Amani S. Ibrahim

According to our database1, Amani S. Ibrahim authored at least 31 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A Comprehensive Requirement Capturing Model Enabling the Automated Formalisation of NL Requirements.
SN Comput. Sci., 2023

2022
RCM-extractor: an automated NLP-based approach for extracting a semi formal representation model from natural language requirements.
Autom. Softw. Eng., 2022

2021
Requirements Formality Levels Analysis and Transformation of Formal Notations into Semi-formal and Informal Notations (S).
Proceedings of the 33rd International Conference on Software Engineering and Knowledge Engineering, 2021

CORG: A Component-Oriented Synthetic Textual Requirements Generator.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2021

ARF: Automatic Requirements Formalisation Tool.
Proceedings of the 29th IEEE International Requirements Engineering Conference, 2021

Enhancing NL Requirements Formalisation Using a Quality Checking Model.
Proceedings of the 29th IEEE International Requirements Engineering Conference, 2021

DBRG: Description-Based Non-Quality Requirements Generator.
Proceedings of the 29th IEEE International Requirements Engineering Conference, 2021

RCM-Extractor: Automated Extraction of a Semi Formal Representation Model from Natural Language Requirements.
Proceedings of the 9th International Conference on Model-Driven Engineering and Software Development, 2021

RCM: Requirement Capturing Model for Automated Requirements Formalisation.
Proceedings of the 9th International Conference on Model-Driven Engineering and Software Development, 2021

SRCM: A Semi Formal Requirements Representation Model Enabling System Visualisation and Quality Checking.
Proceedings of the 9th International Conference on Model-Driven Engineering and Software Development, 2021

2020
The Challenges of Leveraging Threat Intelligence to Stop Data Breaches.
Frontiers Comput. Sci., 2020

Score-Based Automatic Detection and Resolution of Syntactic Ambiguity in Natural Language Requirements.
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2020

2019
Towards Self-securing Software Systems.
Proceedings of the Software Engineering for Variability Intensive Systems, 2019

2018
An Ensemble Oversampling Model for Class Imbalance Problem in Software Defect Prediction.
IEEE Access, 2018

Vision: mobile ehealth learning and intervention platform.
Proceedings of the 5th International Conference on Mobile Software Engineering and Systems, MOBILESoft@ICSE 2018, Gothenburg, Sweden, May 27, 2018

2016
Emerging Security Challenges of Cloud Virtual Infrastructure.
CoRR, 2016

2015
Improving Tenants' Trust in SaaS Applications Using Dynamic Security Monitors.
Proceedings of the 20th International Conference on Engineering of Complex Computer Systems, 2015

2014
Adaptable, model-driven security engineering for SaaS cloud-based applications.
Autom. Softw. Eng., 2014

2013
Automated software architecture security risk analysis using formalized signatures.
Proceedings of the 35th International Conference on Software Engineering, 2013

2012
VAM-aaS: Online Cloud Services Security Vulnerability Analysis and Mitigation-as-a-Service.
Proceedings of the Web Information Systems Engineering - WISE 2012, 2012

Identifying OS Kernel Objects for Run-Time Security Analysis.
Proceedings of the Network and System Security - 6th International Conference, 2012

Operating System Kernel Data Disambiguation to Support Security Analysis.
Proceedings of the Network and System Security - 6th International Conference, 2012

Supporting operating system kernel data disambiguation using points-to analysis.
Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, 2012

Supporting automated software re-engineering using re-aspects.
Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, 2012

Supporting automated vulnerability analysis using formalized vulnerability signatures.
Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, 2012

SMURF: Supporting Multi-tenancy Using Re-aspects Framework.
Proceedings of the 17th IEEE International Conference on Engineering of Complex Computer Systems, 2012

MDSE@R: Model-Driven Security Engineering at Runtime.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012

Supporting Virtualization-Aware Security Solutions Using a Systematic Approach to Overcome the Semantic Gap.
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012

TOSSMA: A Tenant-Oriented SaaS Security Management Architecture.
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012

2011
CloudSec: A security monitoring appliance for Virtual Machines in the IaaS cloud model.
Proceedings of the 5th International Conference on Network and System Security, 2011

Collaboration-Based Cloud Computing Security Management Framework.
Proceedings of the IEEE International Conference on Cloud Computing, 2011


  Loading...