30 Publications (Page 1 of 2)
2024
A Survey on Software Vulnerability Exploitability Assessment. ACM Computing Surveys
. | Journal Article
ChronoCTI: Mining Knowledge Graph of Temporal Relations among Cyberattack Actions
2023
Attackers reveal their arsenal: An investigation of adversarial techniques in CTI reportsRahman, Md Rayhanur⋅Basak, Setu Kumar⋅Hezaveh, Rezvan Mahdavi and Williams, Laurie.
| Journal Article
Mining Temporal Attack Patterns from Cyberthreat Intelligence ReportsRahman, Md Rayhanur⋅Wroblewski, Brandon⋅Matthews, Quinn⋅Morgan, Brantley⋅Menzies, Tim and Williams, Laurie.
| Journal Article
What Are the Attackers Doing Now? Automating Cyberthreat Intelligence Extraction from Text on Pace with the Changing Threat Landscape: A Survey. ACM Computing Surveys
. | Journal Article
2022
An investigation of security controls and MITRE ATT&CK techniquesRahman, Md R. and Williams, L.
From Threat Reports to Continuous Threat Intelligence: A Comparison of Attack Technique Extraction Methods from Textual ArtifactsRahman, Md.R. and Williams, L.
Investigating co-occurrences of MITRE ATT&CK TechniquesRahman, Md R. and Williams, L.
Why secret detection tools are not enough: It?s not just about false positives - An industrial case studyRahman, M.R.⋅Imtiaz, N.⋅Storey, M.-A. and Williams, L.Empirical Software Engineering, vol. 27.
| Journal Article
2021
Security Smells in Ansible and Chef Scripts. A Replication Study
Parnin, C. and Williams, L.
. | Journal Article
What are the attackers doing now? Automating cyberthreat intelligence extraction from text on pace with the changing threat landscape: A surveyRahman, M.R.⋅Mahdavi-Hezaveh, R. and Williams, L.
2020
A Literature Review on Mining Cyberthreat Intelligence from Unstructured TextsRahman, M.R.⋅Mahdavi-Hezaveh, R. and Williams, L.(pp. 516-525)
Do configuration management tools make systems more secure?: An empirical research planRahman, M.R.⋅Enck, W. and Williams, L.(pp. 131-132)
2019
Inferring bug patterns for detecting bugs in javascript by analyzing abstract syntax treeTasnim, A. and Rahman, M.R.(pp. 503-507)
Security and performance bug reports identification with class-imbalance sampling and feature selectionDas, D.C. and Rahman, M.R.(pp. 316-321)
2018
MMRUC3: A recommendation approach of move method refactoring using coupling, cohesion, and contextual similarity to enhance software designRahman, M.M.⋅Riyadh, R.R.⋅Khaled, S.M. and Satter, A.Software - Practice and Experience, vol. 48, pp. 1560-1587.
| Journal Article
Mobicomonkey: Context testing of Android appsAmi, A.S.⋅Hasan, M.M.⋅Rahman, M.R. and Sakib, K.(pp. 76-79)
MobiCoMonkey - Context testing of android appsAmi, A.S.⋅Hasan, M.M.⋅Rahman, M.R. and Sakib, K.
2017
A scalable resource provisioning scheme for the cloud using peer to peer resource discovery and multi-attribute utility theoryRahman, Md.R. and Sakib, K.International Journal of Cloud Computing, vol. 6, pp. 211-237.
| Journal Article
DTCTH: a discriminative local pattern descriptor for image classificationRahman, M.M.⋅Hossain, B.M.M. and Shoyaib, M.Eurasip Journal on Image and Video Processing, vol. 2017.
| Journal Article
Recommendation of move method refactorings using coupling, cohesion and contextual similarityRahman, M.M. and Riyadh, R.R.
2016
A proactive approach for context-aware self-adaptive mobile applications to ensure Quality of ServiceShafiuzzaman, M.⋅Nahar, N. and Rahman, M.R.(pp. 544-549)
Characterization and localization of performance-bugs using Naive Bayes approachSujon, M.⋅Shafiuzzaman, M. and Rahman, M.M.(pp. 791-796)
2014
A formal approach to verify software scalability requirements using set theory and Hoare tripleGias, A.U.⋅Tabassum, M.R.⋅Ami, A.S.⋅Imran, A.⋅Ibrahim, M.⋅Rahman, R. and Sakib, K.(pp. 7-12)