Hossain Shahriar
Orcid: 0000-0003-1021-7986
According to our database1,
Hossain Shahriar
authored at least 243 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Proceedings of the 55th ACM Technical Symposium on Computer Science Education, 2024
Secured UAV Navigation: A Novel Intrusion Detection System Based on PWM Signal Analysis.
Proceedings of the 11th IEEE Swiss Conference on Data Science, 2024
Towards Analysis and Interpretation of Large Language Models for Arithmetic Reasoning.
Proceedings of the 11th IEEE Swiss Conference on Data Science, 2024
M-DBSCAN: Modified DBSCAN Clustering Algorithm for Detecting and Controlling Outliers.
Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, 2024
Analysis and Experimental Comparison of State-Of-The-Art Deep-Learning Classification Techniques for Cyberbullying Detection.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 28th International Conference KES-2024, 2024
E-SMOTE: Entropy Based Minority Oversampling for Heart Failure and AIDS Clinical Trails Analysis.
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024
Authentic Learning on DevOps Security with Labware: Git Hooks To Facilitate Automated Security Static Analysis.
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024
Fine-Tuned Variational Quantum Classifiers for Cyber Attacks Detection Based on Parameterized Quantum Circuits and Optimizers.
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024
ActivePCA: A Novel Framework Integrating PCA and Active Machine Learning for Efficient Dimension Reduction.
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024
Mitigating Insecure Outputs in Large Language Models(LLMs): A Practical Educational Module.
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024
Practical Considerations of Fully Homomorphic Encryption in Privacy-Preserving Machine Learning.
Proceedings of the IEEE International Conference on Big Data, 2024
A Systematic Literature Review of Decentralized Applications in Web3: Identifying Challenges and Opportunities for Blockchain Developers.
Proceedings of the IEEE International Conference on Big Data, 2024
Applying Pre-trained Multilingual BERT in Embeddings for Improved Malicious Prompt Injection Attacks Detection.
Proceedings of the 2nd International Conference on Artificial Intelligence, 2024
2023
Teaching DevOps Security Education with Hands-on Labware: Automated Detection of Security Weakness in Python.
CoRR, 2023
A Trustable LSTM-Autoencoder Network for Cyberbullying Detection on Social Media Using Synthetic Data.
CoRR, 2023
Protecting the Decentralized Future: An Exploration of Common Blockchain Attacks and their Countermeasures.
CoRR, 2023
Software Supply Chain Vulnerabilities Detection in Source Code: Performance Comparison between Traditional and Quantum Machine Learning Algorithms.
CoRR, 2023
Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and Protection.
CoRR, 2023
Confronting Toddlers' Brain Development Challenges Due to Screen-Addiction: Unpacking Perspectives from Stakeholders.
Proceedings of the 24th Annual Conference on Information Technology Education, 2023
Collaborative and Active Learning with Portable Online Hands-on Labware for Blockchain Development.
Proceedings of the 54th ACM Technical Symposium on Computer Science Education, Volume 2, 2023
Proceedings of the 54th ACM Technical Symposium on Computer Science Education, Volume 2, 2023
Proceedings of the IEEE Symposium on Computers and Communications, 2023
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023
Quantum Machine Learning in Disease Detection and Prediction: a survey of applications and future possibilities.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023
Cardiovascular Health Management Compliance with Health Insurance Portability and Accountability Act.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023
Blockchain Technology in Higher Education Ecosystem: Unraveling the Good, Bad, and Ugly.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023
AI-Assisted Security: A Step towards Reimagining Software Development for a Safer Future.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023
HIPAAChecker: The Comprehensive Solution for HIPAA Compliance in Android mHealth Apps.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023
BlockTheFall: Wearable Device-based Fall Detection Framework Powered by Machine Learning and Blockchain for Elderly Care.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023
Uncovering Software Supply Chains Vulnerability: A Review of Attack Vectors, Stakeholders, and Regulatory Frameworks.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023
Authentic Learning Approach for Artificial Intelligence Systems Security and Privacy.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023
Feature Engineering-Based Detection of Buffer Overflow Vulnerability in Source Code Using Neural Networks.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023
Autism Disease Detection Using Transfer Learning Techniques: Performance Comparison Between Central Processing Unit vs Graphics Processing Unit Functions for Neural Networks.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023
Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and Protection.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023
Adversarial Data-Augmented Resilient Intrusion Detection System for Unmanned Aerial Vehicles.
Proceedings of the IEEE International Conference on Big Data, 2023
A Trustable LSTM-Autoencoder Network for Cyberbullying Detection on Social Media Using Synthetic Data.
Proceedings of the IEEE International Conference on Big Data, 2023
Quantum Cryptography for Enhanced Network Security: A Comprehensive Survey of Research, Developments, and Future Directions.
Proceedings of the IEEE International Conference on Big Data, 2023
Proceedings of the 2023 IEEE World AI IoT Congress (AIIoT), 2023
Proceedings of the 2023 IEEE World AI IoT Congress (AIIoT), 2023
Exploring the Vulnerabilities of Machine Learning and Quantum Machine Learning to Adversarial Attacks Using a Malware Dataset: A Comparative Analysis.
Proceedings of the IEEE International Conference on Software Services Engineering, 2023
2022
Int. J. Medical Eng. Informatics, 2022
Forecasting the Risk Factor of Frontier Markets: A Novel Stacking Ensemble of Neural Network Approach.
Future Internet, 2022
Bayesian Hyperparameter Optimization for Deep Neural Network-Based Network Intrusion Detection.
CoRR, 2022
Automated Vulnerability Detection in Source Code Using Quantum Natural Language Processing.
Proceedings of the Ubiquitous Security - Second International Conference, 2022
Development of Blockchain-based e-Voting System: Requirements, Design and Security Perspective.
Proceedings of the IEEE International Conference on Trust, 2022
Authentic Learning of Machine Learning in Cybersecurity with Portable Hands-on Labware.
Proceedings of the SIGCSE 2022: The 53rd ACM Technical Symposium on Computer Science Education, 2022
Software Engineering Process and Methodology in Blockchain-Oriented Software Development: A Systematic Study.
Proceedings of the 20th IEEE/ACIS International Conference on Software Engineering Research, 2022
Comparative Study of Machine Learning Methods on Spectroscopy Images for Blood Glucose Estimation.
Proceedings of the Pervasive Computing Technologies for Healthcare, 2022
Can We use Authentic Learning to Educate Students about Secure Infrastructure as Code Development?
Proceedings of the ITiCSE 2022: Innovation and Technology in Computer Science Education, Dublin, Ireland, July 8, 2022
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2022
A Novel IoT-based Framework for Non-Invasive Human Hygiene Monitoring using Machine Learning Techniques.
Proceedings of the 10th IEEE International Conference on Healthcare Informatics, 2022
Implementing Virtual Nursing in Health Care: An evaluation of effectiveness and sustainability.
Proceedings of the IEEE International Conference on Digital Health, 2022
Knowledge Management in a Healthcare Enterprise: Creation of a Digital Knowledge Repository.
Proceedings of the IEEE International Conference on Digital Health, 2022
Proceedings of the 1st International Conference on AI in Cybersecurity, 2022
DuRBIN: A Comprehensive Approach to Analysis and Detection of Emerging Threats due to Network Intrusion.
Proceedings of the IEEE Intl. Conf. on Dependable, 2022
Evolution of Quantum Computing: A Systematic Survey on the Use of Quantum Computing Tools.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022
Blockchain-based Medical Image Sharing and Automated Critical-results Notification: A Novel Framework.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022
Towards Automation for MLOps: An Exploratory Study of Bot Usage in Deep Learning Libraries.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022
Broaden Multidisciplinary Data Science Research by an Innovative Cyberinfrastructure Platform.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022
MRehab: Mutlimodal data acquisition and modeling framework for assessing stroke and cardiac rehabilitation exercises.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022
A Literature Review on Blockchain-enabled Security and Operation of Cyber-Physical Systems.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022
Predicting Mortality Rate based on Comprehensive Features of Intensive Care Unit Patients.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022
Shifting Left for Machine Learning: An Empirical Study of Security Weaknesses in Supervised Learning-based Projects.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022
Towards Unsupervised Learning based Denoising of Cyber Physical System Data to Mitigate Security Concerns.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022
Proceedings of the 12th IEEE Annual Computing and Communication Workshop and Conference, 2022
A Crowd Source System for YouTube Big Data Analytics: Unpacking Values from Data Sprawl.
Proceedings of the IEEE International Conference on Big Data, 2022
Proceedings of the IEEE International Conference on Big Data, 2022
Authentic Learning of Machine Learning in Cybersecurity with Portable Hands-on Labware: Neural Network Algorithms for Network Denial of Service (DOS) Detection.
Proceedings of the IEEE International Conference on Big Data, 2022
Multi-class Skin Cancer Classification Architecture Based on Deep Convolutional Neural Network.
Proceedings of the IEEE International Conference on Big Data, 2022
Handwritten Word Recognition using Deep Learning Approach: A Novel Way of Generating Handwritten Words.
Proceedings of the IEEE International Conference on Big Data, 2022
Deep Learning Approach for Classifying the Aggressive Comments on Social Media: Machine Translated Data Vs Real Life Data.
Proceedings of the IEEE International Conference on Big Data, 2022
Software Supply Chain Vulnerabilities Detection in Source Code: Performance Comparison between Traditional and Quantum Machine Learning Algorithms.
Proceedings of the IEEE International Conference on Big Data, 2022
Bie Vote: A Biometric Identification Enabled Blockchain-Based Secure and Transparent Voting Framework.
Proceedings of the Fourth International Conference on Blockchain Computing and Applications, 2022
2021
Int. J. Inf. Secur. Priv., 2021
Proceedings of the 14th International Conference on Security of Information and Networks, 2021
Proceedings of the SIGITE '21: The 22nd Annual Conference on Information Technology Education, SnowBird, UT, USA, October 6, 2021
Proceedings of the Quality of Information and Communications Technology, 2021
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2021
Proceedings of the 29th IEEE International Conference on Network Protocols, 2021
Proceedings of the IEEE International Conference on Digital Health, 2021
Proceedings of the IEEE International Conference on Digital Health, 2021
Proceedings of the IEEE International Conference on Digital Health, 2021
A Statistical Summary Analysis of Window-Based Extracted Features for EEG Signal Classification.
Proceedings of the IEEE International Conference on Digital Health, 2021
Framework for Collecting Data from specialized IoT devices - An application to enhance Healthcare Systems.
Proceedings of the IEEE International Conference on Digital Health, 2021
Proceedings of the IEEE International Conference on Digital Health, 2021
Proceedings of the IEEE Frontiers in Education Conference, 2021
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021
An Investigation on Non-Invasive Brain-Computer Interfaces: Emotiv Epoc+ Neuroheadset and Its Effectiveness.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021
A Taxonomy of XSS Attack Detections in Mobile Environments based on Automation Capabilities.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021
Ride-Hailing for Autonomous Vehicles: Hyperledger Fabric-Based Secure and Decentralize Blockchain Platform.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021
Bayesian Hyperparameter Optimization for Deep Neural Network-Based Network Intrusion Detection.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021
Colab Cloud Based Portable and Shareable Hands-on Labware for Machine Learning to Cybersecurity.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021
An Architecture for Federated Learning Enabled Collaborative Intrusion Detection System.
Proceedings of the 27th Americas Conference on Information Systems, 2021
2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the SIN 2020: 13th International Conference on Security of Information and Networks, 2020
The Adoption, Issues, and Challenges of Wearable Healthcare Technology for the Elderly.
Proceedings of the SIGITE '20: The 21st Annual Conference on Information Technology Education, 2020
Proceedings of the 51st ACM Technical Symposium on Computer Science Education, 2020
Information Assurance and Security Education on Undergraduate Computing Degree Programs.
Proceedings of the 51st ACM Technical Symposium on Computer Science Education, 2020
A Hands-On Lab for Macro Malware Detection using Machine Learning on Virtual Machines.
Proceedings of the 51st ACM Technical Symposium on Computer Science Education, 2020
R-Mon: An mhealth Tool for Real-time Respiratory Monitoring During Pandemics and Self-Isolation.
Proceedings of the 2020 IEEE World Congress on Services, 2020
Proceedings of the National Cyber Summit (NCS) Research Track 2020, 2020
Proceedings of the 15th International Conference for Internet Technology and Secured Transactions, 2020
Epileptic Seizure Detection for Imbalanced Datasets Using an Integrated Machine Learning Approach.
Proceedings of the 42nd Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2020
Denial of Service (DoS) Attack Detection: Performance Comparison of Supervised Machine Learning Algorithms.
Proceedings of the IEEE Intl Conf on Dependable, 2020
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020
Enhancing Proactive Control Mobile and Web Software Security Education with Hands-on Labware.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020
Analysis of Sampling Techniques Towards Epileptic Seizure Detection from Imbalanced Dataset.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020
r-LSTM: Time Series Forecasting for COVID-19 Confirmed Cases with LSTMbased Framework.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020
Proceedings of the 2020 ACM Southeast Conference, 2020
2019
Inf. Secur. J. A Glob. Perspect., 2019
Toward a Secure and Decentralized Blockchain-based Ride-Hailing Platform for Autonomous Vehicles.
CoRR, 2019
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019
Proceedings of the 20th Annual SIG Conference on Information Technology Education, 2019
An Architecture for Blockchain-Enabled Collaborative Signature-based Intrusion Detection System.
Proceedings of the 20th Annual SIG Conference on Information Technology Education, 2019
Proceedings of the 50th ACM Technical Symposium on Computer Science Education, 2019
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019
Proceedings of the National Cyber Summit, 2019
Security requirement prototyping with hyperledger composer for drug supply chain: a blockchain application.
Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, 2019
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019
Hands-on File Inclusion Vulnerablity and Proactive Control for Secure Software Development.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019
Compliance Checking of Open Source EHR Applications for HIPAA and ONC Security and Privacy Requirements.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019
Proceedings of the IEEE International Conference on Blockchain, 2019
Experiential Learning: Case Study-Based Portable Hands-on Regression Labware for Cyber Fraud Prediction.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
2018
Proceedings of the 19th Annual SIG Conference on Information Technology Education, 2018
Proceedings of the 19th Annual SIG Conference on Information Technology Education, 2018
Proceedings of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing, 2018
Proceedings of the National Cyber Summit, 2018
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018
Secure Mobile IPC Software Development with Vulnerability Detectors in Android Studio.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018
Static Analysis of HIPPA Security Requirements in Electronic Health Record Applications.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018
2017
Broadening Secure Mobile Software Development (SMSD) Through Curriculum Development (Abstract Only).
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 2017
Proceedings of the Symposium on Applied Computing, 2017
Proceedings of the 2017 ACM Conference on Innovation and Technology in Computer Science Education, 2017
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017
Proceedings of the 2017 IEEE Frontiers in Education Conference, 2017
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017
2016
Int. J. Secur. Softw. Eng., 2016
Int. J. Secur. Softw. Eng., 2016
A Signature-Based Intrusion Detection System for Web Applications based on Genetic Algorithm.
Proceedings of the 9th International Conference on Security of Information and Networks, 2016
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
2015
Int. J. Secur. Softw. Eng., 2015
Security assessment of clickjacking risks in web applications: metrics based approach.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015
Proceedings of the 12th International Conference on Information Technology, 2015
Proceedings of the 5th International Conference on Information & Communication Technology and Accessibility, 2015
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015
Comparing MOOC-based platforms: Reflection on pedagogical support, framework and learning analytics.
Proceedings of the 2015 International Conference on Collaboration Technologies and Systems, 2015
Classification of Lightweight Directory Access Protocol query injection attacks and mitigation techniques.
Proceedings of the 2015 International Conference on Collaboration Technologies and Systems, 2015
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015
2014
Inf. Secur. J. A Glob. Perspect., 2014
Int. J. Secur. Softw. Eng., 2014
Comput. Secur., 2014
Proceedings of the 7th International Conference on Security of Information and Networks, 2014
Proceedings of the 7th International Conference on Security of Information and Networks, 2014
Proceedings of the Symposium on Applied Computing, 2014
Proceedings of the 11th International Conference on Information Technology: New Generations, 2014
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014
Proceedings of the 15th International IEEE Symposium on High-Assurance Systems Engineering, 2014
Proceedings of the IEEE Frontiers in Education Conference, 2014
Proceedings of the 2014 ACM Southeast Regional Conference, Kennesaw, GA, USA, March 28, 2014
Proceedings of the 2014 ACM Southeast Regional Conference, Kennesaw, GA, USA, March 28, 2014
Labware for networking protocols and wireless security using Android-enabled mobile devices.
Proceedings of the 2014 ACM Southeast Regional Conference, Kennesaw, GA, USA, March 28, 2014
2013
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013
Proceedings of the 6th International Conference on Security of Information and Networks, 2013
Proceedings of the 6th International Conference on Security of Information and Networks, 2013
Proceedings of the Tenth International Conference on Information Technology: New Generations, 2013
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013
Proceedings of the Advanced Information Systems Engineering Workshops, 2013
2012
Future Gener. Comput. Syst., 2012
ACM Comput. Surv., 2012
Proceedings of the 23rd IEEE International Symposium on Software Reliability Engineering, 2012
Proceedings of the 14th International IEEE Symposium on High-Assurance Systems Engineering, 2012
2011
PhD thesis, 2011
Taxonomy and classification of automatic monitoring of program security vulnerability exploitations.
J. Syst. Softw., 2011
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011
Proceedings of the IEEE 22nd International Symposium on Software Reliability Engineering, 2011
Proceedings of the IEEE Ninth International Conference on Dependable, 2011
Proceedings of the IEEE Ninth International Conference on Dependable, 2011
Proceedings of the Workshop Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011
2010
Int. J. Secur. Softw. Eng., 2010
Int. J. Softw. Eng. Knowl. Eng., 2010
Proceedings of the Fourth International Conference on Secure Software Integration and Reliability Improvement, 2010
Proceedings of the Fourth International Conference on Secure Software Integration and Reliability Improvement, 2010
Proceedings of the IEEE 21st International Symposium on Software Reliability Engineering, 2010
Proceedings of the ARES 2010, 2010
2009
Proceedings of the ICSE Workshop on Software Engineering for Secure Systems, 2009
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009
2008
Proceedings of the Eighth International Conference on Quality Software, 2008
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008
2007
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007