1. What are the attackers doing now? Automating cyberthreat intelligence extraction from text on pace with the changing threat landscape: A survey
    Md Rayhanur Rahman, Rezvan Mahdavi-Hezaveh, and Laurie Williams
    ACM Computing Surveys, 2023
  2. Mining Temporal Attack Patterns from Cyberthreat Intelligence Reports
    Md Rayhanur Rahman, Brandon Wroblewski, Quinn Matthews, and 3 more authors
    (In review) IEEE Transactions on Software Engineering, 2023
  3. Attackers reveal their arsenal: An investigation of adversarial techniques in CTI reports
    Md Rayhanur Rahman, Rezvan Mahdavi Hezaveh, Setu Basak, and 1 more author
    (In review) ACM Transactions on Privacy and Security, 2023
  4. A Survey on Software Vulnerability Exploitability Assessment
    Sarah Elder, Md Rayhanur Rahman, Gage finger, and 2 more authors
    (In review) ACM Transactions on Privacy and Security, 2023


  1. Why secret detection tools are not enough: It’s not just about false positives-An industrial case study
    Md Rayhanur Rahman, Nasif Imtiaz, Margaret-Anne Storey, and 1 more author
    Empirical Software Engineering, 2022
  2. Investigating co-occurrences of MITRE ATT\backslash&CK Techniques
    Md Rayhanur Rahman, and Laurie Williams
    arXiv preprint arXiv:2211.06495, 2022
  3. From Threat Reports to Continuous Threat Intelligence: A Comparison of Attack Technique Extraction Methods from Textual Artifacts
    Md Rayhanur Rahman, and Laurie Williams
    arXiv preprint arXiv:2210.02601, 2022
  4. An investigation of security controls and MITRE ATT\backslash&CK techniques
    Md Rayhanur Rahman, and Laurie Williams
    arXiv preprint arXiv:2211.06500, 2022


  1. Security smells in ansible and chef scripts: A replication study
    Akond Rahman, Md Rayhanur Rahman, Chris Parnin, and 1 more author
    ACM Transactions on Software Engineering and Methodology (TOSEM), 2021


  1. A literature review on mining cyberthreat intelligence from unstructured texts
    Md Rayhanur Rahman, Rezvan Mahdavi-Hezaveh, and Laurie Williams
    In 2020 International Conference on Data Mining Workshops (ICDMW), 2020
  2. Do configuration management tools make systems more secure? an empirical research plan
    Md Rayhanur Rahman, William Enck, and Laurie Williams
    In Proceedings of the 7th Symposium on Hot Topics in the Science of Security, 2020


  1. Share, but be aware: Security smells in python gists
    Md Rayhanur Rahman, Akond Rahman, and Laurie Williams
    In 2019 IEEE International conference on software maintenance and evolution (ICSME), 2019


  1. MMRUC3: A recommendation approach of move method refactoring using coupling, cohesion, and contextual similarity to enhance software design
    Md Masudur Rahman, Rashed Rubby Riyadh, Shah Mostafa Khaled, and 2 more authors
    Software: Practice and Experience, 2018
  2. Mobicomonkey: Context testing of android apps
    Amit Seal Ami, Md Mehedi Hasan, Md Rayhanur Rahman, and 1 more author
    In Proceedings of the 5th International Conference on Mobile Software Engineering and Systems, 2018


  1. Dtcth: a discriminative local pattern descriptor for image classification
    Md Mostafijur Rahman, Shanto Rahman, Md Rayhanur Rahman, and 2 more authors
    EURASIP Journal on Image and Video Processing, 2017
  2. Recommendation of Move Method Refactoring to Optimize Modularization Using Conceptual Similarity
    Md Masudur Rahman, Md Rayhanur Rahman, and BM Mainul Hossain
    International Journal of Information Technology and Computer Science, 2017
  3. A scalable resource provisioning scheme for the cloud using peer to peer resource discovery and multi-attribute utility theory
    Md Rayhanur Rahman, and Kazi Sakib
    International Journal of Cloud Computing, 2017


  1. Provintsec: a provenance cognition blueprint ensuring integrity and security for real life open source cloud
    Asif Imran, Alim Ul Gias, Md Rayhanur Rahman, and 1 more author
    International Journal of Information Privacy, Security and Integrity, 2013