Research Detail:

Communication Security

» Research Fields:

» Research Groups:

» Related Faculties:

» Related Links:


» Recent Publications:
1. Md. Shohrab Hossain, Shaikh Shahriar Hassan, Mohammed Atiquzzaman, Survivability and Scalability of Space Networks: A survey, Journal of Telecommunication Systems, 68(2), 295-318, 2018.
2. Shaikh Shahriar Hassan, Soumik Das Bibon, Md. Shohrab Hossain, Mohammed Atiquzzaman, Security Threats in Bluetooth Technology, Journal of Computers & Security, 74, 308-322, 2018. [paper link]
3. A. H. M. Kamal, Mohammad Mahfuzul Islam, Enhancing embedding capacity and stego image quality by employing multi predictors, Journal of Information Security and Applications, 32, 59-74, 2017. [paper link]
4. A. H. M. Kamal, Mohammad Mahfuzul Islam, Boosting up the data hiding rate through multi cycle embedment process, Journal of Visual Communication and Image Representation, 40, 574–588, 2016. [paper link]
5. Anupam Das, Mohammad Mahfuzul Islam, SecuredTrust: A dynamic trust computation model for secured communication in multiagent systems, IEEE Transaction on Dependable and Secured Computing (TDSC), 9(2), 261-274, 2012.
6. F. T. Jaigirdar, Mohammad Mahfuzul Islam, S. K. Huq, Grid Approximation Based Inductive Charger Deployment Technique in Wireless Sensor Networks, International Journal of Advanced Computer Science and Applications (IJACSA), 2(1), 30-37, 2011.
7. Renascence Tarafder Prapty, Shuhana Azmin, Md. Shohrab Hossain, Husnu S. Narman, Preventing Session Hijacking using Encrypted One-Time-Cookies, Wireless Telecommunications Symposium (WTS), , , 2020.
8. Arnob Paul, Md. Hasanul Islam, Md. Shohrab Hossain, Husnu S. Narman, A novel zone walking protection for secure DNS Server, Wireless Telecommunications Symposium (WTS), , , 2020.
9. Mainuddin Ahmad Jonas, Risul Islam, Md. Shohrab Hossain, Husnu S. Narman, Mohammed Atiquzzaman, An Intelligent System for Preventing SSL Stripping-based Session Hijacking Attacks, IEEE Military Communications (MILCOM), , , 2019. [paper link]
10. A. B. M. Alim Al Islam, Md. A. Azad, Md. K. Alam, Md. S. Alam, Security Attack Detection using Genetic Algorithm (GA) in Policy Based Network, International Conference on Information and Communication Technology (ICICT), , 341-347, 2007.
11. Md. A. Azad, A. B. M. Alim Al Islam, Md. K. Alam, Md. S. Alam, Router Oriented Traffic Flow Analysis For Ip Backbone Network, International Conference on Information and Communication Technology (ICICT), , 348-351, 2007.