publications
2024
- Towards a Taxonomy of Challenges in Security Control ImplementationIn 2024 Annual Computer Security Application Conference, 2024
- ChronoCTI: Mining Knowledge Graph of Temporal Relations among Cyberattack ActionsIn IEEE International Conference on Data Mining, 2024
- Attackers reveal their arsenal: An investigation of adversarial techniques in CTI reports(In review) ACM Transactions on Software Engineering and Methodology, 2024
-
2022
- What are the attackers doing now? Automating cyberthreat intelligence extraction from text on pace with the changing threat landscape: A surveyACM Computing Surveys, Apr 2022
- Why secret detection tools are not enough: It’s not just about false positives-An industrial case studyEmpirical Software Engineering, Apr 2022
- Investigating co-occurrences of MITRE ATT\backslash&CK TechniquesarXiv preprint arXiv:2211.06495, Apr 2022
- From Threat Reports to Continuous Threat Intelligence: A Comparison of Attack Technique Extraction Methods from Textual ArtifactsarXiv preprint arXiv:2210.02601, Apr 2022
- An investigation of security controls and MITRE ATT\backslash&CK techniquesarXiv preprint arXiv:2211.06500, Apr 2022
2021
- Security smells in ansible and chef scripts: A replication studyACM Transactions on Software Engineering and Methodology (TOSEM), Apr 2021
2020
- A literature review on mining cyberthreat intelligence from unstructured textsIn 2020 International Conference on Data Mining Workshops (ICDMW), Apr 2020
- Do configuration management tools make systems more secure? an empirical research planIn Proceedings of the 7th Symposium on Hot Topics in the Science of Security, Apr 2020
2019
2018
- MMRUC3: A recommendation approach of move method refactoring using coupling, cohesion, and contextual similarity to enhance software designSoftware: Practice and Experience, Apr 2018
- Mobicomonkey: Context testing of android appsIn Proceedings of the 5th International Conference on Mobile Software Engineering and Systems, Apr 2018
2017
- Dtcth: a discriminative local pattern descriptor for image classificationEURASIP Journal on Image and Video Processing, Apr 2017
- Recommendation of Move Method Refactoring to Optimize Modularization Using Conceptual SimilarityInternational Journal of Information Technology and Computer Science, Apr 2017
- A scalable resource provisioning scheme for the cloud using peer to peer resource discovery and multi-attribute utility theoryInternational Journal of Cloud Computing, Apr 2017
2013
- Provintsec: a provenance cognition blueprint ensuring integrity and security for real life open source cloudInternational Journal of Information Privacy, Security and Integrity, Apr 2013