Md. Shohrab Hossain

Orcid: 0000-0002-4612-6771

According to our database1, Md. Shohrab Hossain authored at least 71 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Performance analysis of distributed coordination function with early collision detection in In-band Full-duplex wireless networks.
Comput. Networks, November, 2023

Layered Security Analysis for Container Images: Expanding Lightweight Pre-Deployment Scanning.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023

A Deep Learning Based Semi-Supervised Network Intrusion Detection System Robust to Adversarial Attacks.
Proceedings of the 10th International Conference on Networking, 2023

SecureImgStego: A Keyed Shuffling-based Deep Learning Model for Secure Image Steganography.
Proceedings of the IEEE Conference on Communications and Network Security, 2023

Android Malware Detection Using Incremental Learning Approach.
Proceedings of the IEEE International Black Sea Conference on Communications and Networking, 2023

2022
Security and Privacy Threats for Bluetooth Low Energy in IoT and Wearable Devices: A Comprehensive Survey.
IEEE Open J. Commun. Soc., 2022

An RTS-CTS based medium access control protocol for full-duplex wireless local area networks.
Ad Hoc Networks, 2022

Federated 3GPP Mobile Edge Computing Systems: A Transparent Proxy for Third Party Authentication With Application Mobility Support.
IEEE Access, 2022

Privacy Breach in Android Smartphone Through Inaudible Sound.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022

Provisioning Fog Services to 3GPP Subscribers: Authentication and Application Mobility.
Proceedings of the IEEE International Conference on Communications, 2022

2021
Denial-of-Service Attacks on Wireless Sensor Network and Defense Techniques.
Wirel. Pers. Commun., 2021

A Novel Approach to Manage Ownership and VAT Using Blockchain-Based Digital Identity.
Proceedings of the Ubiquitous Networking - 7th International Symposium, 2021

Feature Reduction through Data Preprocessing for Intrusion Detection in IoT Networks.
Proceedings of the 3rd IEEE International Conference on Trust, 2021

Towards an Attention-Based Accurate Intrusion Detection Approach.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2021

Low-Cost Health Monitoring System: A Smart Technological Device for Elderly People.
Proceedings of Sixth International Congress on Information and Communication Technology, 2021

An Efficient Android Malware Prediction Using Ensemble machine learning algorithms.
Proceedings of the 18th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2021) / The 16th International Conference on Future Networks and Communications (FNC-2021) / The 11th International Conference on Sustainable Energy Information Technology, 2021

Ransomware Detection Using Binary Classification.
Proceedings of the IEEE Intl Conf on Dependable, 2021

A Hybrid Machine Learning based Phishing Website Detection Technique through Dimensionality Reduction.
Proceedings of the 2021 IEEE International Black Sea Conference on Communications and Networking, 2021

2020
In-Band Full Duplex Wireless LANs: Medium Access Control Protocols, Design Issues and Their Challenges.
Inf., 2020

Preventing Session Hijacking using Encrypted One-Time-Cookies.
Proceedings of the 2020 Wireless Telecommunications Symposium, 2020

Prediction of Dengue Infected Areas using A Novel Blockchain based Crowdsourcing Framework.
Proceedings of the 11th IEEE Annual Ubiquitous Computing, 2020

Detection of Undesired Events on Real-World SCADA Power System through Process Monitoring.
Proceedings of the 11th IEEE Annual Ubiquitous Computing, 2020

An Optimized Decision Tree based Android Malware Detection Approach using Machine Learning.
Proceedings of the 7th NSysS 2020: 7th International Conference on Networking, 2020

An Integrated Inspection and Visualization Tool for Accurate Android Collusive Malware Detection.
Proceedings of the 7th NSysS 2020: 7th International Conference on Networking, 2020

Network Anomaly Detection Using LightGBM: A Gradient Boosting Classifier.
Proceedings of the 30th International Telecommunication Networks and Applications Conference, 2020

Detecting Network Intrusion through Anomalous Packet Identification.
Proceedings of the 30th International Telecommunication Networks and Applications Conference, 2020

Communication and Computation Offloading for 5G V2X: Modeling and Optimization.
Proceedings of the IEEE Global Communications Conference, 2020

2019
Performance modeling and analysis of TCP and UDP flows over software defined networks.
J. Netw. Comput. Appl., 2019

Routing in Flying Ad Hoc Networks: Survey, Constraints, and Future Challenge Perspectives.
IEEE Access, 2019

An Intelligent System for Preventing SSL Stripping-based Session Hijacking Attacks.
Proceedings of the 2019 IEEE Military Communications Conference, 2019

Domain Flux-based DGA Botnet Detection Using Feedforward Neural Network.
Proceedings of the 2019 IEEE Military Communications Conference, 2019

2018
Survivability and scalability of space networks: a survey.
Telecommun. Syst., 2018

Survey of the Protection Mechanisms to the SSL-based Session Hijacking Attacks.
Netw. Protoc. Algorithms, 2018

Performance modeling and comparison of NFV integrated with SDN: Under or aside?
J. Netw. Comput. Appl., 2018

Attacks and Defenses in Mobile IP: Modeling with Stochastic Game Petri Net.
CoRR, 2018

Security threats in Bluetooth technology.
Comput. Secur., 2018

Sequencing System Calls for Effective Malware Detection in Android.
Proceedings of the IEEE Global Communications Conference, 2018

2017
Scheduling internet of things applications in cloud computing.
Ann. des Télécommunications, 2017

A testbed implementation of hybrid decision model based seamless lightweight vertical handover.
Proceedings of the IEEE International Conference on Communications, 2017

Performance Modeling and Analysis of TCP Connections over Software Defined Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Performance Modeling of SDN with NFV under or aside the Controller.
Proceedings of the 5th International Conference on Future Internet of Things and Cloud Workshops, 2017

2016
A cost analysis framework for claimer reporter witness based clone detection schemes in WSNs.
J. Netw. Comput. Appl., 2016

Behavioral malware detection approaches for Android.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Security threats in vehicular ad hoc networks.
Proceedings of the 2016 International Conference on Advances in Computing, 2016

Comparison of NEMO Schemes in Proxy Mobile IPv6 Domain.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

2015
Management and Analysis of Multi Class Traffic in Single and Multi-band Systems.
Wirel. Pers. Commun., 2015

Malware detection in Android by network traffic analysis.
Proceedings of the International Conference on Networking Systems and Security, 2015

On the routing in Flying Ad Hoc Networks.
Proceedings of the 2015 Federated Conference on Computer Science and Information Systems, 2015

2014
h-DDSS: Heterogeneous Dynamic Dedicated servers scheduling in cloud computing.
Proceedings of the IEEE International Conference on Communications, 2014

DDSS: Dynamic dedicated servers scheduling for multi priority level classes in cloud computing.
Proceedings of the IEEE International Conference on Communications, 2014

2013
Cost analysis of mobility protocols.
Telecommun. Syst., 2013

A novel scheduling and queue management scheme for multi-band mobile routers.
Proceedings of IEEE International Conference on Communications, 2013

Multi class traffic analysis of single and multi-band queuing system.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
A Cost Analysis Framework for NEMO Prefix Delegation-Based Schemes.
IEEE Trans. Mob. Comput., 2012

Cost and Efficiency Analysis of NEMO Protocol Entities.
J. Networks, 2012

Performance evaluation of multihomed NEMO.
Proceedings of IEEE International Conference on Communications, 2012

On the efficiency of IPv6-based network mobility.
Proceedings of IEEE International Conference on Communications, 2012

Cost and efficiency analysis of hierarchical SIGMA.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Performance comparison between multihomed network mobility protocols.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

A network-based seamless handover scheme for multi-homed devices.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2012

2011
Asymptotic scalability analysis of mobility protocols based on signalling overhead.
Int. J. Commun. Networks Distributed Syst., 2011

Cost Analysis of Mobility Management Entities of SINEMO.
Proceedings of IEEE International Conference on Communications, 2011

Survivability evaluation of NEMO with multiple mobile routers.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2011

Scalability analysis of a multihomed network mobility protocol.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2011

2010
Scalability analysis of NEMO prefix delegation-based schemes.
Proceedings of the 11th IEEE International Conference on High Performance Switching and Routing, 2010

Cost analysis of mobility management entities for SIGMA.
Proceedings of the 11th IEEE International Conference on High Performance Switching and Routing, 2010

Scheduling and Queue Management for Multi-class Traffic in Access Router of Mobility Protocol.
Proceedings of the 12th IEEE International Conference on High Performance Computing and Communications, 2010

2009
Stochastic Properties and Application of City Section Mobility Model.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Signaling Cost Analysis of Mobility Protocols Using City Section Mobility Model.
Proceedings of the 2nd International Conference on Computer Science and its Applications, 2009

2008
Permutation Free Encoding Technique for Evolving Neural Networks.
Proceedings of the Advances in Neural Networks, 2008

2007
Modified Algorithms for Multilevel GRSB Protocol.
Proceedings of the 32nd Annual IEEE Conference on Local Computer Networks (LCN 2007), 2007


  Loading...