Md. Alamgir Hossain

Senior Lecturer

MSc in ICT (Ongoing), Bangladesh University of Engineering Technology (BUET)

BSc in CSE, Jashore University of Science and Technology (JUST)

Md. Alamgir Hossain

Cybersecurity, Data Security and privacy, Network Security, Machine learning, Deep Learning, Cloud Computing

List of Journal Articles:

[1]        M. A. Hossain et al., “AI-enabled approach for enhancing obfuscated malware detection: a hybrid ensemble learning with combined feature selection techniques,” Int J  Syst  Assur  Eng  Manag, Mar. 2024, doi: 10.1007/s13198-024-02294-y.

[2]        M. A. Haque and M. A. Hossain et al., “6G Wireless Communication Networks: Challenges and Potential Solution,” International Journal of Business Data Communications and Networking, vol. 19, no. 1, pp. 1–27, Mar. 2024, doi: 10.4018/IJBDCN.339889.

[3]        M. A. Hossain and Md. S. Islam, “Enhancing DDoS attack detection with hybrid feature selection and ensemble-based classifier: A promising solution for robust cybersecurity,” Measurement: Sensors, vol. 32, p. 101037, Apr. 2024, doi: 10.1016/j.measen.2024.101037.

[4]        M. A. Hossain and Md. S. Islam, “Enhanced detection of obfuscated malware in memory dumps: a machine learning approach for advanced cybersecurity,” Cybersecurity, vol. 7, no. 1, p. 16, Jan. 2024, doi: 10.1186/s42400-024-00205-z.

[5]        M. A. Hossain and M. S. Islam, “A novel hybrid feature selection and ensemble-based machine learning approach for botnet detection,” Sci Rep, vol. 13, no. 1, Art. no. 1, Dec. 2023, doi: 10.1038/s41598-023-48230-1.

[6]        M. A. Hossain, “Enhanced Ensemble-Based Distributed Denial-of-Service (DDoS) Attack Detection with Novel Feature Selection: A Robust Cybersecurity Approach,” Artificial Intelligence Evolution, vol. 4, no. 2, pp. 165–186, Aug. 2023, doi: 10.37256/aie.4220233337.

[7]        M. A. Hossain and M. S. Islam, “Ensuring network security with a robust intrusion detection system using ensemble-based machine learning,” Array, p. 100306, Jul. 2023, doi: 10.1016/j.array.2023.100306.

[8]        M. A. Hossain, I. Ahammad, Md. K. Ahmed, and M. I. Ahmed, “Prediction of the Computer Science Department’s Educational Performance through Machine Learning Model by Analyzing Students’ Academic Statements,” Artificial Intelligence Evolution, vol. 4, no. 1, pp. 70–87, May 2023, doi: 10.37256/aie.4120232569.

[9]        M. A. Hossain and Md. A. Al Hasan, “Improving cloud data security through hybrid verification technique based on biometrics and encryption system,” International Journal of Computers and Applications, vol. 44, no. 5, pp. 455–464, May 2022, doi: 10.1080/1206212X.2020.1809177.

[10]      M. A. Hossain et al., “Predicting the Specialized Areas of Computer Science Students of Bachelor of Science Level Analyzing Academic Statements Using Machine-learning Approaches,” International Journal of Computer Science & Programming languages, vol. 8, no. 2, pp. 30–51, 2022.

[11]      M. A. Hossain and F. Yasmin, “Emergency Online Teaching-Learning Model in the Context of Higher-Level Education due to the COVID-19 Pandemic,” JSHE, vol. 2, no. 4, pp. 327–341, Aug. 2022, doi: 10.35912/jshe.v2i4.1109.

[12]      M. A. Hossain, J. Ferdush, and M. Khatun, “A study and implementation of large-scale log-determinant computation to cloud,” International Journal of Computers and Applications, vol. 43, no. 10, pp. 1020–1028, Nov. 2021, doi: 10.1080/1206212X.2019.1648632.

[13]      S. Akter, M. A. Hossain, and Md. M. Rahman Redoy Akanda, “A Noble Security Analysis of Various Distributed Systems,” Int. J. Eng. Scie. and Inform. Technology., vol. 1, no. 2, pp. 62–71, Apr. 2021, doi: 10.52088/ijesty.v1i2.101.

[14]      F. Yasmin and M. A. Hossain, “How do smart devices control and changes the lifestyle habits of human being? A study in the context of Bangladesh,” Journal of Social, Humanity, and Education, vol. 2, no. 1, pp. 85–100, Nov. 2021, doi: 10.35912/jshe.v2i1.832.

[15]      Md. M. R. R. Akanda and M. A. Hossain, “Smart-devices in Human Behavior Manipula-tion: Process diagram with exploratory assessment,” Int. J. Eng. Scie. and Inform. Technology., vol. 1, no. 3, pp. 54–58, Jul. 2021, doi: 10.52088/ijesty.v1i3.88.

[16]      F. Yasmin and M. A. Hossain, “We Decided we Would Commit Suicide but we Couldn’t The Most Unique and Functional Decision of the Young Generation during the Pandemic Situation of Covid-19,” JHSS, vol. 12, no. 2, Dec. 2021, doi: 10.46422/jhss.v12i2.171.

[17]      M. A. Hossain and S. Akter, “A Review On Different Classification, Feature Extraction And Segmentation Methodologies Of Leaf Disease Detection Using Image Processing Approach,” World Academy of Informatics and Management Sciences, vol. 9, no. 4, pp. 9434–9440, Jul. 2020.

[18]      M. A. Hossain, F. Yasmin, O. J. Mondal, and Md. R. Rahman, “Impact of Smart Devices on Family Relationship: An Analysis in the Context of Bangladesh,” Prime University Journal, vol. 15, no. 2, pp. 26–40, 2021.

List of Conference Articles:

[1]   M. A. Hossain and Md. Saiful Islam, “An Ensemble-based Machine Learning Approach for Botnet-Based DDoS Attack Detection,” in 2023 IEEE International Conference on Telecommunications and Photonics (ICTP), Dhaka, Bangladesh: IEEE, Dec. 2023, pp. 1–5. doi: 10.1109/ICTP60248.2023.10490528.

[2]   Ms Bithi and M. A. Hossain et al., “Enhanced DDoS Detection in Software Defined Networking Using Ensemble-Based Machine Learning,” in 6th International Conference on Electrical Engineering and Information & Communication Technology (ICEEICT), Dhaka, Bangladesh: IEEE, May 2024 (Accepted for publication).

[3]    M. M. Rahman and M. A. Hossain et al., “EmotionNet: Pioneering Deep Learning Fusion for Real-Time Speech Emotion Recognition with Convolutional Neural Networks,” in 6th International Conference on Electrical Engineering and Information & Communication Technology (ICEEICT), Dhaka, Bangladesh: IEEE, May 2024 (Accepted for publication).

[4]  M. A. Hossain and Md. Saiful Islam, “Interpretable Machine Learning for IoT Security: Feature Selection and Explainability in Botnet Intrusion Detection using Extra Trees Classifier,” in 2024 1st International Conference on Innovative Engineering Sciences & Technological Research (ICIESTR-2024), Muscat, Sultanate of Oman: IEEE, May. 2024 (Accepted for publication).

[5]   S. Saif, M. A. Hossain and Md. Saiful Islam, “IoT Security Fortification: Enhancing Cyber Threat Detection through Feature Selection and Advanced Machine Learning,” in 2024 1st International Conference on Innovative Engineering Sciences & Technological Research (ICIESTR-2024), Muscat, Sultanate of Oman: IEEE, May. 2024 (Accepted for publication).

List of Book Chapters:

[1] M. A. Hossain, “Cyber Bullying Tendency among Young Generation during COVID-19 Pandemic,” in World in Different Perspectives: Rebuilding Lessons after a Crisis, Philippines: Industry and Academic Research Incorporated (IIARI), 2021, pp. 100–110. doi: 10.53378/10.21.001.

[2] M. A. Hossain, “Days Of Covid-19 Are The Reflection Of Distress And Emotiondays Of Covid-19 Are The Reflection Of Distress And Emotion,” in The Gripping Story of Pandemic 2020, 2020, pp. 178–194. doi: 10.26524/royal.41.16.

Lecturer

Department of CSE

Prime University

20 October 2019 to 31 December 2021