Rayhanur Rahman

Orcid: 0000-0003-4980-7350

According to our database1, Rayhanur Rahman authored at least 17 papers between 2013 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
What Are the Attackers Doing Now? Automating Cyberthreat Intelligence Extraction from Text on Pace with the Changing Threat Landscape: A Survey.
ACM Comput. Surv., December, 2023

2022
Why secret detection tools are not enough: It's not just about false positives - An industrial case study.
Empir. Softw. Eng., 2022

An investigation of security controls and MITRE ATT&CK techniques.
CoRR, 2022

Investigating co-occurrences of MITRE ATT\&CK Techniques.
CoRR, 2022

From Threat Reports to Continuous Threat Intelligence: A Comparison of Attack Technique Extraction Methods from Textual Artifacts.
CoRR, 2022

2021
Security Smells in Ansible and Chef Scripts: A Replication Study.
ACM Trans. Softw. Eng. Methodol., 2021

What are the attackers doing now? Automating cyber threat intelligence extraction from text on pace with the changing threat landscape: A survey.
CoRR, 2021

2020
A Literature Review on Mining Cyberthreat Intelligence from Unstructured Texts.
Proceedings of the 20th International Conference on Data Mining Workshops, 2020

Do configuration management tools make systems more secure?: an empirical research plan.
Proceedings of the 7th Annual Symposium on Hot Topics in the Science of Security, 2020

2019
Security Smells in Infrastructure as Code Scripts.
CoRR, 2019

Share, But be Aware: Security Smells in Python Gists.
Proceedings of the 2019 IEEE International Conference on Software Maintenance and Evolution, 2019

2018
MMRUC3: A recommendation approach of move method refactoring using coupling, cohesion, and contextual similarity to enhance software design.
Softw. Pract. Exp., 2018

Mobicomonkey: context testing of Android apps.
Proceedings of the 5th International Conference on Mobile Software Engineering and Systems, MOBILESoft@ICSE 2018, Gothenburg, Sweden, May 27, 2018

2017
A scalable resource provisioning scheme for the cloud using peer to peer resource discovery and multi-attribute utility theory.
Int. J. Cloud Comput., 2017

DTCTH: a discriminative local pattern descriptor for image classification.
EURASIP J. Image Video Process., 2017

2013
TFPaaS: Test-first Performance as a Service to Cloud for Software Testing Environment.
Int. J. Web Appl., 2013

ProvIntSec: a provenance cognition blueprint ensuring integrity and security for real life open source cloud.
Int. J. Inf. Priv. Secur. Integr., 2013


  Loading...