figshare
Browse

Md Rayhanur Rahman

Publications

  • What Are the Attackers Doing Now? Automating Cyberthreat Intelligence Extraction from Text on Pace with the Changing Threat Landscape: A Survey
  • What are the attackers doing now? Automating cyberthreat intelligence extraction from text on pace with the changing threat landscape: A survey
  • MobiCoMonkey - Context testing of android apps
  • Security Smells in Ansible and Chef Scripts: A Replication Study
  • MapBeing: An architecture for manipulating and publishing vector data in web based Geographic Information System
  • Share, but be Aware: Security Smells in Python Gists
  • Why secret detection tools are not enough: It’s not just about false positives - An industrial case study
  • A scalable resource provisioning scheme for the cloud using peer to peer resource discovery and multi-attribute utility theory
  • A proactive approach for context-aware self-adaptive mobile applications to ensure Quality of Service
  • A peer to peer resource discovery scheme for provisioning in cloud using multi attribute range query
  • Security and performance bug reports identification with class-imbalance sampling and feature selection
  • MMRUC3: A recommendation approach of move method refactoring using coupling, cohesion, and contextual similarity to enhance software design
  • A Literature Review on Mining Cyberthreat Intelligence from Unstructured Texts
  • Mobicomonkey: Context testing of Android apps
  • IVRIDIO: Design of a software testing framework to provide Test-first Performance as a service
  • Inferring bug patterns for detecting bugs in javascript by analyzing abstract syntax tree
  • Characterization and localization of performance-bugs using Naive Bayes approach
  • Do configuration management tools make systems more secure?: An empirical research plan
  • Investigating co-occurrences of MITRE ATT&CK Techniques
  • A formal approach to verify software scalability requirements using set theory and Hoare triple
  • From Threat Reports to Continuous Threat Intelligence: A Comparison of Attack Technique Extraction Methods from Textual Artifacts
  • Cloud-Niagara: A high availability and low overhead fault tolerance middleware for the cloud
  • An investigation of security controls and MITRE ATT&CK techniques
  • DTCTH: a discriminative local pattern descriptor for image classification
  • A peer to peer resource provisioning scheme for cloud computing environment using multi attribute utility theory
  • Recommendation of move method refactorings using coupling, cohesion and contextual similarity
  • A Survey on Software Vulnerability Exploitability Assessment
  • Attackers reveal their arsenal: An investigation of adversarial techniques in CTI reports
  • Mining Temporal Attack Patterns from Cyberthreat Intelligence Reports
  • If you cannot Measure it, you cannot Secure it. A Case Study on Metrics for Informed Choice of Security Controls

Md Rayhanur Rahman's public data