Machine learning based IoT intrusion detection system: An MQTT case study (MQTT-IoT-IDS2020 dataset) H Hindy, E Bayne, M Bures, R Atkinson, C Tachtatzis, X Bellekens International networking conference, 73-84, 2020 | 144 | 2020 |
A review of cyber-ranges and test-beds: Current and future trends E Ukwandu, MAB Farah, H Hindy, D Brosset, D Kavallieros, R Atkinson, ... Sensors 20 (24), 7148, 2020 | 95 | 2020 |
A hybrid Q-learning sine-cosine-based strategy for addressing the combinatorial test suite minimization problem KZ Zamli, F Din, BS Ahmed, M Bures PloS one 13 (5), e0195675, 2018 | 77 | 2018 |
Cyber-security challenges in aviation industry: A review of current and future trends E Ukwandu, MA Ben-Farah, H Hindy, M Bures, R Atkinson, C Tachtatzis, ... Information 13 (3), 146, 2022 | 71 | 2022 |
Constrained interaction testing: A systematic literature study BS Ahmed, KZ Zamli, W Afzal, M Bures IEEE Access 5, 25706-25730, 2017 | 70 | 2017 |
Aspects of quality in Internet of Things (IoT) solutions: A systematic mapping study BS Ahmed, M Bures, K Frajtak, T Cerny IEEE Access 7, 13758-13780, 2019 | 67 | 2019 |
Internet of things: Current challenges in the quality assurance and testing methods M Bures, T Cerny, BS Ahmed International conference on information science and applications, 625-634, 2018 | 59 | 2018 |
Cyber security in the maritime industry: A systematic survey of recent advances and future trends MA Ben Farah, E Ukwandu, H Hindy, D Brosset, M Bures, I Andonovic, ... Information 13 (1), 22, 2022 | 57 | 2022 |
On microservice analysis and architecture evolution: A systematic mapping study V Bushong, AS Abdelfattah, AA Maruf, D Das, A Lehman, E Jaroszewski, ... Applied Sciences 11 (17), 7856, 2021 | 49 | 2021 |
On vulnerability and security log analysis: A systematic literature review on recent trends J Svacina, J Raffety, C Woodahl, B Stone, T Cerny, M Bures, D Shin, ... Proceedings of the International Conference on Research in Adaptive and …, 2020 | 40 | 2020 |
Tapir: Automation support of exploratory testing using model reconstruction of the system under test M Bures, K Frajtak, BS Ahmed IEEE Transactions on Reliability 67 (2), 557-580, 2018 | 38 | 2018 |
Model-Based Testing and Exploratory Testing: Is Synergy Possible? K Frajtak, M Bures, I Jelinek 2016 6th International Conference on IT Convergence and Security (ICITCS), 1-6, 2016 | 32 | 2016 |
Software module clustering: An in-depth literature analysis QI Sarhan, BS Ahmed, M Bures, KZ Zamli IEEE Transactions on Software Engineering 48 (6), 1905-1928, 2020 | 31 | 2020 |
Exploratory testing supported by automated reengineering of model of the system under test K Frajtak, M Bures, I Jelinek Cluster Computing 20 (1), 855-865, 2017 | 30 | 2017 |
Leveraging siamese networks for one-shot intrusion detection model H Hindy, C Tachtatzis, R Atkinson, D Brosset, M Bures, I Andonovic, ... Journal of Intelligent Information Systems 60 (2), 407-436, 2023 | 28 | 2023 |
Review of specific features and challenges in the current internet of things systems impacting their security and reliability M Bures, M Klima, V Rechtberger, BS Ahmed, H Hindy, X Bellekens Trends and Applications in Information Systems and Technologies: Volume 3 9 …, 2021 | 27 | 2021 |
Machine learning based iot intrusion detection system: An mqtt case study H Hindy, E Bayne, M Bures, R Atkinson, C Tachtatzis, X Bellekens arXiv preprint arXiv:2006.15340, 24-52, 2020 | 27 | 2020 |
On code analysis opportunities and challenges for enterprise systems and microservices T Cerny, J Svacina, D Das, V Bushong, M Bures, P Tisnovsky, K Frajtak, ... IEEE access 8, 159449-159470, 2020 | 24 | 2020 |
On the effectiveness of combinatorial interaction testing: A case study M Bures, BS Ahmed 2017 IEEE International Conference on Software Quality, Reliability and …, 2017 | 24 | 2017 |
Prioritized process test: More efficiency in testing of business processes and workflows M Bures, T Cerny, M Klima Information Science and Applications 2017: ICISA 2017 8, 585-593, 2017 | 24 | 2017 |