default search action
Mamdouh Alenezi
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j28]Mohammed Zagane, Mamdouh Alenezi:
Enhancing Software Co-Change Prediction: Leveraging Hybrid Approaches for Improved Accuracy. IEEE Access 12: 68441-68452 (2024) - [c12]Mohammed Akour, Mamdouh Alenezi, Osama Al Qasem:
Enhancing Software Fault Detection with Deep Reinforcement Learning: A Q-Learning Approach. ICSCA 2024: 97-101 - 2023
- [i10]Mamdouh Alenezi:
Investigating the Software Engineering Roadmap for Smart City Infrastructure Development: Goals and Challenges. CoRR abs/2305.05574 (2023) - 2022
- [j27]Noor Mohammed Noorani, Abu Taha Zamani, Mamdouh Alenezi, Mohammad Shameem, Priyanka Singh:
Factor Prioritization for Effectively Implementing DevOps in Software Development Organizations: A SWOT-AHP Approach. Axioms 11(10): 498 (2022) - [j26]Mamdouh Alenezi, Mohammad Akour:
Methodical Software Testing Course in Higher Education. Int. J. Eng. Pedagog. 12(1) (2022) - [j25]Mohammed Zagane, Mamdouh Alenezi, Mustapha Kamel Abdi:
Hybrid Representation to Locate Vulnerable Lines of Code. Int. J. Softw. Innov. 10(1): 1-19 (2022) - [j24]Md Tarique Jamal Ansari, Dhirendra Pandey, Mamdouh Alenezi:
STORE: Security Threat Oriented Requirements Engineering Methodology. J. King Saud Univ. Comput. Inf. Sci. 34(2): 191-203 (2022) - [j23]Alka Agrawal, Mamdouh Alenezi, Suhel Ahmad Khan, Rajeev Kumar, Raees Ahmad Khan:
Multi-level Fuzzy system for usable-security assessment. J. King Saud Univ. Comput. Inf. Sci. 34(3): 657-665 (2022) - [j22]Mamdouh Alenezi, Hamid Abdul Basit, Maham Anwar Beg, Muhammad Saad Shaukat:
Synthesizing secure software development activities for linear and agile lifecycle models. Softw. Pract. Exp. 52(6): 1426-1453 (2022) - [c11]Mamdouh Alenezi, Abdelouahed Khalil, Tamás Fülöp, Éric Turcotte, M'hamed Bentourkia:
Assessment of Inflammation in Non-calcified Artery Plaques with Dynamic 18F-FDG-PET/CT: CT Alone, Does-It Detect the Vulnerable Plaque? IWBBIO (1) 2022: 184-196 - [i9]Mamdouh Alenezi:
Software and Security Engineering in Digital Transformation. CoRR abs/2201.01359 (2022) - [i8]Mamdouh Alenezi:
Investigating Software Testability and Test cases Effectiveness. CoRR abs/2201.10090 (2022) - [i7]Mamdouh Alenezi:
Understanding Digital Government Transformation. CoRR abs/2202.01797 (2022) - [i6]Mamdouh Alenezi:
Factors Hindering the Adoption of DevOps in the Saudi Software Industry. CoRR abs/2204.09638 (2022) - [i5]Mamdouh Alenezi, Mohammad Zarour, Mohammad Akour:
Can Artificial Intelligence Transform DevOps? CoRR abs/2206.00225 (2022) - 2021
- [j21]Mamdouh Alenezi:
Safeguarding Cloud Computing Infrastructure: A Security Analysis. Comput. Syst. Sci. Eng. 37(2): 159-167 (2021) - [j20]Khalid T. Al-Sarayreh, Mamdouh Alenezi, Mohammad Zarour, Kenza Meridji:
A reference measurement framework of software security product quality (SPQNFSR). IET Inf. Secur. 15(1): 23-37 (2021) - [j19]Ali Al-Laith, Mamdouh Alenezi:
Monitoring People's Emotions and Symptoms from Arabic Tweets during the COVID-19 Pandemic. Inf. 12(2): 86 (2021) - 2020
- [j18]Mamdouh Alenezi, Alka Agrawal, Rajeev Kumar, Raees Ahmad Khan:
Evaluating Performance of Web Application Security Through a Fuzzy Based Hybrid Multi-Criteria Decision-Making Approach: Design Tactics Perspective. IEEE Access 8: 25543-25556 (2020) - [j17]Joseph Henry Anajemba, Tang Yue, Celestine Iwendi, Mamdouh Alenezi, Mohit Mittal:
Optimal Cooperative Offloading Scheme for Energy Efficient Multi-Access Edge Computation. IEEE Access 8: 53931-53941 (2020) - [j16]Osama Al Qasem, Mohammed Akour, Mamdouh Alenezi:
The Influence of Deep Learning Algorithms Factors in Software Fault Prediction. IEEE Access 8: 63945-63960 (2020) - [j15]Mohammed Zagane, Mustapha Kamel Abdi, Mamdouh Alenezi:
Deep Learning for Software Vulnerabilities Detection Using Code Metrics. IEEE Access 8: 74562-74570 (2020) - [j14]Mohammad Zarour, Md Tarique Jamal Ansari, Mamdouh Alenezi, Amal Krishna Sarkar, Mohd Faizan, Alka Agrawal, Rajeev Kumar, Raees Ahmad Khan:
Evaluating the Impact of Blockchain Models for Secure and Trustworthy Electronic Healthcare Records. IEEE Access 8: 157959-157973 (2020) - [j13]Mohammed Zagane, Mustapha Kamel Abdi, Mamdouh Alenezi:
A New Approach to Locate Software Vulnerabilities Using Code Metrics. Int. J. Softw. Innov. 8(3): 82-95 (2020) - [j12]Celestine Iwendi, Suleman Khan, Joseph Henry Anajemba, Mohit Mittal, Mamdouh Alenezi, Mamoun Alazab:
The Use of Ensemble Models for Multiple Class and Binary Class Classification for Improving Intrusion Detection Systems. Sensors 20(9): 2559 (2020) - [j11]Alka Agrawal, Mamdouh Alenezi, Rajeev Kumar, Raees Ahmad Khan:
A Unified Fuzzy-Based Symmetrical Multi-Criteria Decision-Making Method for Evaluating Sustainable-Security of Web Applications. Symmetry 12(3): 448 (2020) - [j10]Suhel Ahmad Khan, Mamdouh Alenezi, Alka Agrawal, Rajeev Kumar, Raees Ahmad Khan:
Evaluating Performance of Software Durability through an Integrated Fuzzy-Based Symmetrical Method of ANP and TOPSIS. Symmetry 12(4): 493 (2020) - [c10]Mohammad Zarour, Mamdouh Alenezi, Khalid Alsarayrah:
Software Security Specifications and Design: How Software Engineers and Practitioners Are Mixing Things up. EASE 2020: 451-456 - [c9]Mamdouh Alenezi, Hamid Abdul Basit, Faraz Idris Khan, Maham Anwar Beg:
A Comparison Study of Available Sofware Security Ontologies. EASE 2020: 499-504 - [c8]Wajdi Aljedaani, Yasir Javed, Mamdouh Alenezi:
LDA Categorization of Security Bug Reports in Chromium Projects. ESSE 2020: 154-161 - [c7]Wajdi Aljedaani, Yasir Javed, Mamdouh Alenezi:
Open Source Systems Bug Reports: Meta-Analysis. ICBDE 2020: 43-49 - [c6]Yasir Javed, Qasim Ali Arain, Mamdouh Alenezi:
SecurityGuard: An Automated Secure Coding Framework. INTAP 2020: 303-310 - [i4]Mamdouh Alenezi, Mohammad Zarour:
On the Relationship between Software Complexity and Security. CoRR abs/2002.07135 (2020)
2010 – 2019
- 2019
- [j9]Alka Agrawal, Mamdouh Alenezi, Rajeev Kumar, Raees Ahmad Khan:
Measuring the Sustainable-Security of Web Applications Through a Fuzzy-Based Integrated Approach of AHP and TOPSIS. IEEE Access 7: 153936-153951 (2019) - [j8]Rajeev Kumar, Mohammad Zarour, Mamdouh Alenezi, Alka Agrawal, Raees Ahmad Khan:
Measuring Security Durability of Software through Fuzzy-Based Decision-Making Process. Int. J. Comput. Intell. Syst. 12(2): 627-642 (2019) - [j7]Mamdouh Alenezi, Muhammad Usama, Khaled Mohamad Almustafa, Waheed Iqbal, Muhammad Ali Raza, Tanveer Khan:
An Efficient, Secure, and Queryable Encryption for NoSQL-Based Databases Hosted on Untrusted Cloud Environments. Int. J. Inf. Secur. Priv. 13(2): 14-31 (2019) - [j6]Alka Agrawal, Mohammad Zarour, Mamdouh Alenezi, Rajeev Kumar, Raees Ahmad Khan:
Security durability assessment through fuzzy analytic hierarchy process. PeerJ Comput. Sci. 5: e215 (2019) - [i3]Md Tarique Jamal Ansari, Dhirendra Pandey, Mamdouh Alenezi:
STORE: Security Threat Oriented Requirements Engineering Methodology. CoRR abs/1901.01500 (2019) - 2018
- [j5]Layla Mohammed Alrawais, Mamdouh Alenezi, Mohammad Akour:
Security Testing Framework for Web Applications. Int. J. Softw. Innov. 6(3): 93-117 (2018) - [j4]Iman M. Almomani, Mamdouh Alenezi:
Efficient Denial of Service Attacks Detection in Wireless Sensor Networks. J. Inf. Sci. Eng. 34(4): 977-1000 (2018) - [i2]Mamdouh Alenezi, Shadi Banitaan, Mohammad Zarour:
Using Categorical Features in Mining Bug Tracking Systems to Assign Bug Reports. CoRR abs/1804.07803 (2018) - 2017
- [c5]Khaled Mohamad Almustafa, Mamdouh Alenezi:
Cost Analysis of SDN/NFV Architecture over 4G Infrastructure. EUSPN/ICTH 2017: 130-137 - 2016
- [j3]Ibrahim Abunadi, Mamdouh Alenezi:
An Empirical Investigation of Security Vulnerabilities within Web Applications. J. Univers. Comput. Sci. 22(4): 537-551 (2016) - 2015
- [j2]Mamdouh Alenezi, Fakhry M. Khellah:
Evolution Impact on Architecture Stability in Open-Source Projects. Int. J. Cloud Appl. Comput. 5(4): 24-35 (2015) - [i1]Mamdouh Alenezi, Ibrahim Abunadi:
Quality of Open Source Systems from Product Metrics Perspective. CoRR abs/1511.03194 (2015) - 2013
- [j1]Mamdouh Alenezi, Kenneth Magel, Shadi Banitaan:
Efficient Bug Triaging Using Text Mining. J. Softw. 8(9): 2185-2190 (2013) - [c4]Shadi Banitaan, Mamdouh Alenezi:
TRAM: An approach for assigning bug reports using their Metadata. ICCIT 2013: 215-219 - [c3]Shadi Banitaan, Mamdouh Alenezi:
DECOBA: Utilizing Developers Communities in Bug Assignment. ICMLA (2) 2013: 66-71 - [c2]Mamdouh Alenezi, Shadi Banitaan:
Bug Reports Prioritization: Which Features and Classifier to Use? ICMLA (2) 2013: 112-116 - [c1]Shadi Banitaan, Mamdouh Alenezi, Kendall E. Nygard, Kenneth Magel:
Towards Test Focus Selection for Integration Testing Using Method Level Software Metrics. ITNG 2013: 343-348
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint