Md Minhaz Chowdhury

Orcid: 0000-0003-0145-6838

According to our database1, Md Minhaz Chowdhury authored at least 40 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Understanding APT detection using Machine learning algorithms: Is superior accuracy a thing?
Proceedings of the IEEE International Conference on Electro Information Technology, 2024

2023
Vision Transformer-based Classification for Lung and Colon Cancer using Histopathology Images.
Proceedings of the International Conference on Machine Learning and Applications, 2023

Deep Learning Application for Detection of Malaria.
Proceedings of the IEEE International Conference on Electro Information Technology, 2023

ChatGPT: The Curious Case of Attack Vectors' Supply Chain Management Improvement.
Proceedings of the IEEE International Conference on Electro Information Technology, 2023

ChatGPT: A Threat Against the CIA Triad of Cyber Security.
Proceedings of the IEEE International Conference on Electro Information Technology, 2023

2022
Cybersecurity Threats and Their Mitigation Approaches Using Machine Learning - A Review.
J. Cybersecur. Priv., July, 2022

Malware: A Software for Cybercrime.
Proceedings of the 2022 IEEE International Conference on Electro Information Technology, 2022

Exploit Security Vulnerabilities by Penetration Testing.
Proceedings of the 2022 IEEE International Conference on Electro Information Technology, 2022

COVID-19 Sentiment Analysis applying BERT.
Proceedings of the 2022 IEEE International Conference on Electro Information Technology, 2022

BERT Against Social Engineering Attack: Phishing Text Detection.
Proceedings of the 2022 IEEE International Conference on Electro Information Technology, 2022

Computational Trust for Securing IoT.
Proceedings of the 2022 IEEE International Conference on Electro Information Technology, 2022

Computer Forensics: Complementing Cyber Security.
Proceedings of the 2022 IEEE International Conference on Electro Information Technology, 2022

Bitcoin: Cryptographic Algorithms, Security Vulnerabilities and Mitigations.
Proceedings of the 2022 IEEE International Conference on Electro Information Technology, 2022

Uncover Security Weakness Before the Attacker Through Penetration Testing.
Proceedings of the 2022 IEEE International Conference on Electro Information Technology, 2022

Card Skimming: A Cybercrime by Hackers.
Proceedings of the 2022 IEEE International Conference on Electro Information Technology, 2022

Data Breaches: Vulnerable Privacy.
Proceedings of the 2022 IEEE International Conference on Electro Information Technology, 2022

IoT Security and Privacy.
Proceedings of the 2022 IEEE International Conference on Electro Information Technology, 2022

Password Security: What Are We Doing Wrong?
Proceedings of the 2022 IEEE International Conference on Electro Information Technology, 2022

Active Cyber Defense by Benevolent Worms.
Proceedings of the 2022 IEEE International Conference on Electro Information Technology, 2022

IoT Security for Smart Home: Issues and Solutions.
Proceedings of the 2022 IEEE International Conference on Electro Information Technology, 2022

Intrusion Detection for IoT Network Security with Deep Neural Network.
Proceedings of the 2022 IEEE International Conference on Electro Information Technology, 2022

Detecting Cyber Attacks: A Reinforcement Learning Based Intrusion Detection System.
Proceedings of the 2022 IEEE International Conference on Electro Information Technology, 2022

Honeynets and Cloud Security.
Proceedings of the 2022 IEEE World AI IoT Congress (AIIoT), 2022

Cloud Computing Security and Future.
Proceedings of the 2022 IEEE World AI IoT Congress (AIIoT), 2022

A Survey of Intrusion Detection and Prevention Systems.
Proceedings of the 2022 IEEE World AI IoT Congress (AIIoT), 2022

Botnets as the Modern Attack Vector.
Proceedings of the 2022 IEEE World AI IoT Congress (AIIoT), 2022

2021
Enhancing Machine Learning Prediction in Cybersecurity Using Dynamic Feature Selector.
J. Cybersecur. Priv., March, 2021

The Growing Security Concerns of Cloud Computing.
Proceedings of the IEEE International Conference on Electro Information Technology, 2021

Distributed Denial of Service: Problems and Solutions.
Proceedings of the IEEE International Conference on Electro Information Technology, 2021

Measures to Protect Cloud Data: A Survey.
Proceedings of the IEEE International Conference on Electro Information Technology, 2021

Social Engineering: The Looming Threat.
Proceedings of the IEEE International Conference on Electro Information Technology, 2021

Security Analysis of 5G Network.
Proceedings of the IEEE International Conference on Electro Information Technology, 2021

An Evaluation of RFID Security Systems and their Effectiveness.
Proceedings of the IEEE International Conference on Electro Information Technology, 2021

Security Issues of Mobile Devices: A Survey.
Proceedings of the IEEE International Conference on Electro Information Technology, 2021

Mobile Device Threat: Malware.
Proceedings of the IEEE International Conference on Electro Information Technology, 2021

2020
The Growing Influence of Ransomware.
Proceedings of the 2020 IEEE International Conference on Electro Information Technology, 2020

Mobile Security: A Look into Android.
Proceedings of the 2020 IEEE International Conference on Electro Information Technology, 2020

2019
Linux Security: A Survey.
Proceedings of the 2019 IEEE International Conference on Electro Information Technology, 2019

Internet of Things Device Hardening Using Shodan.io and ShoVAT: A Survey.
Proceedings of the 2019 IEEE International Conference on Electro Information Technology, 2019

2017
Deception in cyberspace: An empirical study on a con man attack.
Proceedings of the IEEE International Conference on Electro Information Technology, 2017


  Loading...