Mistakes in UML diagrams: analysis of student projects in a software engineering course S Chren, B Buhnova, M Macak, L Daubner, B Rossi 2019 IEEE/ACM 41st International Conference on Software Engineering …, 2019 | 44 | 2019 |
Using process mining for git log analysis of projects in a software development course M Macak, D Kruzelova, S Chren, B Buhnova Education and information technologies 26 (5), 5939-5969, 2021 | 36 | 2021 |
Addressing insider attacks via forensic-ready risk management L Daubner, M Macak, R Matulevičius, B Buhnova, S Maksović, T Pitner Journal of Information Security and Applications 73, 103433, 2023 | 28 | 2023 |
Process mining usage in cybersecurity and software reliability analysis: A systematic literature review M Macak, L Daubner, MF Sani, B Buhnova Array 13, 100120, 2022 | 21 | 2022 |
Towards process mining utilization in insider threat detection from audit logs M Macak, I Vanát, M Merjavý, T Jevočin, B Buhnova 2020 seventh international conference on social networks analysis …, 2020 | 20 | 2020 |
Cybersecurity analysis via process mining: A systematic literature review M Macák, L Daubner, MF Sani, B Buhnova International Conference on Advanced Data Mining and Applications, 393-407, 2022 | 19 | 2022 |
Verification of forensic readiness in software development: A roadmap L Daubner, M Macak, B Buhnova, T Pitner Proceedings of the 35th Annual ACM Symposium on Applied Computing, 1658-1661, 2020 | 19 | 2020 |
Big data platform for smart grids power consumption anomaly detection P Lipčák, M Macak, B Rossi 2019 federated conference on computer science and information systems …, 2019 | 18 | 2019 |
How well a multi-model database performs against its single-model variants: Benchmarking OrientDB with Neo4j and MongoDB M Macak, M Stovcik, B Buhnova, M Merjavy 2020 15th Conference on Computer Science and Information Systems (FedCSIS …, 2020 | 14 | 2020 |
Process mining analysis of puzzle-based cybersecurity training M Macák, R Oslejsek, B Buhnova Proceedings of the 27th ACM Conference on on Innovation and Technology in …, 2022 | 13 | 2022 |
Evaluating code improvements in software quality course projects S Chren, M Macák, B Rossi, B Buhnova Proceedings of the 26th International Conference on Evaluation and …, 2022 | 13 | 2022 |
Towards verifiable evidence generation in forensic-ready systems L Daubner, M Macak, B Buhnova, T Pitner 2020 IEEE international conference on big data (big data), 2264-2269, 2020 | 13 | 2020 |
Simulation games platform for unintentional perpetrator attack vector identification M Macak, A Kruzikova, L Daubner, B Buhnova Proceedings of the IEEE/ACM 42nd International Conference on Software …, 2020 | 13 | 2020 |
Applying process discovery to cybersecurity training: an experience report M Macák, R Oslejsek, B Buhnova 2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2022 | 12 | 2022 |
The Suitability of Graph Databases for Big Data Analysis: A Benchmark. M Macak, M Stovcik, B Buhnova IoTBDS, 213-220, 2020 | 12 | 2020 |
Scenarios for process-aware insider attack detection in manufacturing M Macak, R Vaclavek, D Kusnirakova, R Matulevičius, B Buhnova Proceedings of the 17th International Conference on Availability …, 2022 | 7 | 2022 |
Mistakes in UML Diagrams: Analysis of Student Projects in a Software Engineering Course. In 2019 IEEE/ACM 41st International Conference on Software Engineering: Software … S Chren, B Buhnova, M Macak, L Daubner, B Rossi IEEE, 2019 | 7 | 2019 |
Identification of unintentional perpetrator attack vectors using simulation games: A case study M Macak, S Bojnak, B Buhnova 2021 16th conference on computer science and intelligence systems (FedCSIS …, 2021 | 5 | 2021 |
A Cross-domain Comparative Study of Big Data Architectures M Macak, M Ge, B Buhnova International Journal of Cooperative Information Systems, 2020 | 4 | 2020 |
CopAS: A Big Data forensic analytics system M Macak, M Stovcik, T Rebok, M Ge, B Rossi, B Buhnova arXiv preprint arXiv:2212.04843, 2022 | 3 | 2022 |