\n      \n  \n  
\n  
\n\n  \n  \n  \n  \n  \n  \n    An exploratory study on domain knowledge infusion in deep learning for automated threat defense.\n  \n  \n  \n  \n\n\n  \n  Khanzadeh, S.; Neto, E. C. P.; Iqbal, S.; Alalfi, M. H.;  and Buffett, S.\n\n\n  \n\n\n\n  
Int. J. Inf. Sec., 24(1): 71.  2025.\n  
\n\n
\n\n
\n\n
\n\n  \n  \n    
Paper\n   \n  \n\n  \n  \n    doi\n   \n  \n\n  \n  link\n   \n  \n\n  bibtex\n    \n\n  \n\n  \n\n  \n  \n  \n  \n  \n  \n  \n\n   \n  \n  \n\n\n\n
\n  
@article{DBLP:journals/ijisec/KhanzadehNIAB25,\n  author       = {Sourena Khanzadeh and\n                  Euclides Carlos Pinto Neto and\n                  Shahrear Iqbal and\n                  Manar H. Alalfi and\n                  Scott Buffett},\n  title        = {An exploratory study on domain knowledge infusion in deep learning\n                  for automated threat defense},\n  journal      = {Int. J. Inf. Sec.},\n  volume       = {24},\n  number       = {1},\n  pages        = {71},\n  year         = {2025},\n  url          = {https://doi.org/10.1007/s10207-025-00987-4},\n  doi          = {10.1007/S10207-025-00987-4},\n  timestamp    = {Mon, 24 Feb 2025 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/ijisec/KhanzadehNIAB25.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n
\n\n\n\n
\n\n\n  
\n  
\n\n  \n  \n  \n  \n  \n  \n    Correction: An exploratory study on domain knowledge infusion in deep learning for automated threat defense.\n  \n  \n  \n  \n\n\n  \n  Khanzadeh, S.; Neto, E. C. P.; Iqbal, S.; Alalfi, M. H.;  and Buffett, S.\n\n\n  \n\n\n\n  
Int. J. Inf. Sec., 24(3): 118.  2025.\n  
\n\n
\n\n
\n\n
\n\n  \n  \n    
Paper\n   \n  \n\n  \n  \n    doi\n   \n  \n\n  \n  link\n   \n  \n\n  bibtex\n    \n\n  \n\n  \n\n  \n  \n  \n  \n  \n  \n  \n\n   \n  \n  \n\n\n\n
\n  
@article{DBLP:journals/ijisec/KhanzadehNIAB25a,\n  author       = {Sourena Khanzadeh and\n                  Euclides Carlos Pinto Neto and\n                  Shahrear Iqbal and\n                  Manar H. Alalfi and\n                  Scott Buffett},\n  title        = {Correction: An exploratory study on domain knowledge infusion in deep\n                  learning for automated threat defense},\n  journal      = {Int. J. Inf. Sec.},\n  volume       = {24},\n  number       = {3},\n  pages        = {118},\n  year         = {2025},\n  url          = {https://doi.org/10.1007/s10207-025-01048-6},\n  doi          = {10.1007/S10207-025-01048-6},\n  timestamp    = {Wed, 14 May 2025 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/ijisec/KhanzadehNIAB25a.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n
\n\n\n\n
\n\n\n  
\n  
\n\n  \n  \n  \n  \n  \n  \n    oHIT - A framework for openHAB Interaction Threats Identification in IoT Systems.\n  \n  \n  \n  \n\n\n  \n  Quantrill, J.; Khajehnouri, N.;  and Alalfi, M. H.\n\n\n  \n\n\n\n  In Shahriar, H.; Alam, K. S.; Ohsaki, H.; Cimato, S.; Capretz, M. A. M.; Ahmed, S.; Ahamed, S. I.; Majumder, A. J. A.; Haque, M.; Yoshihisa, T.; Cuzzocrea, A.; Takemoto, M.; Sakib, N.;  and Elsayed, M., editor(s), 
49th IEEE Annual Computers, Software, and Applications Conference, COMPSAC 2025, Toronto, ON, Canada, July 8-11, 2025, pages 1047–1056,  2025. IEEE\n  
\n\n
\n\n
\n\n
\n\n  \n  \n    
Paper\n   \n  \n\n  \n  \n    doi\n   \n  \n\n  \n  link\n   \n  \n\n  bibtex\n    \n\n  \n\n  \n\n  \n  \n  \n  \n  \n  \n  \n\n   \n  \n  \n\n\n\n
\n  
@inproceedings{DBLP:conf/compsac/QuantrillKA25,\n  author       = {Jason Quantrill and\n                  Noura Khajehnouri and\n                  Manar H. Alalfi},\n  editor       = {Hossain Shahriar and\n                  Kazi Shafiul Alam and\n                  Hiroyuki Ohsaki and\n                  Stelvio Cimato and\n                  Miriam A. M. Capretz and\n                  Shamem Ahmed and\n                  Sheikh Iqbal Ahamed and\n                  AKM Jahangir Alam Majumder and\n                  Munirul Haque and\n                  Tomoki Yoshihisa and\n                  Alfredo Cuzzocrea and\n                  Michiharu Takemoto and\n                  Nazmus Sakib and\n                  Marwa Elsayed},\n  title        = {oHIT - {A} framework for openHAB Interaction Threats Identification\n                  in IoT Systems},\n  booktitle    = {49th {IEEE} Annual Computers, Software, and Applications Conference,\n                  {COMPSAC} 2025, Toronto, ON, Canada, July 8-11, 2025},\n  pages        = {1047--1056},\n  publisher    = {{IEEE}},\n  year         = {2025},\n  url          = {https://doi.org/10.1109/COMPSAC65507.2025.00136},\n  doi          = {10.1109/COMPSAC65507.2025.00136},\n  timestamp    = {Fri, 05 Sep 2025 21:24:29 +0200},\n  biburl       = {https://dblp.org/rec/conf/compsac/QuantrillKA25.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n
\n\n\n\n
\n\n\n  
\n  
\n\n  \n  \n  \n  \n  \n  \n    SmartTinkerer: Bridging Smart Home Testing Gaps with LLM, Digital Twin & Reinforcement Learning.\n  \n  \n  \n  \n\n\n  \n  Chan, S. A. N.;  and Alalfi, M. H.\n\n\n  \n\n\n\n  In Shahriar, H.; Alam, K. S.; Ohsaki, H.; Cimato, S.; Capretz, M. A. M.; Ahmed, S.; Ahamed, S. I.; Majumder, A. J. A.; Haque, M.; Yoshihisa, T.; Cuzzocrea, A.; Takemoto, M.; Sakib, N.;  and Elsayed, M., editor(s), 
49th IEEE Annual Computers, Software, and Applications Conference, COMPSAC 2025, Toronto, ON, Canada, July 8-11, 2025, pages 1452–1461,  2025. IEEE\n  
\n\n
\n\n
\n\n
\n\n  \n  \n    
Paper\n   \n  \n\n  \n  \n    doi\n   \n  \n\n  \n  link\n   \n  \n\n  bibtex\n    \n\n  \n\n  \n\n  \n  \n  \n  \n  \n  \n  \n\n   \n  \n  \n\n\n\n
\n  
@inproceedings{DBLP:conf/compsac/ChanA25,\n  author       = {Samad Alias Nyein Chan and\n                  Manar H. Alalfi},\n  editor       = {Hossain Shahriar and\n                  Kazi Shafiul Alam and\n                  Hiroyuki Ohsaki and\n                  Stelvio Cimato and\n                  Miriam A. M. Capretz and\n                  Shamem Ahmed and\n                  Sheikh Iqbal Ahamed and\n                  AKM Jahangir Alam Majumder and\n                  Munirul Haque and\n                  Tomoki Yoshihisa and\n                  Alfredo Cuzzocrea and\n                  Michiharu Takemoto and\n                  Nazmus Sakib and\n                  Marwa Elsayed},\n  title        = {SmartTinkerer: Bridging Smart Home Testing Gaps with LLM, Digital\n                  Twin {\\&} Reinforcement Learning},\n  booktitle    = {49th {IEEE} Annual Computers, Software, and Applications Conference,\n                  {COMPSAC} 2025, Toronto, ON, Canada, July 8-11, 2025},\n  pages        = {1452--1461},\n  publisher    = {{IEEE}},\n  year         = {2025},\n  url          = {https://doi.org/10.1109/COMPSAC65507.2025.00182},\n  doi          = {10.1109/COMPSAC65507.2025.00182},\n  timestamp    = {Fri, 05 Sep 2025 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/compsac/ChanA25.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n
\n\n\n\n
\n\n\n  
\n  
\n\n  \n  \n  \n  \n  \n  \n    KASTroid: A Static Taint Analysis Framework for Kotlin-Based Android Applications.\n  \n  \n  \n  \n\n\n  \n  Nazzal, B.; Alalfi, M. H.;  and Cordy, J. R.\n\n\n  \n\n\n\n  In Shahriar, H.; Alam, K. S.; Ohsaki, H.; Cimato, S.; Capretz, M. A. M.; Ahmed, S.; Ahamed, S. I.; Majumder, A. J. A.; Haque, M.; Yoshihisa, T.; Cuzzocrea, A.; Takemoto, M.; Sakib, N.;  and Elsayed, M., editor(s), 
49th IEEE Annual Computers, Software, and Applications Conference, COMPSAC 2025, Toronto, ON, Canada, July 8-11, 2025, pages 2295–2300,  2025. IEEE\n  
\n\n
\n\n
\n\n
\n\n  \n  \n    
Paper\n   \n  \n\n  \n  \n    doi\n   \n  \n\n  \n  link\n   \n  \n\n  bibtex\n    \n\n  \n\n  \n\n  \n  \n  \n  \n  \n  \n  \n\n   \n  \n  \n\n\n\n
\n  
@inproceedings{DBLP:conf/compsac/NazzalAC25,\n  author       = {Bara' Nazzal and\n                  Manar H. Alalfi and\n                  James R. Cordy},\n  editor       = {Hossain Shahriar and\n                  Kazi Shafiul Alam and\n                  Hiroyuki Ohsaki and\n                  Stelvio Cimato and\n                  Miriam A. M. Capretz and\n                  Shamem Ahmed and\n                  Sheikh Iqbal Ahamed and\n                  AKM Jahangir Alam Majumder and\n                  Munirul Haque and\n                  Tomoki Yoshihisa and\n                  Alfredo Cuzzocrea and\n                  Michiharu Takemoto and\n                  Nazmus Sakib and\n                  Marwa Elsayed},\n  title        = {KASTroid: {A} Static Taint Analysis Framework for Kotlin-Based Android\n                  Applications},\n  booktitle    = {49th {IEEE} Annual Computers, Software, and Applications Conference,\n                  {COMPSAC} 2025, Toronto, ON, Canada, July 8-11, 2025},\n  pages        = {2295--2300},\n  publisher    = {{IEEE}},\n  year         = {2025},\n  url          = {https://doi.org/10.1109/COMPSAC65507.2025.00323},\n  doi          = {10.1109/COMPSAC65507.2025.00323},\n  timestamp    = {Fri, 05 Sep 2025 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/compsac/NazzalAC25.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n
\n\n\n\n
\n\n\n  
\n  
\n\n  \n  \n  \n  \n  \n  \n    IoT-SafeMod: Model-Driven Security and Safety for IoT Applications.\n  \n  \n  \n  \n\n\n  \n  Abuserrieh, L.;  and Alalfi, M. H.\n\n\n  \n\n\n\n  In 
7th IEEE/ACM International Workshop on Software Engineering Research & Practices for the IoT, SERP4IoT 2025, Ottawa, ON, Canada, April 27, 2025, pages 52–59,  2025. IEEE\n  
\n\n
\n\n
\n\n
\n\n  \n  \n    
Paper\n   \n  \n\n  \n  \n    doi\n   \n  \n\n  \n  link\n   \n  \n\n  bibtex\n    \n\n  \n\n  \n\n  \n  \n  \n  \n  \n  \n  \n\n   \n  \n  \n\n\n\n
\n  
@inproceedings{DBLP:conf/serp4iot/AbuserriehA25,\n  author       = {Lobna Abuserrieh and\n                  Manar H. Alalfi},\n  title        = {IoT-SafeMod: Model-Driven Security and Safety for IoT Applications},\n  booktitle    = {7th {IEEE/ACM} International Workshop on Software Engineering Research\n                  {\\&} Practices for the IoT, SERP4IoT 2025, Ottawa, ON, Canada, April\n                  27, 2025},\n  pages        = {52--59},\n  publisher    = {{IEEE}},\n  year         = {2025},\n  url          = {https://doi.org/10.1109/SERP4IoT66600.2025.00013},\n  doi          = {10.1109/SERP4IOT66600.2025.00013},\n  timestamp    = {Mon, 30 Jun 2025 22:34:48 +0200},\n  biburl       = {https://dblp.org/rec/conf/serp4iot/AbuserriehA25.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n
\n\n\n\n
\n\n\n  
\n  
\n\n  \n  \n  \n  \n  \n  \n    GitHub's Copilot Code Review: Can AI Spot Security Flaws Before You Commit?.\n  \n  \n  \n  \n\n\n  \n  Amro, A.;  and Alalfi, M. H.\n\n\n  \n\n\n\n  
CoRR, abs/2509.13650.  2025.\n  
\n\n
\n\n
\n\n
\n\n  \n  \n    
Paper\n   \n  \n\n  \n  \n    doi\n   \n  \n\n  \n  link\n   \n  \n\n  bibtex\n    \n\n  \n\n  \n\n  \n  \n  \n  \n  \n  \n  \n\n   \n  \n  \n\n\n\n
\n  
@article{DBLP:journals/corr/abs-2509-13650,\n  author       = {Amena Amro and\n                  Manar H. Alalfi},\n  title        = {GitHub's Copilot Code Review: Can {AI} Spot Security Flaws Before\n                  You Commit?},\n  journal      = {CoRR},\n  volume       = {abs/2509.13650},\n  year         = {2025},\n  url          = {https://doi.org/10.48550/arXiv.2509.13650},\n  doi          = {10.48550/ARXIV.2509.13650},\n  eprinttype    = {arXiv},\n  eprint       = {2509.13650},\n  timestamp    = {Thu, 16 Oct 2025 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-2509-13650.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n
\n\n\n\n
\n\n\n\n\n\n