Touhid Bhuiyan

According to our database1, Touhid Bhuiyan authored at least 21 papers between 2008 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
A Comparative Analysis of the Cyber Security Strategy of Bangladesh.
CoRR, 2019

Customer Feedback Prioritization Technique: A Case Study on Lean Startup.
Proceedings of the Computational Science and Its Applications - ICCSA 2019, 2019

2018
e-School: Design and Implementation of Web Based Teaching Institution for Enhancing E-Learning Experiences.
Proceedings of the Computational Collective Intelligence - 10th International Conference, 2018

2015
SQLi penetration testing of financial Web applications: Investigation of Bangladesh region.
Proceedings of the 2015 World Congress on Internet Security, 2015

SQLi vulnerabilty in education sector websites of Bangladesh.
Proceedings of the 2015 Second International Conference on Information Security and Cyber Forensics, 2015

A Case Study of SQL Injection Vulnerabilities Assessment of .bd Domain Web Applications.
Proceedings of the Fourth International Conference on Cyber Security, 2015

2014
Knowledge Management in Distributed Agile Software Development Projects.
Proceedings of the Artificial Intelligence for Knowledge Management, 2014

2013
Trust for Intelligent Recommendation
Springer Briefs in Electrical and Computer Engineering, Springer, ISBN: 978-1-4614-6895-0, 2013

Managing and Analysing Software Product Line Requirements.
CoRR, 2013

Circle of Trust: One-Hop-Trust-Based Security Paradigm for Resource-Constraint MANET.
Proceedings of the Intelligent Computing, 2013

2010
Managing Trust in Online Social Networks.
Proceedings of the Handbook of Social Network Technologies and Applications, 2010

Developing Trust Networks Based on User Tagging Information for Recommendation Making.
Proceedings of the Web Information Systems Engineering - WISE 2010, 2010

Derivation of Design Rainfall Temporal Patterns in Australia's Gold Coast Region.
Proceedings of the 2010 International Conference on Information & Knowledge Engineering, 2010

Impact of Knowledge Sharing in Supply Chain Networks.
Proceedings of the 2010 International Conference on Information & Knowledge Engineering, 2010

A Model of a Feed Forward Multi Layered Neural Network to Recognize Hand Written Bengali Digits.
Proceedings of the 2010 International Conference on Artificial Intelligence, 2010

The Potential Relationship Between Trust and Interest Similarity.
Proceedings of the 2010 International Conference on Internet Computing, 2010

A Review of Trust in Online Social Networks to Explore New Research Agenda.
Proceedings of the 2010 International Conference on Internet Computing, 2010

SimTrust: A New Method of Trust Network Generation.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

2008
Combining Trust and Reputation Management for Web-Based Services.
Proceedings of the Trust, 2008

Optimal Trust Network Analysis with Subjective Logic.
Proceedings of the Second International Conference on Emerging Security Information, 2008

Integrating Trust with Public Reputation in Location-Based Social Networks for Recommendation Making.
Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2008


  Loading...