Martin Macák

Orcid: 0000-0001-9655-9228

Affiliations:
  • Masaryk University, Brno, Czech Republic


According to our database1, Martin Macák authored at least 24 papers between 2019 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Comparative Analysis of Supersonic Flow in Atmospheric and Low Pressure in the Region of Shock Waves Creation for Electron Microscopy.
Sensors, December, 2023

Addressing insider attacks via forensic-ready risk management.
J. Inf. Secur. Appl., March, 2023

Detecting Masquerading Traitors from Process Visualization of Computer Usage.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

CopAS: A Big Data Forensic Analytics System.
Proceedings of the 8th International Conference on Internet of Things, 2023

2022
Forensic-Ready Risk Management Concepts.
CoRR, 2022

Process mining usage in cybersecurity and software reliability analysis: A systematic literature review.
Array, 2022

Process Mining Analysis of Puzzle-Based Cybersecurity Training.
Proceedings of the ITiCSE 2022: Innovation and Technology in Computer Science Education, Dublin, Ireland, July 8, 2022

Applying Process Discovery to Cybersecurity Training: An Experience Report.
Proceedings of the IEEE European Symposium on Security and Privacy, 2022

Evaluating Code Improvements in Software Quality Course Projects.
Proceedings of the EASE 2022: The International Conference on Evaluation and Assessment in Software Engineering 2022, Gothenburg, Sweden, June 13, 2022

Scenarios for Process-Aware Insider Attack Detection in Manufacturing.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Using process mining for Git log analysis of projects in a software development course.
Educ. Inf. Technol., 2021

Identification of Unintentional Perpetrator Attack Vectors using Simulation Game: A Case Study.
Proceedings of the 16th Conference on Computer Science and Intelligence Systems, 2021

Cybersecurity Analysis via Process Mining: A Systematic Literature Review.
Proceedings of the Advanced Data Mining and Applications - 17th International Conference, 2021

Game Achievement Analysis: Process Mining Approach.
Proceedings of the Advanced Data Mining and Applications - 17th International Conference, 2021

2020
A Cross-Domain Comparative Study of Big Data Architectures.
Int. J. Cooperative Inf. Syst., 2020

Towards Process Mining Utilization in Insider Threat Detection from Audit Logs.
Proceedings of the Seventh International Conference on Social Networks Analysis, 2020

Verification of forensic readiness in software development: a roadmap.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

The Suitability of Graph Databases for Big Data Analysis: A Benchmark.
Proceedings of the 5th International Conference on Internet of Things, 2020

Big Data Processing Tools Navigation Diagram.
Proceedings of the 5th International Conference on Internet of Things, 2020

Simulation Games Platform for Unintentional Perpetrator Attack Vector Identification.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Workshops, Seoul, Republic of Korea, 27 June, 2020

How well a multi-model database performs against its single-model variants: Benchmarking OrientDB with Neo4j and MongoDB.
Proceedings of the 2020 Federated Conference on Computer Science and Information Systems, 2020

Towards verifiable evidence generation in forensic-ready systems.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

2019
Mistakes in UML diagrams: analysis of student projects in a software engineering course.
Proceedings of the 41st International Conference on Software Engineering: Software Engineering Education and Training, 2019

Big Data Platform for Smart Grids Power Consumption Anomaly Detection.
Proceedings of the 2019 Federated Conference on Computer Science and Information Systems, 2019


  Loading...