116 Publications (Page 2 of 5)
    
        
          
              2023
          
          
            Come for syntax, stay for speed, understand defects: an empirical study of defects in Julia programs. Empirical Software Engineering
.  | Journal Article
           
         
        
          
               
          
          
            Dataset and Source Code for Paper: An Empirical Study of Insecure Coding Patterns in Julia Programs
           
         
        
          
               
          
          
            Dataset and Source Code for the Paper Titled  An Empirical Study of Task Infections in Ansible Manifests 
           
         
        
          
               
          
          
            Dataset - Defects in Ansible Infrastructure Orchestrator
           
         
        
          
               
          
          
            Dataset for Paper - An Empirical Study of Bugs in Julia Programs
           
         
        
          
               
          
          
            Detecting and Characterizing Propagation of Security Weaknesses in Puppet-based infrastructure Management. IEEE Transactions on Software Engineering
.  | Journal Article
           
         
        
          
               
          
          
            Log-related Coding Patterns to Conduct Postmortems of Attacks in Supervised Learning-based Projects. ACM Transactions on Privacy and Security
.  | Journal Article
           
         
        
          
               
          
          
            Practitioner Perceptions of Ansible Test SmellsZhang, Y.⋅Wu, F. and Rahman, A.(pp. 325-327) 
           
         
        
          
               
          
          
            Quality Assurance for Infrastructure Orchestrators: Emerging Results from AnsibleZhang, Y.⋅Rahman, M.⋅Wu, F. and Rahman, A.(pp. 322-324) 
           
         
        
          
               
          
          
            Security Misconfigurations in Open Source Kubernetes Manifests: An Empirical Study. ACM Transactions on Software Engineering and Methodology
.  | Journal Article
           
         
        
          
               
          
          
            Software Supply Chain Vulnerabilities Detection in Source Code: Performance Comparison between Traditional and Quantum Machine Learning AlgorithmsAkter, M.S.⋅Faruk, Md.J.H.⋅Anjum, N.⋅Masum, M.⋅Shahriar, H.⋅Rahman, A.⋅Wu, F. and Cuzzocrea, A. 
           
         
        
          
               
          
          
            Survey - Ansible Test Smell
           
         
        
        
          
               
          
          
            Teaching DevOps Security Education with Hands-on Labware: Automated Detection of Security Weakness in PythonAkter, M.S.⋅Rodriguez-Cardenas, J.⋅Rahman, M.M.⋅Shahriar, H. and Wu, F. 
           
         
        
          
              2022
          
          
            A Novel Machine Learning Based Framework for Bridge Condition AnalysisMasum, M.⋅Anjum, N.⋅Hossain Faruk, M.J.⋅Shahriar, H.⋅Sakib, N.⋅Valero, M.⋅Karim, M.A.⋅Rahman, A.⋅Wu, F. and Cuzzocrea, A.(pp. 5530-5535) 
           
         
        
          
               
          
          
            As Code Testing: Characterizing Test Quality in Open Source Ansible DevelopmentHassan, M.M. and Rahman, A.(pp. 208-219) 
           
         
        
          
               
          
          
            Benefits, Challenges, and Research Topics: A Multi-vocal Literature Review of KubernetesShamim, S.I.⋅Gibson, J.A.⋅Morrison, P. and Rahman, A. 
           
         
        
          
               
          
          
            Bie Vote: A Biometric Identification Enabled Blockchain-Based Secure and Transparent Voting FrameworkFaruk, M.J.H.⋅Islam, M.⋅Alam, F.⋅Shahriar, H. and Rahman, A.(pp. 253-258) 
           
         
        
          
               
          
          
            Can We use Authentic Learning to Educate Students about Secure Infrastructure as Code Development?Rahman, A.⋅Shamim, S.I.⋅Shahriar, H. and Wu, F.(pp. 631) 
           
         
        
          
               
          
          
            Detecting and Characterizing Propagation of Security Weaknesses in Puppet-based Infrastructure ManagementRahman, A. and Parnin, C. 
           
         
        
          
               
          
          
            Development of Blockchain-based e-Voting System: Requirements, Design and Security PerspectiveFaruk, M.J.H.⋅Saha, B.⋅Islam, M.⋅Alam, F.⋅Shahriar, H.⋅Valero, M.⋅Rahman, A.⋅Wu, F. and Alam, Z.(pp. 959-967) 
           
         
        
          
               
          
          
            Empirical Study of Security Misconfigurations in Kubernetes Manifests
           
         
        
          
               
          
          
            Evolution of Quantum Computing: A Systematic Survey on the Use of Quantum Computing ToolsUpama, P.B.⋅Faruk, M.J.H.⋅Nazim, M.⋅Masum, M.⋅Shahriar, H.⋅Uddin, G.⋅Barzanjeh, S.⋅Ahamed, S.I. and Rahman, A.(pp. 520-529) 
           
         
        
          
               
          
          
            Evolution of Quantum Computing: A Systematic Survey on the Use of Quantum Computing ToolsUpama, P.B.⋅Faruk, J.H.⋅Nazim, M.⋅Masum, M.⋅Shahriar, H.⋅Uddin, G.⋅Barzanjeh, S.⋅Ahamed, S.I. and Rahman, A. 
           
         
        
          
               
          
          
            Investigating Novel Approaches to Defend Software Supply Chain AttacksHossain Faruk, M.J.⋅Tasnim, M.⋅Shahriar, H.⋅Valero, M.⋅Rahman, A. and Wu, F.(pp. 283-288)