Follow
Rezvan Mahdavi-Hezaveh
Title
Cited by
Cited by
Year
A systematic mapping study of infrastructure as code research
A Rahman, R Mahdavi-Hezaveh, L Williams
Information and Software Technology 108, 65-77, 2019
1382019
A systematic mapping study of infrastructure as code research
A Rahman, R Mahdavi-Hezaveh, L Williams
Information and Software Technology 108, 65-77, 2019
1382019
Software development with feature toggles: practices used by practitioners
R Mahdavi-Hezaveh, J Dremann, L Williams
Empirical Software Engineering 26 (1), 1-33, 2021
282021
Fdmd: Feature-driven methodology development
R Mahdavi-Hezave, R Ramsin
2015 International Conference on Evaluation of Novel Approaches to Software …, 2015
232015
What are the attackers doing now? Automating cyberthreat intelligence extraction from text on pace with the changing threat landscape: A survey
MR Rahman, RM Hezaveh, L Williams
ACM Computing Surveys 55 (12), 1-36, 2023
192023
A literature review on mining cyberthreat intelligence from unstructured texts
MR Rahman, R Mahdavi-Hezaveh, L Williams
2020 International Conference on Data Mining Workshops (ICDMW), 516-525, 2020
182020
Feature toggles as code: Heuristics and metrics for structuring feature toggles
R Mahdavi-Hezaveh, N Ajmeri, L Williams
Information and Software Technology 145, 106813, 2022
92022
Feature toggle driven development: Practices usedby practitioners
R Mahdavi-Hezaveh, J Dremann, L Williams
arXiv preprint arXiv:1907.06157, 2019
42019
Attackers reveal their arsenal: An investigation of adversarial techniques in CTI reports
MR Rahman, SK Basak, RM Hezaveh, L Williams
arXiv preprint arXiv:2401.01865, 2024
2024
Attackers reveal their arsenal: An investigation of adversarial techniques in CTI reports
M Rayhanur Rahman, SK Basak, R Mahdavi Hezaveh, L Williams
arXiv e-prints, arXiv: 2401.01865, 2024
2024
A Comprehensive Model of Software Configuration.
R Mahdavi Hezaveh
2022
An Extended Model of Software Configuration
R Mahdavi-Hezaveh, S Fatima, L Williams
arXiv preprint arXiv:2212.00505, 2022
2022
What are the attackers doing now? Automating cyber threat intelligence extraction from text on pace with the changing threat landscape: A survey
M Rayhanur Rahman, R Mahdavi-Hezaveh, L Williams
arXiv e-prints, arXiv: 2109.06808, 2021
2021
The system can't perform the operation now. Try again later.
Articles 1–13