Author of the publication

Specialized path-based technique to test Internet of Things system functionality under limited network connectivity.

, , , , , , and . Internet Things, (July 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Change Detection System for the Maintenance of Automated Testing.. ICTSS, volume 8763 of Lecture Notes in Computer Science, page 192-197. Springer, (2014)From Cyber-Security Deception to Manipulation and Gratification Through Gamification., , , , , , and . HCI (29), volume 11594 of Lecture Notes in Computer Science, page 99-114. Springer, (2019)Leveraging siamese networks for one-shot intrusion detection model., , , , , , , and . J. Intell. Inf. Syst., 60 (2): 407-436 (April 2023)Exploratory testing supported by automated reengineering of model of the system under test., , and . Clust. Comput., 20 (1): 855-865 (2017)Software Module Clustering: An In-Depth Literature Analysis., , , and . IEEE Trans. Software Eng., 48 (6): 1905-1928 (2022)On Code Analysis Opportunities and Challenges for Enterprise Systems and Microservices., , , , , , , , and . IEEE Access, (2020)Open Benchmark Testbed to Evaluate Effectiveness of Path-based Tests., , , and . ICSTW, page 126-130. IEEE, (2023)Dynamic Data Consistency Tests Using a CRUD Matrix as an Underlying Model., and . ESSE, page 72-79. ACM, (2020)Supplementary material for the article Ä Sensor Network Utilizing Consumer Wearables for Telerehabilitation of Post-acute COVID-19 Patients"., , , , , , , , and . (June 2022)Alternative Effort-optimal Model-based Strategy for State Machine Testing of IoT Systems., , and . WSSE, page 141-145. ACM, (2020)