An analysis of the cloud computing security problem M Abdelrazek, J Grundy, I Müller The 2010 Asia Pacific Cloud Workshop, APSEC2010, Australia, 2010 | 742* | 2010 |
Optimal edge user allocation in edge computing with variable sized vector bin packing P Lai, Q He, M Abdelrazek, F Chen, J Hosking, J Grundy, Y Yang Service-Oriented Computing: 16th International Conference, ICSOC 2018 …, 2018 | 319 | 2018 |
Collaboration-based cloud computing security management framework M Abdelrazek, J Grundy, AS Ibrahim 2011 IEEE 4th International Conference on Cloud Computing, 364-371, 2011 | 293* | 2011 |
Online collaborative data caching in edge computing X Xia, F Chen, Q He, J Grundy, M Abdelrazek, H Jin IEEE Transactions on Parallel and Distributed Systems 32 (2), 281-294, 2020 | 188 | 2020 |
Cost-effective app data distribution in edge computing X Xia, F Chen, Q He, JC Grundy, M Abdelrazek, H Jin IEEE Transactions on Parallel and Distributed Systems 32 (1), 31-44, 2020 | 147 | 2020 |
Cloudsec: a security monitoring appliance for virtual machines in the iaas cloud model AS Ibrahim, J Hamlyn-Harris, J Grundy, M Abdelrazek 2011 5th International Conference on Network and System Security, 113-120, 2011 | 146 | 2011 |
An ensemble oversampling model for class imbalance problem in software defect prediction S Huda, K Liu, M Abdelrazek, A Ibrahim, S Alyahya, H Al-Dossari, ... IEEE access 6, 24184-24195, 2018 | 133 | 2018 |
Emerging security challenges of cloud virtual infrastructure AS Ibrahim, J Hamlyn-Harris, J Grundy, M Abdelrazek arXiv preprint arXiv:1612.09059, 2016 | 117 | 2016 |
Automated software architecture security risk analysis using formalized signatures M Abdelrazek, J Grundy, AS Ibrahim 2013 35th International Conference on Software Engineering (ICSE), 662-671, 2013 | 115 | 2013 |
Understanding the impact of emotions on software: A case study in requirements gathering and evaluation MK Curumsing, N Fernando, M Abdelrazek, R Vasa, K Mouzakis, ... Journal of Systems and Software 147, 215-229, 2019 | 105* | 2019 |
Edge user allocation with dynamic quality of service P Lai, Q He, G Cui, X Xia, M Abdelrazek, F Chen, J Hosking, J Grundy, ... Service-Oriented Computing: 17th International Conference, ICSOC 2019 …, 2019 | 95 | 2019 |
Genomic mutations and changes in protein secondary structure and solvent accessibility of SARS-CoV-2 (COVID-19 virus) TT Nguyen, PN Pathirana, T Nguyen, QVH Nguyen, A Bhatti, DC Nguyen, ... Scientific Reports 11 (1), 3487, 2021 | 88 | 2021 |
Privileged modality distillation for vessel border detection in intracoronary imaging Z Gao, J Chung, M Abdelrazek, S Leung, WK Hau, Z Xian, H Zhang, S Li IEEE transactions on medical imaging 39 (5), 1524-1534, 2019 | 83 | 2019 |
Adaptable, model-driven security engineering for SaaS cloud-based applications M Abdelrazek, J Grundy, AS Ibrahim Automated software engineering 21 (2), 187-224, 2014 | 82* | 2014 |
Cost-effective app user allocation in an edge computing environment P Lai, Q He, J Grundy, F Chen, M Abdelrazek, J Hosking, Y Yang IEEE Transactions on Cloud Computing 10 (3), 1701-1713, 2020 | 71 | 2020 |
Assistive conversational agent for health coaching: a validation study A Fadhil, Y Wang, H Reiterer Methods of information in medicine 58 (01), 009-023, 2019 | 71 | 2019 |
Tossma: A tenant-oriented saas security management architecture M Abdelrazek, J Grundy, AS Ibrahim 2012 IEEE Fifth International Conference on Cloud Computing, 981-988, 2012 | 60* | 2012 |
Supporting automated vulnerability analysis using formalized vulnerability signatures M Almorsy, J Grundy, AS Ibrahim Proceedings of the 27th IEEE/ACM International Conference on Automated …, 2012 | 59 | 2012 |
The challenges of leveraging threat intelligence to stop data breaches A Ibrahim, D Thiruvady, JG Schneider, M Abdelrazek Frontiers in Computer Science 2, 36, 2020 | 54 | 2020 |
What’s up with requirements engineering for artificial intelligence systems? K Ahmad, M Bano, M Abdelrazek, C Arora, J Grundy 2021 IEEE 29th International Requirements Engineering Conference (RE), 1-12, 2021 | 53 | 2021 |