<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:dim="http://www.dspace.org/xmlns/dspace/dim" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd">
    <responseDate>2026-05-12T20:15:21.807Z</responseDate>
    <request verb="GetRecord" identifier="ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai:1:4854" metadataPrefix="dim">http://ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai</request>
    <GetRecord>
        <record>
            <header>
                <identifier>ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai:1:4854</identifier>
                <datestamp>2017-04-24T08:05:17Z</datestamp>
                <setSpec>1</setSpec>
            </header>
            <metadata>
                <dim:dim>
                    <dim:field mdschema="dc" element="title" lang="en">Social engineering attack method on ICT systems using USB stick</dim:field>
                    <dim:field mdschema="dc" element="date" qualifier="issued">2017</dim:field>
                    <dim:field mdschema="dc" element="identifier" qualifier="uri">http://ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai/record/1/4854</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="etfid:98" confidence="-1">Г. Куњадић</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="etfid:49" confidence="-1">M. Savković</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="id:17456" confidence="-1">С. Радовић</dim:field>
                    <dim:field mdschema="dc" element="description" qualifier="abstract">The use of methods of social engineering is a significant threat to the security of ICT systems. There are different methods of social engineering that can be applied depending on the means used. The main drawback of the methods used is that the attacker comes into contact with the victim, usually in person or through various social networks. The method that we tested is based on the use of USB memory that is very effective, and there is no contact between the attacker and the victim. Taking into account the results of this study it is possible to improve the safety awareness of employees and prevent or reduce the effects observed to attack the ICT system.

Keywords - Social Engineering, hacking, scripting</dim:field>
                    <dim:field mdschema="dc" element="type">conferenceObject</dim:field>
                    <dim:field mdschema="dc" element="citation" qualifier="spage">...</dim:field>
                    <dim:field mdschema="dc" element="citation" qualifier="epage">...</dim:field>
                    <dim:field mdschema="dc" element="source">Sinteza 2017</dim:field>
                </dim:dim>
            </metadata>
        </record>
    </GetRecord>
</OAI-PMH>
