Security smells in ansible and chef scripts: A replication study A Rahman, MR Rahman, C Parnin, L Williams ACM Transactions on Software Engineering and Methodology (TOSEM) 30 (1), 1-31, 2021 | 71 | 2021 |
Share, but be aware: Security smells in python gists MR Rahman, A Rahman, L Williams 2019 IEEE International conference on software maintenance and evolution …, 2019 | 29 | 2019 |
What are the attackers doing now? Automating cyberthreat intelligence extraction from text on pace with the changing threat landscape: A survey MR Rahman, RM Hezaveh, L Williams ACM Computing Surveys 55 (12), 1-36, 2023 | 28 | 2023 |
A literature review on mining cyberthreat intelligence from unstructured texts MR Rahman, R Mahdavi-Hezaveh, L Williams 2020 International Conference on Data Mining Workshops (ICDMW), 516-525, 2020 | 21 | 2020 |
From threat reports to continuous threat intelligence: a comparison of attack technique extraction methods from textual artifacts MR Rahman, L Williams arXiv preprint arXiv:2210.02601, 2022 | 9 | 2022 |
Why secret detection tools are not enough: It’s not just about false positives-an industrial case study MR Rahman, N Imtiaz, MA Storey, L Williams Empirical Software Engineering 27 (3), 59, 2022 | 9 | 2022 |
An investigation of security controls and mitre att\&ck techniques MR Rahman, L Williams arXiv preprint arXiv:2211.06500, 2022 | 6 | 2022 |
Investigating co-occurrences of MITRE ATT\&CK Techniques MR Rahman, L Williams arXiv preprint arXiv:2211.06495, 2022 | 4 | 2022 |
A Survey on Software Vulnerability Exploitability Assessment S Elder, MR Rahman, G Fringer, K Kapoor, L Williams ACM Computing Surveys 56 (8), 1-41, 2024 | 1 | 2024 |
Mining Temporal Attack Patterns from Cyberthreat Intelligence Reports MR Rahman, B Wroblewski, Q Matthews, B Morgan, T Menzies, ... arXiv preprint arXiv:2401.01883, 2024 | 1 | 2024 |
Attackers reveal their arsenal: An investigation of adversarial techniques in CTI reports MR Rahman, SK Basak, RM Hezaveh, L Williams arXiv preprint arXiv:2401.01865, 2024 | 1 | 2024 |
Security Smells in Infrastructure as Code Scripts A Rahman, M Rahman, C Parnin, L Williams CoRR, 2019 | 1 | 2019 |
Attackers reveal their arsenal: An investigation of adversarial techniques in CTI reports M Rayhanur Rahman, SK Basak, R Mahdavi Hezaveh, L Williams arXiv e-prints, arXiv: 2401.01865, 2024 | | 2024 |
An investigation of security controls and MITRE ATT\&CK techniques M Rayhanur Rahman, L Williams arXiv e-prints, arXiv: 2211.06500, 2022 | | 2022 |
Investigating co-occurrences of MITRE ATT\&CK Techniques M Rayhanur Rahman, L Williams arXiv e-prints, arXiv: 2211.06495, 2022 | | 2022 |
From Threat Reports to Continuous Threat Intelligence: A Comparison of Attack Technique Extraction Methods from Textual Artifacts M Rayhanur Rahman, L Williams arXiv e-prints, arXiv: 2210.02601, 2022 | | 2022 |
What are the attackers doing now? Automating cyber threat intelligence extraction from text on pace with the changing threat landscape: A survey M Rayhanur Rahman, R Mahdavi-Hezaveh, L Williams arXiv e-prints, arXiv: 2109.06808, 2021 | | 2021 |
Do configuration management tools make systems more secure? an empirical research plan MR Rahman, W Enck, L Williams Proceedings of the 7th Symposium on Hot Topics in the Science of Security, 1-2, 2020 | | 2020 |