110 Publications (Page 1 of 5)
2024
An empirical study of task infections in Ansible scripts. Empirical Software Engineering
. | Journal Article
 
Authentic Learning for Information Flow Analysis
 
Container Orchestration Smells in ChaGPT-generated Kubernetes Manifests
 
Dataset for SVM25 Paper on Vulnerabilities in ML Deployment Projects
 
Defect Categorization in Compilers: A Multi-vocal Literature Review. ACM Computing Surveys
. | Journal Article
 
Does Generative AI Generate Smells Related to Container Orchestration?: An Exploratory Study with Kubernetes Manifests
 
Evaluating the Quality of Open Source Ansible Playbooks: An Executability Perspective
 
Replication Package for An Empirical Study of Community-prescribed Security Configurations in Kubernetes
 
State Reconciliation Defects in Infrastructure as Code
 
State Reconciliation Defects in Infrastructure as Code. Proceedings of the ACM on Software Engineering
. | Journal Article
 
Student Perceptions of Authentic Learning to Learn White-box Testing
 
Transforming online voting: a novel system utilizing blockchain and biometric verification for enhanced security, privacy, and transparency
Hossain Faruk, M.J.Alam, F.Islam, M. and Rahman, A.
Cluster Computing. | Journal Article
 
Using AI Assistants in Software Development: A Qualitative Study on Security Practices and Concerns
Klemmer, J.H.Horstmann, S.A.Patnaik, N.Ludden, C.Burton, C.Powers, C.Massacci, F.Rahman, A.Votipka, D.Lipford, H.R.Rashid, A.Naiakshina, A. and Fahl, S.
 
Using AI Assistants in Software Development: A Qualitative Study on Security Practices and Concerns
2023
A Plugin for Kotlin based Android Apps to Detect Security Breaches through Dataflow
Islam Talukder, M.A.Farzana Mishu, S.Shahriar, H.Islam Riad, A.B.M.K.Wu, F. and Rahman, A.
(pp. 1840-1845)
 
Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and Protection
Akter, M.S.Shahriar, H.Iqbal Ahamed, S.Datta Gupta, K.Rahman, M.Mohamed, A. and Wu, F.
(pp. 1057-1063)
 
Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and Protection
Akter, M.S.Shahriar, H.Ahamed, S.I.Gupta, K.D.Rahman, M.Mohamed, A.Rahman, M.Rahman, A. and Wu, F.
 
Characterizing Static Analysis Alerts for Terraform Manifests: An Experience Report
Hu, H.Bu, Y.Wong, K.Sood, G.Smiley, K. and Rahman, A.
(pp. 7-13)
 
Come for syntax, stay for speed, understand defects: an empirical study of defects in Julia programs. Empirical Software Engineering
. | Journal Article
 
Dataset and Source Code for Paper: An Empirical Study of Insecure Coding Patterns in Julia Programs
 
Dataset and Source Code for the Paper Titled An Empirical Study of Task Infections in Ansible Manifests
 
Dataset - Defects in Ansible Infrastructure Orchestrator
 
Dataset for Paper - An Empirical Study of Bugs in Julia Programs
 
Detecting and Characterizing Propagation of Security Weaknesses in Puppet-based infrastructure Management. IEEE Transactions on Software Engineering
. | Journal Article
 
Log-related Coding Patterns to Conduct Postmortems of Attacks in Supervised Learning-based Projects. ACM Transactions on Privacy and Security
. | Journal Article