skip to main content


Search for: All records

Creators/Authors contains: "Rahman, A"

Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

  1. Free, publicly-accessible full text available July 2, 2025
  2. Free, publicly-accessible full text available July 2, 2025
  3. Free, publicly-accessible full text available July 2, 2025
  4. The field of DevOps security education necessitates innovative approaches to effectively address the ever evolving challenges of cybersecurity. Adopting a student-centered approach, there is the need for the design and development of a comprehensive set of hands-on learning modules. In this paper, we introduce hands-on learning modules that enable learners to be familiar with identifying known security weaknesses, based on taint tracking to accurately pinpoint vulnerable code. To cultivate an engaging and motivating learning environment, our hands-on approach includes a pre-lab, hands-on and post-lab sections. They all provide introduction to specific DevOps topics and software security problems at hand, followed by practicing with real world code examples having security issues to detect them using tools. The initial evaluation results from a number of courses across multiple schools show that the hands-on modules are enhancing the interests among students on software security and cybersecurity, while preparing them to address DevOps security vulnerabilities. 
    more » « less
  5. Abstract A steady supply of hosts at the susceptible stage for parasitism is a major component of mass rearing parasitoids for biological control programs. Here we describe the effects of storing 5th instar Plodia interpunctella larvae in dormancy on subsequent host development in the context of host colony maintenance and effects of the duration of host dormancy on the development of Habrobracon hebetor parasitoids reared from dormant hosts. We induced dormancy with a combination of short daylength (12L:12D) and lower temperature (15°C), conditions known to induce diapause in this species, and held 5th instar larvae of P. interpunctella for a series of dormancy durations ranging from 15 to 105 days. Extended storage of dormant 5th instar larvae had no significant impacts on survival, development, or reproductive potential of P. interpunctella , reinforcing that dormant hosts have a substantial shelf life. This ability to store hosts in dormancy for more than 3 months at a time without strong negative consequences reinforces the promise of using dormancy to maintain host colonies. The proportion of hosts parasitized by H. hebetor did not vary significantly between non-dormant host larvae and dormant host larvae stored for periods as long as 105 days. Concordant with a prior study, H. hebetor adult progeny production from dormant host larvae was higher than the number of progeny produced on non-dormant host larvae. There were no differences in size, sex ratio, or reproductive output of parasitoids reared on dormant hosts compared to non-dormant hosts stored for up to 105 days. Larval development times of H. hebetor were however longer when reared on dormant hosts compared to non-dormant hosts. Our results agree with other studies showing using dormant hosts can improve parasitoid mass rearing, and we show benefits for parasitoid rearing even after 3 months of host dormancy. 
    more » « less
  6. The software supply chain (SSC) attack has become one of the crucial issues that are being increased rapidly with the advancement of the software development domain. In general, SSC attacks execute during the software development processes lead to vulnerabilities in software products targeting downstream customers and even involved stakeholders. Machine Learning approaches are proven in detecting and preventing software security vulnerabilities. Besides, emerging quantum machine learning can be promising in addressing SSC attacks. Considering the distinction between traditional and quantum machine learning, performance could be varies based on the proportions of the experimenting dataset. In this paper, we conduct a comparative analysis between quantum neural networks (QNN) and conventional neural networks (NN) with a software supply chain attack dataset known as ClaMP. Our goal is to distinguish the performance between QNN and NN and to conduct the experiment, we develop two different models for QNN and NN by utilizing Pennylane for quantum and TensorFlow and Keras for traditional respectively. We evaluated the performance of both models with different proportions of the ClaMP dataset to identify the f1 score, recall, precision, and accuracy. We also measure the execution time to check the efficiency of both models. The demonstration result indicates that execution time for QNN is slower than NN with a higher percentage of datasets. Due to recent advancements in QNN, a large level of experiments shall be carried out to understand both models accurately in our future research. 
    more » « less