Xi commandments of kubernetes security: A systematization of knowledge related to kubernetes security practices MSI Shamim, FA Bhuiyan, A Rahman 2020 IEEE Secure Development (SecDev), 58-64, 2020 | 104 | 2020 |
Stock price prediction: comparison of different moving average techniques using deep learning model MM Billah, A Sultana, F Bhuiyan, MG Kaosar Neural Computing and Applications 36 (11), 5861-5871, 2024 | 21 | 2024 |
Testing practices for infrastructure as code MM Hasan, FA Bhuiyan, A Rahman Proceedings of the 1st ACM SIGSOFT International Workshop on Languages and …, 2020 | 20 | 2020 |
Uncertainty Quantification in Multimodal Ensembles of Deep Learners. KE Brown, FA Bhuiyan, DA Talbert FLAIRS, 422-427, 2020 | 20 | 2020 |
Characterizing co-located insecure coding patterns in infrastructure as code scripts FA Bhuiyan, A Rahman Proceedings of the 35th IEEE/ACM International Conference on Automated …, 2020 | 17 | 2020 |
Security bug report usage for software vulnerability research: a systematic mapping study FA Bhuiyan, MB Sharif, A Rahman IEEE Access 9, 28471-28495, 2021 | 11 | 2021 |
Towards automation for MLOps: An exploratory study of bot usage in deep learning libraries A Rahman, FA Bhuiyan, MM Hassan, H Shahriar, F Wu 2022 IEEE 46th Annual Computers, Software, and Applications Conference …, 2022 | 5 | 2022 |
Can we use software bug reports to identify vulnerability discovery strategies? FA Bhuiyan, R Shakya, A Rahman Proceedings of the 7th Symposium on Hot Topics in the Science of Security, 1-10, 2020 | 5 | 2020 |
Vulnerability discovery strategies used in software projects FA Bhuiyan, A Rahman, P Morrison Proceedings of the 35th IEEE/ACM International Conference on Automated …, 2020 | 4 | 2020 |
Verifiability package for paper FA Bhuiyan, A Rahman, P Morrison | 3 | 2020 |
Log-related coding patterns to conduct postmortems of attacks in supervised learning-based projects FA Bhuiyan, A Rahman ACM Transactions on Privacy and Security 26 (2), 1-24, 2023 | 1 | 2023 |
Shifting left for machine learning: An empirical study of security weaknesses in supervised learning-based projects FA Bhuiyan, S Prowell, H Shahriar, F Wu, A Rahman 2022 IEEE 46th Annual Computers, Software, and Applications Conference …, 2022 | 1 | 2022 |
Practitioner perception of vulnerability discovery strategies FA Bhuiyan, J Murphy, P Morrison, A Rahman 2021 IEEE/ACM 2nd International Workshop on Engineering and Cybersecurity of …, 2021 | 1 | 2021 |
Assessing Modality Selection Heuristics to Improve Multimodal Machine Learning for Malware Detection. FA Bhuiyan, KE Brown, MB Sharif, QD Johnson, DA Talbert FLAIRS, 434-438, 2020 | 1 | 2020 |
Leveraging Vulnerability Discovery Strategies for Secure Development of Supervised Learning Projects FA Bhuiyan Tennessee Technological University, 2022 | | 2022 |
A vision to mitigate bioinformatics software development challenges A Rahman, FA Bhuiyan Proceedings of the 35th IEEE/ACM International Conference on Automated …, 2020 | | 2020 |
Assessing Modality Selection Heuristics to Improve Multimodal Deep Learning for Malware Detection FA Bhuiyan, K Brown, MB Sharif, DA Talbert Proceedings of Student Research and Creative Inquiry Day 4, 2020 | | 2020 |
Solving Multimodal Problem using Deep Learning: Speaker Identification FA Bhuiyan, MB Sharif Proceedings of Student Research and Creative Inquiry Day 3, 2019 | | 2019 |
Gene Selection and Clustering of Breast Cancer Data FA Bhuiyan, MB Sharif, PJ Tinker, W Eberle, DA Talbert, SK Ghafoor, ... | | 2019 |
Generation and Analysis of Breast Tumor Data Using Distance Weighted Discrimination and Subgroup Discovery FA Bhuiyan, PJ Tinker, MB Sharif Proceedings of Student Research and Creative Inquiry Day 2, 2018 | | 2018 |