Xi commandments of kubernetes security: A systematization of knowledge related to kubernetes security practices MSI Shamim, FA Bhuiyan, A Rahman 2020 IEEE Secure Development (SecDev), 58-64, 2020 | 62 | 2020 |
Xi commandments of kubernetes security: A systematization of knowledge related to kubernetes security practices. In 2020 IEEE Secure Development (SecDev) MSI Shamim, FA Bhuiyan, A Rahman IEEE Computer Society, Los Alamitos, CA, USA, 58ś64. https://doi. org/10 …, 2020 | 15 | 2020 |
Testing practices for infrastructure as code MM Hasan, FA Bhuiyan, A Rahman Proceedings of the 1st ACM SIGSOFT International Workshop on Languages and …, 2020 | 14 | 2020 |
Uncertainty quantification in multimodal ensembles of deep learners KE Brown, FA Bhuiyan, DA Talbert The thirty-third international flairs conference, 2020 | 12 | 2020 |
Characterizing co-located insecure coding patterns in infrastructure as code scripts FA Bhuiyan, A Rahman Proceedings of the 35th IEEE/ACM International Conference on Automated …, 2020 | 9 | 2020 |
Security bug report usage for software vulnerability research: a systematic mapping study FA Bhuiyan, MB Sharif, A Rahman IEEE Access 9, 28471-28495, 2021 | 5 | 2021 |
Can we use software bug reports to identify vulnerability discovery strategies? FA Bhuiyan, R Shakya, A Rahman Proceedings of the 7th Symposium on Hot Topics in the Science of Security, 1-10, 2020 | 5 | 2020 |
Stock price prediction: comparison of different moving average techniques using deep learning model MM Billah, A Sultana, F Bhuiyan, MG Kaosar Neural Computing and Applications, 1-11, 2024 | 3 | 2024 |
Towards automation for MLOps: an exploratory study of bot usage in deep learning libraries A Rahman, FA Bhuiyan, MM Hassan, H Shahriar, F Wu 2022 IEEE 46th Annual Computers, Software, and Applications Conference …, 2022 | 3 | 2022 |
Vulnerability discovery strategies used in software projects FA Bhuiyan, A Rahman, P Morrison Proceedings of the 35th IEEE/ACM International Conference on Automated …, 2020 | 3 | 2020 |
Verifiability package for paper FA Bhuiyan, A Rahman, P Morrison | 3 | 2020 |
Log-related coding patterns to conduct postmortems of attacks in supervised learning-based projects FA Bhuiyan, A Rahman ACM Transactions on Privacy and Security 26 (2), 1-24, 2023 | 1 | 2023 |
Assessing modality selection heuristics to improve multimodal machine learning for malware detection FA Bhuiyan, KE Brown, MB Sharif, QD Johnson, DA Talbert The thirty-third international flairs conference, 2020 | 1 | 2020 |
Shifting Left for Machine Learning: An Empirical Study of Security Weaknesses in Supervised Learning-based Projects FA Bhuiyan, S Prowell, H Shahriar, F Wu, A Rahman 2022 IEEE 46th Annual Computers, Software, and Applications Conference …, 2022 | | 2022 |
Leveraging Vulnerability Discovery Strategies for Secure Development of Supervised Learning Projects FA Bhuiyan Tennessee Technological University, 2022 | | 2022 |
Practitioner Perception of Vulnerability Discovery Strategies FA Bhuiyan, J Murphy, P Morrison, A Rahman 2021 IEEE/ACM 2nd International Workshop on Engineering and Cybersecurity of …, 2021 | | 2021 |
A vision to mitigate bioinformatics software development challenges A Rahman, FA Bhuiyan Proceedings of the 35th IEEE/ACM International Conference on Automated …, 2020 | | 2020 |
Assessing Modality Selection Heuristics to Improve Multimodal Deep Learning for Malware Detection FA Bhuiyan, K Brown, MB Sharif, QD Johnson, DA Talbert Proceedings of Student Research and Creative Inquiry Day 4, 2020 | | 2020 |
Solving Multimodal Problem using Deep Learning: Speaker Identification FA Bhuiyan, MB Sharif Proceedings of Student Research and Creative Inquiry Day 3, 2019 | | 2019 |
Gene Selection and Clustering of Breast Cancer Data FA Bhuiyan, MB Sharif, PJ Tinker, W Eberle, DA Talbert, SK Ghafoor, ... | | 2019 |