98 Publications (Page 2 of 4)
2022
Detecting and Characterizing Propagation of Security Weaknesses in Puppet-based Infrastructure Management
Rahman, A. and Parnin, C.
 
Development of Blockchain-based e-Voting System: Requirements, Design and Security Perspective
Faruk, M.J.H.Saha, B.Islam, M.Alam, F.Shahriar, H.Valero, M.Rahman, A.Wu, F. and Alam, Z.
(pp. 959-967)
 
Empirical Study of Security Misconfigurations in Kubernetes Manifests
 
Evolution of Quantum Computing: A Systematic Survey on the Use of Quantum Computing Tools
Upama, P.B.Faruk, M.J.H.Nazim, M.Masum, M.Shahriar, H.Uddin, G.Barzanjeh, S.Ahamed, S.I. and Rahman, A.
(pp. 520-529)
 
Evolution of Quantum Computing: A Systematic Survey on the Use of Quantum Computing Tools
Upama, P.B.Faruk, J.H.Nazim, M.Masum, M.Shahriar, H.Uddin, G.Barzanjeh, S.Ahamed, S.I. and Rahman, A.
 
Investigating Novel Approaches to Defend Software Supply Chain Attacks
Hossain Faruk, M.J.Tasnim, M.Shahriar, H.Valero, M.Rahman, A. and Wu, F.
(pp. 283-288)
 
Lessons from Research to Practice on Writing Better Quality Puppet Scripts
Rahman, A. and Sharma, T.
(pp. 63-67)
 
Malware Detection and Prevention using Artificial Intelligence Techniques
Faruk, M.J.H.Shahriar, H.Valero, M.Barsha, F.L.Sobhan, S.Khan, M.A.Whitman, M.Cuzzocrea, A.Lo, D.Rahman, A. and Wu, F.
 
Quantum Machine Learning for Software Supply Chain Attacks: How Far Can We Go?
Masum, M.Nazim, M.Faruk, M.J.H.Shahriar, H.Valero, M.Khan, M.A.H.Uddin, G.Barzanjeh, S.Saglamyurek, E.Rahman, A. and Ahamed, S.I.
(pp. 530-538)
 
Quantum Machine Learning for Software Supply Chain Attacks: How Far Can We Go?
Masum, M.Nazim, M.Jobair Hossain Faruk, Md.Shahriar, H.Valero, M.Abdullah Hafiz Khan, Md.Uddin, G.Barzanjeh, S.Saglamyurek, E.Rahman, A. and Ahamed, S.I.
 
Shifting Left for Machine Learning: An Empirical Study of Security Weaknesses in Supervised Learning-based Projects
Bhuiyan, F.A.Prowell, S.Shahriar, H.Wu, F. and Rahman, A.
(pp. 798-808)
 
Software Supply Chain Vulnerabilities Detection in Source Code: Performance Comparison between Traditional and Quantum Machine Learning Algorithms
Akter, M.S.Faruk, M.J.H.Anjum, N.Masum, M.Shahriar, H.Sakib, N.Rahman, A.Wu, F. and Cuzzocrea, A.
(pp. 5639-5645)
 
Towards Automation for MLOps: An Exploratory Study of Bot Usage in Deep Learning Libraries
Rahman, A.Bhuiyan, F.A.Hassan, M.M.Shahriar, H. and Wu, F.
(pp. 1093-1097)
 
Vision for a Secure Elixir Ecosys tem: An Empirical Study of Vulnerabilities in Elixir Programs
Bose, D.B.Cottrell, K. and Rahman, A.
(pp. 215-218)
 
What questions do developers ask about Julia?
Bose, D.B.Gannod, G.C.Rahman, A. and Cottrell, K.
(pp. 224-228)
2021
An empirical study of vulnerabilities in robotics
Cottrell, K.Bose, D.B.Shahriar, H. and Rahman, A.
(pp. 735-744)
 
Different Kind of Smells: Security Smells in Infrastructure as Code Scripts
Rahman, A. and Williams, L.
IEEE Security and Privacy, vol. 19, pp. 33-41. | Journal Article
 
Exercise Perceptions: Experience Report from a Secure Software Development Course
 
How Do Students Feel about Automated Security Static Analysis Exercises?
Rahman, A.Shahriar, H. and Bose, D.B.
 
Malware Detection and Prevention using Artificial Intelligence Techniques
Hossain Faruk, M.J.Faruk, Md Jobair HossainShahriar, H.Shahriar, HossainValero, M.Valero, MariaBarsha, Farhat LamiaBarsha, F.L.Sobhan, ShahriarSobhan, S.Khan, Md AbdullahKhan, M.A.Whitman, M.Whitman, MichaelCuzzocrea, A.Cuzzocrea, AlfredoLo, DanLo, D.Rahman, AkondRahman, A.Wu, F. and Wu, Fan
(pp. 5369-5377)
 
Practitioner Perception of Vulnerability Discovery Strategies
Bhuiyan, F.A.Murphy, J.Morrison, P. and Rahman, A.
(pp. 41-44)
 
Security Bug Report Usage for Software Vulnerability Research: A Systematic Mapping Study
Bhuiyan, F.A.Sharif, M.B. and Rahman, A.
IEEE Access, vol. 9, pp. 28471-28495. | Journal Article
 
Security Smells in Ansible and Chef Scripts. A Replication Study
. | Journal Article
 
Shhh: 12 Practices for Secret Management in Infrastructure as Code
Rahman, A.Barsha, F.L. and Morrison, P.
(pp. 56-62)
 
’Under-reported’ Security Defects in Kubernetes Manifests
Bose, D.B.Rahman, A. and Shamim, S.I.
(pp. 9-12)