default search action
Mazen Mohamad
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Mazen Mohamad, Jan-Philipp Steghöfer, Eric Knauss, Riccardo Scandariato:
Managing security evidence in safety-critical organizations. J. Syst. Softw. 214: 112082 (2024) - [j5]Ranim Khojah, Mazen Mohamad, Philipp Leitner, Francisco Gomes de Oliveira Neto:
Beyond Code Generation: An Observational Study of ChatGPT Usage in Software Engineering Practice. Proc. ACM Softw. Eng. 1(FSE): 1819-1840 (2024) - [c9]Antonia Welzel, Rebekka Wohlrab, Mazen Mohamad:
Increasing the Confidence in Security Assurance Cases using Game Theory. ARES 2024: 35:1-35:13 - [c8]Mazen Mohamad, Ramana Reddy Avula, Peter Folkesson, Pierre Kleberger, Aria Mirzai, Martin Skoglund, Marvin Damschen:
Cybersecurity Pathways Towards CE-Certified Autonomous Forestry Machines. DSN-W 2024: 98-105 - [c7]Klara Svensson, Drake Axelrod, Mazen Mohamad, Rebekka Wohlrab:
Guidelines for Supporting Software Engineers in Developing Secure Web Applications. PROFES 2024: 123-138 - [i9]Ranim Khojah, Mazen Mohamad, Philipp Leitner, Francisco Gomes de Oliveira Neto:
Beyond Code Generation: An Observational Study of ChatGPT Usage in Software Engineering Practice. CoRR abs/2404.14901 (2024) - [i8]Mazen Mohamad, Jan-Philipp Steghöfer, Eric Knauss, Riccardo Scandariato:
Managing Security Evidence in Safety-Critical Organizations. CoRR abs/2404.17332 (2024) - [i7]Mazen Mohamad, Ramana Reddy Avula, Peter Folkesson, Pierre Kleberger, Aria Mirzai, Martin Skoglund, Marvin Damschen:
Cybersecurity Pathways Towards CE-Certified Autonomous Forestry Machines. CoRR abs/2404.19643 (2024) - [i6]Max Fransson, Adam Andersson, Mazen Mohamad, Jan-Philipp Steghöfer:
Evaluating the Role of Security Assurance Cases in Agile Medical Device Development. CoRR abs/2407.07704 (2024) - [i5]Mazen Mohamad:
Towards Understanding and Applying Security Assurance Cases for Automotive Systems. CoRR abs/2409.04474 (2024) - 2023
- [j4]Mazen Mohamad, Rodi Jolak, Örjan Askerdal, Jan-Philipp Steghöfer, Riccardo Scandariato:
CASCADE: An Asset-driven Approach to Build Security Assurance Cases for Automotive Systems. ACM Trans. Cyber Phys. Syst. 7(1): 3:1-3:26 (2023) - 2022
- [j3]Rodi Jolak, Thomas Rosenstatter, Mazen Mohamad, Kim Strandberg, Behrooz Sangchoolie, Nasser Nowdehi, Riccardo Scandariato:
CONSERVE: A framework for the selection of techniques for monitoring containers security. J. Syst. Softw. 186: 111158 (2022) - [c6]Hazem Peter Samoaa, Antonio Longa, Mazen Mohamad, Morteza Haghir Chehreghani, Philipp Leitner:
TEP-GNN: Accurate Execution Time Prediction of Functional Tests Using Graph Neural Networks. PROFES 2022: 464-479 - [c5]Mazen Mohamad, Jan-Philipp Steghöfer, Alexander Åström, Riccardo Scandariato:
Identifying security-related requirements in regulatory documents based on cross-project classification. PROMISE 2022: 82-91 - [i4]Hazem Peter Samoaa, Antonio Longa, Mazen Mohamad, Morteza Haghir Chehreghani, Philipp Leitner:
TEP-GNN: Accurate Execution Time Prediction of Functional Tests using Graph Neural Networks. CoRR abs/2208.11947 (2022) - 2021
- [j2]Mazen Mohamad, Jan-Philipp Steghöfer, Riccardo Scandariato:
Security assurance cases - state of the art of an emerging approach. Empir. Softw. Eng. 26(4): 70 (2021) - [c4]Mazen Mohamad, Örjan Askerdal, Rodi Jolak, Jan-Philipp Steghöfer, Riccardo Scandariato:
Asset-driven Security Assurance Cases with Built-in Quality Assurance. EnCyCriS@ICSE 2021: 29-36 - [c3]Jan-Philipp Steghöfer, Björn Koopmann, Jan Steffen Becker, Mikaela Törnlund, Yulla Ibrahim, Mazen Mohamad:
Design Decisions in the Construction of Traceability Information Models for Safe Automotive Systems. RE 2021: 185-196 - 2020
- [c2]Mazen Mohamad, Alexander Åström, Örjan Askerdal, Jörgen Borg, Riccardo Scandariato:
Security assurance cases for road vehicles: an industry perspective. ARES 2020: 29:1-29:6 - [i3]Mazen Mohamad, Alexander Åström, Örjan Askerdal, Jörgen Borg, Riccardo Scandariato:
Security Assurance Cases for Road Vehicles: an Industry Perspective. CoRR abs/2003.14106 (2020) - [i2]Mazen Mohamad, Jan-Philipp Steghöfer, Riccardo Scandariato:
Cross-project Classification of Security-related Requirements. CoRR abs/2003.14134 (2020) - [i1]Mazen Mohamad, Jan-Philipp Steghöfer, Riccardo Scandariato:
Security Assurance Cases - State of the Art of an Emerging Approach. CoRR abs/2003.14151 (2020)
2010 – 2019
- 2018
- [c1]Mazen Mohamad, Grischa Liebel, Eric Knauss:
LoCo CoCo. Software Engineering 2018: 129-130 - 2017
- [j1]Mazen Mohamad, Grischa Liebel, Eric Knauss:
LoCo CoCo: Automatically constructing coordination and communication networks from model-based systems engineering data. Inf. Softw. Technol. 92: 179-193 (2017)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-13 19:13 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint