Year 2018, starting volume 15 of Computer Science and Information Systems, will also mark the 15th anniversary of our journal. Since the beginning we have strived to achieve the highest possible quality of our published content, keeping the quantity firmly in check. This has led to our journal achieving its highest impact in the previous year, reaching values of 0.837 and 0.881 for 2- and 5-year impact factors (2016), respectively.

This first issue of Computer Science and Information Systems in 2018 consists of ten regular articles. As always, we are extremely grateful for the dedication and hard work of all authors and reviewers, which made the current issue of our journal possible.

The first regular article, “Context-sensitive Constraints for Access Control of Business Processes,” by Gordana Milosavljević et al. extends the common role-based static and dynamic mechanisms for access control in workflow management systems (WfMS) with context-sensitive information and workflow-specific components, proposing a mechanism for enforcing such constraints within a WfMS.

Titas Savickas and Olegas Vasilecas, in “An approach to business process simulation using mined probabilistic models,” propose an approach for belief network discovery from event logs in order to support automating the simulation of different business process scenarios within an enterprise. The presented evaluation demonstrates that the approach can successfully be used for initial simulation model generation, after which customization is needed.

“A Novel Inheritance Mechanism for Modeling Knowledge Representation Systems” by Marek Krótkiewicz discusses preliminary assumptions, postulates and conceptual solutions applicable to inheritance, in the context of. the association-oriented database metamodel.

In “Traditionalisation of Agile Processes: Architectural Aspects,” Predrag Matkovic et al. qualitatively and quantitatively explore the relationship between software architecture modeling practices and agile processes, concluding that agile processes need to incorporate certain explicit architecture modeling practices.

The paper “Prevention of Cross-update Privacy Leaks on Android” by Beumjin Cho et al. explore a novel security threat that exploits application updates on Android: a cross-update privacy-leak attack called COUPLE. The authors also present and successfully apply a runtime security system, BREAKUP, that defends against such attacks by preventing cross-update sensitive data transactions by tracking permission-use histories of individual applications.

Miodrag Petkovic et al., in their article “Evaluation of Takagi-Sugeno-Kang fuzzy method in entropy-based detection of DDoS attacks,” propose an extension of classic entropy-based outlier detection methods for identification of distributed denial of service (DDoS) attacks with the Takagi-Sugeno-Kang fuzzy system (TSK-FS). Reported results show that the TSK-FS DDoS detector reaches enhanced sensitivity and robustness in the detection process, achieving a high true-positive detection rate and a very low false-positive rate.

Nishat I. Mowla et al., in “CSDSM: Cognitive Switch-based DDoS Sensing and Mitigation in SDN-driven CDNi Word,” also explore defenses against DDoS, but in the context of integrated content delivery networks (CDNs) and software defined networks (SDNs). The authors propose an architectural method that classifies all forms of DDoS attack and legitimate flash crowd traffic using a segregated dimension functioning cognitive process based in a controller module.

In their article entitled “HMC-ReliefF: Feature Ranking for Hierarchical Multi-label Classification,” Ivica Slavkov et al. propose and analyze a new feature ranking algorithm for the task of hierarchical multi-label classification (HMC) called HMC-ReliefF. Evaluation conducted on datasets from the domains of image annotation and functional genomics demonstrates that the algorithm can produce both accurate and stable output.

The article “Forecasting Stock Index with Multi-objective Optimization Model Based on Optimized Neural Network Architecture Avoiding Overfitting” by Zhou Tao et al. tackles the problem of stock index time-series forecasting by employing neural networks with best possible architecture that actively avoids overfitting. This is achieved by formulating a multi-objective optimization model, then converting it to a single objective optimization model, proving the existence and uniqueness theorem of the optimal solution.

Finally, “Black Box Delay Fault Models for Non-scan Sequential Circuits,” by Eduardas Bareisa et al. presents nine new black box delay fault models for non-scan sequential circuits at the functional level, when only the primary inputs and primary outputs are available. Reported results show that transition fault coverages of tests selected based on the proposed models are similar to coverages of tests selected based on the functional delay fault model that uses the inner state of circuit.

Mirjana Ivanović

Managing Editor
Miloš Radovanović