Research

Book Chapters
  • BC-3: Mamdouh Alenezi, Muhammad Usama, Khaled Almustafa, Waheed Iqbal, Muhammad Ali Raza, and Tanveer Khan: "An Efficient, Secure, and Queryable Encryption for NoSQL-Based Databases Hosted on Untrusted Cloud Environments." in "Research Anthology on Artificial Intelligence Applications in Security," DOI: 10.4018/978-1-7998-7705-9.ch033 (2021).  

  • BC-2: Sadiq Almuairfi and Mamdouh Alenezi: "Anonymous Authentication for Privacy Preserving of Multimedia Data in the Cloud." in "Handbook of Research on Multimedia Cyber Security," 9781799827016 (2020).  

  • BC-1: Iman Almomani and Mamdouh Alenezi: "Android Application Security Scanning Process." in "Telecommunication Systems - Principles and Applications of Wireless-Optical Technologies," 978-1-78984-294-4 (2019).  


Journals
  • J-103: Fayez Alanazi and Mamdouh Alenezi: "A framework for integrating intelligent transportation systems with smart city infrastructure." Journal of Infrastructure, Policy and Development 2024, 8(5), 3558; https://doi.org/10.24294/jipd.v8i5.3558  

  • J-102: Fayez Alanazi and Mamdouh Alenezi: "Interoperability for intelligent traffic management systems in smart cities." International Journal of Electrical and Computer Engineering (IJECE) Vol. 14, No. 2, April 2024, pp. 1864-1874; https://doi.org/10.24294/jipd.v8i3.3085  

  • J-101: Fayez Alanazi and Mamdouh Alenezi: "Driving the future: Leveraging digital transformation for sustainable transportation." Journal of Infrastructure, Policy and Development 2024, 8(3), 3085; https://doi.org/10.24294/jipd.v8i3.3085  

  • J-100: Fayez Alanazi and Mamdouh Alenezi: "Software Engineering Techniques for Building Sustainable Cities with Electric Vehicles." Applied Sciences 2023, 13(15), 8741; https://doi.org/10.3390/app13158741  

  • J-99: Mamdouh Alenezi and Mohammad Akour: "Digital Transformation Blueprint in Higher Education: A Case Study of PSU." Sustainability 2023, 15(10), 8204; https://doi.org/10.3390/su15108204  

  • J-98: Yasir Javed and Mamdouh Alenezi: "A Case Study on Sustainable Quality Assurance in Higher Education." Sustainability 2023, 15(10), 8136; https://doi.org/10.3390/su15108136  

  • J-97: Mamdouh Alenezi, Saja Wardat, Mohammed Akour: "The Need of Integrating Digital Education in Higher Education: Challenges and Opportunities." Sustainability 2023, 15, 4782. https://doi.org/10.3390/su15064782  

  • J-96: Mamdouh Alenezi: "Digital Learning and Digital Institution in Higher Education." Education Sciences 13, no. 1: 88. https://doi.org/10.3390/educsci13010088  

  • J-95: Ahmed Mateen Buttar, Adeel Khalid, Mamdouh Alenezi, Muhammad Azeem Akbar, Saima Rafi, Abdu H. Gumaei, and Muhammad Tanveer Riaz.: "Optimization of DevOps Transformation for Cloud-Based Applications." Electronics 12, no. 2: 357. https://doi.org/10.3390/electronics12020357  

  • J-94: Mohammed Akour, Osama Al Qasem, Mamdouh Alenezi, Abeer Bataineh and Feras Hanandeh: "Ensemble and Base Learner ML Techniques for Traffic Accident Severity Prediction: A Comparison Study." ICIC Express Letters Volume 16, Number 12, December 2022 https://doi.org/10.24507/icicel.16.12.1301  

  • J-93: Mohammad Akour, Mamdouh Alenezi: "Higher Education Future in the Era of Digital Transformation." Education Sciences 12, 784. 2022. https://doi.org/10.3390/educsci12110784  

  • J-92: Soumya Snigdha Mohapatra, Rakesh Ranjan Kumar, Mamdouh Alenezi, Abu Taha Zamani, and Nikhat Parveen: "QoS-Aware Cloud Service Recommendation Using Metaheuristic Approach." Electronics 11(21):3469. 2022 https://doi.org/10.3390/electronics11213469  

  • J-91: Noor Mohammed Noorani, Abu Taha Zamani, Mamdouh Alenezi, Mohammad Shameem, and Priyanka Singh: "Factor Prioritization for Effectively Implementing DevOps in Software Development Organizations: A SWOT-AHP Approach." Axioms 11, no. 10: 498. 2022. https://doi.org/10.3390/axioms11100498  

  • J-90: Mohammad Akour, Mamdouh Alenezi, and Hiba Alsghaier: "Software Refactoring Prediction Using SVM and Optimization Algorithms." Processes 2022, 10, 1611. https://doi.org/10.3390/pr10081611  

  • J-89: Mohammed Zagane, Mamdouh Alenezi, and Mustapha Kamel Abdi: "Hybrid Representation to Locate Vulnerable Lines of Code." International Journal of Software Innovation (IJSI) 10(1), 2022, Pages: 19  

  • J-88: Mamdouh Alenezi and Mohammad Akour: "Methodical Software Testing Course in Higher Education." International Journal of Engineering Pedagogy (iJEP), 12(1), pp. 51–62.  

  • J-87: Mamdouh Alenezi, Hamid Abdul Basit, Maham Anwar Beg, Muhammad Saad Shaukat: "Synthesizing secure software development activities for linear and agile lifecycle models." Software: Practice and Experience, 2022,  

  • J-86: Mamdouh Alenezi: "Deep Dive into Digital Transformation in Higher Education Institutions." Education Sciences, 2021, 11(12), 770.  

  • J-85: Mamdouh Alenezi and Mohammed Akour: "Open-Source Machine Learning Software Systems: Architectural Analysis." ICIC Express Letters Part B: Applications, Volume 12 Issue 11, November 2021.  

  • J-84: Mohammed Akour, Mamdouh Alenezi, Hiba Al Sghaier and Yazan Al Shboul: "The COVID-19 pandemic: when e-learning becomes mandatory not complementary." Int. J. Technology Enhanced Learning, Vol. 13, No. 4, 2021.  

  • J-83: Mamdouh Alenezi: "An Ontological Framework for Healthcare Web Applications Security." International Journal of Advanced Computer Science and Applications(IJACSA), Volume 12 Issue 6, 2021.  

  • J-82: Mamdouh Alenezi: "Internal Quality Evolution of Open-Source Software Systems." Applied Sciences, 2021, 11, 5690.    

  • J-81: Mohammad Zarour and Mamdouh Alenezi: "Software process improvement initiative in medium size IT organization: a case study." Indonesian Journal of Electrical Engineering and Computer Science, Vol 23, No 1, 2021  

  • J-80: Mamdouh Alenezi, Mohammed Akour, and Hamid Abdul Basit: "Exploring Software Security Test Generation Techniques: Challenges and Opportunities." International Journal of Education and Information Technologies, Volume 15, 2021, pp.106-121  

  • J-79: Mohammad Zarour, Mamdouh Alenezi, Md Tarique Jamal Ansari, Abhishek Kumar Pandey, Masood Ahmad, Alka Agrawal, Rajeev Kumar, and Raees Ahmad Khan: "Ensuring data integrity of healthcare information in the era of digital health." Healthcare Technology Letters, 2021  

  • J-78: Mamdouh Alenezi: "Safeguarding Cloud Computing Infrastructure: A Security Analysis." Computer Systems Science and Engineering Vol.37, No.2, 2021, pp.159-167;  

  • J-77: Ali Al-Laith and Mamdouh Alenezi: "Monitoring People’s Emotions and Symptoms from Arabic Tweets during the COVID-19 Pandemic." Information 2021, 12(2), 86;  

  • J-76: Mamdouh Alenezi, Abhishek Kumar Pandey, Richa Verma, Mohd Faizan, Shalini Chandra, Alka Agrawal, Rajeev Kumar, and Raees Ahmad Khan: "Evaluating the Impact of Software Security Tactics: A Design Perspective." Computers, Materials & Continua, Vol.66, No.3, 2021, pp.2283-2299  

  • J-75: Khalid T. Al-Sarayreh, Mamdouh Alenezi, Mohammed Zarour, and Kenza Meridji: "A reference measurement framework of software security product quality (SPQNFSR)." IET Information Security, 2021.  

  • J-74: Mamdouh Alenezi, Mohammed Zagane, and Yasir Javed: "Efficient Deep Features Learning for Vulnerability Detection Using Character N-Gram Embedding." Jordanian Journal of Computers and Information Technology (JJCIT), Vol. 07, No. 01, March 2021, pp. 25 - 39.  

  • J-73: Mamdouh Alenezi, Muhammad Nadeem, and Raja Asif: "SQL injection attacks countermeasures assessments." Indonesian Journal of Electrical Engineering and Computer Science, Volume 21, Number 2, pp. 1121 - 1131 February 2021.  

  • J-72: Rajeev Kumar, Mamdouh Alenezi, Md Tarique Jamal Ansari, Bineet Kumar Gupta, Alka Agrawal, and Raees Ahmad Khan: "Evaluating the Impact of Malware Analysis Techniques for Securing Web Applications through a Decision-Making Framework under Fuzzy Environment." International Journal of Intelligent Engineering and Systems, Vol. 13, No. 6, December 2020, pp. 94-109  

  • J-71: Sadiq Almuairfi and Mamdouh Alenezi: "Security controls in infrastructure as code." Computer Fraud & Security, Volume 2020, Issue 10, pp. 13 - 19 October 2020.  

  • J-70: Khalid T. Al-Sarayreh, Kenza Meridji, Mamdouh Alenezi, Mohammed Zarour, Mohammed D. Al-Majali: "A sustainable procedural method of software design process improvements." Indonesian Journal of Electrical Engineering and Computer Science, Volume 21, Number 1, pp. 4040 - 449 January 2021.  

  • J-69: Mamdouh Alenezi, Mohammed Akour, and Osama Al Qasem: "Harnessing deep learning algorithms to predict software refactoring." TELKOMNIKA Telecommunication, Computing, Electronics and Control Vol. 18, No. 6, December 2020, pp. 2977-2982  

  • J-68: Mohammad Zarour, Md Tarique Jamal Ansari, Mamdouh Alenezi, Amal Krishna Sarkar, Mohd Faizan, Alka Agrawal, Rajeev Kumar, and Raees Ahmad Khan: "Evaluating the Impact of Blockchain Models for Secure and Trustworthy Electronic Healthcare Records." IEEE Access, 2020  

  • J-67: Mamdouh Alenezi, Mohammad Nadeem, Alka Agrawal, Rajeev Kumar, and Raees Ahmad Khan: "Fuzzy Multi Criteria Decision Analysis Method for Assessing Security Design Tactics for Web Applications." International Journal of Intelligent Engineering and Systems, Vol. 13, No. 5, October 2020, pp. 181-196  

  • J-66: Mamdouh Alenezi: "Ontology-Based Context-sensitive Software Security Knowledge Management Modeling." International Journal of Electrical and Computer Engineering (IJECE), Vol. 10, No. 6, December 2020, pp. 6507-6520  

  • J-65: Mohammad Zarour, Norah Alhammad, Mamdouh Alenezi, and Khalid Alsarayrah: "DevOps Process Model Adoption in Saudi Arabia: An Empirical Study." Jordanian Journal of Computers and Information Technology (JJCIT), Vol. 06, No. 03, September 2020, pp. 234 - 246.  

  • J-64: Mamdouh Alenezi and Mohammed Akour: "Exploring the Connection between Design Smells and Security Vulnerabilities." International Journal of Innovative Technology and Exploring Engineering (IJITEE) Volume-9 Issue-8, June 20208, Pages:449-452  

  • J-63: Mohammed Zagane, Mustapha Kamel Abdi and Mamdouh Alenezi: "A New Approach to Locate Software Vulnerabilities Using Code Metrics." International Journal of Software Innovation (IJSI) 8(3), 2020, Pages: 14  

  • J-62: Adil Hussain Seh, Mohammad Zarour, Mamdouh Alenezi, Amal Krishna Sarkar, Alka Agrawal, Rajeev Kumar, and Raees Ahmad Khan: "Healthcare Data Breaches: Insights and Implications." Healthcare 2020, 8(2), 133  

  • J-61: Celestine Iwendi, Suleman Khan, Joseph H. Anajemba, Mohit Mittal, Mamdouh Alenezi, Mamoun Alazab: "The Use of Ensemble Models for Multiple Class and Binary Class Classification for Improving Intrusion Detection Systems." Sensors 2020, 20(9), 2559  

  • J-60: Mohammed Zagane, Mustapha Kamel Abdi, and Mamdouh Alenezi: "Deep Learning for Software Vulnerabilities Detection Using Code Metrics." IEEE Access, Volume 8, pp. 74562 - 74570 2020.  

  • J-59: Osama Al Qasem, Mohammed Akour, and Mamdouh Alenezi: "The Influence of Deep Learning Algorithms Factors in Software Fault Prediction." IEEE Access, Volume 8, pp. 63945 - 63960 2020.  

  • J-58: Suhel Ahmad Khan, Mamdouh Alenezi, Alka Agrawal, Rajeev Kumar, and Raees Ahmad Khan: "Evaluating Performance of Software Durability through an Integrated Fuzzy-Based Symmetrical Method of ANP and TOPSIS." Symmetry 2020, 12(4), 493.  

  • J-57: Mamdouh Alenezi and Sadiq Almuairfi: "Essential Activities for Secure Software Development." International Journal of Software Engineering & Applications (IJSEA), Volume 11, Number 2, 2020.  

  • J-56: Joseph Henry Anajemba, Tang Yue, Celestine Iwendi, Mamdouh Alenezi, and Mohit Mittal: "Optimal Cooperative Offloading Scheme For Energy Efficient Multi-Access Edge Computation." IEEE ACCESS, 2020.  

  • J-55: Mohammed Akour and Mamdouh Alenezi: "Test Suites Effectiveness Evolution in Open Source Systems: Empirical Study." Indonesian Journal of Electrical Engineering and Computer Science, Volume 19, Number 2, pp. 1085 - 1092 March 2020.  

  • J-54: Alka Agrawal, Mamdouh Alenezi, Rajeev Kumar, and Raees Ahmad Khan: "A Unified Fuzzy-Based Symmetrical Multi-Criteria Decision-Making Method for Evaluating Sustainable-Security of Web Applications." Symmetry 2020, 12(3), 448  

  • J-53: Abhishek Kumar Pandey, Ashutosh Tripathi, Mamdouh Alenezi, Alka Agrawal, Rajeev Kumar, and Raees Ahmad Khan: "A Framework for Producing Effective and Efficient Secure Code through Malware Analysis." International Journal of Advanced Computer Science and Applications(IJACSA), Volume 11, Issue 2, pp. 497-503 2020.  

  • J-52: Aamir Shahab, Mamdouh Alenezi, Muhammad Nadeem, and Raja Asif: "An automated approach to fix buffer overflows." International Journal of Electrical and Computer Engineering (IJECE), Volume 10, Issue 4, pp. 3778-3788 2020.  

  • J-51: Mamdouh Alenezi, Alka Agrawal, Rajeev Kumar, and Raees Ahmad Khan: "Evaluating Performance of Web Application Security through a Fuzzy based Hybrid Multi-Criteria Decision-Making Approach: Design Tactics Perspective." IEEE ACCESS, Volume 8, 31 January 2020.  

  • J-50: Mamdouh Alenezi and Mohammad Zarour: "On the Relationship between Software Complexity and Security." International Journal of Software Engineering & Applications (IJSEA), Volume 11, Issue 1, pp. 51 - 60 January 2020.  

  • J-49: Alka Agrawal, Mamdouh Alenezi, Rajeev Kumar and Raees Ahmad Khan: "Securing Web Applications through a Framework of Source Code Analysis." Journal of Computer Science, Volume 15, Issue 12, pp. 1780 - 1794 December 2019.  

  • J-48: Nada Alsolami, Qasem Obeidat, and Mamdouh Alenezi: "Empirical Analysis of Object-Oriented Software Test Suite Evolution." International Journal of Advanced Computer Science and Applications(IJACSA), Volume 10, Issue 11, pp. 89 - 98 November 2019.  

  • J-47: Mamdouh Alenezi, Mohammed Akour, and Hiba Alsghaier: "The Impact of Co-evolution of Code Production and Test Suites through Software Releases in Open Source Software Systems." International Journal of Innovative Technology and Exploring Engineering (IJITEE), Volume 9, Issue 1, pp. 2737 - 2739 November 2019.  

  • J-46: Alka Agrawal, Mamdouh Alenezi, Rajeev Kumar, and Raees Ahmad Khan: "Measuring the Sustainable-Security of Web Applications Through a Fuzzy-Based Integrated Approach of AHP and TOPSIS." IEEE Access, Volume 7, pp. 153936 - 153951 November 2019.  

  • J-45: Alka Agrawal, Mamdouh Alenezi, Rajeev Kumar, and Raees Ahmad Khan: "A source code perspective framework to produce secure web applications." Computer Fraud & Security, Volume 2019, Issue 10, pp. 11 - 18 October 2019.  

  • J-44: Faraz Idris Khan, Yasir Javed, and Mamdouh Alenezi: "Security assessment of four open source software systems." Indonesian Journal of Electrical Engineering and Computer Science, Volume 16, Number 2, pp. 860 - 881 November 2019.  

  • J-43: Faraz Idris Khan, and Mamdouh Alenezi: "Open Source Web-Based Software: Security Challenges and Assessment Methodologies." i-manager's Journal on Software Engineering (JSE), Volume 14, Issue 1, pp. 34 - 40 October 2019.  

  • J-42: Mamdouh Alenezi, Mohammad Zarour, and Sultan Alsulis: "DevOps Development Process Awareness and Adoption -The Case of Saudi Arabia." i-manager's Journal on Software Engineering (JSE), Volume 14, Issue 1, pp. 19 - 27 October 2019.  

  • J-41: Mamdouh Alenezi and Sadiq Almuairfi: "Security Risks in the Software Development Lifecycle." International Journal of Recent Technology and Engineering (IJRTE), Volume 8, Issue 3, pp. 7048 - 7055 September 2019.  

  • J-40: Mohammad Zarour, Norah Alhammad, Mamdouh Alenezi, and Khalid Alsarayrah: "A Research on DevOps Maturity Models." International Journal of Recent Technology and Engineering (IJRTE), Volume 8, Issue 3, pp. 4854 - 4862 September 2019.  

  • J-39: Hafsa Ashraf, Mamdouh Alenezi, Muhammad Nadeem, and Yasir Javed: "Security assessment framework for educational ERP systems." International Journal of Electrical and Computer Engineering (IJECE), Volume 9, Number 6, pp. 5570 - 5585 December 2019.  

  • J-38: Alka Agrawal, Mohammad Zarour, Mamdouh Alenezi, Rajeev Kumar, and Raees Ahmad Khan: "Security durability assessment through fuzzy analytic hierarchy process." PeerJ Computer Science, 5:e215 September 2019.  

  • J-37: Alka Agrawal, Mamdouh Alenezi, Dhirendra Pandey, Rajeev Kumar, and Raees Ahmad Khan: "Usable-Security Assessment Through A Decision Making Procedure." ICIC Express Letters, Part B: Applications, Volume 10, Number 8, pp. 665 - 672 July 2019.  

  • J-36: Rajeev Kumar, Mohammad Zarour, Mamdouh Alenezi, Alka Agrawal, and Raees Ahmad Khan: "Measuring Security Durability of Software through Fuzzy-Based Decision-Making Process." International Journal of Computational Intelligence Systems, Volume 12, Number 2, pp. 627 - 642 June 2019.  

  • J-35: Attiq ur Rehman Jaffar, Muhammad Nadeem, Mamdouh Alenezi, and Yasir Javed: "Using Public Vulnerabilities Data to Self-Heal Security Issues in Software Systems." ICIC Express Letters, Volume 13, Number 7, pp. 557 - 567 July 2019.  

  • J-34: Alka Agrawal, Mamdouh Alenezi, Suhel Ahmad Khan, Rajeev Kumar, and Raees Ahmad Khan: "Multi-level Fuzzy System for Usable-Security Assessment." Journal of King Saud University-Computer and Information Sciences (2019).  

  • J-33: Mamdouh Alenezi, Rajeev Kumar, Alka Agrawal, and Raees Ahmad Khan: "Usable-Security Attribute Evaluation Using Fuzzy Analytic Hierarchy Process." ICIC Express Letters, Volume 13, Number 6, pp. 453 - 460 June 2019.  

  • J-32: Mamdouh Alenezi, Muhammad Usama, Khaled Almustafa, Waheed Iqbal, Muhammad Ali Raza, and Tanveer Khan: "An Efficient, Secure, and Queryable Encryption for NoSQL-Based Databases Hosted on Untrusted Cloud Environments." International Journal of Information Security and Privacy (IJISP), Volume 13, Issue 2, pp. 14 - 31 (2019).  

  • J-31: Park Youngeun and Mamdouh Alenezi: "Predicting the Popularity of Saudi Multinational Enterprises Using a Data Mining Technique." Journal of Management Information and Decision Sciences, Volume 21, Issue 1, (2018).  

  • J-30: Md Tarique Jamal Ansari, Dhirendra Pandey, and Mamdouh Alenezi: "STORE: Security Threat Oriented Requirements Engineering Methodology." Journal of King Saud University - Computer and Information Sciences (2018).  

  • J-29: Mamdouh Alenezi, Mohammad Zarour, and Khawlah Alomar: "Are Open Source Web Applications Secure? Static Analysis Findings." International Journal of System and Software Engineering, Vol. 6, No. 2, pp. 1 - 9 (2018).  

  • J-28: Mamdouh Alenezi, and Mohammad Zarour: "An Empirical Study of Bad Smells during Software Evolution Using Designite Tool." i-manager's Journal on Software Engineering, 12(4), 12-27 (2018).  

  • J-27: Yasir Javed, Mamdouh Alenezi, Mohammed Akour and Ahmad Alzyod: "Discovering the Relationship Between Software Complexity and Software Vulnerabilities." Journal of Theoretical and Applied Informtion Technology, Vol. 96, No. 14, pp. 4690 - 4699 (2018).  

  • J-26: Mamdouh Alenezi, Shadi Banitaan, and Mohammad Zarour: "CLUBA: A Clustering-Based Approach for Bug Assignment." International Journal of System and Software Engineering, Vol. 6, Issue 1, pp. 1 - 9 (2018).

  • J-25: Muhammad Abdullah, Saad Khan, Mamdouh Alenezi, Khaled Almustafa, and Waheed Iqbal: "Application Centric Virtual Machine Placements to Minimize Bandwidth Utilization in Datacenters." Intelligent Automation and Soft Computing, 1–14.  

  • J-24: Iman Almomani and Mamdouh Alenezi: "Efficient Denial of Service Attacks Detection in Wireless Sensor Networks." Journal of Information Science and Engineering Vol. 34, No. 4 (2018), pp. 977 - 1000.  

  • J-23: Layla Alrawais, Mamdouh Alenezi, and Mohammad Akour: "Security Testing Framework for Web Applications." International Journal of Software Innovation (IJSI) Vol. 6, No. 3 (2018), pp. 93 - 117.  

  • J-22: Turki Alshammary and Mamdouh Alenezi: "Software Architecture Understandability in Object-Oriented Systems." i-manager’s Journal on Software Engineering Vol. 12, No. 2 (2018), pp. 1 - 14.  

  • J-21: Mohannad Alsayat and Mamdouh Alenezi: "ERP Implementation Failures in Saudi Arabia: Key Findings." International Business Management Vol. 12, No. 1 (2018), pp. 10 - 22.  

  • J-20: Mamdouh Alenezi, Khaled Almustafa and Khalim Amjad Meerja: "Cloud based SDN and NFV architectures for IoT infrastructure." Egyptian Informatics Journal (2018).  

  • J-19: Mamdouh Alenezi, Shadi Banitaan and Mohammad Zarour: "Using Categorical Features in Mining Bug Tracking Systems to Assign Bug Reports." International Journal of Software Engineering & Applications (IJSEA) Vol. 9, No. 2 (2018), pp. 29 - 39.  

  • J-18: Abdulrahman Asiri, Qasem Obiedat and Mamdouh Alenezi: "A Cloud-Based Cross - Enterprise Imaging Framework." i-manager’s Journal on Software Engineering Vol. 12, No. 1 (2018), pp. 6 - 25.   

  • J-17: Mamdouh Alenezi, Khaled Almustafa and Mohamed Hussein: "On Virtualization and Security-Awareness Performance Analysis in 5G Cellular Networks." Journal of Engineering Science and Technology Review Vol. 11, No. 1 (2018), pp. 199 - 207.  

  • J-16: Hassan Almousa and Mamdouh Alenezi: "Measuring Software Architecture Stability Evolution in Object-Oriented Open Source Systems." Journal of Engineering and Applied Sciences Vol. 12, No. 2 (2017), pp. 353-362.  

  • J-15: Mohammed Akour, Samah Aldiabat, Hiba Alsghaier, Khalid Alkhateeb and Mamdouh Alenezi: "Software Architecture Understandability of Open Source Applications." International Journal of Computer Science and Information Security (IJCSIS) Vol. 14, No. 10 (2016), pp. 65-78.  

  • J-14: Shadi Banitaan, Mohammad Akour and Mamdouh Alenezi: "A Test Suite Reduction Approach for Software Unit Testing." Advanced Science Letters Vol. 22, No. 10 (2016), pp. 2977-2981.  

  • J-13: Thamer Alhamed and Mamdouh Alenezi: "Business Continuity Management & Disaster Recovery Capabilities in Saudi Arabia ICT Businesses." International Journal of Hybrid Information Technology Vol. 9, No. 11 (2016), pp. 99-126.  

  • J-12: Mamdouh Alenezi and Yasir Javed: "Developer Companion: A Framework to Produce Secure Web Applications." International Journal of Computer Science and Information Security (IJCSIS) Vol.14, No.7 (2016), pp.12-16.  

  • J-11: Mamdouh Alenezi: "Software Architecture Quality Measurement Stability and Understandability." International Journal of Advanced Computer Science and Applications(IJACSA), Volume 7 Issue 7, pp. 550-559 (2016).  

  • J-10: Ibrahim Abunadi and Mamdouh Alenezi: "An Empirical Investigation of Security Vulnerabilities within Web Applications." Journal of Universal Computer Science Vol. 22, No. 4, pp. 537-551 (2016).  

  • J-09: Mamdouh Alenezi and Mohammad Zarour: "Does Software Structures Quality Improve over Software Evolution? Evidences from Open-Source Projects." International Journal of Computer Science and Information Security (IJCSIS) Vol.14, No.1 (2016), pp.61-75.  

  • J-08: Mamdouh Alenezi and Ibrahim Abunadi: "Evaluating Software Metrics as Predictors of Software Vulnerabilities." International Journal of Security and Its Applications Vol.9, No.10 (2015), pp.231-240.  

  • J-07: Mamdouh Alenezi and Ibrahim Abunadi: "Quality of Open Source Systems from Product Metrics Perspective." International Journal of Computer Science Issues 12.5 (2015): 143-148.  

  • J-06: Mamdouh Alenezi and Fakhry Khellah: "Evolution Impact on Architecture Stability in Open-Source Projects." International Journal of Cloud Applications and Computing (IJCAC) 5.4 (2015): 24-35. 

  • J-05: Shadi Banitaan and Mamdouh Alenezi: "Software Evolution via Topic Modeling: An Analytic Study." International Journal of Software Engineering and Its Applications Vol. 9, No. 5 (2015), pp. 43-52  

  • J-04: Mamdouh Alenezi and Khaled Almustafa: "Empirical Analysis of the Complexity Evolution in Open-Source Software Systems." International Journal of Hybrid Information Technology (IJHIT), Vol.8, No.2, (2015), pp. 257-266  

  • J-03: Mamdouh Alenezi: "Extracting High-Level Concepts from Open-Source Systems." International Journal of Software Engineering and Its Applications Vol. 9, No. 1 (2015), pp. 183-190 

  • J-02: Mamdouh Alenezi and Kenneth Magel: "Empirical Evaluation of A New Coupling Metric: Combining Structural and Semantic Coupling." International Journal of Computers and Applications 36(1) (2014).

  • J-01: Mamdouh Alenezi, Kenneth Magel, and Shadi Banitaan. "Efficient Bug Triaging Using Text Mining", Journal of Software 8(9), 2185-2190 (2013).


Conferences
  • C-25: Mohammed Zagane, Mustapha Kamel Abdi, Mamdouh Alenezi: “Automatic Feature Extraction Method for Software Vulnerability Prediction.” 1st National Conference on Applied Computing and Smart Technologies (ACST'21), July 10, 2021, Sidi Bel Abbès, Algeria  

  • C-24: Vajeeha Mir Khatian, Qasim Ali Arain, Mamdouh Alenezi, Muhammad Owais Raza, Fariha Shaikh, Isma Farah: “Comparative Analysis for Predicting Non-Functional Requirements using Supervised Machine Learning.” 2021 1st International Conference on Artificial Intelligence and Data Analytics (CAIDA), April 2021, Riyadh, Saudi Arabia  

  • C-23: Yasir Javed, Qasim Ali Arian, and Mamdouh Alenezi: “SecurityGuard: An Automated Secure Coding Framework.” 3rd International Conference on Intelligent Technologies and Applications INTAP 2020, September 2020, Gjøvik, Norway  

  • C-22: Wajdi Aljedaani, Yasir Javed, and Mamdouh Alenezi: “LDA Categorization of Security Bug Reports in Chromium Projects.” ESSE 2020: European Symposium on Software Engineering, November 2020, Pages 154–161, Roma, Italy  

  • C-21: Wajdi Aljedaani, Yasir Javed, and Mamdouh Alenezi: “Open Source Systems Bug Reports: Meta-Analysis.” ICBDE '20: Proceedings of the 2020 The 3rd International Conference on Big Data and Education, April 2020, Pages 43–49.  

  • C-20: Mohammad Zarour, Mamdouh Alenezi, Maurice Dawson, and Izzat Alsmadi: “Toward Effective Cybersecurity Education in Saudi Arabia.” 17th International Conference on Information Technology–New Generations (ITNG 2020), April 2020 Pages 79-85.  

  • C-19: Mohammad Zarour, Mamdouh Alenezi, Khalid Alsarayrah: “Software Security Specifications and Design: How Software Engineers and Practitioners Are Mixing Things up.” EASE '20: Proceedings of the Evaluation and Assessment in Software Engineering, April 2020 Pages 451–456.  

  • C-18: Mamdouh Alenezi, Hamid Abdul Basit, Faraz Idris Khan, Maham Anwar Beg: “A Comparison Study of Available Sofware Security Ontologies.” EASE '20: Proceedings of the Evaluation and Assessment in Software Engineering, April 2020 Pages 499–504.  

  • C-17: Mamdouh Alenezi and Faraz Idris Khan: “Context-Sensitive Case-Based Software Security Management System.” 3rd Computational Methods in Systems and Software 2019.  

  • C-16: Mamdouh Alenezi and Iman Almomani: “Empirical Analysis of Static Code Metrics for Predicting Risk Scores in Android Applications.” 5th International Symposium on Data Mining Applications (SDMA2018), Riyadh, Saudi Arabia.  

  • C-15: Mamdouh Alenezi and Iman Almomani: “Abusing Android Permissions: A Security Perspective.” 2017 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT), Amman, Jordan.

  • C-14: Khaled Almustafa and Mamdouh Alenezi: “Cost Analysis of SDN/NFV Architecture over 4G Infrastructure.” The 8th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2017), Lund, Sweden.

  • C-13: Mamdouh Alenezi, Mohammed Akour, Alaa Hussien, and Mohammad Z. Al-Saad: “Test Suite Effectiveness: An Indicator for Open Source Software Quality.” The 2nd International Conference on Open Source Software Computing (OSSCOM 2016), Beirut, Lebanon.

  • C-12: Mamdouh Alenezi and Yasir Javed: “Open Source Web Application Security: A Static Analysis Approach.” International Conference on Engineering & MIS 2016 (ICEMIS’16), Agadir, Morocco.

  • C-11: Yasir Javed and Mamdouh Alenezi: “Defectiveness Evolution in Open Source Software Systems.” 4th Symposium on Data Mining Applications (SDMA 2016), Riyadh, Saudi Arabia.

  • C-10: Khaled Almustafa and Mamdouh Alenezi: “Dynamic Evolution of Source Code Topics.” The Tenth International Conference on Software Engineering Advances (ICSEA 2015), Barcelona, Spain.

  • C-09: Ibrahim Abunadi and Mamdouh Alenezi: “Towards Cross Project Vulnerability Prediction in Open Source Web Applications.” International Conference on Engineering & MIS 2015 (ICEMIS’15), Istanbul, Turkey.

  • C-08: Mamdouh Alenezi and Mohammad Zarour: “Modularity Measurement and Evolution in Object-Oriented Open-Source Projects.” International Conference on Engineering & MIS 2015 (ICEMIS’15), Istanbul, Turkey.

  • C-07: Mamdouh Alenezi and Fakhry Khellah: “Architectural Stability Evolution in Open-Source Systems.” International Conference on Engineering & MIS 2015 (ICEMIS’15), Istanbul, Turkey.

  • C-06: Mamdouh Alenezi, Shadi Banitaan, and Qasem Obeidat: “Fault-Proneness of Open Source Systems: An Empirical Analysis.” International Arab Conference on Information Technology (ACIT 2014), Nizwa, Oman.

  • C-05: Mamdouh Alenezi and Kenneth Magel: “A New Coupling Metric: Blending Structural and Semantic Relations.” 13th IASTED International Conference on Software Engineering (SE 2014), Innsbruck, Austria.

  • C-04: Mamdouh Alenezi and Shadi Banitaan: "Bug Reports Prioritization: Which Features and Classifier to Use?." 12th IEEE International Conference on Machine Learning and Applications (ICMLA), IEEE, 2013.

  • C-03: Shadi Banitaan and Mamdouh Alenezi: "DECOBA: Utilizing Developers Communities in Bug Assignment." 12th IEEE International Conference on Machine Learning and Applications (ICMLA), IEEE, 2013.

  • C-02: Shadi Banitaan and Mamdouh Alenezi: "TRAM: An approach for assigning bug reports using their Metadata." Third International Conference on Communications and Information Technology (ICCIT), IEEE, 2013.

  • C-01 Shadi Banitaan, Mamdouh Alenezi, Kendall Nygard, and Kenneth Magel. "Towards Test Focus Selection in Integration Testing using Method Level Software Metrics", 10th International Conference on Information Technology : New Generations (ITNG Software Testing 2013).