Mohammad El-Ramly

Orcid: 0000-0002-5076-3829

According to our database1, Mohammad El-Ramly authored at least 27 papers between 1999 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
The Presence, Trends, and Causes of Security Vulnerabilities in Operating Systems of IoT's Low-End Devices.
Sensors, 2021

2019
Behavio2Auth: Sensor-based Behavior Biometric Authentication for Smartphones.
Proceedings of the 6th Annual International Conference on Arab Women in Computing, 2019

Investigating the Use of Deep Neural Networks for Software Defect Prediction.
Proceedings of the 16th IEEE/ACS International Conference on Computer Systems and Applications, 2019

Beware of the Vulnerability! How Vulnerable are GitHub's Most Popular PHP Applications?
Proceedings of the 16th IEEE/ACS International Conference on Computer Systems and Applications, 2019

2013
Runtime Monitoring of SOA Applications: Importance, Implementations and Challenges.
Proceedings of the Seventh IEEE International Symposium on Service-Oriented System Engineering, 2013

2009
Legacy Systems Interaction Reengineering.
Proceedings of the Human-Centered Software Engineering, 2009

2008
Architectural Transformations: From Legacy to Three-Tier and Services.
Proceedings of the Software Evolution, 2008

2007
Architecture Migration Driven by Code Categorization.
Proceedings of the Software Architecture, First European Conference, 2007

2006
Experience in teaching a software reengineering course.
Proceedings of the 28th International Conference on Software Engineering (ICSE 2006), 2006

Similarity in Programs.
Proceedings of the Duplication, Redundancy, and Similarity in Software, 23.07., 2006

Rule-based Model Extraction from Source Code.
Proceedings of the Aspects For Legacy Applications, 26.07. - 29.07.2006, 2006

An Experiment in Automatic Conversion of Legacy Java Programs to C#.
Proceedings of the 2006 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2006), 2006

2005
The LAN-simulation: A Refactoring Teaching Example.
Proceedings of the 8th International Workshop on Principles of Software Evolution (IWPSE 2005), 2005

Forms2Net - Migrating Oracle Forms to Microsoft .NET.
Proceedings of the Generative and Transformational Techniques in Software Engineering, 2005

Experiences in Teaching Program Transformation for Software Reengineering.
Proceedings of the Transformation Techniques in Software Engineering, 17.-22. April 2005, 2005

2004
Analysis of Web-usage behavior for focused Web sites: a case study.
J. Softw. Maintenance Res. Pract., 2004

Mining Software Usage Data.
Proceedings of the 1st International Workshop on Mining Software Repositories, 2004

Case Studies.
Proceedings of the Model-Based Testing of Reactive Systems, 2004

2003
User Interface Reverse Engineering in Support of Interface Migration to the Web.
Autom. Softw. Eng., 2003

2002
Understanding Web Usage for Dynamic Web-Site Adaptation: A Case Study.
Proceedings of the 4th International Workshop on Web Site Evolution (WSE 2002), 2002

Recovering software requirements from system-user interaction traces.
Proceedings of the 14th international conference on Software engineering and knowledge engineering, 2002

From run-time behavior to usage scenarios: an interaction-pattern mining approach.
Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2002

Mining System-User Interaction Traces for Use Case Models.
Proceedings of the 10th International Workshop on Program Comprehension (IWPC 2002), 2002

From Legacy to Web through Interaction Modeling.
Proceedings of the 18th International Conference on Software Maintenance (ICSM 2002), 2002

2001
Modeling the System-User Dialog Using Interaction Traces.
Proceedings of the Eighth Working Conference on Reverse Engineering, 2001

2000
Legacy systems migration in CelLEST.
Proceedings of the 22nd International Conference on on Software Engineering, 2000

1999
Reverse Engineering Legacy Interfaces: An Interaction-Driven Approach.
Proceedings of the Sixth Working Conference on Reverse Engineering, 1999


  Loading...