Hossain Shahriar

Orcid: 0000-0003-1021-7986

According to our database1, Hossain Shahriar authored at least 226 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Student Perceptions of Authentic Learning to Learn White-box Testing.
Proceedings of the 55th ACM Technical Symposium on Computer Science Education, 2024

2023
Teaching DevOps Security Education with Hands-on Labware: Automated Detection of Security Weakness in Python.
CoRR, 2023

A Trustable LSTM-Autoencoder Network for Cyberbullying Detection on Social Media Using Synthetic Data.
CoRR, 2023

Protecting the Decentralized Future: An Exploration of Common Blockchain Attacks and their Countermeasures.
CoRR, 2023

Software Supply Chain Vulnerabilities Detection in Source Code: Performance Comparison between Traditional and Quantum Machine Learning Algorithms.
CoRR, 2023

Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and Protection.
CoRR, 2023

Confronting Toddlers' Brain Development Challenges Due to Screen-Addiction: Unpacking Perspectives from Stakeholders.
Proceedings of the 24th Annual Conference on Information Technology Education, 2023

Collaborative and Active Learning with Portable Online Hands-on Labware for Blockchain Development.
Proceedings of the 54th ACM Technical Symposium on Computer Science Education, Volume 2, 2023

Authentic Learning on Machine Learning for Cybersecurity.
Proceedings of the 54th ACM Technical Symposium on Computer Science Education, Volume 2, 2023

Early Heart Disease Detection Using Mel-Spectrograms and Deep Learning.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

Mental Health Analysis During Pandemic: A Survey of Detection and Treatment.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

Quantum Machine Learning in Disease Detection and Prediction: a survey of applications and future possibilities.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

Cardiovascular Health Management Compliance with Health Insurance Portability and Accountability Act.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

A Plugin for Kotlin based Android Apps to Detect Security Breaches through Dataflow.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

Blockchain Technology in Higher Education Ecosystem: Unraveling the Good, Bad, and Ugly.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

AI-Assisted Security: A Step towards Reimagining Software Development for a Safer Future.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

HIPAAChecker: The Comprehensive Solution for HIPAA Compliance in Android mHealth Apps.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

BlockTheFall: Wearable Device-based Fall Detection Framework Powered by Machine Learning and Blockchain for Elderly Care.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

A Quantum Generative Adversarial Network-based Intrusion Detection System.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

Security Risk and Attacks in AI: A Survey of Security and Privacy.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

Uncovering Software Supply Chains Vulnerability: A Review of Attack Vectors, Stakeholders, and Regulatory Frameworks.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

Authentic Learning Approach for Artificial Intelligence Systems Security and Privacy.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

Feature Engineering-Based Detection of Buffer Overflow Vulnerability in Source Code Using Neural Networks.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

Autism Disease Detection Using Transfer Learning Techniques: Performance Comparison Between Central Processing Unit vs Graphics Processing Unit Functions for Neural Networks.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and Protection.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

Understanding Rural women's Experience in STEM and Non-STEM field in Bangladesh.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

Adversarial Data-Augmented Resilient Intrusion Detection System for Unmanned Aerial Vehicles.
Proceedings of the IEEE International Conference on Big Data, 2023

A Trustable LSTM-Autoencoder Network for Cyberbullying Detection on Social Media Using Synthetic Data.
Proceedings of the IEEE International Conference on Big Data, 2023

Quantum Cryptography for Enhanced Network Security: A Comprehensive Survey of Research, Developments, and Future Directions.
Proceedings of the IEEE International Conference on Big Data, 2023

Secure Software Development in Google Colab.
Proceedings of the 2023 IEEE World AI IoT Congress (AIIoT), 2023

Quantum Machine Learning for Security Data Analysis.
Proceedings of the 2023 IEEE World AI IoT Congress (AIIoT), 2023

Exploring the Vulnerabilities of Machine Learning and Quantum Machine Learning to Adversarial Attacks Using a Malware Dataset: A Comparative Analysis.
Proceedings of the IEEE International Conference on Software Services Engineering, 2023

2022
Approaches and challenges to secure health data.
Int. J. Medical Eng. Informatics, 2022

Forecasting the Risk Factor of Frontier Markets: A Novel Stacking Ensemble of Neural Network Approach.
Future Internet, 2022

Bayesian Hyperparameter Optimization for Deep Neural Network-Based Network Intrusion Detection.
CoRR, 2022

Automated Vulnerability Detection in Source Code Using Quantum Natural Language Processing.
Proceedings of the Ubiquitous Security - Second International Conference, 2022

Development of Blockchain-based e-Voting System: Requirements, Design and Security Perspective.
Proceedings of the IEEE International Conference on Trust, 2022

Authentic Learning of Machine Learning in Cybersecurity with Portable Hands-on Labware.
Proceedings of the SIGCSE 2022: The 53rd ACM Technical Symposium on Computer Science Education, 2022

Software Engineering Process and Methodology in Blockchain-Oriented Software Development: A Systematic Study.
Proceedings of the 20th IEEE/ACIS International Conference on Software Engineering Research, 2022

Comparative Study of Machine Learning Methods on Spectroscopy Images for Blood Glucose Estimation.
Proceedings of the Pervasive Computing Technologies for Healthcare, 2022

Can We use Authentic Learning to Educate Students about Secure Infrastructure as Code Development?
Proceedings of the ITiCSE 2022: Innovation and Technology in Computer Science Education, Dublin, Ireland, July 8, 2022

Investigating Novel Approaches to Defend Software Supply Chain Attacks.
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2022

A Novel IoT-based Framework for Non-Invasive Human Hygiene Monitoring using Machine Learning Techniques.
Proceedings of the 10th IEEE International Conference on Healthcare Informatics, 2022

Implementing Virtual Nursing in Health Care: An evaluation of effectiveness and sustainability.
Proceedings of the IEEE International Conference on Digital Health, 2022

Knowledge Management in a Healthcare Enterprise: Creation of a Digital Knowledge Repository.
Proceedings of the IEEE International Conference on Digital Health, 2022

A Review of Quantum Cybersecurity: Threats, Risks and Opportunities.
Proceedings of the 1st International Conference on AI in Cybersecurity, 2022

DuRBIN: A Comprehensive Approach to Analysis and Detection of Emerging Threats due to Network Intrusion.
Proceedings of the IEEE Intl. Conf. on Dependable, 2022

Evolution of Quantum Computing: A Systematic Survey on the Use of Quantum Computing Tools.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

Enabling Cyberanalytics using IoT Clusters and Containers.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

A Review of Dark Web: Trends and Future Directions.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

Comprehensive Feature Extraction for Cross-Project Software Defect Prediction.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

Blockchain-based Medical Image Sharing and Automated Critical-results Notification: A Novel Framework.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

Towards Automation for MLOps: An Exploratory Study of Bot Usage in Deep Learning Libraries.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

Systematic Analysis of Deep Learning Model for Vulnerable Code Detection.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

Scalable Machine Learning Using PySpark.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

Quantum Machine Learning for Software Supply Chain Attacks: How Far Can We Go?
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

Broaden Multidisciplinary Data Science Research by an Innovative Cyberinfrastructure Platform.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

MRehab: Mutlimodal data acquisition and modeling framework for assessing stroke and cardiac rehabilitation exercises.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

A Literature Review on Blockchain-enabled Security and Operation of Cyber-Physical Systems.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

Improving the Prediction Accuracy with Feature Selection for Ransomware Detection.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

Leveraging Healthcare API to transform Interoperability: API Security and Privacy.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

Authentic Learning of Machine Learning to Ransomware Detection and Prevention.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

Predicting Mortality Rate based on Comprehensive Features of Intensive Care Unit Patients.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

Shifting Left for Machine Learning: An Empirical Study of Security Weaknesses in Supervised Learning-based Projects.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

Towards Unsupervised Learning based Denoising of Cyber Physical System Data to Mitigate Security Concerns.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

Ransomware Classification and Detection With Machine Learning Algorithms.
Proceedings of the 12th IEEE Annual Computing and Communication Workshop and Conference, 2022

A Crowd Source System for YouTube Big Data Analytics: Unpacking Values from Data Sprawl.
Proceedings of the IEEE International Conference on Big Data, 2022

A Novel Machine Learning Based Framework for Bridge Condition Analysis.
Proceedings of the IEEE International Conference on Big Data, 2022

Authentic Learning of Machine Learning in Cybersecurity with Portable Hands-on Labware: Neural Network Algorithms for Network Denial of Service (DOS) Detection.
Proceedings of the IEEE International Conference on Big Data, 2022

Multi-class Skin Cancer Classification Architecture Based on Deep Convolutional Neural Network.
Proceedings of the IEEE International Conference on Big Data, 2022

Handwritten Word Recognition using Deep Learning Approach: A Novel Way of Generating Handwritten Words.
Proceedings of the IEEE International Conference on Big Data, 2022

Deep Learning Approach for Classifying the Aggressive Comments on Social Media: Machine Translated Data Vs Real Life Data.
Proceedings of the IEEE International Conference on Big Data, 2022

Software Supply Chain Vulnerabilities Detection in Source Code: Performance Comparison between Traditional and Quantum Machine Learning Algorithms.
Proceedings of the IEEE International Conference on Big Data, 2022

Bie Vote: A Biometric Identification Enabled Blockchain-Based Secure and Transparent Voting Framework.
Proceedings of the Fourth International Conference on Blockchain Computing and Applications, 2022

2021
Assessing HIPAA Compliance of Open Source Electronic Health Record Applications.
Int. J. Inf. Secur. Priv., 2021

IEEE COMPSAC 2022.
Computer, 2021

Smart Connected Aircraft: Towards Security, Privacy, and Ethical Hacking.
Proceedings of the 14th International Conference on Security of Information and Networks, 2021

We Did It! So Can You! Creating "No-Textbook" IT Degrees.
Proceedings of the SIGITE '21: The 22nd Annual Conference on Information Technology Education, SnowBird, UT, USA, October 6, 2021

Exercise Perceptions: Experience Report from a Secure Software Development Course.
Proceedings of the Quality of Information and Communications Technology, 2021

Emotional Analysis of Learning Cybersecurity with Games.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2021

Detecting Network Attacks using Federated Learning for IoT Devices.
Proceedings of the 29th IEEE International Conference on Network Protocols, 2021

Non-Invasive Monitoring of Human Hygiene using Vibration Sensor and Classifiers.
Proceedings of the IEEE International Conference on Digital Health, 2021

COVID-19 Mortality Prediction Using Machine Learning Techniques.
Proceedings of the IEEE International Conference on Digital Health, 2021

Analyzing Security and Privacy Concerns of Contact Tracing Applications.
Proceedings of the IEEE International Conference on Digital Health, 2021

A Statistical Summary Analysis of Window-Based Extracted Features for EEG Signal Classification.
Proceedings of the IEEE International Conference on Digital Health, 2021

Framework for Collecting Data from specialized IoT devices - An application to enhance Healthcare Systems.
Proceedings of the IEEE International Conference on Digital Health, 2021

Towards Blockchain-Based Secure Data Management for Remote Patient Monitoring.
Proceedings of the IEEE International Conference on Digital Health, 2021

How Do Students Feel About Automated Security Static Analysis Exercises?
Proceedings of the IEEE Frontiers in Education Conference, 2021

Data Analysis Methods for Health Monitoring Sensors: A survey.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021

Cybersecurity Risks and Mitigation Techniques During COVID-19.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021

A Classification of Web Service Credibility Measures.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021

Ensemble-based Efficient Anomaly Detection for Smart Building Control Systems.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021

An Investigation on Non-Invasive Brain-Computer Interfaces: Emotiv Epoc+ Neuroheadset and Its Effectiveness.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021

An Empirical Study of Vulnerabilities in Robotics.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021

A Taxonomy of XSS Attack Detections in Mobile Environments based on Automation Capabilities.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021

Ride-Hailing for Autonomous Vehicles: Hyperledger Fabric-Based Secure and Decentralize Blockchain Platform.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

Bayesian Hyperparameter Optimization for Deep Neural Network-Based Network Intrusion Detection.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

Colab Cloud Based Portable and Shareable Hands-on Labware for Machine Learning to Cybersecurity.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

Malware Detection and Prevention using Artificial Intelligence Techniques.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

An Architecture for Federated Learning Enabled Collaborative Intrusion Detection System.
Proceedings of the 27th Americas Conference on Information Systems, 2021

2020
Security and Privacy Analysis of mhealth Application: A Case Study.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Malicious URL Detection Using Supervised Machine Learning Techniques.
Proceedings of the SIN 2020: 13th International Conference on Security of Information and Networks, 2020

The Adoption, Issues, and Challenges of Wearable Healthcare Technology for the Elderly.
Proceedings of the SIGITE '20: The 21st Annual Conference on Information Technology Education, 2020

Case Study-based Portable Hands-on Labware for Machine Learning in Cybersecurity.
Proceedings of the 51st ACM Technical Symposium on Computer Science Education, 2020

Information Assurance and Security Education on Undergraduate Computing Degree Programs.
Proceedings of the 51st ACM Technical Symposium on Computer Science Education, 2020

A Hands-On Lab for Macro Malware Detection using Machine Learning on Virtual Machines.
Proceedings of the 51st ACM Technical Symposium on Computer Science Education, 2020

R-Mon: An mhealth Tool for Real-time Respiratory Monitoring During Pandemics and Self-Isolation.
Proceedings of the 2020 IEEE World Congress on Services, 2020

Distributed Denial of Service Attack Detection.
Proceedings of the National Cyber Summit (NCS) Research Track 2020, 2020

TL-NID: Deep Neural Network with Transfer Learning for Network Intrusion Detection.
Proceedings of the 15th International Conference for Internet Technology and Secured Transactions, 2020

Epileptic Seizure Detection for Imbalanced Datasets Using an Integrated Machine Learning Approach.
Proceedings of the 42nd Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2020

Denial of Service (DoS) Attack Detection: Performance Comparison of Supervised Machine Learning Algorithms.
Proceedings of the IEEE Intl Conf on Dependable, 2020

Security and Privacy Analysis of Wearable Health Device.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

Learning Environment Containerization of Machine Leaning for Cybersecurity.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

Enhancing Proactive Control Mobile and Web Software Security Education with Hands-on Labware.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

Analysis of Sampling Techniques Towards Epileptic Seizure Detection from Imbalanced Dataset.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

Mobile Sensor-Based Fall Detection Framework.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

A Two-Step Password Authentication System for Alzheimer Patients.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

Hands-on Lab on Smart City Vulnerability Exploitation.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

Attacks and Mitigation Techniques for Iris-Based Authentication Systems.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

WTC^2: Impact-Aware Threat Analysis for Water Treatment Centers.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

Actionable Knowledge Extraction Framework for COVID-19.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

r-LSTM: Time Series Forecasting for COVID-19 Confirmed Cases with LSTMbased Framework.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

Cyber Fraud Prediction with Supervised Machine Learning Techniques.
Proceedings of the 2020 ACM Southeast Conference, 2020

2019
Mobile anti-phishing: Approaches and challenges.
Inf. Secur. J. A Glob. Perspect., 2019

Toward a Secure and Decentralized Blockchain-based Ride-Hailing Platform for Autonomous Vehicles.
CoRR, 2019

Data Protection Labware for Mobile Security.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019

Redeveloping Electronic Health Records Course with Open Source Tools and Platforms.
Proceedings of the 20th Annual SIG Conference on Information Technology Education, 2019

An Architecture for Blockchain-Enabled Collaborative Signature-based Intrusion Detection System.
Proceedings of the 20th Annual SIG Conference on Information Technology Education, 2019

Data Protection with SMSD Labware.
Proceedings of the 50th ACM Technical Symposium on Computer Science Education, 2019

Resources for healthcare workflow modeling and analysis.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

Towards Secure Password Protection in Portable Applications.
Proceedings of the National Cyber Summit, 2019

Security requirement prototyping with hyperledger composer for drug supply chain: a blockchain application.
Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, 2019

Improving Prediction Accuracy for Logistic Regression on Imbalanced Datasets.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

Protecting Data in Android External Data Storage.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

DroidPatrol: A Static Analysis Plugin For Secure Mobile Software Development.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

Hands-on File Inclusion Vulnerablity and Proactive Control for Secure Software Development.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

Non-Invasive Wi-Fi Sensors For Smart Healthcare.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

Compliance Checking of Open Source EHR Applications for HIPAA and ONC Security and Privacy Requirements.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

Blockchain Development Platform Comparison.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

IoT Malware Analysis.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

Blockchain-Based Interoperable Electronic Health Record Sharing Framework.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

STPSA 2019 Welcome Message.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

Supervised and Unsupervised-Based Analytics of Intensive Care Unit Data.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

Smart Contract-Based Secured Business-to-Consumer Supply Chain Systems.
Proceedings of the IEEE International Conference on Blockchain, 2019

Experiential Learning: Case Study-Based Portable Hands-on Regression Labware for Cyber Fraud Prediction.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

Droid-NNet: Deep Learning Neural Network for Android Malware Detection.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2018
Health Data Analytics: A Health IT Application Course.
Proceedings of the 19th Annual SIG Conference on Information Technology Education, 2018

Reduction of Medical Errors in Emergency Medical Care.
Proceedings of the 19th Annual SIG Conference on Information Technology Education, 2018

Mobile Software Security with Dynamic Analysis.
Proceedings of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing, 2018

Design and Development of Smart TV Protector.
Proceedings of the National Cyber Summit, 2018

Message from the Fast Abstract Co-chairs.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

Benchmark Requirements for Assessing Software Security Vulnerability Testing Tools.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

Secure Mobile IPC Software Development with Vulnerability Detectors in Android Studio.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

Chained of Things: A Secure and Dependable Design of Autonomous Vehicle Services.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

Static Analysis of HIPPA Security Requirements in Electronic Health Record Applications.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

Web Application Firewall: Network Security Models and Configuration.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

2017
LDAP Vulnerability Detection in Web Applications.
Int. J. Secur. Softw. Eng., 2017

Broadening Secure Mobile Software Development (SMSD) Through Curriculum Development (Abstract Only).
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 2017

Mitigating distributed denial of service attacks at the application layer.
Proceedings of the Symposium on Applied Computing, 2017

Labware for Secure Mobile Software Development (SMSD) Education.
Proceedings of the 2017 ACM Conference on Innovation and Technology in Computer Science Education, 2017

Web service injection attack detection.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

Learning database security with hands-on mobile labs.
Proceedings of the 2017 IEEE Frontiers in Education Conference, 2017

Towards an Attack Signature Generation Framework for Intrusion Detection Systems.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

Message from COMPSAC 2017 Fast Abstract Track Co-Chairs.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

An Iris-Based Authentication Framework to Prevent Presentation Attacks.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

Improving the Prediction Accuracy of Decision Tree Mining with Data Preprocessing.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

Data masking techniques for NoSQL database security: A systematic review.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

2016
Survey of Vulnerabilities and Mitigation Techniques for Mooc-Based Applications.
Int. J. Secur. Softw. Eng., 2016

Fuzzy Rule-Based Vulnerability Assessment Framework for Web Applications.
Int. J. Secur. Softw. Eng., 2016

A Signature-Based Intrusion Detection System for Web Applications based on Genetic Algorithm.
Proceedings of the 9th International Conference on Security of Information and Networks, 2016

Object injection vulnerability discovery based on latent semantic indexing.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Digital Badges to Enhance Skills and Preparation for a Career in Cyber Security.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

OCL Fault Injection-Based Detection of LDAP Query Injection Vulnerabilities.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Anomalous Android Application Detection with Latent Semantic Indexing.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Information Theoretic Anomaly Detection Framework for Web Application.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

2015
Request and Response Analysis Framework for Mitigating Clickjacking Attacks.
Int. J. Secur. Softw. Eng., 2015

Client-Side Detection of Clickjacking Attacks.
Int. J. Inf. Secur. Priv., 2015

Security assessment of clickjacking risks in web applications: metrics based approach.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015

A Novel Approach to Detect Tampered Wireless Network Applications.
Proceedings of the 12th International Conference on Information Technology, 2015

Mobile app permissions awareness.
Proceedings of the 5th International Conference on Information & Communication Technology and Accessibility, 2015

Security concerns and mitigation approaches for MOOC-based applications.
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015

Comparing MOOC-based platforms: Reflection on pedagogical support, framework and learning analytics.
Proceedings of the 2015 International Conference on Collaboration Technologies and Systems, 2015

Classification of Lightweight Directory Access Protocol query injection attacks and mitigation techniques.
Proceedings of the 2015 International Conference on Collaboration Technologies and Systems, 2015

Message from the Fast Abstract Chairs.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

2014
Classification of Clickjacking Attacks and Detection Techniques.
Inf. Secur. J. A Glob. Perspect., 2014

Information Theoretic XSS Attack Detection in Web Applications.
Int. J. Secur. Softw. Eng., 2014

Effective detection of vulnerable and malicious browser extensions.
Comput. Secur., 2014

Dynamic Analysis of Web Objects.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

Content Provider Leakage Vulnerability Detection in Android Applications.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

Risk assessment of code injection vulnerabilities using fuzzy logic-based system.
Proceedings of the Symposium on Applied Computing, 2014

A Survey of Android Malware Characterisitics and Mitigation Techniques.
Proceedings of the 11th International Conference on Information Technology: New Generations, 2014

Detection of repackaged Android Malware.
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014

Testing of Memory Leak in Android Applications.
Proceedings of the 15th International IEEE Symposium on High-Assurance Systems Engineering, 2014

Authentic learning in network and security with portable labs.
Proceedings of the IEEE Frontiers in Education Conference, 2014

CS++: expanding CS curriculum via open cybersecurity courseware.
Proceedings of the 2014 ACM Southeast Regional Conference, Kennesaw, GA, USA, March 28, 2014

Towards mutation-based testing of column-oriented database queries.
Proceedings of the 2014 ACM Southeast Regional Conference, Kennesaw, GA, USA, March 28, 2014

Labware for networking protocols and wireless security using Android-enabled mobile devices.
Proceedings of the 2014 ACM Southeast Regional Conference, Kennesaw, GA, USA, March 28, 2014

2013
A Model-Based Detection of Vulnerable and Malicious Browser Extensions.
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013

ProClick: a framework for testing clickjacking attacks in web applications.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

Security vulnerabilities and mitigation techniques of web applications.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

Rule-Based Source Level Patching of Buffer Overflow Vulnerabilities.
Proceedings of the Tenth International Conference on Information Technology: New Generations, 2013

Design and development of Anti-XSS proxy.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013

Client-Side Detection of SQL Injection Attack.
Proceedings of the Advanced Information Systems Engineering Workshops, 2013

2012
Trustworthiness testing of phishing websites: A behavior model-based approach.
Future Gener. Comput. Syst., 2012

Mitigating program security vulnerabilities: Approaches and challenges.
ACM Comput. Surv., 2012

Mutation Testing of Event Processing Queries.
Proceedings of the 23rd IEEE International Symposium on Software Reliability Engineering, 2012

Information-Theoretic Detection of SQL Injection Attacks.
Proceedings of the 14th International IEEE Symposium on High-Assurance Systems Engineering, 2012

2011
Mitigation of Web-Based Program Security Vulnerability Exploitations.
PhD thesis, 2011

Taxonomy and classification of automatic monitoring of program security vulnerability exploitations.
J. Syst. Softw., 2011

Information Source-Based Classification of Automatic Phishing Website Detectors.
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011

Server Side Detection of Content Sniffing Attacks.
Proceedings of the IEEE 22nd International Symposium on Software Reliability Engineering, 2011

A Fuzzy Logic-Based Buffer Overflow Vulnerability Auditor.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011

S2XS2: A Server Side Approach to Automatically Detect XSS Attacks.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011

Injecting Comments to Detect JavaScript Code Injection Attacks.
Proceedings of the Workshop Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011

2010
Monitoring Buffer Overflow Attacks: A Perennial Task.
Int. J. Secur. Softw. Eng., 2010

Assessing Test Suites for Buffer Overflow Vulnerabilities.
Int. J. Softw. Eng. Knowl. Eng., 2010

Classification of Static Analysis-Based Buffer Overflow Detectors.
Proceedings of the Fourth International Conference on Secure Software Integration and Reliability Improvement, 2010

PhishTester: Automatic Testing of Phishing Attacks.
Proceedings of the Fourth International Conference on Secure Software Integration and Reliability Improvement, 2010

Client-Side Detection of Cross-Site Request Forgery Attacks.
Proceedings of the IEEE 21st International Symposium on Software Reliability Engineering, 2010

Classification of Buffer Overflow Vulnerability Monitors.
Proceedings of the ARES 2010, 2010

2009
MUTEC: Mutation-based testing of Cross Site Scripting.
Proceedings of the ICSE Workshop on Software Engineering for Secure Systems, 2009

Automatic Testing of Program Security Vulnerabilities.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

2008
MUSIC: Mutation-based SQL Injection Vulnerability Checking.
Proceedings of the Eighth International Conference on Quality Software, 2008

Mutation-Based Testing of Format String Bugs.
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008

Mutation-Based Testing of Buffer Overflow Vulnerabilities.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

2007
ACIR: An Aspect-Connector for Intrusion Response.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007


  Loading...