116 Publications (Page 4 of 5)
2020
Testing practices for infrastructure as codeHasan, M.M.⋅Bhuiyan, F.A. and Rahman, A.(pp. 7-12)
The ?as code? activities: development anti-patterns for infrastructure as code
Rahman, A.⋅Farhana, E. and Williams, L.
Empirical Software Engineering, vol. 25, pp. 3430-3467. | Journal Article
The ?as Code? Activities: Development anti-patterns for infrastructure as codeRahman, A.⋅Farhana, E. and Williams, L.
Vulnerability Discovery Strategies Used in Software ProjectsBhuiyan, F.A.⋅Rahman, A. and Morrison, P.(pp. 13-18)
XI Commandments of kubernetes security: A systematization of knowledge related to kubernetes security practicesIslam Shamim, M.S.⋅Ahamed Bhuiyan, F. and Rahman, A.(pp. 58-64)
XI Commandments of Kubernetes Security: A Systematization of Knowledge Related to Kubernetes Security PracticesShamim, Md.S.I.⋅Bhuiyan, F.A. and Rahman, A.
2019
A bird’s eye view of knowledge needs related to penetration testingRahman, A. and Williams, L.
A systematic mapping study of infrastructure as code research
Rahman, A.⋅Mahdavi-Hezaveh, R. and Williams, L.
Information and Software Technology, vol. 108, pp. 65-77. | Journal Article
Blockchain enabled AI marketplace: The price you pay for trustSarpatwar, K.⋅Ganapavarapu, V.S.⋅Shanmugam, K.⋅Rahman, A. and Vaculin, R.(pp. 2857-2866)
Challenges with responding to static analysis tool alertsImtiaz, N.⋅Rahman, A.⋅Farhana, E. and Williams, L.(pp. 245-249)
Characterizing Attacker Behavior in a Cybersecurity Penetration Testing CompetitionMunaiah, N.⋅Rahman, A.⋅Pelletier, J.⋅Williams, L. and Meneely, A.
Security Smells in Infrastructure as Code ScriptsRahman, A.⋅Rayhanur Rahman, Md.⋅Parnin, C. and Williams, L.
Share, but be Aware: Security Smells in Python GistsRahman, M.R.⋅Rahman, A. and Williams, L.(pp. 536-540)
Snakes in Paradise?: Insecure python-related coding practices in stack overflowRahman, A.⋅Farhana, E. and Imtiaz, N.(pp. 200-204)
Source code properties of defective infrastructure as code scripts
Rahman, A. and Williams, L.
Information and Software Technology, vol. 112, pp. 148-163. | Journal Article
Synthesizing Program Execution Time Discrepancies in Julia Used for Scientific SoftwareFarhana, E.⋅Imtiaz, N. and Rahman, A.(pp. 496-500)
The Seven Sins: Security Smells in Infrastructure as Code ScriptsRahman, A.⋅Parnin, C. and Williams, L.(pp. 164-175)
2018
Anti-Patterns in Infrastructure as CodeRahman, A.(pp. 434-435)
Bugs in infrastructure as codeRahman, A.⋅Elder, S.⋅Shezan, F.H.⋅Frost, V.⋅Stallings, J. and Williams, L.
Characteristics of defective infrastructure as code scripts in DevOpsRahman, A.(pp. 476-479)
Characterizing Defective Configuration Scripts Used for Continuous DeploymentRahman, A. and Williams, L.(pp. 34-45)
Characterizing the influence of continuous integration: Empirical results from 250+ open source and proprietary projectsRahman, A.⋅Agrawal, A.⋅Krishna, R. and Sobran, A.(pp. 8-14)
Comprehension effort and programming activities: Related? or not related?Rahman, A.(pp. 66-69)
Poster: Defect prediction metrics for infrastructure as code scripts in DevOpsRahman, A.⋅Stallings, J. and Williams, L.(pp. 414-415)
Source code properties of defective infrastructure as code scriptsRahman, A. and Williams, L.