Skewness and kurtosis in function of selection of network traffic distribution P Čisar, SM Čisar Acta Polytechnica Hungarica 7 (2), 95-106, 2010 | 94 | 2010 |
Optimization methods of EWMA statistics P Čisar, SM Čisar Acta Polytechnica Hungarica 8 (5), 73-87, 2011 | 65 | 2011 |
Computer adaptive testing of student knowledge SM Čisar, D Radosav, B Markoski, R Pinter, P Čisar Acta Polytechnica Hungarica 7 (4), 139-152, 2010 | 47 | 2010 |
Evaluation of knowledge in Object Oriented Programming course with computer adaptive tests SM Čisar, P Čisar, R Pinter Computers & education 92, 142-160, 2016 | 34 | 2016 |
Magnetic field sensor and associated method that can establish a measured threshold value and that can store the measured threshold value in a memory device A Foletto, P Cisar, E Shoemaker US Patent 8,736,260, 2014 | 29 | 2014 |
EWMA statistic in adaptive threshold algorithm P Cisar, SM Cisar 2007 11th International Conference on Intelligent Engineering Systems, 51-54, 2007 | 28 | 2007 |
Some ethical hacking possibilities in Kali Linux environment P Cisar, R Pinter Journal of Applied Technical and Educational Sciences 9 (4), 129-149, 2019 | 26 | 2019 |
Magnetic field sensor and associated method that can establish a measured threshold value and that can store the measured threshold value in a memory device A Foletto, P Cisar, E Shoemaker US Patent 9,644,999, 2017 | 25 | 2017 |
EWMA algorithm in network practice P Cisar, S Bošnjak, SM Cisar International Journal of Computers Communications & Control 5 (2), 160-170, 2010 | 24 | 2010 |
The framework of runtime application self-protection technology P Čisar, SM Čisar 2016 IEEE 17th International Symposium on Computational Intelligence and …, 2016 | 22 | 2016 |
True/false questions analysis using computerized certainty-based marking tests SM Cisar, P Cisar, R Pinter 2009 7th International Symposium on Intelligent Systems and Informatics, 171-174, 2009 | 22 | 2009 |
EWMA based threshold algorithm for intrusion detection P Čisar, S Bošnjak, SM Čisar Computing and Informatics 29 (6+), 1089-1101, 2010 | 20 | 2010 |
Smartphone application for tracking students' class attendance SM Čisar, R Pinter, V Vojnić, V Tumbas, P Čisar 2016 IEEE 14th international symposium on intelligent systems and …, 2016 | 18 | 2016 |
Methodological frameworks of digital forensics P Čisar, SM Čisar 2011 IEEE 9th International Symposium on Intelligent Systems and Informatics …, 2011 | 18 | 2011 |
Measuring team member performance in Scrum—Case study R Pinter, SM Čisar, P Čisar 2017 IEEE 15th international symposium on intelligent systems and …, 2017 | 17 | 2017 |
Ethical hacking of wireless networks in kali linux environment P Čisar, SM Čisar Annals of the Faculty of Engineering Hunedoara 16 (3), 181-186, 2018 | 15 | 2018 |
Software visualization: The educational tool to enhance student learning SM Čisar, R Pinter, D Radosav, P Čisar The 33rd International Convention MIPRO, 990-994, 2010 | 15 | 2010 |
General vulnerability aspects of Internet of Things P Čisar, SM Čisar 2015 16th IEEE International Symposium on Computational Intelligence and …, 2015 | 14 | 2015 |
Implementation of immunological algorithms in solving optimization problems P Čisar, SM Čisar, B Markoski Acta polytechnica hungarica 11 (4), 225-240, 2014 | 14 | 2014 |
Computer adaptive testing for student's knowledge in C++ exam SM Çisar, D Radosav, B Markoski, R Pinter, P Čisar 2010 11th International Symposium on Computational Intelligence and …, 2010 | 13 | 2010 |