Dr Amani Ibrahim

STAFF PROFILE

Position

Senior Lecturer, Cyber Security

Faculty

Faculty of Sci Eng & Built Env

Department

School of Info Technology

Campus

Melbourne Burwood Campus

Contact

amani.ibrahim@deakin.edu.au
+61 3 924 43898

Publications

Filter by

2018

An ensemble oversampling model for class imbalance problem in software defect prediction

S Huda, K Liu, M Abdelrazek, A Ibrahim, S Alyahya, H Al-Dossari, S Ahmad

(2018), Vol. 6, pp. 24184-24195, IEEE access, Piscataway, N.J., C1

journal
2017

Adaptive security for software systems

M Abdelrazek, J Grundy, A Ibrahim

(2017), pp. 99-127, Managing trade-offs in adaptable software architectures, Burlington, Mass., B1

chapter
2015

Improving tenants' trust in SaaS applications using dynamic security monitors

M Abdelrazek, J Grundy, A Ibrahim

(2015), pp. 70-79, ICECCS 2015 : Proceedings of the 20th International Conference on Engineering of Complex Computer Systems, Gold Coast, Queensland, E1

conference
2014

Adaptive security management in SaaS applications

M Almorsy, A Ibrahim, J Grundy

(2014), pp. 73-102, Security, privacy and trust in cloud systems, Heidelberg, Germany, B1-1

chapter

Adaptable, model-driven security engineering for SaaS cloud-based applications

M Almorsy, J Grundy, A Ibrahim

(2014), Vol. 21, pp. 187-224, Automated software engineering, Berlin, Germany, C1-1

journal
2013

Automated software architecture security risk analysis using formalized signatures

M Almorsy, J Grundy, A Ibrahim

(2013), pp. 662-671, ICSE 2013 : Proceedings of the 35th International Conference on Software Engineering, San Francisco, Calif., E1-1

conference

DIGGER: identifying OS dynamic kernel objects for run-time security analysis

A Ibrahim, J Hamlyn-Harris, J Grundy, M Almorsy

(2013), Vol. 3, pp. 184-194, International journal on internet and distributed computing systems, Dhaka, Bangladesh, C1-1

journal
2012

Supporting automated vulnerability analysis using formalized vulnerability signatures

M Almorsy, J Grundy, A Ibrahim

(2012), pp. 100-109, 2012 27th IEEE/ACM International Conference on Automated Software Engineering, ASE 2012 - Proceedings, Essen, Germany, E1-1

conference

Supporting automated software re-engineering using re-aspects

M Almorsy, J Grundy, A Ibrahim

(2012), pp. 230-233, ASE 2012 : Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering, Essen, Germany, E1-1

conference

Supporting operating system kernel data disambiguation using points-to analysis

A Ibrahim, J Grundy, J Hamlyn-Harris, M Almorsy

(2012), pp. 234-237, ASE 2012 : Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering, Essen, Germany, E1-1

conference

MDSE@R: model-driven security engineering at runtime

M Almorsy, J Grundy, A Ibrahim

(2012), Vol. 7672, pp. 279-295, CSS 2012 : Proceedings of the 4th International Symposium on Cyberspace Safety and Security, Melbourne, Victoria, E1-1

conference

SMURF: supporting multi-tenancy using re-aspects framework

M Almorsy, J Grundy, A Ibrahim

(2012), pp. 361-370, ICECCS 2012 : Proceedings of the IEEE 17th International Conference on Engineering of Complex Computer Systems, Paris, France, E1-1

conference

Operating system kernel data disambiguation to support security analysis

A Ibrahim, J Grundy, J Hamlyn-Harris, M Almorsy

(2012), Vol. 7645, pp. 263-276, NSS 2012 : Proceedings of the 6th International Conference on Network and System Security 2012, Fujian, China, E1-1

conference

Identifying OS kernel objects for run-time security analysis

A Ibrahim, J Hamlyn-Harris, J Grundy, M Almorsy

(2012), Vol. 7645, pp. 72-85, NSS 2012 : Proceedings of the 6th International Conference on Network and System Security 2012, Fujian, China, E1-1

conference

VAM-aaS: online cloud services security vulnerability analysis and mitigation-as-a-service

M Almorsy, J Grundy, A Ibrahim

(2012), Vol. 7651, pp. 411-425, WISE 2012 : Proceedings of the 13th International Conference on Web Information Systems Engineering, Paphos, Cyprus, E1-1

conference

TOSSMA: a tenant-oriented SaaS security management architecture

M Almorsy, J Grundy, A Ibrahim

(2012), pp. 981-988, CLOUD 2012 : Proceedings of the 5th IEEE International Conference on Cloud Computing 2012, Honolulu, Hawaii, E1-1

conference

Supporting virtualization-aware security solutions using a systematic approach to overcome the semantic gap

A Ibrahim, J Hamlyn-Harris, J Grundy, M Almorsy

(2012), pp. 836-843, CLOUD 2012 : Proceedings of the IEEE 5th International Conference on Cloud Computing, 2012, Honolulu, Hawaii, E1-1

conference
2011

CloudSec: a security monitoring appliance for virtual machines in the IaaS cloud model

A Ibrahim, J Hamlyn-Harris, J Grundy, M Almorsy

(2011), pp. 113-120, NSS 2011 : Proceedings of the 5th International Conference on Network and System Security 2011, Milan, Italy, E1-1

conference

Collaboration-based cloud computing security management framework

M Almorsy, J Grundy, A Ibrahim

(2011), pp. 364-371, CLOUD 2011 : Change We Are Leading : Proceedings of the IEEE 4th International Conference on Cloud Computing 2011, Washington, D.C., E1-1

conference

Funded Projects at Deakin

Industry and Other Funding

Developing a Proof-of-Concept Toolset for Software Vulnerability Analysis Using Hybrid Static and Dynamic Analysis.

A/Prof Mohamed Abdelrazek, Dr Amani Ibrahim, Prof John Grundy, Dr Aldeida Aleti

  • 2018: $30,000

Supervisions

No completed student supervisions to report