Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Pex Extension for Generating User Input Validation Code for Web Applications., , and . ICSOFT EA, page 315-320. SciTePress, (2014)Transformation of IFML schemas to automated tests., , and . RACS, page 509-511. ACM, (2015)Automated testing in the Czech Republic: the current situation and issues.. CompSysTech, page 294-301. ACM, (2014)Prioritized Process Test: More Efficiency in Testing of Business Processes and Workflows., , and . ICISA, volume 424 of Lecture Notes in Electrical Engineering, page 585-593. Springer, (2017)Avocado: Open-Source Flexible Constrained Interaction Testing for Practical Application., , , and . ICST Workshops, page 185-190. IEEE, (2020)Securing Internet of Things Devices Using The Network Context., , , , , and . IEEE Trans. Ind. Informatics, 16 (6): 4017-4027 (2020)Open-source Defect Injection Benchmark Testbed for the Evaluation of Testing., , and . ICST, page 442-447. IEEE, (2020)e-learning adaptive web system's formal design., and . CompSysTech, page 1-5. ACM, (2004)On Vulnerability and Security Log analysis: A Systematic Literature Review on Recent Trends., , , , , , , , and . RACS, page 175-180. ACM, (2020)On Code Analysis Opportunities and Challenges for Enterprise Systems and Microservices., , , , , , , , and . IEEE Access, (2020)