107 Publications (Page 3 of 5)
2021
An empirical study of vulnerabilities in roboticsCottrell, K.⋅Bose, D.B.⋅Shahriar, H. and Rahman, A.(pp. 735-744)
Different Kind of Smells: Security Smells in Infrastructure as Code Scripts
Rahman, A. and Williams, L.
IEEE Security and Privacy, vol. 19, pp. 33-41. | Journal Article
Exercise Perceptions: Experience Report from a Secure Software Development Course
How Do Students Feel about Automated Security Static Analysis Exercises?Rahman, A.⋅Shahriar, H. and Bose, D.B.
Malware Detection and Prevention using Artificial Intelligence TechniquesHossain Faruk, M.J.⋅Faruk, Md Jobair Hossain⋅Shahriar, H.⋅Shahriar, Hossain⋅Valero, M.⋅Valero, Maria⋅Barsha, Farhat Lamia⋅Barsha, F.L.⋅Sobhan, Shahriar⋅Sobhan, S.⋅Khan, Md Abdullah⋅Khan, M.A.⋅Whitman, M.⋅Whitman, Michael⋅Cuzzocrea, A.⋅Cuzzocrea, Alfredo⋅Lo, Dan⋅Lo, D.⋅Rahman, Akond⋅Rahman, A.⋅Wu, F. and Wu, Fan(pp. 5369-5377)
Practitioner Perception of Vulnerability Discovery StrategiesBhuiyan, F.A.⋅Murphy, J.⋅Morrison, P. and Rahman, A.(pp. 41-44)
Security Bug Report Usage for Software Vulnerability Research: A Systematic Mapping Study
Bhuiyan, F.A.⋅Sharif, M.B. and Rahman, A.
IEEE Access, vol. 9, pp. 28471-28495. | Journal Article
Shhh: 12 Practices for Secret Management in Infrastructure as CodeRahman, A.⋅Barsha, F.L. and Morrison, P.(pp. 56-62)
’Under-reported’ Security Defects in Kubernetes ManifestsBose, D.B.⋅Rahman, A. and Shamim, S.I.(pp. 9-12)
2020
A curated dataset of security defects in scientific software projectsMurphy, J.⋅Brady, E.T.⋅Shamim, S.I. and Rahman, A.(pp. 112-113)
An Exploratory Characterization of Bugs in COVID-19 Software ProjectsRahman, A. and Farhana, E.
A preliminary taxonomy of techniques used in software fuzzingShakya, R. and Rahman, A.(pp. 114-115)
A Vision to Mitigate Bioinformatics Software Development ChallengesRahman, A. and Bhuiyan, F.A.(pp. 57-60)
Can we use software bug reports to identify vulnerability discovery strategies?Bhuiyan, F.A.⋅Shakya, R. and Rahman, A.(pp. 52-61)
Characterizing Co-located Insecure Coding Patterns in Infrastructure as Code ScriptsBhuiyan, F.A. and Rahman, A.(pp. 27-32)
Gang of eight: A defect taxonomy for infrastructure as code scriptsRahman, A.⋅Farhana, E.⋅Parnin, C. and Williams, L.(pp. 752-764)
Testing practices for infrastructure as codeHasan, M.M.⋅Bhuiyan, F.A. and Rahman, A.(pp. 7-12)
The ?as code? activities: development anti-patterns for infrastructure as code
Rahman, A.⋅Farhana, E. and Williams, L.
Empirical Software Engineering, vol. 25, pp. 3430-3467. | Journal Article
The ?as Code? Activities: Development anti-patterns for infrastructure as codeRahman, A.⋅Farhana, E. and Williams, L.
Vulnerability Discovery Strategies Used in Software ProjectsBhuiyan, F.A.⋅Rahman, A. and Morrison, P.(pp. 13-18)
XI Commandments of kubernetes security: A systematization of knowledge related to kubernetes security practicesIslam Shamim, M.S.⋅Ahamed Bhuiyan, F. and Rahman, A.(pp. 58-64)
XI Commandments of Kubernetes Security: A Systematization of Knowledge Related to Kubernetes Security PracticesShamim, Md.S.I.⋅Bhuiyan, F.A. and Rahman, A.
2019
A bird’s eye view of knowledge needs related to penetration testingRahman, A. and Williams, L.
A systematic mapping study of infrastructure as code research
Rahman, A.⋅Mahdavi-Hezaveh, R. and Williams, L.
Information and Software Technology, vol. 108, pp. 65-77. | Journal Article
Blockchain enabled AI marketplace: The price you pay for trustSarpatwar, K.⋅Ganapavarapu, V.S.⋅Shanmugam, K.⋅Rahman, A. and Vaculin, R.(pp. 2857-2866)