Alert button
Picture for Miroslav Bures

Miroslav Bures

Alert button

Prioritized Variable-length Test Cases Generation for Finite State Machines

Add code
Bookmark button
Alert button
Apr 03, 2022
Vaclav Rechtberger, Miroslav Bures, Bestoun S. Ahmed, Youcef Belkhier, Jiri Nema, Hynek Schvach

Figure 1 for Prioritized Variable-length Test Cases Generation for Finite State Machines
Figure 2 for Prioritized Variable-length Test Cases Generation for Finite State Machines
Figure 3 for Prioritized Variable-length Test Cases Generation for Finite State Machines
Figure 4 for Prioritized Variable-length Test Cases Generation for Finite State Machines
Viaarxiv icon

Overview of Test Coverage Criteria for Test Case Generation from Finite State Machines Modelled as Directed Graphs

Add code
Bookmark button
Alert button
Mar 17, 2022
Vaclav Rechtberger, Miroslav Bures, Bestoun S. Ahmed

Figure 1 for Overview of Test Coverage Criteria for Test Case Generation from Finite State Machines Modelled as Directed Graphs
Figure 2 for Overview of Test Coverage Criteria for Test Case Generation from Finite State Machines Modelled as Directed Graphs
Figure 3 for Overview of Test Coverage Criteria for Test Case Generation from Finite State Machines Modelled as Directed Graphs
Figure 4 for Overview of Test Coverage Criteria for Test Case Generation from Finite State Machines Modelled as Directed Graphs
Viaarxiv icon

Utilising Flow Aggregation to Classify Benign Imitating Attacks

Add code
Bookmark button
Alert button
Mar 06, 2021
Hanan Hindy, Robert Atkinson, Christos Tachtatzis, Ethan Bayne, Miroslav Bures, Xavier Bellekens

Figure 1 for Utilising Flow Aggregation to Classify Benign Imitating Attacks
Figure 2 for Utilising Flow Aggregation to Classify Benign Imitating Attacks
Figure 3 for Utilising Flow Aggregation to Classify Benign Imitating Attacks
Figure 4 for Utilising Flow Aggregation to Classify Benign Imitating Attacks
Viaarxiv icon

Leveraging Siamese Networks for One-Shot Intrusion Detection Model

Add code
Bookmark button
Alert button
Jun 27, 2020
Hanan Hindy, Christos Tachtatzis, Robert Atkinson, David Brosset, Miroslav Bures, Ivan Andonovic, Craig Michie, Xavier Bellekens

Figure 1 for Leveraging Siamese Networks for One-Shot Intrusion Detection Model
Figure 2 for Leveraging Siamese Networks for One-Shot Intrusion Detection Model
Figure 3 for Leveraging Siamese Networks for One-Shot Intrusion Detection Model
Figure 4 for Leveraging Siamese Networks for One-Shot Intrusion Detection Model
Viaarxiv icon

A Hybrid Q-Learning Sine-Cosine-based Strategy for Addressing the Combinatorial Test Suite Minimization Problem

Add code
Bookmark button
Alert button
Apr 27, 2018
Kamal Z. Zamli, Fakhrud Din, Bestoun S. Ahmed, Miroslav Bures

Figure 1 for A Hybrid Q-Learning Sine-Cosine-based Strategy for Addressing the Combinatorial Test Suite Minimization Problem
Figure 2 for A Hybrid Q-Learning Sine-Cosine-based Strategy for Addressing the Combinatorial Test Suite Minimization Problem
Figure 3 for A Hybrid Q-Learning Sine-Cosine-based Strategy for Addressing the Combinatorial Test Suite Minimization Problem
Figure 4 for A Hybrid Q-Learning Sine-Cosine-based Strategy for Addressing the Combinatorial Test Suite Minimization Problem
Viaarxiv icon