default search action
Mohamed Almorsy
Person information
- affiliation: Deakin University, School of Information Technology, Geelong, VIC, Australia
- affiliation (PhD 2014): Swinburne University of Technology, Melbourne, VIC, Australia
Other persons with the same name
- Mohamed Abdelrazek 0002 — Western University, Department of Medical Biophysics, London, ON, Canada
- Mohamed Abdelrazek 0003 — Mercedes-Benz, Stuttgart, Germany (and 1 more)
- Mohamed Abdelrazek 0004 — Cardiff University, School of Medicine, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j37]Dung Nguyen, Duc Thanh Nguyen, Sridha Sridharan, Mohamed Abdelrazek, Simon Denman, Son N. Tran, Rui Zeng, Clinton Fookes:
Deep cross-domain transfer for emotion recognition via joint learning. Multim. Tools Appl. 83(8): 22455-22472 (2024) - [j36]Ahmed Mohamed Ahmed, Thanh Thi Nguyen, Mohamed Almorsy Abdelrazek, Sunil Aryal:
Reinforcement learning-based autonomous attacker to uncover computer network vulnerabilities. Neural Comput. Appl. 36(23): 14341-14360 (2024) - [j35]Stephanie Merkouris, G. Loram, Mohamed Abdelrazek, Simone N. Rodda, A. Ibrahim, Alessio Bonti, Nicki A. Dowling:
Improving the user experience of a gambling support and education website using a chatbot. Univers. Access Inf. Soc. 23(1): 213-225 (2024) - [c84]Jongkil Jay Jeong, Lu-Xing Yang, Robin Doss, Praveen Gauravaram, Zoe Wang, Mohamed Abdelrazek, Ashish Nanda, Keerthivasan Viswanathan:
POSTER: Addressing the Privacy by Use Challenges in Verifiable Credential based Digital Wallets. AsiaCCS 2024 - [c83]Zafaryab Rasool, Scott Barnett, David Willie, Stefanus Kurniawan, Sherwin Balugo, Srikanth Thudumu, Mohamed Abdelrazek:
LLMs for Test Input Generation for Semantic Applications. CAIN 2024: 160-165 - [c82]Hala Abdelkader, Mohamed Abdelrazek, Scott Barnett, Jean-Guy Schneider, Priya Rani, Rajesh Vasa:
ML-On-Rails: Safeguarding Machine Learning Models in Software Systems - A Case Study. CAIN 2024: 178-183 - [c81]Scott Barnett, Stefanus Kurniawan, Srikanth Thudumu, Zach Brannelly, Mohamed Abdelrazek:
Seven Failure Points When Engineering a Retrieval Augmented Generation System. CAIN 2024: 194-199 - [c80]Omar Haggag, John Grundy, Mohamed Abdelrazek:
An Analysis of Privacy Issues and Policies of eHealth Apps. ENASE 2024: 422-433 - [c79]Yasmeen Anjeer Alshehhi, Khlood Ahmad, Mohamed Abdelrazek, Alessio Bonti:
6DVF: A Framework for the Development and Evaluation of Mobile Data Visualisations. ENASE 2024: 555-562 - [i25]Scott Barnett, Stefanus Kurniawan, Srikanth Thudumu, Zach Brannelly, Mohamed Abdelrazek:
Seven Failure Points When Engineering a Retrieval Augmented Generation System. CoRR abs/2401.05856 (2024) - [i24]Hala Abdelkader, Mohamed Abdelrazek, Scott Barnett, Jean-Guy Schneider, Priya Rani, Rajesh Vasa:
ML-On-Rails: Safeguarding Machine Learning Models in Software Systems A Case Study. CoRR abs/2401.06513 (2024) - [i23]Zafaryab Rasool, Scott Barnett, David Willie, Stefanus Kurniawan, Sherwin Balugo, Srikanth Thudumu, Mohamed Almorsy Abdelrazek:
LLMs for Test Input Generation for Semantic Caches. CoRR abs/2401.08138 (2024) - [i22]Anupam Chaudhuri, Anj Simmons, Mohamed Abdelrazek:
Quantifying Manifolds: Do the manifolds learned by Generative Adversarial Networks converge to the real data manifold. CoRR abs/2403.05033 (2024) - [i21]Shangeetha Sivasothy, Scott Barnett, Rena Logothetis, Mohamed Abdelrazek, Zafaryab Rasool, Srikanth Thudumu, Zach Brannelly:
Large language models for generating rules, yay or nay? CoRR abs/2406.06835 (2024) - 2023
- [j34]Ben Joseph Philip, Mohamed Almorsy Abdelrazek, Scott Barnett, Alessio Bonti, John Grundy:
Toward a Unified mHealth Platform: A Survey of Current User Challenges and Expectations. IEEE Access 11: 19876-19891 (2023) - [j33]Ayman Youssef, Mohamed Abdelrazek, Chandan K. Karmakar:
Use of Ensemble Learning to Detect Buffer Overflow Exploitation. IEEE Access 11: 52009-52025 (2023) - [j32]Yasmeen Anjeer Alshehhi, Mohamed Almorsy Abdelrazek, Ben Joseph Philip, Alessio Bonti:
Understanding User Perspectives on Data Visualization in mHealth Apps: A Survey Study. IEEE Access 11: 84200-84213 (2023) - [j31]Khlood Ahmad, Mohamed Abdelrazek, Chetan Arora, Muneera Bano, John Grundy:
Requirements practices and gaps when engineering human-centered Artificial Intelligence systems. Appl. Soft Comput. 143: 110421 (2023) - [j30]Khlood Ahmad, Mohamed Abdelrazek, Chetan Arora, Arbind Agrahari Baniya, Muneera Bano, John Grundy:
Requirements engineering framework for human-centered artificial intelligence software systems. Appl. Soft Comput. 143: 110455 (2023) - [j29]Ahmed Mohamed Ahmed, Mohamed Abdelrazek, Sunil Aryal, Thanh Thi Nguyen:
An overview of Eulerian video motion magnification methods. Comput. Graph. 117: 145-163 (2023) - [j28]Khlood Ahmad, Mohamed Almorsy Abdelrazek, Chetan Arora, Muneera Bano, John C. Grundy:
Requirements engineering for artificial intelligence systems: A systematic mapping study. Inf. Softw. Technol. 158: 107176 (2023) - [j27]Mohamed Osama, Aya Zaki-Ismail, Mohamed Almorsy Abdelrazek, John Grundy, Amani S. Ibrahim:
A Comprehensive Requirement Capturing Model Enabling the Automated Formalisation of NL Requirements. SN Comput. Sci. 4(1): 57 (2023) - [j26]Xiaoyu Xia, Feifei Chen, Qiang He, Guangming Cui, John Grundy, Mohamed Abdelrazek, Athman Bouguettaya, Hai Jin:
OL-MEDC: An Online Approach for Cost-Effective Data Caching in Mobile Edge Computing Systems. IEEE Trans. Mob. Comput. 22(3): 1646-1658 (2023) - [j25]Phu Lai, Qiang He, Feifei Chen, Mohamed Almorsy Abdelrazek, John G. Hosking, John C. Grundy, Yun Yang:
Online User and Power Allocation in Dynamic NOMA-Based Mobile Edge Computing. IEEE Trans. Mob. Comput. 22(11): 6676-6689 (2023) - [c78]Ayman Youssef, Mohamed Abdelrazek, Chandan K. Karmakar:
Program Characterization for Software Exploitation Detection. ARES 2023: 77:1-77:8 - [c77]Yasmeen Anjeer Alshehhi, Ben Joseph Philip, Mohamed Abdelrazek, Alessio Bonti:
Needs and Challenges of Personal Data Visualisations in Mobile Health Apps: User Survey. BigComp 2023: 295-297 - [c76]Khlood Ahmad, Mohamed Abdelrazek, Chetan Arora, John Grundy, Muneera Bano:
Requirements Elicitation and Modelling of Artificial Intelligence Systems: An Empirical Study. ENASE 2023: 126-137 - [c75]Ben Joseph Philip, Yasmeen Anjeer Alshehhi, Mohamed Abdelrazek, Scott Barnett, Alessio Bonti, John Grundy:
mHealthSwarm: A Unified Platform for mHealth Applications. ENASE 2023: 605-612 - [c74]Yasmeen Abdullah Ali Anjeer Alshehhi, Khlood Ahmad, Mohamed Abdelrazek, Alessio Bonti:
Data-Task-Visualisation Analysis based on Top mHealth Apps. OZCHI 2023: 231-244 - [i20]Khlood Ahmad, Mohamed Almorsy Abdelrazek, Chetan Arora, Muneera Bano, John C. Grundy:
Requirements Practices and Gaps When Engineering Human-Centered Artificial Intelligence Systems. CoRR abs/2301.10404 (2023) - [i19]Khlood Ahmad, Mohamed Abdelrazek, Chetan Arora, John C. Grundy, Muneera Bano:
Requirements Elicitation and Modelling of Artificial Intelligence Systems: An Empirical Study. CoRR abs/2302.06034 (2023) - [i18]Khlood Ahmad, Mohamed Abdelrazek, Chetan Arora, Arbind Agrahari Baniya, Muneera Bano, John Grundy:
Requirements Framework for Engineering Human-centered Artificial Intelligence-Based Software Systems. CoRR abs/2303.02920 (2023) - [i17]Miao Chang, Tan Vuong, Manas Palaparthi, Lachlan Howell, Alessio Bonti, Mohamed Abdelrazek, Duc Thanh Nguyen:
An empirical study of automatic wildlife detection using drone thermal imaging and object detection. CoRR abs/2310.11257 (2023) - [i16]Chetan Arora, John Grundy, Mohamed Abdelrazek:
Advancing Requirements Engineering through Generative AI: Assessing the Role of LLMs. CoRR abs/2310.13976 (2023) - [i15]Yasmeen Anjeer Alshehhi, Khlood Ahmad, Mohamed Abdelrazek, Alessio Bonti:
6DVF: Data Visualisation Framework for mHealth Apps. CoRR abs/2311.03657 (2023) - 2022
- [j24]Aya Zaki-Ismail, Mohamed Osama, Mohamed Almorsy Abdelrazek, John C. Grundy, Amani S. Ibrahim:
RCM-extractor: an automated NLP-based approach for extracting a semi formal representation model from natural language requirements. Autom. Softw. Eng. 29(1): 10 (2022) - [j23]Omar Haggag, John Grundy, Mohamed Abdelrazek, Sherif Haggag:
A large scale analysis of mHealth app user reviews. Empir. Softw. Eng. 27(7): 196 (2022) - [j22]Linh Tran, Alessio Bonti, Lianhua Chi, Mohamed Abdelrazek, Yi-Ping Phoebe Chen:
Advanced calibration of mortality prediction on cardiovascular disease using feature-based artificial neural network. Expert Syst. Appl. 203: 117393 (2022) - [j21]Hourieh Khalajzadeh, Mohamed Abdelrazek, John C. Grundy, John G. Hosking, Qiang He:
Survey and Analysis of Current End-User Data Analytics Tool Support. IEEE Trans. Big Data 8(1): 152-165 (2022) - [j20]Phu Lai, Qiang He, John Grundy, Feifei Chen, Mohamed Abdelrazek, John G. Hosking, Yun Yang:
Cost-Effective App User Allocation in an Edge Computing Environment. IEEE Trans. Cloud Comput. 10(3): 1701-1713 (2022) - [j19]Phu Lai, Qiang He, Guangming Cui, Feifei Chen, John Grundy, Mohamed Abdelrazek, John G. Hosking, Yun Yang:
Cost-Effective User Allocation in 5G NOMA-Based Mobile Edge Computing Systems. IEEE Trans. Mob. Comput. 21(12): 4263-4278 (2022) - [j18]Xiaoyu Xia, Feifei Chen, Qiang He, Guangming Cui, John C. Grundy, Mohamed Almorsy Abdelrazek, Xiaolong Xu, Hai Jin:
Data, User and Power Allocations for Caching in Multi-Access Edge Computing. IEEE Trans. Parallel Distributed Syst. 33(5): 1144-1155 (2022) - [j17]Xiaoyu Xia, Feifei Chen, Qiang He, John C. Grundy, Mohamed Almorsy Abdelrazek, Jun Shen, Athman Bouguettaya, Hai Jin:
Formulating Cost-Effective Data Distribution Strategies Online for Edge Cache Systems. IEEE Trans. Parallel Distributed Syst. 33(10): 4270-4281 (2022) - [j16]Xiaoyu Xia, Feifei Chen, John C. Grundy, Mohamed Abdelrazek, Hai Jin, Qiang He:
Constrained App Data Caching Over Edge Server Graphs in Edge Computing Environment. IEEE Trans. Serv. Comput. 15(5): 2635-2647 (2022) - [j15]Phu Lai, Qiang He, Xiaoyu Xia, Feifei Chen, Mohamed Abdelrazek, John C. Grundy, John G. Hosking, Yun Yang:
Dynamic User Allocation in Stochastic Mobile Edge Computing Systems. IEEE Trans. Serv. Comput. 15(5): 2699-2712 (2022) - [j14]Alex Cummaudo, Rajesh Vasa, John C. Grundy, Mohamed Abdelrazek:
Requirements of API Documentation: A Case Study into Computer Vision Services. IEEE Trans. Software Eng. 48(6): 2010-2027 (2022) - [j13]Humphrey O. Obie, Dac-Thanh-Chuong Ho, Iman Avazpour, John C. Grundy, Mohamed Almorsy Abdelrazek, Tomasz Bednarz, Caslon Chua:
Gravity++: A graph-based framework for constructing interactive visualization narratives. J. Comput. Lang. 71: 101125 (2022) - [c73]Xiaoyu Xia, Feifei Chen, Qiang He, Guangming Cui, John C. Grundy, Mohamed Almorsy Abdelrazek, Fang Dong:
Formulating Interference-aware Data Delivery Strategies in Edge Storage Systems. ICPP 2022: 68:1-68:11 - [c72]Ben Joseph Philip, Mohamed Abdelrazek, Scott Barnett, Alessio Bonti, John C. Grundy:
Towards Better mHealth Apps: Understanding Current Challenges and User Expectations. MOBILESoft 2022: 33-37 - [c71]Omar Haggag, John C. Grundy, Mohamed Abdelrazek, Sherif Haggag:
Better Addressing Diverse Accessibility Issues in Emerging Apps: A Case Study using COVID-19 Apps. MOBILESoft 2022: 50-61 - [c70]Phu Lai, Qiang He, Xiaoyu Xia, Feifei Chen, Mohamed Abdelrazek, John C. Grundy, John G. Hosking, Yun Yang:
Dynamic User Allocation in Stochastic Mobile Edge Computing Systems. SERVICES 2022: 17 - [i14]Mohamed Abdelrazek, Yasmeen Anjeer Alshehhi, Alessio Bonti:
Analysis of Personal Data Visualization Reviews On mHealth Apps (short paper). CoRR abs/2202.10620 (2022) - [i13]Yasmeen Anjeer Alshehhi, Mohamed Almorsy Abdelrazek, Alessio Bonti:
Personal Data Visualisation on Mobile Devices: A Systematic Literature Review. CoRR abs/2203.01374 (2022) - [i12]Yasmeen Anjeer Alshehhi, Mohamed Abdelrazek, Alessio Bonti:
Needs and Challenges of Personal Data Visualisations in Mobile Health Apps: User Survey. CoRR abs/2209.00838 (2022) - [i11]Khlood Ahmad, Mohamed Almorsy Abdelrazek, Chetan Arora, Muneera Bano, John C. Grundy:
Requirements Engineering for Artificial Intelligence Systems: A Systematic Mapping Study. CoRR abs/2212.10693 (2022) - 2021
- [j12]Xiaoyu Xia, Feifei Chen, Qiang He, John C. Grundy, Mohamed Abdelrazek, Hai Jin:
Cost-Effective App Data Distribution in Edge Computing. IEEE Trans. Parallel Distributed Syst. 32(1): 31-44 (2021) - [j11]Xiaoyu Xia, Feifei Chen, Qiang He, John Grundy, Mohamed Abdelrazek, Hai Jin:
Online Collaborative Data Caching in Edge Computing. IEEE Trans. Parallel Distributed Syst. 32(2): 281-294 (2021) - [c69]Omar Haggag, Sherif Haggag, John C. Grundy, Mohamed Almorsy Abdelrazek:
COVID-19 vs Social Media Apps: Does Privacy Really Matter? ICSE-SEIS 2021: 48-57 - [c68]Aya Zaki-Ismail, Mohamed Osama, Mohamed Abdelrazek, John Grundy, Amani S. Ibrahim:
RCM: Requirement Capturing Model for Automated Requirements Formalisation. MODELSWARD 2021: 110-121 - [c67]Aya Zaki-Ismail, Mohamed Osama, Mohamed Abdelrazek, John Grundy, Amani S. Ibrahim:
RCM-Extractor: Automated Extraction of a Semi Formal Representation Model from Natural Language Requirements. MODELSWARD 2021: 270-277 - [c66]Mohamed Osama, Aya Zaki-Ismail, Mohamed Abdelrazek, John Grundy, Amani S. Ibrahim:
SRCM: A Semi Formal Requirements Representation Model Enabling System Visualisation and Quality Checking. MODELSWARD 2021: 278-285 - [c65]Ayman Youssef, Mohamed Abdelrazek, Chandan K. Karmakar, Zubair A. Baig:
Tracing Software Exploitation. NSS 2021: 340-352 - [c64]Khlood Ahmad, Muneera Bano, Mohamed Abdelrazek, Chetan Arora, John C. Grundy:
What's up with Requirements Engineering for Artificial Intelligence Systems? RE 2021: 1-12 - [c63]Mohamed Osama, Aya Zaki-Ismail, Mohamed Abdelrazek, John C. Grundy, Amani S. Ibrahim:
DBRG: Description-Based Non-Quality Requirements Generator. RE 2021: 424-425 - [c62]Aya Zaki-Ismail, Mohamed Osama, Mohamed Abdelrazek, John C. Grundy, Amani S. Ibrahim:
ARF: Automatic Requirements Formalisation Tool. RE 2021: 440-441 - [c61]Mohamed Osama, Aya Zaki-Ismail, Mohamed Abdelrazek, John C. Grundy, Amani S. Ibrahim:
Enhancing NL Requirements Formalisation Using a Quality Checking Model. RE 2021: 448-449 - [c60]Aya Zaki-Ismail, Mohamed Osama, Mohamed Almorsy Abdelrazek, John C. Grundy, Amani S. Ibrahim:
CORG: A Component-Oriented Synthetic Textual Requirements Generator. REFSQ 2021: 54-70 - [c59]Aya Zaki-Ismail, Mohamed Osama, Mohamed Almorsy Abdelrazek, John C. Grundy, Amani S. Ibrahim:
Requirements Formality Levels Analysis and Transformation of Formal Notations into Semi-formal and Informal Notations (S). SEKE 2021: 303-308 - [c58]Xiaoyu Xia, Feifei Chen, John C. Grundy, Mohamed Abdelrazek, Hai Jin, Qiang He:
Constrained App Data Caching over Edge Server Graphs in Edge Computing Environment. SERVICES 2021: 5 - [i10]Omar Haggag, Sherif Haggag, John Grundy, Mohamed Abdelrazek:
COVID-19 vs Social Media Apps: Does Privacy Really Matter? CoRR abs/2103.01779 (2021) - 2020
- [j10]Amani S. Ibrahim, Dhananjay R. Thiruvady, Jean-Guy Schneider, Mohamed Abdelrazek:
The Challenges of Leveraging Threat Intelligence to Stop Data Breaches. Frontiers Comput. Sci. 2: 36 (2020) - [j9]Phu Lai, Qiang He, Guangming Cui, Xiaoyu Xia, Mohamed Abdelrazek, Feifei Chen, John G. Hosking, John C. Grundy, Yun Yang:
QoE-aware user allocation in edge computing systems with dynamic QoS. Future Gener. Comput. Syst. 112: 684-694 (2020) - [j8]Xiaoyu Xia, Feifei Chen, Qiang He, Guangming Cui, Phu Lai, Mohamed Almorsy Abdelrazek, John C. Grundy, Hai Jin:
Graph-based data caching optimization for edge computing. Future Gener. Comput. Syst. 113: 228-239 (2020) - [j7]Humphrey O. Obie, Caslon Chua, Iman Avazpour, Mohamed Abdelrazek, John C. Grundy, Tomasz Bednarz:
Authoring logically sequenced visual data stories with Gravity. J. Comput. Lang. 58: 100961 (2020) - [j6]Hourieh Khalajzadeh, Andrew J. Simmons, Mohamed Abdelrazek, John C. Grundy, John G. Hosking, Qiang He:
An end-to-end model-based approach to support big data analytics development. J. Comput. Lang. 58: 100964 (2020) - [c57]Hourieh Khalajzadeh, Andrew J. Simmons, Mohamed Abdelrazek, John Grundy, John G. Hosking, Qiang He:
Visual Languages for Supporting Big Data Analytics Development. ENASE 2020: 15-26 - [c56]Hourieh Khalajzadeh, Andrew J. Simmons, Tarun Verma, Mohamed Abdelrazek, John C. Grundy, John G. Hosking, Qiang He, Prasanna Ratnakanthan, Adil Zia, Meng Law:
BiDaML in Practice: Collaborative Modeling of Big Data Analytics Application Requirements. ENASE (Selected Papers) 2020: 106-129 - [c55]Phu Lai, Qiang He, Guangming Cui, Feifei Chen, Mohamed Abdelrazek, John C. Grundy, John G. Hosking, Yun Yang:
Quality of Experience-Aware User Allocation in Edge Computing Systems: A Potential Game. ICDCS 2020: 223-233 - [c54]Jean-Guy Schneider, Peter W. Eklund, Kevin Lee, Feifei Chen, Andrew Cain, Mohamed Almorsy Abdelrazek:
Adopting industry agile practices in large-scale capstone education. ICSE (SEET) 2020: 119-129 - [c53]Hourieh Khalajzadeh, Andrew J. Simmons, Mohamed Abdelrazek, John C. Grundy, John G. Hosking, Qiang He, Prasanna Ratnakanthan, Adil Zia, Meng Law:
A practical, collaborative approach for modeling big data analytics application requirements. ICSE (Companion Volume) 2020: 256-257 - [c52]Jean-Guy Schneider, Peter W. Eklund, Kevin Lee, Feifei Chen, Andrew Cain, Mohamed Abdelrazek:
Industry Agile practices in large-scale capstone projects. ICSE (Companion Volume) 2020: 326-327 - [c51]Alex Cummaudo, Rajesh Vasa, Scott Barnett, John C. Grundy, Mohamed Abdelrazek:
Interpreting cloud computer vision pain-points: a mining study of stack overflow. ICSE 2020: 1584-1596 - [c50]Mohamed Osama, Aya Zaki-Ismail, Mohamed Almorsy Abdelrazek, John C. Grundy, Amani S. Ibrahim:
Score-Based Automatic Detection and Resolution of Syntactic Ambiguity in Natural Language Requirements. ICSME 2020: 651-661 - [c49]Xiaoyu Xia, Feifei Chen, Guangming Cui, Mohamed Almorsy Abdelrazek, John Grundy, Hai Jin, Qiang He:
Budgeted Data Caching based on k-Median in Mobile Edge Computing. ICWS 2020: 197-206 - [c48]Catherine Xiaocui Lou, Alessio Bonti, Maria Prokofieva, Mohamed Abdelrazek, Sai Midhil Chowdary Kari:
Literature Review on Visualization in Supply Chain & Decision Making. IV 2020: 746-750 - [c47]Hourieh Khalajzadeh, Tarun Verma, Andrew J. Simmons, John C. Grundy, Mohamed Abdelrazek, John G. Hosking:
User-centred tooling for modelling of big data applications. MoDELS (Companion) 2020: 7:1-7:5 - [c46]Alex Cummaudo, Scott Barnett, Rajesh Vasa, John C. Grundy, Mohamed Abdelrazek:
Beware the evolving 'intelligent' web service! an integration architecture tactic to guard AI-first components. ESEC/SIGSOFT FSE 2020: 269-280 - [c45]Hourieh Khalajzadeh, Andrew J. Simmons, Mohamed Abdelrazek, John Grundy, John G. Hosking, Qiang He:
End-User-Oriented Tool Support for Modeling Data Analytics Requirements. VL/HCC 2020: 1-4 - [c44]Humphrey O. Obie, Caslon Chua, Iman Avazpour, Mohamed Abdelrazek, John Grundy, Tomasz Bednarz:
The Effect of Narration on User Comprehension and Recall of Information Visualisations. VL/HCC 2020: 1-4 - [i9]Alex Cummaudo, Rajesh Vasa, Scott Barnett, John C. Grundy, Mohamed Abdelrazek:
Interpreting Cloud Computer Vision Pain-Points: A Mining Study of Stack Overflow. CoRR abs/2001.10130 (2020) - [i8]Alex Cummaudo, Scott Barnett, Rajesh Vasa, John C. Grundy, Mohamed Abdelrazek:
Beware the evolving 'intelligent' web service! An integration architecture tactic to guard AI-first components. CoRR abs/2005.13186 (2020) - [i7]Aya Zaki-Ismail, Mohamed Osama, Mohamed Abdelrazek, John Grundy, Amani S. Ibrahim:
RCM: Requirement Capturing Model for Automated Requirements Formalisation. CoRR abs/2009.14683 (2020) - [i6]Thanh Thi Nguyen, Hammad Tahir, Mohamed Abdelrazek, Ali Babar:
Deep Learning Methods for Credit Card Fraud Detection. CoRR abs/2012.03754 (2020) - [i5]Alex Cummaudo, Rajesh Vasa, John C. Grundy, Mohamed Almorsy Abdelrazek:
Requirements of API Documentation: A Case Study into Computer Vision Services. CoRR abs/2012.13728 (2020)
2010 – 2019
- 2019
- [j5]Maheswaree Kissoon Curumsing, Niroshinie Fernando, Mohamed Abdelrazek, Rajesh Vasa, Kon Mouzakis, John Grundy:
Emotion-oriented requirements engineering: A case study in developing a smart home system for the elderly. J. Syst. Softw. 147: 215-229 (2019) - [j4]Humphrey O. Obie, Caslon Chua, Iman Avazpour, Mohamed Abdelrazek, John Grundy, Tomasz Bednarz:
A study of the effects of narration on comprehension and memorability of visualisations. J. Comput. Lang. 52: 113-124 (2019) - [c43]Hourieh Khalajzadeh, Mohamed Abdelrazek, John Grundy, John G. Hosking, Qiang He:
BiDaML: A Suite of Visual Languages for Supporting End-User Data Analytics. BigData Congress 2019: 93-97 - [c42]Carlos Oliveira, Aldeida Aleti, Yuan-Fang Li, Mohamed Abdelrazek:
Footprints of fitness functions in search-based software testing. GECCO 2019: 1399-1407 - [c41]Alex Cummaudo, Rajesh Vasa, John C. Grundy, Mohamed Abdelrazek, Andrew Cain:
Losing Confidence in Quality: Unspoken Evolution of Computer Vision Services. ICSME 2019: 333-342 - [c40]Phu Lai, Qiang He, Guangming Cui, Xiaoyu Xia, Mohamed Abdelrazek, Feifei Chen, John G. Hosking, John C. Grundy, Yun Yang:
Edge User Allocation with Dynamic Quality of Service. ICSOC 2019: 86-101 - [c39]Xiaoyu Xia, Feifei Chen, Qiang He, Guangming Cui, Phu Lai, Mohamed Abdelrazek, John C. Grundy, Hai Jin:
Graph-Based Optimal Data Caching in Edge Computing. ICSOC 2019: 477-493 - [c38]Tomohiro Ohtake, Alex Cummaudo, Mohamed Abdelrazek, Rajesh Vasa, John C. Grundy:
Merging Intelligent API Responses Using a Proportional Representation Approach. ICWE 2019: 391-406 - [c37]Humphrey O. Obie, Caslon Chua, Iman Avazpour, Mohamed Abdelrazek, John C. Grundy, Tomasz Bednarz:
A Framework for Authoring Logically Ordered Visual Data Stories. VL/HCC 2019: 257-259 - [p1]Mohamed Abdelrazek, John C. Grundy, Amani S. Ibrahim:
Towards Self-securing Software Systems. Software Engineering for Variability Intensive Systems 2019: 119-130 - [i4]Phu Lai, Qiang He, Mohamed Abdelrazek, Feifei Chen, John G. Hosking, John C. Grundy, Yun Yang:
Optimal Edge User Allocation in Edge Computing with Variable Sized Vector Bin Packing. CoRR abs/1904.05553 (2019) - [i3]Alex Cummaudo, Rajesh Vasa, John C. Grundy, Mohamed Abdelrazek, Andrew Cain:
Losing Confidence in Quality: Unspoken Evolution of Computer Vision Services. CoRR abs/1906.07328 (2019) - [i2]Phu Lai, Qiang He, Guangming Cui, Xiaoyu Xia, Mohamed Abdelrazek, Feifei Chen, John G. Hosking, John C. Grundy, Yun Yang:
Edge User Allocation with Dynamic Quality of Service. CoRR abs/1907.11580 (2019) - 2018
- [j3]Md. Shamsul Huda, Kevin Liu, Mohamed Abdelrazek, Amani S. Ibrahim, Sultan Alyahya, Hmood Al-Dossari, Shafiq Ahmad:
An Ensemble Oversampling Model for Class Imbalance Problem in Software Defect Prediction. IEEE Access 6: 24184-24195 (2018) - [c36]Hourieh Khalajzadeh, Mohamed Abdelrazek, John Grundy, John G. Hosking, Qiang He:
A Survey of Current End-User Data Analytics Tool Support. BigData Congress 2018: 41-48 - [c35]Ahmed Falah, Lei Pan, Mohamed Abdelrazek, Robin Doss:
Identifying Drawbacks in Malicious PDF Detectors. FNSS 2018: 128-139 - [c34]John Grundy, Mohamed Abdelrazek, Maheswaree Kissoon Curumsing:
Vision: improved development of mobile ehealth applications. MOBILESoft@ICSE 2018: 219-223 - [c33]Mohamed Abdelrazek, Amani S. Ibrahim, Andrew Cain, John Grundy:
Vision: mobile ehealth learning and intervention platform. MOBILESoft@ICSE 2018: 252-256 - [c32]Phu Lai, Qiang He, Mohamed Abdelrazek, Feifei Chen, John G. Hosking, John C. Grundy, Yun Yang:
Optimal Edge User Allocation in Edge Computing with Variable Sized Vector Bin Packing. ICSOC 2018: 230-245 - [c31]Humphrey O. Obie, Caslon Chua, Iman Avazpour, Mohamed Abdelrazek, John Grundy, Tomasz Bednarz:
PedaViz: Visualising Hour-Level Pedestrian Activity. VINCI 2018: 9-16 - 2017
- [c30]Ahmed Falah, Lei Pan, Mohamed Abdelrazek:
Visual representation of penetration testing actions and skills in a technical tree model. ACSW 2017: 8:1-8:10 - [c29]Vu Viet Hoang Pham, Xiao Liu, Xi Zheng, Min Fu, Sahil Vikas Deshpande, Weidong Xia, Roger Zhou, Mohamed Abdelrazek:
PaaS - black or white: an investigation into software development model for building retail industry SaaS. ICSE (Companion Volume) 2017: 285-287 - [c28]Jian Liu, John C. Grundy, Mohamed Abdelrazek, Iman Avazpour:
Testing Environment Emulation - A Model-based Approach. MODELSWARD 2017: 112-124 - [c27]Jian Liu, John Grundy, Mohamed Abdelrazek, Iman Avazpour:
A Domain-Specific Modeling Approach for Testing Environment Emulation. MODELSWARD (Revised Selected Papers) 2017: 272-299 - [c26]Humphrey O. Obie, Caslon Chua, Iman Avazpour, Mohamed Abdelrazek, John Grundy:
Visualising melbourne pedestrian count. VL/HCC 2017: 343-344 - [c25]Antonio Martini, Simon Vajda, Rajesh Vasa, Allan Jones, Mohamed Abdelrazek, John Grundy, Jan Bosch:
Technical debt interest assessment: from issues to project. XP Workshops 2017: 9:1-9:6 - 2016
- [j2]Tuong Huan Nguyen, John C. Grundy, Mohamed Almorsy:
Ontology-based automated support for goal-use case model analysis. Softw. Qual. J. 24(3): 635-673 (2016) - [c24]Jian Liu, John C. Grundy, Iman Avazpour, Mohamed Almorsy Abdelrazek:
TeeVML: tool support for semi-automatic integration testing environment emulation. ASE 2016: 840-845 - [c23]Jian Liu, John C. Grundy, Iman Avazpour, Mohamed Abdelrazek:
A domain-specific visual modeling language for testing environment emulation. VL/HCC 2016: 143-151 - [i1]Mohamed Almorsy, John C. Grundy, Ingo Müller:
An Analysis of the Cloud Computing Security Problem. CoRR abs/1609.01107 (2016) - 2015
- [c22]Peter A. Lindsay, Sentot Kromodimoeljo, Paul A. Strooper, Mohamed Almorsy:
Automation of Test Case Generation from Behavior Tree Requirements Models. ASWEC 2015: 118-127 - [c21]Mohamed Almorsy Abdelrazek, John Grundy, Amani S. Ibrahim:
Improving Tenants' Trust in SaaS Applications Using Dynamic Security Monitors. ICECCS 2015: 70-79 - [c20]Mohamed Almorsy, John C. Grundy:
Supporting Scientists in Re-engineering Sequential Programs to Parallel Using Model-Driven Engineering. SE4HPCS@ICSE 2015: 1-8 - [c19]Tuong Huan Nguyen, John C. Grundy, Mohamed Almorsy:
Integrating goal-oriented and use case-based requirements engineering: The missing link. MoDELS 2015: 328-337 - [c18]Tuong Huan Nguyen, John C. Grundy, Mohamed Almorsy:
Rule-based extraction of goal-use case models from text. ESEC/SIGSOFT FSE 2015: 591-601 - 2014
- [j1]Mohamed Almorsy, John Grundy, Amani S. Ibrahim:
Adaptable, model-driven security engineering for SaaS cloud-based applications. Autom. Softw. Eng. 21(2): 187-224 (2014) - [c17]Mohamed Almorsy, John Grundy:
SecDSVL: A Domain-Specific Visual Language to Support Enterprise Security Modelling. Australian Software Engineering Conference 2014: 152-161 - [c16]Tuong Huan Nguyen, John C. Grundy, Mohamed Almorsy:
GUITAR: An ontology-based automated requirements analysis tool. RE 2014: 315-316 - [c15]Mohamed Almorsy, John C. Grundy, Ulf Rüegg:
HorusCML: Context-aware domain-specific visual languages designer. VL/HCC 2014: 133-136 - 2013
- [c14]Mohamed Almorsy, John Grundy, Amani S. Ibrahim:
Automated software architecture security risk analysis using formalized signatures. ICSE 2013: 662-671 - [c13]Mohamed Almorsy, John Grundy, Richard J. Sadus, Willem van Straten, David G. Barnes, Owen Kaluza:
A suite of domain-specific visual languages for scientific software application modelling. VL/HCC 2013: 91-94 - 2012
- [c12]Amani S. Ibrahim, James H. Hamlyn-Harris, John Grundy, Mohamed Almorsy:
Supporting Virtualization-Aware Security Solutions Using a Systematic Approach to Overcome the Semantic Gap. IEEE CLOUD 2012: 836-843 - [c11]Mohamed Almorsy, John Grundy, Amani S. Ibrahim:
TOSSMA: A Tenant-Oriented SaaS Security Management Architecture. IEEE CLOUD 2012: 981-988 - [c10]Mohamed Almorsy, John Grundy, Amani S. Ibrahim:
MDSE@R: Model-Driven Security Engineering at Runtime. CSS 2012: 279-295 - [c9]Mohamed Almorsy, John C. Grundy, Amani S. Ibrahim:
SMURF: Supporting Multi-tenancy Using Re-aspects Framework. ICECCS 2012: 361-370 - [c8]Mohamed Almorsy, John Grundy, Amani S. Ibrahim:
Supporting automated vulnerability analysis using formalized vulnerability signatures. ASE 2012: 100-109 - [c7]Mohamed Almorsy, John Grundy, Amani S. Ibrahim:
Supporting automated software re-engineering using re-aspects. ASE 2012: 230-233 - [c6]Amani S. Ibrahim, John Grundy, James H. Hamlyn-Harris, Mohamed Almorsy:
Supporting operating system kernel data disambiguation using points-to analysis. ASE 2012: 234-237 - [c5]Amani S. Ibrahim, James H. Hamlyn-Harris, John Grundy, Mohamed Almorsy:
Identifying OS Kernel Objects for Run-Time Security Analysis. NSS 2012: 72-85 - [c4]Amani S. Ibrahim, John Grundy, James H. Hamlyn-Harris, Mohamed Almorsy:
Operating System Kernel Data Disambiguation to Support Security Analysis. NSS 2012: 263-276 - [c3]Mohamed Almorsy, John Grundy, Amani S. Ibrahim:
VAM-aaS: Online Cloud Services Security Vulnerability Analysis and Mitigation-as-a-Service. WISE 2012: 411-425 - 2011
- [c2]Mohamed Almorsy, John Grundy, Amani S. Ibrahim:
Collaboration-Based Cloud Computing Security Management Framework. IEEE CLOUD 2011: 364-371 - [c1]Amani S. Ibrahim, James H. Hamlyn-Harris, John Grundy, Mohamed Almorsy:
CloudSec: A security monitoring appliance for Virtual Machines in the IaaS cloud model. NSS 2011: 113-120
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 20:17 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint