Research Detail:

Security and Privacy

» Research Fields:
Information Security
Security of Cloud Computing Contents
Communication Security
Access Security
Trust Model

» Research Groups:

» Related Faculties:
Dr. Md. Shohrab Hossain
Md. Iftekharul Islam Sakib

» Related Links:


» Recent Publications:
1. Ratul Sikder, Md Shohel Khan, Md. Shohrab Hossain, Wazir Zada Khan, A Survey on Android Security: Development and Deployment Hindrance and Best Practices, Telecommunication Computing Electronics and Control (TELKOMNIKA), 18(1), 485-499, 2020. [paper link]
2. A. H. M. Kamal, Mohammad Mahfuzul Islam, An embedding technique for smartcard-supported e-healthcare services, Iran Journal of Computer Science, 3, 195-205, 2020. [paper link]
3. Nusrat Jahan Mozumder, Maitraye Das, Tanzima Hashem, Sharmin Afrose, Khandakar Ashrafi Akbar, Towards Privacy-preserving Authenticated Disease Risk Queries, Journal of Information Processing, 27, 624-642, 2019. [paper link]
4. Md. Shohrab Hossain, Arnob Paul, Md. Hasanul Islam, Mohammed Atiquzzaman, Survey of the Protection Mechanisms to the SSL-based Session Hijacking Attacks, Journal of Network Protocols and Algorithms, 10(1), 83-108, 2018.
5. Md. Shohrab Hossain, Shaikh Shahriar Hassan, Mohammed Atiquzzaman, Survivability and Scalability of Space Networks: A survey, Journal of Telecommunication Systems, 68(2), 295-318, 2018.
6. A. H. M. Kamal, Mohammad Mahfuzul Islam, An image distortion-based enhanced embedding scheme, Iran Journal of Computer Science, 1(3), 175–186, 2018. [paper link]
7. Shaikh Shahriar Hassan, Soumik Das Bibon, Md. Shohrab Hossain, Mohammed Atiquzzaman, Security Threats in Bluetooth Technology, Journal of Computers & Security, 74, 308-322, 2018. [paper link]
8. A. H. M. Kamal, Mohammad Mahfuzul Islam, Enhancing embedding capacity and stego image quality by employing multi predictors, Journal of Information Security and Applications, 32, 59-74, 2017. [paper link]
9. A. H. M. Kamal, Mohammad Mahfuzul Islam, Boosting up the data hiding rate through multi cycle embedment process, Journal of Visual Communication and Image Representation, 40, 574–588, 2016. [paper link]
10. Sultana Habiba, A. H. M. Kamal, Mohammad Mahfuzul Islam, Enhancing the Robustness of Visual Degradation Based HAM Reversible Data Hiding, Journal of Computer Science, 12(2), 88-97, 2016.
11. A. H. M. Kamal, Mohammad Mahfuzul Islam, Facilitating and securing offline e-medicine service through image steganography, Healthcare Technology Letters, 1(2), 74-79, 2014.
12. F. T. Jaigirdar, Mohammad Mahfuzul Islam, Assurance of the Maximum Destruction in Battlefield using Cost-Effective Approximation Techniques, Journal of Networks, 7(12), 1967-1977, 2012.
13. Anupam Das, Mohammad Mahfuzul Islam, SecuredTrust: A dynamic trust computation model for secured communication in multiagent systems, IEEE Transaction on Dependable and Secured Computing (TDSC), 9(2), 261-274, 2012.
14. F. T. Jaigirdar, Mohammad Mahfuzul Islam, S. K. Huq, Grid Approximation Based Inductive Charger Deployment Technique in Wireless Sensor Networks, International Journal of Advanced Computer Science and Applications (IJACSA), 2(1), 30-37, 2011.
15. Tanzima Hashem, Lars Kulik, "Don't Trust Anyone": Privacy Protection for Location-Based Services, Pervasive and Mobile Computing (PMC), 7(1), 44-59, 2011.
16. Renascence Tarafder Prapty, Shuhana Azmin, Md. Shohrab Hossain, Husnu S. Narman, Preventing Session Hijacking using Encrypted One-Time-Cookies, Wireless Telecommunications Symposium (WTS), , , 2020.
17. Arnob Paul, Md. Hasanul Islam, Md. Shohrab Hossain, Husnu S. Narman, A novel zone walking protection for secure DNS Server, Wireless Telecommunications Symposium (WTS), , , 2020.
18. Md Abdullah Al Mamun, S. M. Maksudul Alam, Md. Shohrab Hossain, M. Samiruzzaman, A Novel Approach to Blockchain-based Digital Identity System, Future of Information and Communication Conference (FICC), , 93-112, 2020. [paper link]
19. Md Abdullah Al Mamun, S. M. Maksudul Alam, Md. Shohrab Hossain, M. Samiruzzaman, A Novel Image Steganography using Multiple LSB substitution and Pixel Randomization using Stern-Brocot Sequence, Future of Information and Communication Conference (FICC), , 756-773, 2020. [paper link]
20. Mainuddin Ahmad Jonas, Risul Islam, Md. Shohrab Hossain, Husnu S. Narman, Mohammed Atiquzzaman, An Intelligent System for Preventing SSL Stripping-based Session Hijacking Attacks, IEEE Military Communications (MILCOM), , , 2019. [paper link]
21. Md. Ishtiaq Ashiq, Protick Bhowmick, Md. Shohrab Hossain, Husnu S. Narman, Domain Flux based DGA Botnet Detection Using Feedforward Neural Network, IEEE Military Communications (MILCOM), , 1-6, 2019. [paper link]
22. Md Rafid Ul Islam, M. S. Islam, Zakaria Ahmed, Anindya Iqbal, Rifat Shahriyar, Automatic Detection of NoSQL Injection Using Supervised Learning, 2019 IEEE 43rd Annual Computer Software and Applications Conference, COMPSAC 2019, , , 2019.
23. Syeda Israt Ferdaus, Muhammad Abdullah Adnan, Privacy in Multi-party Computation in MapReduce, 4th International Conference on Computer and Communication Systems (ICCCS 2019), , , 2019.
24. ASM Ahsan-Ul Haque, Md. Shohrab Hossain, Mohammed Atiquzzaman, Sequencing System Calls for Effective Malware Detection in Android, IEEE GLOBECOM, , , 2018. [paper link]
25. Md. Delwar Hossain, Muhammad Abdullah Adnan, Secured and High Performance Distributed Big Data Storage in Cloud Systems, 3rd International Conference on Computer and Communication Systems (ICCCS 2018), , 6, 2018.
26. Sk Tahsin Amin, Semantic Clustering in Credible Human Sensed Event Detection, 14th DCOSS, , 3, 2018.
27. M. M. Rahman, Muhammad Abdullah Adnan, Two step verification system of highly secure social media: Possible to breach the security, 3rd International Conference on Networking, Systems and Security (NSysS), , 6, 2017.
28. Naw Safrin Sattar, Muhammad Abdullah Adnan, Maimuna Begum Kali, Secured Aerial Photography using Homomorphic Encryption, 3rd International Conference on Networking, Systems and Security (NSysS), , 12, 2017.
29. Sajedul Talukder, M. I. I. Sakib, Md. Faruk Hossen, Zahidur Rahim Talukder, Md. Shohrab Hossain, Attacks and Defenses in Mobile IP: Modeling with Stochastic Game Petri Net, International Conference on Current Trends in Computer, Electrical, Electronics and Communication (ICCTCEEC), , 1-8, 2017.
30. Mousumi Akter, Tanzima Hashem, Computing Aggregates Over Numeric Data with Personalized Local Differential Privacy, Information Security and Privacy - 22nd Australasian Conference (ACISP), , 249--260, 2017.
31. Faysal Hossain Shezan, Syeda Farzia Afroze, Anindya Iqbal, Vulnerability Detection in Recent Android Apps: An Empirical Study, International Conference on Networking, Systems and Security, , , 2017.
32. 4. Muhammed Dastagir Husain , Anindya Iqbal, An Empirical Study on Typosquatting Abuse in Bangladesh, International Conference on Networking, Systems and Security, , , 2017.
33. E M Wasifur Rahman Chowdhury, Mohammad Saifur Rahman, A. B. M. Alim Al Islam, M. Sohel Rahman, Salty Secret: Let us secretly salt the secret, 2017 International Conference on Networking, Systems and Security (NSysS), , 115-123, 2017. [paper link]
34. Tahsina Hashem, Tanzima Hashem, Anindya Iqbal, Ensuring Feedback Data Privacy in the Context of Developing Countries, ACM Symposium on Computing and Development (DEV), , , 2016.
35. Tishna Sabrina, Manzur Murshed , Anindya Iqbal, Anonymization Techniques for Preserving Data Quality in Participatory Sensing, IEEE Conference on Local Computer Networks (LCN), , , 2016.
36. Mehedee Zaman, Mohammad Rakib Amin, Md. Shohrab Hossain, M. Atiquzzaman, Behavioral Malware Detection Approaches for Android, IEEE ICCC, , , 2016.
37. Mohammad Khaliqur Rahman, Muhammad Abdullah Adnan, Dynamic Weight on Static Trust for Trustworthy Social Media Networks, IEEE International Conference on Privacy, Security and Trust (PST), , 8, 2016.
38. Fariha Tasmin Jaigirdar, Mohammad Mahfuzul Islam, A new cost-effective approach for battlefield surveillance in wireless sensor networks, International Conference on Networking Systems and Security (NSysS), , , 2016.
39. A. H. M. Kamal, Mohammad Mahfuzul Islam, Enhancing the embedding payload by handling the affair of association and mapping of block pixels through prediction errors histogram, International Conference on Networking Systems and Security (NSysS), , 5-8, 2016.
40. A. H. M. Kamal, Mohammad Mahfuzul Islam, Capacity Improvement of Reversible Data Hiding Scheme through Better Prediction and Double Cycle Embedding Process, IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), , 16-18, 2015.
41. Sadia Shamma, Md. Yusuf Sarwar Uddin, Towards Privacy-aware Photo Sharing using Mobile Phones, ICECE, , , 2014.
42. Mohammed Eunus Ali, Tanzima Hashem, Anika Anwar, Lars Kulik, Ishrat Ahmed, Egemen Tanin, Protecting mobile users from visual privacy attacks, the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp Adjunct, , 13-17, 2014.
43. Safique Ahmed Faruque, Mossa. Anisa Khatun, Md. Saidur Rahman, Stop propagation of harmful information on social networks, International Conference on Informatics, Electronics & Vision (ICIEV), 2014, , 1-4, 2014.
44. Tanzima Hashem, Lars Kulik, Rui Zhang, Privacy preserving group nearest neighbor queries, 3rd International Conference on Extending Database Technology (EDBT), , 489-500, 2010.
45. Naznin Fauzia, Tanima Dey , Inaba Bhuiyan, Md. Saidur Rahman, An efficient implementation of electronic election system, 10th international conference on Computer and information technology (ICCIT 2007), , 1-6, 2007.
46. Tanzima Hashem, Lars Kulik, Safeguarding Location Privacy in Wireless Ad-Hoc Networks, 9th International Conference on Ubiquitous Computing (UbiComp), , 372-390, 2007.
47. A. B. M. Alim Al Islam, Md. A. Azad, Md. K. Alam, Md. S. Alam, Security Attack Detection using Genetic Algorithm (GA) in Policy Based Network, International Conference on Information and Communication Technology (ICICT), , 341-347, 2007.
48. Md. A. Azad, A. B. M. Alim Al Islam, Md. K. Alam, Md. S. Alam, Router Oriented Traffic Flow Analysis For Ip Backbone Network, International Conference on Information and Communication Technology (ICICT), , 348-351, 2007.