Md. Alamgir Hossain
MSc in ICT (Ongoing), Bangladesh University of Engineering
Technology (BUET)
BSc in CSE, Jashore University of Science and Technology (JUST)
Md. Alamgir Hossain
Cybersecurity, Data Security and privacy, Network Security, Machine learning, Deep Learning, Cloud Computing
List of Journal Articles:
[1] M. A. Hossain et al., “AI-enabled approach for enhancing obfuscated malware detection: a hybrid ensemble learning with combined feature selection techniques,” Int J Syst Assur Eng Manag, Mar. 2024, doi: 10.1007/s13198-024-02294-y.
[2] M.
A. Haque and M. A. Hossain et al.,
“6G Wireless Communication Networks: Challenges and Potential Solution,” International
Journal of Business Data Communications and Networking, vol. 19, no. 1, pp.
1–27, Mar. 2024, doi: 10.4018/IJBDCN.339889.
[3] M. A. Hossain and Md. S. Islam,
“Enhancing DDoS attack detection with hybrid feature selection and
ensemble-based classifier: A promising solution for robust cybersecurity,” Measurement:
Sensors, vol. 32, p. 101037, Apr. 2024, doi: 10.1016/j.measen.2024.101037.
[4] M. A. Hossain and Md. S. Islam,
“Enhanced detection of obfuscated malware in memory dumps: a machine learning
approach for advanced cybersecurity,” Cybersecurity, vol. 7, no. 1, p.
16, Jan. 2024, doi: 10.1186/s42400-024-00205-z.
[5] M. A. Hossain and M. S. Islam, “A novel
hybrid feature selection and ensemble-based machine learning approach for
botnet detection,” Sci Rep, vol. 13, no. 1, Art. no. 1, Dec. 2023, doi:
10.1038/s41598-023-48230-1.
[6] M. A. Hossain, “Enhanced Ensemble-Based
Distributed Denial-of-Service (DDoS) Attack Detection with Novel Feature
Selection: A Robust Cybersecurity Approach,” Artificial Intelligence
Evolution, vol. 4, no. 2, pp. 165–186, Aug. 2023, doi:
10.37256/aie.4220233337.
[7] M. A. Hossain and M. S. Islam,
“Ensuring network security with a robust intrusion detection system using
ensemble-based machine learning,” Array, p. 100306, Jul. 2023, doi:
10.1016/j.array.2023.100306.
[8] M. A. Hossain, I. Ahammad, Md. K.
Ahmed, and M. I. Ahmed, “Prediction of the Computer Science Department’s
Educational Performance through Machine Learning Model by Analyzing Students’
Academic Statements,” Artificial Intelligence Evolution, vol. 4, no. 1,
pp. 70–87, May 2023, doi: 10.37256/aie.4120232569.
[9] M. A. Hossain and Md. A. Al Hasan,
“Improving cloud data security through hybrid verification technique based on
biometrics and encryption system,” International Journal of Computers and
Applications, vol. 44, no. 5, pp. 455–464, May 2022, doi:
10.1080/1206212X.2020.1809177.
[10] M. A. Hossain et al.,
“Predicting the Specialized Areas of Computer Science Students of Bachelor of
Science Level Analyzing Academic Statements Using Machine-learning Approaches,”
International Journal of Computer Science & Programming languages,
vol. 8, no. 2, pp. 30–51, 2022.
[11] M. A. Hossain and F. Yasmin, “Emergency
Online Teaching-Learning Model in the Context of Higher-Level Education due to
the COVID-19 Pandemic,” JSHE, vol. 2, no. 4, pp. 327–341, Aug. 2022,
doi: 10.35912/jshe.v2i4.1109.
[12] M. A. Hossain, J. Ferdush, and M.
Khatun, “A study and implementation of large-scale log-determinant computation
to cloud,” International Journal of Computers and Applications, vol. 43,
no. 10, pp. 1020–1028, Nov. 2021, doi: 10.1080/1206212X.2019.1648632.
[13] S.
Akter, M. A. Hossain, and Md. M.
Rahman Redoy Akanda, “A Noble Security Analysis of Various Distributed
Systems,” Int. J. Eng. Scie. and Inform. Technology., vol. 1, no. 2, pp.
62–71, Apr. 2021, doi: 10.52088/ijesty.v1i2.101.
[14] F. Yasmin
and M. A. Hossain, “How do smart
devices control and changes the lifestyle habits of human being? A study in the
context of Bangladesh,” Journal of Social, Humanity, and Education, vol.
2, no. 1, pp. 85–100, Nov. 2021, doi: 10.35912/jshe.v2i1.832.
[15] Md.
M. R. R. Akanda and M. A. Hossain,
“Smart-devices in Human Behavior Manipula-tion: Process diagram with
exploratory assessment,” Int. J. Eng. Scie. and Inform. Technology.,
vol. 1, no. 3, pp. 54–58, Jul. 2021, doi: 10.52088/ijesty.v1i3.88.
[16] F. Yasmin
and M. A. Hossain, “We Decided we
Would Commit Suicide but we Couldn’t The Most Unique and Functional Decision of
the Young Generation during the Pandemic Situation of Covid-19,” JHSS,
vol. 12, no. 2, Dec. 2021, doi: 10.46422/jhss.v12i2.171.
[17] M. A. Hossain and S. Akter, “A Review
On Different Classification, Feature Extraction And Segmentation Methodologies
Of Leaf Disease Detection Using Image Processing Approach,” World Academy of
Informatics and Management Sciences, vol. 9, no. 4, pp. 9434–9440, Jul.
2020.
[18] M. A. Hossain, F. Yasmin, O. J. Mondal,
and Md. R. Rahman, “Impact of Smart Devices on Family Relationship: An Analysis
in the Context of Bangladesh,” Prime University Journal, vol. 15, no. 2,
pp. 26–40, 2021.
List of Conference Articles:
[1] M.
A. Hossain and Md. Saiful Islam, “An Ensemble-based Machine Learning
Approach for Botnet-Based DDoS Attack Detection,” in 2023 IEEE International
Conference on Telecommunications and Photonics (ICTP), Dhaka, Bangladesh:
IEEE, Dec. 2023, pp. 1–5. doi: 10.1109/ICTP60248.2023.10490528.
[2] Ms Bithi and M. A. Hossain et al., “Enhanced DDoS
Detection in Software Defined Networking Using Ensemble-Based Machine Learning,”
in 6th International Conference on
Electrical Engineering and Information & Communication Technology (ICEEICT),
Dhaka, Bangladesh:
IEEE, May 2024 (Accepted for publication).
[3] M. M. Rahman and M. A. Hossain et al., “EmotionNet:
Pioneering Deep Learning Fusion for Real-Time Speech Emotion Recognition with Convolutional
Neural Networks,” in 6th International
Conference on Electrical Engineering and Information & Communication
Technology (ICEEICT), Dhaka,
Bangladesh: IEEE, May 2024 (Accepted for publication).
[4] M. A.
Hossain and Md. Saiful Islam, “Interpretable Machine Learning for IoT
Security: Feature Selection and Explainability in Botnet Intrusion Detection
using Extra Trees Classifier,” in 2024 1st International Conference on
Innovative Engineering Sciences & Technological Research (ICIESTR-2024),
Muscat, Sultanate of Oman: IEEE, May. 2024 (Accepted for
publication).
[5] S. Saif, M. A. Hossain and Md. Saiful Islam, “IoT
Security Fortification: Enhancing Cyber Threat Detection through Feature
Selection and Advanced Machine Learning,”
in 2024 1st International Conference on Innovative Engineering Sciences
& Technological Research (ICIESTR-2024), Muscat,
Sultanate of Oman:
IEEE, May. 2024 (Accepted for publication).
List of Book Chapters:
[1]
M. A. Hossain,
“Cyber Bullying Tendency among Young Generation during COVID-19 Pandemic,” in World
in Different Perspectives: Rebuilding Lessons after a Crisis, Philippines:
Industry and Academic Research Incorporated (IIARI), 2021, pp. 100–110. doi:
10.53378/10.21.001.
[2] M. A. Hossain, “Days Of Covid-19 Are The Reflection Of Distress And Emotiondays Of Covid-19 Are The Reflection Of Distress And Emotion,” in The Gripping Story of Pandemic 2020, 2020, pp. 178–194. doi: 10.26524/royal.41.16.
Lecturer
Department of CSE
Prime University
20 October 2019 to 31 December 2021