• Home
  • Sanja Maravić Čisar
Sanja Maravić Čisar

Sanja Maravić Čisar
Subotica Tech - College of Applied Sciences / Visoka tehnička škola strukovnih studija · Informatics

PhD

About

66
Publications
27,042
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
432
Citations
Citations since 2017
12 Research Items
283 Citations
20172018201920202021202220230204060
20172018201920202021202220230204060
20172018201920202021202220230204060
20172018201920202021202220230204060

Publications

Publications (66)
Chapter
Intrusion detection is a field of computer security that deals with detecting unauthorized network activities. An intrusion detection system is needed to identify all forms of malicious network traffic and computer activity that a traditional firewall cannot detect. Artificial Intelligence is an area of computing that explores how to create knowled...
Chapter
One of the numerous implementations of neural networks (NN), as part of machine learning, is the modeling of network firewall rules. For this purpose, a suitable dataset containing standard traffic attributes as well as the ability of Weka software package for modeling and testing multilayer perceptrons (MLP) was used. The aim of this paper was to...
Chapter
People are living in the world where billions of IoT systems are connected to the Internet. They are sending and receiving data via network, and are controlled remotely. Many IoT systems do not have complex tasks to perform or to control. Because of that, they are built on cheap and weak hardware. Sometimes there are not enough resources to impleme...
Article
Full-text available
The technique of eye tracking is used to record the position and movement of the eyes. This method calculates the position by tracking the reflection of the light from the cornea and compares it with the center of the eye. Analyzing the data on the eye movement and position makes it possible to determine the way in which a person processes visual i...
Article
Full-text available
Computer adaptive testing (CAT) enables an individualization of tests and better accuracy of knowledge level determination. In CAT, all test participants receive a uniquely tailored set of questions. The number and the difficulty of the next question depend on whether the respondent’s previous answer was correct or incorrect. In order for CAT to wo...
Article
Spread spectrum is a technique used for transmitting telecommunications signals. This topic is relatively complex and can be challenging for students. Thus, programming language Octave has been introduced in the course curriculum of Telecommunication Systems as one of the powerful tools that aid in student understanding of the spread‐spectrum princ...
Article
Full-text available
This paper presents an electronic system for tracking students’ attendance. “BeHere” was implemented at Subotica Tech – College of Applied Sciences, introducing gamification elements into class attendance tracking. Given that the first year of their studies in higher education is the most crucial time period, it is vital that students are motivated...
Article
Full-text available
Anomaly detection is used to monitor and capture traffic anomalies in network systems. Many anomalies manifest in changes in the intensity of network events. Because of the ability of EWMA control chart to monitor the rate of occurrences of events based on their intensity, this statistic is appropriate for implementation in control limits based alg...
Conference Paper
The Bologna system makes class attendance mandatory. Recording attendance is inefficient and takes up too much class time especially with larger groups of students. If a professor records student attendance manually, they have to look at student, write it down and go to the next student. If the check takes five minutes of a 45-minute class, that me...
Article
This paper presents and analyzes the results of the application of computer-adaptive testing in knowledge evaluation of the programming language C++. The participants of the research were college students majoring in computer engineering from a polytechnic college (Republic of Serbia) with an average age of 20. The research was conducted over a two...
Conference Paper
The purpose of this study is to investigate mobile phone usage patterns among students of Subotica Tech — College of Applied Sciences. The research aims to provide an insight into the purposes and time distribution of the students' use of their mobile devices. The presented data offer answers to general questions but in fact, they point towards beh...
Article
Programming is a major subject in Computer Science (CS) departments. However, students often face difficulties on the basic programming courses due to several factors that cause these difficulties. The most important reason may be the lack of problem solving abilities that many students show. Learning to code can be made more effective if it is per...
Article
Full-text available
The paper gives an analysis of some optimization algorithms in computer sciences and their implementation in solving the problem of binary character recognition. The performance of these algorithms is analyzed using the Optimization Algorithm Toolkit, with emphasis on determining the impact of parameter values. It is shown that these types of algor...
Conference Paper
The paper elaborates the complexity and importance of modeling Internet traffic. In this sense, having in mind the nature of Internet traffic as well as actual information in this sphere, it was emphasized that there is no universally applicable model. This standpoint has initiated the idea of examining the possibility of approximation internet tra...
Article
Full-text available
This paper gives a global review of artificial immune systems in computer science and their implementation. The performance of the immunological algorithm in solving optimization problems is analysed using the Optimization Algorithm Toolkit, with emphasis on determining the impact of parameter values. It is shown that these types of algorithms are...
Conference Paper
Edge detection is an important operation in the analysis of a digital image and includes a set of mathematical methods to identify points of discontinuity. For this purpose, different algorithms are used for estimating image gradient. Many edge detection techniques are implemented with convolution mask and based on discrete approximations to differ...
Conference Paper
Full-text available
The paper presents a research on how students at Subotica Tech use shared virtual environments (SVE). It gives some information about students interaction, collaboration in online environments known as Massively Multi-User Online Role-Playing Games. The article gives a description and evaluation of the research results.
Conference Paper
Programming is a major subject in Computer Science (CS) departments. However, students often face difficulties on the basic programming courses due to several factors that cause these difficulties. Maybe the most important reason is the lack of problem solving abilities that many students show. This paper describes the web-based environment Pex4Fun...
Conference Paper
Full-text available
The available literature is not completely certain what type(s) of probability distribution best models computer network traffic. The statistical analysis presented in this paper aims to show the implementation of graphical interface for fitting univariate distributions to authentic network traffic data. The analysis is realized in Matlab based GUI...
Conference Paper
Full-text available
The subject of this work is a face detection. Face detection is the process of determining the positions and sizes of human faces in photos using computer technology. This is a very complex problem which has many solutions with different algorithms. Automatic face detection is the first step in recognizing faces, which leads to much greater opportu...
Conference Paper
This paper examines the influence of thresholding method on 1D signal denoising using wavelet theory. The analysis is realized in Matlab environment. The cases of different input signals are considered, for which the adequate residuals are calculated and discussed.
Conference Paper
In order to improve the learning process, an Adaptive Educational Hypermedia has to provide a personalized version of the learning material, as well as individual learning settings and environment. This work presents the efforts to find those factors which could mean some environment personalization in a learning process where those kinds of e-curr...
Conference Paper
Full-text available
Computer based tests are becoming increasingly important and are thus implemented in all fields of education. The clear advantage of computer adaptive testing is witnessed by the maximal balance of accuracy and efficiency. For purposes of determining the effects of applying the computer adaptive test for knowledge evaluation, the adaptive test was...
Article
Full-text available
This study intends to measure the impact of interactive animations on the students' performance. Two courses from Subotica Tech were included, the subjects "Analog and Digital Electronics" and "Microcontrollers". The experiment lasted over a period of tree years, and it involved the formation of two groups in every academic. Both groups' members pa...
Article
Full-text available
Computer-based testing, by facilitating the interaction between teaching and learning, can improve the quality of learning through improved formative feedback which is a key aspect of formative assessment. This study makes a contribution to the research on computer-based testing by examining the mode differences between the paper-and-pencil test an...
Conference Paper
The recommender system becomes an aiding tool which could be a solution for handling the huge stream of information from the Internet. These systems collect information from the users, process it and provide it to those who are interested in them. By filtering the information from hyperspace and presenting these in some sorted format, navigation be...
Article
The paper discusses the application of the computer adaptive test in knowledge evaluation of the programming language C++. For the purpose of this research an application was realized which enables adaptive testing. Its functionality was checked in practice. A survey was carried out among students for the purpose of evaluation, the attained data wa...
Article
Intrusion detection is used to monitor and capture intrusions into computer and network systems that attempt to compromise their security. Many intrusions (attacks) manifest in changes in the intensity of events occurring in computer networks. Many different approaches exist for statistical intrusion detection. One of them is behavioural analysis,...
Article
The paper discusses the application of the computer adaptive test in knowledge evaluation of the programming language C++. For the purpose of this research an application was realized which enables adaptive testing. Its functionality was checked in practice. A survey was carried out among students for the purpose of evaluation, the attained data wa...
Article
Full-text available
This study was carried out to observe, measure and analyze the effects of using software visualization in teaching programming with participants from two institutions of higher educations in Serbia. Basic programming learning is notorious for complex for many novice students at university level. The visualizations of examples of program code or pro...
Article
Digital forensics is essential for the successful opposition of computer crime. It is associated with many challenges, including rapid changes in computer and digital devices, and more sophisticated attacks on computer systems and networks and the rapid increase in abuse of ICT systems. For a forensic investigation to be performed successfully ther...
Article
In this work the authors suggest the introduction of two new parameters apart from the existing ones in the metadata system. In the reusability process when choosing from learning object repository in order to use it in one's own work it may be useful to have some data regarding how that particular learning object was evaluated by other users.
Conference Paper
Programming is a difficult cognitive skill to learn. It requires knowledge and skills in many areas, such as the syntax, semantics and pragmatics of programming languages, creative problem solving, development environment and a multitude of software tools (e.g. IDE, compiler), algorithms and data structures, programming concepts and paradigms (e.g....
Article
Full-text available
Many intrusions which attempt to compromise the security of computer and network systems manifest themselves in changes in the intensity of events. Because of the ability of exponentially weighted moving average (EWMA) statistics to monitor the rate of occurrences of events based on their intensity, this technique is appropriate for implementation...
Article
One of the crucial issues in Adaptive Educational Hypermedia is to recognize which distance learning systems' environment settings can help improve the learning process. This work presents the efforts to find those factors, which could help students in reading those e-curricula which are assembled mostly from pure text, without multimedia elements....
Article
Full-text available
In adaptive learning systems for distance learning attention is focused on adjusting the learning material to the needs of the individual. Adaptive tests adjust to the current level of knowledge of the examinee and is specific for their needs, thus it is much better at evaluating the knowledge of each individual. The basic goal of adaptive computer...
Conference Paper
This paper describes two software tools to determine the overall trend of network signals: Matlab and Excel. Their implementation is shown through several characteristic examples from network environment. The appropriateness of different types of trends is also discussed.
Article
Full-text available
Technological progress, responsible for the declining costs of computers, coupledwith the advancement of computer adaptive software have promoted computer adaptivetesting (CAT) in higher education, offering alternatives to the conventional paper andpencil examinations. The CAT testing process, statistically conducted through ItemResponse Theory, is...
Chapter
Full-text available
Intrusion detection is used to monitor and capture intrusions (attacks) into computer network systems which attempt to compromise their security. A lot of different approaches exist for statistical intrusion detection. One of them is behavioral analysis, thus in accordance with this, a model-based algorithm is presented. The paper also elaborates t...
Article
The process of introducing computers into the knowledge testing begins in early '70s. In the beginning, the technical capabilities of computers and their price restricted the use of computerized tests. With the advantages provided by new technologies, this type of testing is beginning to develop, and therefore there is a large number of researches...
Article
The paper describes our pilot project for detecting those factors which could affect the reading from screen. Because entire course in the computer-based education cannot be always presented with multimedia elements, it is important to make a textual part of a curriculum easy and effective to read. We present an application, developed at Subotica T...
Article
Full-text available
The available literature is not completely certain what type(s) of probabilitydistribution best models network traffic. Thus, for example, the uniform, Poisson,lognormal, Pareto and Rayleigh distributions were used in different applications.Statistical analysis presented in this paper aims to show how skewness and kurtosis ofnetwork traffic samples...
Conference Paper
Object oriented programming is currently very much in focus and object-oriented languages (such as C++ and Java) are used as the first language to teach programming. The object oriented concepts such as objects and inheritance are difficult for understanding by novice programmers. The visualizations of examples of program code or programming tasks...
Conference Paper
This paper presents an e-content from selected parts of the course Analog and Digital Electronics. The presented application highlights the advantage of using interactive Flash animation in order to improve the teaching and learning process.
Article
Full-text available
Intrusion detection is used to monitor and capture intrusions into computer and network systems which attempt to compromise their security. Many intrusions manifest in changes in the intensity of events occuring in computer networks. Because of the ability of exponentially weighted moving average (EWMA) control charts to monitor the rate of occurre...
Article
Full-text available
Intrusion detection is used to monitor and capture intrusions into computer and network systems which attempt to compromise their security. Many intrusions (attacks) are manifested in changes in the intensity of events occurring in computer networks. Many different approaches exist for statistical intrusion detection. One of them is behavioural ana...
Article
Intrusion detection is used to monitor and capture intrusions into computer and network systems which attempt to compromise their security. Many intrusions manifest in dramatic changes in the intensity of events occuring in computer networks. Because of the ability of exponentially weighted moving average control charts to monitor the rate of occur...
Conference Paper
Writing effective and efficient exams is a crucial component of the teaching and learning process. Exams are a common approach to assess student learning and the results are useful in a variety of ways. Most often, results are used to provide students with feedback on what they have learnt or to evaluate the instructional effectiveness of a course....
Article
This paper will present some existing and on-line accessible Web-based educational systems, and the adaptation theory which is integrated in those systems.
Article
Full-text available
This project presents some new problems facing the study process in the distant learning system (DLS), and also tries to answer the central question: "Why do we need personalized e-learning curricula?". The web application was developed in order to detect changes in learning styles and measure the level of satisfaction of the students with the pres...
Article
Intrusion detection is an area of computer security that involves the detection of unwanted manipulations to computers and computer networks. An intrusion detection system is required to detect all types of malicious network traffic and computer usage that can not be detected by a conventional firewall. This security method is needed in todaypsilas...
Article
Full-text available
This paper includes a summary of authoring systems, which became the base of informatic modernization of the learning process in all fields. Besides conceptual determination and classification of the authoring systems, the article also discusses the technology for the realization of the WEB authoring system on the example of the Polytechnical Engin...
Article
Full-text available
Intrusion detection is used to monitor and capture intrusions into computer and network systems which attempt to compromise the security of computer and network systems. Many intrusions manifest in dramatic changes in the intensity of events occuring in computer networks. Because of the ability of exponentially weighted moving average control chart...
Article
In attack continuum three different periods can be recognized - before, during and after the exploitations of a vulnerability. This paper is related to the second period and will focus on the initial start of an attack and that type of attacks that are detectable in real time. A lot of different approaches exists for anomaly detection. One of them...
Conference Paper
A password is a form of secret authentication data that is used to control access to a resource. The password is kept secret from those not allowed access, and those wishing to gain access are tested on whether or not they know the password and are granted or denied access accordingly. Passwords vary in the degree of public awareness, security prot...
Conference Paper
Full-text available
Intrusion detection is used to monitor and capture intrusions into computer and network systems which attempt to compromise the security of computer and network systems. Many intrusions manifest in dramatic changes in the intensity of events occurring in information systems. Because of the ability of exponentially weighted moving average (EWMA) con...
Article
This paper deals with statistical anomaly detection as one of the essential parts of intrusion detection systems. Analyzing and introduction with computer network traffic behavior, threshold adjustment, optimizing its value in function of real traffic intensity and false positive alarm reduction is the key aim of statistical anomaly detection. Ther...
Article
T his project presents some new problems facing the study process in the distant learning system (DLS), and also tries answering the central question: "Why do we need personalized e-learning curricula?". Web application was developed in order to detect changes in learning styles and measure the level of satisfaction of the students with the present...
Article
Full-text available
This paper deals with statistical anomaly detection as one of the essential parts of intrusion detection systems. With help of data mining, combined with statistical quality control, the authors tried to work out a way of determining maximal tolerated traffic. This value can be used as input data for network monitoring and alerting software (NMS)....

Network

Cited By