Minhaz Zibran

Minhaz Zibran
Verified
Minhaz verified their affiliation via an institutional email.
Verified
Minhaz verified their affiliation via an institutional email.
Idaho State University | ISU · Computer Science

Doctor of Philosophy

About

63
Publications
11,602
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,404
Citations
Introduction
My research in software engineering and cybersecurity fights software bugs and security vulnerabilities using program code analysis and manipulation while also taking into account the human factors that affect software quality. My research methodology involves static (and dynamic) program analysis, sentiment analysis, source code manipulation, empirical studies, prototype development and evaluations.

Publications

Publications (63)
Chapter
Full-text available
Phishing emails, a type of cyberattack using fake emails, are difficult to recognize due to sophisticated techniques employed by attackers. In this paper, we use a natural language processing (NLP) and machine learning (ML) based approach for detecting phishing emails. We compare the efficacy of six different ML algorithms for the purpose. An empir...
Chapter
Full-text available
Smartphones are equipped with a wide variety of sensors, which can pose significant security and privacy risks if not properly protected. To assess the privacy and security risks of smartphone sensors, we first systematically reviewed 55 research papers. Driven by the findings of the systematic review, we carried out a follow-up questionnaire-based...
Conference Paper
Full-text available
Passwords are a ubiquitous element of our digital age, and the need for secure passwords is indispensable. However, traditionally secure passwords tends to be very difficult to remember, leading users to frustration in having to remake them or even abandoning secure ones for the sake of memorability. On the other hand, passwords that are considered...
Conference Paper
Full-text available
Bug fixing is a very important activity of software maintenance. Given the recent highlight on security and privacy, one may expect that the software vendors would give security bugs a higher priority in their bug fixing process. In this paper, we present an exploratory study of different categories (i.e., security, performance, and other) of bugs...
Technical Report
Full-text available
Biometric authentication comes in play to release the users from the difficulties of remembering and protecting passwords as required by traditional authenti-cation systems. Among all the biometrics in use today, eye biometrics (iris and retina) offers the highest level of uniqueness, universality, permanence, and accuracy. Despite these convincing...
Article
Full-text available
A deep understanding of the common patterns of bug-fixing changes is useful in several ways: (a) such knowledge can help developers in proactively avoiding coding patterns that lead to bugs and (b) bug-fixing patterns are exploited in devising techniques for automatic bug localization and program repair. This work includes an in-depth quantitative...
Chapter
Full-text available
Software development is highly dependent on human efforts and collaborations, which are immensely affected by emotions. This paper presents a quantitative empirical study of the emotional variations in different types of development activities (e.g., bug-fixing tasks), development periods (i.e., days and times) and in projects of different sizes in...
Preprint
Full-text available
Duplicated code or code clones are a kind of code smell that have both positive and negative impacts on the development and maintenance of software systems. Software clone research in the past mostly focused on the detection and analysis of code clones, while research in recent years extends to the whole spectrum of clone management. In the last de...
Chapter
Full-text available
In the originally published version of the chapter 12, the name of one of the contributors was mistakenly omitted. The authorship information has been corrected by adding the author Minhaz Zibran, affiliated with Computer Science Department at the University of New Orleans, Louisiana, USA.
Conference Paper
Full-text available
Web spam is a serious threat for both end-users and search engines (w.r.t., query cost). Webgraphs can be exploited in detecting spam. In the past, several graph mining techniques were applied to measure metrics for pages and hyperlinks. In this paper, we justify the importance of webgraph to distinguish spam websites from non-spam ones based on se...
Preprint
Full-text available
Code readability and software complexity are important software quality metrics that impact other software metrics such as maintainability, reusability, portability and reliability. This paper presents an empirical study of the relationships between code readability and program complexity. The results are derived from an analysis of 35 Java program...
Conference Paper
Full-text available
Emotion analysis in text has drawn recent interests in the software engineering (SE) community. Existing domain-independent techniques for automated emotion/sentiment analysis perform poorly when operated on SE text. Thus, a few SE domain-specific tools are recently developed for detecting sentimental polarities (e.g., positivity, negativity). But,...
Conference Paper
Full-text available
This paper addresses the hindrances behind software developers' failures as perceived from software build failures. We capture and correlate the routines and patterns of developers' interactions in IDE, their backgrounds, expertise, and geographic locations with their failure instances. Our study is based on a large dataset of 85 developers' 11 mil...
Article
Automated sentiment analysis in software engineering textual artifacts has long been suffering from inaccuracies in those few tools available for the purpose. We conduct an in-depth qualitative study to identify the difficulties responsible for such low accuracy. Majority of the exposed difficulties are then carefully addressed through building a d...
Conference Paper
Full-text available
Existing tools for automated sentiment analysis in software engineering text suffer from either or both of two limitations. First, they are developed for non-technical domain and perform poorly when operated on software engineering text. Second, those tools attempt to detect valence only, and cannot capture arousal or individual emotional states su...
Article
Full-text available
Software development is highly dependent on human efforts and collaborations, which are immensely affected by emotions. This paper presents a quantitative empirical study of the emotional variations in different types of development activities e.g., bug-fixing tasks, development periods i.e., days and times and in projects of different sizes involv...
Conference Paper
Full-text available
Bug-reports are valuable sources of information. However, study of the bug-reports' content written in natural language demands tedious human efforts for manual interpretation. This difficulty limits the scale of empirical studies, which rely on interpretation and categorization of bug-reports. In this work, we investigate the effectiveness of Labe...
Conference Paper
Full-text available
Code clones are serious code smells. To investigate bug-proneness of clones as opposed to clone-free source code, earlier attempts have studied the stability of code clones and their contributions to program faults. This paper presents a comparative study on different types of clones and non-cloned code on the basis of their vulnerabilities, which...
Article
Full-text available
Clone analysis and visualization help in understanding characteristics of clones and indicate potential clones as cost-effective candidates for refactoring. Many studies have analyzed clones and their evolution while a number of techniques have also been proposed for visualizing clones for aiding clone analysis. However, clone analyses and visualiz...
Conference Paper
Full-text available
Duplicated code or code clones are a kind of code smell that have both positive and negative impacts on the development and maintenance of software systems. Software clone research in the past mostly focused on the detection and analysis of code clones, while research in recent years extends to the whole spectrum of clone management. In the last de...
Article
Full-text available
Clone management has drawn immense interest from the research community in recent years. It is recognized that a deep understanding of how code clones change and are refactored is necessary for devising effective clone management tools and techniques. This paper presents an empirical study based on the clone genealogies from a significant number of...
Article
Full-text available
Duplicated or similar source code, also known as code clones, are possible malicious `code smells?? that may need to be removed through refactoring to enhance maintainability. Among many potential refactoring opportunities, the choice and order of a set of refactoring activities may have distinguishable effect on the design/code quality measured in...
Conference Paper
Full-text available
Dynamic web pages composed of inter-woven (tangled) source code written in multiple programming languages (e.g., HTML, PHP, JavaScript, CSS) makes it difficult to analyze and manage clones in web applications. Despite more than a decade of research on software clones, there are not many studies towards the investigation of code clones in web applic...
Conference Paper
Full-text available
Clone management has drawn immense interest from the research community in recent years. It is recognized that a deep understanding of how code clones change and are refactored is necessary for devising effective clone management tools and techniques. This paper presents an empirical study based on the clone genealogies from a significant number of...
Article
This paper summarizes some discussions at Dagstuhl Seminar #12071 Software Clone Management Towards Industrial Application on alternatives envisioned for clone management within the software development process.
Article
Full-text available
Code clone is a well-known code smell that needs to be detected and managed during the software development process. However, the existing clone detectors have one or more of the three shortcomings: (a) limitation in detecting Type-3 clones, (b) they come as stand-alone tools separate from IDE and thus cannot support clone-aware development, (c) th...
Conference Paper
Full-text available
Software development today has been largely dependent on the use of API libraries, frameworks, and reusable components. However, the API usability issues often increase the development cost (e.g., time, effort) and lower code quality. In this regard, we study 1,513 bug-posts across five different bug repositories, using both qualitative and quantit...
Conference Paper
Full-text available
Duplicated code, also known as code clones, are one of the malicious 'code smells' that often need to be removed through refactoring for enhancing maintainability. Among all the potential refactoring opportunities, the choice and order of a set of refactoring activities may have distinguishable effect on the design/code quality. Moreover, there may...
Conference Paper
Full-text available
In this paper, we propose an IDE-based clone management system to flexibly detect, manage, and refactor both exact and near-miss code clones. Using a k-difference hybrid suffix tree algorithm we can efficiently detect both exact and near-miss clones. We have implemented the algorithm as a plugin to the Eclipse IDE, and have been extending this for...
Conference Paper
Full-text available
Effort for development and maintenance of complex large software is believed to have dependency on the amount of duplicated code fragments (code clones) present in code-bases. For example, clones need to be carefully and consistently maintained and/or refactored for preventing accidental error propagation. Thus it is important to understand the pro...
Conference Paper
Full-text available
Code clone genealogies show how clone groups evolve with the evolution of the associated software system, and thus could provide important insights on the maintenance implications of clones. In this paper, we provide an in-depth empirical study for evaluating clone genealogies in evolving open source systems at the release level. We develop a clone...
Article
Full-text available
Use of APIs is an inseparable part of software development today. But programmers often find difficulties in using those APIs in client code [27]. This reduces programmers' productivity as well as quality of the client code [30]. Therefore, APIs should be implemented to have high usability, and to this extent a good understanding of what makes APIs...
Article
Full-text available
To bring coherence between Wireless Access Protocol (WAP) and Hyper Text Transfer Protocol (HTTP), in this paper, we have proposed an enhanced Internet framework, which incorporates a new markup language and a browser compatible with both of the access control protocols. This Markup Language and the browser enables co-existence of both Hyper Text M...
Conference Paper
Full-text available
To bring coherence between wireless access protocol (WAP) and hyper text transfer protocol (HTTP), in this paper, we have proposed an enhanced Internet framework, which incorporates a new markup language and a browser compatible with both of the access control protocols. This markup language and the browser enables co-existence of both hyper text m...
Article
Full-text available
Software testing has been an integral part of software development process in order to ensure software quality. We conduct testing in the software verification process to iden-tify and remove faults and bugs in the software under development. For software quality assurance (QA) these tests have to be good and effective. Therefore, a notion to evalu...
Article
Full-text available
Access control and authentication have become very com-mon activities at this modern information age to ensure information security and authorized access to the information. Traditional authenti-cation mechanisms require the users to remember secret words or phrase, or carry identification documents like passports, smart cards, etc. Bio-metric auth...
Article
Full-text available
Chi-square (X 2) test is a nonparametric statistical analyzing method often used in exper-imental work where the data consist in frequencies or 'counts' – for example the number of boys and girls in a class having their tonsils out – as distinct from quantitative data obtained from measurement of continuous variables such as temperature, height, an...
Article
Full-text available
In this paper I present a study on "S/MIME", which has become the industry standard for secure email exchange. Based on existing literature review, the study examines S/MIME in depth with specific emphasis on its architecture, strengths, and deficiencies. The study also identifies usability issues related to S/MIME enabled email clients, which indi...

Network

Cited By