Nemanja Maček

Nemanja Maček
Visoka škola elektrotehnike i računarstva strukovnih studija u Beogradu · Computer Science

PhD

About

70
Publications
64,109
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
321
Citations
Introduction
Nemanja Maček graduated from University of Novi Sad in 2006 and received Advanced Security Systems PhD from Singidunum University, Belgrade in 2013. His scientific research areas include machine learning, pattern recognition and natural language processing applied to information security, as well as biometric systems, cryptology and designing novel security mechanisms.
Additional affiliations
September 2019 - present
Megatrend univerzitet
Position
  • Professor (Full)
May 2018 - September 2019
Megatrend univerzitet
Position
  • Professor (Assistant)
October 2016 - July 2017
Union University, Belgrade, Faculty of Engineering Management
Position
  • Professor (Assistant)
Education
March 2010 - December 2013
Singidunum University
Field of study
  • Advanced Security Systems. The field of natural sciences and mathematics, the area: Informatics and Computing.
October 2004 - May 2006
University of Novi Sad
Field of study
  • Information technologies

Publications

Publications (70)
Conference Paper
Full-text available
This paper presents an approach to multimodal biometric authentication using face and iris biometric traits. Having in mind that variety of devices, such as laptops, smartphones and tablets have a high quality camera built in, it is possible to obtain images of iris and face simultaneously. By combining geometric and photometric techniques, such as...
Article
Full-text available
This paper presents a novel approach to the design of robust multimodal biometric cryptosystems. The design objectives behind the system are robustness, privacy of user’s biometric templates and stable cryptographic key generation. The framework presented in this paper employs two modalities and a look-up table. The hashes of cryptographic keys gen...
Article
Full-text available
The KDD Cup '99 is commonly used dataset for training and testing IDS machine learning algorithms. Some of the major downsides of the dataset are the distribution and the proportions of U2R and R2L instances, which represent the most dangerous attack types, as well as the existence of R2L attack instances identical to normal traffic. This enforces...
Article
Full-text available
—The research topic that this paper is focused on is intrusion detection in critical network infrastructures, where discrimination of normal activity can be easily corrected, but no intrusions should remain undetected. The intrusion detection system presented in this paper is based on support vector machines that classify unknown data instances acc...
Article
Full-text available
This paper introduces and illustrates an approach to automatically detecting and selecting “critical” road segments, intended for application in circumstances of limited human or technical resources for traffic monitoring and management. The reported study makes novel contributions at three levels. At the specification level, it conceptualizes “cri...
Article
Full-text available
Introduction/purpose: This paper reports on a pilot comparative analysis of the Cuckoo and Drakvuf sandboxes. These sandboxes are selected as the subjects of the analysis because of their popularity in the professional community and their complementary approaches to analyzing malware behavior. Methods: Both sandboxes were set up with basic configur...
Article
Full-text available
It is not a secret that Internet of Things (IoT) devices often come with not so realistic processing power (i.e. processing power and storage requirements) that would provide a basis for strong security and encryption algorithms. This work proposes an approach to adding a simple interface as a security gateway architecture for IoT devices. The secu...
Conference Paper
This paper reports on a pilot study of an approach to human activity clustering using inertial measurement data. At the signal level, we particularly consider the angular velocity and instantaneous acceleration data obtained from a three-axis inertial measurement unit placed on the right arm of the human subject. At the methodology level, the appro...
Article
This paper focus is the mathematical modeling of the file system performance in virtual environment when using type-1 hypervisors. The modeling provides a set of hypotheses related to the expected behavior. The presented model is validated based on the analysis of a collection of the results obtained for a specific case study. Our case study includ...
Article
Full-text available
Modern access controls employ biometrics as a means of authentication to a great extent. For example, biometrics is used as an authentication mechanism implemented on commercial devices such as smartphones and laptops. This paper presents a fingerprint biometric cryptosystem based on the fuzzy commitment scheme and convolutional neural networks. On...
Conference Paper
Full-text available
Considerable scientific effort in the field of natural language processing has recently been dedicated to the broad research question ofautomatic extraction of COVID-19 related information from available textual sources. In this paper, we provide a brief overview of the research results in the field, and make a “diagnosis” that the natural language...
Research
Full-text available
FOREWORD The First International Scientific, “Covid-19 and Challenges of the Business World”, is held in organization Alfa BK University, Faculty of Finance, Banking and Audit in cooperation with Institute for Economy and Finance, on 25th of March 2021. Given the current epidemiological situation, the conference was being held in virtual, through...
Article
This paper presents a solution to secret key sharing protocol problem that establishes cryptographically secured communication between two entities. We propose a new symmetric cryptographic key exchange scenario based on the specific properties of Cat-alan numbers and the Lattice Path combinatorics. Our scenario consists of three phases: generating...
Article
This article presents a novel data encryption technique suitable for Internet of Things (IoT) applications. The cryptosystem is based on the application of a Catalan object (as a cryptographic key) that provides encryption based on combinatorial structures with noncrossing or nonnested matching. The experimental part of this article includes a comp...
Article
Full-text available
This study presents a secret key sharing protocol that establishes cryptographically secured communication between two entities. A new symmetric key exchange scenario for smart city applications is presented in this research. The protocol is based on the specific properties of the Fuss-Catalan numbers and the Lattice Path combinatorics. The propose...
Article
This paper presents a novel iris recognition system based on machine learning methods. The motivation behind this research resides in the interrelatedness of biometric systems and stylometry, as shown in our previous research. The main goal of the proposed model is to reach virtually perfect classification accuracy, eliminate false acceptance rates...
Article
This paper introduces a novel approach to human-machine collaborative learning that allows for the chronically missing human learnability in the context of supervised machine learning. The basic tenet of this approach is the refinement of a human designed software model through the iterative learning loop. Each iteration of the loop consists of two...
Article
Full-text available
This paper introduces an approach to automatic domain modeling for human–robot interaction. The proposed approach is symbolic and intended for semantically unconstrained task-oriented human–robot interaction domains. At the specification level, it is cognitively inspired, addressing selected cognitive mechanisms of the human memory system (e.g., in...
Conference Paper
Full-text available
This paper introduces a two-stage approach to digit detection and recognition. The approach is cognitively inspired to the extent that it integrates the dichotomy between the preattentive processing and the attentive processing that is present in the theories of human attention. It is non-connectionist to the extent that it does not require extensi...
Article
This paper presents a new method of data hiding using Catalan numbers and Dyck words. The proposed steganographic solution belongs to the category of techniques based on the key generating process, rather than steganographic techniques such as injecting or substituting bits. The complex stego key consists of three sets of values that provide the te...
Article
This paper presents an approach to designing secure modular authentication framework based on iris biometrics and its’ implementation into mobile banking scenario. The system consists of multiple clients and an authentication server. Client, a smartphone with accompanying application, is used to capture biometrics, manage auxiliary data and create...
Article
This paper 1 presents an approach to designing secure modular authentication framework based on iris biometrics and its' implementation into mobile banking scenario. The system consists of multiple clients and an authentication server. Client, a smartphone with accompanying application, is used to capture biometrics, manage auxiliary data and creat...
Article
Purpose This paper aims to deal with the previously unknown prediction accuracy of students’ activity pattern in a blended learning environment. Design/methodology/approach To extract the most relevant activity feature subset, different feature-selection methods were applied. For different cardinality subsets, classification models were used in th...
Conference Paper
Full-text available
Biometric cryptosystems are emerging technology that allow user to generate or unlock cryptographic key using biometric data, such as iris or fingerprint. In other words, biometric cryptosystems provide mechanisms for biometric-dependent key-release. A comprehensive survey of biometric cryptosystems is presented in this paper, i.e. state of the art...
Conference Paper
Full-text available
Like any personal information, biometric templates can be intercepted, stolen, replayed or altered. Due to non-revocability of biometric data aforementioned attacks and may lead to identity theft. Having that said, it becomes clear that biometric systems operate with sensitive personal information and that biometric template security and privacy ar...
Conference Paper
Full-text available
An exploit is software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability in operating system or other software products to cause unintended or unanticipated behaviour of computer software, hardware, or other electronic devices. Such behaviour includes actions like unauthorized gaining control of a computer s...
Article
This paper deals with the comparative analysis of prediction classifiers in the blended learning environment. The model proposed in this paper predicts students’ final grades based on activities within different educational environments. A comparative study of classifier performance has been performed in order to determine the classifier most suita...
Article
The paper suggests the implementation of association analysis for improving the process of e-testing in blended learning environment. The research has been conducted using knowledge tests at the Computer Graphics Moodle Course. In the preprocessing phase, data matrices have been created and prepared for the process of discovering significant relati...
Conference Paper
Full-text available
This paper presents an approach to securing mobile banking biometric authentication. The proposed system is based on secure client-server conventional XOR biometrics, which stores, transmits and verifies templates in encrypted form. Encryption keys are stored on bank's authentication servers, thus protecting the user twofold: if the phone gets stol...
Conference Paper
Full-text available
The broad surveillance potential of automatic speech recognition has been recognized across a range of application domains. Although considerable research effort has been devoted to the research question of achieving robust large-vocabulary continuous-speech recognition, it is still a fragile technology. In this paper, we discuss a methodological d...
Conference Paper
Full-text available
This paper presents an approach to designing secure modular authentication system based on conventional XOR biometrics. System consists of one or more clients, an authentication server and a trusted storage. Client is a device used to capture biometrics, obtain auxiliary data and create encrypted cancelable templates during the enrolment and verifi...
Conference Paper
Adversarial machine learning resides at the intersection of machine learning and computer security. Originally, machine learning techniques were designed for environments that do not assume the presence of an adversary. However, in the presence of intelligent adversaries, this working hypothesis is likely to be violated to at least to some degree,...
Conference Paper
This paper introduces a cognitively-inspired symbolic framework for knowledge representation in humanmachine interaction. The framework is developed within the ongoing research on a computational model of a hierarchical associative long-term memory. The model integrates neurocognitive understanding of the human memory system with selected insights...
Conference Paper
Full-text available
This paper proposes a novel modal architecture of a conversational robotic agent. Two important characteristics of this architecture are that it is general (i.e., it does not depend on specification requirements for a conversational agent) and modular in a way that it allows for introduction of functionally and structurally different modules in a g...
Article
Full-text available
This paper presents a novel approach to noninvasive biometric maternity verification and baby-switching prevention in maternity wards based on dual biometric fingerprint scanner. The proposed system is expected to solve issues that have occurred in many countries regarding stealing or mixing the identities of newborn babies. The solution is based o...
Article
Full-text available
Will be present soon. It is about totally new approach in birthplaces and providing 100% secure identity in Maternity and babies identity. It shows device for biometric identification and two algorithms based on invented logic.
Conference Paper
Full-text available
Anomalies in IoT typically occur as a result of malicious activity. As an example, a point anomaly may occur once network intrusion is attempted, while collective anomaly may result from device being hacked. Due to the nature of the attacks, some anomalies are represented by incomplete captured instances or imbalanced captured datasets. For exampl...
Conference Paper
Full-text available
Technology concerning mobile devices has presented revolutionary growth during the last decade. Mobile phones do not serve only as a means of communication, but also as portable computers with advanced communication capabilities. Smartphones are able to store a rich set of personal information and at the same time provide powerful services, such as...
Conference Paper
Full-text available
In order to maintain constant communication with the family, friends or colleagues, we use a variety of devices whereby accessing the Internet mostly using unsecured hotspots. This makes an ideal target for potential digital threats and abuse. Consequences at the individual level may well be serious, however, digital threats can have an even bigger...
Conference Paper
Full-text available
U ovom radu izvršena je analiza savremenih visokotehnoloških pretnji koje nastaju kao posledica sigurnosnih propusta u softveru i ranjivosti softverskih proizvoda. Ranjivosti u softverskim proizvodima često nastaju kao posledica primene metodologije brzog razvoja i predstavljaju pretnje koje napadači sa odgovarajućim znanjem i računarskim resursima...
Article
Full-text available
Biometry is the scientific discipline and technology that measures and analyzes physiological or behavioral characteristics of people and is widely deployed in modern society security systems. Device for biometric identification of maternity is a dual fingerprint scanner that acquires fingerprint templates of the mother and the child at the very mo...
Article
Full-text available
This paper examines the performance of bare-metal hypervisors within the context of Quality of Service evaluation for Cloud Computing. Special attention is paid to the Linux KVM hypervisors' different cache modes. The main goal was to define analytical models of all caching modes provided by hypervisor according to the general service time equation...
Book
Full-text available
This monograph approaches the synthesis of high sensitivity computer network intrusion detection systems based on support vector machines. Given the fact that attacks on computer systems and networks evolve daily, this monograph analyses the possibility of applying machine learning methods in intrusion detection systems in order to automate the cla...
Conference Paper
Full-text available
U radu su predstavljeni modelovanje i rezultati merenja performansi nekoliko različitih RAID konfiguracija pod MS Windows operativnim sistemom, na hardverskom motherboard-RAID kontroleru. Rad uključuje matematičko modelovanje RAID performansi, a model se validira kroz tumačenje dobijenih vrednosti za skup mera performansi. Performanse se mere koriš...
Conference Paper
Full-text available
This paper examines the Quality of Service of Cloud Computing virtual environment, considering specific hypervisor performance evaluation. Particular emphasis is put on the bare-metal hypervisors, commonly known as type-1 hypervisors. The comparison is based on two widespread representatives, XEN and KVM. We started from the analytical model of a s...
Conference Paper
Full-text available
U ovom radu data je kritička analiza skupa podataka KDD Cup ’99 i metodologije istraživanja mašinskog učenja u oblasti detekcije upada zasnovanih na skupu. Iako se ovaj skup najčešće koristi za obuku, validaciju i testiranje algoritama za mašinsko učenje u IDS sistemima, podaci u skupu nisu verodostojna reprezentacija saobraćaja realne računarske m...
Conference Paper
Full-text available
Skup podataka KDD Cup '99 se najčešće koristi u istraživanjima u oblasti primene metoda mašinskog učenja u IDS sistemima. Jedan od ključnih nedostataka ovog skupa je u tome što je isuviše složen za formiranje modela sposobnog da detektuje kategorije R2L i U2R napada sa malom učestalošću lažno negativnih alarma. Ove kategorije, koje predstavljaju na...
Book
Full-text available
“GNU/Linux sistemsko programiranje – priručnik za laboratorijske vežbe”, knjiga – udžbenik
Article
Full-text available
This paper presents preview of the new book titled “Security of Computer Systems and Networks” (original in Serbian language “Sigurnost računarskih sistema i mreža”) – textbook for University lectures, but also a book that covers majority of important areas concerning current state of security. The book is the result of lecturing experience, resear...
Book
Full-text available
“UNIX arhitektura”, knjiga – udžbenik
Book
Full-text available
Nekada su se problemima sigurnosti računarskih sistema i mreža bavile vojska, diplomatija, policija i vlade. Sada to postaje problem svih koji obavljaju bankarske transakcije sa svog računa ili kupuju preko Interneta. Napadači imaju brojne prednosti, od kojih je najveća mogućnost iznenađenja, tj. mogućnost izbora vremena, mesta i načina napada. Lic...
Conference Paper
Full-text available
Sažetak - Ovaj rad se bavi analizom implementacija kriptografskih sistema datoteka na Linux operativnom sistemu. U radu smo analizirali prednosti i mane postojećih rešenja za šifrovanje sistema datoteka. Analiza obuhvata sledeće aspekte: degradiranje performansi, zadovoljenje osobina koje se očekuju od kriptografskih sistema datoteka i jednostavnos...
Conference Paper
Full-text available
Sadržaj - Ovaj rad predstavlja ispitivanje Linux kernela na ext3 sistemu datoteka. Rad uključuje komparaciju performansi najpopularnijih Linux sistema datoteka kao što je ext3 FS, podrazumevani Linux FS, pod dve različite verzije Linux kernela: verzija 2.6 protiv verzije 2.4. Performanse se mere korisćenjem Postmark benchmark programa, koji emulira...
Conference Paper
Sažetak - Ovaj rad se bavi analizom implementacija kriptografskih sistema datoteka na Linux operativnom sistemu. U radu smo analizirali prednosti i mane postojećih rešenja za šifrovanje sistema datoteka. Analiza obuhvata sledeće aspekte: degradiranje performansi, zadovoljenje osobina koje se očekuju od kriptografskih sistema datoteka i jednostavnos...
Article
Full-text available
This paper concentrates on performance impact NVRAM journaling has over Linux ext3 filesystem. The media used in classic journaling techniques is hard disk - actually the part of the filesystem itself. Using NVRAM memory to store the filesystem journal improves overall performance. The main goal this work should achieve is analysis of performance i...
Book
Full-text available
“Sigurnost računarskih mreža”, knjiga – udžbenik. Raspoloživo za besplatno preuzimanje: https://www.dragan-pleskonjic.com/wp-content/uploads/2017/10/SRM.pdf
Book
Full-text available
“Sigurnost računarskih mreža – zbirka rešenih zadataka”, knjiga – udžbenik. Raspoloživo za besplatno preuzimanje: https://www.dragan-pleskonjic.com/wp-content/uploads/2017/10/SRM-zbirka.pdf
Book
Full-text available
“Sigurnost računarskih mreža – priručnik za laboratorijske vežbe”, knjiga – udžbenik. Raspoloživo za besplatno preuzimanje: https://www.dragan-pleskonjic.com/wp-content/uploads/2017/10/SRM-prirucnik.pdf
Conference Paper
Full-text available
This paper presents attempt to describe and categorize psychological profiles of network attackers and intruders. For long time ago, it was considered that most important aspect for providing security of computer networks and information systems is technical aspect and cryptography. But it has been recognized that even the best set of technical mec...
Book
Full-text available
Prva knjiga na našem jeziku posvećena osnovnim teorijskim konceptima operativnih sistema i njihovoj vezi sa praksom. Knjiga uvodi čitaoce u osnove savremenih operativnih sistema, jasno definišući koncepte i algoritme korišćene pri projektovanju njihovih pojedinih delova. Može se reći da ova knjiga predstavlja pokušaj demistifikacije operativnih sis...
Book
Full-text available
“Operativni sistemi: zbirka rešenih zadataka”, knjiga – udžbenik
Book
Full-text available
“Operativni sistemi: koncepti”, knjiga – udžbenik
Book
Full-text available
“Operativni sistemi: UNIX i Linux”, knjiga – udžbenik Raspoloživo za besplatno preuzimanje: https://dragan-pleskonjic.com/wp-content/uploads/2017/01/os-unix-i-linux.pdf