Ads block

Banner 728x90px

Md. Alamgir Hossain, Lecturer, Dept. of CSE, State University of Bangladesh


Md. Alamgir Hossain




I am Md. Alamgir Hossain. Currently, working as a Lecturer in the Department of Computer Science and Engineering(CSE) at the State University of Bangladesh. 

Now I am an MSc student of Information and Communication Technology (ICT) at Bangladesh University of Engineering Technology (BUET). I completed my B.Sc. Engg.  degree in Computer Science and Engineering (CSE) from the Jashore University of Science and Technology (JUST), Jashore, Bangladesh. I completed my HSC from B.A.F. Shaheen College, Dhaka and my SSC from Kanutia A. A. High School, Kanutia, Magura.

I am teaching the students many courses including Structured Programming Language, Object-Oriented Programming(C++, JAVA), Database Management Systems, Computer Architecture and Organization, Algorithm Analysis and Design, Cryptography and Network Security, Artificial Intelligence etc.

My research interests included Network Security, Machine Learning, Cybersecurity, Cloud Computing,, Cloud Data Security, etc. Moreover, I completed many projects, for example, Different Security-based project with Machine Learning,  Smart File Sharing Web Portal, Online Exam System, Online Shopping Portal, and many more.


List of my Publication:

Journal Article: 

[1] Md. Alamgir Hossain et al., “Deep learning and ensemble methods for anomaly detection in ICS security,” International Journal of Information Technology (Scopus Indexed (Q2)), vol. 16, no. 8, pp. 1-15, Dec. 2024, doi: 10.1007/s41870-024-02299-7.

[2] M. S. Hossain, M. A. Hossain, and Md. S. Islam, “I-MPaFS: enhancing EDoS attack detection in cloud computing through a data-driven approach,” J Cloud Comp, vol. 13, no. 1, p. 151, Oct. 2024, doi: 10.1186/s13677-024-00699-5.

[3] M. A. Hossain, T. Hasan, F. Ahmed, S. H. Cheragee, M. H. Kanchan, and M. A. Haque, “Towards Superior Android Ransomware Detection: An Ensemble Machine Learning Perspective,” Cyber Security and Applications, p. 100076, Oct. 2024, doi: 10.1016/j.csa.2024.100076.

[4] M. A. Haque and M. A. Hossain et al., “Internet of things enabled E-learning system for academic achievement among university students,” E-Learning and Digital Media, p. 20427530241280080, Sep. 2024, doi: 10.1177/20427530241280078.

[5] M. A. Haque and M. A. Hossain et al., “Implication of Different Data Split Ratios on the Performance of Models in Price Prediction of Used Vehicles Using Regression Analysis,” Data and Metadata, vol. 3, p. 425, Jul. 2024, doi: 10.56294/dm2024425.

[6] M. A. Hossain et al., “AI-enabled approach for enhancing obfuscated malware detection: a hybrid ensemble learning with combined feature selection techniques,” International Journal of System Assurance Engineering and Management, Mar. 2024, doi: 10.1007/s13198-024-02294-y.

[7] M. A. Hosssain et al., “6G Wireless Communication Networks: Challenges and Potential Solution,” International Journal of Business Data Communications and Networking, vol. 19, no. 1, pp. 1–27, Mar. 2024, doi: 10.4018/IJBDCN.339889.

[8] M. A. Hossain and M. S. Islam, “Enhancing DDoS attack detection with hybrid feature selection and ensemble-based classifier: A promising solution for robust cybersecurity,” Measurement: Sensors, vol. 32, p. 101037, Apr. 2024, doi: 10.1016/j.measen.2024.101037.

[9] M. A. Hossain and M. S. Islam, “Enhanced detection of obfuscated malware in memory dumps: a machine learning approach for advanced cybersecurity,” Cybersecurity, vol. 7, no. 1, Jan. 2024 doi: 10.1186/s42400-024-00205-z.

[10] M. A. Hossain and M. S. Islam, A Novel Hybrid Feature Selection and Ensemble-Based Machine Learning Approach for Botnet Detection,” Scientific Reports, vol. 13, pp. 1-28, Nov. 2023, doi: 10.1038/s41598-023-48230-1.

[11] M. A. Hossain, “Enhanced Ensemble-Based Distributed Denial-of-Service (DDoS) Attack Detection with Novel Feature Selection: A Robust Cybersecurity Approach,” Artificial Intelligence Evolution, vol. 4, no. 2, pp. 165–186, Aug. 2023, doi: 10.37256/aie.4220233337.

[12] M. A. Hossain and M. S. Islam, “Ensuring network security with a robust intrusion detection system using ensemble-based machine learning,” Array, p. 100306, Jul. 2023, doi: 10.1016/j.array.2023.100306.

[13] M. A. Hossain, I. Ahammad, Md. K. Ahmed, and M. I. Ahmed, “Prediction of the Computer Science Department’s Educational Performance through Machine Learning Model by Analyzing Students’ Academic Statements,” Artificial Intelligence Evolution, vol. 4, no. 1, pp. 70–87, May 2023, doi: 10.37256/aie.4120232569.

[14] M. A. Hossain and Md. A. Al Hasan, “Improving cloud data security through hybrid verification technique based on biometrics and encryption system,” International Journal of Computers and Applications, vol. 44, no. 5, pp. 455–464, May 2022, doi: 10.1080/1206212X.2020.1809177.

[15] M. A. Hossain et al., “Predicting the Specialized Areas of Computer Science Students of Bachelor of Science Level Analyzing Academic Statements Using Machine-learning Approaches,” International Journal of Computer Science & Programming languages, vol. 8, no. 2, pp. 30–51, 2022, link: https://computers.journalspub.info/index.php?journal=JCSPL

[16] M. A. Hossain and F. Yasmin, “Emergency Online Teaching-Learning Model in the Context of Higher-Level Education due to the COVID-19 Pandemic,” JSHE, vol. 2, no. 4, pp. 327–341, Aug. 2022, doi: 10.35912/jshe.v2i4.1109.

[17] M. A. Hossain, J. Ferdush, and M. Khatun, “A study and implementation of large-scale log-determinant computation to cloud,” International Journal of Computers and Applications, vol. 43, no. 10, pp. 1020–1028, Nov. 2021, doi: 10.1080/1206212X.2019.1648632.

[18] S. Akter, M. A. Hossain, and Md. M. Rahman Redoy Akanda, “A Noble Security Analysis of Various Distributed Systems,” Int. J. Eng. Scie. and Inform. Technology., vol. 1, no. 2, pp. 62–71, Apr. 2021, doi: 10.52088/ijesty.v1i2.101.

[19] F. Yasmin and M. A. Hossain, “How do smart devices control and changes the lifestyle habits of human being? A study in the context of Bangladesh,” Journal of Social, Humanity, and Education, vol. 2, no. 1, pp. 85–100, Nov. 2021, doi: 10.35912/jshe.v2i1.832.

[20] M. M. R. R. Akanda and M. A. Hossain, “Smart-devices in Human Behavior Manipula-tion: Process diagram with exploratory assessment,” Int. J. Eng. Scie. and Inform. Technology., vol. 1, no. 3, pp. 54–58, Jul. 2021, doi: 10.52088/ijesty.v1i3.88.

[21] F. Yasmin and M. A. Hossain, “We Decided we Would Commit Suicide but we Couldn’t The Most Unique and Functional Decision of the Young Generation during the Pandemic Situation of Covid-19,” JHSS, vol. 12, no. 2, Dec. 2021, doi: 10.46422/jhss.v12i2.171.

[22] M. A. Hossain and S. Akter, “A REVIEW ON DIFFERENT CLASSIFICATION, FEATURE EXTRACTION AND SEGMENTATION METHODOLOGIES OF LEAF DISEASE DETECTION USING IMAGE PROCESSING APPROACH,” World Academy of Informatics and Management Sciences, vol. 9, no. 4, pp. 9434–9440, Jul. 2020.

[23] M. A. Hossain, F. Yasmin, O. J. Mondal, and Md. R. Rahman, “Impact of Smart Devices on Family Relationship: An Analysis in the Context of Bangladesh,” Prime University Journal, vol. 15, no. 2, pp. 26–40, 2021. Link: https://www.primeuniversity.edu.bd/file/crhp_details/1699265856.pdf.


Conference Article:

[1] Md. Alamgir Hossain, S. Saif, and Md. S. Islam, “Interpretable Machine Learning for IoT Security: Feature Selection and Explainability in Botnet Intrusion Detection using Extra Trees Classifier,” in 2024 1st International Conference on Innovative Engineering Sciences and Technological Research (ICIESTR), Muscat, Oman: IEEE, May 2024, pp. 1–6. doi: 10.1109/ICIESTR60916.2024.10798158.  

[2] S. Saif, Md. Alamgir Hossain, and Md. S. Islam, “IoT Security      Fortification: Enhancing Cyber Threat Detection Through Feature Selection and Advanced Machine Learning,” in 2024 1st International Conference on Innovative Engineering Sciences and Technological Research (ICIESTR), Muscat, Oman: IEEE, May 2024, pp. 1–6. doi: 10.1109/ICIESTR60916.2024.10798181.

[3] Ms. Bithi, M. A. Hossain, Md. K. Ahmed, R. Sultana, I. Ahammad, and M. S. Islam, “Enhanced DDoS Detection in Software Defined Networking Using Ensemble-Based Machine Learning,” in 2024 6th International Conference on Electrical Engineering and Information & Communication Technology (ICEEICT), Dhaka, Bangladesh: IEEE, May 2024, pp. 1032–1037. doi: 10.1109/ICEEICT62016.2024.10534483.

[4] Md. M. Rahman, M. A. Hossain, T. Hasan, Md. K. Ahmed, R. Sultana, and M. S. Islam, “EmotionNet: Pioneering Deep Learning Fusion for Real-Time Speech Emotion Recognition with Convolutional Neural Networks,” in 2024 6th International Conference on Electrical Engineering and Information & Communication Technology (ICEEICT), Dhaka, Bangladesh: IEEE, May 2024, pp. 592–597. doi: 10.1109/ICEEICT62016.2024.10534404.

[5] M. A. Hossain and Md. Saiful Islam, “An Ensemble-based Machine Learning Approach for Botnet-Based DDoS Attack Detection,” in 2023 IEEE International Conference on Telecommunications and Photonics (ICTP), Dhaka, Bangladesh: IEEE, Dec. 2023, pp. 1–5. doi: 10.1109/ICTP60248.2023.10490528.


Book Chapter: 


[1] M. A. Hossain, “Cyber Bullying Tendency among Young Generation during COVID-19 Pandemic,” in World in Different Perspectives: Rebuilding Lessons after a Crisis, Philippines: Industry and Academic Research Incorporated (IIARI), 2021, pp. 100–110, doi: 10.53378/10.21.001.

[2] M. A. Hossain, “Ways to enhance Economic Cooperation between Nepal and Bangladesh,” in From Himalayas to Bay of Bengal: Chronicles of Nepal-Bangladesh Friendship, Bangladesh-Nepal Friendship Society, 2024, pp. 75–80.

[3] M. A. Hossain, “DAYS OF COVID-19 ARE THE REFLECTION OF DISTRESS AND EMOTIONDAYS OF COVID-19 ARE THE REFLECTION OF DISTRESS AND EMOTION,” in The Gripping Story of Pandemic 2020, 2020, pp. 178–194. doi: 10.26524/royal.41.16.



Contact Me

Mail: alamgir.cse14.just@gmail.com

1 comment: