Mamdouh Alenezi

Orcid: 0000-0001-6852-1206

According to our database1, Mamdouh Alenezi authored at least 47 papers between 2013 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Investigating the Software Engineering Roadmap for Smart City Infrastructure Development: Goals and Challenges.
CoRR, 2023

2022
Synthesizing secure software development activities for linear and agile lifecycle models.
Softw. Pract. Exp., 2022

STORE: Security Threat Oriented Requirements Engineering Methodology.
J. King Saud Univ. Comput. Inf. Sci., 2022

Multi-level Fuzzy system for usable-security assessment.
J. King Saud Univ. Comput. Inf. Sci., 2022

Hybrid Representation to Locate Vulnerable Lines of Code.
Int. J. Softw. Innov., 2022

Methodical Software Testing Course in Higher Education.
Int. J. Eng. Pedagog., 2022

Can Artificial Intelligence Transform DevOps?
CoRR, 2022

Factors Hindering the Adoption of DevOps in the Saudi Software Industry.
CoRR, 2022

Understanding Digital Government Transformation.
CoRR, 2022

Investigating Software Testability and Test cases Effectiveness.
CoRR, 2022

Software and Security Engineering in Digital Transformation.
CoRR, 2022

Factor Prioritization for Effectively Implementing DevOps in Software Development Organizations: A SWOT-AHP Approach.
Axioms, 2022

Assessment of Inflammation in Non-calcified Artery Plaques with Dynamic 18F-FDG-PET/CT: CT Alone, Does-It Detect the Vulnerable Plaque?
Proceedings of the Bioinformatics and Biomedical Engineering, 2022

2021
Monitoring People's Emotions and Symptoms from Arabic Tweets during the COVID-19 Pandemic.
Inf., 2021

A reference measurement framework of software security product quality (SPQNFSR).
IET Inf. Secur., 2021

Safeguarding Cloud Computing Infrastructure: A Security Analysis.
Comput. Syst. Sci. Eng., 2021

2020
Evaluating Performance of Software Durability through an Integrated Fuzzy-Based Symmetrical Method of ANP and TOPSIS.
Symmetry, 2020

A Unified Fuzzy-Based Symmetrical Multi-Criteria Decision-Making Method for Evaluating Sustainable-Security of Web Applications.
Symmetry, 2020

The Use of Ensemble Models for Multiple Class and Binary Class Classification for Improving Intrusion Detection Systems.
Sensors, 2020

A New Approach to Locate Software Vulnerabilities Using Code Metrics.
Int. J. Softw. Innov., 2020

On the Relationship between Software Complexity and Security.
CoRR, 2020

Evaluating the Impact of Blockchain Models for Secure and Trustworthy Electronic Healthcare Records.
IEEE Access, 2020

Deep Learning for Software Vulnerabilities Detection Using Code Metrics.
IEEE Access, 2020

The Influence of Deep Learning Algorithms Factors in Software Fault Prediction.
IEEE Access, 2020

Optimal Cooperative Offloading Scheme for Energy Efficient Multi-Access Edge Computation.
IEEE Access, 2020

Evaluating Performance of Web Application Security Through a Fuzzy Based Hybrid Multi-Criteria Decision-Making Approach: Design Tactics Perspective.
IEEE Access, 2020

SecurityGuard: An Automated Secure Coding Framework.
Proceedings of the Intelligent Technologies and Applications, 2020

Open Source Systems Bug Reports: Meta-Analysis.
Proceedings of the ICBDE '20: The 3rd International Conference on Big Data and Education, 2020

LDA Categorization of Security Bug Reports in Chromium Projects.
Proceedings of the ESSE 2020: 2020 European Symposium on Software Engineering, 2020

Software Security Specifications and Design: How Software Engineers and Practitioners Are Mixing Things up.
Proceedings of the EASE '20: Evaluation and Assessment in Software Engineering, 2020

A Comparison Study of Available Sofware Security Ontologies.
Proceedings of the EASE '20: Evaluation and Assessment in Software Engineering, 2020

2019
Security durability assessment through fuzzy analytic hierarchy process.
PeerJ Comput. Sci., 2019

An Efficient, Secure, and Queryable Encryption for NoSQL-Based Databases Hosted on Untrusted Cloud Environments.
Int. J. Inf. Secur. Priv., 2019

Measuring Security Durability of Software through Fuzzy-Based Decision-Making Process.
Int. J. Comput. Intell. Syst., 2019

Measuring the Sustainable-Security of Web Applications Through a Fuzzy-Based Integrated Approach of AHP and TOPSIS.
IEEE Access, 2019

2018
Efficient Denial of Service Attacks Detection in Wireless Sensor Networks.
J. Inf. Sci. Eng., 2018

Security Testing Framework for Web Applications.
Int. J. Softw. Innov., 2018

Using Categorical Features in Mining Bug Tracking Systems to Assign Bug Reports.
CoRR, 2018

2017
Cost Analysis of SDN/NFV Architecture over 4G Infrastructure.
Proceedings of the 8th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2017) / The 7th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2017) / Affiliated Workshops, 2017

2016
An Empirical Investigation of Security Vulnerabilities within Web Applications.
J. Univers. Comput. Sci., 2016

2015
Evolution Impact on Architecture Stability in Open-Source Projects.
Int. J. Cloud Appl. Comput., 2015

Quality of Open Source Systems from Product Metrics Perspective.
CoRR, 2015

2013
Efficient Bug Triaging Using Text Mining.
J. Softw., 2013

Towards Test Focus Selection for Integration Testing Using Method Level Software Metrics.
Proceedings of the Tenth International Conference on Information Technology: New Generations, 2013

DECOBA: Utilizing Developers Communities in Bug Assignment.
Proceedings of the 12th International Conference on Machine Learning and Applications, 2013

Bug Reports Prioritization: Which Features and Classifier to Use?
Proceedings of the 12th International Conference on Machine Learning and Applications, 2013

TRAM: An approach for assigning bug reports using their Metadata.
Proceedings of the Third International Conference on Communications and Information Technology, 2013


  Loading...