Nusrat Zahan

Orcid: 0000-0002-2738-4118

According to our database1, Nusrat Zahan authored at least 23 papers between 2018 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Research Directions in Software Supply Chain Security.
ACM Trans. Softw. Eng. Methodol., June, 2025

Comparing effectiveness and efficiency of Interactive Application Security Testing (IAST) and Runtime Application Self-Protection (RASP) tools in a large java-based system.
Empir. Softw. Eng., June, 2025

Prioritizing Security Practice Adoption: Empirical Insights on Software Security Outcomes in the npm Ecosystem.
CoRR, April, 2025

Can the Rising Tide of Software Supply Chain Attacks Raise All Software Engineering Boats?
Proceedings of the 33rd ACM International Conference on the Foundations of Software Engineering, 2025

Leveraging Large Language Models to Detect NPM Malicious Packages.
Proceedings of the 47th IEEE/ACM International Conference on Software Engineering, 2025

2024
S3C2 Summit 2023-11: Industry Secure Supply Chain Summit.
CoRR, 2024

Characterizing Dependency Update Practice of NPM, PyPI and Cargo Packages.
CoRR, 2024

Shifting the Lens: Detecting Malware in npm Ecosystem with Large Language Models.
CoRR, 2024

MalwareBench: Malware samples are not enough.
Proceedings of the 21st IEEE/ACM International Conference on Mining Software Repositories, 2024

2023
Software Bills of Materials Are Required. Are We There Yet?
IEEE Secur. Priv., 2023

OpenSSF Scorecard: On the Path Toward Ecosystem-Wide Automated Security Metrics.
IEEE Secur. Priv., 2023

Do Software Security Practices Yield Fewer Vulnerabilities?
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering: Software Engineering in Practice, 2023

Software Supply Chain Risk Assessment Framework.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering: ICSE 2023 Companion Proceedings, 2023

Advancing Safety Through IoT: Gas Detection and Automation Systems.
ICO (2), 2023

2022
Do I really need all this work to find vulnerabilities?
Empir. Softw. Eng., 2022

PREPRINT: Do OpenSSF Scorecard Practices Contribute to Fewer Vulnerabilities?
CoRR, 2022

PREPRINT: Can the OpenSSF Scorecard be used to measure the security posture of npm and PyPI?
CoRR, 2022

Do I really need all this work to find vulnerabilities? An empirical case study comparing vulnerability detection techniques on a Java application.
CoRR, 2022

What are Weak Links in the npm Supply Chain?
Proceedings of the 44th IEEE/ACM International Conference on Software Engineering: Software Engineering in Practice, 2022

2021
Structuring a Comprehensive Software Security Course Around the OWASP Application Security Verification Standard.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering: Software Engineering Education and Training, 2021

Breast Cancer Prediction with Gaussian Process Using Anthropometric Parameters.
Proceedings of the 12th International Conference on Computing Communication and Networking Technologies, 2021

A Multi-attribute Decision Making Approach for Trauma Center Site Selection.
Proceedings of the 12th International Conference on Computing Communication and Networking Technologies, 2021

2018
A CNN-Based Classification Model for Recognizing Visual Bengali Font.
Proceedings of International Joint Conference on Computational Intelligence, 2018


  Loading...