98 Publications (Page 3 of 4)
2020
A curated dataset of security defects in scientific software projectsMurphy, J.⋅Brady, E.T.⋅Shamim, S.I. and Rahman, A.(pp. 112-113)
An Exploratory Characterization of Bugs in COVID-19 Software ProjectsRahman, A. and Farhana, E.
A preliminary taxonomy of techniques used in software fuzzingShakya, R. and Rahman, A.(pp. 114-115)
A Vision to Mitigate Bioinformatics Software Development ChallengesRahman, A. and Bhuiyan, F.A.(pp. 57-60)
Can we use software bug reports to identify vulnerability discovery strategies?Bhuiyan, F.A.⋅Shakya, R. and Rahman, A.(pp. 52-61)
Characterizing Co-located Insecure Coding Patterns in Infrastructure as Code ScriptsBhuiyan, F.A. and Rahman, A.(pp. 27-32)
Gang of eight: A defect taxonomy for infrastructure as code scriptsRahman, A.⋅Farhana, E.⋅Parnin, C. and Williams, L.(pp. 752-764)
Testing practices for infrastructure as codeHasan, M.M.⋅Bhuiyan, F.A. and Rahman, A.(pp. 7-12)
The ?as code? activities: development anti-patterns for infrastructure as codeRahman, A.⋅Farhana, E. and Williams, L.Empirical Software Engineering, vol. 25, pp. 3430-3467.
| Journal Article
The ?as Code? Activities: Development anti-patterns for infrastructure as codeRahman, A.⋅Farhana, E. and Williams, L.
Vulnerability Discovery Strategies Used in Software ProjectsBhuiyan, F.A.⋅Rahman, A. and Morrison, P.(pp. 13-18)
XI Commandments of kubernetes security: A systematization of knowledge related to kubernetes security practicesIslam Shamim, M.S.⋅Ahamed Bhuiyan, F. and Rahman, A.(pp. 58-64)
XI Commandments of Kubernetes Security: A Systematization of Knowledge Related to Kubernetes Security PracticesShamim, Md.S.I.⋅Bhuiyan, F.A. and Rahman, A.
2019
A bird’s eye view of knowledge needs related to penetration testingRahman, A. and Williams, L.
A systematic mapping study of infrastructure as code researchRahman, A.⋅Mahdavi-Hezaveh, R. and Williams, L.Information and Software Technology, vol. 108, pp. 65-77.
| Journal Article
Blockchain enabled AI marketplace: The price you pay for trustSarpatwar, K.⋅Ganapavarapu, V.S.⋅Shanmugam, K.⋅Rahman, A. and Vaculin, R.(pp. 2857-2866)
Challenges with responding to static analysis tool alertsImtiaz, N.⋅Rahman, A.⋅Farhana, E. and Williams, L.(pp. 245-249)
Characterizing Attacker Behavior in a Cybersecurity Penetration Testing CompetitionMunaiah, N.⋅Rahman, A.⋅Pelletier, J.⋅Williams, L. and Meneely, A.
Security Smells in Infrastructure as Code ScriptsRahman, A.⋅Rayhanur Rahman, Md.⋅Parnin, C. and Williams, L.
Share, but be Aware: Security Smells in Python GistsRahman, M.R.⋅Rahman, A. and Williams, L.(pp. 536-540)
Snakes in Paradise?: Insecure python-related coding practices in stack overflowRahman, A.⋅Farhana, E. and Imtiaz, N.(pp. 200-204)
Source code properties of defective infrastructure as code scriptsRahman, A. and Williams, L.Information and Software Technology, vol. 112, pp. 148-163.
| Journal Article
Synthesizing Program Execution Time Discrepancies in Julia Used for Scientific SoftwareFarhana, E.⋅Imtiaz, N. and Rahman, A.(pp. 496-500)
The Seven Sins: Security Smells in Infrastructure as Code ScriptsRahman, A.⋅Parnin, C. and Williams, L.(pp. 164-175)
2018
Anti-Patterns in Infrastructure as CodeRahman, A.(pp. 434-435)