98 Publications (Page 3 of 4)
2020
A curated dataset of security defects in scientific software projects
Murphy, J.Brady, E.T.Shamim, S.I. and Rahman, A.
(pp. 112-113)
 
An Exploratory Characterization of Bugs in COVID-19 Software Projects
Rahman, A. and Farhana, E.
 
A preliminary taxonomy of techniques used in software fuzzing
Shakya, R. and Rahman, A.
(pp. 114-115)
 
A Vision to Mitigate Bioinformatics Software Development Challenges
Rahman, A. and Bhuiyan, F.A.
(pp. 57-60)
 
Can we use software bug reports to identify vulnerability discovery strategies?
Bhuiyan, F.A.Shakya, R. and Rahman, A.
(pp. 52-61)
 
Characterizing Co-located Insecure Coding Patterns in Infrastructure as Code Scripts
Bhuiyan, F.A. and Rahman, A.
(pp. 27-32)
 
Gang of eight: A defect taxonomy for infrastructure as code scripts
Rahman, A.Farhana, E.Parnin, C. and Williams, L.
(pp. 752-764)
 
Testing practices for infrastructure as code
Hasan, M.M.Bhuiyan, F.A. and Rahman, A.
(pp. 7-12)
 
The ?as code? activities: development anti-patterns for infrastructure as code
Rahman, A.Farhana, E. and Williams, L.
Empirical Software Engineering, vol. 25, pp. 3430-3467. | Journal Article
 
The ?as Code? Activities: Development anti-patterns for infrastructure as code
Rahman, A.Farhana, E. and Williams, L.
 
Vulnerability Discovery Strategies Used in Software Projects
Bhuiyan, F.A.Rahman, A. and Morrison, P.
(pp. 13-18)
 
XI Commandments of kubernetes security: A systematization of knowledge related to kubernetes security practices
Islam Shamim, M.S.Ahamed Bhuiyan, F. and Rahman, A.
(pp. 58-64)
 
XI Commandments of Kubernetes Security: A Systematization of Knowledge Related to Kubernetes Security Practices
Shamim, Md.S.I.Bhuiyan, F.A. and Rahman, A.
2019
A bird’s eye view of knowledge needs related to penetration testing
Rahman, A. and Williams, L.
 
A systematic mapping study of infrastructure as code research
Rahman, A.Mahdavi-Hezaveh, R. and Williams, L.
Information and Software Technology, vol. 108, pp. 65-77. | Journal Article
 
Blockchain enabled AI marketplace: The price you pay for trust
Sarpatwar, K.Ganapavarapu, V.S.Shanmugam, K.Rahman, A. and Vaculin, R.
(pp. 2857-2866)
 
Challenges with responding to static analysis tool alerts
Imtiaz, N.Rahman, A.Farhana, E. and Williams, L.
(pp. 245-249)
 
Characterizing Attacker Behavior in a Cybersecurity Penetration Testing Competition
Munaiah, N.Rahman, A.Pelletier, J.Williams, L. and Meneely, A.
 
Security Smells in Infrastructure as Code Scripts
Rahman, A.Rayhanur Rahman, Md.Parnin, C. and Williams, L.
 
Share, but be Aware: Security Smells in Python Gists
Rahman, M.R.Rahman, A. and Williams, L.
(pp. 536-540)
 
Snakes in Paradise?: Insecure python-related coding practices in stack overflow
Rahman, A.Farhana, E. and Imtiaz, N.
(pp. 200-204)
 
Source code properties of defective infrastructure as code scripts
Rahman, A. and Williams, L.
Information and Software Technology, vol. 112, pp. 148-163. | Journal Article
 
Synthesizing Program Execution Time Discrepancies in Julia Used for Scientific Software
Farhana, E.Imtiaz, N. and Rahman, A.
(pp. 496-500)
 
The Seven Sins: Security Smells in Infrastructure as Code Scripts
Rahman, A.Parnin, C. and Williams, L.
(pp. 164-175)
2018
Anti-Patterns in Infrastructure as Code
Rahman, A.
(pp. 434-435)