98 Publications (Page 4 of 4)
2018
Bugs in infrastructure as codeRahman, A.⋅Elder, S.⋅Shezan, F.H.⋅Frost, V.⋅Stallings, J. and Williams, L.
Characteristics of defective infrastructure as code scripts in DevOpsRahman, A.(pp. 476-479)
Characterizing Defective Configuration Scripts Used for Continuous DeploymentRahman, A. and Williams, L.(pp. 34-45)
Characterizing the influence of continuous integration: Empirical results from 250+ open source and proprietary projectsRahman, A.⋅Agrawal, A.⋅Krishna, R. and Sobran, A.(pp. 8-14)
Comprehension effort and programming activities: Related? or not related?Rahman, A.(pp. 66-69)
Poster: Defect prediction metrics for infrastructure as code scripts in DevOpsRahman, A.⋅Stallings, J. and Williams, L.(pp. 414-415)
Source code properties of defective infrastructure as code scriptsRahman, A. and Williams, L.
We don’t need another hero?: The impact of "heroes" on software developmentAgrawal, A.⋅Rahman, A.⋅Krishna, R.⋅Sobran, A. and Menzies, T.(pp. 245-253)
What is the connection between issues, bugs, and enhancements?: Lessons learned from 800+ software projectsKrishna, R.⋅Agrawal, A.⋅Rahman, A.⋅Sobran, A. and Menzies, T.(pp. 306-315)
What questions do programmers ask about configuration as code?Rahman, A.⋅Partho, A.⋅Morrison, P. and Williams, L.(pp. 16-22)
Where are the gaps? a systematic mapping study of infrastructure as code researchRahman, A.⋅Mahdavi-Hezaveh, R. and Williams, L.
2017
Characterizing scientific reporting in security literature: An analysis of ACM CCS and IEEE S&P papersBurcham, M.⋅Al-Zyoud, M.⋅Carver, J.C.⋅Alsaleh, M.⋅Du, H.⋅Gilani, F.⋅Jiang, J.⋅Rahman, A.⋅Kafali, Ö.⋅Al-Shaer, E. and Williams, L.(pp. 13-23)
Characterizing the influence of continuous integration: Empirical results from 250+ open source and proprietary projectsRahman, A.⋅Agrawal, A.⋅Krishna, R. and Sobran, A.
Predicting Android Application Security and Privacy Risk with Static Code MetricsRahman, A.⋅Pradhan, P.⋅Partho, A. and Williams, L.(pp. 149-153)
We don?t need another hero? The impact of ?Heroes? on software developmentAgrawal, A.⋅Rahman, A.⋅Krishna, R.⋅Sobran, A. and Menzies, T.
What is the connection between issues, bugs, and enhancements? (Lessons Learned from 800+ Software Projects)Krishna, R.⋅Agrawal, A.⋅Rahman, A.⋅Sobran, A. and Menzies, T.
Which Factors Influence Practitioners’ Usage of Build Automation ToolsRahman, A.⋅Partho, A.⋅Meder, D. and Williams, L.(pp. 20-26)
Software security in DevOps: Synthesizing practitioners’ perceptions and practicesRahman, A.A.U. and Williams, L.(pp. 70-76)
2015
Synthesizing Continuous Deployment Practices Used in Software DevelopmentRahman, A.A.U.⋅Helms, E.⋅Williams, L. and Parnin, C.(pp. 1-10)
2010
Energy-efficient multiple targets tracking using target kinematics in wireless sensor networksRahman, A.A.U.⋅Naznin, M. and Mollah, Md.A.I.(pp. 275-280)
Portable and secure multimedia data transfer in mobile phones using Record Management Store (RMS)Shahiduzzaman, M.M.⋅Naznin, M. and Ur Rahman, A.A.(pp. 364-367)
Service priority based target tracking frameworkUr Rahman, A.A.⋅Naznin, M. and Mollah, Md.A.I.(pp. 389-392)