98 Publications (Page 2 of 4)
2022
Detecting and Characterizing Propagation of Security Weaknesses in Puppet-based Infrastructure ManagementRahman, A. and Parnin, C.
Development of Blockchain-based e-Voting System: Requirements, Design and Security PerspectiveFaruk, M.J.H.⋅Saha, B.⋅Islam, M.⋅Alam, F.⋅Shahriar, H.⋅Valero, M.⋅Rahman, A.⋅Wu, F. and Alam, Z.(pp. 959-967)
Empirical Study of Security Misconfigurations in Kubernetes Manifests
Evolution of Quantum Computing: A Systematic Survey on the Use of Quantum Computing ToolsUpama, P.B.⋅Faruk, M.J.H.⋅Nazim, M.⋅Masum, M.⋅Shahriar, H.⋅Uddin, G.⋅Barzanjeh, S.⋅Ahamed, S.I. and Rahman, A.(pp. 520-529)
Evolution of Quantum Computing: A Systematic Survey on the Use of Quantum Computing ToolsUpama, P.B.⋅Faruk, J.H.⋅Nazim, M.⋅Masum, M.⋅Shahriar, H.⋅Uddin, G.⋅Barzanjeh, S.⋅Ahamed, S.I. and Rahman, A.
Investigating Novel Approaches to Defend Software Supply Chain AttacksHossain Faruk, M.J.⋅Tasnim, M.⋅Shahriar, H.⋅Valero, M.⋅Rahman, A. and Wu, F.(pp. 283-288)
Lessons from Research to Practice on Writing Better Quality Puppet ScriptsRahman, A. and Sharma, T.(pp. 63-67)
Malware Detection and Prevention using Artificial Intelligence TechniquesFaruk, M.J.H.⋅Shahriar, H.⋅Valero, M.⋅Barsha, F.L.⋅Sobhan, S.⋅Khan, M.A.⋅Whitman, M.⋅Cuzzocrea, A.⋅Lo, D.⋅Rahman, A. and Wu, F.
Quantum Machine Learning for Software Supply Chain Attacks: How Far Can We Go?Masum, M.⋅Nazim, M.⋅Faruk, M.J.H.⋅Shahriar, H.⋅Valero, M.⋅Khan, M.A.H.⋅Uddin, G.⋅Barzanjeh, S.⋅Saglamyurek, E.⋅Rahman, A. and Ahamed, S.I.(pp. 530-538)
Quantum Machine Learning for Software Supply Chain Attacks: How Far Can We Go?Masum, M.⋅Nazim, M.⋅Jobair Hossain Faruk, Md.⋅Shahriar, H.⋅Valero, M.⋅Abdullah Hafiz Khan, Md.⋅Uddin, G.⋅Barzanjeh, S.⋅Saglamyurek, E.⋅Rahman, A. and Ahamed, S.I.
Shifting Left for Machine Learning: An Empirical Study of Security Weaknesses in Supervised Learning-based ProjectsBhuiyan, F.A.⋅Prowell, S.⋅Shahriar, H.⋅Wu, F. and Rahman, A.(pp. 798-808)
Software Supply Chain Vulnerabilities Detection in Source Code: Performance Comparison between Traditional and Quantum Machine Learning AlgorithmsAkter, M.S.⋅Faruk, M.J.H.⋅Anjum, N.⋅Masum, M.⋅Shahriar, H.⋅Sakib, N.⋅Rahman, A.⋅Wu, F. and Cuzzocrea, A.(pp. 5639-5645)
Towards Automation for MLOps: An Exploratory Study of Bot Usage in Deep Learning LibrariesRahman, A.⋅Bhuiyan, F.A.⋅Hassan, M.M.⋅Shahriar, H. and Wu, F.(pp. 1093-1097)
Vision for a Secure Elixir Ecosys tem: An Empirical Study of Vulnerabilities in Elixir ProgramsBose, D.B.⋅Cottrell, K. and Rahman, A.(pp. 215-218)
What questions do developers ask about Julia?Bose, D.B.⋅Gannod, G.C.⋅Rahman, A. and Cottrell, K.(pp. 224-228)
2021
An empirical study of vulnerabilities in roboticsCottrell, K.⋅Bose, D.B.⋅Shahriar, H. and Rahman, A.(pp. 735-744)
Different Kind of Smells: Security Smells in Infrastructure as Code ScriptsRahman, A. and Williams, L.IEEE Security and Privacy, vol. 19, pp. 33-41.
| Journal Article
Exercise Perceptions: Experience Report from a Secure Software Development Course
How Do Students Feel about Automated Security Static Analysis Exercises?Rahman, A.⋅Shahriar, H. and Bose, D.B.
Malware Detection and Prevention using Artificial Intelligence TechniquesHossain Faruk, M.J.⋅Faruk, Md Jobair Hossain⋅Shahriar, H.⋅Shahriar, Hossain⋅Valero, M.⋅Valero, Maria⋅Barsha, Farhat Lamia⋅Barsha, F.L.⋅Sobhan, Shahriar⋅Sobhan, S.⋅Khan, Md Abdullah⋅Khan, M.A.⋅Whitman, M.⋅Whitman, Michael⋅Cuzzocrea, A.⋅Cuzzocrea, Alfredo⋅Lo, Dan⋅Lo, D.⋅Rahman, Akond⋅Rahman, A.⋅Wu, F. and Wu, Fan(pp. 5369-5377)
Practitioner Perception of Vulnerability Discovery StrategiesBhuiyan, F.A.⋅Murphy, J.⋅Morrison, P. and Rahman, A.(pp. 41-44)
Security Bug Report Usage for Software Vulnerability Research: A Systematic Mapping StudyBhuiyan, F.A.⋅Sharif, M.B. and Rahman, A.IEEE Access, vol. 9, pp. 28471-28495.
| Journal Article
Security Smells in Ansible and Chef Scripts. A Replication Study
. | Journal Article
Shhh: 12 Practices for Secret Management in Infrastructure as CodeRahman, A.⋅Barsha, F.L. and Morrison, P.(pp. 56-62)
’Under-reported’ Security Defects in Kubernetes ManifestsBose, D.B.⋅Rahman, A. and Shamim, S.I.(pp. 9-12)