var bibbase_data = {"data":"\"Loading..\"\n\n
\n\n \n\n \n\n \n \n\n \n\n \n \n\n \n\n \n
\n generated by\n \n \"bibbase.org\"\n\n \n
\n \n\n
\n\n \n\n\n
\n\n Excellent! Next you can\n create a new website with this list, or\n embed it in an existing web page by copying & pasting\n any of the following snippets.\n\n
\n JavaScript\n (easiest)\n
\n \n <script src=\"https://bibbase.org/show?bib=https://dblp.org/pid/49/2794.bib&jsonp=1&jsonp=1\"></script>\n \n
\n\n PHP\n
\n \n <?php\n $contents = file_get_contents(\"https://bibbase.org/show?bib=https://dblp.org/pid/49/2794.bib&jsonp=1\");\n print_r($contents);\n ?>\n \n
\n\n iFrame\n (not recommended)\n
\n \n <iframe src=\"https://bibbase.org/show?bib=https://dblp.org/pid/49/2794.bib&jsonp=1\"></iframe>\n \n
\n\n

\n For more details see the documention.\n

\n
\n
\n\n
\n\n This is a preview! To use this list on your own web site\n or create a new web site from it,\n create a free account. The file will be added\n and you will be able to edit it in the File Manager.\n We will show you instructions once you've created your account.\n
\n\n
\n\n

To the site owner:

\n\n

Action required! Mendeley is changing its\n API. In order to keep using Mendeley with BibBase past April\n 14th, you need to:\n

    \n
  1. renew the authorization for BibBase on Mendeley, and
  2. \n
  3. update the BibBase URL\n in your page the same way you did when you initially set up\n this page.\n
  4. \n
\n

\n\n

\n \n \n Fix it now\n

\n
\n\n
\n\n\n
\n \n \n
\n
\n  \n 2023\n \n \n (6)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n A Model-Driven-Reverse Engineering Approach for Detecting Privilege Escalation in IoT Systems.\n \n \n \n \n\n\n \n Alalfi, M. H.; Zaid, A. A.; and Miri, A.\n\n\n \n\n\n\n J. Object Technol., 22(1): 1–21. 2023.\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/jot/AlalfiZM23,\n  author       = {Manar H. Alalfi and\n                  Atheer Abu Zaid and\n                  Ali Miri},\n  title        = {A Model-Driven-Reverse Engineering Approach for Detecting Privilege\n                  Escalation in IoT Systems},\n  journal      = {J. Object Technol.},\n  volume       = {22},\n  number       = {1},\n  pages        = {1--21},\n  year         = {2023},\n  url          = {https://doi.org/10.5381/jot.2023.22.1.a1},\n  doi          = {10.5381/JOT.2023.22.1.A1},\n  timestamp    = {Wed, 21 Feb 2024 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/jot/AlalfiZM23.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Security and Safety Verification in IoT Apps.\n \n \n \n \n\n\n \n Abuserrieh, L.; and Alalfi, M. H.\n\n\n \n\n\n\n In IEEE International Conference on Software Maintenance and Evolution, ICSME 2023, Bogotá, Colombia, October 1-6, 2023, pages 601–605, 2023. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"SecurityPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icsm/AbuserriehA23,\n  author       = {Lobna Abuserrieh and\n                  Manar H. Alalfi},\n  title        = {Security and Safety Verification in IoT Apps},\n  booktitle    = {{IEEE} International Conference on Software Maintenance and Evolution,\n                  {ICSME} 2023, Bogot{\\'{a}}, Colombia, October 1-6, 2023},\n  pages        = {601--605},\n  publisher    = {{IEEE}},\n  year         = {2023},\n  url          = {https://doi.org/10.1109/ICSME58846.2023.00080},\n  doi          = {10.1109/ICSME58846.2023.00080},\n  timestamp    = {Tue, 09 Jan 2024 17:27:46 +0100},\n  biburl       = {https://dblp.org/rec/conf/icsm/AbuserriehA23.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Optimizing Gas Consumption in Ethereum Smart Contracts: Best Practices and Techniques.\n \n \n \n \n\n\n \n Khanzadeh, S.; Samreen, N. F.; and Alalfi, M. H.\n\n\n \n\n\n\n In 23rd IEEE International Conference on Software Quality, Reliability, and Security, QRS 2023 Companion, Chiang Mai, Thailand, October 22-26, 2023, pages 300–309, 2023. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"OptimizingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/qrs/KhanzadehSA23,\n  author       = {Sourena Khanzadeh and\n                  Noama Fatima Samreen and\n                  Manar H. Alalfi},\n  title        = {Optimizing Gas Consumption in Ethereum Smart Contracts: Best Practices\n                  and Techniques},\n  booktitle    = {23rd {IEEE} International Conference on Software Quality, Reliability,\n                  and Security, {QRS} 2023 Companion, Chiang Mai, Thailand, October\n                  22-26, 2023},\n  pages        = {300--309},\n  publisher    = {{IEEE}},\n  year         = {2023},\n  url          = {https://doi.org/10.1109/QRS-C60940.2023.00056},\n  doi          = {10.1109/QRS-C60940.2023.00056},\n  timestamp    = {Tue, 05 Mar 2024 11:59:07 +0100},\n  biburl       = {https://dblp.org/rec/conf/qrs/KhanzadehSA23.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Timed Model-Based Mutation Operators for Simulink Models.\n \n \n \n \n\n\n \n Chen, J.; Alalfi, M. H.; and Dean, T. R.\n\n\n \n\n\n\n CoRR, abs/2301.00835. 2023.\n \n\n\n\n
\n\n\n\n \n \n \"TimedPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-2301-00835,\n  author       = {Jian Chen and\n                  Manar H. Alalfi and\n                  Thomas R. Dean},\n  title        = {Timed Model-Based Mutation Operators for Simulink Models},\n  journal      = {CoRR},\n  volume       = {abs/2301.00835},\n  year         = {2023},\n  url          = {https://doi.org/10.48550/arXiv.2301.00835},\n  doi          = {10.48550/ARXIV.2301.00835},\n  eprinttype    = {arXiv},\n  eprint       = {2301.00835},\n  timestamp    = {Tue, 10 Jan 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-2301-00835.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Opti Code Pro: A Heuristic Search-based Approach to Code Refactoring.\n \n \n \n \n\n\n \n Khanzadeh, S.; Chan, S. A. N.; Valenzano, R.; and Alalfi, M. H.\n\n\n \n\n\n\n CoRR, abs/2305.07594. 2023.\n \n\n\n\n
\n\n\n\n \n \n \"OptiPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-2305-07594,\n  author       = {Sourena Khanzadeh and\n                  Samad Alias Nyein Chan and\n                  Richard Valenzano and\n                  Manar H. Alalfi},\n  title        = {Opti Code Pro: {A} Heuristic Search-based Approach to Code Refactoring},\n  journal      = {CoRR},\n  volume       = {abs/2305.07594},\n  year         = {2023},\n  url          = {https://doi.org/10.48550/arXiv.2305.07594},\n  doi          = {10.48550/ARXIV.2305.07594},\n  eprinttype    = {arXiv},\n  eprint       = {2305.07594},\n  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-07594.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n \n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2022\n \n \n (11)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n An Automated Approach for Privacy Leakage Identification in IoT Apps.\n \n \n \n \n\n\n \n Nazzal, B.; and Alalfi, M. H.\n\n\n \n\n\n\n IEEE Access, 10: 80727–80747. 2022.\n \n\n\n\n
\n\n\n\n \n \n \"AnPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/access/NazzalA22,\n  author       = {Bara' Nazzal and\n                  Manar H. Alalfi},\n  title        = {An Automated Approach for Privacy Leakage Identification in IoT Apps},\n  journal      = {{IEEE} Access},\n  volume       = {10},\n  pages        = {80727--80747},\n  year         = {2022},\n  url          = {https://doi.org/10.1109/ACCESS.2022.3192562},\n  doi          = {10.1109/ACCESS.2022.3192562},\n  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/access/NazzalA22.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Predicting sensitive information leakage in IoT applications using flows-aware machine learning approach.\n \n \n \n \n\n\n \n Naeem, H.; and Alalfi, M. H.\n\n\n \n\n\n\n Empir. Softw. Eng., 27(6): 137. 2022.\n \n\n\n\n
\n\n\n\n \n \n \"PredictingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/ese/NaeemA22,\n  author       = {Hajra Naeem and\n                  Manar H. Alalfi},\n  title        = {Predicting sensitive information leakage in IoT applications using\n                  flows-aware machine learning approach},\n  journal      = {Empir. Softw. Eng.},\n  volume       = {27},\n  number       = {6},\n  pages        = {137},\n  year         = {2022},\n  url          = {https://doi.org/10.1007/s10664-022-10157-y},\n  doi          = {10.1007/S10664-022-10157-Y},\n  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/ese/NaeemA22.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A mutation framework for evaluating security analysis tools in IoT applications.\n \n \n \n \n\n\n \n Alalfi, M. H.; Parveen, S.; and Nazzal, B.\n\n\n \n\n\n\n Softw. Test. Verification Reliab., 32(7). 2022.\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/stvr/AlalfiPN22,\n  author       = {Manar H. Alalfi and\n                  Sajeda Parveen and\n                  Bara' Nazzal},\n  title        = {A mutation framework for evaluating security analysis tools in IoT\n                  applications},\n  journal      = {Softw. Test. Verification Reliab.},\n  volume       = {32},\n  number       = {7},\n  year         = {2022},\n  url          = {https://doi.org/10.1002/stvr.1799},\n  doi          = {10.1002/STVR.1799},\n  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/stvr/AlalfiPN22.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A survey of security vulnerabilities in Android automotive apps.\n \n \n \n \n\n\n \n Moiz, A.; and Alalfi, M. H.\n\n\n \n\n\n\n In Proceedings of the 3rd International Workshop on Engineering and Cybersecurity of Critical Systems, EnCyCriS 2022, Pittsburgh, Pennsylvania, 16 May 2022, pages 17–24, 2022. ACM\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icse-encycris/MoizA22,\n  author       = {Abdul Moiz and\n                  Manar H. Alalfi},\n  title        = {A survey of security vulnerabilities in Android automotive apps},\n  booktitle    = {Proceedings of the 3rd International Workshop on Engineering and Cybersecurity\n                  of Critical Systems, EnCyCriS 2022, Pittsburgh, Pennsylvania, 16 May\n                  2022},\n  pages        = {17--24},\n  publisher    = {{ACM}},\n  year         = {2022},\n  url          = {https://doi.org/10.1145/3524489.3527300},\n  doi          = {10.1145/3524489.3527300},\n  timestamp    = {Thu, 22 Dec 2022 13:53:49 +0100},\n  biburl       = {https://dblp.org/rec/conf/icse-encycris/MoizA22.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Vulnerability Classification of Consumer-based IoT Software.\n \n \n \n \n\n\n \n Nazzal, B.; Zaid, A. A.; Alalfi, M. H.; and Valani, A.\n\n\n \n\n\n\n In 4th IEEE/ACM International Workshop on Software Engineering Research and Practices for the IoT, SERP4IoT@ICSE, Pittsburgh, PA, USA, May 19, 2022, pages 17–24, 2022. ACM\n \n\n\n\n
\n\n\n\n \n \n \"VulnerabilityPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/serp4iot/NazzalZAV22,\n  author       = {Bara' Nazzal and\n                  Atheer Abu Zaid and\n                  Manar H. Alalfi and\n                  Altaz Valani},\n  title        = {Vulnerability Classification of Consumer-based IoT Software},\n  booktitle    = {4th {IEEE/ACM} International Workshop on Software Engineering Research\n                  and Practices for the IoT, SERP4IoT@ICSE, Pittsburgh, PA, USA, May\n                  19, 2022},\n  pages        = {17--24},\n  publisher    = {{ACM}},\n  year         = {2022},\n  url          = {https://doi.org/10.1145/3528227.3528566},\n  doi          = {10.1145/3528227.3528566},\n  timestamp    = {Thu, 04 Aug 2022 13:54:29 +0200},\n  biburl       = {https://dblp.org/rec/conf/serp4iot/NazzalZAV22.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Predicting sensitive information leakage in IoT applications using flows-aware machine learning approach.\n \n \n \n \n\n\n \n Naeem, H.; and Alalfi, M. H.\n\n\n \n\n\n\n CoRR, abs/2201.02677. 2022.\n \n\n\n\n
\n\n\n\n \n \n \"PredictingPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-2201-02677,\n  author       = {Hajra Naeem and\n                  Manar H. Alalfi},\n  title        = {Predicting sensitive information leakage in IoT applications using\n                  flows-aware machine learning approach},\n  journal      = {CoRR},\n  volume       = {abs/2201.02677},\n  year         = {2022},\n  url          = {https://arxiv.org/abs/2201.02677},\n  eprinttype    = {arXiv},\n  eprint       = {2201.02677},\n  timestamp    = {Thu, 20 Jan 2022 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-02677.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n An Automated Approach for Privacy Leakage Identification in IoT Apps.\n \n \n \n \n\n\n \n Nazzal, B.; and Alalfi, M. H.\n\n\n \n\n\n\n CoRR, abs/2202.02895. 2022.\n \n\n\n\n
\n\n\n\n \n \n \"AnPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-2202-02895,\n  author       = {Bara' Nazzal and\n                  Manar H. Alalfi},\n  title        = {An Automated Approach for Privacy Leakage Identification in IoT Apps},\n  journal      = {CoRR},\n  volume       = {abs/2202.02895},\n  year         = {2022},\n  url          = {https://arxiv.org/abs/2202.02895},\n  eprinttype    = {arXiv},\n  eprint       = {2202.02895},\n  timestamp    = {Wed, 09 Feb 2022 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-2202-02895.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n VOLCANO: Detecting Vulnerabilities of Ethereum Smart Contracts Using Code Clone Analysis.\n \n \n \n \n\n\n \n Samreen, N. F.; and Alalfi, M. H.\n\n\n \n\n\n\n CoRR, abs/2203.00769. 2022.\n \n\n\n\n
\n\n\n\n \n \n \"VOLCANO:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-2203-00769,\n  author       = {Noama Fatima Samreen and\n                  Manar H. Alalfi},\n  title        = {{VOLCANO:} Detecting Vulnerabilities of Ethereum Smart Contracts Using\n                  Code Clone Analysis},\n  journal      = {CoRR},\n  volume       = {abs/2203.00769},\n  year         = {2022},\n  url          = {https://doi.org/10.48550/arXiv.2203.00769},\n  doi          = {10.48550/ARXIV.2203.00769},\n  eprinttype    = {arXiv},\n  eprint       = {2203.00769},\n  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-2203-00769.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Mining Domain Models in Ethereum DApps using Code Cloning.\n \n \n \n \n\n\n \n Samreen, N. F.; and Alalfi, M. H.\n\n\n \n\n\n\n CoRR, abs/2203.00771. 2022.\n \n\n\n\n
\n\n\n\n \n \n \"MiningPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-2203-00771,\n  author       = {Noama Fatima Samreen and\n                  Manar H. Alalfi},\n  title        = {Mining Domain Models in Ethereum DApps using Code Cloning},\n  journal      = {CoRR},\n  volume       = {abs/2203.00771},\n  year         = {2022},\n  url          = {https://doi.org/10.48550/arXiv.2203.00771},\n  doi          = {10.48550/ARXIV.2203.00771},\n  eprinttype    = {arXiv},\n  eprint       = {2203.00771},\n  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-2203-00771.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Survey of Analysis Methods for Security and Safety verification in IoT Systems.\n \n \n \n \n\n\n \n Abuserrieh, L.; and Alalfi, M. H.\n\n\n \n\n\n\n CoRR, abs/2203.01464. 2022.\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-2203-01464,\n  author       = {Lobna Abuserrieh and\n                  Manar H. Alalfi},\n  title        = {A Survey of Analysis Methods for Security and Safety verification\n                  in IoT Systems},\n  journal      = {CoRR},\n  volume       = {abs/2203.01464},\n  year         = {2022},\n  url          = {https://doi.org/10.48550/arXiv.2203.01464},\n  doi          = {10.48550/ARXIV.2203.01464},\n  eprinttype    = {arXiv},\n  eprint       = {2203.01464},\n  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-2203-01464.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Model-Driven-Engineering Approach for Detecting Privilege Escalation in IoT Systems.\n \n \n \n \n\n\n \n Zaid, A. A.; Alalfi, M. H.; and Miri, A.\n\n\n \n\n\n\n CoRR, abs/2205.11406. 2022.\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-2205-11406,\n  author       = {Atheer Abu Zaid and\n                  Manar H. Alalfi and\n                  Ali Miri},\n  title        = {A Model-Driven-Engineering Approach for Detecting Privilege Escalation\n                  in IoT Systems},\n  journal      = {CoRR},\n  volume       = {abs/2205.11406},\n  year         = {2022},\n  url          = {https://doi.org/10.48550/arXiv.2205.11406},\n  doi          = {10.48550/ARXIV.2205.11406},\n  eprinttype    = {arXiv},\n  eprint       = {2205.11406},\n  timestamp    = {Mon, 30 May 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-2205-11406.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2021\n \n \n (5)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n SmartScan: An approach to detect Denial of Service Vulnerability in Ethereum Smart Contracts.\n \n \n \n \n\n\n \n Samreen, N. F.; and Alalfi, M. H.\n\n\n \n\n\n\n In 4th IEEE/ACM International Workshop on Emerging Trends in Software Engineering for Blockchain, WETSEB@ICSE 2021, Madrid, Spain, May 31, 2021, pages 17–26, 2021. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"SmartScan:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/wetseb-ws/SamreenA21,\n  author       = {Noama Fatima Samreen and\n                  Manar H. Alalfi},\n  title        = {SmartScan: An approach to detect Denial of Service Vulnerability in\n                  Ethereum Smart Contracts},\n  booktitle    = {4th {IEEE/ACM} International Workshop on Emerging Trends in Software\n                  Engineering for Blockchain, WETSEB@ICSE 2021, Madrid, Spain, May 31,\n                  2021},\n  pages        = {17--26},\n  publisher    = {{IEEE}},\n  year         = {2021},\n  url          = {https://doi.org/10.1109/WETSEB52558.2021.00010},\n  doi          = {10.1109/WETSEB52558.2021.00010},\n  timestamp    = {Fri, 23 Jul 2021 13:33:55 +0200},\n  biburl       = {https://dblp.org/rec/conf/wetseb-ws/SamreenA21.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n SmartScan: An approach to detect Denial of Service Vulnerability in Ethereum Smart Contracts.\n \n \n \n \n\n\n \n Samreen, N. F.; and Alalfi, M. H.\n\n\n \n\n\n\n CoRR, abs/2105.02852. 2021.\n \n\n\n\n
\n\n\n\n \n \n \"SmartScan:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-2105-02852,\n  author       = {Noama Fatima Samreen and\n                  Manar H. Alalfi},\n  title        = {SmartScan: An approach to detect Denial of Service Vulnerability in\n                  Ethereum Smart Contracts},\n  journal      = {CoRR},\n  volume       = {abs/2105.02852},\n  year         = {2021},\n  url          = {https://arxiv.org/abs/2105.02852},\n  eprinttype    = {arXiv},\n  eprint       = {2105.02852},\n  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-02852.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Reentrancy Vulnerability Identification in Ethereum Smart Contracts.\n \n \n \n \n\n\n \n Samreen, N. F.; and Alalfi, M. H.\n\n\n \n\n\n\n CoRR, abs/2105.02881. 2021.\n \n\n\n\n
\n\n\n\n \n \n \"ReentrancyPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-2105-02881,\n  author       = {Noama Fatima Samreen and\n                  Manar H. Alalfi},\n  title        = {Reentrancy Vulnerability Identification in Ethereum Smart Contracts},\n  journal      = {CoRR},\n  volume       = {abs/2105.02881},\n  year         = {2021},\n  url          = {https://arxiv.org/abs/2105.02881},\n  eprinttype    = {arXiv},\n  eprint       = {2105.02881},\n  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-02881.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Survey of Security Vulnerabilities in Ethereum Smart Contracts.\n \n \n \n \n\n\n \n Samreen, N. F.; and Alalfi, M. H.\n\n\n \n\n\n\n CoRR, abs/2105.06974. 2021.\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-2105-06974,\n  author       = {Noama Fatima Samreen and\n                  Manar H. Alalfi},\n  title        = {A Survey of Security Vulnerabilities in Ethereum Smart Contracts},\n  journal      = {CoRR},\n  volume       = {abs/2105.06974},\n  year         = {2021},\n  url          = {https://arxiv.org/abs/2105.06974},\n  eprinttype    = {arXiv},\n  eprint       = {2105.06974},\n  timestamp    = {Tue, 18 May 2021 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-06974.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Mutation Framework for Evaluating Security Analysis tools in IoT Applications.\n \n \n \n \n\n\n \n Alalfi, M. H.; Parveen, S.; and Nazzal, B.\n\n\n \n\n\n\n CoRR, abs/2110.05562. 2021.\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-2110-05562,\n  author       = {Manar H. Alalfi and\n                  Sajeda Parveen and\n                  Bara' Nazzal},\n  title        = {A Mutation Framework for Evaluating Security Analysis tools in IoT\n                  Applications},\n  journal      = {CoRR},\n  volume       = {abs/2110.05562},\n  year         = {2021},\n  url          = {https://arxiv.org/abs/2110.05562},\n  eprinttype    = {arXiv},\n  eprint       = {2110.05562},\n  timestamp    = {Thu, 21 Oct 2021 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-2110-05562.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2020\n \n \n (5)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n A survey of security vulnerabilities in ethereum smart contracts.\n \n \n \n \n\n\n \n Samreen, N. F.; and Alalfi, M. H.\n\n\n \n\n\n\n In Shaddick, L.; Jourdan, G.; Onut, V.; and Ng, T., editor(s), CASCON '20: Proceedings of the 30th Annual International Conference on Computer Science and Software Engineering, Toronto, Ontario, Canada, November 10 - 13, 2020, pages 73–82, 2020. ACM\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/cascon/SamreenA20,\n  author       = {Noama Fatima Samreen and\n                  Manar H. Alalfi},\n  editor       = {Lily Shaddick and\n                  Guy{-}Vincent Jourdan and\n                  Vio Onut and\n                  Tinny Ng},\n  title        = {A survey of security vulnerabilities in ethereum smart contracts},\n  booktitle    = {{CASCON} '20: Proceedings of the 30th Annual International Conference\n                  on Computer Science and Software Engineering, Toronto, Ontario, Canada,\n                  November 10 - 13, 2020},\n  pages        = {73--82},\n  publisher    = {{ACM}},\n  year         = {2020},\n  url          = {https://dl.acm.org/doi/10.5555/3432601.3432611},\n  doi          = {10.5555/3432601.3432611},\n  timestamp    = {Fri, 29 Jul 2022 15:53:07 +0200},\n  biburl       = {https://dblp.org/rec/conf/cascon/SamreenA20.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n An Approach for the Identification of Information Leakage in Automotive Infotainment systems.\n \n \n \n \n\n\n \n Moiz, A.; and Alalfi, M. H.\n\n\n \n\n\n\n In 20th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2020, Adelaide, Australia, September 28 - October 2, 2020, pages 110–114, 2020. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"AnPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/scam/MoizA20,\n  author       = {Abdul Moiz and\n                  Manar H. Alalfi},\n  title        = {An Approach for the Identification of Information Leakage in Automotive\n                  Infotainment systems},\n  booktitle    = {20th {IEEE} International Working Conference on Source Code Analysis\n                  and Manipulation, {SCAM} 2020, Adelaide, Australia, September 28 -\n                  October 2, 2020},\n  pages        = {110--114},\n  publisher    = {{IEEE}},\n  year         = {2020},\n  url          = {https://doi.org/10.1109/SCAM51674.2020.00017},\n  doi          = {10.1109/SCAM51674.2020.00017},\n  timestamp    = {Fri, 20 Nov 2020 12:05:53 +0100},\n  biburl       = {https://dblp.org/rec/conf/scam/MoizA20.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Identifying Vulnerable IoT Applications using Deep Learning.\n \n \n \n \n\n\n \n Naeem, H.; and Alalfi, M. H.\n\n\n \n\n\n\n In Kontogiannis, K.; Khomh, F.; Chatzigeorgiou, A.; Fokaefs, M.; and Zhou, M., editor(s), 27th IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2020, London, ON, Canada, February 18-21, 2020, pages 582–586, 2020. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"IdentifyingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/wcre/NaeemA20,\n  author       = {Hajra Naeem and\n                  Manar H. Alalfi},\n  editor       = {Kostas Kontogiannis and\n                  Foutse Khomh and\n                  Alexander Chatzigeorgiou and\n                  Marios{-}Eleftherios Fokaefs and\n                  Minghui Zhou},\n  title        = {Identifying Vulnerable IoT Applications using Deep Learning},\n  booktitle    = {27th {IEEE} International Conference on Software Analysis, Evolution\n                  and Reengineering, {SANER} 2020, London, ON, Canada, February 18-21,\n                  2020},\n  pages        = {582--586},\n  publisher    = {{IEEE}},\n  year         = {2020},\n  url          = {https://doi.org/10.1109/SANER48275.2020.9054817},\n  doi          = {10.1109/SANER48275.2020.9054817},\n  timestamp    = {Thu, 16 Apr 2020 16:27:40 +0200},\n  biburl       = {https://dblp.org/rec/conf/wcre/NaeemA20.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Mutation Framework for Evaluating Security Analysis Tools in IoT Applications.\n \n \n \n \n\n\n \n Parveen, S.; and Alalfi, M. H.\n\n\n \n\n\n\n In Kontogiannis, K.; Khomh, F.; Chatzigeorgiou, A.; Fokaefs, M.; and Zhou, M., editor(s), 27th IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2020, London, ON, Canada, February 18-21, 2020, pages 587–591, 2020. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/wcre/ParveenA20,\n  author       = {Sajeda Parveen and\n                  Manar H. Alalfi},\n  editor       = {Kostas Kontogiannis and\n                  Foutse Khomh and\n                  Alexander Chatzigeorgiou and\n                  Marios{-}Eleftherios Fokaefs and\n                  Minghui Zhou},\n  title        = {A Mutation Framework for Evaluating Security Analysis Tools in IoT\n                  Applications},\n  booktitle    = {27th {IEEE} International Conference on Software Analysis, Evolution\n                  and Reengineering, {SANER} 2020, London, ON, Canada, February 18-21,\n                  2020},\n  pages        = {587--591},\n  publisher    = {{IEEE}},\n  year         = {2020},\n  url          = {https://doi.org/10.1109/SANER48275.2020.9054853},\n  doi          = {10.1109/SANER48275.2020.9054853},\n  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/wcre/ParveenA20.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n An Approach for the Identification of Information Leakage in Automotive Infotainment systems.\n \n \n \n \n\n\n \n Moiz, A.; and Alalfi, M. H.\n\n\n \n\n\n\n CoRR, abs/2011.04066. 2020.\n \n\n\n\n
\n\n\n\n \n \n \"AnPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-2011-04066,\n  author       = {Abdul Moiz and\n                  Manar H. Alalfi},\n  title        = {An Approach for the Identification of Information Leakage in Automotive\n                  Infotainment systems},\n  journal      = {CoRR},\n  volume       = {abs/2011.04066},\n  year         = {2020},\n  url          = {https://arxiv.org/abs/2011.04066},\n  eprinttype    = {arXiv},\n  eprint       = {2011.04066},\n  timestamp    = {Thu, 12 Nov 2020 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-2011-04066.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2019\n \n \n (6)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n A semi-automated framework for migrating web applications from SQL to document oriented NoSQL database.\n \n \n \n \n\n\n \n Mahruqi, R. S. A.; Alalfi, M. H.; and Dean, T. R.\n\n\n \n\n\n\n In Pakfetrat, T.; Jourdan, G.; Kontogiannis, K.; and Enenkel, R. F., editor(s), Proceedings of the 29th Annual International Conference on Computer Science and Software Engineering, CASCON 2019, Markham, Ontario, Canada, November 4-6, 2019, pages 44–53, 2019. ACM\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/cascon/MahruqiAD19,\n  author       = {Rahma S. Al Mahruqi and\n                  Manar H. Alalfi and\n                  Thomas R. Dean},\n  editor       = {Tima Pakfetrat and\n                  Guy{-}Vincent Jourdan and\n                  Kostas Kontogiannis and\n                  Robert F. Enenkel},\n  title        = {A semi-automated framework for migrating web applications from {SQL}\n                  to document oriented NoSQL database},\n  booktitle    = {Proceedings of the 29th Annual International Conference on Computer\n                  Science and Software Engineering, {CASCON} 2019, Markham, Ontario,\n                  Canada, November 4-6, 2019},\n  pages        = {44--53},\n  publisher    = {{ACM}},\n  year         = {2019},\n  url          = {https://dl.acm.org/doi/10.5555/3370272.3370277},\n  doi          = {10.5555/3370272.3370277},\n  timestamp    = {Wed, 04 May 2022 13:02:28 +0200},\n  biburl       = {https://dblp.org/rec/conf/cascon/MahruqiAD19.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Detection of feature interaction in dynamic scripting languages.\n \n \n \n \n\n\n \n Harthi, O. A. A.; Alalfi, M. H.; and Dean, T. R.\n\n\n \n\n\n\n In Pakfetrat, T.; Jourdan, G.; Kontogiannis, K.; and Enenkel, R. F., editor(s), Proceedings of the 29th Annual International Conference on Computer Science and Software Engineering, CASCON 2019, Markham, Ontario, Canada, November 4-6, 2019, pages 130–137, 2019. ACM\n \n\n\n\n
\n\n\n\n \n \n \"DetectionPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/cascon/HarthiAD19,\n  author       = {Omar A. Al Harthi and\n                  Manar H. Alalfi and\n                  Thomas R. Dean},\n  editor       = {Tima Pakfetrat and\n                  Guy{-}Vincent Jourdan and\n                  Kostas Kontogiannis and\n                  Robert F. Enenkel},\n  title        = {Detection of feature interaction in dynamic scripting languages},\n  booktitle    = {Proceedings of the 29th Annual International Conference on Computer\n                  Science and Software Engineering, {CASCON} 2019, Markham, Ontario,\n                  Canada, November 4-6, 2019},\n  pages        = {130--137},\n  publisher    = {{ACM}},\n  year         = {2019},\n  url          = {https://dl.acm.org/doi/10.5555/3370272.3370286},\n  doi          = {10.5555/3370272.3370286},\n  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/cascon/HarthiAD19.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Security analysis for SmartThings IoT applications.\n \n \n \n \n\n\n \n Schmeidl, F.; Nazzal, B.; and Alalfi, M. H.\n\n\n \n\n\n\n In Tilevich, E., editor(s), Proceedings of the 6th International Conference on Mobile Software Engineering and Systems, MOBILESoft@ICSE 2019, Montreal, QC, Canada, May 25, 2019, pages 25–29, 2019. IEEE / ACM\n \n\n\n\n
\n\n\n\n \n \n \"SecurityPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icse/SchmeidlNA19,\n  author       = {Florian Schmeidl and\n                  Bara' Nazzal and\n                  Manar H. Alalfi},\n  editor       = {Eli Tilevich},\n  title        = {Security analysis for SmartThings IoT applications},\n  booktitle    = {Proceedings of the 6th International Conference on Mobile Software\n                  Engineering and Systems, MOBILESoft@ICSE 2019, Montreal, QC, Canada,\n                  May 25, 2019},\n  pages        = {25--29},\n  publisher    = {{IEEE} / {ACM}},\n  year         = {2019},\n  url          = {https://doi.org/10.1109/MOBILESoft.2019.00013},\n  doi          = {10.1109/MOBILESOFT.2019.00013},\n  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},\n  biburl       = {https://dblp.org/rec/conf/icse/SchmeidlNA19.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Automated Identification of Over-Privileged SmartThings Apps.\n \n \n \n \n\n\n \n Zaid, A. A.; Alalfi, M. H.; and Miri, A.\n\n\n \n\n\n\n In 2019 IEEE International Conference on Software Maintenance and Evolution, ICSME 2019, Cleveland, OH, USA, September 29 - October 4, 2019, pages 247–251, 2019. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"AutomatedPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icsm/ZaidAM19,\n  author       = {Atheer Abu Zaid and\n                  Manar H. Alalfi and\n                  Ali Miri},\n  title        = {Automated Identification of Over-Privileged SmartThings Apps},\n  booktitle    = {2019 {IEEE} International Conference on Software Maintenance and Evolution,\n                  {ICSME} 2019, Cleveland, OH, USA, September 29 - October 4, 2019},\n  pages        = {247--251},\n  publisher    = {{IEEE}},\n  year         = {2019},\n  url          = {https://doi.org/10.1109/ICSME.2019.00037},\n  doi          = {10.1109/ICSME.2019.00037},\n  timestamp    = {Tue, 10 Dec 2019 20:50:05 +0100},\n  biburl       = {https://dblp.org/rec/conf/icsm/ZaidAM19.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Security Smells in Smart Contracts.\n \n \n \n \n\n\n \n Demir, M.; Alalfi, M. H.; Turetken, O.; and Ferworn, A.\n\n\n \n\n\n\n In 19th IEEE International Conference on Software Quality, Reliability and Security Companion, QRS Companion 2019, Sofia, Bulgaria, July 22-26, 2019, pages 442–449, 2019. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"SecurityPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/qrs/DemirATF19,\n  author       = {Mehmet Demir and\n                  Manar H. Alalfi and\n                  Ozgur Turetken and\n                  Alexander Ferworn},\n  title        = {Security Smells in Smart Contracts},\n  booktitle    = {19th {IEEE} International Conference on Software Quality, Reliability\n                  and Security Companion, {QRS} Companion 2019, Sofia, Bulgaria, July\n                  22-26, 2019},\n  pages        = {442--449},\n  publisher    = {{IEEE}},\n  year         = {2019},\n  url          = {https://doi.org/10.1109/QRS-C.2019.00086},\n  doi          = {10.1109/QRS-C.2019.00086},\n  timestamp    = {Fri, 03 Sep 2021 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/qrs/DemirATF19.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Variability Identification and Representation for Automotive Simulink Models.\n \n \n \n \n\n\n \n Alalfi, M. H.; Rapos, E. J.; Stevenson, A.; Stephan, M.; Dean, T. R.; and Cordy, J. R.\n\n\n \n\n\n\n In Dajsuren, Y.; and van den Brand, M., editor(s), Automotive Systems and Software Engineering - State of the Art and Future Trends, pages 109–139. Springer, 2019.\n \n\n\n\n
\n\n\n\n \n \n \"VariabilityPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@incollection{DBLP:books/sp/19/AlalfiRSSDC19,\n  author       = {Manar H. Alalfi and\n                  Eric J. Rapos and\n                  Andrew Stevenson and\n                  Matthew Stephan and\n                  Thomas R. Dean and\n                  James R. Cordy},\n  editor       = {Yanja Dajsuren and\n                  Mark van den Brand},\n  title        = {Variability Identification and Representation for Automotive Simulink\n                  Models},\n  booktitle    = {Automotive Systems and Software Engineering - State of the Art and\n                  Future Trends},\n  pages        = {109--139},\n  publisher    = {Springer},\n  year         = {2019},\n  url          = {https://doi.org/10.1007/978-3-030-12157-0\\_6},\n  doi          = {10.1007/978-3-030-12157-0\\_6},\n  timestamp    = {Sat, 09 Apr 2022 12:20:04 +0200},\n  biburl       = {https://dblp.org/rec/books/sp/19/AlalfiRSSDC19.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2018\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n An approach to clone detection in sequence diagrams and its application to security analysis.\n \n \n \n \n\n\n \n Alalfi, M. H.; Antony, E. P.; and Cordy, J. R.\n\n\n \n\n\n\n Softw. Syst. Model., 17(4): 1287–1309. 2018.\n \n\n\n\n
\n\n\n\n \n \n \"AnPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/sosym/AlalfiAC18,\n  author       = {Manar H. Alalfi and\n                  Elizabeth P. Antony and\n                  James R. Cordy},\n  title        = {An approach to clone detection in sequence diagrams and its application\n                  to security analysis},\n  journal      = {Softw. Syst. Model.},\n  volume       = {17},\n  number       = {4},\n  pages        = {1287--1309},\n  year         = {2018},\n  url          = {https://doi.org/10.1007/s10270-016-0557-6},\n  doi          = {10.1007/S10270-016-0557-6},\n  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/sosym/AlalfiAC18.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n \n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2016\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Clone detection in MATLAB Stateflow models.\n \n \n \n \n\n\n \n Chen, J.; Dean, T. R.; and Alalfi, M. H.\n\n\n \n\n\n\n Softw. Qual. J., 24(4): 917–946. 2016.\n \n\n\n\n
\n\n\n\n \n \n \"ClonePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/sqj/ChenDA16,\n  author       = {Jian Chen and\n                  Thomas R. Dean and\n                  Manar H. Alalfi},\n  title        = {Clone detection in {MATLAB} Stateflow models},\n  journal      = {Softw. Qual. J.},\n  volume       = {24},\n  number       = {4},\n  pages        = {917--946},\n  year         = {2016},\n  url          = {https://doi.org/10.1007/s11219-015-9296-0},\n  doi          = {10.1007/S11219-015-9296-0},\n  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/sqj/ChenDA16.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2015\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Detecting Android Malware Using Clone Detection.\n \n \n \n \n\n\n \n Chen, J.; Alalfi, M. H.; Dean, T. R.; and Zou, Y.\n\n\n \n\n\n\n J. Comput. Sci. Technol., 30(5): 942–956. 2015.\n \n\n\n\n
\n\n\n\n \n \n \"DetectingPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/jcst/ChenADZ15,\n  author       = {Jian Chen and\n                  Manar H. Alalfi and\n                  Thomas R. Dean and\n                  Ying Zou},\n  title        = {Detecting Android Malware Using Clone Detection},\n  journal      = {J. Comput. Sci. Technol.},\n  volume       = {30},\n  number       = {5},\n  pages        = {942--956},\n  year         = {2015},\n  url          = {https://www.wikidata.org/entity/Q29447372},\n  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/jcst/ChenADZ15.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n SimNav: Simulink navigation of model clone classes.\n \n \n \n \n\n\n \n Rapos, E. J.; Stevenson, A.; Alalfi, M. H.; and Cordy, J. R.\n\n\n \n\n\n\n In Godfrey, M. W.; Lo, D.; and Khomh, F., editor(s), 15th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2015, Bremen, Germany, September 27-28, 2015, pages 241–246, 2015. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"SimNav:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/scam/RaposSAC15,\n  author       = {Eric J. Rapos and\n                  Andrew Stevenson and\n                  Manar H. Alalfi and\n                  James R. Cordy},\n  editor       = {Michael W. Godfrey and\n                  David Lo and\n                  Foutse Khomh},\n  title        = {SimNav: Simulink navigation of model clone classes},\n  booktitle    = {15th {IEEE} International Working Conference on Source Code Analysis\n                  and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015},\n  pages        = {241--246},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2015},\n  url          = {https://doi.org/10.1109/SCAM.2015.7335420},\n  doi          = {10.1109/SCAM.2015.7335420},\n  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/scam/RaposSAC15.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2014\n \n \n (4)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Clone Detection in Matlab Stateflow Models.\n \n \n \n \n\n\n \n Dean, T. R.; Chen, J.; and Alalfi, M. H.\n\n\n \n\n\n\n Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 63. 2014.\n \n\n\n\n
\n\n\n\n \n \n \"ClonePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/eceasst/DeanCA14,\n  author       = {Thomas Roy Dean and\n                  Jian Chen and\n                  Manar H. Alalfi},\n  title        = {Clone Detection in Matlab Stateflow Models},\n  journal      = {Electron. Commun. Eur. Assoc. Softw. Sci. Technol.},\n  volume       = {63},\n  year         = {2014},\n  url          = {https://doi.org/10.14279/tuj.eceasst.63.920},\n  doi          = {10.14279/TUJ.ECEASST.63.920},\n  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/eceasst/DeanCA14.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Analysis and clustering of model clones: An automotive industrial experience.\n \n \n \n \n\n\n \n Alalfi, M. H.; Cordy, J. R.; and Dean, T. R.\n\n\n \n\n\n\n In Demeyer, S.; Binkley, D. W.; and Ricca, F., editor(s), 2014 Software Evolution Week - IEEE Conference on Software Maintenance, Reengineering, and Reverse Engineering, CSMR-WCRE 2014, Antwerp, Belgium, February 3-6, 2014, pages 375–378, 2014. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"AnalysisPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/csmr/AlalfiCD14,\n  author       = {Manar H. Alalfi and\n                  James R. Cordy and\n                  Thomas R. Dean},\n  editor       = {Serge Demeyer and\n                  Dave W. Binkley and\n                  Filippo Ricca},\n  title        = {Analysis and clustering of model clones: An automotive industrial\n                  experience},\n  booktitle    = {2014 Software Evolution Week - {IEEE} Conference on Software Maintenance,\n                  Reengineering, and Reverse Engineering, {CSMR-WCRE} 2014, Antwerp,\n                  Belgium, February 3-6, 2014},\n  pages        = {375--378},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2014},\n  url          = {https://doi.org/10.1109/CSMR-WCRE.2014.6747198},\n  doi          = {10.1109/CSMR-WCRE.2014.6747198},\n  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/csmr/AlalfiCD14.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Semi-automatic Identification and Representation of Subsystem Variability in Simulink Models.\n \n \n \n \n\n\n \n Alalfi, M. H.; Rapos, E. J.; Stevenson, A.; Stephan, M.; Dean, T. R.; and Cordy, J. R.\n\n\n \n\n\n\n In 30th IEEE International Conference on Software Maintenance and Evolution, Victoria, BC, Canada, September 29 - October 3, 2014, pages 486–490, 2014. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"Semi-automaticPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icsm/AlalfiRSSDC14,\n  author       = {Manar H. Alalfi and\n                  Eric J. Rapos and\n                  Andrew Stevenson and\n                  Matthew Stephan and\n                  Thomas R. Dean and\n                  James R. Cordy},\n  title        = {Semi-automatic Identification and Representation of Subsystem Variability\n                  in Simulink Models},\n  booktitle    = {30th {IEEE} International Conference on Software Maintenance and Evolution,\n                  Victoria, BC, Canada, September 29 - October 3, 2014},\n  pages        = {486--490},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2014},\n  url          = {https://doi.org/10.1109/ICSME.2014.79},\n  doi          = {10.1109/ICSME.2014.79},\n  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/icsm/AlalfiRSSDC14.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Towards a Taxonomy for Simulink Model Mutations.\n \n \n \n \n\n\n \n Stephan, M.; Alalfi, M. H.; and Cordy, J. R.\n\n\n \n\n\n\n In Seventh IEEE International Conference on Software Testing, Verification and Validation, ICST 2014 Workshops Proceedings, March 31 - April 4, 2014, Cleveland, Ohio, USA, pages 206–215, 2014. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"TowardsPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icst/StephanAC14,\n  author       = {Matthew Stephan and\n                  Manar H. Alalfi and\n                  James R. Cordy},\n  title        = {Towards a Taxonomy for Simulink Model Mutations},\n  booktitle    = {Seventh {IEEE} International Conference on Software Testing, Verification\n                  and Validation, {ICST} 2014 Workshops Proceedings, March 31 - April\n                  4, 2014, Cleveland, Ohio, {USA}},\n  pages        = {206--215},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2014},\n  url          = {https://doi.org/10.1109/ICSTW.2014.17},\n  doi          = {10.1109/ICSTW.2014.17},\n  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/icst/StephanAC14.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2013\n \n \n (4)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Using mutation analysis for a model-clone detector comparison framework.\n \n \n \n \n\n\n \n Stephan, M.; Alalfi, M. H.; Stevenson, A.; and Cordy, J. R.\n\n\n \n\n\n\n In Notkin, D.; Cheng, B. H. C.; and Pohl, K., editor(s), 35th International Conference on Software Engineering, ICSE '13, San Francisco, CA, USA, May 18-26, 2013, pages 1261–1264, 2013. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"UsingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icse/StephanASC04,\n  author       = {Matthew Stephan and\n                  Manar H. Alalfi and\n                  Andrew Stevenson and\n                  James R. Cordy},\n  editor       = {David Notkin and\n                  Betty H. C. Cheng and\n                  Klaus Pohl},\n  title        = {Using mutation analysis for a model-clone detector comparison framework},\n  booktitle    = {35th International Conference on Software Engineering, {ICSE} '13,\n                  San Francisco, CA, USA, May 18-26, 2013},\n  pages        = {1261--1264},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2013},\n  url          = {https://doi.org/10.1109/ICSE.2013.6606693},\n  doi          = {10.1109/ICSE.2013.6606693},\n  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/icse/StephanASC04.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Framework for Migrating Web Applications to Web Services.\n \n \n \n \n\n\n \n Almonaies, A. A.; Alalfi, M. H.; Cordy, J. R.; and Dean, T. R.\n\n\n \n\n\n\n In Daniel, F.; Dolog, P.; and Li, Q., editor(s), Web Engineering - 13th International Conference, ICWE 2013, Aalborg, Denmark, July 8-12, 2013. Proceedings, volume 7977, of Lecture Notes in Computer Science, pages 384–399, 2013. Springer\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icwe/AlmonaiesACD13,\n  author       = {Asil A. Almonaies and\n                  Manar H. Alalfi and\n                  James R. Cordy and\n                  Thomas R. Dean},\n  editor       = {Florian Daniel and\n                  Peter Dolog and\n                  Qing Li},\n  title        = {A Framework for Migrating Web Applications to Web Services},\n  booktitle    = {Web Engineering - 13th International Conference, {ICWE} 2013, Aalborg,\n                  Denmark, July 8-12, 2013. Proceedings},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {7977},\n  pages        = {384--399},\n  publisher    = {Springer},\n  year         = {2013},\n  url          = {https://doi.org/10.1007/978-3-642-39200-9\\_32},\n  doi          = {10.1007/978-3-642-39200-9\\_32},\n  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},\n  biburl       = {https://dblp.org/rec/conf/icwe/AlmonaiesACD13.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n \n\n\n
\n \n\n \n \n \n \n \n \n An approach to clone detection in behavioural models.\n \n \n \n \n\n\n \n Antony, E. P.; Alalfi, M. H.; and Cordy, J. R.\n\n\n \n\n\n\n In Lämmel, R.; Oliveto, R.; and Robbes, R., editor(s), 20th Working Conference on Reverse Engineering, WCRE 2013, Koblenz, Germany, October 14-17, 2013, pages 472–476, 2013. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"AnPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/wcre/AntonyAC13,\n  author       = {Elizabeth P. Antony and\n                  Manar H. Alalfi and\n                  James R. Cordy},\n  editor       = {Ralf L{\\"{a}}mmel and\n                  Rocco Oliveto and\n                  Romain Robbes},\n  title        = {An approach to clone detection in behavioural models},\n  booktitle    = {20th Working Conference on Reverse Engineering, {WCRE} 2013, Koblenz,\n                  Germany, October 14-17, 2013},\n  pages        = {472--476},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2013},\n  url          = {https://doi.org/10.1109/WCRE.2013.6671325},\n  doi          = {10.1109/WCRE.2013.6671325},\n  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/wcre/AntonyAC13.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2012\n \n \n (6)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Models are code too: Near-miss clone detection for Simulink models.\n \n \n \n \n\n\n \n Alalfi, M. H.; Cordy, J. R.; Dean, T. R.; Stephan, M.; and Stevenson, A.\n\n\n \n\n\n\n In 28th IEEE International Conference on Software Maintenance, ICSM 2012, Trento, Italy, September 23-28, 2012, pages 295–304, 2012. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"ModelsPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icsm/AlalfiCDSS12,\n  author       = {Manar H. Alalfi and\n                  James R. Cordy and\n                  Thomas R. Dean and\n                  Matthew Stephan and\n                  Andrew Stevenson},\n  title        = {Models are code too: Near-miss clone detection for Simulink models},\n  booktitle    = {28th {IEEE} International Conference on Software Maintenance, {ICSM}\n                  2012, Trento, Italy, September 23-28, 2012},\n  pages        = {295--304},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2012},\n  url          = {https://doi.org/10.1109/ICSM.2012.6405285},\n  doi          = {10.1109/ICSM.2012.6405285},\n  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/icsm/AlalfiCDSS12.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Recovering Role-Based Access Control Security Models from Dynamic Web Applications.\n \n \n \n \n\n\n \n Alalfi, M. H.; Cordy, J. R.; and Dean, T. R.\n\n\n \n\n\n\n In Brambilla, M.; Tokuda, T.; and Tolksdorf, R., editor(s), Web Engineering - 12th International Conference, ICWE 2012, Berlin, Germany, July 23-27, 2012. Proceedings, volume 7387, of Lecture Notes in Computer Science, pages 121–136, 2012. Springer\n \n\n\n\n
\n\n\n\n \n \n \"RecoveringPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icwe/AlalfiCD12,\n  author       = {Manar H. Alalfi and\n                  James R. Cordy and\n                  Thomas R. Dean},\n  editor       = {Marco Brambilla and\n                  Takehiro Tokuda and\n                  Robert Tolksdorf},\n  title        = {Recovering Role-Based Access Control Security Models from Dynamic\n                  Web Applications},\n  booktitle    = {Web Engineering - 12th International Conference, {ICWE} 2012, Berlin,\n                  Germany, July 23-27, 2012. Proceedings},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {7387},\n  pages        = {121--136},\n  publisher    = {Springer},\n  year         = {2012},\n  url          = {https://doi.org/10.1007/978-3-642-31753-8\\_9},\n  doi          = {10.1007/978-3-642-31753-8\\_9},\n  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},\n  biburl       = {https://dblp.org/rec/conf/icwe/AlalfiCD12.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Near-miss model clone detection for Simulink models.\n \n \n \n \n\n\n \n Alalfi, M. H.; Cordy, J. R.; Dean, T. R.; Stephan, M.; and Stevenson, A.\n\n\n \n\n\n\n In Cordy, J. R.; Inoue, K.; Koschke, R.; Krinke, J.; and Roy, C. K., editor(s), Proceeding of the 6th International Workshop on Software Clones, IWSC 2012, Zurich, Switzerland, June 4, 2012, pages 78–79, 2012. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"Near-missPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/iwsc/AlalfiCDSS12,\n  author       = {Manar H. Alalfi and\n                  James R. Cordy and\n                  Thomas R. Dean and\n                  Matthew Stephan and\n                  Andrew Stevenson},\n  editor       = {James R. Cordy and\n                  Katsuro Inoue and\n                  Rainer Koschke and\n                  Jens Krinke and\n                  Chanchal K. Roy},\n  title        = {Near-miss model clone detection for Simulink models},\n  booktitle    = {Proceeding of the 6th International Workshop on Software Clones, {IWSC}\n                  2012, Zurich, Switzerland, June 4, 2012},\n  pages        = {78--79},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2012},\n  url          = {https://doi.org/10.1109/IWSC.2012.6227873},\n  doi          = {10.1109/IWSC.2012.6227873},\n  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/iwsc/AlalfiCDSS12.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Towards qualitative comparison of Simulink model clone detection approaches.\n \n \n \n \n\n\n \n Stephan, M.; Alalfi, M. H.; Stevenson, A.; and Cordy, J. R.\n\n\n \n\n\n\n In Cordy, J. R.; Inoue, K.; Koschke, R.; Krinke, J.; and Roy, C. K., editor(s), Proceeding of the 6th International Workshop on Software Clones, IWSC 2012, Zurich, Switzerland, June 4, 2012, pages 84–85, 2012. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"TowardsPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/iwsc/StephanASC12,\n  author       = {Matthew Stephan and\n                  Manar H. Alalfi and\n                  Andrew Stevenson and\n                  James R. Cordy},\n  editor       = {James R. Cordy and\n                  Katsuro Inoue and\n                  Rainer Koschke and\n                  Jens Krinke and\n                  Chanchal K. Roy},\n  title        = {Towards qualitative comparison of Simulink model clone detection approaches},\n  booktitle    = {Proceeding of the 6th International Workshop on Software Clones, {IWSC}\n                  2012, Zurich, Switzerland, June 4, 2012},\n  pages        = {84--85},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2012},\n  url          = {https://doi.org/10.1109/IWSC.2012.6227876},\n  doi          = {10.1109/IWSC.2012.6227876},\n  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/iwsc/StephanASC12.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Automated verification of role-based access control security models recovered from dynamic web applications.\n \n \n \n \n\n\n \n Alalfi, M. H.; Cordy, J. R.; and Dean, T. R.\n\n\n \n\n\n\n In Tilley, S. R.; Distante, D.; and Rossi, G., editor(s), 14th IEEE International Symposium on Web Systems Evolution, WSE 2012, Trento, Italy, September 28, 2012, pages 1–10, 2012. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"AutomatedPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/wse/AlalfiCD12,\n  author       = {Manar H. Alalfi and\n                  James R. Cordy and\n                  Thomas R. Dean},\n  editor       = {Scott R. Tilley and\n                  Damiano Distante and\n                  Gustavo Rossi},\n  title        = {Automated verification of role-based access control security models\n                  recovered from dynamic web applications},\n  booktitle    = {14th {IEEE} International Symposium on Web Systems Evolution, {WSE}\n                  2012, Trento, Italy, September 28, 2012},\n  pages        = {1--10},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2012},\n  url          = {https://doi.org/10.1109/WSE.2012.6320525},\n  doi          = {10.1109/WSE.2012.6320525},\n  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/wse/AlalfiCD12.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Normalizing object-oriented class styles in JavaScript.\n \n \n \n \n\n\n \n Gama, W.; Alalfi, M. H.; Cordy, J. R.; and Dean, T. R.\n\n\n \n\n\n\n In Tilley, S. R.; Distante, D.; and Rossi, G., editor(s), 14th IEEE International Symposium on Web Systems Evolution, WSE 2012, Trento, Italy, September 28, 2012, pages 79–83, 2012. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"NormalizingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/wse/GamaACD12,\n  author       = {Widd Gama and\n                  Manar H. Alalfi and\n                  James R. Cordy and\n                  Thomas R. Dean},\n  editor       = {Scott R. Tilley and\n                  Damiano Distante and\n                  Gustavo Rossi},\n  title        = {Normalizing object-oriented class styles in JavaScript},\n  booktitle    = {14th {IEEE} International Symposium on Web Systems Evolution, {WSE}\n                  2012, Trento, Italy, September 28, 2012},\n  pages        = {79--83},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2012},\n  url          = {https://doi.org/10.1109/WSE.2012.6320536},\n  doi          = {10.1109/WSE.2012.6320536},\n  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/wse/GamaACD12.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2011\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Towards a framework for migrating web applications to web services.\n \n \n \n \n\n\n \n Almonaies, A. A.; Alalfi, M. H.; Cordy, J. R.; and Dean, T. R.\n\n\n \n\n\n\n In Ng, J. W.; Couturier, C.; Litoiu, M.; and Stroulia, E., editor(s), Center for Advanced Studies on Collaborative Research, CASCON '11, Toronto, ON, Canada, November 7-10, 2011, pages 229–241, 2011. IBM / ACM\n \n\n\n\n
\n\n\n\n \n \n \"TowardsPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/cascon/AlmonaiesACD11,\n  author       = {Asil A. Almonaies and\n                  Manar H. Alalfi and\n                  James R. Cordy and\n                  Thomas R. Dean},\n  editor       = {Joanna W. Ng and\n                  Christian Couturier and\n                  Marin Litoiu and\n                  Eleni Stroulia},\n  title        = {Towards a framework for migrating web applications to web services},\n  booktitle    = {Center for Advanced Studies on Collaborative Research, {CASCON} '11,\n                  Toronto, ON, Canada, November 7-10, 2011},\n  pages        = {229--241},\n  publisher    = {{IBM} / {ACM}},\n  year         = {2011},\n  url          = {http://dl.acm.org/citation.cfm?id=2093915},\n  timestamp    = {Fri, 30 Nov 2018 02:24:54 +0100},\n  biburl       = {https://dblp.org/rec/conf/cascon/AlmonaiesACD11.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2010\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n A Verification Framework for Access Control in Dynamic Web Applications.\n \n \n \n \n\n\n \n Alalfi, M. H.\n\n\n \n\n\n\n Ph.D. Thesis, Queen's University at Kingston, Ontario, Canada, 2010.\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@phdthesis{DBLP:phd/ca/Alalfi10,\n  author       = {Manar H. Alalfi},\n  title        = {A Verification Framework for Access Control in Dynamic Web Applications},\n  school       = {Queen's University at Kingston, Ontario, Canada},\n  year         = {2010},\n  url          = {https://hdl.handle.net/1974/5651},\n  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/phd/ca/Alalfi10.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Automating Coverage Metrics for Dynamic Web Applications.\n \n \n \n \n\n\n \n Alalfi, M. H.; Cordy, J. R.; and Dean, T. R.\n\n\n \n\n\n\n In Capilla, R.; Ferenc, R.; and Dueñas, J. C., editor(s), 14th European Conference on Software Maintenance and Reengineering, CSMR 2010, 15-18 March 2010, Madrid, Spain, pages 51–60, 2010. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"AutomatingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/csmr/AlalfiCD10,\n  author       = {Manar H. Alalfi and\n                  James R. Cordy and\n                  Thomas R. Dean},\n  editor       = {Rafael Capilla and\n                  Rudolf Ferenc and\n                  Juan C. Due{\\~{n}}as},\n  title        = {Automating Coverage Metrics for Dynamic Web Applications},\n  booktitle    = {14th European Conference on Software Maintenance and Reengineering,\n                  {CSMR} 2010, 15-18 March 2010, Madrid, Spain},\n  pages        = {51--60},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2010},\n  url          = {https://doi.org/10.1109/CSMR.2010.21},\n  doi          = {10.1109/CSMR.2010.21},\n  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/csmr/AlalfiCD10.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Analyzing natural-language artifacts of the software process.\n \n \n \n \n\n\n \n Hasan, M.; Stroulia, E.; Barbosa, D.; and Alalfi, M. H.\n\n\n \n\n\n\n In Marinescu, R.; Lanza, M.; and Marcus, A., editor(s), 26th IEEE International Conference on Software Maintenance (ICSM 2010), September 12-18, 2010, Timisoara, Romania, pages 1–5, 2010. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"AnalyzingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icsm/HasanSBA10,\n  author       = {Maryam Hasan and\n                  Eleni Stroulia and\n                  Denilson Barbosa and\n                  Manar H. Alalfi},\n  editor       = {Radu Marinescu and\n                  Michele Lanza and\n                  Andrian Marcus},\n  title        = {Analyzing natural-language artifacts of the software process},\n  booktitle    = {26th {IEEE} International Conference on Software Maintenance {(ICSM}\n                  2010), September 12-18, 2010, Timisoara, Romania},\n  pages        = {1--5},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2010},\n  url          = {https://doi.org/10.1109/ICSM.2010.5609680},\n  doi          = {10.1109/ICSM.2010.5609680},\n  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/icsm/HasanSBA10.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2009\n \n \n (4)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Modelling methods for web application verification and testing: state of the art.\n \n \n \n \n\n\n \n Alalfi, M. H.; Cordy, J. R.; and Dean, T. R.\n\n\n \n\n\n\n Softw. Test. Verification Reliab., 19(4): 265–296. 2009.\n \n\n\n\n
\n\n\n\n \n \n \"ModellingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/stvr/AlalfiCD09,\n  author       = {Manar H. Alalfi and\n                  James R. Cordy and\n                  Thomas R. Dean},\n  title        = {Modelling methods for web application verification and testing: state\n                  of the art},\n  journal      = {Softw. Test. Verification Reliab.},\n  volume       = {19},\n  number       = {4},\n  pages        = {265--296},\n  year         = {2009},\n  url          = {https://doi.org/10.1002/stvr.401},\n  doi          = {10.1002/STVR.401},\n  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/stvr/AlalfiCD09.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A verification framework for access control in dynamic web applications.\n \n \n \n \n\n\n \n Alalfi, M. H.; Cordy, J. R.; and Dean, T. R.\n\n\n \n\n\n\n In Desai, B. C.; Leung, C. K.; and Ormandjieva, O., editor(s), Canadian Conference on Computer Science & Software Engineering, C3S2E 2009, Montreal, Quebec, Canada, May 19-21, 2009, Proceedings, of ACM International Conference Proceeding Series, pages 109–113, 2009. ACM\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/c3s2e/AlalfiCD09,\n  author       = {Manar H. Alalfi and\n                  James R. Cordy and\n                  Thomas R. Dean},\n  editor       = {Bipin C. Desai and\n                  Carson Kai{-}Sang Leung and\n                  Olga Ormandjieva},\n  title        = {A verification framework for access control in dynamic web applications},\n  booktitle    = {Canadian Conference on Computer Science {\\&} Software Engineering,\n                  {C3S2E} 2009, Montreal, Quebec, Canada, May 19-21, 2009, Proceedings},\n  series       = {{ACM} International Conference Proceeding Series},\n  pages        = {109--113},\n  publisher    = {{ACM}},\n  year         = {2009},\n  url          = {https://doi.org/10.1145/1557626.1557643},\n  doi          = {10.1145/1557626.1557643},\n  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/c3s2e/AlalfiCD09.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Automated Reverse Engineering of UML Sequence Diagrams for Dynamic Web Applications.\n \n \n \n \n\n\n \n Alalfi, M. H.; Cordy, J. R.; and Dean, T. R.\n\n\n \n\n\n\n In Second International Conference on Software Testing Verification and Validation, ICST 2009, Denver, Colorado, USA, April 1-4, 2009, Workshops Proceedings, pages 287–294, 2009. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"AutomatedPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icst/AlalfiCD09,\n  author       = {Manar H. Alalfi and\n                  James R. Cordy and\n                  Thomas R. Dean},\n  title        = {Automated Reverse Engineering of {UML} Sequence Diagrams for Dynamic\n                  Web Applications},\n  booktitle    = {Second International Conference on Software Testing Verification and\n                  Validation, {ICST} 2009, Denver, Colorado, USA, April 1-4, 2009, Workshops\n                  Proceedings},\n  pages        = {287--294},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2009},\n  url          = {https://doi.org/10.1109/ICSTW.2009.8},\n  doi          = {10.1109/ICSTW.2009.8},\n  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/icst/AlalfiCD09.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n WAFA: Fine-grained dynamic analysis of web applications.\n \n \n \n \n\n\n \n Alalfi, M. H.; Cordy, J. R.; and Dean, T. R.\n\n\n \n\n\n\n In Wong, K.; Zou, Y.; and Wu, J., editor(s), Proceedings of the 11th IEEE International Symposium on Web Systems Evolution, WSE 2009, 25-26 September 2009, Edmonton, Alberta, Canada, pages 141–150, 2009. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"WAFA:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/wse/AlalfiCD09,\n  author       = {Manar H. Alalfi and\n                  James R. Cordy and\n                  Thomas R. Dean},\n  editor       = {Kenny Wong and\n                  Ying Zou and\n                  Ji Wu},\n  title        = {{WAFA:} Fine-grained dynamic analysis of web applications},\n  booktitle    = {Proceedings of the 11th {IEEE} International Symposium on Web Systems\n                  Evolution, {WSE} 2009, 25-26 September 2009, Edmonton, Alberta, Canada},\n  pages        = {141--150},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2009},\n  url          = {https://doi.org/10.1109/WSE.2009.5631226},\n  doi          = {10.1109/WSE.2009.5631226},\n  timestamp    = {Thu, 11 Aug 2022 10:18:25 +0200},\n  biburl       = {https://dblp.org/rec/conf/wse/AlalfiCD09.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2008\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n SQL2XMI: Reverse Engineering of UML-ER Diagrams from Relational Database Schemas.\n \n \n \n \n\n\n \n Alalfi, M. H.; Cordy, J. R.; and Dean, T. R.\n\n\n \n\n\n\n In Hassan, A. E.; Zaidman, A.; and Penta, M. D., editor(s), WCRE 2008, Proceedings of the 15th Working Conference on Reverse Engineering, Antwerp, Belgium, October 15-18, 2008, pages 187–191, 2008. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"SQL2XMI:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/wcre/AlalfiCD08,\n  author       = {Manar H. Alalfi and\n                  James R. Cordy and\n                  Thomas R. Dean},\n  editor       = {Ahmed E. Hassan and\n                  Andy Zaidman and\n                  Massimiliano Di Penta},\n  title        = {{SQL2XMI:} Reverse Engineering of {UML-ER} Diagrams from Relational\n                  Database Schemas},\n  booktitle    = {{WCRE} 2008, Proceedings of the 15th Working Conference on Reverse\n                  Engineering, Antwerp, Belgium, October 15-18, 2008},\n  pages        = {187--191},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2008},\n  url          = {https://doi.org/10.1109/WCRE.2008.30},\n  doi          = {10.1109/WCRE.2008.30},\n  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/wcre/AlalfiCD08.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2007\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n A Survey of Analysis Models and Methods in Website Verification and Testing.\n \n \n \n \n\n\n \n Alalfi, M. H.; Cordy, J. R.; and Dean, T. R.\n\n\n \n\n\n\n In Baresi, L.; Fraternali, P.; and Houben, G., editor(s), Web Engineering, 7th International Conference, ICWE 2007, Como, Italy, July 16-20, 2007, Proceedings, volume 4607, of Lecture Notes in Computer Science, pages 306–311, 2007. Springer\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 3 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icwe/AlalfiCD07,\n  author       = {Manar H. Alalfi and\n                  James R. Cordy and\n                  Thomas R. Dean},\n  editor       = {Luciano Baresi and\n                  Piero Fraternali and\n                  Geert{-}Jan Houben},\n  title        = {A Survey of Analysis Models and Methods in Website Verification and\n                  Testing},\n  booktitle    = {Web Engineering, 7th International Conference, {ICWE} 2007, Como,\n                  Italy, July 16-20, 2007, Proceedings},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {4607},\n  pages        = {306--311},\n  publisher    = {Springer},\n  year         = {2007},\n  url          = {https://doi.org/10.1007/978-3-540-73597-7\\_25},\n  doi          = {10.1007/978-3-540-73597-7\\_25},\n  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},\n  biburl       = {https://dblp.org/rec/conf/icwe/AlalfiCD07.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n\n\n \n\n \n \n \n \n\n
\n"}; document.write(bibbase_data.data);