<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:dim="http://www.dspace.org/xmlns/dspace/dim" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd">
    <responseDate>2026-04-17T17:46:59.535Z</responseDate>
    <request verb="GetRecord" identifier="ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai:1:9942" metadataPrefix="dim">http://ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai</request>
    <GetRecord>
        <record>
            <header>
                <identifier>ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai:1:9942</identifier>
                <datestamp>2024-07-01T13:23:52Z</datestamp>
                <setSpec>1</setSpec>
            </header>
            <metadata>
                <dim:dim>
                    <dim:field mdschema="dc" element="title" lang="en">Machine learning-based informaton systems security management</dim:field>
                    <dim:field mdschema="dc" element="date" qualifier="issued">2024</dim:field>
                    <dim:field mdschema="dc" element="identifier" qualifier="uri">http://ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai/record/1/9942</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="orcid::0009-0001-3069-6702" confidence="-1">S. Anđelić</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="orcid::0000-0002-8961-3529" confidence="-1">V. Dedić</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="orcid::0009-0003-3869-9187" confidence="-1">N. Dedić</dim:field>
                    <dim:field mdschema="dc" element="description" qualifier="abstract">Modern companies&amp;apos; operations depend on the Internet and web services, so security concerns are critical. This paper discusses current security risks and responses, including security mechanisms. Risks specific to modern ages, especially financial institutions, can be categorized into ones due to increased use of mobile applications, break-ins of third-party organizations, and cryptocurrency usage risks. Protection mechanisms are used to protect corporate processes and data and must meet desired critical points. Further, this study presents specific operations of Darktrace, a suite of AI-powered software tools designed to protect corporate assets from cyberattacks. Darktrace uses both supervised and unsupervised machine learning algorithms to maximize threat detection performance, supporting the conclusion that artificial intelligence promises a lot in the realm of threat detection and intrusion detection.</dim:field>
                    <dim:field mdschema="dc" element="type">conferenceObject</dim:field>
                    <dim:field mdschema="dc" element="source">Sinteza 2024 - International Scientific Conference on Information Technology and Data Related Research</dim:field>
                </dim:dim>
            </metadata>
        </record>
    </GetRecord>
</OAI-PMH>
