Hossain Shahriar

ORCID: 0000-0003-1021-7986
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Malware Detection Techniques
  • Network Security and Intrusion Detection
  • Web Application Security Vulnerabilities
  • Security and Verification in Computing
  • Software Testing and Debugging Techniques
  • Spam and Phishing Detection
  • Blockchain Technology Applications and Security
  • Anomaly Detection Techniques and Applications
  • Software Engineering Research
  • Information and Cyber Security
  • Software Reliability and Analysis Research
  • IoT and Edge/Fog Computing
  • Digital and Cyber Forensics
  • User Authentication and Security Systems
  • Quantum Computing Algorithms and Architecture
  • Mobile Health and mHealth Applications
  • Electronic Health Records Systems
  • Internet Traffic Analysis and Secure E-voting
  • Privacy, Security, and Data Protection
  • Quantum Information and Cryptography
  • Scientific Computing and Data Management
  • Software System Performance and Reliability
  • Context-Aware Activity Recognition Systems
  • Cloud Computing and Resource Management
  • Privacy-Preserving Technologies in Data

University of West Florida
2023-2025

Kennesaw State University
2014-2023

Jahangirnagar University
2023

Los Alamitos Medical Center
2023

Tennessee Technological University
2022

Sultan Idris Education University
2022

Systems Technology (United States)
2022

Tuskegee University
2022

National Institute of Information and Communications Technology
2021

University of Nottingham Ningbo China
2021

Malicious attacks, malware, and ransomware families pose critical security issues to cybersecurity, it may cause catastrophic damages computer systems, data centers, web, mobile applications across various industries businesses. Traditional anti-ransomware systems struggle fight against newly created sophisticated attacks. Therefore, state-of-the-art techniques like traditional neural network-based architectures can be immensely utilized in the development of innovative solutions. In this...

10.1109/ccwc54503.2022.9720869 article EN 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC) 2022-01-26

With the rapid technological advancement, security has become a major issue due to increase in malware activity that poses serious threat and safety of both computer systems stakeholders. To maintain stakeholders, particularly, end users security, protecting data from fraudulent efforts is one most pressing concerns. A set malicious programming code, scripts, active content, or intrusive software designed destroy intended programs mobile web applications referred as malware. According study,...

10.1109/bigdata52589.2021.9671434 article EN 2021 IEEE International Conference on Big Data (Big Data) 2021-12-15

Traditional network intrusion detection approaches encounter feasibility and sustainability issues to combat modern, sophisticated, unpredictable security attacks. Deep neural networks (DNN) have been successfully applied for problems. The optimal use of DNN-based classifiers requires careful tuning the hyper-parameters. Manually hyperparameters is tedious, time-consuming, computationally expensive. Hence, there a need an automatic technique find best DNN in detection. This paper proposes...

10.1109/bigdata52589.2021.9671576 article EN 2021 IEEE International Conference on Big Data (Big Data) 2021-12-15

Quantum Computing (QC) refers to an emerging paradigm that inherits and builds with the concepts phenomena of Mechanic (QM) significant potential unlock a remarkable opportunity solve complex computationally intractable problems scientists could not tackle previously. In recent years, tremendous efforts progress in QC mark milestone solving real-world much more efficiently than classical computing technology. While considerable is being made move quantum research need be devoted this domain...

10.1109/compsac54236.2022.00096 article EN 2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC) 2022-06-01

With the ever-growing concern for internet security, field of quantum cryptography emerges as a promising solution enhancing security networking systems. In this paper, 20 notable papers from leading conferences and journals are reviewed categorized based on their focus various aspects cryptography, including key distribution, bit commitment, post-quantum counterfactual distribution. The paper explores motivations challenges employing addressing privacy concerns along with existing...

10.1109/bigdata59044.2023.10386889 article EN 2021 IEEE International Conference on Big Data (Big Data) 2023-12-15

Web Application Firewalls (WAFs) are deployed to protect web applications and they offer in depth security as long configured correctly. A problem arises when there is over-reliance on these tools. false sense of can be obtained with the implementation a WAF. In this paper, we provide an overview traffic filtering models some suggestions avail benefit app firewall.

10.1109/compsac.2018.00144 article EN 2018-06-22

A decision tree is an important classification technique in data mining classification. Decision trees have proved to be valuable tools for the classification, description, and generalization of data. J48 a algorithm which used create model. open source Java implementation C4.5 Weka tool. In this paper, we present method improving accuracy with preprocessing. We applied supervised filter discretization on construct tree. compared results without discretization. The obtained from experiments...

10.1109/compsac.2017.146 article EN 2017-07-01

Traditional data collection, storage and processing of Electronic Health Records (EHR) utilize centralized techniques that pose several risks single point failure lean the systems to a number internal external breaches compromise their reliability availability. Blockchain is an emerging distributed technology can solve these issues due its immutability architectural nature prevent records manipulation or alterations. In this paper, we discuss progress opportunities remote patient monitoring...

10.1109/icdh52753.2021.00054 preprint EN 2021-09-01

Software Engineering is the process of a systematic, disciplined, quantifiable approach that has significant impact on large-scale and complex software development. Scores well-established models have long been adopted in development life cycle pour stakeholders towards completion final product Within boundary advanced technology, various emerging futuristic technology evolving really need attention engineering community whether conventional techniques are capable to inherit core fundamental...

10.1109/sera54885.2022.9806817 preprint EN 2022-05-25

Skin cancer detection is challenging since different types of skin lesions share high similarities. This paper proposes a computer-based deep learning approach that will accurately identify kinds lesions. Deep approaches can detect very the models learn each pixel an image. Sometimes humans get confused by similarities lesions, which we minimize involving machine. However, not all give better predictions. Some have limitations, leading model to false-positive result. We introduced several...

10.1109/bigdata55660.2022.10020302 article EN 2021 IEEE International Conference on Big Data (Big Data) 2022-12-17

SQL injection is one of the most prominent vulnerabilities for web-based applications. Exploitation (SQLIV) through successful attacks might result in severe consequences such as authentication bypassing, leaking private information etc. Therefore, testing an application SQLIV important step ensuring its quality. However, it challenging sources vary widely, which include lack effective input filters applications, insecure coding by programmers, inappropriate usage APIs manipulating databases...

10.1109/qsic.2008.33 article EN 2008-08-01

Cross Site Scripting (XSS) is one of the worst vulnerabilities that allow malicious attacks such as cookie thefts and Web page defacements. Testing an implementation against XSS (XSSVs) can avoid these consequences. Obtaining adequate test data set essential for testing XSSVs. An contains effective cases reveal Unfortunately, traditional techniques XSSVs do not address issue testing. In this work, we apply idea mutation-based technique to generate sets Our work addresses related...

10.1109/iwsess.2009.5068458 article EN 2009-05-01

Cross Site Request Forgery (CSRF) allows an attacker to perform unauthorized activities without the knowledge of a user. An attack request takes advantage fact that browser appends valid session information for each request. As result, is first place look symptoms and take appropriate actions. Current browser-based detection methods are based on cross-origin policies allow white listed third party websites requests trusted website. These approaches not effective if specified incorrectly....

10.1109/issre.2010.12 article EN 2010-11-01

Mobile devices have taken an essential role in the portable computer world. Portability, small screen size, and lower cost of production make these popular replacements for desktop laptop computers many daily tasks, such as surfing on Internet, playing games, shopping online. The popularity mobile tablets smart phones has made them a frequent target traditional web-based attacks, especially phishing. device-based phishing takes its share pie to trick users into entering their credentials...

10.4236/jis.2015.63021 article EN Journal of Information Security 2015-01-01

Quantum Computing (QC) has gained immense popularity as a potential solution to deal with the ever-increasing size of data and associated challenges leveraging concept quantum random access memory (QRAM). QC promises-quadratic or exponential increases in computational time parallelism thus offer huge leap forward computation Machine Learning algorithms. This paper analyzes speed up performance when applied machine learning algorithms, known (QML). We QML methods such Support Vector (QSVM),...

10.1109/compsac54236.2022.00097 article EN 2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC) 2022-06-01

10.1109/compsac57700.2023.00280 article EN 2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC) 2023-06-01

Cross site scripting (XSS) vulnerabilities are widespread in web-based programs. Server side detection of suspected contents can mitigate XSS exploitations early. Unfortunately, existing serve approaches impose modification server and client environments. In this paper, we develop an automated framework to detect attacks at the based on notion boundary injection policy generation. Boundaries mark content generation locations script code. We derive expected benign features dynamic that...

10.1109/dasc.2011.26 article EN 2011-12-01
Coming Soon ...