关注
Miroslav Bures
标题
引用次数
引用次数
年份
Machine learning based IoT intrusion detection system: An MQTT case study (MQTT-IoT-IDS2020 dataset)
H Hindy, E Bayne, M Bures, R Atkinson, C Tachtatzis, X Bellekens
International networking conference, 73-84, 2020
1442020
A review of cyber-ranges and test-beds: Current and future trends
E Ukwandu, MAB Farah, H Hindy, D Brosset, D Kavallieros, R Atkinson, ...
Sensors 20 (24), 7148, 2020
952020
A hybrid Q-learning sine-cosine-based strategy for addressing the combinatorial test suite minimization problem
KZ Zamli, F Din, BS Ahmed, M Bures
PloS one 13 (5), e0195675, 2018
772018
Cyber-security challenges in aviation industry: A review of current and future trends
E Ukwandu, MA Ben-Farah, H Hindy, M Bures, R Atkinson, C Tachtatzis, ...
Information 13 (3), 146, 2022
712022
Constrained interaction testing: A systematic literature study
BS Ahmed, KZ Zamli, W Afzal, M Bures
IEEE Access 5, 25706-25730, 2017
702017
Aspects of quality in Internet of Things (IoT) solutions: A systematic mapping study
BS Ahmed, M Bures, K Frajtak, T Cerny
IEEE Access 7, 13758-13780, 2019
672019
Internet of things: Current challenges in the quality assurance and testing methods
M Bures, T Cerny, BS Ahmed
International conference on information science and applications, 625-634, 2018
592018
Cyber security in the maritime industry: A systematic survey of recent advances and future trends
MA Ben Farah, E Ukwandu, H Hindy, D Brosset, M Bures, I Andonovic, ...
Information 13 (1), 22, 2022
572022
On microservice analysis and architecture evolution: A systematic mapping study
V Bushong, AS Abdelfattah, AA Maruf, D Das, A Lehman, E Jaroszewski, ...
Applied Sciences 11 (17), 7856, 2021
492021
On vulnerability and security log analysis: A systematic literature review on recent trends
J Svacina, J Raffety, C Woodahl, B Stone, T Cerny, M Bures, D Shin, ...
Proceedings of the International Conference on Research in Adaptive and …, 2020
402020
Tapir: Automation support of exploratory testing using model reconstruction of the system under test
M Bures, K Frajtak, BS Ahmed
IEEE Transactions on Reliability 67 (2), 557-580, 2018
382018
Model-Based Testing and Exploratory Testing: Is Synergy Possible?
K Frajtak, M Bures, I Jelinek
2016 6th International Conference on IT Convergence and Security (ICITCS), 1-6, 2016
322016
Software module clustering: An in-depth literature analysis
QI Sarhan, BS Ahmed, M Bures, KZ Zamli
IEEE Transactions on Software Engineering 48 (6), 1905-1928, 2020
312020
Exploratory testing supported by automated reengineering of model of the system under test
K Frajtak, M Bures, I Jelinek
Cluster Computing 20 (1), 855-865, 2017
302017
Leveraging siamese networks for one-shot intrusion detection model
H Hindy, C Tachtatzis, R Atkinson, D Brosset, M Bures, I Andonovic, ...
Journal of Intelligent Information Systems 60 (2), 407-436, 2023
282023
Review of specific features and challenges in the current internet of things systems impacting their security and reliability
M Bures, M Klima, V Rechtberger, BS Ahmed, H Hindy, X Bellekens
Trends and Applications in Information Systems and Technologies: Volume 3 9 …, 2021
272021
Machine learning based iot intrusion detection system: An mqtt case study
H Hindy, E Bayne, M Bures, R Atkinson, C Tachtatzis, X Bellekens
arXiv preprint arXiv:2006.15340, 24-52, 2020
272020
On code analysis opportunities and challenges for enterprise systems and microservices
T Cerny, J Svacina, D Das, V Bushong, M Bures, P Tisnovsky, K Frajtak, ...
IEEE access 8, 159449-159470, 2020
242020
On the effectiveness of combinatorial interaction testing: A case study
M Bures, BS Ahmed
2017 IEEE International Conference on Software Quality, Reliability and …, 2017
242017
Prioritized process test: More efficiency in testing of business processes and workflows
M Bures, T Cerny, M Klima
Information Science and Applications 2017: ICISA 2017 8, 585-593, 2017
242017
系统目前无法执行此操作,请稍后再试。
文章 1–20