Follow
Mohamed Abdelrazek
Mohamed Abdelrazek
Associate Professor of Software Engineering, Deakin University
Verified email at deakin.edu.au - Homepage
Title
Cited by
Cited by
Year
An analysis of the cloud computing security problem
M Abdelrazek, J Grundy, I Müller
The 2010 Asia Pacific Cloud Workshop, APSEC2010, Australia, 2010
565*2010
Collaboration-based cloud computing security management framework
M Abdelrazek, J Grundy, AS Ibrahim
2011 IEEE 4th International Conference on Cloud Computing, 364-371, 2011
263*2011
Optimal edge user allocation in edge computing with variable sized vector bin packing
P Lai, Q He, M Abdelrazek, F Chen, J Hosking, J Grundy, Y Yang
International Conference on Service-Oriented Computing, 230-245, 2018
1542018
Cloudsec: a security monitoring appliance for virtual machines in the iaas cloud model
AS Ibrahim, J Hamlyn-Harris, J Grundy, M Abdelrazek
2011 5th International Conference on Network and System Security, 113-120, 2011
1442011
Emerging security challenges of cloud virtual infrastructure
AS Ibrahim, J Hamlyn-Harris, J Grundy, M Abdelrazek
arXiv preprint arXiv:1612.09059, 2016
1022016
An ensemble oversampling model for class imbalance problem in software defect prediction
S Huda, K Liu, M Abdelrazek, A Ibrahim, S Alyahya, H Al-Dossari, ...
IEEE access 6, 24184-24195, 2018
912018
Automated software architecture security risk analysis using formalized signatures
M Abdelrazek, J Grundy, AS Ibrahim
2013 35th International Conference on Software Engineering (ICSE), 662-671, 2013
902013
Adaptable, model-driven security engineering for SaaS cloud-based applications
M Abdelrazek, J Grundy, AS Ibrahim
Automated software engineering 21 (2), 187-224, 2014
73*2014
Cost-effective app data distribution in edge computing
X Xia, F Chen, Q He, JC Grundy, M Abdelrazek, H Jin
IEEE Transactions on Parallel and Distributed Systems 32 (1), 31-44, 2020
662020
Online collaborative data caching in edge computing
X Xia, F Chen, Q He, J Grundy, M Abdelrazek, H Jin
IEEE Transactions on Parallel and Distributed Systems 32 (2), 281-294, 2020
622020
Understanding the impact of emotions on software: A case study in requirements gathering and evaluation
MK Curumsing, N Fernando, M Abdelrazek, R Vasa, K Mouzakis, ...
Journal of Systems and Software 147, 215-229, 2019
58*2019
Tossma: A tenant-oriented saas security management architecture
M Abdelrazek, J Grundy, AS Ibrahim
2012 IEEE Fifth International Conference on Cloud Computing, 981-988, 2012
57*2012
Edge user allocation with dynamic quality of service
P Lai, Q He, G Cui, X Xia, M Abdelrazek, F Chen, J Hosking, J Grundy, ...
International Conference on Service-Oriented Computing, 86-101, 2019
552019
Supporting automated vulnerability analysis using formalized vulnerability signatures
M Almorsy, J Grundy, AS Ibrahim
Proceedings of the 27th IEEE/ACM International Conference on Automated …, 2012
512012
Genomic mutations and changes in protein secondary structure and solvent accessibility of SARS-CoV-2 (COVID-19 virus)
TT Nguyen, PN Pathirana, T Nguyen, QVH Nguyen, A Bhatti, DC Nguyen, ...
Scientific Reports 11 (1), 1-16, 2021
432021
Secdsvl: A domain-specific visual language to support enterprise security modelling
M Almorsy, J Grundy
2014 23rd Australian Software Engineering Conference, 152-161, 2014
292014
Graph-based optimal data caching in edge computing
X Xia, F Chen, Q He, G Cui, P Lai, M Abdelrazek, J Grundy, H Jin
International Conference on Service-Oriented Computing, 477-493, 2019
282019
Mdse@ r: model-driven security engineering at runtime
M Almorsy, J Grundy, AS Ibrahim
International Symposium on Cyberspace Safety and Security, 279-295, 2012
252012
Origin of novel coronavirus (COVID-19): a computational biology study using artificial intelligence
TT Nguyen, M Abdelrazek, DT Nguyen, S Aryal, DT Nguyen, S Reddy, ...
BioRxiv, 2020.05. 12.091397, 2021
212021
QoE-aware user allocation in edge computing systems with dynamic QoS
P Lai, Q He, G Cui, X Xia, M Abdelrazek, F Chen, J Hosking, J Grundy, ...
Future Generation Computer Systems 112, 684-694, 2020
212020
The system can't perform the operation now. Try again later.
Articles 1–20