Hossain Shahriar

According to our database1, Hossain Shahriar authored at least 76 papers between 2007 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Health Data Analytics: A Health IT Application Course.
Proceedings of the 19th Annual SIG Conference on Information Technology Education, 2018

Reduction of Medical Errors in Emergency Medical Care.
Proceedings of the 19th Annual SIG Conference on Information Technology Education, 2018

Message from the Fast Abstract Co-chairs.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

Benchmark Requirements for Assessing Software Security Vulnerability Testing Tools.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

Secure Mobile IPC Software Development with Vulnerability Detectors in Android Studio.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

Chained of Things: A Secure and Dependable Design of Autonomous Vehicle Services.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

Static Analysis of HIPPA Security Requirements in Electronic Health Record Applications.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

Web Application Firewall: Network Security Models and Configuration.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

2017
LDAP Vulnerability Detection in Web Applications.
IJSSE, 2017

Broadening Secure Mobile Software Development (SMSD) Through Curriculum Development (Abstract Only).
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 2017

Mitigating distributed denial of service attacks at the application layer.
Proceedings of the Symposium on Applied Computing, 2017

Labware for Secure Mobile Software Development (SMSD) Education.
Proceedings of the 2017 ACM Conference on Innovation and Technology in Computer Science Education, 2017

Web service injection attack detection.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

Learning database security with hands-on mobile labs.
Proceedings of the 2017 IEEE Frontiers in Education Conference, 2017

Towards an Attack Signature Generation Framework for Intrusion Detection Systems.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

Message from COMPSAC 2017 Fast Abstract Track Co-Chairs.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

An Iris-Based Authentication Framework to Prevent Presentation Attacks.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

Improving the Prediction Accuracy of Decision Tree Mining with Data Preprocessing.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

Data masking techniques for NoSQL database security: A systematic review.
Proceedings of the 2017 IEEE International Conference on Big Data, BigData 2017, 2017

2016
Survey of Vulnerabilities and Mitigation Techniques for Mooc-Based Applications.
IJSSE, 2016

Fuzzy Rule-Based Vulnerability Assessment Framework for Web Applications.
IJSSE, 2016

A Signature-Based Intrusion Detection System for Web Applications based on Genetic Algorithm.
Proceedings of the 9th International Conference on Security of Information and Networks, 2016

Object injection vulnerability discovery based on latent semantic indexing.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Digital Badges to Enhance Skills and Preparation for a Career in Cyber Security.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

OCL Fault Injection-Based Detection of LDAP Query Injection Vulnerabilities.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Anomalous Android Application Detection with Latent Semantic Indexing.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Information Theoretic Anomaly Detection Framework for Web Application.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

2015
Request and Response Analysis Framework for Mitigating Clickjacking Attacks.
IJSSE, 2015

Client-Side Detection of Clickjacking Attacks.
IJISP, 2015

Security assessment of clickjacking risks in web applications: metrics based approach.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015

Mobile app permissions awareness.
Proceedings of the 5th International Conference on Information & Communication Technology and Accessibility, 2015

Security concerns and mitigation approaches for MOOC-based applications.
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015

Comparing MOOC-based platforms: Reflection on pedagogical support, framework and learning analytics.
Proceedings of the 2015 International Conference on Collaboration Technologies and Systems, 2015

Classification of Lightweight Directory Access Protocol query injection attacks and mitigation techniques.
Proceedings of the 2015 International Conference on Collaboration Technologies and Systems, 2015

Message from the Fast Abstract Chairs.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

2014
Classification of Clickjacking Attacks and Detection Techniques.
Information Security Journal: A Global Perspective, 2014

Information Theoretic XSS Attack Detection in Web Applications.
IJSSE, 2014

Effective detection of vulnerable and malicious browser extensions.
Computers & Security, 2014

Dynamic Analysis of Web Objects.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

Content Provider Leakage Vulnerability Detection in Android Applications.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

Risk assessment of code injection vulnerabilities using fuzzy logic-based system.
Proceedings of the Symposium on Applied Computing, 2014

A Survey of Android Malware Characterisitics and Mitigation Techniques.
Proceedings of the 11th International Conference on Information Technology: New Generations, 2014

Detection of repackaged Android Malware.
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014

Testing of Memory Leak in Android Applications.
Proceedings of the 15th International IEEE Symposium on High-Assurance Systems Engineering, 2014

Authentic learning in network and security with portable labs.
Proceedings of the IEEE Frontiers in Education Conference, 2014

CS++: expanding CS curriculum via open cybersecurity courseware.
Proceedings of the 2014 ACM Southeast Regional Conference, Kennesaw, GA, USA, March 28, 2014

Towards mutation-based testing of column-oriented database queries.
Proceedings of the 2014 ACM Southeast Regional Conference, Kennesaw, GA, USA, March 28, 2014

Labware for networking protocols and wireless security using Android-enabled mobile devices.
Proceedings of the 2014 ACM Southeast Regional Conference, Kennesaw, GA, USA, March 28, 2014

2013
A Model-Based Detection of Vulnerable and Malicious Browser Extensions.
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013

ProClick: a framework for testing clickjacking attacks in web applications.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

Security vulnerabilities and mitigation techniques of web applications.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

Rule-Based Source Level Patching of Buffer Overflow Vulnerabilities.
Proceedings of the Tenth International Conference on Information Technology: New Generations, 2013

Design and development of Anti-XSS proxy.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013

Client-Side Detection of SQL Injection Attack.
Proceedings of the Advanced Information Systems Engineering Workshops, 2013

2012
Trustworthiness testing of phishing websites: A behavior model-based approach.
Future Generation Comp. Syst., 2012

Mitigating program security vulnerabilities: Approaches and challenges.
ACM Comput. Surv., 2012

Mutation Testing of Event Processing Queries.
Proceedings of the 23rd IEEE International Symposium on Software Reliability Engineering, 2012

Information-Theoretic Detection of SQL Injection Attacks.
Proceedings of the 14th International IEEE Symposium on High-Assurance Systems Engineering, 2012

2011
Taxonomy and classification of automatic monitoring of program security vulnerability exploitations.
Journal of Systems and Software, 2011

Information Source-Based Classification of Automatic Phishing Website Detectors.
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011

Server Side Detection of Content Sniffing Attacks.
Proceedings of the IEEE 22nd International Symposium on Software Reliability Engineering, 2011

A Fuzzy Logic-Based Buffer Overflow Vulnerability Auditor.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011

S2XS2: A Server Side Approach to Automatically Detect XSS Attacks.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011

Injecting Comments to Detect JavaScript Code Injection Attacks.
Proceedings of the Workshop Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011

2010
Monitoring Buffer Overflow Attacks: A Perennial Task.
IJSSE, 2010

Assessing Test Suites for Buffer Overflow Vulnerabilities.
International Journal of Software Engineering and Knowledge Engineering, 2010

Classification of Static Analysis-Based Buffer Overflow Detectors.
Proceedings of the Fourth International Conference on Secure Software Integration and Reliability Improvement, 2010

PhishTester: Automatic Testing of Phishing Attacks.
Proceedings of the Fourth International Conference on Secure Software Integration and Reliability Improvement, 2010

Client-Side Detection of Cross-Site Request Forgery Attacks.
Proceedings of the IEEE 21st International Symposium on Software Reliability Engineering, 2010

Classification of Buffer Overflow Vulnerability Monitors.
Proceedings of the ARES 2010, 2010

2009
MUTEC: Mutation-based testing of Cross Site Scripting.
Proceedings of the ICSE Workshop on Software Engineering for Secure Systems, 2009

Automatic Testing of Program Security Vulnerabilities.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

2008
MUSIC: Mutation-based SQL Injection Vulnerability Checking.
Proceedings of the Eighth International Conference on Quality Software, 2008

Mutation-Based Testing of Format String Bugs.
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008

Mutation-Based Testing of Buffer Overflow Vulnerabilities.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

2007
ACIR: An Aspect-Connector for Intrusion Response.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007


  Loading...