Follow
Nusrat Zahan
Title
Cited by
Cited by
Year
What are Weak Links in the npm Supply Chain?
N Zahan, T Zimmermann, P Godefroid, B Murphy, ...
arXiv preprint arXiv:2112.10165, 2021
822021
Software bills of materials are required. are we there yet?
N Zahan, E Lin, M Tamanna, W Enck, L Williams
IEEE Security & Privacy 21 (2), 82-88, 2023
182023
Do i really need all this work to find vulnerabilities? an empirical case study comparing vulnerability detection techniques on a java application
S Elder, N Zahan, R Shu, M Metro, V Kozarev, T Menzies, L Williams
Empirical Software Engineering 27 (6), 154, 2022
122022
Do Software Security Practices Yield Fewer Vulnerabilities?
N Zahan, S Shohan, D Harris, L Williams
2023 IEEE/ACM 45th International Conference on Software Engineering …, 2023
9*2023
Structuring a comprehensive software security course around the OWASP application security verification standard
S Elder, N Zahan, V Kozarev, R Shu, T Menzies, L Williams
2021 IEEE/ACM 43rd International Conference on Software Engineering …, 2021
72021
Openssf scorecard: On the path toward ecosystem-wide automated security metrics
N Zahan, P Kanakiya, B Hambleton, S Shohan, L Williams
IEEE Security & Privacy, 2023
6*2023
Comparing effectiveness and efficiency of interactive application security testing (iast) and runtime application self-protection (rasp) tools
A Seth
North Carolina State University, 2022
42022
Software Supply Chain Risk Assessment Framework
N Zahan
2023 IEEE/ACM 45th International Conference on Software Engineering …, 2023
22023
Simulation study on nonlinear ultrasound imaging using different realistic synthetic phantoms
N Zahan, ABMA Hossain, S Mostafa
2015 IEEE International WIE Conference on Electrical and Computer …, 2015
12015
Characterizing Dependency Update Practice of NPM, PyPI and Cargo Packages
I Rahman, N Zahan, S Magill, W Enck, L Williams
arXiv preprint arXiv:2403.17382, 2024
2024
Shifting the Lens: Detecting Malware in npm Ecosystem with Large Language Models
N Zahan, P Burckhardt, M Lysenko, F Aboukhadijeh, L Williams
arXiv preprint arXiv:2403.12196, 2024
2024
Do I really need all this work to find vulnerabilities, https://doi. org/10.1007/s10664-022-10179-6
S Elder, N Zahan, R Shu, M Metro, V Kozarev, T Menzies, L Williams
Empirical software engineering 27 (154), 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–12