default search action
Suhaimi Ibrahim
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2016
- [j6]M. Reza Mashinchi, Ali Selamat, Suhaimi Ibrahim, Hamido Fujita:
Outlier elimination using granular box regression. Inf. Fusion 27: 161-169 (2016) - 2015
- [c31]M. Reza Mashinchi, Ali Selamat, Suhaimi Ibrahim, Ondrej Krejcar:
Granular-Rule Extraction to Simplify Data. ACIIDS (2) 2015: 421-429 - [c30]Noor Azura Zakaria, Suhaimi Ibrahim, Mohd Naz'ri Mahrin:
Examining Value-Based Factors in Software Development: A Survey Study in Malaysian Public Sector. ASWEC (2) 2015: 13-17 - [c29]Hazlifah Mohd Rusli, Aishah Ahmad, Suhaimi Ibrahim, Mazidah Puteh:
Generating Finite State Machine from WSMO choreography for testing Web services. ICDIM 2015: 204-209 - [c28]M. Reza Mashinchi, Ali Selamat, Suhaimi Ibrahim:
Evaluating Extant Uranium: Linguistic Reasoning by Fuzzy Artificial Neural Networks. SoMeT 2015: 296-307 - [p1]M. Reza Mashinchi, Ali Selamat, Suhaimi Ibrahim, Ondrej Krejcar, Marek Penhaker:
Evaluating Customer Satisfaction: Linguistic Reasoning by Fuzzy Artificial Neural Networks. New Trends in Intelligent Information and Database Systems 2015: 91-100 - 2014
- [j5]Amin Dastanpour, Suhaimi Ibrahim, M. Reza Mashinchi, Ali Selamat:
Using Gravitational Search Algorithm to Support Artificial Neural Network in Intrusion Detection System. Smart Comput. Rev. 4(6): 426-434 (2014) - [c27]Shahir Majed, Suhaimi Ibrahim, Mohamed Shaaban:
Energy Smart Grid Cyber-Threat Exposure Analysis and Evaluation Framework. iiWAS 2014: 163-169 - [c26]Shahir Majed, Suhaimi Ibrahim, Mohamed Shaaban:
Architecting and Development of the SecureCyber: A SCADA Security platform Over Energy Smart Grid. iiWAS 2014: 170-174 - [c25]Shahir Majed, Suhaimi Ibrahim, Mohamed Shaaban:
SecureCyber: Risk-Based Optimization through Common Vulnerability Systems Scoring Over Energy Smart Grid. iiWAS 2014: 190-195 - [i4]Muhammad Dhiauddin Mohamed Suffian, Suhaimi Ibrahim:
A Prediction Model for System Testing Defects using Regression Analysis. CoRR abs/1401.5830 (2014) - 2013
- [c24]Keyvan Mohebbi, Suhaimi Ibrahim, Norbik Bashah Idris:
Prediction of Relevance between Requests and Web Services Using ANN and LR Models. ACIIDS (2) 2013: 40-49 - 2012
- [j4]Seyed Reza Shahamiri, Wan M. N. Wan-Kadir, Suhaimi Ibrahim, Siti Zaiton Mohd Hashim:
Artificial neural networks as multi-networks automated test oracle. Autom. Softw. Eng. 19(3): 303-334 (2012) - [i3]Keyvan Mohebbi, Suhaimi Ibrahim, Norbik Bashah Idris:
Contemporary Semantic Web Service Frameworks: An Overview and Comparisons. CoRR abs/1210.3320 (2012) - 2011
- [j3]Seyed Reza Shahamiri, Wan Mohd Nasir Wan-Kadir, Suhaimi Ibrahim, Siti Zaiton Mohd Hashim:
An automated framework for software test oracle. Inf. Softw. Technol. 53(7): 774-788 (2011) - [c23]Azri Azmi, Suhaimi Ibrahim:
Test Management Traceability Model to Support Software Testing Documentation. DICTAP (2) 2011: 21-32 - [c22]Othman Mohd Yusop, Suhaimi Ibrahim:
Software Maintenance Testing Approaches to Support Test Case Changes - A Review. DICTAP (2) 2011: 33-42 - [c21]Hazlifah Mohd Rusli, Mazidah Puteh, Suhaimi Ibrahim, Sayed Gholam Hassan Tabatabaei:
A comparative evaluation of state-of-the-art web service composition testing approaches. AST 2011: 29-35 - [c20]Homa Movahednejad, Suhaimi Ibrahim, Mahdi Sharifi, Harihodin Bin Selamat, Sayed Gholam Hassan Tabatabaei:
Security-aware web service composition approaches: state-of-the-art. iiWAS 2011: 112-121 - [i2]Babak Bashari Rad, Maslin Masrom, Suhaimi Ibrahim:
Evolution of Computer Virus Concealment and Anti-Virus Techniques: A Short Survey. CoRR abs/1104.1070 (2011) - [i1]Kanmani Munusamy, Harihodin Bin Selamat, Suhaimi Ibrahim, Mohd Sapiyan Baba:
A comparative study of process mediator components that support behavioral incompatibility. CoRR abs/1110.2258 (2011) - 2010
- [j2]Sayed Gholam Hassan Tabatabaei, Amir Vahid Dastjerdi, Wan M. N. Wan-Kadir, Suhaimi Ibrahim, Elahe Sarafian:
Security conscious AI-planning-based composition of semantic web services. Int. J. Web Inf. Syst. 6(3): 203-229 (2010) - [c19]Ahmed Ibrahim Safana, Suhaimi Ibrahim:
Implementing Software Test Management Using SpiraTeam Tool. ICSEA 2010: 447-452 - [c18]Keyvan Mohebbi, Suhaimi Ibrahim, Mojtaba Khezrian, Kanmani Munusamy, Sayed Gholam Hassan Tabatabaei:
A comparative evaluation of semantic web service discovery approaches. iiWAS 2010: 33-39 - [c17]Kanmani Munusamy, Suhaimi Ibrahim, Mojtaba Khezrian, Keyvan Mohebbi, Sayed Gholam Hassan Tabatabaei:
An evaluation of process mediation approaches in web services. iiWAS 2010: 48-55 - [c16]Mojtaba Khezrian, Wan M. N. Wan-Kadir, Suhaimi Ibrahim, Keyvan Mohebbi, Kanmani Munusamy, Sayed Gholam Hassan Tabatabaei:
An evaluation of state-of-the-art approaches for web service selection. iiWAS 2010: 885-889 - [c15]Faizah Omar, Suhaimi Ibrahim:
Designing Test Coverage for Grey Box Analysis. QSIC 2010: 353-356 - [c14]Raja Zurina Raja Mohamed Ali, Suhaimi Ibrahim:
Software Process Improvement (iSPA) Model Evaluation based on Critical Success Factors of Successful Software Projects. Software Engineering Research and Practice 2010: 363-369
2000 – 2009
- 2009
- [c13]Masarat Ayat, Mohammad Sharifi, Shamsul Sahibuddin, Suhaimi Ibrahim:
Adoption Factors and Implementation Steps of ITSM in the Target. Asia International Conference on Modelling and Simulation 2009: 369-374 - [c12]Masarat Ayat, Mohammad Sharifi, Suhaimi Ibrahim, Shamsul Sahibuddin:
CMDB Implementation Approaches and Considerations in SME/SITU's Companies. Asia International Conference on Modelling and Simulation 2009: 381-385 - [c11]Mohammad Sharifi, Masarat Ayat, Suhaimi Ibrahim, Shamsul Sahibuddin:
A Novel ITSM-Based Implementation Method to Maintain Software Assets in Order to Sustain Organizational Activities. EMS 2009: 274-280 - [c10]Amir Vahid Dastjerdi, Sayed Gholam Hassan Tabatabaei, Wan M. N. Wan-Kadir, Suhaimi Ibrahim, Elahe Sarafian:
SCAIMO - A Case for Enabling Security in Semantic Web Service Composition. FGIT-GDC 2009: 65-72 - [c9]Mahdi Sharifi, Homa Movahednejad, Sayed Gholam Hassan Tabatabaei, Suhaimi Ibrahim:
An effective access control approach to support web service security. iiWAS 2009: 529-535 - [c8]Sayed Gholam Hassan Tabatabaei, Amir Vahid Dastjerdi, Wan M. N. Wan-Kadir, Suhaimi Ibrahim, Elahe Sarafian:
Security conscious composition of Semantic Web services based on AI planning and description logic. iiWAS 2009: 536-542 - 2008
- [c7]Sayed Gholam Hassan Tabatabaei, Wan Mohd Nasir Wan-Kadir, Suhaimi Ibrahim:
Semantic Web Service Discovery and Composition Based on AI Planning and Web Service Modeling Ontology. APSCC 2008: 397-403 - [c6]Showole Aminat, Suhaimi Ibrahim, Shamsul Sahibuddin:
Industrial Application Development with Open Source Approach. ICSEA 2008: 152-157 - [c5]Sayed Gholam Hassan Tabatabaei, Wan M. N. Wan-Kadir, Suhaimi Ibrahim:
A Comparative Evaluation of State-of-the-Art Approaches for Web Service Composition. ICSEA 2008: 488-493 - [c4]Mahmood Niazi, Muhammad Ali Babar, Suhaimi Ibrahim:
An Empirical Study Identifying High Perceived Value Practices of CMMI Level 2. PROFES 2008: 427-441 - 2006
- [c3]Suhaimi Ibrahim, Norbik Bashah Idris, Malcolm Munro, Aziz Deraman:
A Software Traceability Validation For Change Impact Analysis of Object Oriented Software. Software Engineering Research and Practice 2006: 453-459 - 2005
- [j1]Suhaimi Ibrahim, Norbik Bashah Idris, Malcolm Munro, Aziz Deraman:
Integrating Software Traceability for Change Impact Analysis. Int. Arab J. Inf. Technol. 2(4): 301-308 (2005) - [c2]Suhaimi Ibrahim, Norbik Bashah Idris, Malcolm Munro, Aziz Deraman:
Implementing a Document-based Requirements Traceability: A Case Study. IASTED Conf. on Software Engineering 2005: 124-131 - 2003
- [c1]Suhaimi Ibrahim, Norbik Bashah Idris, Aziz Deraman:
Case study: Reconnaissance techniques to support feature location using RECON2. APSEC 2003: 371-
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint