Nusrat Zahan

College of Engineering

Works (3)

2022 journal article

Do I really need all this work to find vulnerabilities? An empirical case study comparing vulnerability detection techniques on a Java application

EMPIRICAL SOFTWARE ENGINEERING, ["27"](6), [""].

By: S. Elder, N. Zahan, R. Shu, M. Metro, V. Kozarev, T. Menzies, L. Williams

Source: Web Of Science
Added: August 22, 2022

2022 article

What are Weak Links in the npm Supply Chain?

2022 ACM/IEEE 44TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: SOFTWARE ENGINEERING IN PRACTICE (ICSE-SEIP 2022), pp. ["331–340"].

By: N. Zahan, T. Zimmermann, P. Godefroid, B. Murphy, C. Maddila & L. Williams

Source: Web Of Science
Added: September 19, 2022

2021 article

Structuring a Comprehensive Software Security Course Around the OWASP Application Security Verification Standard

2021 IEEE/ACM 43RD INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: JOINT TRACK ON SOFTWARE ENGINEERING EDUCATION AND TRAINING (ICSE-JSEET 2021), pp. ["95–104"].

By: S. Elder, N. Zahan, V. Kozarev, R. Shu, T. Menzies & L. Williams

Source: Web Of Science
Added: November 1, 2021