Goran Sladic

Goran Sladic
University of Novi Sad · Faculty of Technical Sciences

Doctor of Philosophy

About

88
Publications
28,589
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
315
Citations
Citations since 2016
46 Research Items
210 Citations
20162017201820192020202120220102030405060
20162017201820192020202120220102030405060
20162017201820192020202120220102030405060
20162017201820192020202120220102030405060
Additional affiliations
September 2021 - September 2021
University of Novi Sad
Position
  • Professor
September 2016 - September 2021
University of Novi Sad
Position
  • Professor (Associate)
September 2011 - present
University of Novi Sad
Position
  • Professor (Assistant)

Publications

Publications (88)
Preprint
Code smells are code structures that harm the software’s quality. An obstacle to developing automatic detectors is the available datasets' limitations. Furthermore, researchers developed many solutions for Java while neglecting other programming languages. Recently, we created the code smell dataset for C# by following an annotation procedure inspi...
Preprint
Code smells are code structures that harm the software’s quality. An obstacle to developing automatic detectors is the available datasets' limitations. Furthermore, researchers developed many solutions for Java while neglecting other programming languages. Recently, we created the code smell dataset for C# by following an annotation procedure inspi...
Preprint
Code smells are code structures that harm the software’s quality. An obstacle to developing automatic detectors is the available datasets' limitations. Furthermore, researchers developed many solutions for Java while neglecting other programming languages. Recently, we created the code smell dataset for C# by following an annotation procedure inspi...
Article
Code smells are structures in code that often harm its quality. Manually detecting code smells is challenging, so researchers proposed many automatic detectors. Traditional code smell detectors employ metric-based heuristics, but researchers have recently adopted a Machine-Learning (ML) based approach. This paper compares the performance of multipl...
Chapter
Industry 4.0 is a concept emerged from technological advances in different fields, from expansion of cyber-physical assets to industrial internet of things encompassed with cloud-adoption that drives big data analysis and artificial intelligence applications. Innovating in such technological landscape imply higher risks both in information security...
Preprint
div>Code smells are structures in code that indicate the presence of maintainability issues. A significant problem with code smells is their ambiguity. They are challenging to define, and software engineers have a different understanding of what a code smell is and which code suffers from code smells. A solution to this problem could be an AI digi...
Conference Paper
Full-text available
Successful application of data localization laws is possible only if the country has an IT infrastructure mature enough to store all sensitive data, which is usually not the case in developing countries. This paper proposes a model for building local cloud infrastructure in developing countries compliant with data localization laws. The infrastruct...
Preprint
p>Code smells are structures in code that often have a negative impact on its quality. Manually detecting code smells is challenging and researchers proposed many automatic code smell detectors. Most of the studies propose detectors based on code metrics and heuristics. However, these studies have several limitations, including evaluating the detec...
Preprint
p>Code smells are structures in code that often have a negative impact on its quality. Manually detecting code smells is challenging and researchers proposed many automatic code smell detectors. Most of the studies propose detectors based on code metrics and heuristics. However, these studies have several limitations, including evaluating the detec...
Preprint
div>Code smells are structures in code that indicate the presence of maintainability issues. A significant problem with code smells is their ambiguity. They are challenging to define, and software engineers have a different understanding of what a code smell is and which code suffers from code smells. A solution to this problem could be an AI digi...
Article
Full-text available
Edge computing offers cloud services closer to data sources and end-users, making the foundation for novel applications. The infrastructure deployment is taking off, bringing new challenges: how to use geo-distribution properly, or harness the advantages of having resources at a specific location? New real-time applications require multi-tier infra...
Article
Full-text available
The critical infrastructure is constantly under cyber and physical threats. Applying security controls without guidance or traceability can create a false sense of security. Security standards facilitate security knowledge and control best practices in a more systematic way. However, the number of standards is continually increasing. Product provid...
Article
Full-text available
Edge computing brings cloud services closer to the edge of the network, where data originates, and dramatically reduces the network latency of the cloud. It is a bridge linking clouds and users making the foundation for novel interconnected applications. However, edge computing still faces many challenges like remote configuration, well-defined nat...
Article
Full-text available
The coronavirus disease of 2019 (COVID‐19) pandemic has severely crippled our globalized society. Despite the chaos, much of our civilization continued to function, thanks to contemporary information and communication technologies. In education, this situation required instructors and students to abandon the traditional face‐to‐face lectures and mo...
Preprint
div>Code smells are structures in code that indicate the presence of maintainability issues. A significant problem with code smells is their ambiguity. They are challenging to define, and software engineers have a different understanding of what a code smell is and which code suffers from code smells. A solution to this problem could be an AI digi...
Preprint
div>Code smells are structures in code that indicate the presence of maintainability issues. A significant problem with code smells is their ambiguity. They are challenging to define, and software engineers have a different understanding of what a code smell is and which code suffers from code smells. A solution to this problem could be an AI digi...
Article
Full-text available
The origins of digital money and blockchain technology goes back to the 1980s, but in the last decade, the blockchain technology gained large popularity in the financial sector with the appearance of cryptocurrencies such as Bitcoin. However, recently, many other fields of application have been recognized, particularly with the development of smart...
Conference Paper
Full-text available
Replication is one of the most important parts of any distributed system. It is mainly used to provide fault-tolerant and robust systems. Data is copied on a few different machines, and often in several regions to ensure that loss of a single machine, cluster or even region does not affect the overall quality of the service given to users. Over sev...
Conference Paper
Full-text available
Internet of Things gained popularity in recent years and the number of devices that are being interconnected is increased every day. These devices can exchange all kinds of information which is beneficial but also this introduces some concerns in terms of security and privacy. Conventional security approaches have shown as modestly applicable for I...
Conference Paper
Full-text available
Containers are not new technology. They emerge in the late seventies, but they become more popular in the past decade in various systems and companies to achieve high resource utilization, efficient task-packing, process-level isolation, etc. Those container properties allow large internet companies like Google, Amazon, and Facebook to satisfy an e...
Article
Full-text available
Secure software engineering is quickly becoming the standard for software development, due to the ever-increasing number of threats and attacks to software systems. While practices such as secure coding and testing can be achieved through automated tools, security requirements engineering, and secure design are fields which heavily rely on the secu...
Conference Paper
Full-text available
Internet of Things has been changing the world in the last couple of years with a tendency to have an even bigger impact. In the beginning, the vast amount of data was collected, processed and stored in the cloud. Now, more and more of these operations are done on the IoT devices with respect to their limitation in terms of storage and processing p...
Article
With ever-greater reliance of the developed world on information and communication technologies, constructing secure software has become a top priority. To produce secure software, security activities need to be integrated throughout the software development lifecycle. One such activity is security design analysis (SDA), which identifies security r...
Conference Paper
Full-text available
Cluster orchestration systems achieve high resource utilization, efficient task-packing, process-level isolation. They support high-availability applications with features that minimize fault and recovery time. These systems helped large internet companies like Google, Amazon, and Facebook to satisfy all their applications and big data workloads. W...
Conference Paper
Full-text available
Enterprise systems often require a high level of security. While securing such systems is a challenge in and of itself, proving that a system is sufficiently secure is an additional problem which is rarely discussed. This paper presents a security assurance framework that can be used to prove that an information system is reasonably secured. The fr...
Conference Paper
Full-text available
Edge computing is recognized as an architecture which is well suited for the integration with the Internet of Things. A new layer of devices, also called nodes, between cloud services and end-users, can provide new services with fast response and great quality. On the other hand, new layer devices introduce more architectural and security challenge...
Article
Full-text available
Workflow management systems (WfMS) are used to automate and facilitate business processes of an enterprise. To simplify the administration, it is a common practice in many WfMS solutions to allocate a role to perform each activity of the process and then assign one or more users to each role. Typically, access control for WfMS is role-based with a...
Article
Purpose The purpose of this paper is to identify the benefits of an approach in which document management systems (DMSs) are based on a formal and explicit document model, primarily in terms of facilitating domain-specific customization. Design/methodology/approach Within this paper, a generic document model is proposed. The model consists of tw...
Conference Paper
Full-text available
Motivated by possibilities of Internet of Things we examine could we combine it with distributed peer-to-peer network where non-trusting members can interact without a trusted intermediary – Blockchain for collecting and securing sensitive patient data. We show how we can use IoT devices as sources to collect data in real-time or near real-time and...
Conference Paper
Full-text available
Internet of Things is very popular research topic since the market is flooded with new devices every day. These devices are being accessed through lossy networks and intensively exchanging information between each other. Security and privacy are the key issues which have to be addressed before deploying new devices to the IoT ecosystems. The access...
Conference Paper
Full-text available
With the advent of Internet of Things (IoT) large amount of data, events and interactions is being generated and processed. One approach to efficiently process and orchestrate this information is to utilize business processes (BP) and business processes management systems (BPM) within the IoT environment. On the other hand, one of the major challen...
Article
Full-text available
This paper proposes a non-domain-specific metadata ontology as a core component in a semantic model-based document management system (DMS), a potential contender towards the enterprise information systems of the next generation. What we developed is the core semantic component of an ontology-driven DMS, providing a robust semantic base for describi...
Article
RSSalg software is a tool for experimenting with Semi-Supervised Learning (SSL), a set of machine learning techniques able to use both labeled and unlabeled data for training. The goal is to reduce human effort regarding data labeling while preserving model quality. RSSalg software encompasses the implementation of co-training, a multi-view SSL te...
Article
RSSalg software is a tool for experimenting with Semi-Supervised Learning (SSL), a set of machine learning techniques able to use both labeled and unlabeled data for training. The goal is to reduce human effort regarding data labeling while preserving model quality. RSSalg software encompasses the implementation of co-training, a multi-view SSL tec...
Conference Paper
This paper presents Crypto-Tutor, a tool for learning modern cryptographic algorithms. Our tool offers an interactive way to learn about the uses and structure of several popular cryptographic algorithms, as well as the underlying mathematical concepts which guarantee the security of these algorithms. Crypto-Tutor also offers performance benchmarki...
Conference Paper
Full-text available
This paper presents an overview of tools and techniques that can be used to detect potential vulnerabilities and design flaws in computer programs by applying mathematical knowledge in solving Boolean satisfiability (SAT) problems. SMT (Satisfiability Modulo Theories) algorithms check satisfiability of given logical formulas with regards to some ba...
Article
The paper describes a language for specifying generic and content-neutral instructional strategies in e-courses. The language has been designed to be generic, instructionally expressive, and machine-readable. The paper presents the language syntax, case study on representative instructional strategies and an evaluation of the language characteristi...
Conference Paper
Full-text available
This paper describes an approach for enabling unified, document type independent semantic web-based reasoning over various metadata sources in a document management system. A comprehensive, yet concise non-domain-specific metadata ontology influenced by ebXML RegRep standard is proposed to serve as a semantic basis for other domain-specific metadat...
Conference Paper
Full-text available
This paper presents administration subsystem that was developed to enable dynamic customization of enterprise applications specified by our Kroki tool. Kroki is a tool for participative development of enterprise applications based on executable mockups. The administration subsystem is based on standard RBAC model for access control. It enables user...
Conference Paper
Full-text available
This paper introduces a conceptualization of the document management domain that is serving as a foundation for a semantically-driven document management system. The conceptualization is based on the ISO 82045 family of standards for document management and is specified in OWL. Legislative documents were used as a case study and a proof of concept...
Article
Full-text available
Public access to case law is a required prerequisite for the legal certainty and the rule of law. Nevertheless, according to the law, only authorized persons can access judgments in their non-anonymized and unredacted form. This paper proposes a computer aided method for anonymization and redaction of judgments, with an aim to improve efficiency of...
Article
Full-text available
This paper presents a solution for an electronic document handling system for government institutions. The proposed solution introduces a new system aimed at handling various administrative requests with minimal disruption to standard end user habits as well as minimal requirements in terms of end user training. During the development and testing p...
Conference Paper
Full-text available
The paper presents a generic access control management infrastructure suitable for a broad set of systems. The generic infrastructure is based on our policy metamodel (level M2), which is used for the specification of the needed policy model (level M1) such as RBAC, GTRBAC, etc. Having a defined policy model, the abstract and concrete syntaxes of P...
Article
Full-text available
This paper focuses on problems of access control for business processes. The subject of the paper is a specification of the Context-sensitive access control model for business processes (COBAC). In order to efficiently define and enforce access control for different business processes, the COBAC model is based on the RBAC (Role-based Access Control...
Article
Full-text available
This paper focuses on problems of access control for business processes. The subject of the paper is a specification of the Context-sensitive access control model for business processes (COBAC). In order to efficiently define and enforce access control for different business processes, the COBAC model is based on the RBAC (Role-based Access Control...
Chapter
Network monitoring is a critical issue in today’s rapidly changing network environment. Existing centralized client-server based network management frameworks suffer from problems such as insufficient scalability, interoperability, reliability, and flexibility, as networks become more geographically distributed. This work describes implementation o...
Article
Full-text available
Purpose The goal of this paper is to propose a data access control framework that is used for editing MARC‐based bibliographic databases. In cases where the bibliographic record editing activities carried out in libraries are complex and involve many people with different skills and expertise, a way of managing the workflow and data quality is need...
Conference Paper
Full-text available
Access control is one of key aspects of computer security. Current access control models do not take into account the context of the system and its environment. In this paper, we present a particular context model for the access control system primarily-intended for business processes access control. By using a context-sensitive access control, it...
Article
Full-text available
During the past two decades, e-government information systems have become less paper-based and more computer-based. Those information systems usually take the form of workflow systems. Due to the large social impact of e-government systems, computer security plays a pivotal role in ensuring its efficiency and effectiveness. Access control is one of...