Md. Alamgir Hossain
Now I am an MSc student of Information and Communication Technology (ICT) at Bangladesh University of Engineering Technology (BUET). I completed my B.Sc. Engg. degree in Computer Science and Engineering (CSE) from the Jashore University of Science and Technology (JUST), Jashore, Bangladesh. I completed my HSC from B.A.F. Shaheen College, Dhaka and my SSC from Kanutia A. A. High School, Kanutia, Magura.
I am teaching the students many courses including Structured Programming Language, Object-Oriented Programming(C++, JAVA), Database Management Systems, Computer Architecture and Organization, Algorithm Analysis and Design, Cryptography and Network Security, Artificial Intelligence etc.
My research interests included Network Security, Machine Learning, Cybersecurity, Cloud Computing,, Cloud Data Security, etc. Moreover, I completed many projects, for example, Different Security-based project with Machine Learning, Smart File Sharing Web Portal, Online Exam System, Online Shopping Portal, and many more.
List of my Publication:
Journal Article:
[1] M. S. Hossain, M. A. Hossain, and Md. S. Islam, “I-MPaFS: enhancing EDoS attack detection in cloud computing through a data-driven approach,” J Cloud Comp, vol. 13, no. 1, p. 151, Oct. 2024, doi: 10.1186/s13677-024-00699-5.
[2] M. A. Hossain, T. Hasan, F. Ahmed, S. H. Cheragee, M. H. Kanchan, and M. A. Haque, “Towards Superior Android Ransomware Detection: An Ensemble Machine Learning Perspective,” Cyber Security and Applications, p. 100076, Oct. 2024, doi: 10.1016/j.csa.2024.100076.
[3] M. A. Haque and M. A. Hossain et al., “Internet of things enabled E-learning system for academic achievement among university students,” E-Learning and Digital Media, p. 20427530241280080, Sep. 2024, doi: 10.1177/20427530241280078.
[4] M. A. Haque and M. A. Hossain et al., “Implication of Different Data Split Ratios on the Performance of Models in Price Prediction of Used Vehicles Using Regression Analysis,” Data and Metadata, vol. 3, p. 425, Jul. 2024, doi: 10.56294/dm2024425.
[5] M. A. Hossain et al., “AI-enabled approach for enhancing obfuscated malware detection: a hybrid ensemble learning with combined feature selection techniques,” International Journal of System Assurance Engineering and Management, Mar. 2024, doi: 10.1007/s13198-024-02294-y.
[6] M. A. Hosssain et al., “6G Wireless Communication Networks: Challenges and Potential Solution,” International Journal of Business Data Communications and Networking, vol. 19, no. 1, pp. 1–27, Mar. 2024, doi: 10.4018/IJBDCN.339889.
[7] M. A. Hossain and M. S. Islam, “Enhancing DDoS attack detection with hybrid feature selection and ensemble-based classifier: A promising solution for robust cybersecurity,” Measurement: Sensors, vol. 32, p. 101037, Apr. 2024, doi: 10.1016/j.measen.2024.101037.
[8] M. A. Hossain and M. S. Islam, “Enhanced detection of obfuscated malware in memory dumps: a machine learning approach for advanced cybersecurity,” Cybersecurity, vol. 7, no. 1, Jan. 2024 doi: 10.1186/s42400-024-00205-z.
[9] M. A. Hossain and M. S. Islam, “A Novel Hybrid Feature Selection and Ensemble-Based Machine Learning Approach for Botnet Detection,” Scientific Reports, vol. 13, pp. 1-28, Nov. 2023, doi: 10.1038/s41598-023-48230-1.
[10] M.
A. Hossain, “Enhanced Ensemble-Based Distributed Denial-of-Service (DDoS)
Attack Detection with Novel Feature Selection: A Robust Cybersecurity Approach,”
Artificial Intelligence Evolution, vol. 4, no. 2, pp. 165–186, Aug.
2023, doi: 10.37256/aie.4220233337.
[11] M. A.
Hossain and M. S. Islam, “Ensuring network security with a robust intrusion
detection system using ensemble-based machine learning,” Array, p.
100306, Jul. 2023, doi: 10.1016/j.array.2023.100306.
[12] M. A.
Hossain, I. Ahammad, Md. K. Ahmed, and M. I. Ahmed, “Prediction of the Computer
Science Department’s Educational Performance through Machine Learning Model by
Analyzing Students’ Academic Statements,” Artificial Intelligence Evolution,
vol. 4, no. 1, pp. 70–87, May 2023, doi: 10.37256/aie.4120232569.
[13] M. A. Hossain and Md. A. Al Hasan, “Improving cloud data security through hybrid
verification technique based on biometrics and encryption system,” International
Journal of Computers and Applications, vol. 44, no. 5, pp. 455–464, May
2022, doi: 10.1080/1206212X.2020.1809177.
[14] M. A. Hossain et al., “Predicting the Specialized Areas of Computer Science Students of Bachelor of Science Level Analyzing Academic Statements Using Machine-learning Approaches,” International Journal of Computer Science & Programming languages, vol. 8, no. 2, pp. 30–51, 2022, link: https://computers.journalspub.info/index.php?journal=JCSPL.
[15] M. A.
Hossain and F. Yasmin, “Emergency Online Teaching-Learning Model in the Context
of Higher-Level Education due to the COVID-19 Pandemic,” JSHE, vol. 2,
no. 4, pp. 327–341, Aug. 2022, doi: 10.35912/jshe.v2i4.1109.
[16] M. A.
Hossain, J. Ferdush, and M. Khatun, “A study and implementation of large-scale
log-determinant computation to cloud,” International Journal of Computers
and Applications, vol. 43, no. 10, pp. 1020–1028, Nov. 2021, doi:
10.1080/1206212X.2019.1648632.
[17] S.
Akter, M. A. Hossain, and Md. M. Rahman Redoy Akanda, “A Noble Security
Analysis of Various Distributed Systems,” Int. J. Eng. Scie. and Inform.
Technology., vol. 1, no. 2, pp. 62–71, Apr. 2021, doi:
10.52088/ijesty.v1i2.101.
[18] F.
Yasmin and M. A. Hossain, “How do smart devices control and changes the
lifestyle habits of human being? A study in the context of Bangladesh,” Journal
of Social, Humanity, and Education, vol. 2, no. 1, pp. 85–100, Nov. 2021,
doi: 10.35912/jshe.v2i1.832.
[19] M. M. R. R. Akanda and M. A. Hossain, “Smart-devices in Human Behavior Manipula-tion: Process diagram with exploratory assessment,” Int. J. Eng. Scie. and Inform. Technology., vol. 1, no. 3, pp. 54–58, Jul. 2021, doi: 10.52088/ijesty.v1i3.88.
[20] F.
Yasmin and M. A. Hossain, “We Decided we Would Commit Suicide but we Couldn’t
The Most Unique and Functional Decision of the Young Generation during the
Pandemic Situation of Covid-19,” JHSS, vol. 12, no. 2, Dec. 2021, doi:
10.46422/jhss.v12i2.171.
[21] M. A. Hossain and S. Akter, “A REVIEW ON DIFFERENT CLASSIFICATION, FEATURE EXTRACTION AND SEGMENTATION METHODOLOGIES OF LEAF DISEASE DETECTION USING IMAGE PROCESSING APPROACH,” World Academy of Informatics and Management Sciences, vol. 9, no. 4, pp. 9434–9440, Jul. 2020.
[22] M. A. Hossain, F. Yasmin, O. J. Mondal, and Md. R. Rahman, “Impact of Smart Devices on Family Relationship: An Analysis in the Context of Bangladesh,” Prime University Journal, vol. 15, no. 2, pp. 26–40, 2021. Link: https://www.primeuniversity.edu.bd/file/crhp_details/1699265856.pdf.
Conference Article:
[1] Ms. Bithi, M. A. Hossain, Md. K. Ahmed, R. Sultana, I. Ahammad, and M. S. Islam, “Enhanced DDoS Detection in Software Defined Networking Using Ensemble-Based Machine Learning,” in 2024 6th International Conference on Electrical Engineering and Information & Communication Technology (ICEEICT), Dhaka, Bangladesh: IEEE, May 2024, pp. 1032–1037. doi: 10.1109/ICEEICT62016.2024.10534483.
[2] Md. M. Rahman, M. A. Hossain, T. Hasan, Md. K. Ahmed, R. Sultana, and M. S. Islam, “EmotionNet: Pioneering Deep Learning Fusion for Real-Time Speech Emotion Recognition with Convolutional Neural Networks,” in 2024 6th International Conference on Electrical Engineering and Information & Communication Technology (ICEEICT), Dhaka, Bangladesh: IEEE, May 2024, pp. 592–597. doi: 10.1109/ICEEICT62016.2024.10534404.
[3] M. A. Hossain and Md. Saiful Islam, “An Ensemble-based Machine Learning Approach for Botnet-Based DDoS Attack Detection,” in 2023 IEEE International Conference on Telecommunications and Photonics (ICTP), Dhaka, Bangladesh: IEEE, Dec. 2023, pp. 1–5. doi: 10.1109/ICTP60248.2023.10490528.
pls check your mail @ alamgir.cse14.just@gmail.com
ReplyDelete