Md Rayhanur Rahman

College of Engineering

Works (5)

Updated: July 11th, 2023 21:15

2023 journal article

What Are the Attackers Doing Now? Automating Cyberthreat Intelligence Extraction from Text on Pace with the Changing Threat Landscape: A Survey

ACM COMPUTING SURVEYS, 55(12).

By: M. Rahman n, R. Hezaveh  n & L. Williams n

co-author countries: United States of America πŸ‡ΊπŸ‡Έ
author keywords: Cyberthreat intelligence; CTI extraction; CTI mining; IoC extraction; TTPs; extraction; attack pattern extraction; threat reports; tactical threat intelligence; technical threat intelligence
Source: Web Of Science
Added: April 24, 2023

2022 journal article

Why secret detection tools are not enough: It's not just about false positives-An industrial case study

EMPIRICAL SOFTWARE ENGINEERING, 27(3).

By: M. Rahman n, N. Imtiaz n, M. Storey * & L. Williams n

co-author countries: Canada πŸ‡¨πŸ‡¦ United States of America πŸ‡ΊπŸ‡Έ
author keywords: Secret detection tool; Hardcoded secrets; Secrets in repositories; Credentials in repositories
Source: Web Of Science
Added: April 4, 2022

2021 journal article

Security Smells in Ansible and Chef Scripts: A Replication Study

ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 30(1).

By: A. Rahman*, M. Rahman n, C. Parnin n & L. Williams n

co-author countries: United States of America πŸ‡ΊπŸ‡Έ
Source: Web Of Science
Added: March 8, 2021

2020 article

A Literature Review on Mining Cyberthreat Intelligence from Unstructured Texts

20TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW 2020), pp. 516–525.

co-author countries: United States of America πŸ‡ΊπŸ‡Έ
Source: Web Of Science
Added: July 12, 2021

2019 article

Share, But Be Aware: Security Smells in Python Gists

2019 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME 2019), pp. 536–540.

By: M. Rahman n, A. Rahman* & L. Williams n

co-author countries: United States of America πŸ‡ΊπŸ‡Έ
author keywords: GitHub; Gist; Python; Security; Security Smell; Static Analysis; Software Security
Source: Web Of Science
Added: April 14, 2020