Follow
Md Rayhanur Rahman
Md Rayhanur Rahman
Ph.D. Student in Computer Science
Verified email at ncsu.edu - Homepage
Title
Cited by
Cited by
Year
Security smells in ansible and chef scripts: A replication study
A Rahman, MR Rahman, C Parnin, L Williams
ACM Transactions on Software Engineering and Methodology (TOSEM) 30 (1), 1-31, 2021
652021
Share, but be aware: Security smells in python gists
MR Rahman, A Rahman, L Williams
2019 IEEE International conference on software maintenance and evolution …, 2019
292019
What are the attackers doing now? Automating cyberthreat intelligence extraction from text on pace with the changing threat landscape: A survey
MR Rahman, RM Hezaveh, L Williams
ACM Computing Surveys 55 (12), 1-36, 2023
192023
A literature review on mining cyberthreat intelligence from unstructured texts
MR Rahman, R Mahdavi-Hezaveh, L Williams
2020 International Conference on Data Mining Workshops (ICDMW), 516-525, 2020
182020
Why secret detection tools are not enough: It’s not just about false positives-an industrial case study
MR Rahman, N Imtiaz, MA Storey, L Williams
Empirical Software Engineering 27 (3), 59, 2022
92022
An investigation of security controls and mitre att\&ck techniques
MR Rahman, L Williams
arXiv preprint arXiv:2211.06500, 2022
62022
From threat reports to continuous threat intelligence: a comparison of attack technique extraction methods from textual artifacts
MR Rahman, L Williams
arXiv preprint arXiv:2210.02601, 2022
62022
Investigating co-occurrences of MITRE ATT\&CK Techniques
MR Rahman, L Williams
arXiv preprint arXiv:2211.06495, 2022
42022
Security Smells in Infrastructure as Code Scripts
A Rahman, M Rahman, C Parnin, L Williams
CoRR, 2019
12019
Mining Temporal Attack Patterns from Cyberthreat Intelligence Reports
MR Rahman, B Wroblewski, Q Matthews, B Morgan, T Menzies, ...
arXiv preprint arXiv:2401.01883, 2024
2024
Attackers reveal their arsenal: An investigation of adversarial techniques in CTI reports
MR Rahman, SK Basak, RM Hezaveh, L Williams
arXiv preprint arXiv:2401.01865, 2024
2024
Attackers reveal their arsenal: An investigation of adversarial techniques in CTI reports
M Rayhanur Rahman, SK Basak, R Mahdavi Hezaveh, L Williams
arXiv e-prints, arXiv: 2401.01865, 2024
2024
An investigation of security controls and MITRE ATT\&CK techniques
M Rayhanur Rahman, L Williams
arXiv e-prints, arXiv: 2211.06500, 2022
2022
Investigating co-occurrences of MITRE ATT\&CK Techniques
M Rayhanur Rahman, L Williams
arXiv e-prints, arXiv: 2211.06495, 2022
2022
From Threat Reports to Continuous Threat Intelligence: A Comparison of Attack Technique Extraction Methods from Textual Artifacts
M Rayhanur Rahman, L Williams
arXiv e-prints, arXiv: 2210.02601, 2022
2022
What are the attackers doing now? Automating cyber threat intelligence extraction from text on pace with the changing threat landscape: A survey
M Rayhanur Rahman, R Mahdavi-Hezaveh, L Williams
arXiv e-prints, arXiv: 2109.06808, 2021
2021
Do configuration management tools make systems more secure? an empirical research plan
MR Rahman, W Enck, L Williams
Proceedings of the 7th Symposium on Hot Topics in the Science of Security, 1-2, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–17