From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Securing Internet of Things Devices Using The Network Context., , , , , и . IEEE Trans. Ind. Informatics, 16 (6): 4017-4027 (2020)Avocado: Open-Source Flexible Constrained Interaction Testing for Practical Application., , , и . ICST Workshops, стр. 185-190. IEEE, (2020)Open-source Defect Injection Benchmark Testbed for the Evaluation of Testing., , и . ICST, стр. 442-447. IEEE, (2020)Pex Extension for Generating User Input Validation Code for Web Applications., , и . ICSOFT EA, стр. 315-320. SciTePress, (2014)Transformation of IFML schemas to automated tests., , и . RACS, стр. 509-511. ACM, (2015)Automated testing in the Czech Republic: the current situation and issues.. CompSysTech, стр. 294-301. ACM, (2014)e-learning adaptive web system's formal design., и . CompSysTech, стр. 1-5. ACM, (2004)On Vulnerability and Security Log analysis: A Systematic Literature Review on Recent Trends., , , , , , , , и . RACS, стр. 175-180. ACM, (2020)Prioritized Process Test: More Efficiency in Testing of Business Processes and Workflows., , и . ICISA, том 424 из Lecture Notes in Electrical Engineering, стр. 585-593. Springer, (2017)On Code Analysis Opportunities and Challenges for Enterprise Systems and Microservices., , , , , , , , и . IEEE Access, (2020)