Chadni Islam

Orcid: 0000-0002-6349-6483

According to our database1, Chadni Islam authored at least 14 papers between 2019 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Design and Generation of a Set of Declarative APIs for Security Orchestration.
IEEE Trans. Serv. Comput., 2024

A Framework for Migrating to Post-Quantum Cryptography: Security Dependency Analysis and Case Studies.
IEEE Access, 2024

2023
Runtime software patching: Taxonomy, survey and future directions.
J. Syst. Softw., June, 2023

APIRO: A Framework for Automated Security Tools API Recommendation.
ACM Trans. Softw. Eng. Methodol., January, 2023

Migrating to Post-Quantum Cryptography: a Framework Using Security Dependency Analysis.
CoRR, 2023

Detecting Misuses of Security APIs: A Systematic Review.
CoRR, 2023

Security Tools' API Recommendation Using Machine Learning.
Proceedings of the 18th International Conference on Evaluation of Novel Approaches to Software Engineering, 2023

Analyzing the Evolution of Inter-package Dependencies in Operating Systems: A Case Study of Ubuntu.
Proceedings of the Software Architecture - 17th European Conference, 2023

A Goal-Driven Approach to Support Decision-Making with Incomplete Information in Cyber Operations.
Proceedings of the Intelligent Information Systems, 2023

2022
SmartValidator: A framework for automatic identification and classification of cyber threat data.
J. Netw. Comput. Appl., 2022

2020
Architecture-Centric Support for Integrating Security Tools in a Security Orchestration Platform.
Proceedings of the Software Architecture - 14th European Conference, 2020

2019
A Multi-Vocal Review of Security Orchestration.
ACM Comput. Surv., 2019

An ontology-driven approach to automating the process of integrating security software systems.
Proceedings of the International Conference on Software and System Processes, 2019

Automated Interpretation and Integration of Security Tools Using Semantic Knowledge.
Proceedings of the Advanced Information Systems Engineering, 2019


  Loading...