110 Publications (Page 3 of 5)
2022
Towards Automation for MLOps: An Exploratory Study of Bot Usage in Deep Learning Libraries
Rahman, A.Bhuiyan, F.A.Hassan, M.M.Shahriar, H. and Wu, F.
(pp. 1093-1097)
 
Vision for a Secure Elixir Ecosys tem: An Empirical Study of Vulnerabilities in Elixir Programs
Bose, D.B.Cottrell, K. and Rahman, A.
(pp. 215-218)
 
What questions do developers ask about Julia?
Bose, D.B.Gannod, G.C.Rahman, A. and Cottrell, K.
(pp. 224-228)
2021
An empirical study of vulnerabilities in robotics
Cottrell, K.Bose, D.B.Shahriar, H. and Rahman, A.
(pp. 735-744)
 
Different Kind of Smells: Security Smells in Infrastructure as Code Scripts
Rahman, A. and Williams, L.
IEEE Security and Privacy, vol. 19, pp. 33-41. | Journal Article
 
Exercise Perceptions: Experience Report from a Secure Software Development Course
 
How Do Students Feel about Automated Security Static Analysis Exercises?
Rahman, A.Shahriar, H. and Bose, D.B.
 
Malware Detection and Prevention using Artificial Intelligence Techniques
Hossain Faruk, M.J.Faruk, Md Jobair HossainShahriar, H.Shahriar, HossainValero, M.Valero, MariaBarsha, Farhat LamiaBarsha, F.L.Sobhan, ShahriarSobhan, S.Khan, Md AbdullahKhan, M.A.Whitman, M.Whitman, MichaelCuzzocrea, A.Cuzzocrea, AlfredoLo, DanLo, D.Rahman, AkondRahman, A.Wu, F. and Wu, Fan
(pp. 5369-5377)
 
Practitioner Perception of Vulnerability Discovery Strategies
Bhuiyan, F.A.Murphy, J.Morrison, P. and Rahman, A.
(pp. 41-44)
 
Security Bug Report Usage for Software Vulnerability Research: A Systematic Mapping Study
Bhuiyan, F.A.Sharif, M.B. and Rahman, A.
IEEE Access, vol. 9, pp. 28471-28495. | Journal Article
 
Shhh: 12 Practices for Secret Management in Infrastructure as Code
Rahman, A.Barsha, F.L. and Morrison, P.
(pp. 56-62)
 
’Under-reported’ Security Defects in Kubernetes Manifests
Bose, D.B.Rahman, A. and Shamim, S.I.
(pp. 9-12)
2020
A curated dataset of security defects in scientific software projects
Murphy, J.Brady, E.T.Shamim, S.I. and Rahman, A.
(pp. 112-113)
 
An Exploratory Characterization of Bugs in COVID-19 Software Projects
Rahman, A. and Farhana, E.
 
A preliminary taxonomy of techniques used in software fuzzing
Shakya, R. and Rahman, A.
(pp. 114-115)
 
A Vision to Mitigate Bioinformatics Software Development Challenges
Rahman, A. and Bhuiyan, F.A.
(pp. 57-60)
 
Can we use software bug reports to identify vulnerability discovery strategies?
Bhuiyan, F.A.Shakya, R. and Rahman, A.
(pp. 52-61)
 
Characterizing Co-located Insecure Coding Patterns in Infrastructure as Code Scripts
Bhuiyan, F.A. and Rahman, A.
(pp. 27-32)
 
Gang of eight: A defect taxonomy for infrastructure as code scripts
Rahman, A.Farhana, E.Parnin, C. and Williams, L.
(pp. 752-764)
 
Testing practices for infrastructure as code
Hasan, M.M.Bhuiyan, F.A. and Rahman, A.
(pp. 7-12)
 
The ?as code? activities: development anti-patterns for infrastructure as code
Rahman, A.Farhana, E. and Williams, L.
Empirical Software Engineering, vol. 25, pp. 3430-3467. | Journal Article
 
The ?as Code? Activities: Development anti-patterns for infrastructure as code
Rahman, A.Farhana, E. and Williams, L.
 
Vulnerability Discovery Strategies Used in Software Projects
Bhuiyan, F.A.Rahman, A. and Morrison, P.
(pp. 13-18)
 
XI Commandments of kubernetes security: A systematization of knowledge related to kubernetes security practices
Islam Shamim, M.S.Ahamed Bhuiyan, F. and Rahman, A.
(pp. 58-64)
 
XI Commandments of Kubernetes Security: A Systematization of Knowledge Related to Kubernetes Security Practices
Shamim, Md.S.I.Bhuiyan, F.A. and Rahman, A.