Md Rayhanur Rahman

College of Engineering

Works (5)

Updated: May 1st, 2023 09:14

2023 journal article

What Are the Attackers Doing Now? Automating Cyberthreat Intelligence Extraction from Text on Pace with the Changing Threat Landscape: A Survey

ACM COMPUTING SURVEYS, 55(12).

By: M. Rahman, R. Hezaveh n & L. Williams

author keywords: Cyberthreat intelligence; CTI extraction; CTI mining; IoC extraction; TTPs; extraction; attack pattern extraction; threat reports; tactical threat intelligence; technical threat intelligence
Source: Web Of Science
Added: April 24, 2023

2022 journal article

Why secret detection tools are not enough: It's not just about false positives-An industrial case study

EMPIRICAL SOFTWARE ENGINEERING, 27(3).

By: M. Rahman, N. Imtiaz, M. Storey* & L. Williams

author keywords: Secret detection tool; Hardcoded secrets; Secrets in repositories; Credentials in repositories
Source: Web Of Science
Added: April 4, 2022

2021 journal article

Security Smells in Ansible and Chef Scripts: A Replication Study

ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 30(1).

By: A. Rahman, M. Rahman, C. Parnin & L. Williams

Source: Web Of Science
Added: March 8, 2021

2020 article

A Literature Review on Mining Cyberthreat Intelligence from Unstructured Texts

20TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW 2020), pp. 516–525.

Source: Web Of Science
Added: July 12, 2021

2019 article

Share, But Be Aware: Security Smells in Python Gists

2019 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME 2019), pp. 536–540.

By: M. Rahman, A. Rahman & L. Williams

author keywords: GitHub; Gist; Python; Security; Security Smell; Static Analysis; Software Security
Source: Web Of Science
Added: April 14, 2020