Reusing software: Issues and research directions H Mili, F Mili, A Mili IEEE transactions on Software Engineering 21 (6), 528-562, 1995 | 1076 | 1995 |
Reuse-based software engineering: techniques, organization, and controls H Mili, A Mili, S Yacoub, E Addy Wiley-Interscience, 2001 | 376 | 2001 |
Storing and retrieving software components: A refinement based system R Mili, A Mili, RT Mittermeir IEEE Transactions on Software Engineering 23 (7), 445-460, 1997 | 375 | 1997 |
A survey of software reuse libraries A Mili, R Mili, RT Mittermeir Annals of software engineering 5 (1), 349-414, 1998 | 281 | 1998 |
Architectural-level risk analysis using UML K Goseva-Popstojanova, A Hassan, A Guedem, W Abdelmoez, ... IEEE transactions on software engineering 29 (10), 946-960, 2003 | 214 | 2003 |
A cybersecurity model in cloud computing environments LBA Rabai, M Jouini, AB Aissa, A Mili Journal of King Saud University-Computer and Information Sciences 25 (1), 63-75, 2013 | 156 | 2013 |
Error propagation in software architectures W Abdelmoez, DM Nassar, M Shereshevsky, N Gradetsky, R Gunnalan, ... 10th International Symposium on Software Metrics, 2004. Proceedings., 384-393, 2004 | 126 | 2004 |
On the lattice of specifications: Applications to a specification methodology N Boudriga, F Elloumi, A Mili Formal Aspects of Computing 4, 544-571, 1992 | 123 | 1992 |
Software testing: Concepts and operations A Mili, F Tchier John Wiley & Sons, 2015 | 96 | 2015 |
An empirical study of programming language trends Y Chen, R Dios, A Mili, L Wu, K Wang IEEE software 22 (3), 72-79, 2005 | 89 | 2005 |
An integrated cost model for software reuse A Mili, SF Chmiel, R Gottumukkala, L Zhang Proceedings of the 22nd international conference on Software engineering …, 2000 | 79 | 2000 |
Toward an engineering discipline of software reuse A Mili, S Yacoub, E Addy, H Mili IEEE software 16 (5), 22-31, 1999 | 75 | 1999 |
Quantifying security threats and their potential impacts: a case study AB Aissa, RK Abercrombie, FT Sheldon, A Mili Innovations in Systems and Software Engineering 6, 269-281, 2010 | 74 | 2010 |
Embedding a demonic semilattice in a relation algebra J Desharnais, N Belkhiter, SBM Sghaier, F Tchier, A Jaoua, A Mili, ... Theoretical Computer Science 149 (2), 333-360, 1995 | 61 | 1995 |
A relational approach to the design of deterministic programs A Mili Acta Informatica 20, 315-328, 1983 | 59 | 1983 |
Characterizing a software component S Yacoub, H Ammar, A Mili International Workshop on Component-Based Software Engineering 298, 1999 | 57 | 1999 |
Towards quantitative measures of Information Security: A Cloud Computing case study M Jouini, AB Aissa, LBA Rabai, A Mili International Journal of cyber-security and digital forensics (IJCSDF) 1 (3 …, 2012 | 56 | 2012 |
Integration of sequential scenarios J Desharnais, M Frappier, R Khédri, A Mili IEEE Transactions on Software Engineering 24 (9), 695-708, 1998 | 56 | 1998 |
Relational heuristics for the design of deterministic programs A Mili, J Desharnais, F Mili Acta Informatica 24, 239-276, 1987 | 55 | 1987 |
Quantifying software architectures: an analysis of change propagation probabilities W Abdelmoez, M Shereshevsky, R Gunnalan, HH Ammar, B Yu, ... The 3rd ACS/IEEE International Conference onComputer Systems and …, 2005 | 54 | 2005 |