default search action
Dragan Perakovic
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [e4]Dragan Perakovic, Lucia Knapcíková:
Future Access Enablers for Ubiquitous and Intelligent Infrastructures - 8th EAI International Conference, FABULOUS 2024, Zagreb, Croatia, May 9-10, 2024, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 596, Springer 2025, ISBN 978-3-031-72392-6 [contents] - 2024
- [j26]Gokuleshwaran Narayanan, Ivan Cvitic, Dragan Perakovic, S. P. Raja:
Role of Blockchain Technology in Supplychain Management. IEEE Access 12: 19021-19034 (2024) - [j25]Branka Mikavica, Aleksandra Kostic-Ljubisavljevic, Dragan Perakovic, Ivan Cvitic:
Deadline-Aware Task Offloading and Resource Allocation in a Secure Fog-Cloud Environment. Mob. Networks Appl. 29(1): 133-146 (2024) - [j24]Aleksandar Jevremovic, Zona Kostic, Dragan Perakovic:
Energy-Efficient Edge Intelligence: A Comparative Analysis of AIoT Technologies. Mob. Networks Appl. 29(1): 147-155 (2024) - [c23]Saber Talazadeh, Dragan Perakovic:
SARF: Stock Market Prediction with Sentiment-Augmented Random Forest. FABULOUS 2024: 54-64 - [c22]Zeljko Stojanov, Vladimir Brtka, Gordana Jotanovic, Goran Jausevac, Dragan Perakovic, Dalibor Dobrilovic:
A Model of Cloud-Based System for Monitoring Air Quality in Urban Traffic Environment. FABULOUS 2024: 173-186 - [e3]Dragan Perakovic, Lucia Knapcíková:
Future Access Enablers for Ubiquitous and Intelligent Infrastructures - 7th EAI International Conference, FABULOUS 2023, Bratislava, Slovakia, October 24-26, 2023, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 542, Springer 2024, ISBN 978-3-031-50050-3 [contents] - 2023
- [j23]Ivan Cvitic, Dragan Perakovic, Marko Perisa, Anca D. Jurcut:
Methodology for Detecting Cyber Intrusions in e-Learning Systems during COVID-19 Pandemic. Mob. Networks Appl. 28(1): 231-242 (2023) - [j22]Ivan Cvitic, Dragan Perakovic, Marko Perisa, Anca D. Jurcut:
Correction to: Methodology for Detecting Cyber Intrusions in e-Learning Systems during COVID-19 Pandemic. Mob. Networks Appl. 28(1): 243 (2023) - [j21]Goran Jausevac, Dalibor Dobrilovic, Vladimir Brtka, Gordana Jotanovic, Dragan Perakovic, Zeljko Stojanov:
Multirole UAVs Supported Parking Surveillance System. Mob. Networks Appl. 28(4): 1246-1254 (2023) - [j20]Jack Long, Ivan Cvitic, Xiaolu Zhang, Dragan Perakovic, Kim-Kwang Raymond Choo:
Badoo Android and iOS Dating Application Analysis. Mob. Networks Appl. 28(4): 1272-1281 (2023) - [j19]Ivan Cvitic, Dragan Perakovic, Marko Perisa, Dominik Sever:
Defining Cross-Site Scripting Attack Resilience Guidelines Based on BeEF Framework Simulation. Mob. Networks Appl. 28(4): 1306-1318 (2023) - [j18]Ivan Cvitic, Dragan Perakovic, Marko Perisa, Aleksandar Jevremovic, Andrii Shalaginov:
An Overview of Smart Home IoT Trends and related Cybersecurity Challenges. Mob. Networks Appl. 28(4): 1334-1348 (2023) - [c21]Ivan Cvitic, Dragan Perakovic, Josip Vladava:
Systematic Analysis of Quantum Key Distribution Network Simulations Tools and Platforms. FABULOUS 2023: 3-17 - [c20]Gordana Jotanovic, Goran Jausevac, Dragan Perakovic, Zeljko Stojanov, Vladimir Brtka, Dalibor Dobrilovic:
Internet of Vehicle Moving Objects Detection System for the Rural Road Networks. FABULOUS 2023: 50-59 - [c19]Brij B. Gupta, Akshat Gaurav, Kwok Tai Chui, Le Wang, Varsha Arya, Anupam Shukla, Dragan Perakovic:
DDoS Attack Detection Through Digital Twin Technique in Metaverse. ICCE 2023: 1-5 - [c18]Ivan Cvitic, Dragan Perakovic:
A Quantum Physics Approach for Enabling Information-Theoretic Secure Communication Channels. ICDF2C (2) 2023: 3-22 - 2022
- [j17]Kwok Tai Chui, Tanveer Singh Kochhar, Amit Chhabra, Sunil K. Singh, Deepinder Singh, Dragan Perakovic, Ammar Almomani, Varsha Arya:
Traffic Accident Prevention in Low Visibility Conditions Using VANETs Cloud Environment. Int. J. Cloud Appl. Comput. 12(1): 1-21 (2022) - [j16]Bineet Kumar Joshi, Bansidhar Joshi, Anupama Mishra, Varsha Arya, Avadhesh Kumar Gupta, Dragan Perakovic:
A Comparative Study of Privacy-Preserving Homomorphic Encryption Techniques in Cloud Computing. Int. J. Cloud Appl. Comput. 12(1): 1-11 (2022) - [j15]Akshat Gaurav, Konstantinos E. Psannis, Dragan Perakovic:
Security of Cloud-Based Medical Internet of Things (MIoTs): A Survey. Int. J. Softw. Sci. Comput. Intell. 14(1): 1-16 (2022) - [j14]Narina Thakur, Sunil K. Singh, Akash Gupta, Kunal Jain, Rachna Jain, Dragan Perakovic, Nadia Nedjah, Marjan Kuchaki Rafsanjani:
A Novel CNN, Bidirectional Long-Short Term Memory, and Gated Recurrent Unit-Based Hybrid Approach for Human Activity Recognition. Int. J. Softw. Sci. Comput. Intell. 14(1): 1-19 (2022) - [j13]Ivan Cvitic, Dragan Perakovic, Brij B. Gupta, Kim-Kwang Raymond Choo:
Boosting-Based DDoS Detection in Internet of Things Systems. IEEE Internet Things J. 9(3): 2109-2123 (2022) - [j12]Lucia Knapcíková, Dragan Perakovic:
Innovative approaches in technology challenges in the context of industry 4.0. Wirel. Networks 28(1): 427-429 (2022) - [j11]Suzana Miladic-Tesic, Goran Z. Markovic, Dragan Perakovic, Ivan Cvitic:
A review of optical networking technologies supporting 5G communication infrastructure. Wirel. Networks 28(1): 459-467 (2022) - [j10]Marko Perisa, Dragan Perakovic, Ivan Cvitic, Marko Krstic:
Innovative ecosystem for informing visual impaired person in smart shopping environment: InnIoTShop. Wirel. Networks 28(1): 469-479 (2022) - [j9]Brij B. Gupta, Aakanksha Tewari, Ivan Cvitic, Dragan Perakovic, Xiaojun Chang:
Artificial intelligence empowered emails classifier for Internet of Things based systems in industry 4.0. Wirel. Networks 28(1): 493-503 (2022) - [j8]Lucia Knapcíková, Dragan Perakovic:
Innovations in ICT, management, industrial and materials engineering. Wirel. Networks 28(2): 853-854 (2022) - [c17]Ivan Cvitic, Dragan Perakovic, Marko Perisa, Mario Sekondo:
Exploring the Applicability of Open-Source Tools for Web Application Cybersecurity Improvement. FABULOUS 2022: 64-79 - [e2]Dragan Perakovic, Lucia Knapcíková:
Future Access Enablers for Ubiquitous and Intelligent Infrastructures - 6th EAI International Conference, FABULOUS 2022, Virtual Event, May 4, 2022, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 445, Springer 2022, ISBN 978-3-031-15100-2 [contents] - 2021
- [j7]Ivan Cvitic, Dragan Perakovic, Marko Perisa, Mirjana D. Stojanovic:
Novel Classification of IoT Devices Based on Traffic Flow Features. J. Organ. End User Comput. 33(6): 1-20 (2021) - [j6]Ivan Cvitic, Dragan Perakovic, Marko Perisa, Brij B. Gupta:
Ensemble machine learning approach for classification of IoT devices in smart home. Int. J. Mach. Learn. Cybern. 12(11): 3179-3202 (2021) - [j5]Lucia Knapcíková, Dragan Perakovic:
Challenges of Industrial Engineering, Management and ICT. Wirel. Networks 27(3): 1557-1559 (2021) - [j4]Ivan Cvitic, Dragan Perakovic, Marko Perisa, Mate Botica:
Novel approach for detection of IoT generated DDoS traffic. Wirel. Networks 27(3): 1573-1586 (2021) - [c16]Ivan Cvitic, Dragan Perakovic, Marko Perisa, Marko Krstic, Brij B. Gupta:
Analysis of IoT Concept Applications: Smart Home Perspective. FABULOUS 2021: 167-180 - [c15]Goran Jausevac, Dalibor Dobrilovic, Vladimir Brtka, Gordana Jotanovic, Dragan Perakovic, Zeljko Stojanov:
Smart UAV Monitoring System for Parking Supervision. FABULOUS 2021: 240-253 - [c14]Dragan Perakovic, Marko Perisa, Marjana Petrovic, Ivan Cvitic, Petra Zoric:
Information and Communication Architecture of the Passenger Information System on the Railway Network of the Republic of Croatia. FABULOUS 2021: 268-283 - [c13]Brij B. Gupta, Akshat Gaurav, Dragan Perakovic:
A Big Data and Deep Learning based Approach for DDoS Detection in Cloud Computing Environment. GCCE 2021: 287-290 - [c12]Akshat Gaurav, Brij B. Gupta, Ching-Hsien Hsu, Dragan Perakovic, Francisco José García-Peñalvo:
Deep Learning Based Approach for Secure Web of Things (WoT). ICC Workshops 2021: 1-6 - [c11]Akshat Gaurav, Brij B. Gupta, Ching-Hsien Hsu, Dragan Perakovic, Francisco José García-Peñalvo:
Filtering of Distributed Denial of Services (DDoS) Attacks in Cloud Computing Environment. ICC Workshops 2021: 1-6 - [c10]Anupama Mishra, Brij B. Gupta, Dragan Perakovic, Francisco José García-Peñalvo, Ching-Hsien Hsu:
Classification Based Machine Learning for Detection of DDoS attack in Cloud Computing. ICCE 2021: 1-4 - [c9]Anupama Mishra, Brij B. Gupta, Dragan Perakovic, Shingo Yamaguchi, Ching-Hsien Hsu:
Entropy based Defensive Mechanism against DDoS Attack in SDN-Cloud enabled Online Social Networks. ICCE 2021: 1-6 - [c8]Anupama Mishra, Brij B. Gupta, Dragan Perakovic, Zhili Zhou:
Defensive Approach using Blockchain Technology against Distributed Denial of Service attacks. SysCom 2021: 8-14 - [c7]Anupama Mishra, Brij B. Gupta, Dragan Perakovic, Francisco José García-Peñalvo:
A Survey on Data mining classification approaches. SysCom 2021: 52-59 - [c6]Akshat Gaurav, Brij B. Gupta, Kwok Tai Chui, Dragan Perakovic, Priyanka Chaurasia, Ching-Hsien Hsu:
A Novel Approach for Fake Comments and Reviews Detection on the Online Social Networks. SysCom 2021: 89-93 - [e1]Dragan Perakovic, Lucia Knapcíková:
Future Access Enablers for Ubiquitous and Intelligent Infrastructures - 5th EAI International Conference, FABULOUS 2021, Virtual Event, May 6-7, 2021, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 382, Springer 2021, ISBN 978-3-030-78458-4 [contents] - [i2]Ivan Cvitic, Dragan Perakovic, Marko Perisa, Anca D. Jurcut:
Methodology for Detecting Cyber Intrusions in e-Learning Systems during COVID-19 Pandemic. CoRR abs/2104.11041 (2021) - [i1]Ivan Cvitic, Dragan Perakovic, Marko Perisa, Anca D. Jurcut:
Methodology proposal for proactive detection of network anomalies in e-learning system during the COVID-19 scenario. CoRR abs/2104.11234 (2021) - 2020
- [c5]Zeljko Stojanov, Dalibor Dobrilovic, Gordana Jotanovic, Dragan Perakovic, Goran Jausevac, Vladimir Brtka:
Software architectures in smart manufacturing: Review and experiences. AICTS 2020: 160-168
2010 – 2019
- 2018
- [j3]Sinisa Husnjak, Dragan Perakovic, Ivan Forenbacher:
Data Traffic Offload from Mobile to Wi-Fi Networks: Behavioural Patterns of Smartphone Users. Wirel. Commun. Mob. Comput. 2018 (2018) - 2017
- [c4]Ivan Cvitic, Dragan Perakovic, Tibor Mijo Kuljanic:
Availability Factors in Delivery of Information and Communication Resources to Traffic System Users. TST 2017: 28-41 - 2016
- [j2]Ivan Forenbacher, Dragan Perakovic, Sinisa Husnjak:
Hedonic modeling to explore the relationship of cell phone plan price and quality in Croatia. Telematics Informatics 33(4): 1057-1070 (2016) - [c3]Ivan Cvitic, Dragan Perakovic, Marko Perisa, Branimir Jerneic:
Availability Protection of IoT Concept Based Telematics System in Transport. TST 2016: 109-121 - 2012
- [c2]Dragan Perakovic, Zdenko Kljaic, Slavko Steficar:
Smart automated platform for telecom operators and enterprise users in industry, transport and energy. MIPRO 2012: 598-602 - 2011
- [c1]Vladimir Remenar, Dragan Perakovic, Goran Zovak:
The Framework of e-Forensics in the Republic of Croatia. ICDIPC (2) 2011: 364-372
2000 – 2009
- 2009
- [j1]Srecko Krile, Dragan Perakovic:
Load Control for Overloaded MPLS/DiffServ Networks during SLA Negotiation. Int. J. Commun. Netw. Syst. Sci. 2(5): 422-432 (2009)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint