<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:dim="http://www.dspace.org/xmlns/dspace/dim" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd">
    <responseDate>2026-05-06T09:45:38.972Z</responseDate>
    <request verb="GetRecord" identifier="ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai:1:4452" metadataPrefix="dim">http://ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai</request>
    <GetRecord>
        <record>
            <header>
                <identifier>ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai:1:4452</identifier>
                <datestamp>2016-10-17T12:32:55Z</datestamp>
                <setSpec>1</setSpec>
            </header>
            <metadata>
                <dim:dim>
                    <dim:field mdschema="dc" element="title" lang="en">ON MITIGATION OF MODERN CYBERCRIME THREATS</dim:field>
                    <dim:field mdschema="dc" element="date" qualifier="issued">2016</dim:field>
                    <dim:field mdschema="dc" element="identifier" qualifier="uri">http://ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai/record/1/4452</dim:field>
                    <dim:field mdschema="dc" element="identifier" qualifier="uri">http://portal.sinteza.singidunum.ac.rs/Media/files/2016/137-142.pdf</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="id:15618" confidence="-1">M. Jovanović</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="etfid:570" confidence="-1">N. Rančić</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="id:15620" confidence="-1">D. Davidović</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="id:15621" confidence="-1">D. Mitić</dim:field>
                    <dim:field mdschema="dc" element="description" qualifier="abstract">Abstract:
As the infrastructure that humans heavily rely upon grows is dependent on
modern technology and the Internet, the damage that can be done by exploiting
vulnerabilities in these systems becomes more significant and worrisome. The
extent of these threats’ possible impact cannot be overstated, as the amount
of sensitive information stored in information systems and the actions that
they are permitted to perform have been continuously heightening since
the beginning of the information age. We present a review of representative
examples of security incidents that had put a large number of such systems at
risk of abuse, with many of them having withstood documented exploitation
“in the wild”. We analyze the circumstances that lead to the presence of these
security threats, as well as the way they were handled in terms of disclosure
and urgent fixes to the affected software. Finally, we also suggest methods
which could have possibly prevented these vulnerabilities or lowered their
attack surface if they had been applied timely.
Key words:
cybercrime, information security, vulnerability mitigation.</dim:field>
                    <dim:field mdschema="dc" element="type">conferenceObject</dim:field>
                    <dim:field mdschema="dc" element="citation" qualifier="spage">137</dim:field>
                    <dim:field mdschema="dc" element="citation" qualifier="epage">142</dim:field>
                    <dim:field mdschema="dc" element="identifier" qualifier="doi">https://doi.org/10.15308/Sinteza-2016-137-142</dim:field>
                    <dim:field mdschema="dc" element="source">http://portal.sinteza.singidunum.ac.rs/Media/files/2016/Sinteza-2016.pdf</dim:field>
                </dim:dim>
            </metadata>
        </record>
    </GetRecord>
</OAI-PMH>
