default search action
Amani S. Ibrahim
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j5]Mohamed Osama, Aya Zaki-Ismail, Mohamed Almorsy Abdelrazek, John Grundy, Amani S. Ibrahim:
A Comprehensive Requirement Capturing Model Enabling the Automated Formalisation of NL Requirements. SN Comput. Sci. 4(1): 57 (2023) - 2022
- [j4]Aya Zaki-Ismail, Mohamed Osama, Mohamed Almorsy Abdelrazek, John C. Grundy, Amani S. Ibrahim:
RCM-extractor: an automated NLP-based approach for extracting a semi formal representation model from natural language requirements. Autom. Softw. Eng. 29(1): 10 (2022) - 2021
- [c24]Aya Zaki-Ismail, Mohamed Osama, Mohamed Abdelrazek, John Grundy, Amani S. Ibrahim:
RCM: Requirement Capturing Model for Automated Requirements Formalisation. MODELSWARD 2021: 110-121 - [c23]Aya Zaki-Ismail, Mohamed Osama, Mohamed Abdelrazek, John Grundy, Amani S. Ibrahim:
RCM-Extractor: Automated Extraction of a Semi Formal Representation Model from Natural Language Requirements. MODELSWARD 2021: 270-277 - [c22]Mohamed Osama, Aya Zaki-Ismail, Mohamed Abdelrazek, John Grundy, Amani S. Ibrahim:
SRCM: A Semi Formal Requirements Representation Model Enabling System Visualisation and Quality Checking. MODELSWARD 2021: 278-285 - [c21]Mohamed Osama, Aya Zaki-Ismail, Mohamed Abdelrazek, John C. Grundy, Amani S. Ibrahim:
DBRG: Description-Based Non-Quality Requirements Generator. RE 2021: 424-425 - [c20]Aya Zaki-Ismail, Mohamed Osama, Mohamed Abdelrazek, John C. Grundy, Amani S. Ibrahim:
ARF: Automatic Requirements Formalisation Tool. RE 2021: 440-441 - [c19]Mohamed Osama, Aya Zaki-Ismail, Mohamed Abdelrazek, John C. Grundy, Amani S. Ibrahim:
Enhancing NL Requirements Formalisation Using a Quality Checking Model. RE 2021: 448-449 - [c18]Aya Zaki-Ismail, Mohamed Osama, Mohamed Almorsy Abdelrazek, John C. Grundy, Amani S. Ibrahim:
CORG: A Component-Oriented Synthetic Textual Requirements Generator. REFSQ 2021: 54-70 - [c17]Aya Zaki-Ismail, Mohamed Osama, Mohamed Almorsy Abdelrazek, John C. Grundy, Amani S. Ibrahim:
Requirements Formality Levels Analysis and Transformation of Formal Notations into Semi-formal and Informal Notations (S). SEKE 2021: 303-308 - 2020
- [j3]Amani S. Ibrahim, Dhananjay R. Thiruvady, Jean-Guy Schneider, Mohamed Abdelrazek:
The Challenges of Leveraging Threat Intelligence to Stop Data Breaches. Frontiers Comput. Sci. 2: 36 (2020) - [c16]Mohamed Osama, Aya Zaki-Ismail, Mohamed Almorsy Abdelrazek, John C. Grundy, Amani S. Ibrahim:
Score-Based Automatic Detection and Resolution of Syntactic Ambiguity in Natural Language Requirements. ICSME 2020: 651-661 - [i2]Aya Zaki-Ismail, Mohamed Osama, Mohamed Abdelrazek, John Grundy, Amani S. Ibrahim:
RCM: Requirement Capturing Model for Automated Requirements Formalisation. CoRR abs/2009.14683 (2020)
2010 – 2019
- 2019
- [p1]Mohamed Abdelrazek, John C. Grundy, Amani S. Ibrahim:
Towards Self-securing Software Systems. Software Engineering for Variability Intensive Systems 2019: 119-130 - 2018
- [j2]Md. Shamsul Huda, Kevin Liu, Mohamed Abdelrazek, Amani S. Ibrahim, Sultan Alyahya, Hmood Al-Dossari, Shafiq Ahmad:
An Ensemble Oversampling Model for Class Imbalance Problem in Software Defect Prediction. IEEE Access 6: 24184-24195 (2018) - [c15]Mohamed Abdelrazek, Amani S. Ibrahim, Andrew Cain, John Grundy:
Vision: mobile ehealth learning and intervention platform. MOBILESoft@ICSE 2018: 252-256 - 2016
- [i1]Amani S. Ibrahim, James H. Hamlyn-Harris, John C. Grundy:
Emerging Security Challenges of Cloud Virtual Infrastructure. CoRR abs/1612.09059 (2016) - 2015
- [c14]Mohamed Almorsy Abdelrazek, John Grundy, Amani S. Ibrahim:
Improving Tenants' Trust in SaaS Applications Using Dynamic Security Monitors. ICECCS 2015: 70-79 - 2014
- [j1]Mohamed Almorsy, John Grundy, Amani S. Ibrahim:
Adaptable, model-driven security engineering for SaaS cloud-based applications. Autom. Softw. Eng. 21(2): 187-224 (2014) - 2013
- [c13]Mohamed Almorsy, John Grundy, Amani S. Ibrahim:
Automated software architecture security risk analysis using formalized signatures. ICSE 2013: 662-671 - 2012
- [c12]Amani S. Ibrahim, James H. Hamlyn-Harris, John Grundy, Mohamed Almorsy:
Supporting Virtualization-Aware Security Solutions Using a Systematic Approach to Overcome the Semantic Gap. IEEE CLOUD 2012: 836-843 - [c11]Mohamed Almorsy, John Grundy, Amani S. Ibrahim:
TOSSMA: A Tenant-Oriented SaaS Security Management Architecture. IEEE CLOUD 2012: 981-988 - [c10]Mohamed Almorsy, John Grundy, Amani S. Ibrahim:
MDSE@R: Model-Driven Security Engineering at Runtime. CSS 2012: 279-295 - [c9]Mohamed Almorsy, John C. Grundy, Amani S. Ibrahim:
SMURF: Supporting Multi-tenancy Using Re-aspects Framework. ICECCS 2012: 361-370 - [c8]Mohamed Almorsy, John Grundy, Amani S. Ibrahim:
Supporting automated vulnerability analysis using formalized vulnerability signatures. ASE 2012: 100-109 - [c7]Mohamed Almorsy, John Grundy, Amani S. Ibrahim:
Supporting automated software re-engineering using re-aspects. ASE 2012: 230-233 - [c6]Amani S. Ibrahim, John Grundy, James H. Hamlyn-Harris, Mohamed Almorsy:
Supporting operating system kernel data disambiguation using points-to analysis. ASE 2012: 234-237 - [c5]Amani S. Ibrahim, James H. Hamlyn-Harris, John Grundy, Mohamed Almorsy:
Identifying OS Kernel Objects for Run-Time Security Analysis. NSS 2012: 72-85 - [c4]Amani S. Ibrahim, John Grundy, James H. Hamlyn-Harris, Mohamed Almorsy:
Operating System Kernel Data Disambiguation to Support Security Analysis. NSS 2012: 263-276 - [c3]Mohamed Almorsy, John Grundy, Amani S. Ibrahim:
VAM-aaS: Online Cloud Services Security Vulnerability Analysis and Mitigation-as-a-Service. WISE 2012: 411-425 - 2011
- [c2]Mohamed Almorsy, John Grundy, Amani S. Ibrahim:
Collaboration-Based Cloud Computing Security Management Framework. IEEE CLOUD 2011: 364-371 - [c1]Amani S. Ibrahim, James H. Hamlyn-Harris, John Grundy, Mohamed Almorsy:
CloudSec: A security monitoring appliance for Virtual Machines in the IaaS cloud model. NSS 2011: 113-120
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint