Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    Review of Open Software Bug Datasets

    The localisation of the bug position in a source code and the prediction of which specific parts of a source code might be the cause of defects play an important role in maintaining software quality. Both appr...

    Tomas Holek, Miroslav Bures, Tomas Cerny in Information Systems and Technologies (2024)

  2. Article

    Open Access

    Leveraging siamese networks for one-shot intrusion detection model

    The use of supervised Machine Learning (ML) to enhance Intrusion Detection Systems (IDS) has been the subject of significant research. Supervised ML is based upon learning by example, demanding significant vol...

    Hanan Hindy, Christos Tachtatzis in Journal of Intelligent Information Systems (2023)

  3. No Access

    Chapter and Conference Paper

    Analyzing Technical Debt by Map** Production Logs with Source Code

    Poor coding practices, bad design decisions, and expedited software delivery can introduce technical debt. As software grows, manual detection and management of technical debt become increasingly difficult. To...

    Dipta Das, Rofiqul Islam, Samuel Kim in The Recent Advances in Transdisciplinary D… (2022)

  4. No Access

    Chapter and Conference Paper

    A Testing Tool for IoT Systems Operating with Limited Network Connectivity

    For Internet of Things (IoT) systems operating in areas with limited network connectivity, reliable and safe functionality must be ensured. This can be done using special test cases which are examining system ...

    Matej Klima, Miroslav Bures in Trends and Applications in Information Sys… (2021)

  5. No Access

    Chapter and Conference Paper

    Machine Learning Based IoT Intrusion Detection System: An MQTT Case Study (MQTT-IoT-IDS2020 Dataset)

    The Internet of Things (IoT) is one of the main research fields in the Cybersecurity domain. This is due to (a) the increased dependency on automated device, and (b) the inadequacy of general-purpose Intrusion...

    Hanan Hindy, Ethan Bayne, Miroslav Bures in Selected Papers from the 12th Internationa… (2021)

  6. No Access

    Chapter and Conference Paper

    Code Coverage Aware Test Generation Using Constraint Solver

    Code coverage has been used in the software testing context mostly as a metric to assess a generated test suite’s quality. Recently, code coverage analysis is used as a white-box testing technique for test opt...

    Krystof Sykora, Bestoun S. Ahmed in Software Engineering and Formal Methods. S… (2021)

  7. No Access

    Chapter and Conference Paper

    Review of Specific Features and Challenges in the Current Internet of Things Systems Impacting Their Security and Reliability

    The current development of the Internet of Things (IoT) technology poses significant challenges to researchers and industry practitioners. Among these challenges, security and reliability particularly deserve ...

    Miroslav Bures, Matej Klima in Trends and Applications in Information Sys… (2021)

  8. No Access

    Chapter and Conference Paper

    Quality and Reliability Metrics for IoT Systems: A Consolidated View

    Quality and reliability metrics play an important role in the evaluation of the state of a system during the development and testing phases, and serve as tools to optimize the testing process or to define the ...

    Matej Klima, Vaclav Rechtberger in Science and Technologies for Smart Cities (2021)

  9. No Access

    Chapter and Conference Paper

    A Comprehensive View on Quality Characteristics of the IoT Solutions

    Categorization of quality characteristics helps in a more effective structuring of the testing process and in the determination of properties, which can be verified in the system under test. In the emerging ar...

    Miroslav Bures, Xavier Bellekens in 3rd EAI International Conference on IoT in… (2020)

  10. No Access

    Chapter and Conference Paper

    Interoperability and Integration Testing Methods for IoT Systems: A Systematic Map** Study

    The recent active development of Internet of Things (IoT) solutions in various domains has led to an increased demand for security, safety, and reliability of these systems. Security and data privacy are curre...

    Miroslav Bures, Matej Klima, Vaclav Rechtberger in Software Engineering and Formal Methods (2020)

  11. No Access

    Chapter and Conference Paper

    Internet of Things: Current Challenges in the Quality Assurance and Testing Methods

    Contemporary development of the Internet of Things (IoT) technology brings a number of challenges in the Quality Assurance area. Current issues related to security, user’s privacy, the reliability of the servi...

    Miroslav Bures, Tomas Cerny, Bestoun S. Ahmed in Information Science and Applications 2018 (2019)

  12. Chapter and Conference Paper

    From Cyber-Security Deception to Manipulation and Gratification Through Gamification

    With the ever growing networking capabilities an...

    Xavier Bellekens, Gayan Jayasekara, Hanan Hindy in HCI for Cybersecurity, Privacy and Trust (2019)

  13. No Access

    Chapter and Conference Paper

    Testing of Smart TV Applications: Key Ingredients, Challenges and Proposed Solutions

    Smart TV applications are software applications that have been designed to run on smart TVs which are televisions with integrated Internet features. Nowadays, the smart TVs are going to dominate the television...

    Bestoun S. Ahmed, Miroslav Bures in Proceedings of the Future Technologies Con… (2019)

  14. No Access

    Article

    Testing the consistency of business data objects using extended static testing of CRUD matrices

    Static testing is used to detect software defects in the earlier phases of the software development lifecycle, which makes the total costs caused by defects lower and the software development project less risk...

    Miroslav Bures, Tomas Cerny, Karel Frajtak, Bestoun S. Ahmed in Cluster Computing (2019)

  15. No Access

    Article

    Exploratory testing supported by automated reengineering of model of the system under test

    Exploratory Testing technique is well applicable to software development projects, where test basis is not available (or at least not complete and consistent to the extent allowing the creation of efficient te...

    Karel Frajtak, Miroslav Bures, Ivan Jelinek in Cluster Computing (2017)

  16. No Access

    Chapter and Conference Paper

    Static Testing Using Different Types of CRUD Matrices

    Static testing leads to early detection of defects throughout a project software development. This results in reduced costs and risks in the development process. Various types of static tests can be performed...

    Miroslav Bures, Tomas Cerny in Information Science and Applications 2017 (2017)

  17. No Access

    Chapter and Conference Paper

    Prioritized Process Test: More Efficiency in Testing of Business Processes and Workflows

    Testing business processes and workflows in information systems, while aiming to cover all possible paths, requires high efforts demanding considerable costs. In this paper, we propose an algorithm generating ...

    Miroslav Bures, Tomas Cerny, Matej Klima in Information Science and Applications 2017 (2017)

  18. No Access

    Chapter and Conference Paper

    Model for Evaluation and Cost Estimations of the Automated Testing Architecture

    In the automated testing, finding an optimal architecture of the scripts and level of structuring to reusable objects from an economic point of view could become a challenging task. The optimality of the archi...

    Miroslav Bures in New Contributions in Information Systems and Technologies (2015)

  19. No Access

    Chapter and Conference Paper

    Creating Smart Tests from Recorded Automated Test Cases

    In order to shorten time to market many software development teams have adopted continuous integration and automated testing. Although user interface test automation is a suitable solution for Agile developmen...

    Martin Filipsky, Miroslav Bures in New Contributions in Information Systems a… (2015)

  20. No Access

    Chapter and Conference Paper

    PCTgen: Automated Generation of Test Cases for Application Workflows

    Functional testing of application workflows is one of the most frequently used testing methods. To reduce test design effort and decrease a possibility of human mistake, it is suitable to support the process b...

    Miroslav Bures in New Contributions in Information Systems and Technologies (2015)

previous disabled Page of 2