Cybersecurity threats and their mitigation approaches using Machine Learning—A Review M Ahsan, KE Nygard, R Gomes, MM Chowdhury, N Rifat, JF Connolly Journal of Cybersecurity and Privacy 2 (3), 527-555, 2022 | 151 | 2022 |
Enhancing machine learning prediction in cybersecurity using dynamic feature selector M Ahsan, R Gomes, MM Chowdhury, KE Nygard Journal of Cybersecurity and Privacy 1 (1), 199-218, 2021 | 112 | 2021 |
Optimization models for energy reallocation in a smart grid KE Nygard, SB Ghosn, MM Chowdhury, D Loegering, R McCulloch, ... 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2011 | 50 | 2011 |
Understanding APT detection using Machine learning algorithms: Is superior accuracy a thing? S Arefin, M Chowdhury, R Parvez, T Ahmed, AFMS Abrar, F Sumaiya 2024 IEEE International Conference on Electro Information Technology (eIT …, 2024 | 41 | 2024 |
Security analysis of 5g network JA Khan, MM Chowdhury 2021 IEEE International Conference on Electro Information Technology (EIT …, 2021 | 40 | 2021 |
The growing influence of ransomware MA Mos, MM Chowdhury 2020 IEEE International Conference on Electro Information Technology (EIT …, 2020 | 40 | 2020 |
Deception in cyberspace: An empirical study on a con man attack MM Chowdhury, KE Nygard 2017 IEEE International Conference on Electro Information Technology (EIT …, 2017 | 32 | 2017 |
Machine learning within a con resistant trust model M Chowdhury, K Nygard The 33rd International Conference on Computers and Their Applications (CATA …, 2018 | 31 | 2018 |
The growing security concerns of cloud computing D Sampson, MM Chowdhury 2021 IEEE International Conference on Electro Information Technology (EIT …, 2021 | 30 | 2021 |
Deception in cyberspace: Performance focused con resistant trust algorithm MM Chowdhury, KE Nygard, K Kambhampaty, M Alruwaythi 2017 International Conference on Computational Science and Computational …, 2017 | 30 | 2017 |
Bert against social engineering attack: Phishing text detection N Rifat, M Ahsan, M Chowdhury, R Gomes 2022 IEEE International Conference on Electro Information Technology (eIT), 1-6, 2022 | 29 | 2022 |
Social engineering: The looming threat M Mattera, MM Chowdhury 2021 IEEE International Conference on Electro Information Technology (EIT …, 2021 | 29 | 2021 |
Mobile device threat: Malware N Atanassov, MM Chowdhury 2021 IEEE International Conference on Electro Information Technology (EIT …, 2021 | 29 | 2021 |
Linux Security: A Survey MJ Matthew R. Yaswinski, Md. Minhaz Chowdhury 2019 IEEE International Conference on Electro Information Technology (EIT), 2019 | 29* | 2019 |
Mobile security: A look into android A Mos, MM Chowdhury 2020 IEEE international conference on electro information technology (EIT …, 2020 | 28 | 2020 |
An Empirical Study on a Con Resistant Trust Algorithm for Cyberspace MM Chowdhury, KE Nygard | 27 | 2017 |
An artificial immune system heuristic in a smart grid MM Chowdhury, J Tang, KE Nygard The 28th International Conference on Computers and Their Applications, 2013 | 27 | 2013 |
Internet of Things Device Hardening Using Shodan.io and ShoVAT: A Survey MJ Jacob S. Rae, Md. Minhaz Chowdhury 2019 IEEE International Conference on Electro Information Technology (EIT), 2019 | 26* | 2019 |
Distributed denial of service: Problems and solutions M Pokrinchak, MDM Chowdhury 2021 IEEE International Conference on Electro Information Technology (EIT …, 2021 | 24 | 2021 |
Ethical hacking: Skills to fight cybersecurity threats L Smith, MM Chowdhury, S Latif EPiC Series in Computing 82 (5), 102-111, 2022 | 19 | 2022 |