Mohamed Abdelrazek
Mohamed Abdelrazek
Associate Professor of Software Engineering, Deakin University
Verified email at deakin.edu.au - Homepage
Title
Cited by
Cited by
Year
. An analysis of the cloud computing security problem." the proc. of the 2010 Asia Pacific Cloud Workshop
M Almorsy, J Grundy, I Müller
Colocated with APSEC2010, Australia, 2010
469*2010
Collaboration-based cloud computing security management framework
M Almorsy, J Grundy, AS Ibrahim
2011 IEEE 4th International Conference on Cloud Computing, 364-371, 2011
2302011
Cloudsec: a security monitoring appliance for virtual machines in the iaas cloud model
AS Ibrahim, J Hamlyn-Harris, J Grundy, M Almorsy
2011 5th International Conference on Network and System Security, 113-120, 2011
1272011
Emerging security challenges of cloud virtual infrastructure
AS Ibrahim, J Hamlyn-Harris, J Grundy
arXiv preprint arXiv:1612.09059, 2016
852016
Automated software architecture security risk analysis using formalized signatures
M Almorsy, J Grundy, AS Ibrahim
2013 35th International Conference on Software Engineering (ICSE), 662-671, 2013
622013
Adaptable, model-driven security engineering for SaaS cloud-based applications
M Almorsy, J Grundy, AS Ibrahim
Automated software engineering 21 (2), 187-224, 2014
612014
Tossma: A tenant-oriented saas security management architecture
M Almorsy, J Grundy, AS Ibrahim
2012 IEEE Fifth International Conference on Cloud Computing, 981-988, 2012
542012
Optimal edge user allocation in edge computing with variable sized vector bin packing
P Lai, Q He, M Abdelrazek, F Chen, J Hosking, J Grundy, Y Yang
International Conference on Service-Oriented Computing, 230-245, 2018
412018
Supporting automated vulnerability analysis using formalized vulnerability signatures
M Almorsy, J Grundy, AS Ibrahim
Proceedings of the 27th IEEE/ACM International Conference on Automated …, 2012
412012
An ensemble oversampling model for class imbalance problem in software defect prediction
S Huda, K Liu, M Abdelrazek, A Ibrahim, S Alyahya, H Al-Dossari, ...
IEEE access 6, 24184-24195, 2018
352018
Secdsvl: A domain-specific visual language to support enterprise security modelling
M Almorsy, J Grundy
2014 23rd Australian Software Engineering Conference, 152-161, 2014
242014
Mdse@ r: model-driven security engineering at runtime
M Almorsy, J Grundy, AS Ibrahim
Cyberspace Safety and Security, 279-295, 2012
232012
Understanding the impact of emotions on software: A case study in requirements gathering and evaluation
MK Curumsing, N Fernando, M Abdelrazek, R Vasa, K Mouzakis, ...
Journal of Systems and Software 147, 215-229, 2019
15*2019
Smurf: Supporting multi-tenancy using re-aspects framework
M Almorsy, J Grundy, AS Ibrahim
2012 IEEE 17th International Conference on Engineering of Complex Computer …, 2012
142012
GUITAR: An ontology-based automated requirements analysis tool
TH Nguyen, J Grundy, M Almorsy
2014 IEEE 22nd International Requirements Engineering Conference (RE), 315-316, 2014
132014
VAM-aaS: online cloud services security vulnerability analysis and mitigation-as-a-service
M Almorsy, J Grundy, AS Ibrahim
International Conference on Web Information Systems Engineering, 411-425, 2012
132012
A new standard security policy language
M Al-Morsy, HM Faheem
IEEE Potentials 28 (2), 19-26, 2009
132009
Ontology-based automated support for goal–use case model analysis
TH Nguyen, JC Grundy, M Almorsy
Software quality journal 24 (3), 635-673, 2016
112016
Rule-based extraction of goal-use case models from text
TH Nguyen, J Grundy, M Almorsy
Proceedings of the 2015 10th Joint Meeting on Foundations of Software …, 2015
112015
Edge user allocation with dynamic quality of service
P Lai, Q He, G Cui, X Xia, M Abdelrazek, F Chen, J Hosking, J Grundy, ...
International Conference on Service-Oriented Computing, 86-101, 2019
92019
The system can't perform the operation now. Try again later.
Articles 1–20