Contextual understanding of microservice architecture: current and future directions T Cerny, MJ Donahoo, M Trnka ACM SIGAPP Applied Computing Review 17 (4), 29-45, 2018 | 268 | 2018 |
Survey of Authentication and Authorization for the Internet of Things M Trnka, T Cerny, N Stickney Security and Communication Networks 2018 (1), 4351603, 2018 | 95 | 2018 |
Disambiguation and comparison of soa, microservices and self-contained systems T Cerny, MJ Donahoo, J Pechanec Proceedings of the International Conference on research in adaptive and …, 2017 | 86 | 2017 |
Aspects of quality in Internet of Things (IoT) solutions: A systematic mapping study BS Ahmed, M Bures, K Frajtak, T Cerny IEEE Access 7, 13758-13780, 2019 | 67 | 2019 |
Internet of things: Current challenges in the quality assurance and testing methods M Bures, T Cerny, BS Ahmed International conference on information science and applications, 625-634, 2018 | 59 | 2018 |
Aspect-driven, Data-reflective and Context-aware User Interfaces Design T Cerny, K Cemus, MJ Donahoo, E Song Applied Computing Review 13 (4), 53-65, 2013 | 51* | 2013 |
Open-source tools and benchmarks for code-clone detection: past, present, and future trends A Walker, T Cerny, E Song ACM SIGAPP Applied Computing Review 19 (4), 28-39, 2020 | 50 | 2020 |
On Microservice Analysis and Architecture Evolution: A Systematic Mapping Study V Bushong, AS Abdelfattah, AA Maruf, D Das, A Lehman, E Jaroszewski, ... Applied Sciences 11 (17), 2021 | 49 | 2021 |
Microservice architecture reconstruction and visualization techniques: A review T Cerny, AS Abdelfattah, V Bushong, A Al Maruf, D Taibi 2022 IEEE International Conference on Service-Oriented System Engineering …, 2022 | 48 | 2022 |
Context-sensitive, cross-platform user interface generation M Macik, T Cerny, P Slavik Journal on Multimodal User Interfaces, 1-13, 2014 | 47 | 2014 |
Automated code-smell detection in microservices through static analysis: A case study A Walker, D Das, T Cerny Applied Sciences 10 (21), 7800, 2020 | 43 | 2020 |
On vulnerability and security log analysis: A systematic literature review on recent trends J Svacina, J Raffety, C Woodahl, B Stone, T Cerny, M Bures, D Shin, ... Proceedings of the International Conference on Research in Adaptive and …, 2020 | 40 | 2020 |
On security level usage in context-aware role-based access control M Trnka, T Cerny Proceedings of the 31st Annual ACM Symposium on Applied Computing, 1192-1195, 2016 | 39 | 2016 |
Aspect-oriented challenges in system integration with microservices, SOA and IoT T Cerny Enterprise Information Systems 13 (4), 467-489, 2019 | 37 | 2019 |
Competitive and Collaborative Approach Towards a More Effective Education in Computer Science T Cerny, B Mannova CONTEMPORARY EDUCATIONAL TECHNOLOGY 2 (2), 163-173, 2011 | 35 | 2011 |
Systematic Review of Authentication and Authorization Advancements for the Internet of Things M Trnka, AS Abdelfattah, A Shrestha, M Coffey, T Cerny Sensors 22 (4), 2022 | 30 | 2022 |
Advancing static code analysis with language-agnostic component identification M Schiewe, J Curtis, V Bushong, T Cerny IEEE Access 10, 30743-30761, 2022 | 27 | 2022 |
Identity management of devices in internet of things environment M Trnka, T Cerny 2016 6th international conference on it convergence and security (ICITCS), 1-4, 2016 | 27 | 2016 |
On distributed concern delivery in user interface design T Cerny, M Macik, MJ Donahoo, J Janousek Computer Science and Information Systems 12 (2), 655-681, 2015 | 26 | 2015 |
Towards effective adaptive user interfaces design T Cerny, MJ Donahoo, E Song Proceedings of the 2013 Research in Adaptive and Convergent Systems, 373-380, 2013 | 25 | 2013 |