default search action
Kazi Zakia Sultana
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Kazi Zakia Sultana, Vaibhav K. Anu, Tai-Yin Chong:
Using software metrics for predicting vulnerable classes in java and python based systems. Inf. Secur. J. A Glob. Perspect. 33(3): 251-267 (2024) - [j6]Zadia Codabux, Kazi Zakia Sultana, Md. Naseef-Ur-Rahman Chowdhury:
A catalog of metrics at source code level for vulnerability prediction: A systematic mapping study. J. Softw. Evol. Process. 36(7) (2024) - 2023
- [j5]Kazi Zakia Sultana, Charles B. Boyd, Byron J. Williams:
A Software Vulnerability Prediction Model Using Traceable Code Patterns and Software Metrics. SN Comput. Sci. 4(5): 599 (2023) - [c23]Minsun Shin, Sumi Hagiwara, Katherine G. Herbert-Berger, Vaibhav K. Anu, Rebecca A. Goldstein, Kazi Zakia Sultana:
Drawing a Computer Scientst: Assessing the Images of the Computer Scientist Among K-8 Teachers. FIE 2023: 1-6 - [c22]Katherine G. Herbert, Vaibhav K. Anu, Kazi Zakia Sultana, Stefan A. Robila, Jesse Ryan Miller, Sumi Hagiwara, Rebecca A. Goldstein, Thomas J. Marlowe:
Professional and Capacity Building in K-12 Computer Science Education: A Multi-Faceted Approach. SIGCSE (2) 2023: 1384 - 2022
- [c21]Erik Maza, Kazi Zakia Sultana:
Identifying Evolution of Software Metrics by Analyzing Vulnerability History in Open Source Projects. BDCAT 2022: 223-232 - [c20]Gowri Pandian Sundarapandi, Raiyan Hossain, Chandana Jasrai, Kazi Zakia Sultana, Zadia Codabux:
Common Programming Mistakes Leading to Information Disclosure: A Preliminary Study. SANER 2022: 743-747 - 2021
- [j4]Kazi Zakia Sultana, Vaibhav K. Anu, Tai-Yin Chong:
Using software metrics for predicting vulnerable classes and methods in Java projects: A machine learning approach. J. Softw. Evol. Process. 33(3) (2021) - [c19]Sayem Mohammad Imtiaz, Kazi Zakia Sultana, Aparna S. Varde:
Mining Learner-friendly Security Patterns from Huge Published Histories of Software Applications for an Intelligent Tutoring System in Secure Coding. IEEE BigData 2021: 4869-4876 - [c18]Andy Zhou, Kazi Zakia Sultana, Bharath K. Samanthula:
Investigating the Changes in Software Metrics after Vulnerability is Fixed. IEEE BigData 2021: 5658-5663 - [c17]Giovanni George, Jeremiah Kotey, Megan Ripley, Kazi Zakia Sultana, Zadia Codabux:
A Preliminary Study on Common Programming Mistakes that Lead to Buffer Overflow Vulnerability. COMPSAC 2021: 1375-1380 - 2020
- [c16]Kazi Zakia Sultana, Zadia Codabux, Byron J. Williams:
Examining the Relationship of Code and Architectural Smells with Software Vulnerabilities. APSEC 2020: 31-40 - [c15]Vaibhav K. Anu, Kazi Zakia Sultana, Bharath K. Samanthula:
A Human Error Based Approach to Understanding Programmer-Induced Software Vulnerabilities. ISSRE Workshops 2020: 49-54 - [c14]Sayem Mohammad Imtiaz, Kazi Zakia Sultana, Tanmay Bhowmik:
SecureChange: An Automated Framework to Guide Programmers in Fixing Vulnerability. SEKE 2020: 560-565 - [i3]Kazi Zakia Sultana, Zadia Codabux, Byron J. Williams:
Examining the Relationship of Code and Architectural Smells with Software Vulnerabilities. CoRR abs/2010.15978 (2020)
2010 – 2019
- 2019
- [j3]Kazi Zakia Sultana, Byron J. Williams, Tanmay Bhowmik:
A study examining relationships between micro patterns and security vulnerabilities. Softw. Qual. J. 27(1): 5-41 (2019) - [c13]Tai-Yin Chong, Vaibhav K. Anu, Kazi Zakia Sultana:
Using Software Metrics for Predicting Vulnerable Code-Components: A Study on Java and Python Open Source Projects. CSE/EUC 2019: 98-103 - [c12]Kazi Zakia Sultana, Tai-Yin Chong:
A Proposed Approach to Build an Automated Software Security Assessment Framework using Mined Patterns and Metrics. CSE/EUC 2019: 176-181 - [c11]Amiangshu Bosu, Kazi Zakia Sultana:
Diversity and Inclusion in Open Source Software (OSS) Projects: Where Do We Stand? ESEM 2019: 1-11 - [c10]Rajshakhar Paul, Amiangshu Bosu, Kazi Zakia Sultana:
Expressions of Sentiments during Code Reviews: Male vs. Female. SANER 2019: 26-37 - 2018
- [c9]Kazi Zakia Sultana, Byron J. Williams, Amiangshu Bosu:
A Comparison of Nano-Patterns vs. Software Metrics in Vulnerability Prediction. APSEC 2018: 355-364 - [i2]Rajshakhar Paul, Amiangshu Bosu, Kazi Zakia Sultana:
Expressions of Sentiments During Code Reviews: Male vs. Female. CoRR abs/1812.05560 (2018) - 2017
- [j2]Zadia Codabux, Kazi Zakia Sultana, Byron J. Williams:
The Relationship Between Code Smells and Traceable Patterns - Are They Measuring the Same Thing? Int. J. Softw. Eng. Knowl. Eng. 27(9-10): 1529-1548 (2017) - [c8]Kazi Zakia Sultana, Ajay Deo, Byron J. Williams:
Correlation Analysis among Java Nano-Patterns and Software Vulnerabilities. HASE 2017: 69-76 - [c7]Kazi Zakia Sultana:
Towards a software vulnerability prediction model using traceable code patterns and software metrics. ASE 2017: 1022-1025 - [c6]Zadia Codabux, Kazi Zakia Sultana, Byron J. Williams:
The Relationship between Traceable Code Patterns and Code Smells. SEKE 2017: 444-449 - 2016
- [c5]Kazi Zakia Sultana, Ajay Deo, Byron J. Williams:
A Preliminary Study Examining Relationships Between Nano-Patterns and Software Security Vulnerabilities. COMPSAC 2016: 257-262 - 2014
- [j1]Kazi Zakia Sultana, Anupam Bhattacharjee, Hasan Jamil:
Querying KEGG pathways in logic. Int. J. Data Min. Bioinform. 9(1): 1-21 (2014) - [i1]Md. Naseef-Ur-Rahman Chowdhury, Suvankar Paul, Kazi Zakia Sultana:
Statistical Analysis based Hypothesis Testing Method in Biological Knowledge Discovery. CoRR abs/1401.2851 (2014) - 2010
- [c4]Kazi Zakia Sultana, Anupam Bhattacharjee, Hasan M. Jamil:
IsoKEGG: A logic based system for querying biological pathways in KEGG. BIBM 2010: 626-631
2000 – 2009
- 2009
- [c3]Kazi Zakia Sultana, Anupam Bhattacharjee, Mohammad Shafkat Amin, Hasan M. Jamil:
A Model for Contextual Cooperative Query Answering in E-Commerce Applications. FQAS 2009: 25-36 - 2006
- [c2]Anupam Bhattacharjee, Zalia Shams, Kazi Zakia Sultana:
New Constraints on Generation of Uniform Random Samples from Evolutionary Trees. CCECE 2006: 115-118 - [c1]Anupam Bhattacharjee, Kazi Zakia Sultana, Zalia Shams:
Dynamic and Parallel Approaches to Optimal Evolutionary Tree Construction. CCECE 2006: 119-122
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint