Security smells in ansible and chef scripts: A replication study A Rahman, MR Rahman, C Parnin, L Williams ACM Transactions on Software Engineering and Methodology (TOSEM) 30 (1), 1-31, 2021 | 90 | 2021 |
What are the attackers doing now? Automating cyberthreat intelligence extraction from text on pace with the changing threat landscape: A survey MR Rahman, RM Hezaveh, L Williams ACM Computing Surveys 55 (12), 1-36, 2023 | 46 | 2023 |
Share, but be aware: Security smells in python gists MR Rahman, A Rahman, L Williams 2019 IEEE International conference on software maintenance and evolution …, 2019 | 35 | 2019 |
Dtcth: a discriminative local pattern descriptor for image classification MM Rahman, S Rahman, R Rahman, BMM Hossain, M Shoyaib EURASIP Journal on Image and Video Processing 2017, 1-24, 2017 | 25 | 2017 |
A literature review on mining cyberthreat intelligence from unstructured texts MR Rahman, R Mahdavi-Hezaveh, L Williams 2020 International Conference on Data Mining Workshops (ICDMW), 516-525, 2020 | 23 | 2020 |
From threat reports to continuous threat intelligence: a comparison of attack technique extraction methods from textual artifacts MR Rahman, L Williams arXiv preprint arXiv:2210.02601, 2022 | 16 | 2022 |
Mobicomonkey: Context testing of android apps AS Ami, MM Hasan, MR Rahman, K Sakib Proceedings of the 5th International Conference on Mobile Software …, 2018 | 15 | 2018 |
Cloud-niagara: A high availability and low overhead fault tolerance middleware for the cloud A Imran, AU Gias, R Rahman, A Seal, T Rahman, F Ishraque, K Sakib 16th Int'l Conf. Computer and Information Technology, 271-276, 2014 | 14 | 2014 |
Security and performance bug reports identification with class-imbalance sampling and feature selection DC Das, MR Rahman 2018 Joint 7th International Conference on Informatics, Electronics & Vision …, 2018 | 13 | 2018 |
Why secret detection tools are not enough: It’s not just about false positives-an industrial case study MR Rahman, N Imtiaz, MA Storey, L Williams Empirical Software Engineering 27 (3), 59, 2022 | 12 | 2022 |
MMRUC3: A recommendation approach of move method refactoring using coupling, cohesion, and contextual similarity to enhance software design MM Rahman, RR Riyadh, SM Khaled, A Satter, MR Rahman Software: Practice and Experience 48 (9), 1560-1587, 2018 | 11 | 2018 |
Provintsec: a provenance cognition blueprint ensuring integrity and security for real life open source cloud A Imran, A Ul Gias, R Rahman, K Sakib International Journal of Information Privacy, Security and Integrity 1 (4 …, 2013 | 10 | 2013 |
An investigation of security controls and mitre att\&ck techniques MR Rahman, L Williams arXiv preprint arXiv:2211.06500, 2022 | 9 | 2022 |
A peer to peer resource provisioning scheme for cloud computing environment using multi attribute utility theory R Rahman, A Imran, AU Gias, K Sakib Third International Conference on Innovative Computing Technology (INTECH …, 2013 | 8 | 2013 |
Characterization and localization of performance-bugs using Naive Bayes approach M Sujon, M Shafiuzzaman, MM Rahman, R Rahman 2016 5th international conference on informatics, electronics and vision …, 2016 | 7 | 2016 |
A proactive approach for context-aware self-adaptive mobile applications to ensure Quality of Service M Shafiuzzaman, N Nahar, MR Rahman 2015 18th International Conference on Computer and Information Technology …, 2015 | 7 | 2015 |
A Survey on Software Vulnerability Exploitability Assessment S Elder, MR Rahman, G Fringer, K Kapoor, L Williams ACM Computing Surveys 56 (8), 1-41, 2024 | 6 | 2024 |
MapBeing: an architecture for manipulating and publishing vector data in Web based geographic information system M Moshi, N Nahar, R Rahman, K Sakib The 8th International Conference on Software, Knowledge, Information …, 2014 | 6 | 2014 |
Investigating co-occurrences of MITRE ATT\&CK Techniques MR Rahman, L Williams arXiv preprint arXiv:2211.06495, 2022 | 5 | 2022 |
Recommendation of move method refactorings using coupling, cohesion and contextual similarity MM Rahman, RR Riyadh, MR Rahman 2017 IEEE International Conference on Imaging, Vision & Pattern Recognition …, 2017 | 5 | 2017 |