41 Publications (Page 1 of 2)
2026
AgenticCyOps: Securing Multi-Agentic AI Integration in Enterprise Cyber Operations
Mitra, Shaswata⋅Patel, Raj⋅Mittal, Sudip⋅Rahman, Md Rayhanur and Rahimi, Shahram
arXiv preprint arXiv:2603.09134. | Journal Article
Mind the Gap: Evaluating LLMs for High-Level Malicious Package Detection vs. Fine-Grained Indicator Identification
Ryan, Ahmed⋅Khalil, Ibrahim⋅Jahid, Abdullah Al⋅Erfan, Md and Rahman, Akond Ashfaque Ur
arXiv preprint arXiv:2602.16304. | Journal Article
2025
FALCON: Autonomous Cyber Threat Intelligence Mining with LLMs for IDS Rule Generation
Mitra, Shaswata⋅Bazarov, Azim⋅Duclos, Martin⋅Mittal, Sudip⋅Piplai, Aritran⋅Rahman, Md Rayhanur⋅Zieglar, Edward and Rahimi, Shahram
arXiv preprint arXiv:2508.18684. | Journal Article
If you cannot Measure it, you cannot Secure it. A Case Study on Metrics for Informed Choice of Security Controls. Journal of Information Security and Applications
. | Journal Article
Relative Positioning Based Code Chunking Method For Rich Context Retrieval In Repository Level Code Completion Task With Code Language ModelRahman, Imranur(pp. 379–382)
Security Vulnerabilities in Software Supply Chain for Autonomous Vehicles
Wasiul Haque, Md⋅Erfan, Md⋅Dasgupta, Sagar⋅Rayhanur Rahman, Md and Rahman, Mizanur
arXiv e-prints, pp. arXiv–2509. | Journal Article
Security Vulnerabilities in Software Supply Chain for Autonomous Vehicles
Haque, Md Wasiul⋅Erfan, Md⋅Dasgupta, Sagar and Rahman, Md Rayhanur
arXiv preprint arXiv:2509.16899. | Journal Article
SoK: An empirical investigation of malware techniques in advanced persistent threat attacks. Computers & Security
. | Journal Article
Unveiling Malicious Logic: Towards a Statement-Level Taxonomy and Dataset for Securing Python Packages
Ryan, Ahmed⋅Ifti, Junaid Mansur⋅Erfan, Md and Rahman, Akond Ashfaque Ur
arXiv preprint arXiv:2512.12559. | Journal Article
2024
ACSAC 2024 Security Control Challenges Taxonomy
A Survey on Software Vulnerability Exploitability Assessment. ACM Computing Surveys
. | Journal Article
ChronoCTI: Mining Knowledge Graph of Temporal Relations among Cyberattack Actions
2023
Attackers reveal their arsenal: An investigation of adversarial techniques in CTI reports
Rahman, Md Rayhanur⋅Basak, Setu Kumar⋅Hezaveh, Rezvan Mahdavi and Williams, Laurie
. | Journal Article
Mining Temporal Attack Patterns from Cyberthreat Intelligence Reports
Rahman, Md Rayhanur⋅Wroblewski, Brandon⋅Matthews, Quinn⋅Morgan, Brantley⋅Menzies, Tim and Williams, Laurie
. | Journal Article
What Are the Attackers Doing Now? Automating Cyberthreat Intelligence Extraction from Text on Pace with the Changing Threat Landscape: A Survey. ACM Computing Surveys
. | Journal Article
2022
An investigation of security controls and MITRE ATT&CK techniquesRahman, MdR. and Williams, L.
From Threat Reports to Continuous Threat Intelligence: A Comparison of Attack Technique Extraction Methods from Textual ArtifactsRahman, Md.R. and Williams, L.
From Threat Reports to Continuous Threat Intelligence: A Comparison of Attack Technique Extraction Methods from Textual Artifacts. ArXiv
. | Journal Article
Investigating co-occurrences of MITRE ATT&CK TechniquesRahman, MdR. and Williams, L.
Why secret detection tools are not enough: It?s not just about false positives - An industrial case study
Rahman, M.R.⋅Imtiaz, N.⋅Storey, M.-A. and Williams, L.
Empirical Software Engineering, vol. 27. | Journal Article
2021
Security Smells in Ansible and Chef Scripts. A Replication Study
Parnin, C. and Williams, L.
. | Journal Article
What are the attackers doing now? Automating cyberthreat intelligence extraction from text on pace with the changing threat landscape: A surveyRahman, M.R.⋅Mahdavi-Hezaveh, R. and Williams, L.
2020
A Literature Review on Mining Cyberthreat Intelligence from Unstructured TextsRahman, M.R.⋅Mahdavi-Hezaveh, R. and Williams, L.(pp. 516-525)
Do configuration management tools make systems more secure?: An empirical research planRahman, M.R.⋅Enck, W. and Williams, L.(pp. 131-132)
2019
Inferring bug patterns for detecting bugs in javascript by analyzing abstract syntax treeTasnim, A. and Rahman, M.R.(pp. 503-507)