Journal: Comput. Sci. Inf. Syst.

Volume 15, Issue 1

1 -- 30Gordana Milosavljevic, Goran Sladic, Branko Milosavljevic, Miroslav Zaric, Stevan Gostojic, Jelena Slivka. Context-sensitive constraints for access control of business processes
31 -- 50Titas Savickas, Olegas Vasilecas. An approach to business process simulation using mined probabilistic models
51 -- 78Marek Krótkiewicz. A novel inheritance mechanism for modeling knowledge representation systems
79 -- 109Predrag Matkovic, Mirjana Maric, Pere Tumbas, Marton Sakal. Traditionalisation of agile processes: Architectural aspects
111 -- 137Beumjin Cho, Sangho Lee 0001, Meng Xu, Sangwoo Ji, Taesoo Kim, Jong Kim 0001. Prevention of cross-update privacy leaks on android
139 -- 162Miodrag Petkovic, Ilija Basicevic, Dragan Kukolj, Miroslav Popovic. Evaluation of Takagi-Sugeno-Kang fuzzy method in entropy-based detection of DDoS attacks
163 -- 185Nishat I. Mowla, Inshil Doh, Kijoon Chae. CSDSM: Cognitive switch-based DDoS sensing and mitigation in SDN-driven CDNi word
187 -- 209Ivica Slavkov, Jana Karcheska, Dragi Kocev, Saso Dzeroski. HMC-ReliefF: Feature ranking for hierarchical multi-label classification
211 -- 236Zhou Tao, Muzhou Hou, Chunhui Liu. Forecasting stock index with multi-objective optimization model based on optimized neural network architecture avoiding overfitting
237 -- 256Eduardas Bareisa, Vacius Jusas, Kestutis Motiejunas, Liudas Motiejunas, Rimantas Seinauskas. Black box delay fault models for non-scan sequential circuits