


default search action
Mohamed El-Attar 0001
Person information
- affiliation: Zayed University, Abu Dhabi, UAE
- affiliation: Alfaisal University, Riyadh, Saudi Arabia
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j27]Mohamed El-Attar:
On the accessibility of the grayscale version of a PoN-enabled use case notation. J. Softw. Evol. Process. 36(9) (2024) - 2023
- [j26]Mohamed El-Attar
:
Evaluating the accessibility of a PoN-enabled misuse case notation by the red-green colorblind community. Softw. Syst. Model. 22(1): 247-272 (2023) - 2022
- [j25]Mohamed El-Attar
:
Are models better read on paper or on screen? A comparative study. Softw. Syst. Model. 21(4): 1531-1550 (2022) - [j24]Mohamed El-Attar
:
Empirically Evaluating the Effect of the Physics of Notations on Model Construction. IEEE Trans. Software Eng. 48(7): 2455-2475 (2022) - 2021
- [j23]Habib Ullah Khan
, Mahmood Niazi
, Mohamed El-Attar, Naveed Ikram, Siffat Ullah Khan
, Asif Qumer Gill
:
Empirical Investigation of Critical Requirements Engineering Practices for Global Software Development. IEEE Access 9: 93593-93613 (2021) - [j22]Nidal Nasser
, Nargis Khan, Lutful Karim, Mohamed ElAttar, Kassem Saleh:
An efficient Time-sensitive data scheduling approach for Wireless Sensor Networks in smart cities. Comput. Commun. 175: 112-122 (2021)
2010 – 2019
- 2019
- [j21]Mohamed El-Attar
:
Evaluating and empirically improving the visual syntax of use case diagrams. J. Syst. Softw. 156: 136-163 (2019) - [j20]Mohamed El-Attar:
A comparative study of students and professionals in syntactical model comprehension experiments. Softw. Syst. Model. 18(6): 3283-3329 (2019) - [c13]Mohamed El-Attar, Nidal Nasser
:
Refactoring Misuse Case Diagrams using Model Transformation. ENASE 2019: 249-256 - [c12]Nidal Nasser
, Nargis Khan, Mohamed El-Attar, Kassem Saleh, Amjad Abujamous:
An Efficient Data Scheduling Scheme for Cloud- Based Big Data Framework for Smart City. GLOBECOM 2019: 1-6 - 2016
- [j19]Mazin Saeed, Faisal Saleh
, Sadiq Al-Insaif
, Mohamed El-Attar:
Empirical validating the cognitive effectiveness of a new feature diagrams visual syntax. Inf. Softw. Technol. 71: 1-26 (2016) - [j18]Yasser A. Khan, Mohamed El-Attar
:
Using model transformation to refactor use case models based on antipatterns. Inf. Syst. Frontiers 18(1): 171-204 (2016) - [j17]Mohamed El-Attar
, Hezam Akram Abdul-Ghani:
Using security robustness analysis for early-stage validation of functional security requirements. Requir. Eng. 21(1): 1-27 (2016) - 2015
- [j16]Mohamed El-Attar:
Supporting Consistency during the Development and Evolution of Quality Unified Use-Misuse Case Models. Int. J. Secur. Softw. Eng. 6(4): 1-31 (2015) - [j15]Faisal Saleh
, Mohamed El-Attar:
A scientific evaluation of the misuse case diagrams visual syntax. Inf. Softw. Technol. 66: 73-96 (2015) - [j14]Mohamed El-Attar
, Hamza Luqman, Péter Kárpáti, Guttorm Sindre
, Andreas L. Opdahl
:
Extending the UML Statecharts Notation to Model Security Aspects. IEEE Trans. Software Eng. 41(7): 661-690 (2015) - 2014
- [j13]Mohamed El-Attar
:
Using SMCD to reduce inconsistencies in misuse case models: A subject-based empirical evaluation. J. Syst. Softw. 87: 104-118 (2014) - [j12]Mohamed El-Attar
:
From misuse cases to mal-activity diagrams: bridging the gap between functional security analysis and design. Softw. Syst. Model. 13(1): 173-190 (2014) - [c11]Mazin Saeed, Faisal Saleh, Sadiq Al-Insaif
, Mohamed El-Attar
:
Evaluating the Cognitive Effectiveness of the Visual Syntax of Feature Diagrams. APRES 2014: 180-194 - 2012
- [j11]Mohamed El-Attar
:
A framework for improving quality in misuse case models. Bus. Process. Manag. J. 18(2): 168-196 (2012) - [j10]Mohamed El-Attar
:
Towards developing consistent misuse case models. J. Syst. Softw. 85(2): 323-339 (2012) - [j9]Mohamed El-Attar
, Ravi Inder Singh, James Miller:
Embracing Composite Metrics in Software Experiments. J. Softw. 7(7): 1664-1676 (2012) - [j8]Mohamed El-Attar
, Mahmoud O. Elish
, Sajjad Mahmood
, James Miller:
Is In-Depth Object-Oriented Knowledge Necessary to Develop Quality Robustness Diagrams? J. Softw. 7(11): 2538-2552 (2012) - [j7]Mohamed El-Attar
, James Miller:
Constructing high quality use case models: a systematic review of current practices. Requir. Eng. 17(3): 187-201 (2012) - [c10]Mahmood Niazi
, Mohamed El-Attar, Muhammad Usman, Naveed Ikram:
GlobReq: A framework for improving requirements engineering in global software development projects: Preliminary results. EASE 2012: 166-170 - [c9]Mohamed El-Attar, Khaldoun Halawani, Moustafa Alsaleh, Mahmood Niazi:
Are Use Case Modeling Features Underutilized? - A Lightweight Survey that Raises Concerns. ENASE 2012: 203-206 - [c8]Yasser A. Khan, Mahmoud O. Elish
, Mohamed El-Attar
:
A Systematic Review on the Impact of CK Metrics on the Functional Correctness of Object-Oriented Classes. ICCSA (4) 2012: 258-273 - [c7]Yasser A. Khan, Mohamed El-Attar:
Automated Transformation of Use Case Maps to UML Activity Diagrams. ICSOFT 2012: 184-189 - 2011
- [c6]Mohamed El-Attar, Irfan Ahmad
:
Improving Quality in Misuse Case Models: A Risk-Based Approach. ACIS-ICIS 2011: 337-342 - [c5]Mohammed Wajahat Kamal, Moataz A. Ahmed
, Mohamed El-Attar
:
Use Case-Based Effort Estimation Approaches: A Comparison Criteria. ICSECS (3) 2011: 735-754 - [c4]Mohamed El-Attar
:
UseCaseDiff: An Algorithm for Differencing Use Case Models. SERA 2011: 148-152 - 2010
- [j6]Mohamed El-Attar
, James Miller:
Developing comprehensive acceptance tests from use cases and robustness diagrams. Requir. Eng. 15(3): 285-306 (2010) - [j5]Mohamed El-Attar
, James Miller:
Improving the quality of use case models using antipatterns. Softw. Syst. Model. 9(2): 141-160 (2010) - [c3]Mohamed El-Attar:
Developing Precise Misuse Cases with Security Robustness Analysis. SEKE 2010: 571-576
2000 – 2009
- 2009
- [j4]Mohamed El-Attar
, James Miller:
A subject-based empirical evaluation of SSUCD's performance in reducing inconsistencies in use case models. Empir. Softw. Eng. 14(5): 477-512 (2009) - 2008
- [j3]Mohamed El-Attar
, James Miller:
Producing robust use case diagrams via reverse engineering of use case descriptions. Softw. Syst. Model. 7(1): 67-83 (2008) - 2007
- [j2]Mohamed El-Attar, James Miller:
A User-Centered Approach to Modeling BPEL Business Processes Using SUCD Use Cases. e Informatica Softw. Eng. J. 1(1): 59-76 (2007) - [j1]Man Xiao, Mohamed El-Attar
, Marek Z. Reformat
, James Miller:
Empirical evaluation of optimization algorithms when used in goal-oriented automated test data generation techniques. Empir. Softw. Eng. 12(2): 183-239 (2007) - 2006
- [c2]Mohamed El-Attar
, James Miller:
Matching Antipatterns to Improve the Quality of Use Case Models. RE 2006: 96-105 - [c1]Mohamed El-Attar
, James Miller:
AGADUC: Towards a More Precise Presentation of Functional Requirement in Use Case Mod. SERA 2006: 346-353
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-04 21:19 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint