Follow
Muhammad Nadeem
Muhammad Nadeem
Mississippi State University
Verified email at ieee.org
Title
Cited by
Cited by
Year
High false positive detection of security vulnerabilities: a case study
M Nadeem, BJ Williams, EB Allen
Proceedings of the 50th Annual Southeast Regional Conference, 359-360, 2012
212012
A method for recommending computer-security training for software developers: Leveraging the power of static analysis techniques and vulnerability repositories
M Nadeem, EB Allen, BJ Williams
2015 12th International Conference on Information Technology-New Generations …, 2015
92015
Computer Security Training Recommender for Developers.
M Nadeem, EB Allen, BJ Williams
RecSys Posters, 2014
62014
An automated approach to fix buffer overflows
A Shahab, M Nadeem, M Alenezi, R Asif
International Journal of Electrical and Computer Engineering 10 (4), 3777, 2020
52020
Recommending training topics for developers based on static analysis of security vulnerabilities
S Muneer, M Nadeem, EB Allen
Poster Proceedings: 52nd ACM Southeast Conference, 2014
52014
Security assessment framework for educational erp systems
H Ashraf, M Alenezi, M Nadeem, Y Javid
International Journal of Electrical and Computer Engineering (IJECE) 9 (6 …, 2019
42019
Comparison of modern techniques for analyzing NFRs in Agile: A systematic literature review
SU Muneer, M Nadeem, B Kasi
Journal of Software Engineering Practice 3 (3), 1-12, 2019
32019
Human Subject Evaluation of Computer-Security Training Recommender
M Nadeem, BJ Williams, GL Bradshaw, EB Allen
2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC …, 2016
12016
Notations for facilitating software security design
M Nadeem, AHS Bukhari
Journal of Applied and Emerging Sciences 2 (1), pp12-18, 2011
12011
A Method for Recommending Computer-Security Training for Software Developers
M Nadeem
Mississippi State University, 2020
2020
Recommending Trainings for Developers Based on Static Analysis of Security Vulnerabilities
S Muneer, M Nadeem, EB Allen
2014
USING PUBLIC VULNERABILITIES DATA TO SELF-HEAL SECURITY ISSUES IN SOFTWARE SYSTEMS
Y Javed
The system can't perform the operation now. Try again later.
Articles 1–12