Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ivan Cvitić is active.

Publication


Featured researches published by Ivan Cvitić.


telecommunications forum | 2014

IoT infrastructure as a basis for new information services in the ITS environment

Dragan Peraković; Siniša Husnjak; Ivan Cvitić

Internet of Things (IoT) as a concept can be considered as a continuation of the Internet evolution. IoT can serve as an infrastructure foundation for the development and delivery of new services in the transport system, based on the principle of ITS. The purpose of this paper is to show the increasing role of the IoT concept, its future use in the development of ITS information services and defines the guidelines for further applications.


telecommunications forum | 2016

Artificial neuron network implementation in detection and classification of DDoS traffic

Dragan Peraković; Marko Periša; Ivan Cvitić; Siniša Husnjak

Detection of DDoS (Distributed Denial of Service) traffic is of great importance for the availability protection of services and other information and communication resources. The research presented in this paper shows the application of artificial neural networks in the development of detection and classification model for three types of DDoS attacks and legitimate network traffic. Simulation results of developed model showed accuracy of 95.6% in classification of pre-defined classes of traffic.


international conference on transport systems telematics | 2016

Availability Protection of IoT Concept Based Telematics System in Transport

Ivan Cvitić; Dragan Peraković; Marko Periša; Branimir Jerneić

This paper will analyze the security disadvantages of the IoT concept based telematics system in the transport environment in terms of availability and the possibility of denial of access to information resources. Analysis will be conducted on Electronic Toll Collection (ETC) system implemented in Republic of Croatia. Based on this analysis, protection mechanisms that can be implemented in order to maintain agreed quality of service level within the telematics systems based on the IoT concept such as ETC system will be proposed.


international conference on transport systems telematics | 2017

Availability Factors in Delivery of Information and Communication Resources to Traffic System Users

Ivan Cvitić; Dragan Peraković; Tibor Mijo Kuljanić

Availability, as one of the basic elements of IC (information and communication) system security, plays an important role in its work and in operation of services that are provided through it. IC system and related services (IC resources) must be available to end users when needed. Availability of IC resources is especially evident in IC systems implemented in a traffic environment. The emergence of new concepts such as Internet of Things or Cloud Computing and technologies such as 5G resulting in an increasing processes automatization in the traffic system. In doing so, the unavailability of individual IC resource can result in negative user experience in usage of certain classes of services, but can also represent a potentially large security risk and compromised user safety. In such environment required level of IC resources availability are often extremely high so it is essential to know which factors affect it. This research aims to identify these factors, and the results of this research will provide guidelines by which factors needs to be managed to achieve the required level of IC service availability.


The 5th International Virtual Research Conference in Technical Disciplines (RCITD-2017) | 2017

Exploring Digital Divide in Mobile Phone Ownership: Evidence from Nigeria

Ivan Forenbacher; Siniša Husnjak; Ivan Cvitić

In 2012, as part of its response to mobile digital divide, the Nigerian government introduced mobile phone subsidies to rural farmers and did not seem to have achieved the expected results. It was argued that no necessary analysis of socioeconomic factors affecting mobile phone ownership had been conducted previously. The paper took advantage of this period to examine socio-economic factors affecting the probability of mobile phone ownership in Nigeria. In order to estimate a logit model we used national representative data from DataFirst on households and individuals ICT access and usage in 2011-2012. In contrast to what had previously been thought, we found out that poverty may not be correlated with the probability of owning a mobile phone. Type of electricity source, education, and activity has the greatest effect on the probability of owning a mobile phone. The findings may help to improve more coordinated digital divide policy, and serve as a complement to ICT Roadmap 2017 to 2020 in Nigeria and similar countries.


The 5th International Virtual Research Conference In Technical Disciplines | 2017

An Overview of the Cyber Security Strategic Management in Republic of Croatia

Ivan Cvitić; Dragan Peraković; Marko Periša; Mate Botica

Development of information and communication system and its frequent use in various sectors (private and business) requires strategic approach in protection of users’ privacy and data. This paper analyzes strategic development of cyber security in Republic of Croatia and gives a comparison with EU member’s strategy. Also, this paper identifies deficiencies and gives the improvement guidance of National cyber security strategy according to guidelines prescribed by ENISA.


Archive | 2017

Challenges of Information and Communication Technologies Usage in E-Business Systems

Marko Periša; Ivan Cvitić; Peter Kolarovszki

In todays identification and data collection methods on traffic entities, large number of traffic and logistic systems uses one of the automatic identification and data capture (AIDC) technologies. The mentioned group contains information and communication technologies such as radio‐frequency identification (RFID), real‐time location systems (RTLS), near field communication (NFC), global positioning system (GPS), and beacon and advanced tagging technologies such as barcode and quick response code (QR code) which can be implemented with function of mobile traffic entities identification in traffic environment. In this chapter, possibilities and characteristics of mentioned technologies will be described from the aspect of their usage in traffic system through implementation of e‐business. Data collection and exchange concept will be based on cloud computing and Internet of Things concepts. Through various case study examples in traffic environment, more efficient use of AIDC technologies in traffic system will be shown.


The 3rd International Virtual Research Conference In Technical Disciplines | 2015

Web 2.0 services for informing elderly people: Web for Health

Dragan Peraković; Marko Periša; Ivan Cvitić; Rosana Elizabeta Sente; Maja Radošević; Petra Zorić

This research on user requirements defines functionalities of the Web 2.0 systems for the targeted user group (elderly, people with impaired vision, hearing, speech, and neurodegenerative diseases - TUG) in order to improve the quality of their lives. For this purpose, there is a proposal of Web 2.0 technologies (HTML5 and PHP) whose functionalities allow dynamism and adaptability of information to the TUG. Architecture of solution is based on Cloud Computing (CC) technology which provides 24/7 support for provision of service and safety. Functionalities defined in this paper, are in fact a form of an assistive technology, which allows a registration of the TUG and enables a necessary adjustment of websites according to the degree of deficiency. Due to the functionalities listed within this paper, developed application solution allows the TUG to spend their third age in a dignified manner, providing them with the possibility to have more interaction with people and the opportunity to participate in various activities in their fields of interest.


26TH DAAAM INTERNATIONAL SYMPOSIUM ON INTELLIGENT MANUFACTURING AND AUTOMATION | 2016

Classification of Security Risks in the IoT Environment

Ivan Cvitić; Miroslav Vujić; Siniša Husnjak


PosTel 2015 | 2015

Analysis of the IoT impact on volume of DDoS attacks

Dragan Peraković; Marko Periša; Ivan Cvitić

Collaboration


Dive into the Ivan Cvitić's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge