- Advanced Software Engineering Methodologies
- Software System Performance and Reliability
- Software Engineering Research
- IoT and Edge/Fog Computing
- Service-Oriented Architecture and Web Services
- Software Reliability and Analysis Research
- Digital and Cyber Forensics
- Information and Cyber Security
- Business Process Modeling and Analysis
- Blockchain Technology Applications and Security
- Model-Driven Software Engineering Techniques
- Smart Grid Security and Resilience
- Software Engineering Techniques and Practices
- Safety Systems Engineering in Autonomy
- Advanced Malware Detection Techniques
- Ethics and Social Impacts of AI
- Cloud Computing and Resource Management
- Network Security and Intrusion Detection
- Distributed systems and fault tolerance
- Scientific Computing and Data Management
- Smart Cities and Technologies
- Big Data and Business Intelligence
- Gender and Technology in Education
- Vehicular Ad Hoc Networks (VANETs)
- Smart Grid Energy Management
Masaryk University
2016-2025
Fraunhofer Institute for Experimental Software Engineering
2023
Software602 (Czechia)
2022
Software (Germany)
2022
Czech Academy of Sciences, Institute of Computer Science
2017-2020
University of Ottawa
2020
Graz University of Technology
2020
Poznań University of Technology
2020
Due to significant industrial demands toward software systems with increasing complexity and challenging quality requirements, architecture design has become an important development activity the research domain is rapidly evolving. In last decades, optimization methods, which aim automate search for optimal respect a (set of) attribute(s), have proliferated. However, reported results are fragmented over different communities, multiple system domains, attributes. To integrate existing...
With the increasing importance of reliability in business and industrial software systems, new techniques architecture-based engineering are becoming an integral part development process. These can assist system architects evaluating impact their design decisions. Architecture-based is only effective if involved models reflect interaction usage components deployment to potentially unreliable hardware. However, existing approaches either neglect individual factors on or hard-code them into...
Rapid developments in Intelligent Transportation Systems (ITSs) have emerged as a new research field for building sustainable smart cities. VANET (vehicular ad hoc network) is one of the emergent transportation technologies that has great impact on ensuring mainly traffic management and road safety urban areas by effciently using data sharing among vehicles. To further increase security passengers drivers, ITSs are continually striving to make fusion network provide more reliable effcient...
Cloud computing has significantly enhanced the growth of Internet Things (IoT) by ensuring and supporting Quality Service (QoS) IoT applications. However, cloud services are still far from devices. Notably, transmission data experiences network issues, such as high latency. In this case, platforms cannot satisfy applications that require real-time response. Yet, location is one challenges encountered in evolution paradigm. Recently, edge been proposed to bring closer end-users, becoming a...
In recent years, we have been witnessing profound transformation of energy distribution systems fueled by Information and Communication Technologies (ICT), towards the so called Smart Grid. However, while Grid design strategies studied academia, only anecdotal guidance is provided to industry with respect increasing level grid intelligence. this paper, report on a successful project in assisting way, via conducting large anomaly-detection study data one power companies Czech Republic. study,...
Abstract The interest of girls in computing drops early during primary and secondary education, with minimal recovery later education stages. In combination the growing shortage qualified computer science personnel, this is becoming a major issue, also target numerous studies that examine measures, interventions, strategies to boost girls’ commitment computing. Yet, results existing are difficult navigate, hence being very rarely employed classrooms. paper, we summarize body knowledge on...
Nowadays, VANET (Vehicular Ad-hoc NETwork) has gained increasing attention from many researchers with its various applications, such as enhancing traffic safety by collecting and disseminating event information. This increased interest in necessitated greater scrutiny of machine learning (ML) methods used for improving the security capabilities intrusion detection systems (IDSs), need to solve computationally intensive ML problems due vehicular data. Therefore, this paper, we propose a...
Cyberattacks perpetrated by insiders are difficult to prevent using traditional security approaches. Often, such attackers misuse legitimate access the system conduct an attack, or external attacker manipulates masquerades as insider gain access, bypassing controls. A possible solution this problem forensic-ready software systems that support eventual forensic investigation. For example, assuring appropriate evidence of attack would be generated and assessable if needed. While not primarily...
Trust management has become a fundamental requirement for Social Internet of Things (SIoT) to enable trustworthy social network smart objects necessary enhancing the security and reliability cyber-physical systems. To increase credibility scores in trust management, AI (Artificial Intelligence) been adopted. However, current need digital acceleration brought ethical concerns related smartness consciousness autonomous objects, which leads question whether AI-based is ready deal with these...
In the context of Smart Ecosystems, systems engage in dynamic cooperation with other to achieve their goals. Expedient operation is only possible when all cooperate as expected. This requires a level trust between components ecosystem. New that join ecosystem therefore first need build up trust. Humans derive from behavioral reputation key situations. Ecosystems (SES), system or component can also be based on observation its behavior. this paper, we introduce method and test platform support...
With the rapid development of Big Data and Internet Things (IoT), technologies have emerged as a key data analytics tool in IoT, which, clustering algorithms are considered an essential component for analysis. However, there has been limited research that addresses challenges across IoT thus proposing agenda is important to clarify context IoT. By tackling this specific aspect - algorithm Data, paper examines on technologies, related possible usages Based our review, identifies set can be...
The Unified Modelling Language (UML) is being widely accepted as a modelling notation for visualizing software systems during design and development. UML has thus become part of many engineering course curricula at universities worldwide, providing recognized tool practical training students in understanding design. It however common that have difficulties absorbing its complexity, often repeat the same mistakes been observed by tutors previous years. Having catalogue such could hence...
We share findings from a study of 139 women, revealing the frustrations they felt along their way to software engineering and pinpointing promising solutions, such as interdisciplinary education, which could be enormous help retaining women in computing.
The 21st century is the age of automation. automotive industry converging towards deployment complete automation by 2030. But are humans ready for it, or will they be hesitant to adopt it due lack trust? To safeguard future autonomous mobility, robust run-time trust assurance and assessment necessary. One strategy that so far under-explored rooted in involving intelligence inside agents, which could directed detection trust-breaking behaviour other agents problematic vehicles reported before...