AR
Publications
- A systematic mapping study of infrastructure as code research
- Source code properties of defective infrastructure as code scripts
- The ‘as code’ activities: development anti-patterns for infrastructure as code
- An Exploratory Characterization of Bugs in COVID-19 Software Projects
- Security Bug Report Usage for Software Vulnerability Research: A Systematic Mapping Study
- Different Kind of Smells: Security Smells in Infrastructure as Code Scripts
- Exercise Perceptions: Experience Report from a Secure Software Development Course
- Testing practices for infrastructure as code
- Security Smells in Ansible and Chef Scripts
- Log-related Coding Patterns to Conduct Postmortems of Attacks in Supervised Learning-based Projects
- Detecting and Characterizing Propagation of Security Weaknesses in Puppet-based infrastructure Management
- Security Misconfigurations in Open Source Kubernetes Manifests: An Empirical Study
- Come for syntax, stay for speed, understand defects: an empirical study of defects in Julia programs
- An empirical study of vulnerabilities in robotics
- Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and Protection
- Software Supply Chain Vulnerabilities Detection in Source Code: Performance Comparison between Traditional and Quantum Machine Learning Algorithms
- Quantum Machine Learning for Software Supply Chain Attacks: How Far Can We Go?
- Evolution of Quantum Computing: A Systematic Survey on the Use of Quantum Computing Tools
- XI Commandments of Kubernetes Security: A Systematization of Knowledge Related to Kubernetes Security Practices
- Security Smells in Infrastructure as Code Scripts
- Malware Detection and Prevention using Artificial Intelligence Techniques
- Practitioner Perceptions of Ansible Test Smells
- Vulnerability Discovery Strategies Used in Software Projects
- A Vision to Mitigate Bioinformatics Software Development Challenges
- Benefits, Challenges, and Research Topics: A Multi-vocal Literature Review of Kubernetes
- Characterizing Co-located Insecure Coding Patterns in Infrastructure as Code Scripts
- How Do Students Feel about Automated Security Static Analysis Exercises?
- Quality Assurance for Infrastructure Orchestrators: Emerging Results from Ansible
- What questions do developers ask about Julia?
- Vision for a Secure Elixir Ecosys tem: An Empirical Study of Vulnerabilities in Elixir Programs
- Can We use Authentic Learning to Educate Students about Secure Infrastructure as Code Development?
- Challenges with responding to static analysis tool alerts
- A Novel Machine Learning Based Framework for Bridge Condition Analysis
- Gang of eight: A defect taxonomy for infrastructure as code scripts
- Lessons from Research to Practice on Writing Better Quality Puppet Scripts
- Can we use software bug reports to identify vulnerability discovery strategies?
- Shifting Left for Machine Learning: An Empirical Study of Security Weaknesses in Supervised Learning-based Projects
- Towards Automation for MLOps: An Exploratory Study of Bot Usage in Deep Learning Libraries
- Development of Blockchain-based e-Voting System: Requirements, Design and Security Perspective
- Investigating Novel Approaches to Defend Software Supply Chain Attacks
- Blockchain enabled AI marketplace: The price you pay for trust
- As Code Testing: Characterizing Test Quality in Open Source Ansible Development
- 'Under-reported' Security Defects in Kubernetes Manifests
- A preliminary taxonomy of techniques used in software fuzzing
- A curated dataset of security defects in scientific software projects
- Practitioner Perception of Vulnerability Discovery Strategies
- Characterizing Attacker Behavior in a Cybersecurity Penetration Testing Competition
- Bie Vote: A Biometric Identification Enabled Blockchain-Based Secure and Transparent Voting Framework
- A bird's eye view of knowledge needs related to penetration testing
- Shhh: 12 Practices for Secret Management in Infrastructure as Code
- Bugs in infrastructure as code
- Where are the gaps? a systematic mapping study of infrastructure as code research
- Characterizing the influence of continuous integration: Empirical results from 250+ open source and proprietary projects
- What is the connection between issues, bugs, and enhancements? (Lessons Learned from 800+ Software Projects)
- We don’t need another hero? The impact of “Heroes” on software development
- What is the connection between issues, bugs, and enhancements?: Lessons learned from 800+ software projects
- What questions do programmers ask about configuration as code?
- We don't need another hero?: The impact of "heroes" on software development
- Predicting Android Application Security and Privacy Risk with Static Code Metrics
- Security practices in DevOps
- Anti-Patterns in Infrastructure as Code
- Characterizing Defective Configuration Scripts Used for Continuous Deployment
- Software security in DevOps: Synthesizing practitioners' perceptions and practices
- Energy-efficient multiple targets tracking using target kinematics in wireless sensor networks
- The Seven Sins: Security Smells in Infrastructure as Code Scripts
- Snakes in Paradise?: Insecure python-related coding practices in stack overflow
- Which Factors Influence Practitioners' Usage of Build Automation Tools
- Portable and secure multimedia data transfer in mobile phones using Record Management Store (RMS)
- Service priority based target tracking framework
- Characteristics of defective infrastructure as code scripts in DevOps
- Synthesizing Program Execution Time Discrepancies in Julia Used for Scientific Software
- Synthesizing Continuous Deployment Practices Used in Software Development
- Characterizing scientific reporting in security literature: An analysis of ACM CCS and IEEE S&P papers
- Share, but be Aware: Security Smells in Python Gists
- Comprehension effort and programming activities: Related? or not related?
- Poster: Defect prediction metrics for infrastructure as code scripts in DevOps
- Defect Categorization in Compilers: A Multi-vocal Literature Review
- An empirical study of task infections in Ansible scripts
- Student Perceptions of Authentic Learning to Learn White-box Testing
- Transforming online voting: a novel system utilizing blockchain and biometric verification for enhanced security, privacy, and transparency
- A Plugin for Kotlin based Android Apps to Detect Security Breaches through Dataflow
- The ‘as Code’ Activities: Development anti-patterns for infrastructure as code
- Teaching DevOps Security Education with Hands-on Labware: Automated Detection of Security Weakness in Python
- Using AI Assistants in Software Development: A Qualitative Study on Security Practices and Concerns
- Characterizing Static Analysis Alerts for Terraform Manifests: An Experience Report
- Evaluating the Quality of Open Source Ansible Playbooks: An Executability Perspective
- State Reconciliation Defects in Infrastructure as Code
- Does Generative AI Generate Smells Related to Container Orchestration?: An Exploratory Study with Kubernetes Manifests
Usage metrics
Co-workers & collaborators
- MH
Md Mehedi Hassan
- YZ
Yue Zhang