Models are code too: Near-miss clone detection for Simulink models MH Alalfi, JR Cordy, TR Dean, M Stephan, A Stevenson 2012 28th IEEE International Conference on Software Maintenance (ICSM), 295-304, 2012 | 103 | 2012 |
Modelling methods for web application verification and testing: state of the art MH Alalfi, JR Cordy, TR Dean Software Testing, Verification and Reliability 19 (4), 265-296, 2009 | 98 | 2009 |
Detecting android malware using clone detection J Chen, MH Alalfi, TR Dean, Y Zou Journal of Computer Science and Technology 30, 942-956, 2015 | 82 | 2015 |
Reentrancy vulnerability identification in ethereum smart contracts NF Samreen, MH Alalfi 2020 IEEE International Workshop on Blockchain Oriented Software Engineering …, 2020 | 72 | 2020 |
Automated reverse engineering of UML sequence diagrams for dynamic web applications MH Alalfi, JR Cordy, TR Dean 2009 International Conference on Software Testing, Verification, and …, 2009 | 58 | 2009 |
SQL2XMI: Reverse engineering of UML-ER diagrams from relational database schemas MH Alalfi, JR Cordy, TR Dean 2008 15th Working Conference on Reverse Engineering, 187-191, 2008 | 48 | 2008 |
WAFA: Fine-grained dynamic analysis of web applications MH Alalfi, JR Cordy, TR Dean 2009 11th IEEE International Symposium on Web Systems Evolution, 141-150, 2009 | 43 | 2009 |
A survey of security vulnerabilities in ethereum smart contracts NF Samreen, MH Alalfi arXiv preprint arXiv:2105.06974, 2021 | 38 | 2021 |
Towards a taxonomy for simulink model mutations M Stephan, MH Alalfi, JR Cordy 2014 IEEE Seventh International Conference on Software Testing, Verification …, 2014 | 33 | 2014 |
Towards qualitative comparison of simulink model clone detection approaches M Stephan, MH Alafi, A Stevenson, JR Cordy 2012 6th International Workshop on Software Clones (IWSC), 84-85, 2012 | 33 | 2012 |
Recovering role-based access control security models from dynamic web applications MH Alalfi, JR Cordy, TR Dean International Conference on Web Engineering, 121-136, 2012 | 32 | 2012 |
Security smells in smart contracts M Demir, M Alalfi, O Turetken, A Ferworn 2019 IEEE 19th International Conference on Software Quality, Reliability and …, 2019 | 31 | 2019 |
Using mutation analysis for a model-clone detector comparison framework M Stephan, MH Alafi, A Stevenson, JR Cordy 2013 35th International Conference on Software Engineering (ICSE), 1261-1264, 2013 | 29 | 2013 |
A survey of analysis models and methods in website verification and testing MH Alalfi, JR Cordy, TR Dean Web Engineering: 7th International Conference, ICWE 2007 Como, Italy, July …, 2007 | 29 | 2007 |
An approach to clone detection in behavioural models EP Antony, MH Alalfi, JR Cordy 2013 20th Working Conference on Reverse Engineering (WCRE), 472-476, 2013 | 25 | 2013 |
Automated verification of role-based access control security models recovered from dynamic web applications MH Alalfi, JR Cordy, TR Dean 2012 14th IEEE International Symposium on Web Systems Evolution (WSE), 1-10, 2012 | 25 | 2012 |
Semi-automatic identification and representation of subsystem variability in simulink models MH Alalfi, EJ Rapos, A Stevenson, M Stephan, TR Dean, JR Cordy 2014 IEEE International Conference on Software Maintenance and Evolution …, 2014 | 24 | 2014 |
Clone detection in Matlab Stateflow models J Chen, TR Dean, MH Alalfi Software Quality Journal 24, 917-946, 2016 | 23 | 2016 |
Near-miss model clone detection for Simulink models MH Alalfi, JR Cordy, TR Dean, M Stephan, A Stevenson 2012 6th International Workshop on Software Clones (IWSC), 78-79, 2012 | 23 | 2012 |
Smartscan: an approach to detect denial of service vulnerability in ethereum smart contracts NF Samreen, MH Alalfi 2021 IEEE/ACM 4th International Workshop on Emerging Trends in Software …, 2021 | 20 | 2021 |