41 Publications (Page 1 of 2)
2026
AgenticCyOps: Securing Multi-Agentic AI Integration in Enterprise Cyber Operations
Mitra, ShaswataPatel, RajMittal, SudipRahman, Md Rayhanur and Rahimi, Shahram
arXiv preprint arXiv:2603.09134. | Journal Article
 
Mind the Gap: Evaluating LLMs for High-Level Malicious Package Detection vs. Fine-Grained Indicator Identification
Ryan, AhmedKhalil, IbrahimJahid, Abdullah AlErfan, Md and Rahman, Akond Ashfaque Ur
arXiv preprint arXiv:2602.16304. | Journal Article
2025
FALCON: Autonomous Cyber Threat Intelligence Mining with LLMs for IDS Rule Generation
Mitra, ShaswataBazarov, AzimDuclos, MartinMittal, SudipPiplai, AritranRahman, Md RayhanurZieglar, Edward and Rahimi, Shahram
arXiv preprint arXiv:2508.18684. | Journal Article
 
If you cannot Measure it, you cannot Secure it. A Case Study on Metrics for Informed Choice of Security Controls. Journal of Information Security and Applications
. | Journal Article
 
Relative Positioning Based Code Chunking Method For Rich Context Retrieval In Repository Level Code Completion Task With Code Language Model
Rahman, Imranur
(pp. 379–382)
 
Security Vulnerabilities in Software Supply Chain for Autonomous Vehicles
Wasiul Haque, MdErfan, MdDasgupta, SagarRayhanur Rahman, Md and Rahman, Mizanur
arXiv e-prints, pp. arXiv–2509. | Journal Article
 
Security Vulnerabilities in Software Supply Chain for Autonomous Vehicles
Haque, Md WasiulErfan, MdDasgupta, Sagar and Rahman, Md Rayhanur
arXiv preprint arXiv:2509.16899. | Journal Article
 
SoK: An empirical investigation of malware techniques in advanced persistent threat attacks. Computers & Security
. | Journal Article
 
Unveiling Malicious Logic: Towards a Statement-Level Taxonomy and Dataset for Securing Python Packages
Ryan, AhmedIfti, Junaid MansurErfan, Md and Rahman, Akond Ashfaque Ur
arXiv preprint arXiv:2512.12559. | Journal Article
2024
ACSAC 2024 Security Control Challenges Taxonomy
 
A Survey on Software Vulnerability Exploitability Assessment. ACM Computing Surveys
. | Journal Article
 
ChronoCTI: Mining Knowledge Graph of Temporal Relations among Cyberattack Actions
2023
Attackers reveal their arsenal: An investigation of adversarial techniques in CTI reports
Rahman, Md RayhanurBasak, Setu KumarHezaveh, Rezvan Mahdavi and Williams, Laurie
. | Journal Article
 
Mining Temporal Attack Patterns from Cyberthreat Intelligence Reports
Rahman, Md RayhanurWroblewski, BrandonMatthews, QuinnMorgan, BrantleyMenzies, Tim and Williams, Laurie
. | Journal Article
 
What Are the Attackers Doing Now? Automating Cyberthreat Intelligence Extraction from Text on Pace with the Changing Threat Landscape: A Survey. ACM Computing Surveys
. | Journal Article
2022
An investigation of security controls and MITRE ATT&CK techniques
Rahman, MdR. and Williams, L.
 
From Threat Reports to Continuous Threat Intelligence: A Comparison of Attack Technique Extraction Methods from Textual Artifacts
Rahman, Md.R. and Williams, L.
 
From Threat Reports to Continuous Threat Intelligence: A Comparison of Attack Technique Extraction Methods from Textual Artifacts. ArXiv
. | Journal Article
 
Investigating co-occurrences of MITRE ATT&CK Techniques
Rahman, MdR. and Williams, L.
 
Why secret detection tools are not enough: It?s not just about false positives - An industrial case study
Rahman, M.R.Imtiaz, N.Storey, M.-A. and Williams, L.
Empirical Software Engineering, vol. 27. | Journal Article
2021
Security Smells in Ansible and Chef Scripts. A Replication Study
Parnin, C. and Williams, L.
. | Journal Article
 
What are the attackers doing now? Automating cyberthreat intelligence extraction from text on pace with the changing threat landscape: A survey
Rahman, M.R.Mahdavi-Hezaveh, R. and Williams, L.
2020
A Literature Review on Mining Cyberthreat Intelligence from Unstructured Texts
Rahman, M.R.Mahdavi-Hezaveh, R. and Williams, L.
(pp. 516-525)
 
Do configuration management tools make systems more secure?: An empirical research plan
Rahman, M.R.Enck, W. and Williams, L.
(pp. 131-132)
2019
Inferring bug patterns for detecting bugs in javascript by analyzing abstract syntax tree
Tasnim, A. and Rahman, M.R.
(pp. 503-507)