top of page
  • Forensic Potentials of Solid State Drives

              Zubair Shah, Abdun Mahmood and Jill Slay     

  • Cloud Security from Users Point of View: A Pragmatic Study with Thematic Analysis

              Syed Saira and Quazi Mamun

  • A Secure Real Time Data Processing Framework for Personally controlled Electronic Health Record (PCEHR) System                       

             Rabbi Khandakar, Kaosar Mohammad, Quazi Mamun and Rafiqul Islam

  • Novel Iterative Min-Max Clustering to Minimize Information Loss in Statistical Disclosure Control

             Mustafa Abdul, Abdun N Mahmood and Enamul Kabir

  • Securing Sensor Networks by Moderating Frequencies

              Pinaki Sarkar, Mahish Priyatosh, Morshed U Chowdhury and Kouichi Sakurai

  • A Performance Comparison Study of a Coverage-Preserving N.

             Qun Wang, Ji Peiyu, Qian Huanyan, Xie Yu and Yang Shuhui

  • Intelligent Financial Fraud Detection Practices: An Investigation

              West Jarrod, Maumita Bhattachyria and Rafiqul Islam

  • Network Traffic Pattern Analysis using Improved Information Theoretic Co-clustering based Collective Anomaly Detection.

              Ahmed Mohiuddin and  Abdun Mahmood

  • A Survey on Mining Program-Graph Features for Malware Analysis

              Md Saiful Islam, Rafiqul Islam, Kayes, ASM, Liu Chengfei and Irfan Altas

  • Defence Against Code Injection Attacks

             Alnabulsi Hussein, Quazi Mamun, Rafiqul Islam and Morshed Chowdhury 

  • False Data Injection Attack Targeting the LTC Transformer to Disrupt Smart Grid Operation

              Anwar Adnan, Abdun Mahmood and Mohiuddin Ahmed

  • A Domain-Based Multi-cluster SIP Solution for Mobile Ad Hoc Network.

             Ala Abraham and Kim-Kwang Raymond Choo

 

bottom of page