Search  English (United States) Hrvatski (Hrvatska)

innovative promotional partnershipArtificial Intelligence towards EU Multilingualism

Technical co-sponsorship

 
MIPRO 2017 - 40th Jubilee International Convention

ISS - Information Systems Security

Wednesday, 5/24/2017 2:00 PM - 7:30 PM, Galija, Hotel Admiral, Opatija

The IEEE reserves the right to exclude a paper from distribution after the conference (including its removal from IEEE Explore) if the paper is not presented at the conference.

Timetable changes are possible - please follow the web.

Event program
Wednesday, 5/24/2017 2:00 PM - 7:30 PM,
Galija, Hotel Admiral, Opatija
2:00 PM - 4:30 PMChair: Tonimir Kišasondi
Papers 
1.A. Draganić (Faculty of Electrical Engineering, University of Montenegro, Podgorica, Montenegro), M. Marić (S&T Montenegro, Podgorica, Montenegro), I. Orović, S. Stanković (Faculty of Electrical Engineering, University of Montenegro, Podgorica, Montenegro)
Identification of Image Source Using Serial-Number-Based Watermarking under Compressive Sensing Conditions 
Although the ownership protection and prevention of the unauthorized manipulation of digital images has been in the focus of research interests, the authentication of image source has become an important concern as well. By using various digital tools, digital media copies can be distributed with changed information about the source, the author or the owner. The public key digital signature, embedded into the digital media, can provide a strong origin authentication and reliable image content integrity protection. This paper proposes the procedure that enables the authentication of image source and content within the Trap View pest monitoring system, by using the Public Key Cryptography Signature (PKCS). The images, captured with numerous automatic observing cameras in Trap View cloud system, are watermarked using 32-bit PKCS serial number. Watermark is created as a repeated binary logo, embedded into images through several bit planes. On the receiver side, the logos are extracted together with the serial numbers from each logo image. Each extracted serial number is compared with the original serial number for certain camera device, that is available through the Certification Authority web service. The comparison is done in order to indicate the camera that captured the image. It means that it would be easy to locate the location where it is necessary to replace the pest trap because of too many insect specimens captured inside. Having in mind high resolution of captured images, the optimization of the image size is desirable. It is done by using the Compressive Sensing (CS) approach. The goal of the CS optimization is to reduce the number of image samples transmitted through the network and uploaded to the cloud, but preserving the image quality. However, serial number extraction and identification of the camera device must still be possible after the CS optimization. Therefore, the CS is observed as a watermark attack. The proposed watermarking procedure shows successful identification of ownership after the CS optimization. The robustness of the procedure is also tested under several common attacks such as noise and compression and shows successful serial number extraction and device identification.
2.K. Hausknecht, S. Gruičić (INsig2 d.o.o., Zagreb, Croatia)
Anti-Computer Forensics 
Generally speaking, anti-computer forensics is a set of techniques used as countermeasures to digital forensic analysis. When put into information and data perspective, it is a practice of making it hard to understand or find. Typical example being when programming code is often encoded to protect intellectual property and prevent an attacker from reverse engineering a proprietary software program. Through this paper the focus will be on anti-forensics methods which in sense is how information obfuscation is affecting digital forensic investigation. The paper will describe some of the many anti-forensics methods used under the broad classifications of data hiding, artefact wiping, trail obfuscation and finally attacks on the forensic tools themselves. With any modern-day investigation relying more and more on digital forensics, investigators are required to deal with antiforensics methods on a daily basis. This paper will explore the challenges investigators and forensic practitioners are facing when conducting investigations. The methods used will be separated into low-tech and high-tech techniques, how they are being used, how they are affecting digital forensic investigation and what the mitigation possibilities are. Focus will be on hightech techniques that will not stop the investigation but rather prolong or make the process extremely time consuming and therefore not possible to complete in a timely manner or be cost effective.
3.S. Dogan, E. Akbal (Fırat University, Digital Forensics Engineering, Elazığ, Turkey)
Analysis of Mobile Phones in Digital Forensics 
Nowadays, the need to tackle rapidly increased crimes is increasing day by day to help ensuring justice. Digital forensics can be defined as the process of collecting, examining, analyzing and reporting of digital evidence without any damage. Digital forensics requires a detailed examination of devices such as computers, mobile phones, sim cards, tablets that contain digital evidence regardless of whether the crime is large or small. Among these devices, mobile phones take an important place in digital forensics because of their widely usages by every individual. The importance of examining of the data called as evidence in mobile phones has increased with advances in technology, operation capacity, storage capacity and functionality. In a forensics case, mobile phones must be examined by authorized persons and the data obtained from the device must be brought to standards that can be used forensically. In this study, examination and analysis of mobile phones in terms of digital forensics is evaluated. At the same time, data that can be obtained from mobile phones through a sample application has been investigated.
4.M. Ramljak (Ericsson Nikola Tesla, Zagreb, Croatia)
Security Analysis of Open Home Automation Bus System 
Today's modern homes are becoming complex live systems in which virtually all functionality, from lighting and heating control to security and occupancy simulation, is mediated by computerized controllers leading to IoT future. The smart nature of these homes raises obvious security concerns and history has shown that a vulnerability in only one component may provide the means to compromise the system as a whole. Thus, the addition of every new component, and especially new components with external networking capability, increases risks that must be carefully considered. In this paper we examine one of the most active open source home automation framework, Open Home Automation Bus (openHAB) which is used as platform for many other IoT supported devices. First, we go through openHAB security architecture and supported features following the challenge of a static source code analysis of several most used openHAB packages (called bindings) and carefully crafted test cases that revealed many undocumented features of the platform. Next, we exploited security flaws by constructing two proof-of-concept attacks that: (1) openHAB system denial of service; (2) inject custom binding for message bus monitoring and control; We conclude the paper with security best practices for the design of custom openHAB binding packages.
5.J. Jumić, M. Vuković (Faculty of Electrical Engineering and Computing, Zagreb, Croatia)
Analysis of Credit Card Attacks Using the NFC Technology 
Near field communication (NFC) is a short-range type of communication technology used in various appliances, and more recently in contactless credit and debit bank cards. Most modern smartphones have the capability to receive and transmit NFC signals, which makes them a promising platform for mobile payment. However, payment systems always attract malicious users who try to use the technology to get financial benefits. There is a wide array of smartphone applications and external hardware capable of analyzing NFC systems and traffic that may enable several types of attacks. In this paper, we analyse the existing threats and try to assess whether the users are safe from such attacks and what harm, if any, can such attacks yield.
6.F. Holik, S. Neradova (University of Pardubice, Pardubice, Czech Republic)
Vulnerabilities of Modern Web Applications 
The security of modern web application is becoming increasingly important with their growing usage. Millions of users can be using such online services, so availability, integrity, and confidentiality is critical. This paper describes the process of penetration testing of these applications. The goal of such testing is to detect the application flaws and vulnerabilities and to propose a solution to mitigate them. The paper analyses current penetration testing tools and subsequently test them on a use case web application build specifically with present security flaws. The process of penetration testing is described in detail and the performance of each tool is evaluated. In the last section, recommended practices to mitigate found flaws are summarized.
7.S. Kuman, S. Groš, M. Mikuc (Faculty of Electrical Engineering and Computing, Zagreb, Croatia)
An Experiment in Using IMUNES and Conpot to Emulate Honeypot Control Networks 
Honeypots are used as a security measure both to divert the attention of a potential attackers intentions and to reveal the attacker since the only reason someone would interact with honeypots is if they are looking for a vulnerable target. Honeypots emulate only a part of the machine they are supposed to represent and contain no valuable data. ICS (Industrial Control System) is a term that is used for a system that monitors industrial plants, distributed control systems or other systems that mostly contain PLCs (Programmable Logic Controllers). Conpot is an open source honeypot that emulates PLC devices so it can be used in ICSs. However, Conpot can not emulate complex honeypot networks. The aim of this project is to make a tool that can be used to design a honeypot network which emulates an ICS. A network designed with that tool will be simulated as a part of this project and the data collected during the simulation will be analyzed.
8.E. Cano Pons, G. Baldini, D. Geneiatakis (European Commision - JRC, Ispra, Italy)
A Wireless Propagation Analysis for the Frequency of the Pseudonym Changes to Support Privacy in VANETs 
Vehicle Ad Hoc Networks (VANETs) in Cooperative Intelligent Transport Systems (C-ITS) are based on the exchanges of messages among ITS-Stations (e.g., vehicles and roadside infrastructure) using the wireless G5 Dedicated Short Rate Communication (DSRC) standard to support safety-critical applications. VANETs require the authentication of ITS-stations and messages but the privacy of the drivers of the vehicles must be supported. In recent years, researchers have proposed solutions to mitigate privacy risks based on the use of pseudonyms. A key design decision is related to the frequency of the change of pseudonyms. The activity of a vehicle under one pseudonym can be linked to another thus providing traceability of the vehicle and a privacy risk for the driver. To prevent link-ability of actions, the vehicle must change pseudonyms over time. In this paper, the authors propose a radio frequency physical layer analysis to determine the frequency of the pseudonym changes. The rationale is that different wireless propagation conditions will impact the capability of the privacy attacker to trace the vehicle, thus reducing the need to frequently change the pseudonyms. The analysis has been performed in different channel fading conditions and for different relative speed values.
9.B. Brumen, T. Makari (University of Maribor, Maribor, Slovenia)
Resilience of Students' Passwords against Attacks 
Passwords are still the predominant mode of authentication in contemporary information systems, despite a long list of problems associated with their insecurity. Their primary advantage is the ease of use and the price of implementation, compared to other systems of authentication (e.g. two-factor, biometry, …). In this paper we present an analysis of passwords used by students of one of universities and their resilience against brute force and dictionary attacks. The passwords were obtained from a university’s computing center in plaintext format for a very long period – first passwords were created before 1980. The results show that early passwords are extremely easy to crack: the percentage of cracked passwords is above 95 % for those created before 2006. Surprisingly, more than 40 % of passwords created in 2014 were easily broken within a few hours. The results show that users – in our case students, despite positive trends, still choose easy to break passwords. This work contributes to loud warnings that a shift from traditional password schemes to more elaborate systems is needed.
10.T. Velki (J.J. Strossmayer University of Osijek, Faculty of Education, Osijek, Croatia), K. Solic (J.J. Strossmayer University of Osijek, Faculty of Medicine, Osijek, Croatia), V. Gorjanac (Center for missing and exploited children, Osijek, Croatia), K. Nenadic (J.J. Strossmayer University of Osijek, Faculty of Electrical Engineering, Computer Science and Infor, Osijek, Croatia)
Empirical Study on the Risky Behavior and Security Awareness among Secondary School Pupils - Validation and Preliminary Results 
This study was based on the validated Users’ Information Security Awareness Questionnaire (UISAQ). Authors gathered information on risky behavior and security awareness among 323 pupils from three secondary schools: General program secondary school (Gymnasium), Business and administrative high school and Vocational school. Questionnaire was modified and validated to meet new requirements regarding young pupils’ behavior. All gather data was analyzed with standard statistical methods. Analysis outcome represent results of secondary school pupils regarding 6 subareas: Usual risky behavior, Personal computer maintenance, Borrowing access data, Criticism on security in communications, Fear of losing data and Rating importance of backup. Also some detailed comparisons regarding demographic variables and correlation with students and employed users were given. Additionally, correlations with revealing Facebook passwords and Internet abuse are given. The percentage of young pupils that have revealed their password for their e-mail system access is higher than usual. This information should alert government institutions and schools teachers. Results of this study have shown that there is a reason to be concerned about pupils’ risky behavior on the Internet. There is a great need to educate pupils in order to increase their awareness on information security and privacy issues.
4:30 PM - 7:30 PMChair: Stjepan Groš
Papers 
1.D. Andročec, B. Tomaš, T. Kišasondi (Faculty of Organization and Informatics, Varaždin, Croatia)
Interoperability and Lightweight Security for Simple IoT Devices 
The semantic web can be used to enable the interoperability of IoT devices and to annotate their functional and non-functional properties, including security and privacy. In this paper, we will show how to use the ontology and JSON-LD to annotate connectivity, security and privacy properties of IoT devices. Out of that, we will present our prototype for a lightweight, secure application level protocol wrapper that ensures communication consistency, secrecy and integrity for low cost IoT devices like the ESP8266 and Photon particle.
2.D. Geneiatkis, I. Kounelis, R. Neisse, I. Nai Fovino, G. Steri, G. Baldini (European Commission, Joint Research Centre, Ispra, Italy)
Security and Privacy Issues for an IoT Based Smart Home 
Internet of Things (IoT) can support numerous applications and services in various domains, such as smart cities and smart homes. IoT smart objects interact with other components e.g., proxies, mobile devices, and data collectors, for management, data sharing and other activities in the context of the provided service. Though such components contribute to address various societal challenges and provide new advanced services for users, their limited processing capabilities make them vulnerable to well-known security and privacy threats. Until now various research works have studied security and privacy in IoT, validating this claim. However, to the best of our knowledge literature lacks research focusing on security and privacy flaws introduced in IoT through interactions among different devices supporting a smart home architecture. In particular, we set up the scene for a security and privacy threat analysis for a typical smart home architecture using off the shelf components. To do so, we employ a smart home IoT architecture that enables users to interact with it through various devices that support smart house management, and we analyze different scenarios to identify possible security and privacy issues for users.
3.K. Knežević (University of Zagreb, Faculty of Electrical Engineering and Computing, Zagreb, Croatia)
Combinatorial Optimization in Cryptography 
The design of block ciphers relies on two fundamental principles: confusion and diffusion. The known attacks on different cryptosystems lead to a number of criteria that the implemented ciphers must satisfy. The design of cryptographic systems needs to consider various characteristics simultaneously, which can be regarded as a multiobjective combinatorial optimization problem. The nonlinearity property of Boolean functions or S-boxes is one of the most important cryptographic criteria when considering block and stream ciphers. Functions whose nonlinearity is equal to the maximum value are called bent functions. One possible way to construct Boolean or S-box bent functions is evolutionary computation. Evolutionary computation algorithms present a range of problem-solving techniques based on the principles of biological evolution. The purpose of this paper is to give a state-of-the-art overview of the Boolean or S-box function encoding in evolutionary computation, as well as the problems that may be dealt with using evolutionary algorithms.
4.K. Šolić (J.J. Strossmayer University of Osijek, Faculty of Medicine, Osijek, Croatia), H. Ocevcic (Addiko Bank, Zagreb, Croatia), I. Fosic (HEP Telekomunikacije d.o.o. PS Osijek, Osijek, Croatia), I. Horvat (OTIS d.o.o., Osijek, Croatia), M. Vukovic (University of Zagreb Faculty of Electrical Engineering and Computing, Zagreb, Croatia), T. Ramljak (Center for Missing and Exploited Children, Osijek, Croatia)
Towards Overall Information Security and Privacy (IS&P) Taxonomy  
Although the importance of information security in every day's business and private life is obvious, there is a constant increase in number of security breaches. A wide array of all kinds of issues have either direct or indirect impact on the overall information security and privacy level. The aim of this work is to collect and describe these issues in a standard manner. For this purpose, a taxonomy modeling was used, since it is a commonly used technique for classification. Building taxonomy scheme means classifying elements on some subject with parent-child relations between entities. After defining main parent node as the Overall Information Security and Privacy, its main child nodes are defined to represent main subareas in the scheme: Network Protection, Software Protection, Physical Protection, Security Procedures, Web Site, System's Paper Elements, Security Legislations and Users' Influence. Each subarea is further divided into smaller information security and privacy subareas, and further into even smaller subareas, until it was no longer possible to divide. This taxonomy can be used as a basis for security ontology and various analytical and decision support systems used for security evaluation and risk assessment.
5.Z. Masetic (International Burch University, Sarajevo, Bosnia and Herzegovina), K. Hajdarevic (University of Sarajevo, Sarajevo, Bosnia and Herzegovina), N. Dogru (International Burch University, Sarajevo, Bosnia and Herzegovina)
Cloud Computing Threats Classification Model Based on the Detection Feasibility of Machine Learning Algorithms 
Cloud computing became very popular in past few years, and most of the business and home users rely on its services. Because of its wide usage, cloud computing services became a common target of different cyber-attacks executed by insiders and outsiders. Therefore, cloud computing vendors and providers need to implement strong information security protection mechanisms on their cloud infrastructures. One approach that has been taken for successful threat detection that will lead to the successful attack prevention in cloud computing infrastructures is the application of machine learning algorithms. To understand how machine learning algorithms can be applied for cloud computing threat detection, we propose the cloud computing threat classification model based on the feasibility of machine learning algorithms to detect them. In this paper, we addressed three different criteria types, where we considered three types of classification: a) type of learning algorithm, b) input features and c) cloud computing level. Results proposed in this paper can contribute to further studies in the field of cloud threat detection with machine learning algorithms. More specifically, it will help in selecting appropriate input features, or machine learning algorithms, to obtain higher classification accuracy.
6.I. Duic (Croatian Radiotelevision, Zagreb, Croatia), V. Cvrtila (University of Applied Sciences Vern, Zagreb, Croatia), T. Ivanjko (Faculty of Humanities and Social Sciences, Zagreb, Croatia)
International Cyber Security Challenges 
Cyber ​​space represents a security risk and challenge of modern times. Cyber ​​security will significantly affect international relations in the 21st century. The aim is to set the paradigm of security challenges in the information age. The development and application of information communication technology has created a new battleground. The paper etablishes the basic concepts and principles of cyber threats that endanger the safety of the subjects of international relations. The combination of transparent and expert scientific work seeks to show cyber space as an operational dimension of international relations in terms of security challenges. Through the identification and comparison of cyber threats, terrorism and crime are established. With the systematization of the cyber warfare strategy and the very methods of attack, links with the planned action will be set up through the application of technical, computing and network systems.
7.G. Vojković, M. Milenković (Fakultet prometnih znanosti, Zagreb, Croatia)
Legal Framework Issues Managing Confidential Business Information in the Republic of Croatia 
Confidential business information in the Republic of Croatia is regulated in an insufficient mode - the Data Confidentiality Act provisions are still on force for more then 20 years, and entirely inadequate for today's time. Considering that data is now greatly kept in electronic form, it is necessary by the internal documents, and in accordance with the existing outdated legislation to regulate in detail the issues of confidential business information. In case of exchange of business data which are confidential - it is necessary to sign the appropriate contract between the parties. This paper is about existing of legal shortcomings and how to overcome them in practice.
8.D. Delija, A. Zekić (Visoka škola za informacijske tehnologije , Zagreb, Croatia)
Uvođenje novih sadržaja u nastavu digitalne forenzike i kibernetičke sigurnosti upotrebom studentskih radova 
U ovom radu razmatramo načine kontinuiranog uvođenje novih sadržaja u predmete s područja kibernetičke sigurnosti. Kao primjer navodimo „Osnove računalne forenzike“ u koji se novi sadržaji uvode korištenjem studentskih praktičnih i teoretskih radova, ideje za radove predlažu studenti i predavači. Predloženi postupak se sastoji iz testiranja kroz studentski rad, te ugradnje rezultata u nastavne materijale. Da bi se studentski rad uspješno koristio mora zadovoljiti niz zahtjeva: prilagođenost stupnju znanja studenta i raspoloživoj opremi, raspoloživost alata i sustava, jednostavna implementacija i prenosivost, upotreba alata otvorenog koda i slobodnih alata, te minimalna cijena.
9.L. Carić, L. Juranić, N. Biruški (DefenseCode L.L.C., Konjščina, Croatia)
Zamke u sigurnosti web aplikacija i njihovog izvornog koda 
Danas na svijetu gotovo i ne postoji poznata institucija čiji informatički resursi nisu bili kompromitirani, obično napadom na web aplikacije koje se nalaze izložene na internetu. Moderni informatički kriminalci iznimno su motivirani, raspolažu značajnim resursima, stručnim i specijalističkim znanjima, te visokom tehnologijom. Iako imena "provaljenih" institucija redovito krase udarne vijesti, i dalje se sigurnosti web aplikacija i njihovog izvornog koda pristupa, u najmanju ruku, prilično nonšalantno i paušalno. Podaci kažu da je čak 80% svih web stranica nesigurno, jer se na njima nalazi bar jedna kritična sigurnosna ranjivost. Naše iskustvo na području automatizirane sigurnosne analize web aplikacija i njihovog izvornog koda govori da su ovi podaci možda i previše optimistični. Institucije često mjesecima, pa i godinama, ne uklanjaju prijavljene sigurnosne ranjivosti. Suočene s bjelodanim i brojnim problemima sigurnosti izvornog koda neke institucije biraju pometanje pod tepih i više ih brine očuvanje sitnih osobnih interesa od vlastite sigurnosti ili, još gore, sigurnosti korisnika kojima isporučuju svoje proizvode. Namjera nam je predstaviti najčešće pogreške u pristupu sigurnosti web aplikacija i njihovog izvornog koda, pokazati kako ih hakeri vješto iskorištavaju, te kako izbjeći zamke u pristupu sigurnosti i uporabiti moderne tehnologije u svoju korist, a ne na svoju štetu.
10.I. Kramarić (Faculty of Electrical Engineering and Computing, University of Zagreb, Zagreb, Croatia)
Taxonomy of DDos Attacks 
DDos attacks have become a huge treat to companies because they cause losses due to the unavailability of services and potentially more serious security problems.This paper classifies and describes different types of DDoS attacks. Given is an overview of tools that can be used to execute these attacks and some real world examples to show how dangerous they can be.
11.M. Radovan (Daimler, Stuttgart, Germany), B. Golub (AdNet, Zagreb, Croatia)
Trends in IoT Security 
The incredible rapid development of IoT systems and technology, primarily thanks to omnipresent access of high speed broadband internet access and supporting technologies like Big Data, Cloud Computing, REST/Web services as well as cheap electronic systems that use new wireless communications standards like ZigBee and BLE, lead to equal rapid growth of number of smart devices – “things” - connected to the internet. Quoting Kevin Ashton, the probable author of a term “Internet of Things” , from 1999, the size of the internet in 1999 was about 50 petabytes of data, and the prediction for 2020 is that the size of the internet will be about 40 zettabytes of data. When we combine that rapid expansion, and take into context the damage for the world economy from cybercrime, in today's approximations, the damage from cybercrime is assesed at about 400 billion US dollar per year. What does the that outlook hold for the next 5, 10 or 20 years, will mostly depend on the development of security standards,user behavior and education in a few next years. A main aim of this paper is to summarize and analyze the current state of security trends in IoT technologies, what needs to be considered to shape the security standards for the new generation of connected systems.

Basic information:

Chairs:

Stjepan Groš (Croatia), Tonimir Kišasondi (Croatia), Mario Spremić (Croatia)

Registration / Fees:
REGISTRATION / FEES
Price in EUR
Before 8 May 2017
After 8 May 2017
Members of MIPRO and IEEE
180
200
Students (undergraduate and graduate), primary and secondary school teachers
100
110
Others
200
220

The discount doesn't apply to PhD students.

Contact:

Stjepan Groš
University of Zagreb
Faculty of Electrical Engineering and Computing
Unska 3
HR-10000 Zagreb, Croatia

E-mail: stjepan.gros@fer.hr

The best papers will get a special award.
Accepted papers will be published in the ISBN registered conference proceedings. Papers written in English and presented at the Conference will be submitted for posting to IEEE Xplore.
There is a possibility that the selected scientific papers with some further modification and refinement are being published in the Journal of Computing and Information Technology (CIT).


International Program Committee General Chair:

Petar Biljanović (Croatia)

International Program Committee:

Slavko Amon (Slovenia), Vesna Anđelić (Croatia), Michael E. Auer (Austria), Dubravko Babić (Croatia), Snježana Babić (Croatia), Almir Badnjevic (Bosnia and Herzegovina), Mirta Baranović (Croatia), Bartosz Bebel (Poland), Ladjel Bellatreche (France), Eugen Brenner (Austria), Gianpiero Brunetti (Italy), Andrea Budin (Croatia), Željko Butković (Croatia), Željka Car (Croatia), Matjaž Colnarič (Slovenia), Alfredo Cuzzocrea (Italy), Marina Čičin-Šain (Croatia), Marko Čupić (Croatia), Marko Delimar (Croatia), Todd Eavis (Canada), Maurizio Ferrari (Italy), Bekim Fetaji (Macedonia), Renato Filjar (Croatia), Tihana Galinac Grbac (Croatia), Paolo Garza (Italy), Liljana Gavrilovska (Macedonia), Matteo Golfarelli (Italy), Stjepan Golubić (Croatia), Francesco Gregoretti (Italy), Stjepan Groš (Croatia), Niko Guid (Slovenia), Jaak Henno (Estonia), Ladislav Hluchy (Slovakia), Vlasta Hudek (Croatia), Željko Hutinski (Croatia), Mile Ivanda (Croatia), Hannu Jaakkola (Finland), Leonardo Jelenković (Croatia), Dragan Jevtić (Croatia), Robert Jones (Switzerland), Peter Kacsuk (Hungary), Aneta Karaivanova (Bulgaria), Marko Koričić (Croatia), Tomislav Kosanović (Croatia), Mladen Mauher (Croatia), Igor Mekjavic (Slovenia), Branko Mikac (Croatia), Veljko Milutinović (Serbia), Nikola Mišković (Croatia), Vladimir Mrvoš (Croatia), Jadranko F. Novak (Croatia), Jesus Pardillo (Spain), Nikola Pavešić (Slovenia), Vladimir Peršić (Croatia), Slobodan Ribarić (Croatia), Janez Rozman (Slovenia), Karolj Skala (Croatia), Ivanka Sluganović (Croatia), Mario Spremić (Croatia), Vlado Sruk (Croatia), Stefano Stafisso (Italy), Uroš Stanič (Slovenia), Ninoslav Stojadinović (Serbia), Mateo Stupičić (Croatia), Jadranka Šunde (Australia), Aleksandar Szabo (Croatia), Laszlo Szirmay-Kalos (Hungary), Dina Šimunić (Croatia), Zoran Šimunić (Croatia), Dejan Škvorc (Croatia), Antonio Teixeira (Portugal), Edvard Tijan (Croatia), A Min Tjoa (Austria), Roman Trobec (Slovenia), Sergio Uran (Croatia), Tibor Vámos (Hungary), Mladen Varga (Croatia), Marijana Vidas-Bubanja (Serbia), Mihaela Vranić (Croatia), Boris Vrdoljak (Croatia), Damjan Zazula (Slovenia)

Location:

Opatija, with its 170 years long tourist tradition, is the leading seaside resort of the Eastern Adriatic and one of the most famous tourist destinations on the Mediterranean. With its aristocratic architecture and style Opatija has been attracting renowned artists, politicians, kings, scientists, sportsmen as well as business people, bankers, managers for more than 170 years.

The tourist offering of Opatija includes a vast number of hotels, excellent restaurants, entertainment venues, art festivals, superb modern and classical music concerts, beaches and swimming pools and is able to provide the perfect response to all demands.

Opatija, the Queen of the Adriatic, is also one of the most prominent congress cities on the Mediterranean, particularly important for its international ICT conventions MIPRO that have been held in Opatija since 1979 gathering more than a thousand participants from more than forty countries. These conventions promote Opatija as the most desirable technological, business, educational and scientific center in Southeast Europe and the European Union in general.


For more details please look at www.opatija.hr/ and www.visitopatija.com

Download
 
News about event
Currently there are no news
 
Patrons - random
Sveučilište u ZagrebuSveučilište u RijeciFER ZagrebPomorski fakultet RijekaTehnički fakultet Rijeka