MR
Publications
- What Are the Attackers Doing Now? Automating Cyberthreat Intelligence Extraction from Text on Pace with the Changing Threat Landscape: A Survey
- What are the attackers doing now? Automating cyberthreat intelligence extraction from text on pace with the changing threat landscape: A survey
- MobiCoMonkey - Context testing of android apps
- Security Smells in Ansible and Chef Scripts: A Replication Study
- MapBeing: An architecture for manipulating and publishing vector data in web based Geographic Information System
- Share, but be Aware: Security Smells in Python Gists
- Why secret detection tools are not enough: It’s not just about false positives - An industrial case study
- A scalable resource provisioning scheme for the cloud using peer to peer resource discovery and multi-attribute utility theory
- A proactive approach for context-aware self-adaptive mobile applications to ensure Quality of Service
- A peer to peer resource discovery scheme for provisioning in cloud using multi attribute range query
- Security and performance bug reports identification with class-imbalance sampling and feature selection
- MMRUC3: A recommendation approach of move method refactoring using coupling, cohesion, and contextual similarity to enhance software design
- A Literature Review on Mining Cyberthreat Intelligence from Unstructured Texts
- Mobicomonkey: Context testing of Android apps
- IVRIDIO: Design of a software testing framework to provide Test-first Performance as a service
- Inferring bug patterns for detecting bugs in javascript by analyzing abstract syntax tree
- Characterization and localization of performance-bugs using Naive Bayes approach
- Do configuration management tools make systems more secure?: An empirical research plan
- Investigating co-occurrences of MITRE ATT&CK Techniques
- A formal approach to verify software scalability requirements using set theory and Hoare triple
- From Threat Reports to Continuous Threat Intelligence: A Comparison of Attack Technique Extraction Methods from Textual Artifacts
- Cloud-Niagara: A high availability and low overhead fault tolerance middleware for the cloud
- An investigation of security controls and MITRE ATT&CK techniques
- DTCTH: a discriminative local pattern descriptor for image classification
- A peer to peer resource provisioning scheme for cloud computing environment using multi attribute utility theory
- Recommendation of move method refactorings using coupling, cohesion and contextual similarity
- A Survey on Software Vulnerability Exploitability Assessment
- Attackers reveal their arsenal: An investigation of adversarial techniques in CTI reports
- Mining Temporal Attack Patterns from Cyberthreat Intelligence Reports
- If you cannot Measure it, you cannot Secure it. A Case Study on Metrics for Informed Choice of Security Controls