Home
Research
Teaching
Services
Links
Contact
Research
Book Chapters
BC-3:
Mamdouh Alenezi
, Muhammad Usama, Khaled Almustafa, Waheed Iqbal, Muhammad Ali Raza, and Tanveer Khan:
"An Efficient, Secure, and Queryable Encryption for NoSQL-Based Databases Hosted on Untrusted Cloud Environments."
in "Research Anthology on Artificial Intelligence Applications in Security," DOI: 10.4018/978-1-7998-7705-9.ch033 (2021).
BC-2: Sadiq Almuairfi and
Mamdouh Alenezi
:
"Anonymous Authentication for Privacy Preserving of Multimedia Data in the Cloud."
in "Handbook of Research on Multimedia Cyber Security," 9781799827016 (2020).
BC-1: Iman Almomani and
Mamdouh Alenezi
:
"Android Application Security Scanning Process."
in "Telecommunication Systems - Principles and Applications of Wireless-Optical Technologies," 978-1-78984-294-4 (2019).
Journals
J-103: Fayez Alanazi and
Mamdouh Alenezi
:
"A framework for integrating intelligent transportation systems with smart city infrastructure."
Journal of Infrastructure, Policy and Development 2024, 8(5), 3558; https://doi.org/10.24294/jipd.v8i5.3558
J-102: Fayez Alanazi and
Mamdouh Alenezi
:
"Interoperability for intelligent traffic management systems in smart cities."
International Journal of Electrical and Computer Engineering (IJECE) Vol. 14, No. 2, April 2024, pp. 1864-1874; https://doi.org/10.24294/jipd.v8i3.3085
J-101: Fayez Alanazi and
Mamdouh Alenezi
:
"Driving the future: Leveraging digital transformation for sustainable transportation."
Journal of Infrastructure, Policy and Development 2024, 8(3), 3085; https://doi.org/10.24294/jipd.v8i3.3085
J-100: Fayez Alanazi and
Mamdouh Alenezi
:
"Software Engineering Techniques for Building Sustainable Cities with Electric Vehicles."
Applied Sciences 2023, 13(15), 8741; https://doi.org/10.3390/app13158741
J-99:
Mamdouh Alenezi
and Mohammad Akour:
"Digital Transformation Blueprint in Higher Education: A Case Study of PSU."
Sustainability 2023, 15(10), 8204; https://doi.org/10.3390/su15108204
J-98: Yasir Javed and
Mamdouh Alenezi
:
"A Case Study on Sustainable Quality Assurance in Higher Education."
Sustainability 2023, 15(10), 8136; https://doi.org/10.3390/su15108136
J-97:
Mamdouh Alenezi
, Saja Wardat, Mohammed Akour:
"The Need of Integrating Digital Education in Higher Education: Challenges and Opportunities."
Sustainability 2023, 15, 4782. https://doi.org/10.3390/su15064782
J-96:
Mamdouh Alenezi
:
"Digital Learning and Digital Institution in Higher Education."
Education Sciences 13, no. 1: 88. https://doi.org/10.3390/educsci13010088
J-95: Ahmed Mateen Buttar, Adeel Khalid,
Mamdouh Alenezi
, Muhammad Azeem Akbar, Saima Rafi, Abdu H. Gumaei, and Muhammad Tanveer Riaz.:
"Optimization of DevOps Transformation for Cloud-Based Applications."
Electronics 12, no. 2: 357. https://doi.org/10.3390/electronics12020357
J-94: Mohammed Akour, Osama Al Qasem,
Mamdouh Alenezi
, Abeer Bataineh and Feras Hanandeh:
"Ensemble and Base Learner ML Techniques for Traffic Accident Severity Prediction: A Comparison Study."
ICIC Express Letters Volume 16, Number 12, December 2022 https://doi.org/10.24507/icicel.16.12.1301
J-93: Mohammad Akour,
Mamdouh Alenezi
:
"Higher Education Future in the Era of Digital Transformation."
Education Sciences 12, 784. 2022. https://doi.org/10.3390/educsci12110784
J-92: Soumya Snigdha Mohapatra, Rakesh Ranjan Kumar,
Mamdouh Alenezi
, Abu Taha Zamani, and Nikhat Parveen:
"QoS-Aware Cloud Service Recommendation Using Metaheuristic Approach."
Electronics 11(21):3469. 2022 https://doi.org/10.3390/electronics11213469
J-91: Noor Mohammed Noorani, Abu Taha Zamani,
Mamdouh Alenezi
, Mohammad Shameem, and Priyanka Singh:
"Factor Prioritization for Effectively Implementing DevOps in Software Development Organizations: A SWOT-AHP Approach."
Axioms 11, no. 10: 498. 2022. https://doi.org/10.3390/axioms11100498
J-90: Mohammad Akour,
Mamdouh Alenezi
, and Hiba Alsghaier:
"Software Refactoring Prediction Using SVM and Optimization Algorithms."
Processes 2022, 10, 1611. https://doi.org/10.3390/pr10081611
J-89: Mohammed Zagane,
Mamdouh Alenezi
, and Mustapha Kamel Abdi:
"Hybrid Representation to Locate Vulnerable Lines of Code."
International Journal of Software Innovation (IJSI) 10(1), 2022, Pages: 19
J-88:
Mamdouh Alenezi
and Mohammad Akour:
"Methodical Software Testing Course in Higher Education."
International Journal of Engineering Pedagogy (iJEP), 12(1), pp. 51–62.
J-87:
Mamdouh Alenezi
, Hamid Abdul Basit, Maham Anwar Beg, Muhammad Saad Shaukat:
"Synthesizing secure software development activities for linear and agile lifecycle models."
Software: Practice and Experience, 2022,
J-86:
Mamdouh Alenezi
:
"Deep Dive into Digital Transformation in Higher Education Institutions."
Education Sciences, 2021, 11(12), 770.
J-85:
Mamdouh Alenezi
and Mohammed Akour:
"Open-Source Machine Learning Software Systems: Architectural Analysis."
ICIC Express Letters Part B: Applications, Volume 12 Issue 11, November 2021.
J-84: Mohammed Akour,
Mamdouh Alenezi
, Hiba Al Sghaier and Yazan Al Shboul:
"The COVID-19 pandemic: when e-learning becomes mandatory not complementary."
Int. J. Technology Enhanced Learning, Vol. 13, No. 4, 2021.
J-83:
Mamdouh Alenezi
:
"An Ontological Framework for Healthcare Web Applications Security."
International Journal of Advanced Computer Science and Applications(IJACSA), Volume 12 Issue 6, 2021.
J-82:
Mamdouh Alenezi
:
"Internal Quality Evolution of Open-Source Software Systems."
Applied Sciences, 2021, 11, 5690.
J-81: Mohammad Zarour and
Mamdouh Alenezi
:
"Software process improvement initiative in medium size IT organization: a case study."
Indonesian Journal of Electrical Engineering and Computer Science, Vol 23, No 1, 2021
J-80:
Mamdouh Alenezi
, Mohammed Akour, and Hamid Abdul Basit:
"Exploring Software Security Test Generation Techniques: Challenges and Opportunities."
International Journal of Education and Information Technologies, Volume 15, 2021, pp.106-121
J-79: Mohammad Zarour,
Mamdouh Alenezi
, Md Tarique Jamal Ansari, Abhishek Kumar Pandey, Masood Ahmad, Alka Agrawal, Rajeev Kumar, and Raees Ahmad Khan:
"Ensuring data integrity of healthcare information in the era of digital health."
Healthcare Technology Letters, 2021
J-78:
Mamdouh Alenezi
:
"Safeguarding Cloud Computing Infrastructure: A Security Analysis."
Computer Systems Science and Engineering Vol.37, No.2, 2021, pp.159-167;
J-77: Ali Al-Laith and
Mamdouh Alenezi
:
"Monitoring People’s Emotions and Symptoms from Arabic Tweets during the COVID-19 Pandemic."
Information 2021, 12(2), 86;
J-76:
Mamdouh Alenezi
, Abhishek Kumar Pandey, Richa Verma, Mohd Faizan, Shalini Chandra, Alka Agrawal, Rajeev Kumar, and Raees Ahmad Khan:
"Evaluating the Impact of Software Security Tactics: A Design Perspective."
Computers, Materials & Continua, Vol.66, No.3, 2021, pp.2283-2299
J-75: Khalid T. Al-Sarayreh,
Mamdouh Alenezi
, Mohammed Zarour, and Kenza Meridji:
"A reference measurement framework of software security product quality (SPQ
NFSR
)."
IET Information Security, 2021.
J-74:
Mamdouh Alenezi
, Mohammed Zagane, and Yasir Javed:
"Efficient Deep Features Learning for Vulnerability Detection Using Character N-Gram Embedding."
Jordanian Journal of Computers and Information Technology (JJCIT), Vol. 07, No. 01, March 2021, pp. 25 - 39.
J-73:
Mamdouh Alenezi
, Muhammad Nadeem, and Raja Asif:
"SQL injection attacks countermeasures assessments."
Indonesian Journal of Electrical Engineering and Computer Science, Volume 21, Number 2, pp. 1121 - 1131 February 2021.
J-72: Rajeev Kumar,
Mamdouh Alenezi
, Md Tarique Jamal Ansari, Bineet Kumar Gupta, Alka Agrawal, and Raees Ahmad Khan:
"Evaluating the Impact of Malware Analysis Techniques for Securing Web Applications through a Decision-Making Framework under Fuzzy Environment."
International Journal of Intelligent Engineering and Systems, Vol. 13, No. 6, December 2020, pp. 94-109
J-71: Sadiq Almuairfi and
Mamdouh Alenezi
:
"Security controls in infrastructure as code."
Computer Fraud & Security, Volume 2020, Issue 10, pp. 13 - 19 October 2020.
J-70: Khalid T. Al-Sarayreh, Kenza Meridji,
Mamdouh Alenezi
, Mohammed Zarour, Mohammed D. Al-Majali:
"A sustainable procedural method of software design process improvements."
Indonesian Journal of Electrical Engineering and Computer Science, Volume 21, Number 1, pp. 4040 - 449 January 2021.
J-69:
Mamdouh Alenezi
, Mohammed Akour, and Osama Al Qasem:
"Harnessing deep learning algorithms to predict software refactoring."
TELKOMNIKA Telecommunication, Computing, Electronics and Control Vol. 18, No. 6, December 2020, pp. 2977-2982
J-68: Mohammad Zarour, Md Tarique Jamal Ansari,
Mamdouh Alenezi
, Amal Krishna Sarkar, Mohd Faizan, Alka Agrawal, Rajeev Kumar, and Raees Ahmad Khan:
"Evaluating the Impact of Blockchain Models for Secure and Trustworthy Electronic Healthcare Records."
IEEE Access, 2020
J-67:
Mamdouh Alenezi
, Mohammad Nadeem, Alka Agrawal, Rajeev Kumar, and Raees Ahmad Khan:
"Fuzzy Multi Criteria Decision Analysis Method for Assessing Security Design Tactics for Web Applications."
International Journal of Intelligent Engineering and Systems, Vol. 13, No. 5, October 2020, pp. 181-196
J-66:
Mamdouh Alenezi
:
"Ontology-Based Context-sensitive Software Security Knowledge Management Modeling."
International Journal of Electrical and Computer Engineering (IJECE), Vol. 10, No. 6, December 2020, pp. 6507-6520
J-65: Mohammad Zarour, Norah Alhammad,
Mamdouh Alenezi
, and Khalid Alsarayrah:
"DevOps Process Model Adoption in Saudi Arabia: An Empirical Study."
Jordanian Journal of Computers and Information Technology (JJCIT), Vol. 06, No. 03, September 2020, pp. 234 - 246.
J-64:
Mamdouh Alenezi
and Mohammed Akour:
"Exploring the Connection between Design Smells and Security Vulnerabilities."
International Journal of Innovative Technology and Exploring Engineering (IJITEE) Volume-9 Issue-8, June 20208, Pages:449-452
J-63: Mohammed Zagane, Mustapha Kamel Abdi and
Mamdouh Alenezi
:
"A New Approach to Locate Software Vulnerabilities Using Code Metrics."
International Journal of Software Innovation (IJSI) 8(3), 2020, Pages: 14
J-62: Adil Hussain Seh, Mohammad Zarour,
Mamdouh Alenezi
, Amal Krishna Sarkar, Alka Agrawal, Rajeev Kumar, and Raees Ahmad Khan:
"Healthcare Data Breaches: Insights and Implications."
Healthcare 2020, 8(2), 133
J-61: Celestine Iwendi, Suleman Khan, Joseph H. Anajemba, Mohit Mittal,
Mamdouh Alenezi
, Mamoun Alazab:
"The Use of Ensemble Models for Multiple Class and Binary Class Classification for Improving Intrusion Detection Systems."
Sensors 2020, 20(9), 2559
J-60: Mohammed Zagane, Mustapha Kamel Abdi, and
Mamdouh Alenezi
:
"Deep Learning for Software Vulnerabilities Detection Using Code Metrics."
IEEE Access, Volume 8, pp. 74562 - 74570 2020.
J-59: Osama Al Qasem, Mohammed Akour, and
Mamdouh Alenezi
:
"The Influence of Deep Learning Algorithms Factors in Software Fault Prediction."
IEEE Access, Volume 8, pp. 63945 - 63960 2020.
J-58: Suhel Ahmad Khan,
Mamdouh Alenezi
, Alka Agrawal, Rajeev Kumar, and Raees Ahmad Khan:
"Evaluating Performance of Software Durability through an Integrated Fuzzy-Based Symmetrical Method of ANP and TOPSIS."
Symmetry 2020, 12(4), 493.
J-57:
Mamdouh Alenezi
and Sadiq Almuairfi:
"Essential Activities for Secure Software Development."
International Journal of Software Engineering & Applications (IJSEA), Volume 11, Number 2, 2020.
J-56: Joseph Henry Anajemba, Tang Yue, Celestine Iwendi,
Mamdouh Alenezi
, and Mohit Mittal:
"Optimal Cooperative Offloading Scheme For Energy Efficient Multi-Access Edge Computation."
IEEE ACCESS, 2020.
J-55: Mohammed Akour and
Mamdouh Alenezi
:
"Test Suites Effectiveness Evolution in Open Source Systems: Empirical Study."
Indonesian Journal of Electrical Engineering and Computer Science, Volume 19, Number 2, pp. 1085 - 1092 March 2020.
J-54: Alka Agrawal,
Mamdouh Alenezi
, Rajeev Kumar, and Raees Ahmad Khan:
"A Unified Fuzzy-Based Symmetrical Multi-Criteria Decision-Making Method for Evaluating Sustainable-Security of Web Applications."
Symmetry 2020, 12(3), 448
J-53: Abhishek Kumar Pandey, Ashutosh Tripathi,
Mamdouh Alenezi
, Alka Agrawal, Rajeev Kumar, and Raees Ahmad Khan:
"A Framework for Producing Effective and Efficient Secure Code through Malware Analysis."
International Journal of Advanced Computer Science and Applications(IJACSA), Volume 11, Issue 2, pp. 497-503 2020.
J-52: Aamir Shahab,
Mamdouh Alenezi
, Muhammad Nadeem, and Raja Asif:
"An automated approach to fix buffer overflows."
International Journal of Electrical and Computer Engineering (IJECE), Volume 10, Issue 4, pp. 3778-3788 2020.
J-51:
Mamdouh Alenezi
, Alka Agrawal, Rajeev Kumar, and Raees Ahmad Khan:
"Evaluating Performance of Web Application Security through a Fuzzy based Hybrid Multi-Criteria Decision-Making Approach: Design Tactics Perspective."
IEEE ACCESS, Volume 8, 31 January 2020.
J-50:
Mamdouh Alenezi
and Mohammad Zarour:
"On the Relationship between Software Complexity and Security."
International Journal of Software Engineering & Applications (IJSEA), Volume 11, Issue 1, pp. 51 - 60 January 2020.
J-49: Alka Agrawal,
Mamdouh Alenezi
, Rajeev Kumar and Raees Ahmad Khan:
"Securing Web Applications through a Framework of Source Code Analysis."
Journal of Computer Science, Volume 15, Issue 12, pp. 1780 - 1794 December 2019.
J-48: Nada Alsolami, Qasem Obeidat, and
Mamdouh Alenezi
:
"Empirical Analysis of Object-Oriented Software Test Suite Evolution."
International Journal of Advanced Computer Science and Applications(IJACSA), Volume 10, Issue 11, pp. 89 - 98 November 2019.
J-47:
Mamdouh Alenezi
, Mohammed Akour, and Hiba Alsghaier:
"The Impact of Co-evolution of Code Production and Test Suites through Software Releases in Open Source Software Systems."
International Journal of Innovative Technology and Exploring Engineering (IJITEE), Volume 9, Issue 1, pp. 2737 - 2739 November 2019.
J-46: Alka Agrawal,
Mamdouh Alenezi
, Rajeev Kumar, and Raees Ahmad Khan:
"Measuring the Sustainable-Security of Web Applications Through a Fuzzy-Based Integrated Approach of AHP and TOPSIS."
IEEE Access, Volume 7, pp. 153936 - 153951 November 2019.
J-45: Alka Agrawal,
Mamdouh Alenezi
, Rajeev Kumar, and Raees Ahmad Khan:
"A source code perspective framework to produce secure web applications."
Computer Fraud & Security, Volume 2019, Issue 10, pp. 11 - 18 October 2019.
J-44: Faraz Idris Khan, Yasir Javed, and
Mamdouh Alenezi
:
"Security assessment of four open source software systems."
Indonesian Journal of Electrical Engineering and Computer Science, Volume 16, Number 2, pp. 860 - 881 November 2019.
J-43: Faraz Idris Khan, and
Mamdouh Alenezi
:
"Open Source Web-Based Software: Security Challenges and Assessment Methodologies."
i-manager's Journal on Software Engineering (JSE), Volume 14, Issue 1, pp. 34 - 40 October 2019.
J-42:
Mamdouh Alenezi
, Mohammad Zarour, and Sultan Alsulis:
"DevOps Development Process Awareness and Adoption -The Case of Saudi Arabia."
i-manager's Journal on Software Engineering (JSE), Volume 14, Issue 1, pp. 19 - 27 October 2019.
J-41:
Mamdouh Alenezi
and Sadiq Almuairfi:
"Security Risks in the Software Development Lifecycle."
International Journal of Recent Technology and Engineering (IJRTE), Volume 8, Issue 3, pp. 7048 - 7055 September 2019.
J-40: Mohammad Zarour, Norah Alhammad,
Mamdouh Alenezi
, and Khalid Alsarayrah:
"A Research on DevOps Maturity Models."
International Journal of Recent Technology and Engineering (IJRTE), Volume 8, Issue 3, pp. 4854 - 4862 September 2019.
J-39: Hafsa Ashraf,
Mamdouh Alenezi
, Muhammad Nadeem, and Yasir Javed:
"Security assessment framework for educational ERP systems."
International Journal of Electrical and Computer Engineering (IJECE), Volume 9, Number 6, pp. 5570 - 5585 December 2019.
J-38: Alka Agrawal, Mohammad Zarour,
Mamdouh Alenezi
, Rajeev Kumar, and Raees Ahmad Khan:
"Security durability assessment through fuzzy analytic hierarchy process."
PeerJ Computer Science, 5:e215 September 2019.
J-37: Alka Agrawal,
Mamdouh Alenezi
, Dhirendra Pandey, Rajeev Kumar, and Raees Ahmad Khan:
"Usable-Security Assessment Through A Decision Making Procedure."
ICIC Express Letters, Part B: Applications, Volume 10, Number 8, pp. 665 - 672 July 2019.
J-36: Rajeev Kumar, Mohammad Zarour,
Mamdouh Alenezi
, Alka Agrawal, and Raees Ahmad Khan:
"Measuring Security Durability of Software through Fuzzy-Based Decision-Making Process."
International Journal of Computational Intelligence Systems, Volume 12, Number 2, pp. 627 - 642 June 2019.
J-35: Attiq ur Rehman Jaffar, Muhammad Nadeem,
Mamdouh Alenezi
, and Yasir Javed:
"Using Public Vulnerabilities Data to Self-Heal Security Issues in Software Systems."
ICIC Express Letters, Volume 13, Number 7, pp. 557 - 567 July 2019.
J-34: Alka Agrawal,
Mamdouh Alenezi
, Suhel Ahmad Khan, Rajeev Kumar, and Raees Ahmad Khan:
"Multi-level Fuzzy System for Usable-Security Assessment."
Journal of King Saud University-Computer and Information Sciences (2019).
J-33:
Mamdouh Alenezi
, Rajeev Kumar, Alka Agrawal, and Raees Ahmad Khan:
"Usable-Security Attribute Evaluation Using Fuzzy Analytic Hierarchy Process."
ICIC Express Letters, Volume 13, Number 6, pp. 453 - 460 June 2019.
J-32:
Mamdouh Alenezi
, Muhammad Usama, Khaled Almustafa, Waheed Iqbal, Muhammad Ali Raza, and Tanveer Khan:
"An Efficient, Secure, and Queryable Encryption for NoSQL-Based Databases Hosted on Untrusted Cloud Environments."
International Journal of Information Security and Privacy (IJISP), Volume 13, Issue 2, pp. 14 - 31 (2019).
J-31: Park Youngeun and
Mamdouh Alenezi
:
"Predicting the Popularity of Saudi Multinational Enterprises Using a Data Mining Technique."
Journal of Management Information and Decision Sciences, Volume 21, Issue 1, (2018).
J-30: Md Tarique Jamal Ansari, Dhirendra Pandey, and
Mamdouh Alenezi
:
"STORE: Security Threat Oriented Requirements Engineering Methodology."
Journal of King Saud University - Computer and Information Sciences (2018).
J-29:
Mamdouh Alenezi
, Mohammad Zarour, and Khawlah Alomar:
"Are Open Source Web Applications Secure? Static Analysis Findings."
International Journal of System and Software Engineering, Vol. 6, No. 2, pp. 1 - 9 (2018).
J-28:
Mamdouh Alenezi
, and Mohammad Zarour:
"An Empirical Study of Bad Smells during Software Evolution Using Designite Tool."
i-manager's Journal on Software Engineering, 12(4), 12-27 (2018).
J-27: Yasir Javed,
Mamdouh Alenezi
, Mohammed Akour and Ahmad Alzyod:
"Discovering the Relationship Between Software Complexity and Software Vulnerabilities."
Journal of Theoretical and Applied Informtion Technology, Vol. 96, No. 14, pp. 4690 - 4699 (2018).
J-26:
Mamdouh Alenezi
, Shadi Banitaan, and Mohammad Zarour:
"CLUBA: A Clustering-Based Approach for Bug Assignment."
International Journal of System and Software Engineering, Vol. 6, Issue 1, pp. 1 - 9 (2018).
J-25: Muhammad Abdullah, Saad Khan,
Mamdouh Alenezi
, Khaled Almustafa, and Waheed Iqbal:
"Application Centric Virtual Machine Placements to Minimize Bandwidth Utilization in Datacenters."
Intelligent Automation and Soft Computing, 1–14.
J-24: Iman Almomani and
Mamdouh Alenezi
:
"Efficient Denial of Service Attacks Detection in Wireless Sensor Networks."
Journal of Information Science and Engineering Vol. 34, No. 4 (2018), pp. 977 - 1000.
J-23: Layla Alrawais,
Mamdouh Alenezi
, and Mohammad Akour:
"Security Testing Framework for Web Applications."
International Journal of Software Innovation (IJSI) Vol. 6, No. 3 (2018), pp. 93 - 117.
J-22: Turki Alshammary and
Mamdouh Alenezi
:
"Software Architecture Understandability in Object-Oriented Systems."
i-manager’s Journal on Software Engineering Vol. 12, No. 2 (2018), pp. 1 - 14.
J-21: Mohannad Alsayat and
Mamdouh Alenezi
:
"ERP Implementation Failures in Saudi Arabia: Key Findings."
International Business Management Vol. 12, No. 1 (2018), pp. 10 - 22.
J-20:
Mamdouh Alenezi
, Khaled Almustafa and Khalim Amjad Meerja:
"Cloud based SDN and NFV architectures for IoT infrastructure."
Egyptian Informatics Journal (2018).
J-19:
Mamdouh Alenezi
, Shadi Banitaan and Mohammad Zarour:
"Using Categorical Features in Mining Bug Tracking Systems to Assign Bug Reports."
International Journal of Software Engineering & Applications (IJSEA) Vol. 9, No. 2 (2018), pp. 29 - 39.
J-18: Abdulrahman Asiri, Qasem Obiedat and
Mamdouh Alenezi
:
"A Cloud-Based Cross - Enterprise Imaging Framework."
i-manager’s Journal on Software Engineering Vol. 12, No. 1 (2018), pp. 6 - 25.
J-17:
Mamdouh Alenezi
, Khaled Almustafa and Mohamed Hussein:
"On Virtualization and Security-Awareness Performance Analysis in 5G Cellular Networks."
Journal of Engineering Science and Technology Review Vol. 11, No. 1 (2018), pp. 199 - 207.
J-16: Hassan Almousa and
Mamdouh Alenezi
:
"Measuring Software Architecture Stability Evolution in Object-Oriented Open Source Systems."
Journal of Engineering and Applied Sciences Vol. 12, No. 2 (2017), pp. 353-362.
J-15: Mohammed Akour, Samah Aldiabat, Hiba Alsghaier, Khalid Alkhateeb and
Mamdouh Alenezi
:
"Software Architecture Understandability of Open Source Applications."
International Journal of Computer Science and Information Security (IJCSIS) Vol. 14, No. 10 (2016), pp. 65-78.
J-14: Shadi Banitaan, Mohammad Akour and
Mamdouh Alenezi
:
"A Test Suite Reduction Approach for Software Unit Testing."
Advanced Science Letters Vol. 22, No. 10 (2016), pp. 2977-2981.
J-13: Thamer Alhamed and
Mamdouh Alenezi
:
"Business Continuity Management & Disaster Recovery Capabilities in Saudi Arabia ICT Businesses."
International Journal of Hybrid Information Technology Vol. 9, No. 11 (2016), pp. 99-126.
J-12:
Mamdouh Alenezi
and Yasir Javed:
"Developer Companion: A Framework to Produce Secure Web Applications."
International Journal of Computer Science and Information Security (IJCSIS) Vol.14, No.7 (2016), pp.12-16.
J-11:
Mamdouh Alenezi
:
"Software Architecture Quality Measurement Stability and Understandability."
International Journal of Advanced Computer Science and Applications(IJACSA), Volume 7 Issue 7, pp. 550-559 (2016).
J-10: Ibrahim Abunadi and
Mamdouh Alenezi
:
"An Empirical Investigation of Security Vulnerabilities within Web Applications."
Journal of Universal Computer Science Vol. 22, No. 4, pp. 537-551 (2016).
J-09:
Mamdouh Alenezi
and Mohammad Zarour:
"Does Software Structures Quality Improve over Software Evolution? Evidences from Open-Source Projects."
International Journal of Computer Science and Information Security (IJCSIS) Vol.14, No.1 (2016), pp.61-75.
J-08:
Mamdouh Alenezi
and Ibrahim Abunadi:
"Evaluating Software Metrics as Predictors of Software Vulnerabilities."
International Journal of Security and Its Applications Vol.9, No.10 (2015), pp.231-240.
J-07:
Mamdouh Alenezi
and Ibrahim Abunadi:
"Quality of Open Source Systems from Product Metrics Perspective."
International Journal of Computer Science Issues 12.5 (2015): 143-148.
J-06:
Mamdouh Alenezi
and Fakhry Khellah:
"Evolution Impact on Architecture Stability in Open-Source Projects."
International Journal of Cloud Applications and Computing (IJCAC) 5.4 (2015): 24-35.
J-05: Shadi Banitaan and
Mamdouh Alenezi
:
"Software Evolution via Topic Modeling: An Analytic Study."
International Journal of Software Engineering and Its Applications Vol. 9, No. 5 (2015), pp. 43-52
J-04: Mamdouh Alenezi
and Khaled Almustafa:
"Empirical Analysis of the Complexity Evolution in Open-Source Software Systems."
International Journal of Hybrid Information Technology (IJHIT), Vol.8, No.2, (2015), pp. 257-266
J-03: Mamdouh Alenezi
:
"Extracting High-Level Concepts from Open-Source Systems."
International Journal of Software Engineering and Its Applications Vol. 9, No. 1 (2015), pp. 183-190
J-02: Mamdouh Alenezi
and Kenneth Magel:
"Empirical Evaluation of A New Coupling Metric: Combining Structural and Semantic Coupling."
International Journal of Computers and Applications 36(1) (2014).
J-01: Mamdouh Alenezi
, Kenneth Magel, and Shadi Banitaan.
"Efficient Bug Triaging Using Text Mining"
, Journal of Software 8(9), 2185-2190 (2013).
Conferences
C-25: Mohammed Zagane, Mustapha Kamel Abdi,
Mamdouh Alenezi
:
“Automatic Feature Extraction Method for Software Vulnerability Prediction.”
1st National Conference on Applied Computing and Smart Technologies (ACST'21), July 10, 2021, Sidi Bel Abbès, Algeria
C-24: Vajeeha Mir Khatian, Qasim Ali Arain,
Mamdouh Alenezi
, Muhammad Owais Raza, Fariha Shaikh, Isma Farah:
“Comparative Analysis for Predicting Non-Functional Requirements using Supervised Machine Learning.”
2021 1st International Conference on Artificial Intelligence and Data Analytics (CAIDA), April 2021, Riyadh, Saudi Arabia
C-23: Yasir Javed, Qasim Ali Arian, and
Mamdouh Alenezi
:
“SecurityGuard: An Automated Secure Coding Framework.”
3rd International Conference on Intelligent Technologies and Applications INTAP 2020, September 2020, Gjøvik, Norway
C-22: Wajdi Aljedaani, Yasir Javed, and
Mamdouh Alenezi
:
“LDA Categorization of Security Bug Reports in Chromium Projects.”
ESSE 2020: European Symposium on Software Engineering, November 2020, Pages 154–161, Roma, Italy
C-21: Wajdi Aljedaani, Yasir Javed, and
Mamdouh Alenezi
:
“Open Source Systems Bug Reports: Meta-Analysis.”
ICBDE '20: Proceedings of the 2020 The 3rd International Conference on Big Data and Education, April 2020, Pages 43–49.
C-20: Mohammad Zarour,
Mamdouh Alenezi
, Maurice Dawson, and Izzat Alsmadi:
“Toward Effective Cybersecurity Education in Saudi Arabia.”
17th International Conference on Information Technology–New Generations (ITNG 2020), April 2020 Pages 79-85.
C-19: Mohammad Zarour,
Mamdouh Alenezi
, Khalid Alsarayrah:
“Software Security Specifications and Design: How Software Engineers and Practitioners Are Mixing Things up.”
EASE '20: Proceedings of the Evaluation and Assessment in Software Engineering, April 2020 Pages 451–456.
C-18: Mamdouh Alenezi
, Hamid Abdul Basit, Faraz Idris Khan, Maham Anwar Beg:
“A Comparison Study of Available Sofware Security Ontologies.”
EASE '20: Proceedings of the Evaluation and Assessment in Software Engineering, April 2020 Pages 499–504.
C-17: Mamdouh Alenezi
and Faraz Idris Khan:
“Context-Sensitive Case-Based Software Security Management System.”
3rd Computational Methods in Systems and Software 2019.
C-16: Mamdouh Alenezi
and Iman Almomani:
“Empirical Analysis of Static Code Metrics for Predicting Risk Scores in Android Applications.”
5th International Symposium on Data Mining Applications (SDMA2018), Riyadh, Saudi Arabia.
C-15: Mamdouh Alenezi
and Iman Almomani:
“Abusing Android Permissions: A Security Perspective.”
2017 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT), Amman, Jordan.
C-14: Khaled Almustafa and
Mamdouh Alenezi
:
“Cost Analysis of SDN/NFV Architecture over 4G Infrastructure.”
The 8th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2017), Lund, Sweden.
C-13: Mamdouh Alenezi
, Mohammed Akour, Alaa Hussien, and Mohammad Z. Al-Saad:
“Test Suite Effectiveness: An Indicator for Open Source Software Quality.”
The 2nd International Conference on Open Source Software Computing (OSSCOM 2016), Beirut, Lebanon.
C-12: Mamdouh Alenezi
and Yasir Javed:
“Open Source Web Application Security: A Static Analysis Approach.”
International Conference on Engineering & MIS 2016 (ICEMIS’16), Agadir, Morocco.
C-11: Yasir Javed and
Mamdouh Alenezi
:
“Defectiveness Evolution in Open Source Software Systems.”
4th Symposium on Data Mining Applications (SDMA 2016), Riyadh, Saudi Arabia.
C-10: Khaled Almustafa and
Mamdouh Alenezi
:
“Dynamic Evolution of Source Code Topics.”
The Tenth International Conference on Software Engineering Advances (ICSEA 2015), Barcelona, Spain.
C-09: Ibrahim Abunadi and
Mamdouh Alenezi
:
“Towards Cross Project Vulnerability Prediction in Open Source Web Applications.”
International Conference on Engineering & MIS 2015 (ICEMIS’15), Istanbul, Turkey.
C-08: Mamdouh Alenezi
and Mohammad Zarour:
“Modularity Measurement and Evolution in Object-Oriented Open-Source Projects.”
International Conference on Engineering & MIS 2015 (ICEMIS’15), Istanbul, Turkey.
C-07: Mamdouh Alenezi
and Fakhry Khellah:
“Architectural Stability Evolution in Open-Source Systems.”
International Conference on Engineering & MIS 2015 (ICEMIS’15), Istanbul, Turkey.
C-06: Mamdouh Alenezi
, Shadi Banitaan, and Qasem Obeidat:
“Fault-Proneness of Open Source Systems: An Empirical Analysis.”
International Arab Conference on Information Technology (ACIT 2014), Nizwa, Oman.
C-05: Mamdouh Alenezi
and Kenneth Magel:
“A New Coupling Metric: Blending Structural and Semantic Relations.”
13th IASTED International Conference on Software Engineering (SE 2014), Innsbruck, Austria.
C-04: Mamdouh Alenezi
and Shadi Banitaan:
"Bug Reports Prioritization: Which Features and Classifier to Use?."
12th IEEE International Conference on Machine Learning and Applications (ICMLA), IEEE, 2013.
C-03:
Shadi Banitaan and
Mamdouh Alenezi
:
"DECOBA: Utilizing Developers Communities in Bug Assignment."
12th IEEE International Conference on Machine Learning and Applications (ICMLA), IEEE, 2013.
C-02:
Shadi Banitaan and
Mamdouh Alenezi
:
"TRAM: An approach for assigning bug reports using their Metadata."
Third International Conference on Communications and Information Technology (ICCIT), IEEE, 2013.
C-01
Shadi Banitaan,
Mamdouh Alenezi
, Kendall Nygard, and Kenneth Magel.
"Towards Test Focus Selection in Integration Testing using Method Level Software Metrics"
, 10th International Conference on Information Technology : New Generations (ITNG Software Testing 2013).