Mohamed Almorsy

Orcid: 0000-0003-3812-9785

Affiliations:
  • Deakin University, School of Information Technology, Geelong, VIC, Australia
  • Swinburne University of Technology, Melbourne, VIC, Australia (PhD 2014)


According to our database1, Mohamed Almorsy authored at least 125 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Improving the user experience of a gambling support and education website using a chatbot.
Univers. Access Inf. Soc., March, 2024

Deep cross-domain transfer for emotion recognition via joint learning.
Multim. Tools Appl., 2024

Quantifying Manifolds: Do the manifolds learned by Generative Adversarial Networks converge to the real data manifold.
CoRR, 2024

LLMs for Test Input Generation for Semantic Caches.
CoRR, 2024

ML-On-Rails: Safeguarding Machine Learning Models in Software Systems A Case Study.
CoRR, 2024

Seven Failure Points When Engineering a Retrieval Augmented Generation System.
CoRR, 2024

2023
An overview of Eulerian video motion magnification methods.
Comput. Graph., December, 2023

Online User and Power Allocation in Dynamic NOMA-Based Mobile Edge Computing.
IEEE Trans. Mob. Comput., November, 2023

Requirements practices and gaps when engineering human-centered Artificial Intelligence systems.
Appl. Soft Comput., August, 2023

Requirements engineering framework for human-centered artificial intelligence software systems.
Appl. Soft Comput., August, 2023

Requirements engineering for artificial intelligence systems: A systematic mapping study.
Inf. Softw. Technol., June, 2023

OL-MEDC: An Online Approach for Cost-Effective Data Caching in Mobile Edge Computing Systems.
IEEE Trans. Mob. Comput., March, 2023

A Comprehensive Requirement Capturing Model Enabling the Automated Formalisation of NL Requirements.
SN Comput. Sci., 2023

6DVF: Data Visualisation Framework for mHealth Apps.
CoRR, 2023

Advancing Requirements Engineering through Generative AI: Assessing the Role of LLMs.
CoRR, 2023

An empirical study of automatic wildlife detection using drone thermal imaging and object detection.
CoRR, 2023

Requirements Framework for Engineering Human-centered Artificial Intelligence-Based Software Systems.
CoRR, 2023

Use of Ensemble Learning to Detect Buffer Overflow Exploitation.
IEEE Access, 2023

Toward a Unified mHealth Platform: A Survey of Current User Challenges and Expectations.
IEEE Access, 2023

Understanding User Perspectives on Data Visualization in mHealth Apps: A Survey Study.
IEEE Access, 2023

mHealthSwarm: A Unified Platform for mHealth Applications.
Proceedings of the 18th International Conference on Evaluation of Novel Approaches to Software Engineering, 2023

Requirements Elicitation and Modelling of Artificial Intelligence Systems: An Empirical Study.
Proceedings of the 18th International Conference on Evaluation of Novel Approaches to Software Engineering, 2023

Needs and Challenges of Personal Data Visualisations in Mobile Health Apps: User Survey.
Proceedings of the IEEE International Conference on Big Data and Smart Computing, 2023

Program Characterization for Software Exploitation Detection.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
Gravity++: A graph-based framework for constructing interactive visualization narratives.
J. Comput. Lang., 2022

Requirements of API Documentation: A Case Study into Computer Vision Services.
IEEE Trans. Software Eng., 2022

Constrained App Data Caching Over Edge Server Graphs in Edge Computing Environment.
IEEE Trans. Serv. Comput., 2022

Dynamic User Allocation in Stochastic Mobile Edge Computing Systems.
IEEE Trans. Serv. Comput., 2022

Formulating Cost-Effective Data Distribution Strategies Online for Edge Cache Systems.
IEEE Trans. Parallel Distributed Syst., 2022

Data, User and Power Allocations for Caching in Multi-Access Edge Computing.
IEEE Trans. Parallel Distributed Syst., 2022

Cost-Effective User Allocation in 5G NOMA-Based Mobile Edge Computing Systems.
IEEE Trans. Mob. Comput., 2022

Cost-Effective App User Allocation in an Edge Computing Environment.
IEEE Trans. Cloud Comput., 2022

Survey and Analysis of Current End-User Data Analytics Tool Support.
IEEE Trans. Big Data, 2022

Advanced calibration of mortality prediction on cardiovascular disease using feature-based artificial neural network.
Expert Syst. Appl., 2022

A large scale analysis of mHealth app user reviews.
Empir. Softw. Eng., 2022

Needs and Challenges of Personal Data Visualisations in Mobile Health Apps: User Survey.
CoRR, 2022

Personal Data Visualisation on Mobile Devices: A Systematic Literature Review.
CoRR, 2022

Analysis of Personal Data Visualization Reviews On mHealth Apps (short paper).
CoRR, 2022

RCM-extractor: an automated NLP-based approach for extracting a semi formal representation model from natural language requirements.
Autom. Softw. Eng., 2022

Towards Better mHealth Apps: Understanding Current Challenges and User Expectations.
Proceedings of the 9th IEEE/ACM International Conference on Mobile Software Engineering and Systems, 2022

Better Addressing Diverse Accessibility Issues in Emerging Apps: A Case Study using COVID-19 Apps.
Proceedings of the 9th IEEE/ACM International Conference on Mobile Software Engineering and Systems, 2022

Formulating Interference-aware Data Delivery Strategies in Edge Storage Systems.
Proceedings of the 51st International Conference on Parallel Processing, 2022

2021
Cost-Effective App Data Distribution in Edge Computing.
IEEE Trans. Parallel Distributed Syst., 2021

Online Collaborative Data Caching in Edge Computing.
IEEE Trans. Parallel Distributed Syst., 2021

Requirements Formality Levels Analysis and Transformation of Formal Notations into Semi-formal and Informal Notations (S).
Proceedings of the 33rd International Conference on Software Engineering and Knowledge Engineering, 2021

CORG: A Component-Oriented Synthetic Textual Requirements Generator.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2021

ARF: Automatic Requirements Formalisation Tool.
Proceedings of the 29th IEEE International Requirements Engineering Conference, 2021

Enhancing NL Requirements Formalisation Using a Quality Checking Model.
Proceedings of the 29th IEEE International Requirements Engineering Conference, 2021

DBRG: Description-Based Non-Quality Requirements Generator.
Proceedings of the 29th IEEE International Requirements Engineering Conference, 2021

What's up with Requirements Engineering for Artificial Intelligence Systems?
Proceedings of the 29th IEEE International Requirements Engineering Conference, 2021

Tracing Software Exploitation.
Proceedings of the Network and System Security - 15th International Conference, 2021

RCM-Extractor: Automated Extraction of a Semi Formal Representation Model from Natural Language Requirements.
Proceedings of the 9th International Conference on Model-Driven Engineering and Software Development, 2021

RCM: Requirement Capturing Model for Automated Requirements Formalisation.
Proceedings of the 9th International Conference on Model-Driven Engineering and Software Development, 2021

SRCM: A Semi Formal Requirements Representation Model Enabling System Visualisation and Quality Checking.
Proceedings of the 9th International Conference on Model-Driven Engineering and Software Development, 2021

COVID-19 vs Social Media Apps: Does Privacy Really Matter?
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering: Software Engineering in Society, 2021

2020
Authoring logically sequenced visual data stories with Gravity.
J. Comput. Lang., 2020

An end-to-end model-based approach to support big data analytics development.
J. Comput. Lang., 2020

Graph-based data caching optimization for edge computing.
Future Gener. Comput. Syst., 2020

QoE-aware user allocation in edge computing systems with dynamic QoS.
Future Gener. Comput. Syst., 2020

The Challenges of Leveraging Threat Intelligence to Stop Data Breaches.
Frontiers Comput. Sci., 2020

Deep Learning Methods for Credit Card Fraud Detection.
CoRR, 2020

The Effect of Narration on User Comprehension and Recall of Information Visualisations.
Proceedings of the IEEE Symposium on Visual Languages and Human-Centric Computing, 2020

End-User-Oriented Tool Support for Modeling Data Analytics Requirements.
Proceedings of the IEEE Symposium on Visual Languages and Human-Centric Computing, 2020

Beware the evolving 'intelligent' web service! an integration architecture tactic to guard AI-first components.
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020

User-centred tooling for modelling of big data applications.
Proceedings of the MODELS '20: ACM/IEEE 23rd International Conference on Model Driven Engineering Languages and Systems, 2020

Literature Review on Visualization in Supply Chain & Decision Making.
Proceedings of the 24th International Conference on Information Visualisation, 2020

Budgeted Data Caching based on k-Median in Mobile Edge Computing.
Proceedings of the 2020 IEEE International Conference on Web Services, 2020

Score-Based Automatic Detection and Resolution of Syntactic Ambiguity in Natural Language Requirements.
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2020

Adopting industry agile practices in large-scale capstone education.
Proceedings of the ICSE-SEET 2020: 42nd International Conference on Software Engineering, Software Engineering Education and Training, Seoul, South Korea, 27 June, 2020

Industry Agile practices in large-scale capstone projects.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Companion Volume, Seoul, South Korea, 27 June, 2020

A practical, collaborative approach for modeling big data analytics application requirements.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Companion Volume, Seoul, South Korea, 27 June, 2020

Interpreting cloud computer vision pain-points: a mining study of stack overflow.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

Quality of Experience-Aware User Allocation in Edge Computing Systems: A Potential Game.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

BiDaML in Practice: Collaborative Modeling of Big Data Analytics Application Requirements.
Proceedings of the Evaluation of Novel Approaches to Software Engineering, 2020

Visual Languages for Supporting Big Data Analytics Development.
Proceedings of the 15th International Conference on Evaluation of Novel Approaches to Software Engineering, 2020

2019
A study of the effects of narration on comprehension and memorability of visualisations.
J. Comput. Lang., 2019

Emotion-oriented requirements engineering: A case study in developing a smart home system for the elderly.
J. Syst. Softw., 2019

A Framework for Authoring Logically Ordered Visual Data Stories.
Proceedings of the 2019 IEEE Symposium on Visual Languages and Human-Centric Computing, 2019

Merging Intelligent API Responses Using a Proportional Representation Approach.
Proceedings of the Web Engineering - 19th International Conference, 2019

Graph-Based Optimal Data Caching in Edge Computing.
Proceedings of the Service-Oriented Computing - 17th International Conference, 2019

Edge User Allocation with Dynamic Quality of Service.
Proceedings of the Service-Oriented Computing - 17th International Conference, 2019

Losing Confidence in Quality: Unspoken Evolution of Computer Vision Services.
Proceedings of the 2019 IEEE International Conference on Software Maintenance and Evolution, 2019

Footprints of fitness functions in search-based software testing.
Proceedings of the Genetic and Evolutionary Computation Conference, 2019

BiDaML: A Suite of Visual Languages for Supporting End-User Data Analytics.
Proceedings of the 2019 IEEE International Congress on Big Data, 2019

Towards Self-securing Software Systems.
Proceedings of the Software Engineering for Variability Intensive Systems, 2019

2018
An Ensemble Oversampling Model for Class Imbalance Problem in Software Defect Prediction.
IEEE Access, 2018

PedaViz: Visualising Hour-Level Pedestrian Activity.
Proceedings of the 11th International Symposium on Visual Information Communication and Interaction, 2018

Optimal Edge User Allocation in Edge Computing with Variable Sized Vector Bin Packing.
Proceedings of the Service-Oriented Computing - 16th International Conference, 2018

Vision: improved development of mobile ehealth applications.
Proceedings of the 5th International Conference on Mobile Software Engineering and Systems, MOBILESoft@ICSE 2018, Gothenburg, Sweden, May 27, 2018

Vision: mobile ehealth learning and intervention platform.
Proceedings of the 5th International Conference on Mobile Software Engineering and Systems, MOBILESoft@ICSE 2018, Gothenburg, Sweden, May 27, 2018

Identifying Drawbacks in Malicious PDF Detectors.
Proceedings of the Future Network Systems and Security - 4th International Conference, 2018

A Survey of Current End-User Data Analytics Tool Support.
Proceedings of the 2018 IEEE International Congress on Big Data, 2018

2017
Technical debt interest assessment: from issues to project.
Proceedings of the XP2017 Scientific Workshops, Cologne, Germany, May 22 - 26, 2017, 2017

Visualising melbourne pedestrian count.
Proceedings of the 2017 IEEE Symposium on Visual Languages and Human-Centric Computing, 2017

A Domain-Specific Modeling Approach for Testing Environment Emulation.
Proceedings of the Model-Driven Engineering and Software Development, 2017

Testing Environment Emulation - A Model-based Approach.
Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development, 2017

PaaS - black or white: an investigation into software development model for building retail industry SaaS.
Proceedings of the 39th International Conference on Software Engineering, 2017

Visual representation of penetration testing actions and skills in a technical tree model.
Proceedings of the Australasian Computer Science Week Multiconference, 2017

2016
Ontology-based automated support for goal-use case model analysis.
Softw. Qual. J., 2016

An Analysis of the Cloud Computing Security Problem.
CoRR, 2016

A domain-specific visual modeling language for testing environment emulation.
Proceedings of the 2016 IEEE Symposium on Visual Languages and Human-Centric Computing, 2016

TeeVML: tool support for semi-automatic integration testing environment emulation.
Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, 2016

2015
Rule-based extraction of goal-use case models from text.
Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, 2015

Integrating goal-oriented and use case-based requirements engineering: The missing link.
Proceedings of the 18th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems, 2015

Supporting Scientists in Re-engineering Sequential Programs to Parallel Using Model-Driven Engineering.
Proceedings of the 1st IEEE/ACM International Workshop on Software Engineering for High Performance Computing in Science, 2015

Improving Tenants' Trust in SaaS Applications Using Dynamic Security Monitors.
Proceedings of the 20th International Conference on Engineering of Complex Computer Systems, 2015

Automation of Test Case Generation from Behavior Tree Requirements Models.
Proceedings of the 24th Australasian Software Engineering Conference, 2015

2014
Adaptable, model-driven security engineering for SaaS cloud-based applications.
Autom. Softw. Eng., 2014

HorusCML: Context-aware domain-specific visual languages designer.
Proceedings of the IEEE Symposium on Visual Languages and Human-Centric Computing, 2014

GUITAR: An ontology-based automated requirements analysis tool.
Proceedings of the IEEE 22nd International Requirements Engineering Conference, 2014

SecDSVL: A Domain-Specific Visual Language to Support Enterprise Security Modelling.
Proceedings of the 23rd Australian Software Engineering Conference, 2014

2013
A suite of domain-specific visual languages for scientific software application modelling.
Proceedings of the 2013 IEEE Symposium on Visual Languages and Human Centric Computing, 2013

Automated software architecture security risk analysis using formalized signatures.
Proceedings of the 35th International Conference on Software Engineering, 2013

2012
VAM-aaS: Online Cloud Services Security Vulnerability Analysis and Mitigation-as-a-Service.
Proceedings of the Web Information Systems Engineering - WISE 2012, 2012

Identifying OS Kernel Objects for Run-Time Security Analysis.
Proceedings of the Network and System Security - 6th International Conference, 2012

Operating System Kernel Data Disambiguation to Support Security Analysis.
Proceedings of the Network and System Security - 6th International Conference, 2012

Supporting operating system kernel data disambiguation using points-to analysis.
Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, 2012

Supporting automated software re-engineering using re-aspects.
Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, 2012

Supporting automated vulnerability analysis using formalized vulnerability signatures.
Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, 2012

SMURF: Supporting Multi-tenancy Using Re-aspects Framework.
Proceedings of the 17th IEEE International Conference on Engineering of Complex Computer Systems, 2012

MDSE@R: Model-Driven Security Engineering at Runtime.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012

Supporting Virtualization-Aware Security Solutions Using a Systematic Approach to Overcome the Semantic Gap.
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012

TOSSMA: A Tenant-Oriented SaaS Security Management Architecture.
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012

2011
CloudSec: A security monitoring appliance for Virtual Machines in the IaaS cloud model.
Proceedings of the 5th International Conference on Network and System Security, 2011

Collaboration-Based Cloud Computing Security Management Framework.
Proceedings of the IEEE International Conference on Cloud Computing, 2011


  Loading...