Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Likely matches
- Akond Ashfaque Ur Rahman
aka: Akond Rahman
Auburn University, USA
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 90 matches
- 2024
- Akond Rahman, Dibyendu Brinto Bose, Farhat Lamia Barsha, Rahul Pandita:
Defect Categorization in Compilers: A Multi-vocal Literature Review. ACM Comput. Surv. 56(4): 104:1-104:42 (2024) - Akond Rahman, Dibyendu Brinto Bose, Yue Zhang, Rahul Pandita:
An empirical study of task infections in Ansible scripts. Empir. Softw. Eng. 29(1): 34 (2024) - Akond Rahman, Yue Zhang, Fan Wu, Hossain Shahriar:
Student Perceptions of Authentic Learning to Learn White-box Testing. SIGCSE (2) 2024: 1784-1785 - 2023
- Akond Rahman, Dibyendu Brinto Bose, Raunak Shakya, Rahul Pandita:
Come for syntax, stay for speed, understand defects: an empirical study of defects in Julia programs. Empir. Softw. Eng. 28(4): 93 (2023) - Farzana Ahamed Bhuiyan, Akond Rahman:
Log-related Coding Patterns to Conduct Postmortems of Attacks in Supervised Learning-based Projects. ACM Trans. Priv. Secur. 26(2): 17:1-17:24 (2023) - Akond Rahman, Shazibul Islam Shamim, Dibyendu Brinto Bose, Rahul Pandita:
Security Misconfigurations in Open Source Kubernetes Manifests: An Empirical Study. ACM Trans. Softw. Eng. Methodol. 32(4): 99:1-99:36 (2023) - Akond Rahman, Chris Parnin:
Detecting and Characterizing Propagation of Security Weaknesses in Puppet-Based Infrastructure Management. IEEE Trans. Software Eng. 49(6): 3536-3553 (2023) - Mst. Shapna Akter, Hossain Shahriar, Sheikh Iqbal Ahamed, Kishor Datta Gupta, Muhammad Rahman, Atef Mohamed, Mohammad Rahman, Akond Rahman, Fan Wu:
Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and Protection. COMPSAC 2023: 1057-1063 - Md Arabin Islam Talukder, Sumaiya Farzana Mishu, Hossain Shahriar, ABM Kamrul Islam Riad, Fan Wu, Akond Rahman:
A Plugin for Kotlin based Android Apps to Detect Security Breaches through Dataflow. COMPSAC 2023: 1840-1845 - Yue Zhang, Muktadir Rahman, Fan Wu, Akond Rahman:
Quality Assurance for Infrastructure Orchestrators: Emerging Results from Ansible. ICSA-C 2023: 1-3 - Yue Zhang, Fan Wu, Akond Rahman:
Practitioner Perceptions of Ansible Test Smells. ICSA-C 2023: 1-3 - Hanyang Hu, Yani Bu, Kristen Wong, Gaurav Sood, Karen Smiley, Akond Rahman:
Characterizing Static Analysis Alerts for Terraform Manifests: An Experience Report. SecDev 2023: 7-13 - Mst. Shapna Akter, Hossain Shahriar, Sheikh Iqbal Ahamed, Kishor Datta Gupta, Muhammad Asadur Rahman, Atef Mohamed, Mohammad Rahman, Akond Rahman, Fan Wu:
Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and Protection. CoRR abs/2306.00284 (2023) - Mst. Shapna Akter, Md. Jobair Hossain Faruk, Nafisa Anjum, Mohammad Masum, Hossain Shahriar, Akond Rahman, Fan Wu, Alfredo Cuzzocrea:
Software Supply Chain Vulnerabilities Detection in Source Code: Performance Comparison between Traditional and Quantum Machine Learning Algorithms. CoRR abs/2306.08060 (2023) - Mst. Shapna Akter, Juanjose Rodriguez-Cardenas, Hossain Shahriar, Akond Rahman, Fan Wu:
Teaching DevOps Security Education with Hands-on Labware: Automated Detection of Security Weakness in Python. CoRR abs/2311.16944 (2023) - 2022
- Dibyendu Brinto Bose, Kaitlyn Cottrell, Akond Rahman:
Vision for a secure Elixir ecosystem: an empirical study of vulnerabilities in Elixir programs. ACM Southeast Regional Conference 2022: 215-218 - Dibyendu Brinto Bose, Gerald C. Gannod, Akond Rahman, Kaitlyn Cottrell:
What questions do developers ask about Julia? ACM Southeast Regional Conference 2022: 224-228 - Md. Jobair Hossain Faruk, Mazharul Islam, Fazlul Alam, Hossain Shahriar, Akond Rahman:
Bie Vote: A Biometric Identification Enabled Blockchain-Based Secure and Transparent Voting Framework. BCCA 2022: 253-258 - Mst. Shapna Akter, Md. Jobair Hossain Faruk, Nafisa Anjum, Mohammad Masum, Hossain Shahriar, Nazmus Sakib, Akond Rahman, Fan Wu, Alfredo Cuzzocrea:
Software Supply Chain Vulnerabilities Detection in Source Code: Performance Comparison between Traditional and Quantum Machine Learning Algorithms. IEEE Big Data 2022: 5639-5645 - Mohammad Masum, Nafisa Anjum, Md. Jobair Hossain Faruk, Hossain Shahriar, Nazmus Sakib, Maria Valero, Mohammed Karim, Akond Rahman, Fan Wu, Alfredo Cuzzocrea:
A Novel Machine Learning Based Framework for Bridge Condition Analysis. IEEE Big Data 2022: 5530-5535 - Farzana Ahamed Bhuiyan, Stacy J. Prowell, Hossain Shahriar, Fan Wu, Akond Rahman:
Shifting Left for Machine Learning: An Empirical Study of Security Weaknesses in Supervised Learning-based Projects. COMPSAC 2022: 798-808 - Mohammad Masum, Mohammad Nazim, Md. Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Md Abdullah Hafiz Khan, Gias Uddin, Shabir Barzanjeh, Erhan Saglamyurek, Akond Rahman, Sheikh Iqbal Ahamed:
Quantum Machine Learning for Software Supply Chain Attacks: How Far Can We Go? COMPSAC 2022: 530-538 - Akond Rahman, Farzana Ahamed Bhuiyan, Mohammad Mehedi Hassan, Hossain Shahriar, Fan Wu:
Towards Automation for MLOps: An Exploratory Study of Bot Usage in Deep Learning Libraries. COMPSAC 2022: 1093-1097 - Paramita Basak Upama, Md. Jobair Hossain Faruk, Mohammad Nazim, Mohammad Masum, Hossain Shahriar, Gias Uddin, Shabir Barzanjeh, Sheikh Iqbal Ahamed, Akond Rahman:
Evolution of Quantum Computing: A Systematic Survey on the Use of Quantum Computing Tools. COMPSAC 2022: 520-529 - Mohammad Mehedi Hassan, Akond Rahman:
As Code Testing: Characterizing Test Quality in Open Source Ansible Development. ICST 2022: 208-219 - Md. Jobair Hossain Faruk, Masrura Tasnim, Hossain Shahriar, Maria Valero, Akond Rahman, Fan Wu:
Investigating Novel Approaches to Defend Software Supply Chain Attacks. ISSRE Workshops 2022: 283-288 - Akond Rahman, Md. Shazibul Islam Shamim, Hossain Shahriar, Fan Wu:
Can We use Authentic Learning to Educate Students about Secure Infrastructure as Code Development? ITiCSE (2) 2022: 631 - Md. Jobair Hossain Faruk, Bilash Saha, Mazharul Islam, Fazlul Alam, Hossain Shahriar, Maria Valero, Akond Rahman, Fan Wu, Md. Zakirul Alam Bhuiyan:
Development of Blockchain-based e-Voting System: Requirements, Design and Security Perspective. TrustCom 2022: 959-967 - Akond Rahman, Tushar Sharma:
Lessons from Research to Practice on Writing Better Quality Puppet Scripts. SANER 2022: 63-67 - Paramita Basak Upama, Md. Jobair Hossain Faruk, Mohammad Nazim, Mohammad Masum, Hossain Shahriar, Gias Uddin, Shabir Barzanjeh, Sheikh Iqbal Ahamed, Akond Rahman:
Evolution of Quantum Computing: A Systematic Survey on the Use of Quantum Computing Tools. CoRR abs/2204.01856 (2022)
skipping 60 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-03-29 11:03 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint