhe B...
Article
Employing data mining algorithms on previous student's records may give important results in defining new ways of learning and during the process of development of a new curriculum for educational institutions. Creating group profiles by analyzing certain attributes of the students helps in defining more specifically the needs of the students. Achi...
Conference Paper
Authentication systems with usage of finger prints are very common, because they have a very low cost of implementation and offer a higher security and safety. Knowing of fingerprints or authentication using fingerprints is done with automated methods and is one of the many biometric ways to identify different persons and their identity. But, in sy...
Article
Full-text available
We all are witnessing the exponential growth of website sophisticated attacks in different areas and from various sources. This paper presents a research on the vulnerabilities of different web sites that are opera-tional today in Kosovo. It focuses in the process of testing the web sites for different attack possibilities and their weakness in res...
Conference Paper
Problemi TSP (Travelling Salesman Person) është i njohur si problem NP i vështirë (non-deterministic polynomial-time) dhe për këtë arsye algoritmet janë të detyruara të japin një zgjidhje optimale brenda një kohe të arsyeshme. Qëllimi i TSP është të përcaktojë ose gjejë ciklin më të shkurtër të ashtuquajtur cikli i Hamiltonit apo rrugën më të shkur...
Conference Paper
Full-text available
Shërbimi i e-mailit ka ndikuar në lehtësimin e komunikimit të përditshëm, por edhe ka sjellë vështirësi që ndërlidhen me menaxhimin e emailave të padëshiruar të njohur si spam e të cilët dita më ditë janë duke u rritur. Shumica e teknikave të cilat sot përdoren për filtrimin e emailave të padëshiruar nuk janë efikase për arsye të natyrës së emailit...
Conference Paper
Full-text available
Among European countries, Kosovo is ranked low with respect to the provision of on-line e-Government services. The challenges in the introduction of e-Government in Kosovo were largely related to launching simple service delivery and integration of governments back offices. There is still a big disparity between what is being provided and what citi...
Conference Paper
Schools and academic institutions may improve their curricula by checking student's data and their interoperability. Besides that, checking different student attributes may result in acquiring new knowledge for future improvements. The challenge of many schools however remains in gathering complete data into a single structured database. Working wi...
Conference Paper
The e-Government implementation in Kosovo holds a great potential in further developing its current services to its citizens and supporting the improvement of current governmental processes and structures despite its low ranking among European Countries in the provision of e-government services. In order to determine how the current e-government se...
Article
Full-text available
Offering e-Government services to citizens is linked primarily to civil registry data. Searching for a citizen's data in civil registry is a common service carried out by string search algorithms using unique keywords such as citizen's name and surname. Similar pronunciation of some Albanian language consonants challenges search on citizen's data,...
Conference Paper
Full-text available
Authentication and privacy are central issues for acceptance of any e-Voting system in particular and growth of e-Services in general. This paper aims to: (i) to analyze the appropriate architecture and propose new efficient architecture of electronic voting system in Kosovo, and (ii) to analyze the threat vectors and their avoidance in such system...
Conference Paper
Full-text available
In this paper is presented a novel solution for the implementation of an electronic voting system using smart cards and digital certificates. The novelty of implemented solution is based on using smart card as secure processing and anonymizer device and constraining their processing capability to a certain number of voting records, which is equal t...
Conference Paper
Full-text available
Civil Registry Information System serves as an essential data source for all e-government services. Searching for a citizen's data in Civil Registry Database is usually done by providing unique keywords such as name. Due to the similar pronunciation of some Albanian language consonants, for example gj [ɟ] and xh [d ͡ ʒ], problems arise in finding c...
Conference Paper
Përveç në punë, kompjuteri është një mjet i pa evitueshëm edhe gjatë aktiviteteve tjera të lira, si që janë: informimi, lojërat kompjuterike, dëgjimi i muzikës, etj. Kohëve të fundit, duke u anëtarësuar në të ashtuquajturat rrjete sociale, p.sh. në Facebook, Twitter, MySpace, Hi5 etj. kompjuteri shfrytëzohet edhe për komunikim e shoqërim me të tjer...
Conference Paper
Full-text available
Sipas raportit të Komisionit Qendror të Zgjedhjeve – KQZ në zgjedhjet e 12 dhjetorit 2010 në Kosovë ishin të regjistruar 1,630,636 qytetarë me të drejtë vote, të shpërndarë në 746 qendra votimi me gjithsej 2,280 vendvotime. E statistikat botërore tregojnë se zhvillimi i hovshëm i Teknologjisë së Informacionit dhe të Komunikimit ka sjellë edhe autom...
Article
In this paper is presented a modern approach for developing and implementing resettlement strategy in mining areas in Kosovo using Geographic Information System. The main aim of such Geographic Information System is to digitally represent various geographical collected data linked to location. The geological map of Kosovo was analogous until year 2...
Article
Full-text available
In this paper is presented a web tool for electricity forecast for Kosovo market for the upcoming ten years. The input data i.e. electricity generation capacities, demand and consume are taken from the document "Kosovo Energy Strategy 2009-2018" compiled by Ministry of Energy of Kosovo and approved by the Kosovo Assembly. The web tool enables diffe...
Article
Full-text available
In this paper are analyzed the wind data of the first wind farm in Kosovo. The wind farm is very small, consisting of three generators, each of 450 kW capacities. The wind farm has successfully passed the testing period as foreseen by law. The wind farm is located near to Prishtina region, but due to privacy agreement the exact location is not cite...
Conference Paper
Sipas statistikave të Agjencisë Ndërkombëtare të Energjisë për ndriçim në Evropë konsumohet 14% të energjisë elektrike të prodhuar, ndërsa në tërë botën kjo është 19% të prodhimit të përgjithshëm të energjisë elektrike. Nga 1 shtatori 2009 është në fuqi ligji, i sponsorizuar nga Komisioni Evropian, që poçet inkandeshente dhe llambat e tjera jo efiç...
Conference Paper
Internet represents the community of computers, servers, applications (protocols), routers and communication lines that is often defined by a simpler expression as a 'cloud'. The term 'cloud' specifically means applications, platforms, infrastructure and consumer services offered by service providers to build applications in the Internet. What mak...
Conference Paper
The general purpose of geographic information systems is to collect various data linked to location. This paper presents the establishment of a database for mining sources in settlements throughout Kosovo’s territory. The data collection on Kosovo’s mines was analogous until year 2000. The lack of a Kosovo mine database was deemed as one of the obs...
Data
Full-text available
In this paper is presented a novel approach for fulfilling the data security criteria in a Student Lifecycle Management System at the University of Prishtina. The four main criteria of data security such as: privacy, authentication, integrity and non-repudiation are fulfilled through carefully selected security policies. Student data privacy is ach...
Article
Full-text available
In this paper is presented a novel approach for fulfilling the data security criteria in a Student Lifecycle Management System at the University of Prishtina. The four main criteria of data security such as: privacy, authentication, integrity and non-repudiation are fulfilled through carefully selected security policies. Student data privacy is ach...
Conference Paper
In this paper is presented the possibility of using the renewable energy resources and promoting the renewable energy resources (RER) by feed-in tariff schema. ‘Feed-in’ tariff is a description of a policy, a “tariff” used to purchase RER generated energy that is “fed” into or sold to the grid. Usually the price depends from the technology used suc...