<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:dim="http://www.dspace.org/xmlns/dspace/dim" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd">
    <responseDate>2026-05-05T00:39:08.805Z</responseDate>
    <request verb="GetRecord" identifier="ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai:1:11599" metadataPrefix="dim">http://ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai</request>
    <GetRecord>
        <record>
            <header>
                <identifier>ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai:1:11599</identifier>
                <datestamp>2025-09-29T20:36:22Z</datestamp>
                <setSpec>1</setSpec>
            </header>
            <metadata>
                <dim:dim>
                    <dim:field mdschema="dc" element="title" lang="en">Remote Control Software and Packet Analysis</dim:field>
                    <dim:field mdschema="dc" element="date" qualifier="issued">2024</dim:field>
                    <dim:field mdschema="dc" element="identifier" qualifier="uri">http://ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai/record/1/11599</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="id:53633" confidence="-1">A. Petrovski</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="orcid::0000-0001-6033-1512" confidence="-1">J. Gavrilović</dim:field>
                    <dim:field mdschema="dc" element="description" qualifier="abstract">Modern computers don’t have any pre-installed software for remote control. The most important task of remote control software isn’t only to allow us to control devices remotely, but to also make it safe as possible. We have worked exactly on that problem of safety during remote control, and we have also made built-in software that tracks the safety of a chosen folder with tracked logs and file paths. Also, we have worked on network traffic analysis while remote control is active. The user whose device is being controlled has an option for restoring the folder, that he previously chose, to its original state before establishing the remote control</dim:field>
                    <dim:field mdschema="dc" element="type">conferenceObject</dim:field>
                    <dim:field mdschema="dc" element="citation" qualifier="spage">413</dim:field>
                    <dim:field mdschema="dc" element="citation" qualifier="epage">418</dim:field>
                    <dim:field mdschema="dc" element="identifier" qualifier="doi">https://doi.org/10.15308/Sinteza-2024-413-418</dim:field>
                    <dim:field mdschema="dc" element="source">Zbornik radova Sinteza 2024 - International Scientific Conference on Information Technology, Computer Science, and Data Science</dim:field>
                </dim:dim>
            </metadata>
        </record>
    </GetRecord>
</OAI-PMH>
