Mistakes in UML diagrams: analysis of student projects in a software engineering course S Chren, B Buhnova, M Macak, L Daubner, B Rossi 2019 IEEE/ACM 41st International Conference on Software Engineering …, 2019 | 39 | 2019 |
Using process mining for git log analysis of projects in a software development course M Macak, D Kruzelova, S Chren, B Buhnova Education and information technologies 26 (5), 5939-5969, 2021 | 32 | 2021 |
Addressing insider attacks via forensic-ready risk management L Daubner, M Macak, R Matulevičius, B Buhnova, S Maksović, T Pitner Journal of Information Security and Applications 73, 103433, 2023 | 17 | 2023 |
Towards process mining utilization in insider threat detection from audit logs M Macak, I Vanát, M Merjavý, T Jevočin, B Buhnova 2020 seventh international conference on social networks analysis …, 2020 | 17 | 2020 |
Verification of forensic readiness in software development: A roadmap L Daubner, M Macak, B Buhnova, T Pitner Proceedings of the 35th Annual ACM Symposium on Applied Computing, 1658-1661, 2020 | 16 | 2020 |
Big data platform for smart grids power consumption anomaly detection P Lipčák, M Macak, B Rossi 2019 federated conference on computer science and information systems …, 2019 | 16 | 2019 |
Process mining usage in cybersecurity and software reliability analysis: A systematic literature review M Macak, L Daubner, MF Sani, B Buhnova Array 13, 100120, 2022 | 13 | 2022 |
Towards verifiable evidence generation in forensic-ready systems L Daubner, M Macak, B Buhnova, T Pitner 2020 IEEE international conference on big data (big data), 2264-2269, 2020 | 12 | 2020 |
Simulation games platform for unintentional perpetrator attack vector identification M Macak, A Kruzikova, L Daubner, B Buhnova Proceedings of the IEEE/ACM 42nd International Conference on Software …, 2020 | 12 | 2020 |
Cybersecurity analysis via process mining: A systematic literature review M Macák, L Daubner, MF Sani, B Buhnova International Conference on Advanced Data Mining and Applications, 393-407, 2022 | 11 | 2022 |
The Suitability of Graph Databases for Big Data Analysis: A Benchmark. M Macák, M Stovcik, B Buhnova IoTBDS, 213-220, 2020 | 10 | 2020 |
How well a multi-model database performs against its single-model variants: Benchmarking OrientDB with Neo4j and MongoDB M Macak, M Stovcik, B Buhnova, M Merjavy 2020 15th Conference on Computer Science and Information Systems (FedCSIS …, 2020 | 9 | 2020 |
Process mining analysis of puzzle-based cybersecurity training M Macák, R Oslejsek, B Buhnova Proceedings of the 27th ACM Conference on on Innovation and Technology in …, 2022 | 8 | 2022 |
Applying process discovery to cybersecurity training: an experience report M Macák, R Oslejsek, B Buhnova 2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2022 | 7 | 2022 |
Evaluating code improvements in software quality course projects S Chren, M Macák, B Rossi, B Buhnova Proceedings of the 26th International Conference on Evaluation and …, 2022 | 6 | 2022 |
Scenarios for process-aware insider attack detection in manufacturing M Macak, R Vaclavek, D Kusnirakova, R Matulevičius, B Buhnova Proceedings of the 17th International Conference on Availability …, 2022 | 4 | 2022 |
A Cross-domain Comparative Study of Big Data Architectures M Macak, M Ge, B Buhnova International Journal of Cooperative Information Systems, 2020 | 3 | 2020 |
Big Data Processing Tools Navigation Diagram. M Macak, H Bangui, B Buhnova, AJ Molnár, CI Sidló IoTBDS, 304-312, 2020 | 3 | 2020 |
Game Achievement Analysis: Process Mining Approach M Macak, L Daubner, J Jamnicka, B Buhnova International Conference on Advanced Data Mining and Applications, 68-82, 2022 | 2 | 2022 |
Identification of Unintentional Perpetrator Attack Vectors using Simulation Games: A Case Study M Macak, S Bojnak, B Buhnova 2021 16th conference on computer science and intelligence systems (FedCSIS …, 2021 | 2 | 2021 |