116 Publications (Page 3 of 5)
2022
Lessons from Research to Practice on Writing Better Quality Puppet ScriptsRahman, A. and Sharma, T.(pp. 63-67)
Malware Detection and Prevention using Artificial Intelligence TechniquesFaruk, M.J.H.⋅Shahriar, H.⋅Valero, M.⋅Barsha, F.L.⋅Sobhan, S.⋅Khan, M.A.⋅Whitman, M.⋅Cuzzocrea, A.⋅Lo, D.⋅Rahman, A. and Wu, F.
Quantum Machine Learning for Software Supply Chain Attacks: How Far Can We Go?Masum, M.⋅Nazim, M.⋅Jobair Hossain Faruk, Md.⋅Shahriar, H.⋅Valero, M.⋅Abdullah Hafiz Khan, Md.⋅Uddin, G.⋅Barzanjeh, S.⋅Saglamyurek, E.⋅Rahman, A. and Ahamed, S.I.
Quantum Machine Learning for Software Supply Chain Attacks: How Far Can We Go?Masum, M.⋅Nazim, M.⋅Faruk, M.J.H.⋅Shahriar, H.⋅Valero, M.⋅Khan, M.A.H.⋅Uddin, G.⋅Barzanjeh, S.⋅Saglamyurek, E.⋅Rahman, A. and Ahamed, S.I.(pp. 530-538)
Shifting Left for Machine Learning: An Empirical Study of Security Weaknesses in Supervised Learning-based ProjectsBhuiyan, F.A.⋅Prowell, S.⋅Shahriar, H.⋅Wu, F. and Rahman, A.(pp. 798-808)
Software Supply Chain Vulnerabilities Detection in Source Code: Performance Comparison between Traditional and Quantum Machine Learning AlgorithmsAkter, M.S.⋅Faruk, M.J.H.⋅Anjum, N.⋅Masum, M.⋅Shahriar, H.⋅Sakib, N.⋅Rahman, A.⋅Wu, F. and Cuzzocrea, A.(pp. 5639-5645)
Towards Automation for MLOps: An Exploratory Study of Bot Usage in Deep Learning LibrariesRahman, A.⋅Bhuiyan, F.A.⋅Hassan, M.M.⋅Shahriar, H. and Wu, F.(pp. 1093-1097)
Vision for a Secure Elixir Ecosys tem: An Empirical Study of Vulnerabilities in Elixir ProgramsBose, D.B.⋅Cottrell, K. and Rahman, A.(pp. 215-218)
What questions do developers ask about Julia?Bose, D.B.⋅Gannod, G.C.⋅Rahman, A. and Cottrell, K.(pp. 224-228)
2021
An empirical study of vulnerabilities in roboticsCottrell, K.⋅Bose, D.B.⋅Shahriar, H. and Rahman, A.(pp. 735-744)
Different Kind of Smells: Security Smells in Infrastructure as Code Scripts
Rahman, A. and Williams, L.
IEEE Security and Privacy, vol. 19, pp. 33-41. | Journal Article
Exercise Perceptions: Experience Report from a Secure Software Development Course
How Do Students Feel about Automated Security Static Analysis Exercises?Rahman, A.⋅Shahriar, H. and Bose, D.B.
Malware Detection and Prevention using Artificial Intelligence TechniquesHossain Faruk, M.J.⋅Faruk, Md Jobair Hossain⋅Shahriar, H.⋅Shahriar, Hossain⋅Valero, M.⋅Valero, Maria⋅Barsha, Farhat Lamia⋅Barsha, F.L.⋅Sobhan, Shahriar⋅Sobhan, S.⋅Khan, Md Abdullah⋅Khan, M.A.⋅Whitman, M.⋅Whitman, Michael⋅Cuzzocrea, A.⋅Cuzzocrea, Alfredo⋅Lo, Dan⋅Lo, D.⋅Rahman, Akond⋅Rahman, A.⋅Wu, F. and Wu, Fan(pp. 5369-5377)
Practitioner Perception of Vulnerability Discovery StrategiesBhuiyan, F.A.⋅Murphy, J.⋅Morrison, P. and Rahman, A.(pp. 41-44)
Security Bug Report Usage for Software Vulnerability Research: A Systematic Mapping Study
Bhuiyan, F.A.⋅Sharif, M.B. and Rahman, A.
IEEE Access, vol. 9, pp. 28471-28495. | Journal Article
Shhh: 12 Practices for Secret Management in Infrastructure as CodeRahman, A.⋅Barsha, F.L. and Morrison, P.(pp. 56-62)
’Under-reported’ Security Defects in Kubernetes ManifestsBose, D.B.⋅Rahman, A. and Shamim, S.I.(pp. 9-12)
2020
A curated dataset of security defects in scientific software projectsMurphy, J.⋅Brady, E.T.⋅Shamim, S.I. and Rahman, A.(pp. 112-113)
An Exploratory Characterization of Bugs in COVID-19 Software ProjectsRahman, A. and Farhana, E.
A preliminary taxonomy of techniques used in software fuzzingShakya, R. and Rahman, A.(pp. 114-115)
A Vision to Mitigate Bioinformatics Software Development ChallengesRahman, A. and Bhuiyan, F.A.(pp. 57-60)
Can we use software bug reports to identify vulnerability discovery strategies?Bhuiyan, F.A.⋅Shakya, R. and Rahman, A.(pp. 52-61)
Characterizing Co-located Insecure Coding Patterns in Infrastructure as Code ScriptsBhuiyan, F.A. and Rahman, A.(pp. 27-32)
Gang of eight: A defect taxonomy for infrastructure as code scriptsRahman, A.⋅Farhana, E.⋅Parnin, C. and Williams, L.(pp. 752-764)