Imranur Rahman

College of Engineering

2025 article

If you cannot Measure it, you cannot Secure it. A Case Study on Metrics for Informed Choice of Security Controls

Rahman, M. R., Rahman, I., & Williams, L. (2025, May 9). Journal of Information Security and Applications.

By: M. Rahman*, I. Rahman n & L. Williams n

author keywords: Security controls; Adversarial techniques; NIST SP800-53; ATT&CK; TTPs
topics (OpenAlex): Information and Cyber Security; Advanced Malware Detection Techniques; Network Security and Intrusion Detection
Source: Web Of Science
Added: May 27, 2025

2025 article

Relative Positioning Based Code Chunking Method For Rich Context Retrieval In Repository Level Code Completion Task With Code Language Model

Rahman, I., & Rahman, M. R. (2025, November 16).

By: I. Rahman n & M. Rahman*

topics (OpenAlex): Software Engineering Research; Topic Modeling; Natural Language Processing Techniques; Advanced Software Engineering Methodologies; Software Testing and Debugging Techniques
Source: NC State University Libraries
Added: January 22, 2026

2025 article

Research Directions in Software Supply Chain Security

Williams, L., Benedetti, G., Hamer, S., Paramitha, R., Rahman, I., Tamanna, M., … Enck, W. (2025, January 27). ACM Transactions on Software Engineering and Methodology, Vol. 34.

By: L. Williams n, G. Benedetti*, S. Hamer n, R. Paramitha*, I. Rahman n, M. Tamanna n, G. Tystahl n, N. Zahan n ...

author keywords: Software security; Software supply chain security; Open source security
topics (OpenAlex): Information and Cyber Security; Advanced Malware Detection Techniques; Software Engineering Research
Sources: Web Of Science, ORCID, NC State University Libraries
Added: January 27, 2025

2025 article

Which Is Better For Reducing Outdated and Vulnerable Dependencies: Pinning or Floatingƒ

Rahman, I., Marley, J., Enck, W., & Williams, L. (2025, November 16). (Vol. 11). Vol. 11.

By: I. Rahman n, J. Marley n, W. Enck n & L. Williams n

topics (OpenAlex): Logic, programming, and type systems; Parallel Computing and Optimization Techniques; Distributed systems and fault tolerance; Software Engineering Research; Information and Cyber Security; Software System Performance and Reliability
Sources: NC State University Libraries, NC State University Libraries
Added: January 31, 2026

2024 article

Towards a Taxonomy of Challenges in Security Control Implementation

Rahman, M. R., Wroblewski, B., Tamanna, M., Rahman, I., Anufryienak, A., & Williams, L. (2024, December 9).

By: M. Rahman n, B. Wroblewski n, M. Tamanna n, I. Rahman n, A. Anufryienak* & L. Williams n

author keywords: Security controls; Taxonomy; Large Language Models; MITRE ATT&CK
topics (OpenAlex): Information and Cyber Security
Source: Web Of Science
Added: July 21, 2025

2023 article

SecureImgStego: A Keyed Shuffling-based Deep Learning Model for Secure Image Steganography

Chakraborty, T., Rahman, I., Murad, H., Hossain, M. S., & Mehnaz, S. (2023, October 2).

By: T. Chakraborty*, I. Rahman n, H. Murad*, M. Hossain* & S. Mehnaz*

topics (OpenAlex): Advanced Steganography and Watermarking Techniques; Digital Media Forensic Detection; Chaos-based Image/Signal Encryption
TL;DR: This paper introduces a simple yet effective keyed shuffling approach for encrypting secret images and demonstrates that the block shuffling-based deep image steganography has negligible error overhead compared to conventional methods while providing effective security against adversaries with different levels of access to the model. (via Semantic Scholar)
Source: Web Of Science
Added: December 4, 2023

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2026) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.