Saša Bošnjak

Saša Bošnjak
University of Novi Sad · Department of Business Informatics and Quantitative Methods

Bachelor of Science, MSc of Informatics, PhD of Informatics

About

15
Publications
7,767
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
87
Citations
Citations since 2016
4 Research Items
48 Citations
20162017201820192020202120220246810
20162017201820192020202120220246810
20162017201820192020202120220246810
20162017201820192020202120220246810

Publications

Publications (15)
Conference Paper
The covid-19 pandemic has caused major turmoil in economic, social, societal, and health systems around the world. In order to bring it under control, large amounts of relevant data have been identified and collected, the analysis of which should enable understanding of the character and mechanisms of the disease and, based on that knowledge, suppr...
Article
Knowing what attracts or deters tourists to/from a tourist visit and what products to offer them and to pay special attention to is crucial for good economic results. Such knowledge can be obtained by analysis of online comments and reviews that tourists leave on travel websites (such as Booking, TripAdvisor, Trivago, etc.). This paper describes th...
Chapter
Full-text available
Serious games are playing an increasing role as educational tools and the last decade witnessed a growing number of proposals in this field. One of the major challenges of the current European societies is to foster an entrepreneurial interest in young people, and the European Commission has been promoting projects that pursue this objective. This...
Article
Full-text available
Intrusion detection is used to monitor and capture intrusions into computer and network systems which attempt to compromise their security. Many intrusions manifest in changes in the intensity of events occuring in computer networks. Because of the ability of exponentially weighted moving average (EWMA) control charts to monitor the rate of occurre...
Article
Full-text available
The role of Web applications in corporate business has changed due to strong market competition and improved clients' negotiation power, imposing a new approach to their quality evaluation, in a sense that some analysis should be made prior to the imple-mentation phase in order to reduce errors and inconsistencies in application design, while after...
Article
Full-text available
Intrusion detection is used to monitor and capture intrusions into computer and network systems which attempt to compromise their security. Many intrusions (attacks) are manifested in changes in the intensity of events occurring in computer networks. Many different approaches exist for statistical intrusion detection. One of them is behavioural ana...
Article
Intrusion detection is used to monitor and capture intrusions into computer and network systems which attempt to compromise their security. Many intrusions manifest in dramatic changes in the intensity of events occuring in computer networks. Because of the ability of exponentially weighted moving average control charts to monitor the rate of occur...
Conference Paper
Full-text available
Discovering knowledge from a waste amount of data has become a promising area nowadays, but at the same time it is a very intricate, uncertain and time consuming process. The complexity of a data collection, the oscillations in data quality and their impact on the discovery process, as well as the applicability of results, urge for an extensive res...
Article
Full-text available
This paper aims to give an overview of recommender systems as one of key factors of e-commerce development. Also it describes different types of recommender systems, and methods they employ in order to produce personalized recommendations. Furthermore, the role of these systems in the Internet sphere is investigated. The paper covers some problems...
Article
The possible application of fuzzy sets theory in strategic management to the problem of portfolio matrices analysis, used for strategy alternative(s) formulation and selection is described. The values of membership functions of input variables into portfolio matrices are combined with different t-norms: (a) T M (x,y)=min(x,y); (b) T P (x,y)=xy; (c)...
Article
Full-text available
The goal of our research was to find an appropriate model to predict the number of passengers in public transport in order to transform the vast amount of raw data into information adequate for supporting the decision maker in resources planning and allocation of buses to existing bus lines. For this purpose, we applied and compared two different a...

Network

Cited By

Projects

Project (1)
Project