107 Publications (Page 1 of 5)
2024
An empirical study of task infections in Ansible scripts. Empirical Software Engineering
. | Journal Article
Authentic Learning for Information Flow Analysis
Container Orchestration Smells in ChaGPT-generated Kubernetes Manifests
Defect Categorization in Compilers: A Multi-vocal Literature Review. ACM Computing Surveys
. | Journal Article
Does Generative AI Generate Smells Related to Container Orchestration?: An Exploratory Study with Kubernetes Manifests
Evaluating the Quality of Open Source Ansible Playbooks: An Executability Perspective
Replication Package for An Empirical Study of Community-prescribed Security Configurations in Kubernetes
State Reconciliation Defects in Infrastructure as Code
State Reconciliation Defects in Infrastructure as Code. Proceedings of the ACM on Software Engineering
. | Journal Article
Student Perceptions of Authentic Learning to Learn White-box Testing
Transforming online voting: a novel system utilizing blockchain and biometric verification for enhanced security, privacy, and transparencyHossain Faruk, M.J.⋅Alam, F.⋅Islam, M. and Rahman, A.Cluster Computing.
| Journal Article
Using AI Assistants in Software Development: A Qualitative Study on Security Practices and ConcernsKlemmer, J.H.⋅Horstmann, S.A.⋅Patnaik, N.⋅Ludden, C.⋅Burton, C.⋅Powers, C.⋅Massacci, F.⋅Rahman, A.⋅Votipka, D.⋅Lipford, H.R.⋅Rashid, A.⋅Naiakshina, A. and Fahl, S.
2023
A Plugin for Kotlin based Android Apps to Detect Security Breaches through DataflowIslam Talukder, M.A.⋅Farzana Mishu, S.⋅Shahriar, H.⋅Islam Riad, A.B.M.K.⋅Wu, F. and Rahman, A.(pp. 1840-1845)
Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and ProtectionAkter, M.S.⋅Shahriar, H.⋅Ahamed, S.I.⋅Gupta, K.D.⋅Rahman, M.⋅Mohamed, A.⋅Rahman, M.⋅Rahman, A. and Wu, F.
Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and ProtectionAkter, M.S.⋅Shahriar, H.⋅Iqbal Ahamed, S.⋅Datta Gupta, K.⋅Rahman, M.⋅Mohamed, A. and Wu, F.(pp. 1057-1063)
Characterizing Static Analysis Alerts for Terraform Manifests: An Experience ReportHu, H.⋅Bu, Y.⋅Wong, K.⋅Sood, G.⋅Smiley, K. and Rahman, A.(pp. 7-13)
Come for syntax, stay for speed, understand defects: an empirical study of defects in Julia programs. Empirical Software Engineering
. | Journal Article
Dataset and Source Code for Paper: An Empirical Study of Insecure Coding Patterns in Julia Programs
Dataset and Source Code for the Paper Titled An Empirical Study of Task Infections in Ansible Manifests
Dataset - Defects in Ansible Infrastructure Orchestrator
Dataset for Paper - An Empirical Study of Bugs in Julia Programs
Detecting and Characterizing Propagation of Security Weaknesses in Puppet-based infrastructure Management. IEEE Transactions on Software Engineering
. | Journal Article
Log-related Coding Patterns to Conduct Postmortems of Attacks in Supervised Learning-based Projects. ACM Transactions on Privacy and Security
. | Journal Article
Practitioner Perceptions of Ansible Test SmellsZhang, Y.⋅Wu, F. and Rahman, A.(pp. 325-327)
Quality Assurance for Infrastructure Orchestrators: Emerging Results from AnsibleZhang, Y.⋅Rahman, M.⋅Wu, F. and Rahman, A.(pp. 322-324)