116 Publications (Page 2 of 5)
2023
Come for syntax, stay for speed, understand defects: an empirical study of defects in Julia programs. Empirical Software Engineering
. | Journal Article
 
Dataset and Source Code for Paper: An Empirical Study of Insecure Coding Patterns in Julia Programs
 
Dataset and Source Code for the Paper Titled An Empirical Study of Task Infections in Ansible Manifests
 
Dataset - Defects in Ansible Infrastructure Orchestrator
 
Dataset for Paper - An Empirical Study of Bugs in Julia Programs
 
Detecting and Characterizing Propagation of Security Weaknesses in Puppet-based infrastructure Management. IEEE Transactions on Software Engineering
. | Journal Article
 
Log-related Coding Patterns to Conduct Postmortems of Attacks in Supervised Learning-based Projects. ACM Transactions on Privacy and Security
. | Journal Article
 
Practitioner Perceptions of Ansible Test Smells
Zhang, Y.Wu, F. and Rahman, A.
(pp. 325-327)
 
Quality Assurance for Infrastructure Orchestrators: Emerging Results from Ansible
Zhang, Y.Rahman, M.Wu, F. and Rahman, A.
(pp. 322-324)
 
Security Misconfigurations in Open Source Kubernetes Manifests: An Empirical Study. ACM Transactions on Software Engineering and Methodology
. | Journal Article
 
Software Supply Chain Vulnerabilities Detection in Source Code: Performance Comparison between Traditional and Quantum Machine Learning Algorithms
Akter, M.S.Faruk, Md.J.H.Anjum, N.Masum, M.Shahriar, H.Rahman, A.Wu, F. and Cuzzocrea, A.
 
Survey - Ansible Test Smell
 
TaintPup
 
Teaching DevOps Security Education with Hands-on Labware: Automated Detection of Security Weakness in Python
Akter, M.S.Rodriguez-Cardenas, J.Rahman, M.M.Shahriar, H. and Wu, F.
2022
A Novel Machine Learning Based Framework for Bridge Condition Analysis
Masum, M.Anjum, N.Hossain Faruk, M.J.Shahriar, H.Sakib, N.Valero, M.Karim, M.A.Rahman, A.Wu, F. and Cuzzocrea, A.
(pp. 5530-5535)
 
As Code Testing: Characterizing Test Quality in Open Source Ansible Development
Hassan, M.M. and Rahman, A.
(pp. 208-219)
 
Benefits, Challenges, and Research Topics: A Multi-vocal Literature Review of Kubernetes
Shamim, S.I.Gibson, J.A.Morrison, P. and Rahman, A.
 
Bie Vote: A Biometric Identification Enabled Blockchain-Based Secure and Transparent Voting Framework
Faruk, M.J.H.Islam, M.Alam, F.Shahriar, H. and Rahman, A.
(pp. 253-258)
 
Can We use Authentic Learning to Educate Students about Secure Infrastructure as Code Development?
Rahman, A.Shamim, S.I.Shahriar, H. and Wu, F.
(pp. 631)
 
Detecting and Characterizing Propagation of Security Weaknesses in Puppet-based Infrastructure Management
Rahman, A. and Parnin, C.
 
Development of Blockchain-based e-Voting System: Requirements, Design and Security Perspective
Faruk, M.J.H.Saha, B.Islam, M.Alam, F.Shahriar, H.Valero, M.Rahman, A.Wu, F. and Alam, Z.
(pp. 959-967)
 
Empirical Study of Security Misconfigurations in Kubernetes Manifests
 
Evolution of Quantum Computing: A Systematic Survey on the Use of Quantum Computing Tools
Upama, P.B.Faruk, M.J.H.Nazim, M.Masum, M.Shahriar, H.Uddin, G.Barzanjeh, S.Ahamed, S.I. and Rahman, A.
(pp. 520-529)
 
Evolution of Quantum Computing: A Systematic Survey on the Use of Quantum Computing Tools
Upama, P.B.Faruk, J.H.Nazim, M.Masum, M.Shahriar, H.Uddin, G.Barzanjeh, S.Ahamed, S.I. and Rahman, A.
 
Investigating Novel Approaches to Defend Software Supply Chain Attacks
Hossain Faruk, M.J.Tasnim, M.Shahriar, H.Valero, M.Rahman, A. and Wu, F.
(pp. 283-288)