default search action
Manar H. Alalfi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Lobna Abuserrieh, Manar H. Alalfi:
A Survey on Verification of Security and Safety in IoT Systems. IEEE Access 12: 138627-138645 (2024) - [c42]Bara' Nazzal, Manar H. Alalfi, James R. Cordy:
A Survey on the Verification and Validation of Artificial Pancreas Software Systems. ICSTW 2024: 1-9 - [c41]Hajra Naeem, Manar H. Alalfi:
Machine Learning for Cross-Vulnerability Prediction in Smart Contracts. ICSTW 2024: 21-28 - [c40]Jian Chen, Manar H. Alalfi, Thomas R. Dean:
Timed Model-Based Mutation Operators for Simulink Models. ICSTW 2024: 263-272 - [c39]Lobna Abuserrieh, Manar H. Alalfi:
Towards an MDRE Approach to Verify Security and Safety of Heterogeneous IoT Apps. SERP4IoT 2024: 65-72 - [c38]Sourena Khanzadeh, Manar H. Alalfi:
SolOSphere: A Framework for Gas Optimization in Solidity Smart Contracts. SANER (Companion) 2024: 35-45 - 2023
- [j9]Manar H. Alalfi, Atheer Abu Zaid, Ali Miri:
A Model-Driven-Reverse Engineering Approach for Detecting Privilege Escalation in IoT Systems. J. Object Technol. 22(1): 1-21 (2023) - [c37]Lobna Abuserrieh, Manar H. Alalfi:
Security and Safety Verification in IoT Apps. ICSME 2023: 601-605 - [c36]Sourena Khanzadeh, Noama Fatima Samreen, Manar H. Alalfi:
Optimizing Gas Consumption in Ethereum Smart Contracts: Best Practices and Techniques. QRS Companion 2023: 300-309 - [i14]Jian Chen, Manar H. Alalfi, Thomas R. Dean:
Timed Model-Based Mutation Operators for Simulink Models. CoRR abs/2301.00835 (2023) - [i13]Sourena Khanzadeh, Samad Alias Nyein Chan, Richard Valenzano, Manar H. Alalfi:
Opti Code Pro: A Heuristic Search-based Approach to Code Refactoring. CoRR abs/2305.07594 (2023) - [i12]Jian Chen, Manar H. Alalfi, Thomas R. Dean, Ramesh S.:
SimSched: A tool for Simulating Autosar Implementaion in Simulink. CoRR abs/2308.14974 (2023) - 2022
- [j8]Bara' Nazzal, Manar H. Alalfi:
An Automated Approach for Privacy Leakage Identification in IoT Apps. IEEE Access 10: 80727-80747 (2022) - [j7]Hajra Naeem, Manar H. Alalfi:
Predicting sensitive information leakage in IoT applications using flows-aware machine learning approach. Empir. Softw. Eng. 27(6): 137 (2022) - [j6]Manar H. Alalfi, Sajeda Parveen, Bara' Nazzal:
A mutation framework for evaluating security analysis tools in IoT applications. Softw. Test. Verification Reliab. 32(7) (2022) - [c35]Abdul Moiz, Manar H. Alalfi:
A survey of security vulnerabilities in Android automotive apps. EnCyCriS@ICSE 2022: 17-24 - [c34]Bara' Nazzal, Atheer Abu Zaid, Manar H. Alalfi, Altaz Valani:
Vulnerability Classification of Consumer-based IoT Software. SERP4IoT 2022: 17-24 - [i11]Hajra Naeem, Manar H. Alalfi:
Predicting sensitive information leakage in IoT applications using flows-aware machine learning approach. CoRR abs/2201.02677 (2022) - [i10]Bara' Nazzal, Manar H. Alalfi:
An Automated Approach for Privacy Leakage Identification in IoT Apps. CoRR abs/2202.02895 (2022) - [i9]Noama Fatima Samreen, Manar H. Alalfi:
VOLCANO: Detecting Vulnerabilities of Ethereum Smart Contracts Using Code Clone Analysis. CoRR abs/2203.00769 (2022) - [i8]Noama Fatima Samreen, Manar H. Alalfi:
Mining Domain Models in Ethereum DApps using Code Cloning. CoRR abs/2203.00771 (2022) - [i7]Lobna Abuserrieh, Manar H. Alalfi:
A Survey of Analysis Methods for Security and Safety verification in IoT Systems. CoRR abs/2203.01464 (2022) - [i6]Atheer Abu Zaid, Manar H. Alalfi, Ali Miri:
A Model-Driven-Engineering Approach for Detecting Privilege Escalation in IoT Systems. CoRR abs/2205.11406 (2022) - 2021
- [c33]Noama Fatima Samreen, Manar H. Alalfi:
SmartScan: An approach to detect Denial of Service Vulnerability in Ethereum Smart Contracts. WETSEB@ICSE 2021: 17-26 - [i5]Noama Fatima Samreen, Manar H. Alalfi:
SmartScan: An approach to detect Denial of Service Vulnerability in Ethereum Smart Contracts. CoRR abs/2105.02852 (2021) - [i4]Noama Fatima Samreen, Manar H. Alalfi:
Reentrancy Vulnerability Identification in Ethereum Smart Contracts. CoRR abs/2105.02881 (2021) - [i3]Noama Fatima Samreen, Manar H. Alalfi:
A Survey of Security Vulnerabilities in Ethereum Smart Contracts. CoRR abs/2105.06974 (2021) - [i2]Manar H. Alalfi, Sajeda Parveen, Bara' Nazzal:
A Mutation Framework for Evaluating Security Analysis tools in IoT Applications. CoRR abs/2110.05562 (2021) - 2020
- [c32]Noama Fatima Samreen, Manar H. Alalfi:
A survey of security vulnerabilities in ethereum smart contracts. CASCON 2020: 73-82 - [c31]Abdul Moiz, Manar H. Alalfi:
An Approach for the Identification of Information Leakage in Automotive Infotainment systems. SCAM 2020: 110-114 - [c30]Hajra Naeem, Manar H. Alalfi:
Identifying Vulnerable IoT Applications using Deep Learning. SANER 2020: 582-586 - [c29]Sajeda Parveen, Manar H. Alalfi:
A Mutation Framework for Evaluating Security Analysis Tools in IoT Applications. SANER 2020: 587-591 - [i1]Abdul Moiz, Manar H. Alalfi:
An Approach for the Identification of Information Leakage in Automotive Infotainment systems. CoRR abs/2011.04066 (2020)
2010 – 2019
- 2019
- [c28]Rahma S. Al Mahruqi, Manar H. Alalfi, Thomas R. Dean:
A semi-automated framework for migrating web applications from SQL to document oriented NoSQL database. CASCON 2019: 44-53 - [c27]Omar A. Al Harthi, Manar H. Alalfi, Thomas R. Dean:
Detection of feature interaction in dynamic scripting languages. CASCON 2019: 130-137 - [c26]Florian Schmeidl, Bara' Nazzal, Manar H. Alalfi:
Security analysis for SmartThings IoT applications. MOBILESoft@ICSE 2019: 25-29 - [c25]Atheer Abu Zaid, Manar H. Alalfi, Ali Miri:
Automated Identification of Over-Privileged SmartThings Apps. ICSME 2019: 247-251 - [c24]Mehmet Demir, Manar H. Alalfi, Ozgur Turetken, Alexander Ferworn:
Security Smells in Smart Contracts. QRS Companion 2019: 442-449 - [p1]Manar H. Alalfi, Eric J. Rapos, Andrew Stevenson, Matthew Stephan, Thomas R. Dean, James R. Cordy:
Variability Identification and Representation for Automotive Simulink Models. Automotive Systems and Software Engineering 2019: 109-139 - 2018
- [j5]Manar H. Alalfi, Elizabeth P. Antony, James R. Cordy:
An approach to clone detection in sequence diagrams and its application to security analysis. Softw. Syst. Model. 17(4): 1287-1309 (2018) - [c23]Jian Chen, Manar H. Alalfi, Thomas R. Dean, S. Ramesh:
Modeling AUTOSAR Implementations in Simulink. ECMFA 2018: 279-292 - 2016
- [j4]Jian Chen, Thomas R. Dean, Manar H. Alalfi:
Clone detection in MATLAB Stateflow models. Softw. Qual. J. 24(4): 917-946 (2016) - 2015
- [j3]Jian Chen, Manar H. Alalfi, Thomas R. Dean, Ying Zou:
Detecting Android Malware Using Clone Detection. J. Comput. Sci. Technol. 30(5): 942-956 (2015) - [c22]Eric J. Rapos, Andrew Stevenson, Manar H. Alalfi, James R. Cordy:
SimNav: Simulink navigation of model clone classes. SCAM 2015: 241-246 - 2014
- [j2]Thomas Roy Dean, Jian Chen, Manar H. Alalfi:
Clone Detection in Matlab Stateflow Models. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 63 (2014) - [c21]Manar H. Alalfi, James R. Cordy, Thomas R. Dean:
Analysis and clustering of model clones: An automotive industrial experience. CSMR-WCRE 2014: 375-378 - [c20]Manar H. Alalfi, Eric J. Rapos, Andrew Stevenson, Matthew Stephan, Thomas R. Dean, James R. Cordy:
Semi-automatic Identification and Representation of Subsystem Variability in Simulink Models. ICSME 2014: 486-490 - [c19]Matthew Stephan, Manar H. Alalfi, James R. Cordy:
Towards a Taxonomy for Simulink Model Mutations. ICST Workshops 2014: 206-215 - 2013
- [c18]Matthew Stephan, Manar H. Alalfi, Andrew Stevenson, James R. Cordy:
Using mutation analysis for a model-clone detector comparison framework. ICSE 2013: 1261-1264 - [c17]Asil A. Almonaies, Manar H. Alalfi, James R. Cordy, Thomas R. Dean:
A Framework for Migrating Web Applications to Web Services. ICWE 2013: 384-399 - [c16]Matthew Stephan, Manar H. Alalfi, James R. Cordy, Andrew Stevenson:
Evolution of Model Clones in Simulink. ME@MoDELS 2013: 40-49 - [c15]Elizabeth P. Antony, Manar H. Alalfi, James R. Cordy:
An approach to clone detection in behavioural models. WCRE 2013: 472-476 - 2012
- [c14]Manar H. Alalfi, James R. Cordy, Thomas R. Dean, Matthew Stephan, Andrew Stevenson:
Models are code too: Near-miss clone detection for Simulink models. ICSM 2012: 295-304 - [c13]Manar H. Alalfi, James R. Cordy, Thomas R. Dean:
Recovering Role-Based Access Control Security Models from Dynamic Web Applications. ICWE 2012: 121-136 - [c12]Manar H. Alalfi, James R. Cordy, Thomas R. Dean, Matthew Stephan, Andrew Stevenson:
Near-miss model clone detection for Simulink models. IWSC 2012: 78-79 - [c11]Matthew Stephan, Manar H. Alalfi, Andrew Stevenson, James R. Cordy:
Towards qualitative comparison of Simulink model clone detection approaches. IWSC 2012: 84-85 - [c10]Manar H. Alalfi, James R. Cordy, Thomas R. Dean:
Automated verification of role-based access control security models recovered from dynamic web applications. WSE 2012: 1-10 - [c9]Widd Gama, Manar H. Alalfi, James R. Cordy, Thomas R. Dean:
Normalizing object-oriented class styles in JavaScript. WSE 2012: 79-83 - 2011
- [c8]Asil A. Almonaies, Manar H. Alalfi, James R. Cordy, Thomas R. Dean:
Towards a framework for migrating web applications to web services. CASCON 2011: 229-241 - 2010
- [b1]Manar H. Alalfi:
A Verification Framework for Access Control in Dynamic Web Applications. Queen's University at Kingston, Ontario, Canada, 2010 - [c7]Manar H. Alalfi, James R. Cordy, Thomas R. Dean:
Automating Coverage Metrics for Dynamic Web Applications. CSMR 2010: 51-60 - [c6]Maryam Hasan, Eleni Stroulia, Denilson Barbosa, Manar H. Alalfi:
Analyzing natural-language artifacts of the software process. ICSM 2010: 1-5
2000 – 2009
- 2009
- [j1]Manar H. Alalfi, James R. Cordy, Thomas R. Dean:
Modelling methods for web application verification and testing: state of the art. Softw. Test. Verification Reliab. 19(4): 265-296 (2009) - [c5]Manar H. Alalfi, James R. Cordy, Thomas R. Dean:
A verification framework for access control in dynamic web applications. C3S2E 2009: 109-113 - [c4]Manar H. Alalfi, James R. Cordy, Thomas R. Dean:
Automated Reverse Engineering of UML Sequence Diagrams for Dynamic Web Applications. ICST Workshops 2009: 287-294 - [c3]Manar H. Alalfi, James R. Cordy, Thomas R. Dean:
WAFA: Fine-grained dynamic analysis of web applications. WSE 2009: 141-150 - 2008
- [c2]Manar H. Alalfi, James R. Cordy, Thomas R. Dean:
SQL2XMI: Reverse Engineering of UML-ER Diagrams from Relational Database Schemas. WCRE 2008: 187-191 - 2007
- [c1]Manar H. Alalfi, James R. Cordy, Thomas R. Dean:
A Survey of Analysis Models and Methods in Website Verification and Testing. ICWE 2007: 306-311
Coauthor Index
aka: Thomas Roy Dean
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-09 21:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint