30 Publications (Page 1 of 2)
2024
A Survey on Software Vulnerability Exploitability Assessment. ACM Computing Surveys
. | Journal Article
 
ChronoCTI: Mining Knowledge Graph of Temporal Relations among Cyberattack Actions
2023
Attackers reveal their arsenal: An investigation of adversarial techniques in CTI reports
Rahman, Md RayhanurBasak, Setu KumarHezaveh, Rezvan Mahdavi and Williams, Laurie
. | Journal Article
 
Mining Temporal Attack Patterns from Cyberthreat Intelligence Reports
Rahman, Md RayhanurWroblewski, BrandonMatthews, QuinnMorgan, BrantleyMenzies, Tim and Williams, Laurie
. | Journal Article
 
What Are the Attackers Doing Now? Automating Cyberthreat Intelligence Extraction from Text on Pace with the Changing Threat Landscape: A Survey. ACM Computing Surveys
. | Journal Article
2022
An investigation of security controls and MITRE ATT&CK techniques
Rahman, Md R. and Williams, L.
 
From Threat Reports to Continuous Threat Intelligence: A Comparison of Attack Technique Extraction Methods from Textual Artifacts
Rahman, Md.R. and Williams, L.
 
Investigating co-occurrences of MITRE ATT&CK Techniques
Rahman, Md R. and Williams, L.
 
Why secret detection tools are not enough: It?s not just about false positives - An industrial case study
Rahman, M.R.Imtiaz, N.Storey, M.-A. and Williams, L.
Empirical Software Engineering, vol. 27. | Journal Article
2021
Security Smells in Ansible and Chef Scripts. A Replication Study
Parnin, C. and Williams, L.
. | Journal Article
 
What are the attackers doing now? Automating cyberthreat intelligence extraction from text on pace with the changing threat landscape: A survey
Rahman, M.R.Mahdavi-Hezaveh, R. and Williams, L.
2020
A Literature Review on Mining Cyberthreat Intelligence from Unstructured Texts
Rahman, M.R.Mahdavi-Hezaveh, R. and Williams, L.
(pp. 516-525)
 
Do configuration management tools make systems more secure?: An empirical research plan
Rahman, M.R.Enck, W. and Williams, L.
(pp. 131-132)
2019
Inferring bug patterns for detecting bugs in javascript by analyzing abstract syntax tree
Tasnim, A. and Rahman, M.R.
(pp. 503-507)
 
Security and performance bug reports identification with class-imbalance sampling and feature selection
Das, D.C. and Rahman, M.R.
(pp. 316-321)
 
Share, but be Aware: Security Smells in Python Gists
Rahman, M.R.Rahman, A. and Williams, L.
(pp. 536-540)
2018
MMRUC3: A recommendation approach of move method refactoring using coupling, cohesion, and contextual similarity to enhance software design
Rahman, M.M.Riyadh, R.R.Khaled, S.M. and Satter, A.
Software - Practice and Experience, vol. 48, pp. 1560-1587. | Journal Article
 
Mobicomonkey: Context testing of Android apps
Ami, A.S.Hasan, M.M.Rahman, M.R. and Sakib, K.
(pp. 76-79)
 
MobiCoMonkey - Context testing of android apps
Ami, A.S.Hasan, M.M.Rahman, M.R. and Sakib, K.
2017
A scalable resource provisioning scheme for the cloud using peer to peer resource discovery and multi-attribute utility theory
Rahman, Md.R. and Sakib, K.
International Journal of Cloud Computing, vol. 6, pp. 211-237. | Journal Article
 
DTCTH: a discriminative local pattern descriptor for image classification
Rahman, M.M.Hossain, B.M.M. and Shoyaib, M.
Eurasip Journal on Image and Video Processing, vol. 2017. | Journal Article
 
Recommendation of move method refactorings using coupling, cohesion and contextual similarity
Rahman, M.M. and Riyadh, R.R.
2016
A proactive approach for context-aware self-adaptive mobile applications to ensure Quality of Service
Shafiuzzaman, M.Nahar, N. and Rahman, M.R.
(pp. 544-549)
 
Characterization and localization of performance-bugs using Naive Bayes approach
Sujon, M.Shafiuzzaman, M. and Rahman, M.M.
(pp. 791-796)
2014
A formal approach to verify software scalability requirements using set theory and Hoare triple
Gias, A.U.Tabassum, M.R.Ami, A.S.Imran, A.Ibrahim, M.Rahman, R. and Sakib, K.
(pp. 7-12)