Mohammad Jabed Morshed Chowdhury
Orcid: 0000-0003-4476-8882
According to our database1,
Mohammad Jabed Morshed Chowdhury
authored at least 49 papers
between 2012 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
2012
2014
2016
2018
2020
2022
2024
0
5
10
1
9
6
6
3
4
3
1
1
1
1
1
3
3
5
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
2024
A systematic review on research utilising artificial intelligence for open source intelligence (OSINT) applications.
Int. J. Inf. Sec., August, 2024
A Survey of Recent Advances in Deep Learning Models for Detecting Malware in Desktop and Mobile Platforms.
ACM Comput. Surv., June, 2024
A systematic literature review on Windows malware detection: Techniques, research issues, and future directions.
J. Syst. Softw., March, 2024
Sensors, February, 2024
A Systematic Literature Review on the Use of Blockchain Technology in Transition to a Circular Economy.
CoRR, 2024
EarlyMalDetect: A Novel Approach for Early Windows Malware Detection Based on Sequences of API Calls.
CoRR, 2024
Blockchain-enabled Circular Economy - Collaborative Responsibility in Solar Panel Recycling.
CoRR, 2024
MeMalDet: A memory analysis-based malware detection framework using deep autoencoders and stacked ensemble under temporal evaluations.
Comput. Secur., 2024
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2024
2023
Computing, October, 2023
API-MalDetect: Automated malware detection framework for windows based on API calls and deep learning techniques.
J. Netw. Comput. Appl., September, 2023
A multipath routing protocol for secure energy efficient communication in Wireless Sensor Networks.
Comput. Networks, August, 2023
BlockMeter: An Application Agnostic Performance Measurement Framework for Private Blockchain Platforms.
IEEE Trans. Serv. Comput., 2023
Comput. Secur., 2023
Circulogy: An AI-Enabled Blockchain-Based e-Waste Management Framework Using Non-Fungible Tokens (NFT) to Achieve Net Zero and Imply the Circular Economy.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023
2022
A Cross-Layer Trust-Based Consensus Protocol for Peer-to-Peer Energy Trading Using Fuzzy Logic.
IEEE Internet Things J., 2022
A systematic literature review on wearable health data publishing under differential privacy.
Int. J. Inf. Sec., 2022
Future Internet, 2022
A study on malicious software behaviour analysis and detection techniques: Taxonomy, current trends and challenges.
Future Gener. Comput. Syst., 2022
MalDetConv: Automated Behaviour-based Malware Detection Framework Based on Natural Language Processing and Deep Learning Techniques.
CoRR, 2022
A blockchain-based secure data-sharing framework for Software Defined Wireless Body Area Networks.
Comput. Networks, 2022
2021
A new disjunctive literal insertion fault detection strategy in boolean specifications.
J. Softw. Evol. Process., 2021
J. Netw. Comput. Appl., 2021
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021
2020
Knowl. Eng. Rev., 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020
2019
This would work perfectly if it weren't for all the humans: Two factor authentication in late modern societies.
First Monday, 2019
Proceedings of the 18th IEEE International Conference On Trust, 2019
Proceedings of the 5th IEEE International Conference on Collaboration and Internet Computing, 2019
Proceedings of the 2019 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), 2019
2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018
Proceedings of the Australasian Computer Science Week Multiconference, 2018
2013
2012
Aligning Mal-activity Diagrams and Security Risk Management for Security Requirements Definitions.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2012