Research Detail:

Information Security

» Research Fields:

» Research Groups:

» Related Faculties:
Dr. Md. Shohrab Hossain

» Related Links:


» Recent Publications:
1. Ratul Sikder, Md Shohel Khan, Md. Shohrab Hossain, Wazir Zada Khan, A Survey on Android Security: Development and Deployment Hindrance and Best Practices, Telecommunication Computing Electronics and Control (TELKOMNIKA), 18(1), 485-499, 2020. [paper link]
2. Md. Shohrab Hossain, Arnob Paul, Md. Hasanul Islam, Mohammed Atiquzzaman, Survey of the Protection Mechanisms to the SSL-based Session Hijacking Attacks, Journal of Network Protocols and Algorithms, 10(1), 83-108, 2018.
3. A. H. M. Kamal, Mohammad Mahfuzul Islam, An image distortion-based enhanced embedding scheme, Iran Journal of Computer Science, 1(3), 175–186, 2018. [paper link]
4. Sultana Habiba, A. H. M. Kamal, Mohammad Mahfuzul Islam, Enhancing the Robustness of Visual Degradation Based HAM Reversible Data Hiding, Journal of Computer Science, 12(2), 88-97, 2016.
5. A. H. M. Kamal, Mohammad Mahfuzul Islam, Facilitating and securing offline e-medicine service through image steganography, Healthcare Technology Letters, 1(2), 74-79, 2014.
6. Md Abdullah Al Mamun, S. M. Maksudul Alam, Md. Shohrab Hossain, M. Samiruzzaman, A Novel Approach to Blockchain-based Digital Identity System, Future of Information and Communication Conference (FICC), , 93-112, 2020. [paper link]
7. Md Abdullah Al Mamun, S. M. Maksudul Alam, Md. Shohrab Hossain, M. Samiruzzaman, A Novel Image Steganography using Multiple LSB substitution and Pixel Randomization using Stern-Brocot Sequence, Future of Information and Communication Conference (FICC), , 756-773, 2020. [paper link]
8. Md. Ishtiaq Ashiq, Protick Bhowmick, Md. Shohrab Hossain, Husnu S. Narman, Domain Flux based DGA Botnet Detection Using Feedforward Neural Network, IEEE Military Communications (MILCOM), , 1-6, 2019. [paper link]
9. Md Rafid Ul Islam, M. S. Islam, Zakaria Ahmed, Anindya Iqbal, Rifat Shahriyar, Automatic Detection of NoSQL Injection Using Supervised Learning, 2019 IEEE 43rd Annual Computer Software and Applications Conference, COMPSAC 2019, , , 2019.
10. ASM Ahsan-Ul Haque, Md. Shohrab Hossain, Mohammed Atiquzzaman, Sequencing System Calls for Effective Malware Detection in Android, IEEE GLOBECOM, , , 2018. [paper link]
11. Mousumi Akter, Tanzima Hashem, Computing Aggregates Over Numeric Data with Personalized Local Differential Privacy, Information Security and Privacy - 22nd Australasian Conference (ACISP), , 249--260, 2017.
12. Fariha Tasmin Jaigirdar, Mohammad Mahfuzul Islam, A new cost-effective approach for battlefield surveillance in wireless sensor networks, International Conference on Networking Systems and Security (NSysS), , , 2016.
13. A. H. M. Kamal, Mohammad Mahfuzul Islam, Enhancing the embedding payload by handling the affair of association and mapping of block pixels through prediction errors histogram, International Conference on Networking Systems and Security (NSysS), , 5-8, 2016.
14. A. H. M. Kamal, Mohammad Mahfuzul Islam, Capacity Improvement of Reversible Data Hiding Scheme through Better Prediction and Double Cycle Embedding Process, IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), , 16-18, 2015.