Akond Ashfaque Ur Rahman
Orcid: 0000-0002-5056-757XAffiliations:
- Auburn University, USA
- North Carolina State University, USA (former)
According to our database1,
Akond Ashfaque Ur Rahman
authored at least 88 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on github.com
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Transforming online voting: a novel system utilizing blockchain and biometric verification for enhanced security, privacy, and transparency.
Clust. Comput., July, 2024
ACM Comput. Surv., April, 2024
Empir. Softw. Eng., February, 2024
Using AI Assistants in Software Development: A Qualitative Study on Security Practices and Concerns.
CoRR, 2024
Proceedings of the 55th ACM Technical Symposium on Computer Science Education, 2024
Evaluating the Quality of Open Source Ansible Playbooks: An Executability Perspective.
Proceedings of the 4th International Workshop on Software Engineering and AI for Data Quality in Cyber-Physical Systems/Internet of Things, 2024
Does Generative AI Generate Smells Related to Container Orchestration?: An Exploratory Study with Kubernetes Manifests.
Proceedings of the 21st IEEE/ACM International Conference on Mining Software Repositories, 2024
Authentic Learning on DevOps Security with Labware: Git Hooks To Facilitate Automated Security Static Analysis.
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024
Mitigating Insecure Outputs in Large Language Models(LLMs): A Practical Educational Module.
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024
2023
ACM Trans. Softw. Eng. Methodol., July, 2023
Detecting and Characterizing Propagation of Security Weaknesses in Puppet-Based Infrastructure Management.
IEEE Trans. Software Eng., June, 2023
Log-related Coding Patterns to Conduct Postmortems of Attacks in Supervised Learning-based Projects.
ACM Trans. Priv. Secur., May, 2023
Come for syntax, stay for speed, understand defects: an empirical study of defects in Julia programs.
Empir. Softw. Eng., 2023
Teaching DevOps Security Education with Hands-on Labware: Automated Detection of Security Weakness in Python.
CoRR, 2023
Software Supply Chain Vulnerabilities Detection in Source Code: Performance Comparison between Traditional and Quantum Machine Learning Algorithms.
CoRR, 2023
Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and Protection.
CoRR, 2023
Proceedings of the IEEE Secure Development Conference, 2023
Proceedings of the 20th International Conference on Software Architecture, 2023
Proceedings of the 20th International Conference on Software Architecture, 2023
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023
Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and Protection.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023
2022
Benefits, Challenges, and Research Topics: A Multi-vocal Literature Review of Kubernetes.
CoRR, 2022
Proceedings of the IEEE International Conference on Software Analysis, 2022
Development of Blockchain-based e-Voting System: Requirements, Design and Security Perspective.
Proceedings of the IEEE International Conference on Trust, 2022
Can We use Authentic Learning to Educate Students about Secure Infrastructure as Code Development?
Proceedings of the ITiCSE 2022: Innovation and Technology in Computer Science Education, Dublin, Ireland, July 8, 2022
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2022
Proceedings of the 15th IEEE Conference on Software Testing, Verification and Validation, 2022
Evolution of Quantum Computing: A Systematic Survey on the Use of Quantum Computing Tools.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022
Towards Automation for MLOps: An Exploratory Study of Bot Usage in Deep Learning Libraries.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022
Shifting Left for Machine Learning: An Empirical Study of Security Weaknesses in Supervised Learning-based Projects.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022
Proceedings of the IEEE International Conference on Big Data, 2022
Software Supply Chain Vulnerabilities Detection in Source Code: Performance Comparison between Traditional and Quantum Machine Learning Algorithms.
Proceedings of the IEEE International Conference on Big Data, 2022
Bie Vote: A Biometric Identification Enabled Blockchain-Based Secure and Transparent Voting Framework.
Proceedings of the Fourth International Conference on Blockchain Computing and Applications, 2022
Proceedings of the ACM SE '22: 2022 ACM Southeast Conference, Virtual Event, April 18, 2022
Vision for a secure Elixir ecosystem: an empirical study of vulnerabilities in Elixir programs.
Proceedings of the ACM SE '22: 2022 ACM Southeast Conference, Virtual Event, April 18, 2022
2021
ACM Trans. Softw. Eng. Methodol., 2021
J. Softw. Eng. Res. Dev., 2021
IEEE Secur. Priv., 2021
Security Bug Report Usage for Software Vulnerability Research: A Systematic Mapping Study.
IEEE Access, 2021
Proceedings of the IEEE Secure Development Conference, 2021
Proceedings of the Quality of Information and Communications Technology, 2021
Proceedings of the 2nd IEEE/ACM International Workshop on Engineering and Cybersecurity of Critical Systems, 2021
Proceedings of the 2nd IEEE/ACM International Workshop on Engineering and Cybersecurity of Critical Systems, 2021
Proceedings of the IEEE Frontiers in Education Conference, 2021
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021
2020
Empir. Softw. Eng., 2020
XI Commandments of Kubernetes Security: A Systematization of Knowledge Related to Kubernetes Security Practices.
Proceedings of the IEEE Secure Development, SecDev 2020, Atlanta, GA, USA, 2020
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering Workshops, 2020
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering Workshops, 2020
Characterizing co-located insecure coding patterns in infrastructure as code scripts.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering Workshops, 2020
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020
Proceedings of the 7th Annual Symposium on Hot Topics in the Science of Security, 2020
Proceedings of the 7th Annual Symposium on Hot Topics in the Science of Security, 2020
Proceedings of the 7th Annual Symposium on Hot Topics in the Science of Security, 2020
2019
Inf. Softw. Technol., 2019
Inf. Softw. Technol., 2019
Proceedings of the 16th International Conference on Mining Software Repositories, 2019
Proceedings of the 16th International Conference on Mining Software Repositories, 2019
Proceedings of the 2019 IEEE International Conference on Software Maintenance and Evolution, 2019
Synthesizing Program Execution Time Discrepancies in Julia Used for Scientific Software.
Proceedings of the 2019 IEEE International Conference on Software Maintenance and Evolution, 2019
Proceedings of the 41st International Conference on Software Engineering, 2019
Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, 2019
Proceedings of the 2019 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 2019
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2019
2018
CoRR, 2018
Characterizing the influence of continuous integration: empirical results from 250+ open source and proprietary projects.
Proceedings of the 4th ACM SIGSOFT International Workshop on Software Analytics, 2018
Proceedings of the 15th International Conference on Mining Software Repositories, 2018
Proceedings of the 11th IEEE International Conference on Software Testing, 2018
Proceedings of the 11th IEEE International Conference on Software Testing, 2018
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018
Proceedings of the 4th International Workshop on Rapid Continuous Software Engineering, 2018
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018
What is the connection between issues, bugs, and enhancements?: lessons learned from 800+ software projects.
Proceedings of the 40th International Conference on Software Engineering: Software Engineering in Practice, 2018
Proceedings of the 40th International Conference on Software Engineering: Software Engineering in Practice, 2018
2017
Proceedings of the 4th IEEE/ACM International Conference on Mobile Software Engineering and Systems, 2017
Proceedings of the 3rd IEEE/ACM International Workshop on Rapid Continuous Software Engineering, 2017
Characterizing Scientific Reporting in Security Literature: An analysis of ACM CCS and IEEE S&P Papers.
Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp, HoTSoS 2017, 2017
2016
Proceedings of the International Workshop on Continuous Software Evolution and Delivery, 2016
Proceedings of the Symposium and Bootcamp on the Science of Security, 2016
2015
Proceedings of the 2015 Agile Conference, 2015
2011
Wirel. Sens. Netw., 2011