default search action
Bostjan Brumen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i2]Sabrina Göllner, Marina Tropmann-Frick, Bostjan Brumen:
Responsible Artificial Intelligence: A Structured Literature Review. CoRR abs/2403.06910 (2024) - 2023
- [c39]Sabrina Göllner, Marina Tropmann-Frick, Bostjan Brumen:
Towards a Definition of a Responsible Artificial Intelligence. EJC 2023: 40-56 - [c38]Mihaela Franjic, Tihana Galinac Grbac, Bostjan Brumen:
User Experience of Croatian National & Nature Parks' Website - A Comparison. HCI (43) 2023: 561-570 - 2022
- [j21]Bostjan Brumen, Darko Crepulja, Leon Bosnjak:
Layered Battleship Game Changer Password System. Informatica 33(2): 225-246 (2022) - [c37]Bostjan Brumen, Aljaz Zajc, Leon Bosnjak:
Permissions vs. Privacy Policies of Apps in Google Play Store and Apple App Store. EJC 2022: 258-275 - [c36]Bostjan Brumen, Sabrina Göllner, Marina Tropmann-Frick:
Aspects and Views on Responsible Artificial Intelligence. LOD (1) 2022: 384-398 - 2021
- [j20]Bostjan Brumen, Ales Cernezel, Leon Bosnjak:
Overview of Machine Learning Process Modelling. Entropy 23(9): 1123 (2021) - [c35]Bostjan Brumen:
Content Analysis of Medical and Health Apps' Privacy Policies. EJC 2021: 188-203 - [c34]Bostjan Brumen, Mihaela Franjic:
The Use of Intranet in Croatian National Parks. MIPRO 2021: 1664-1669 - 2020
- [j19]Leon Bosnjak, Bostjan Brumen:
Shoulder surfing experiments: A systematic literature review. Comput. Secur. 99: 102023 (2020) - [j18]Bostjan Brumen:
System-Assigned Passwords: The Disadvantages of the Strict Password Management Policies. Informatica 31(3): 459-479 (2020) - [c33]Bostjan Brumen:
Automated Text Similarities Approach: GDPR and Privacy by Design Principles. EJC 2020: 213-226
2010 – 2019
- 2019
- [j17]Leon Bosnjak, Bostjan Brumen:
Rejecting the death of passwords: Advice for the future. Comput. Sci. Inf. Syst. 16(1): 313-332 (2019) - [j16]Bostjan Brumen:
Security analysis of Game Changer Password System. Int. J. Hum. Comput. Stud. 126: 44-52 (2019) - [j15]Leon Bosnjak, Bostjan Brumen:
Shoulder surfing: From an experimental study to a comparative framework. Int. J. Hum. Comput. Stud. 130: 1-20 (2019) - [c32]Bostjan Brumen, Franc Volavc:
Comparison of Open Source NoSQL Solutions Using Utility Function. EJC 2019: 116-140 - [c31]Leon Bosnjak, Bostjan Brumen:
Examining Security and Usability Aspects of Knowledge-based Authentication Methods. MIPRO 2019: 1181-1186 - [i1]Leon Bosnjak, Bostjan Brumen:
Shoulder Surfing: From An Experimental Study to a Comparative Framework. CoRR abs/1902.02501 (2019) - 2017
- [c30]Bostjan Brumen, Goran Kovacic:
Modeling of a Data Warehouse Based on ETL Process Performance. EJC 2017: 35-51 - [c29]Bostjan Brumen, Tadej Makari:
Resilience of students' passwords against attacks. MIPRO 2017: 1275-1279 - 2016
- [c28]Bostjan Brumen, Ivan Rozman, Ales Cernezel:
Laws Describing Artificial Learning. EJC 2016: 274-282 - [c27]Bostjan Brumen, Jernej Legvart:
Performance analysis of two open source intrusion detection systems. MIPRO 2016: 1387-1392 - [c26]Leon Bosnjak, Bostjan Brumen:
What do students do with their assigned default passwords? MIPRO 2016: 1430-1435 - [c25]Viktor Taneski, Marjan Hericko, Bostjan Brumen:
Analysing real students' passwords and students' passwords characteristics received from a questionnaire. MIPRO 2016: 1436-1441 - 2015
- [c24]Bostjan Brumen, Ivan Rozman, Ales Cernezel:
Artificial Classification Models and Real Data. EJC 2015: 207-219 - [c23]Viktor Taneski, Marjan Hericko, Bostjan Brumen:
Impact of security education on password change. MIPRO 2015: 1350-1355 - [c22]Bostjan Brumen, Viktor Taneski:
Moore's curse on textual passwords. MIPRO 2015: 1360-1365 - 2014
- [j14]Muhamed Turkanovic, Bostjan Brumen, Marko Hölbl:
A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion. Ad Hoc Networks 20: 96-112 (2014) - [j13]Bostjan Brumen, Ivan Rozman, Marjan Hericko, Ales Cernezel, Marko Hölbl:
Best-Fit Learning Curve Model for the C4.5 Algorithm. Informatica 25(3): 385-399 (2014) - [c21]Bostjan Brumen, Ivan Rozman, Ales Cernezel:
Observing a Naïve Bayes Classifier's Performance on Multiple Datasets. ADBIS 2014: 263-275 - [c20]Bostjan Brumen, Ivan Rozman, Ales Cernezel:
Modeling of classification error rate based on neural networks learners. EJC 2014: 41-52 - [c19]Ales Cernezel, Ivan Rozman, Bostjan Brumen:
Comparisons between Three Cross-Validation Methods for Measuring Learners' Performances. EJC 2014: 77-87 - [c18]Ales Cernezel, Saso Karakatic, Bostjan Brumen, Vili Podgorelec:
Predicting Grades Based on Students' Online Course Activities. KMO 2014: 108-117 - [c17]Viktor Taneski, Marjan Hericko, Bostjan Brumen:
Password security - No change in 35 years? MIPRO 2014: 1360-1365 - [c16]Bostjan Brumen, Ales Cernezel:
Brute force analysis of PsychoPass-generated Passwords. MIPRO 2014: 1366-1371 - [c15]Viktor Taneski, Bostjan Brumen, Marjan Hericko:
The Effect of Educating Users on Passwords: a Preliminary Study. SQAMIA 2014: 107-114 - 2012
- [j12]Bostjan Brumen, Marko Hölbl, Katja Harej Pulko, Tatjana Welzer, Marjan Hericko, Matjaz B. Juric, Hannu Jaakkola:
Learning Process Termination Criteria. Informatica 23(4): 521-536 (2012) - [j11]Marko Hölbl, Tatjana Welzer, Bostjan Brumen:
An improved two-party identity-based authenticated key agreement protocol using pairings. J. Comput. Syst. Sci. 78(1): 142-150 (2012) - 2010
- [j10]Marko Hölbl, Tatjana Welzer, Bostjan Brumen:
Two proposed identity-based three-party authenticated key agreement protocols from pairings. Comput. Secur. 29(2): 244-252 (2010) - [j9]Marko Hölbl, Tatjana Welzer, Bostjan Brumen:
Attacks and Improvement of an Efficient Remote Mutual Authentication and Key Agreement Scheme. Cryptologia 34(1): 52-59 (2010) - [c14]Milan Zorman, Sandi Pohorec, Bostjan Brumen:
Opening the Knowledge Tombs - Web Based Text Mining as Approach for Re-evaluation of Machine Learning Rules. ADBIS 2010: 533-542
2000 – 2009
- 2009
- [j8]Marko Hölbl, Tatjana Welzer, Bostjan Brumen:
Comparative Study of Tripartite Identity-Based Authenticated Key Agreement Protocols. Informatica (Slovenia) 33(3): 347-355 (2009) - [j7]Matjaz B. Juric, Ana Sasa, Bostjan Brumen, Ivan Rozman:
WSDL and UDDI extensions for version support in web services. J. Syst. Softw. 82(8): 1326-1343 (2009) - [c13]Tatjana Welzer, Marko Hölbl, Marjan Druzovec, Brane Klopcic, Bostjan Brumen, Hannu Jaakkola, Mirjam Bonacic:
Medical Personal Data in Secure Information Systems. UNISCON 2009: 340-345 - 2008
- [j6]Marko Hölbl, Tatjana Welzer, Bostjan Brumen:
Improvement of the Peyravian-Jeffries's user authentication protocol and password change protocol. Comput. Commun. 31(10): 1945-1951 (2008) - [c12]Tatjana Welzer, Zala Volcic, Bostjan Brumen, Izidor Golob, Aida Kamisalic, Marko Hölbl:
Conceptual Model - Meeting of Cultures. UNISCON 2008: 365-370 - 2007
- [j5]Bostjan Brumen, Matjaz B. Juric, Tatjana Welzer, Ivan Rozman, Hannu Jaakkola, Apostolos Papadopoulos:
Assessment of Classification Models with Small Amounts of Data. Informatica 18(3): 343-362 (2007) - [c11]Tatjana Welzer, Peter Kokol, Ana Habjanic, Bostjan Brumen, Marjan Druzovec, Aida Kamisalic:
Teaching IT in Health Care and Nursing Program--Experiences. CBMS 2007: 349-356 - [c10]Tatjana Welzer, Izidor Golob, Bostjan Brumen, Marjan Druzovec, Ivan Rozman, Hannu Jaakkola:
The improvement of data quality - a conceptual model. EJC 2007: 276-281 - [c9]Tatjana Welzer, Marko Hölbl, Ana Habjanic, Bostjan Brumen, Marjan Druzovec:
Teaching of Information Security in the "Health Care and Nursing" Postgraduate program. SEC 2007: 479-484 - 2006
- [j4]Matjaz B. Juric, Ivan Rozman, Bostjan Brumen, Matjaz Colnaric, Marjan Hericko:
Comparison of performance of Web services, WS-Security, RMI, and RMI-SSL. J. Syst. Softw. 79(5): 689-700 (2006) - 2005
- [j3]Ales Zivkovic, Marjan Hericko, Bostjan Brumen, Simon Beloglavec, Ivan Rozman:
The Impact of Details in the Class Diagram on Software Size Estimation. Informatica 16(2): 295-312 (2005) - 2004
- [c8]Bostjan Brumen, Izidor Golob, Hannu Jaakkola, Tatjana Welzer, Ivan Rozman:
Early Assessment of Classification Performance. ACSW 2004: 91-96 - [c7]Tatjana Welzer, David Riaño, Bostjan Brumen, Marjan Druzovec:
Internationalization Content in Intelligent Systems - How to Teach it? KES 2004: 1039-1044 - 2003
- [j2]Bostjan Brumen, Izidor Golob, Tatjana Welzer, Ivan Rozman, Marjan Druzovec, Hannu Jaakkola:
An Algorithm for Protecting Knowledge Discovery Data. Informatica 14(3): 277-288 (2003) - 2002
- [j1]Bostjan Brumen, Izidor Golob, Tatjana Welzer, Ivan Rozman, Marjan Druzovec, Hannu Jaakkola:
Data protection for outsourced data mining. Informatica (Slovenia) 26(2) (2002) - [c6]Tatjana Welzer, Bostjan Brumen, Izidor Golob, Marjan Druzovec:
Medical Diagnostic and Data Quality. CBMS 2002: 97-101 - [c5]Bostjan Brumen, Tatjana Welzer, Marjan Druzovec, Izidor Golob, Hannu Jaakkola:
Protecting Medical Data for Analyses. CBMS 2002: 102- - 2000
- [c4]Tatjana Welzer, Ivan Rozman, Peter Kokol, J. Györös, Matjaz Colnaric, Bostjan Brumen:
Computing Science Research Activities at the Faculty of Electrical Engineering, Computer Science and Informatics. ADBIS-DASFAA Symposium 2000: 266-274 - [c3]Bostjan Brumen, Hannu Jaakkola, Tatjana Welzer:
Predicting Sample Size in Data Mining Tasks: Using Additive Incremental Approach. EJC 2000: 264-270
1990 – 1999
- 1999
- [c2]Matjaz B. Juric, Tatjana Welzer, Ivan Rozman, Marjan Hericko, Bostjan Brumen, Tomaz Domajnko, Ales Zivkovic:
Performance Assesment Framework for Distributed Object Architectures. ADBIS 1999: 349-366 - [c1]Tatjana Welzer-Druzovec, Ivan Rozman, Bostjan Brumen, Marjan Druzovec:
Reuse in the Sense of the Rapid Database Prototyping for Intelligent Systems. IC-AI 1999: 294-298
Coauthor Index
aka: Tatjana Welzer-Druzovec
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:03 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint