This is a preview! To use this list on your own web site
or create a new web site from it,
create a free account. The file will be added
and you will be able to edit it in the File Manager.
We will show you instructions once you've created your account.
To the site owner:
Action required! Mendeley is changing its
API. In order to keep using Mendeley with BibBase past April
14th, you need to:
renew the authorization for BibBase on Mendeley, and
update the BibBase URL
in your page the same way you did when you initially set up
this page.
@article{DBLP:journals/ijisec/KhanzadehNIAB25,
author = {Sourena Khanzadeh and
Euclides Carlos Pinto Neto and
Shahrear Iqbal and
Manar H. Alalfi and
Scott Buffett},
title = {An exploratory study on domain knowledge infusion in deep learning
for automated threat defense},
journal = {Int. J. Inf. Sec.},
volume = {24},
number = {1},
pages = {71},
year = {2025},
url = {https://doi.org/10.1007/s10207-025-00987-4},
doi = {10.1007/S10207-025-00987-4},
timestamp = {Mon, 24 Feb 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/ijisec/KhanzadehNIAB25.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/KhanzadehNIAB25a,
author = {Sourena Khanzadeh and
Euclides Carlos Pinto Neto and
Shahrear Iqbal and
Manar H. Alalfi and
Scott Buffett},
title = {Correction: An exploratory study on domain knowledge infusion in deep
learning for automated threat defense},
journal = {Int. J. Inf. Sec.},
volume = {24},
number = {3},
pages = {118},
year = {2025},
url = {https://doi.org/10.1007/s10207-025-01048-6},
doi = {10.1007/S10207-025-01048-6},
timestamp = {Wed, 14 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/ijisec/KhanzadehNIAB25a.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icst/NazzalAC24,
author = {Bara' Nazzal and
Manar H. Alalfi and
James R. Cordy},
title = {A Survey on the Verification and Validation of Artificial Pancreas
Software Systems},
booktitle = {{IEEE} International Conference on Software Testing, Verification
and Validation, {ICST} 2024 - Workshops, Toronto, ON, Canada, May
27-31, 2024},
pages = {1--9},
publisher = {{IEEE}},
year = {2024},
url = {https://doi.org/10.1109/ICSTW60967.2024.00039},
doi = {10.1109/ICSTW60967.2024.00039},
timestamp = {Tue, 01 Oct 2024 22:18:09 +0200},
biburl = {https://dblp.org/rec/conf/icst/NazzalAC24.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/serp4iot/AbuserriehA24,
author = {Lobna Abuserrieh and
Manar H. Alalfi},
title = {Towards an {MDRE} Approach to Verify Security and Safety of Heterogeneous
IoT Apps},
booktitle = {6th {IEEE/ACM} International Workshop on Software Engineering Research
{\&} Practices for the IoT, SERP4IoT@ICSE 2024, Lisbon, Portugal,
April 20, 2024},
pages = {65--72},
publisher = {{IEEE}},
year = {2024},
url = {https://doi.org/10.1145/3643794.3648289},
doi = {10.1145/3643794.3648289},
timestamp = {Sun, 19 Jan 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/serp4iot/AbuserriehA24.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/serp4iot/NazzalZAV22,
author = {Bara' Nazzal and
Atheer Abu Zaid and
Manar H. Alalfi and
Altaz Valani},
title = {Vulnerability Classification of Consumer-based IoT Software},
booktitle = {4th {IEEE/ACM} International Workshop on Software Engineering Research
and Practices for the IoT, SERP4IoT@ICSE, Pittsburgh, PA, USA, May
19, 2022},
pages = {17--24},
publisher = {{ACM}},
year = {2022},
url = {https://doi.org/10.1145/3528227.3528566},
doi = {10.1145/3528227.3528566},
timestamp = {Sun, 19 Jan 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/serp4iot/NazzalZAV22.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/MoizA20,
author = {Abdul Moiz and
Manar H. Alalfi},
title = {An Approach for the Identification of Information Leakage in Automotive
Infotainment systems},
booktitle = {20th {IEEE} International Working Conference on Source Code Analysis
and Manipulation, {SCAM} 2020, Adelaide, Australia, September 28 -
October 2, 2020},
pages = {110--114},
publisher = {{IEEE}},
year = {2020},
url = {https://doi.org/10.1109/SCAM51674.2020.00017},
doi = {10.1109/SCAM51674.2020.00017},
timestamp = {Fri, 20 Nov 2020 12:05:53 +0100},
biburl = {https://dblp.org/rec/conf/scam/MoizA20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Identifying Vulnerable IoT Applications using Deep Learning.
Naeem, H.; and Alalfi, M. H.
In Kontogiannis, K.; Khomh, F.; Chatzigeorgiou, A.; Fokaefs, M.; and Zhou, M., editor(s), 27th IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2020, London, ON, Canada, February 18-21, 2020, pages 582–586, 2020. IEEE
Paperdoilinkbibtex
5 downloads
@inproceedings{DBLP:conf/wcre/NaeemA20,
author = {Hajra Naeem and
Manar H. Alalfi},
editor = {Kostas Kontogiannis and
Foutse Khomh and
Alexander Chatzigeorgiou and
Marios{-}Eleftherios Fokaefs and
Minghui Zhou},
title = {Identifying Vulnerable IoT Applications using Deep Learning},
booktitle = {27th {IEEE} International Conference on Software Analysis, Evolution
and Reengineering, {SANER} 2020, London, ON, Canada, February 18-21,
2020},
pages = {582--586},
publisher = {{IEEE}},
year = {2020},
url = {https://doi.org/10.1109/SANER48275.2020.9054817},
doi = {10.1109/SANER48275.2020.9054817},
timestamp = {Thu, 16 Apr 2020 16:27:40 +0200},
biburl = {https://dblp.org/rec/conf/wcre/NaeemA20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cascon/MahruqiAD19,
author = {Rahma S. Al Mahruqi and
Manar H. Alalfi and
Thomas R. Dean},
editor = {Tima Pakfetrat and
Guy{-}Vincent Jourdan and
Kostas Kontogiannis and
Robert F. Enenkel},
title = {A semi-automated framework for migrating web applications from {SQL}
to document oriented NoSQL database},
booktitle = {Proceedings of the 29th Annual International Conference on Computer
Science and Software Engineering, {CASCON} 2019, Markham, Ontario,
Canada, November 4-6, 2019},
pages = {44--53},
publisher = {{ACM}},
year = {2019},
url = {https://dl.acm.org/doi/10.5555/3370272.3370277},
doi = {10.5555/3370272.3370277},
timestamp = {Wed, 04 May 2022 13:02:28 +0200},
biburl = {https://dblp.org/rec/conf/cascon/MahruqiAD19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Detection of feature interaction in dynamic scripting languages.
Harthi, O. A. A.; Alalfi, M. H.; and Dean, T. R.
In Pakfetrat, T.; Jourdan, G.; Kontogiannis, K.; and Enenkel, R. F., editor(s), Proceedings of the 29th Annual International Conference on Computer Science and Software Engineering, CASCON 2019, Markham, Ontario, Canada, November 4-6, 2019, pages 130–137, 2019. ACM
Paperdoilinkbibtex
@inproceedings{DBLP:conf/cascon/HarthiAD19,
author = {Omar A. Al Harthi and
Manar H. Alalfi and
Thomas R. Dean},
editor = {Tima Pakfetrat and
Guy{-}Vincent Jourdan and
Kostas Kontogiannis and
Robert F. Enenkel},
title = {Detection of feature interaction in dynamic scripting languages},
booktitle = {Proceedings of the 29th Annual International Conference on Computer
Science and Software Engineering, {CASCON} 2019, Markham, Ontario,
Canada, November 4-6, 2019},
pages = {130--137},
publisher = {{ACM}},
year = {2019},
url = {https://dl.acm.org/doi/10.5555/3370272.3370286},
doi = {10.5555/3370272.3370286},
timestamp = {Wed, 04 May 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/cascon/HarthiAD19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsm/ZaidAM19,
author = {Atheer Abu Zaid and
Manar H. Alalfi and
Ali Miri},
title = {Automated Identification of Over-Privileged SmartThings Apps},
booktitle = {2019 {IEEE} International Conference on Software Maintenance and Evolution,
{ICSME} 2019, Cleveland, OH, USA, September 29 - October 4, 2019},
pages = {247--251},
publisher = {{IEEE}},
year = {2019},
url = {https://doi.org/10.1109/ICSME.2019.00037},
doi = {10.1109/ICSME.2019.00037},
timestamp = {Tue, 10 Dec 2019 20:50:05 +0100},
biburl = {https://dblp.org/rec/conf/icsm/ZaidAM19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Security Smells in Smart Contracts.
Demir, M.; Alalfi, M. H.; Turetken, O.; and Ferworn, A.
In 19th IEEE International Conference on Software Quality, Reliability and Security Companion, QRS Companion 2019, Sofia, Bulgaria, July 22-26, 2019, pages 442–449, 2019. IEEE
Paperdoilinkbibtex
5 downloads
@inproceedings{DBLP:conf/qrs/DemirATF19,
author = {Mehmet Demir and
Manar H. Alalfi and
Ozgur Turetken and
Alexander Ferworn},
title = {Security Smells in Smart Contracts},
booktitle = {19th {IEEE} International Conference on Software Quality, Reliability
and Security Companion, {QRS} Companion 2019, Sofia, Bulgaria, July
22-26, 2019},
pages = {442--449},
publisher = {{IEEE}},
year = {2019},
url = {https://doi.org/10.1109/QRS-C.2019.00086},
doi = {10.1109/QRS-C.2019.00086},
timestamp = {Sun, 04 Aug 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/qrs/DemirATF19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/19/AlalfiRSSDC19,
author = {Manar H. Alalfi and
Eric J. Rapos and
Andrew Stevenson and
Matthew Stephan and
Thomas R. Dean and
James R. Cordy},
editor = {Yanja Dajsuren and
Mark van den Brand},
title = {Variability Identification and Representation for Automotive Simulink
Models},
booktitle = {Automotive Systems and Software Engineering - State of the Art and
Future Trends},
pages = {109--139},
publisher = {Springer},
year = {2019},
url = {https://doi.org/10.1007/978-3-030-12157-0\_6},
doi = {10.1007/978-3-030-12157-0\_6},
timestamp = {Sat, 09 Apr 2022 12:20:04 +0200},
biburl = {https://dblp.org/rec/books/sp/19/AlalfiRSSDC19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sosym/AlalfiAC18,
author = {Manar H. Alalfi and
Elizabeth P. Antony and
James R. Cordy},
title = {An approach to clone detection in sequence diagrams and its application
to security analysis},
journal = {Softw. Syst. Model.},
volume = {17},
number = {4},
pages = {1287--1309},
year = {2018},
url = {https://doi.org/10.1007/s10270-016-0557-6},
doi = {10.1007/S10270-016-0557-6},
timestamp = {Mon, 28 Aug 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/sosym/AlalfiAC18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Modeling AUTOSAR Implementations in Simulink.
Chen, J.; Alalfi, M. H.; Dean, T. R.; and Ramesh, S.
In Pierantonio, A.; and Trujillo, S., editor(s), Modelling Foundations and Applications - 14th European Conference, ECMFA@STAF 2018, Toulouse, France, June 26-28, 2018, Proceedings, volume 10890, of Lecture Notes in Computer Science, pages 279–292, 2018. Springer
Paperdoilinkbibtex
4 downloads
@inproceedings{DBLP:conf/ecmdafa/ChenADR18,
author = {Jian Chen and
Manar H. Alalfi and
Thomas R. Dean and
S. Ramesh},
editor = {Alfonso Pierantonio and
Salvador Trujillo},
title = {Modeling {AUTOSAR} Implementations in Simulink},
booktitle = {Modelling Foundations and Applications - 14th European Conference,
ECMFA@STAF 2018, Toulouse, France, June 26-28, 2018, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {10890},
pages = {279--292},
publisher = {Springer},
year = {2018},
url = {https://doi.org/10.1007/978-3-319-92997-2\_18},
doi = {10.1007/978-3-319-92997-2\_18},
timestamp = {Tue, 14 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/ecmdafa/ChenADR18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/ChenADZ15,
author = {Jian Chen and
Manar H. Alalfi and
Thomas R. Dean and
Ying Zou},
title = {Detecting Android Malware Using Clone Detection},
journal = {J. Comput. Sci. Technol.},
volume = {30},
number = {5},
pages = {942--956},
year = {2015},
url = {https://www.wikidata.org/entity/Q29447372},
timestamp = {Mon, 16 Sep 2019 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/jcst/ChenADZ15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
SimNav: Simulink navigation of model clone classes.
Rapos, E. J.; Stevenson, A.; Alalfi, M. H.; and Cordy, J. R.
In Godfrey, M. W.; Lo, D.; and Khomh, F., editor(s), 15th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2015, Bremen, Germany, September 27-28, 2015, pages 241–246, 2015. IEEE Computer Society
Paperdoilinkbibtex
4 downloads
@inproceedings{DBLP:conf/scam/RaposSAC15,
author = {Eric J. Rapos and
Andrew Stevenson and
Manar H. Alalfi and
James R. Cordy},
editor = {Michael W. Godfrey and
David Lo and
Foutse Khomh},
title = {SimNav: Simulink navigation of model clone classes},
booktitle = {15th {IEEE} International Working Conference on Source Code Analysis
and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015},
pages = {241--246},
publisher = {{IEEE} Computer Society},
year = {2015},
url = {https://doi.org/10.1109/SCAM.2015.7335420},
doi = {10.1109/SCAM.2015.7335420},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/scam/RaposSAC15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csmr/AlalfiCD14,
author = {Manar H. Alalfi and
James R. Cordy and
Thomas R. Dean},
editor = {Serge Demeyer and
Dave W. Binkley and
Filippo Ricca},
title = {Analysis and clustering of model clones: An automotive industrial
experience},
booktitle = {2014 Software Evolution Week - {IEEE} Conference on Software Maintenance,
Reengineering, and Reverse Engineering, {CSMR-WCRE} 2014, Antwerp,
Belgium, February 3-6, 2014},
pages = {375--378},
publisher = {{IEEE} Computer Society},
year = {2014},
url = {https://doi.org/10.1109/CSMR-WCRE.2014.6747198},
doi = {10.1109/CSMR-WCRE.2014.6747198},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/csmr/AlalfiCD14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsm/AlalfiRSSDC14,
author = {Manar H. Alalfi and
Eric J. Rapos and
Andrew Stevenson and
Matthew Stephan and
Thomas R. Dean and
James R. Cordy},
title = {Semi-automatic Identification and Representation of Subsystem Variability
in Simulink Models},
booktitle = {30th {IEEE} International Conference on Software Maintenance and Evolution,
Victoria, BC, Canada, September 29 - October 3, 2014},
pages = {486--490},
publisher = {{IEEE} Computer Society},
year = {2014},
url = {https://doi.org/10.1109/ICSME.2014.79},
doi = {10.1109/ICSME.2014.79},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/icsm/AlalfiRSSDC14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icst/StephanAC14,
author = {Matthew Stephan and
Manar H. Alalfi and
James R. Cordy},
title = {Towards a Taxonomy for Simulink Model Mutations},
booktitle = {Seventh {IEEE} International Conference on Software Testing, Verification
and Validation, {ICST} 2014 Workshops Proceedings, March 31 - April
4, 2014, Cleveland, Ohio, {USA}},
pages = {206--215},
publisher = {{IEEE} Computer Society},
year = {2014},
url = {https://doi.org/10.1109/ICSTW.2014.17},
doi = {10.1109/ICSTW.2014.17},
timestamp = {Thu, 23 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/icst/StephanAC14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/StephanASC04,
author = {Matthew Stephan and
Manar H. Alalfi and
Andrew Stevenson and
James R. Cordy},
editor = {David Notkin and
Betty H. C. Cheng and
Klaus Pohl},
title = {Using mutation analysis for a model-clone detector comparison framework},
booktitle = {35th International Conference on Software Engineering, {ICSE} '13,
San Francisco, CA, USA, May 18-26, 2013},
pages = {1261--1264},
publisher = {{IEEE} Computer Society},
year = {2013},
url = {https://doi.org/10.1109/ICSE.2013.6606693},
doi = {10.1109/ICSE.2013.6606693},
timestamp = {Thu, 23 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/icse/StephanASC04.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
A Framework for Migrating Web Applications to Web Services.
Almonaies, A. A.; Alalfi, M. H.; Cordy, J. R.; and Dean, T. R.
In Daniel, F.; Dolog, P.; and Li, Q., editor(s), Web Engineering - 13th International Conference, ICWE 2013, Aalborg, Denmark, July 8-12, 2013. Proceedings, volume 7977, of Lecture Notes in Computer Science, pages 384–399, 2013. Springer
Paperdoilinkbibtex
3 downloads
@inproceedings{DBLP:conf/icwe/AlmonaiesACD13,
author = {Asil A. Almonaies and
Manar H. Alalfi and
James R. Cordy and
Thomas R. Dean},
editor = {Florian Daniel and
Peter Dolog and
Qing Li},
title = {A Framework for Migrating Web Applications to Web Services},
booktitle = {Web Engineering - 13th International Conference, {ICWE} 2013, Aalborg,
Denmark, July 8-12, 2013. Proceedings},
series = {Lecture Notes in Computer Science},
volume = {7977},
pages = {384--399},
publisher = {Springer},
year = {2013},
url = {https://doi.org/10.1007/978-3-642-39200-9\_32},
doi = {10.1007/978-3-642-39200-9\_32},
timestamp = {Tue, 14 May 2019 10:00:53 +0200},
biburl = {https://dblp.org/rec/conf/icwe/AlmonaiesACD13.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Evolution of Model Clones in Simulink.
Stephan, M.; Alalfi, M. H.; Cordy, J. R.; and Stevenson, A.
In Pierantonio, A.; and Schätz, B., editor(s), Proceedings of the Workshop on Models and Evolution co-located with ACM/IEEE 16th International Conference on Model Driven Engineering Languages and Systems (MoDELS 2013), Miami, Florida, USA, October 1, 2013, volume 1090, of CEUR Workshop Proceedings, pages 40–49, 2013. CEUR-WS.org
Paperlinkbibtex
3 downloads
@inproceedings{DBLP:conf/models/StephanACS13,
author = {Matthew Stephan and
Manar H. Alalfi and
James R. Cordy and
Andrew Stevenson},
editor = {Alfonso Pierantonio and
Bernhard Sch{\"{a}}tz},
title = {Evolution of Model Clones in Simulink},
booktitle = {Proceedings of the Workshop on Models and Evolution co-located with
{ACM/IEEE} 16th International Conference on Model Driven Engineering
Languages and Systems (MoDELS 2013), Miami, Florida, USA, October
1, 2013},
series = {{CEUR} Workshop Proceedings},
volume = {1090},
pages = {40--49},
publisher = {CEUR-WS.org},
year = {2013},
url = {https://ceur-ws.org/Vol-1090/5.pdf},
timestamp = {Fri, 10 Mar 2023 16:22:20 +0100},
biburl = {https://dblp.org/rec/conf/models/StephanACS13.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcre/AntonyAC13,
author = {Elizabeth P. Antony and
Manar H. Alalfi and
James R. Cordy},
editor = {Ralf L{\"{a}}mmel and
Rocco Oliveto and
Romain Robbes},
title = {An approach to clone detection in behavioural models},
booktitle = {20th Working Conference on Reverse Engineering, {WCRE} 2013, Koblenz,
Germany, October 14-17, 2013},
pages = {472--476},
publisher = {{IEEE} Computer Society},
year = {2013},
url = {https://doi.org/10.1109/WCRE.2013.6671325},
doi = {10.1109/WCRE.2013.6671325},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/wcre/AntonyAC13.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsm/AlalfiCDSS12,
author = {Manar H. Alalfi and
James R. Cordy and
Thomas R. Dean and
Matthew Stephan and
Andrew Stevenson},
title = {Models are code too: Near-miss clone detection for Simulink models},
booktitle = {28th {IEEE} International Conference on Software Maintenance, {ICSM}
2012, Trento, Italy, September 23-28, 2012},
pages = {295--304},
publisher = {{IEEE} Computer Society},
year = {2012},
url = {https://doi.org/10.1109/ICSM.2012.6405285},
doi = {10.1109/ICSM.2012.6405285},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/icsm/AlalfiCDSS12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icwe/AlalfiCD12,
author = {Manar H. Alalfi and
James R. Cordy and
Thomas R. Dean},
editor = {Marco Brambilla and
Takehiro Tokuda and
Robert Tolksdorf},
title = {Recovering Role-Based Access Control Security Models from Dynamic
Web Applications},
booktitle = {Web Engineering - 12th International Conference, {ICWE} 2012, Berlin,
Germany, July 23-27, 2012. Proceedings},
series = {Lecture Notes in Computer Science},
volume = {7387},
pages = {121--136},
publisher = {Springer},
year = {2012},
url = {https://doi.org/10.1007/978-3-642-31753-8\_9},
doi = {10.1007/978-3-642-31753-8\_9},
timestamp = {Tue, 14 May 2019 10:00:53 +0200},
biburl = {https://dblp.org/rec/conf/icwe/AlalfiCD12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Near-miss model clone detection for Simulink models.
Alalfi, M. H.; Cordy, J. R.; Dean, T. R.; Stephan, M.; and Stevenson, A.
In Cordy, J. R.; Inoue, K.; Koschke, R.; Krinke, J.; and Roy, C. K., editor(s), Proceeding of the 6th International Workshop on Software Clones, IWSC 2012, Zurich, Switzerland, June 4, 2012, pages 78–79, 2012. IEEE Computer Society
Paperdoilinkbibtex
3 downloads
@inproceedings{DBLP:conf/iwsc/AlalfiCDSS12,
author = {Manar H. Alalfi and
James R. Cordy and
Thomas R. Dean and
Matthew Stephan and
Andrew Stevenson},
editor = {James R. Cordy and
Katsuro Inoue and
Rainer Koschke and
Jens Krinke and
Chanchal K. Roy},
title = {Near-miss model clone detection for Simulink models},
booktitle = {Proceeding of the 6th International Workshop on Software Clones, {IWSC}
2012, Zurich, Switzerland, June 4, 2012},
pages = {78--79},
publisher = {{IEEE} Computer Society},
year = {2012},
url = {https://doi.org/10.1109/IWSC.2012.6227873},
doi = {10.1109/IWSC.2012.6227873},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/iwsc/AlalfiCDSS12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsc/StephanASC12,
author = {Matthew Stephan and
Manar H. Alalfi and
Andrew Stevenson and
James R. Cordy},
editor = {James R. Cordy and
Katsuro Inoue and
Rainer Koschke and
Jens Krinke and
Chanchal K. Roy},
title = {Towards qualitative comparison of Simulink model clone detection approaches},
booktitle = {Proceeding of the 6th International Workshop on Software Clones, {IWSC}
2012, Zurich, Switzerland, June 4, 2012},
pages = {84--85},
publisher = {{IEEE} Computer Society},
year = {2012},
url = {https://doi.org/10.1109/IWSC.2012.6227876},
doi = {10.1109/IWSC.2012.6227876},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/iwsc/StephanASC12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wse/AlalfiCD12,
author = {Manar H. Alalfi and
James R. Cordy and
Thomas R. Dean},
editor = {Scott R. Tilley and
Damiano Distante and
Gustavo Rossi},
title = {Automated verification of role-based access control security models
recovered from dynamic web applications},
booktitle = {14th {IEEE} International Symposium on Web Systems Evolution, {WSE}
2012, Trento, Italy, September 28, 2012},
pages = {1--10},
publisher = {{IEEE} Computer Society},
year = {2012},
url = {https://doi.org/10.1109/WSE.2012.6320525},
doi = {10.1109/WSE.2012.6320525},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/wse/AlalfiCD12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wse/GamaACD12,
author = {Widd Gama and
Manar H. Alalfi and
James R. Cordy and
Thomas R. Dean},
editor = {Scott R. Tilley and
Damiano Distante and
Gustavo Rossi},
title = {Normalizing object-oriented class styles in JavaScript},
booktitle = {14th {IEEE} International Symposium on Web Systems Evolution, {WSE}
2012, Trento, Italy, September 28, 2012},
pages = {79--83},
publisher = {{IEEE} Computer Society},
year = {2012},
url = {https://doi.org/10.1109/WSE.2012.6320536},
doi = {10.1109/WSE.2012.6320536},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/wse/GamaACD12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cascon/AlmonaiesACD11,
author = {Asil A. Almonaies and
Manar H. Alalfi and
James R. Cordy and
Thomas R. Dean},
editor = {Joanna W. Ng and
Christian Couturier and
Marin Litoiu and
Eleni Stroulia},
title = {Towards a framework for migrating web applications to web services},
booktitle = {Center for Advanced Studies on Collaborative Research, {CASCON} '11,
Toronto, ON, Canada, November 7-10, 2011},
pages = {229--241},
publisher = {{IBM} / {ACM}},
year = {2011},
url = {http://dl.acm.org/citation.cfm?id=2093915},
timestamp = {Fri, 30 Nov 2018 02:24:54 +0100},
biburl = {https://dblp.org/rec/conf/cascon/AlmonaiesACD11.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/ca/Alalfi10,
author = {Manar H. Alalfi},
title = {A Verification Framework for Access Control in Dynamic Web Applications},
school = {Queen's University at Kingston, Ontario, Canada},
year = {2010},
url = {https://hdl.handle.net/1974/5651},
timestamp = {Wed, 04 May 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/phd/ca/Alalfi10.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csmr/AlalfiCD10,
author = {Manar H. Alalfi and
James R. Cordy and
Thomas R. Dean},
editor = {Rafael Capilla and
Rudolf Ferenc and
Juan C. Due{\~{n}}as},
title = {Automating Coverage Metrics for Dynamic Web Applications},
booktitle = {14th European Conference on Software Maintenance and Reengineering,
{CSMR} 2010, 15-18 March 2010, Madrid, Spain},
pages = {51--60},
publisher = {{IEEE} Computer Society},
year = {2010},
url = {https://doi.org/10.1109/CSMR.2010.21},
doi = {10.1109/CSMR.2010.21},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/csmr/AlalfiCD10.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/stvr/AlalfiCD09,
author = {Manar H. Alalfi and
James R. Cordy and
Thomas R. Dean},
title = {Modelling methods for web application verification and testing: state
of the art},
journal = {Softw. Test. Verification Reliab.},
volume = {19},
number = {4},
pages = {265--296},
year = {2009},
url = {https://doi.org/10.1002/stvr.401},
doi = {10.1002/STVR.401},
timestamp = {Wed, 01 Apr 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/stvr/AlalfiCD09.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/c3s2e/AlalfiCD09,
author = {Manar H. Alalfi and
James R. Cordy and
Thomas R. Dean},
editor = {Bipin C. Desai and
Carson Kai{-}Sang Leung and
Olga Ormandjieva},
title = {A verification framework for access control in dynamic web applications},
booktitle = {Canadian Conference on Computer Science {\&} Software Engineering,
{C3S2E} 2009, Montreal, Quebec, Canada, May 19-21, 2009, Proceedings},
series = {{ACM} International Conference Proceeding Series},
pages = {109--113},
publisher = {{ACM}},
year = {2009},
url = {https://doi.org/10.1145/1557626.1557643},
doi = {10.1145/1557626.1557643},
timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/c3s2e/AlalfiCD09.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icst/AlalfiCD09,
author = {Manar H. Alalfi and
James R. Cordy and
Thomas R. Dean},
title = {Automated Reverse Engineering of {UML} Sequence Diagrams for Dynamic
Web Applications},
booktitle = {Second International Conference on Software Testing Verification and
Validation, {ICST} 2009, Denver, Colorado, USA, April 1-4, 2009, Workshops
Proceedings},
pages = {287--294},
publisher = {{IEEE} Computer Society},
year = {2009},
url = {https://doi.org/10.1109/ICSTW.2009.8},
doi = {10.1109/ICSTW.2009.8},
timestamp = {Thu, 23 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/icst/AlalfiCD09.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wse/AlalfiCD09,
author = {Manar H. Alalfi and
James R. Cordy and
Thomas R. Dean},
editor = {Kenny Wong and
Ying Zou and
Ji Wu},
title = {{WAFA:} Fine-grained dynamic analysis of web applications},
booktitle = {Proceedings of the 11th {IEEE} International Symposium on Web Systems
Evolution, {WSE} 2009, 25-26 September 2009, Edmonton, Alberta, Canada},
pages = {141--150},
publisher = {{IEEE} Computer Society},
year = {2009},
url = {https://doi.org/10.1109/WSE.2009.5631226},
doi = {10.1109/WSE.2009.5631226},
timestamp = {Thu, 11 Aug 2022 10:18:25 +0200},
biburl = {https://dblp.org/rec/conf/wse/AlalfiCD09.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcre/AlalfiCD08,
author = {Manar H. Alalfi and
James R. Cordy and
Thomas R. Dean},
editor = {Ahmed E. Hassan and
Andy Zaidman and
Massimiliano Di Penta},
title = {{SQL2XMI:} Reverse Engineering of {UML-ER} Diagrams from Relational
Database Schemas},
booktitle = {{WCRE} 2008, Proceedings of the 15th Working Conference on Reverse
Engineering, Antwerp, Belgium, October 15-18, 2008},
pages = {187--191},
publisher = {{IEEE} Computer Society},
year = {2008},
url = {https://doi.org/10.1109/WCRE.2008.30},
doi = {10.1109/WCRE.2008.30},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/wcre/AlalfiCD08.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icwe/AlalfiCD07,
author = {Manar H. Alalfi and
James R. Cordy and
Thomas R. Dean},
editor = {Luciano Baresi and
Piero Fraternali and
Geert{-}Jan Houben},
title = {A Survey of Analysis Models and Methods in Website Verification and
Testing},
booktitle = {Web Engineering, 7th International Conference, {ICWE} 2007, Como,
Italy, July 16-20, 2007, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {4607},
pages = {306--311},
publisher = {Springer},
year = {2007},
url = {https://doi.org/10.1007/978-3-540-73597-7\_25},
doi = {10.1007/978-3-540-73597-7\_25},
timestamp = {Tue, 14 May 2019 10:00:53 +0200},
biburl = {https://dblp.org/rec/conf/icwe/AlalfiCD07.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}