Faculty of Computer Science and Engineering
Permanent URI for this communityhttps://repository.ukim.mk/handle/20.500.12188/5
The Faculty of Computer Science and Engineering (FCSE) within UKIM is the largest and most prestigious faculty in the field of computer science and technologies in Macedonia, and among the largest
faculties in that field in the region.
The FCSE teaching staff consists of 50 professors and 30 associates. These include many “best in field” personnel, such as the most referenced scientists in Macedonia and the most influential professors in the ICT industry in the Republic of Macedonia.
Browse
78 results
Search Results
- Some of the metrics are blocked by yourconsent settings
Item type:Publication, Classification and Analysis of Cyberattacks in the Western Balkans Countries - with a focus on the treatment of policy violations and strategies that states use to protect against attacks(Research Square Platform LLC, 2023-02-13) ;Mollakuqe, ElissaRapid technological developments have also affected the countries of the Balkans, where as a result many hackers and other attackers have attempted to attack computer systems and data in these countries as well. The initial attacks that directed you to these places were "phishing" attacks where there was an attempt to suspend the work of online systems, especially in Public Institutions. But over time, especially in the last 3 years, the biggest attacks belong to DDoS attacks, which have caused many problematic situations and an instability of the systems in these countries. Cyber attacks are normal in the era we live in now, but the reasons for these attacks still vary from the most diverse, such as: political blackmail, blackmail of other kinds or even blackmail for monetary benefits. Our research considers 7 countries of the Balkans: Kosovo, North Macedonia, Albania, Serbia, Montenegro, Bosnia and Herzergovina, and Croatia. The main analysis focuses on the treatment of policies to protect against cyber attacks and strategies that these countries have with the aim of protecting against cyber attacks, which were on a large scale during the last period. All data has been collected during real time and the countries are ranked according to the level of exposure to the risk. The purpose of this research is to know the current situation in the Balkans and to identify the types of attacks directed at these countries, also some investigations into the current strategies have been proposed. The paper uses methods of analysis and synthesis, comparative methods, as well. - Some of the metrics are blocked by yourconsent settings
Item type:Publication, Zero-Shot Social Media Crisis Classification: A Training-Free Multimodal Approach(MDPI AG, 2026-02-25) ;Schwarz, Franziska ;Schwarz, Klaus Dieter ;Aranda, Daniel Arias ;Bollens, KendrickShivananjappa, NavaneethRapid classification of social media content during humanitarian crises is essential for effective disaster relief; however, traditional approaches require extensive annotated training data, which are often unavailable during new disasters. This paper presents a training-free, multimodal classification framework that leverages zero-shot vision-language models to analyze disaster-related social media content without task-specific training. The framework employs a two-stage prompt-engineered pipeline using the locally deployable Mistral-Small-3.1-24B-Instruct model, performing binary informativeness detection followed by multiclass categorization into eight humanitarian categories through structured JSON output generation. Evaluation on the CrisisMMD dataset of 18,082 multimodal samples from seven natural disasters demonstrated binary F1 scores above 0.84 for both text and image informativeness detection and weighted F1 scores of 0.61 (text) and 0.72 (image) for humanitarian categorization. The framework generalizes consistently across all disaster types with minimal performance variance (standard deviation below 0.031) and operates entirely on local infrastructure without cloud dependencies, requiring only moderate GPU resources. By eliminating training data requirements, this approach enables immediate deployment during new disasters, demonstrating that zero-shot multimodal classification achieves practically relevant performance for real-time crisis response. - Some of the metrics are blocked by yourconsent settings
Item type:Publication, Algorithm for Reducing Storage in Blockchain based on Secret Sharing(IEEE, 2020-06); ;Mechkaroska, Daniela; Blockchain is a growing list of linked blocks. Since each participant stores the whole list of transactions, the storage space rapidly increases. Therefore, there is a need of changing the storage concept in blockchain. There are several solutions for this problem based on network coding and secret sharing. In this paper, we propose a novel use of Shamir's secret sharing scheme for reducing the storage cost in blockchain system. - Some of the metrics are blocked by yourconsent settings
Item type:Publication, Applications of Quasigroups in Cryptography and Coding Theory(Springer International Publishing, 2023); ; ; ; This survey article discusses some applications of quasigroups in cryptography and coding theory. Here mainly results obtained by the authors of this article are considered and obtained in the last quarter of the century. Not all of their results are presented; emphasis is given to those that were interested for the wider community. Security of the modern world is dependent on the many cryptographic products like block ciphers, stream ciphers, digital signatures and encryption schemes, hash functions, pseudo-random number generators, ... These products are mainly produced by using associative structures (number theory, group and finite field theory, Boolean algebras, etc.) The development of quantum computers questioned security based on associative structures. So, nowadays, the use of quasigroups for building cryptographic products is becoming more important. This short survey presents how quasigroups can be exploited for building suitable cryptographic primitives. For that aim, we define some types of quasigroups that are suitable for that purpose, we give the definitions of several kinds of quasigroup transformations, and we explain the constructions of some types of cryptographic primitives obtained by quasigroup transformations. (We notice that cryptographic properties are not discussed in this survey. The efficiency and security of the crypto products based on quasigroups is an open research problem for cryptographers and cryptanalysts.) The quasigroups are also suitable algebraic structures for building error detecting and error correcting code. We give one type of error detecting code based on quasigroups. Error correcting codes resistant to an intruder attack, so called RCBQ (Random Codes Based on Quasigroups) are given in details, as well as some of their applications in processing images and audio signals. - Some of the metrics are blocked by yourconsent settings
Item type:Publication, RoBERTa for URL Classification: Enhancing Web Security and Content Filtering(IEEE, 2023-11-21) ;Ilievska, Joana ;Mihajloska Trpcheska Hristina ;Dobreva, Jovana; The rising occurrence of malicious URLs on the internet is a major concern for users and their devices. To combat this problem, there is a need to develop effective methods to protect against these threats. The use of artificial intelligence (AI) presents an opportunity to leverage this technology to tackle this issue. This study proposes a URL classification model that uses RoBERTa transformer, an AI-based natural language processing technique, to classify URLs based on their intent. The model’s performance has been evaluated using various metrics, showcasing the potential of AI to assist in the creation of robust web security and online content filtering tools. - Some of the metrics are blocked by yourconsent settings
Item type:Publication, North Macedonia interprofessional dementia care (NOMAD) – personalized care plans for people with dementia and caregiver psychoeducation delivered at home by interprofessional teams(Frontiers Media SA, 2024-04-10) ;Novotni, Gabriela ;Taneska, Marija; ;Fischer, JuliaIloski, SvetlanaIntroduction The increasing number of people living with dementia and its burden on families and systems particularly in low- and middle-income countries require comprehensive and efficient post-diagnostic management. This study aimed to explore the acceptability and efficacy of a multi-professional case management and psychoeducation model (North Macedonia Interprofessional Dementia Care, or NOMAD) delivered by mobile teams for people with dementia and their caregivers in North Macedonia. Method We conducted a two-arm randomized controlled trial comparing the intervention with treatment as usual. Participants were recruited from 12 general practitioner (GP) offices in the Skopje region. The NOMAD intervention included the delivery of a personalized care plan over four home visits to dyads of people with dementia and their caregivers by a team including a dementia nurse and a social worker, in collaboration with GPs and dementia experts, and the introduction of a caregiver manual. We assessed caregivers' depressive symptoms, burden, and quality of life and the neuropsychiatric symptoms, daily living activities, and service utilization of people with dementia at baseline and follow-up; we also assessed the acceptability of the intervention by analyzing case notes and attendance rates. Results One hundred and twenty dyads were recruited and randomized to either the control (n = 60) or the intervention group (n = 60). At follow-up, caregivers in the intervention group had, on average, scores that were 2.69 lower for depressive symptoms (95% CI [−4.75, −0.62], p = 0.012), and people with dementia had, on average, 11.32 fewer neuropsychiatric symptoms (95% CI [−19.74, −2.90], p = 0.009) and used, on average, 1.81 fewer healthcare services (95% CI [−2.61, −1.00], p < 0.001) compared to the control group. The completion of the home visits was 100%, but the intervention's acceptability was underpinned by relationship building, GP competencies, and resources to support families with dementia. There were no differences in the caregivers' quality of life and burden levels or daily living activities in people with dementia. NOMAD is the first case management, non-pharmacological, and multi-professional intervention tested in North Macedonia. Discussion The trial showed that it is effective in reducing caregivers' depressive symptoms and neuropsychiatric symptoms in people with dementia and the burden on health and social care services, and it is acceptable for families. Implementing NOMAD in practice will require building primary care capacity and recognizing dementia as a national priority. - Some of the metrics are blocked by yourconsent settings
Item type:Publication, On dementia, duties, and daughters. An ethical analysis of healthcare professionals being confronted with conflicts regarding filial duties in informal dementia care(Frontiers Media SA, 2024-10-01) ;Dogan, Vildan ;Taneska, Marija ;Novotni, Gabriela ;Iloski, SvetlanaBackground Existing literature on moral conflicts that healthcare professionals encounter in dementia care has explored, amongst others, issues related to autonomy, decision-making capacity, privacy, and more. Notably, conflicts related to healthcare professionals who support informal dementia caregiving and who are confronted with family members being overburdened with their care responsibly remains an underexplored topic in the current literature, particularly in the context of Low-and Middle-Income Countries. The present paper introduces such an encounter, presenting an ethical case analysis of a conflict that occurred during a larger research project conducted in North Macedonia. Case to be studied Due to the absence of formal care services that could have relieved an overburdened family caregiver, healthcare professionals felt compelled to reach out to the uninvolved adult daughters, requesting them to participate in their parents’ care. Wondering about whether their reaching out to the daughters might count as an attempt of pressure and undue interference, professionals conflicted over the appropriateness of their action. This paper follows up on their concern, ethically assessing the professionals’ action. To answer the question on whether the healthcare professionals acted appropriately or not, and to what extent, theories of filial duties are applied, embedding their action in the larger context of dementia care in North Macedonia. Results and conclusion It is argued that the lack of formal care services in North Macedonia is of utmost relevance to the conflict. Thus, the conclusion is that the ethical inappropriateness of the case is to be located not so much with the action of the healthcare professionals but with the state because of its failure to provide professional care services that allow healthcare professionals to take ethically sound actions to counteract overarching burdens that family members face when providing informal dementia care - Some of the metrics are blocked by yourconsent settings
Item type:Publication, Cross‐cultural Adaptation and Psychometric Evaluation of the Macedonian C‐DEMQOL: A Carer Quality of Life Measure using data from the NOMAD Trial(Wiley, 2025-12) ;Ivanovska, Andrea ;Taneska, Marija ;Farina, Nicolas; Iloski, SvetlanaBackground Caregivers of people with dementia face reduced quality of life, especially in Low‐ and Middle‐Income Countries, due to various systemic, social, and cultural challenges. Accurate measurement of their quality of life is essential for shaping policies and evaluating interventions. In North Macedonia, over 30,000 people with dementia rely mainly on family caregivers, who receive little to no support, resulting in significant stress and burden. However, no validated tools currently exist to measure caregivers’ quality of life. This study aimed to assess the psychometric properties of C‐DEMQOL, a reliable and valid tool for evaluating caregiver quality of life, in a North Macedonian context. Method The C‐DEMQOL was back‐translated, and three cognitive interviews with caregivers were conducted to confirm cultural relevance and face validity. Then it was administered to 120 dyads of individuals with dementia and their caregivers as part of the NOMAD (North Macedonia Interprofessional Dementia Care) trial. The internal consistency (Omega) was reported for the entire C‐DEMQOL measure and each subscale. Data were limited to baseline responses. Intraclass correlation was used to estimate the test‐retest reliability of control data by comparing baseline and follow‐up measurements. Convergent validity was assessed through correlations with the Patient Health Questionnaire (PHQ) and the Zarit Burden Inventory (ZBI), while discriminant validity was evaluated by examining correlations with the age and gender of the person with dementia. Result C‐DEMQOL demonstrated excellent internal consistency, with four of the five subdomains showing acceptable to excellent internal consistency. The total C‐DEMQOL score also demonstrated good test‐retest reliability, and most subdomains reached acceptable levels. Only the “Feeling supported” subdomain showed weaker internal consistency and test‐retest reliability. Convergent validity was indicated by moderate to large negative correlations with the PHQ and ZBI, while near‐zero correlations with the person with dementia's age and gender supported discriminant validity. Conclusion The Macedonian C‐DEMQOL is the first caregiver quality‐of‐life measure in Macedonian to demonstrate satisfactory validity and reliability. Further qualitative and quantitative analyses could help enhance the psychometric properties and optimize the final measure. Validating the C‐DEMQOL paves the way for accurately assessing the effectiveness of initiatives aimed at improving caregivers' quality of life. - Some of the metrics are blocked by yourconsent settings
Item type:Publication, Advancing Image Spam Detection: Evaluating Machine Learning Models Through Comparative Analysis(MDPI AG, 2025-05-30) ;Jamil, Mahnoor; ; ;Creutzburg, Reiner - Some of the metrics are blocked by yourconsent settings
Item type:Publication, INTERNATIONAL CYBERSECURITY COOPERATION: THE CYBERMACS ERASMUS MUNDUS INITIATIVE FOR A SECURE GLOBAL DIGITAL FUTURE(IATED, 2025-03-03) ;Creutzburg, Reiner; ;Dilan, Ebru; Gücüyener, AyhanIn an increasingly interconnected world, the need for robust cybersecurity practices transcends national borders, making international collaboration essential. The CyberMACS ERASMUS Mundus initiative (http://cybermacs.eu) represents a groundbreaking effort to foster global partnerships and address the complexities of modern cyber threats. Launched as part of the ERASMUS Mundus program, this initiative brings together a consortium of leading universities, research institutions, and cybersecurity experts across Europe. It offers a multidisciplinary, highly internationalized approach to cybersecurity education and research, addressing current and future challenges in the rapidly evolving digital landscape. CyberMACS equips the next generation of cybersecurity professionals with the skills needed to combat emerging digital threats through the joint development of academic curricula, cross-border knowledge exchange, and hands-on training. A key feature of this initiative is the integration of COIL (Cooperative Online International Learning), which enables students to collaborate with peers and experts from different cultural and technical backgrounds across the globe. This approach enhances the learning experience and builds a strong network of international professionals dedicated to addressing global cybersecurity challenges. Using COIL methods, CyberMACS bridges geographical distances and cultural divides, fostering real-time collaboration and allowing students to engage in projects that reflect the interconnectedness of today’s digital world. In alignment with the Sustainable Development Goals (SDGs) the CyberMACS initiative promotes the development of resilient cybersecurity infrastructures and the creation of inclusive, fair, and transparent digital policies. Through its global approach to education, research, and policy development, CyberMACS addresses the pressing need for diverse and sustainable cybersecurity solutions that consider economic, social, and ethical impacts. The program emphasizes the importance of understanding the broader societal implications of cybersecurity, including its role in promoting global peace, security, and the responsible use of technology. This presentation will explore the goals, structure, and outcomes of the CyberMACS initiative, emphasizing its impact on strengthening international cooperation and advancing cybersecurity research, education, and policy on a global scale. Key areas of focus will include the role of international partnerships, the integration of diverse cultural and technical perspectives, and the contribution of the CyberMACS program to the global cybersecurity workforce. CyberMACS provides students a unique opportunity to pursue a Master’s degree in cybersecurity, incorporating diverse academic and practical perspectives through collaborative learning, cross-border exchanges, and COIL-based projects. The program equips students with advanced technical skills and fosters global critical thinking about cybersecurity's ethical, political, and social dimensions. Ultimately, this initiative is a model for strengthening international cooperation, advancing cybersecurity research, and cultivating a highly skilled, globally minded cybersecurity workforce. By promoting a deeper understanding of cybersecurity’s role in achieving the SDGs, the CyberMACS program helps prepare the next generation of leaders to face the challenges of a secure, sustainable digital future.
