Follow
Tomas Cerny
Title
Cited by
Cited by
Year
Contextual understanding of microservice architecture: current and future directions
T Cerny, MJ Donahoo, M Trnka
ACM SIGAPP Applied Computing Review 17 (4), 29-45, 2018
2802018
Survey of Authentication and Authorization for the Internet of Things
M Trnka, T Cerny, N Stickney
Security and Communication Networks 2018 (1), 4351603, 2018
952018
Disambiguation and comparison of soa, microservices and self-contained systems
T Cerny, MJ Donahoo, J Pechanec
Proceedings of the International Conference on research in adaptive and …, 2017
872017
Aspects of quality in Internet of Things (IoT) solutions: A systematic mapping study
BS Ahmed, M Bures, K Frajtak, T Cerny
IEEE Access 7, 13758-13780, 2019
702019
Internet of things: Current challenges in the quality assurance and testing methods
M Bures, T Cerny, BS Ahmed
International conference on information science and applications, 625-634, 2018
632018
Microservice architecture reconstruction and visualization techniques: A review
T Cerny, AS Abdelfattah, V Bushong, A Al Maruf, D Taibi
2022 IEEE International Conference on Service-Oriented System Engineering …, 2022
552022
Open-source tools and benchmarks for code-clone detection: past, present, and future trends
A Walker, T Cerny, E Song
ACM SIGAPP Applied Computing Review 19 (4), 28-39, 2020
522020
On Microservice Analysis and Architecture Evolution: A Systematic Mapping Study
V Bushong, AS Abdelfattah, AA Maruf, D Das, A Lehman, E Jaroszewski, ...
Applied Sciences 11 (17), 2021
512021
Aspect-driven, Data-reflective and Context-aware User Interfaces Design
T Cerny, K Cemus, MJ Donahoo, E Song
Applied Computing Review 13 (4), 53-65, 2013
51*2013
Automated code-smell detection in microservices through static analysis: A case study
A Walker, D Das, T Cerny
Applied Sciences 10 (21), 7800, 2020
482020
Context-sensitive, cross-platform user interface generation
M Macik, T Cerny, P Slavik
Journal on Multimodal User Interfaces, 1-13, 2014
472014
On vulnerability and security log analysis: A systematic literature review on recent trends
J Svacina, J Raffety, C Woodahl, B Stone, T Cerny, M Bures, D Shin, ...
Proceedings of the International Conference on Research in Adaptive and …, 2020
462020
On security level usage in context-aware role-based access control
M Trnka, T Cerny
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 1192-1195, 2016
392016
Aspect-oriented challenges in system integration with microservices, SOA and IoT
T Cerny
Enterprise Information Systems 13 (4), 467-489, 2019
372019
Competitive and Collaborative Approach Towards a More Effective Education in Computer Science
T Cerny, B Mannova
CONTEMPORARY EDUCATIONAL TECHNOLOGY 2 (2), 163-173, 2011
372011
Systematic Review of Authentication and Authorization Advancements for the Internet of Things
M Trnka, AS Abdelfattah, A Shrestha, M Coffey, T Cerny
Sensors 22 (4), 2022
342022
Advancing static code analysis with language-agnostic component identification
M Schiewe, J Curtis, V Bushong, T Cerny
IEEE Access 10, 30743-30761, 2022
292022
Comparative evaluation of Java virtual machine-based message queue services: A study on Kafka, Artemis, Pulsar, and RocketMQ
MSH Chy, MAR Arju, SM Tella, T Cerny
Electronics 12 (23), 4792, 2023
272023
Identity management of devices in internet of things environment
M Trnka, T Cerny
2016 6th international conference on it convergence and security (ICITCS), 1-4, 2016
272016
On code analysis opportunities and challenges for enterprise systems and microservices
T Cerny, J Svacina, D Das, V Bushong, M Bures, P Tisnovsky, K Frajtak, ...
IEEE access 8, 159449-159470, 2020
262020
The system can't perform the operation now. Try again later.
Articles 1–20