Ethical hacking: Skills to fight cybersecurity threats L Smith, MM Chowdhury, S Latif EPiC Series in Computing 82 (5), 102-111, 2022 | 16 | 2022 |
Managing the cyber world: Hacker edition S Vandervelden, MM Chowdhury, S Latif 2021 International Conference on Electrical, Computer, Communications and …, 2021 | 16 | 2021 |
Denial of service: A growing underrated threat W Bonasera, MM Chowdhury, S Latif 2021 International Conference on Electrical, Computer, Communications and …, 2021 | 14 | 2021 |
Investigation of Machine Learning Algorithms for Network Intrusion Detection. S Latif, FF Dola, MD Afsar, IJ Esha, D Nandi International Journal of Information Engineering & Electronic Business 14 (2), 2022 | 13 | 2022 |
Data breaches in corporate setting D Chen, MM Chowdhury, S Latif 2021 International Conference on Electrical, Computer, Communications and …, 2021 | 13 | 2021 |
Risks and anatomy of data breaches S Caston, MM Chowdhury, S Latif 2021 International Conference on Electrical, Computer, Communications and …, 2021 | 10 | 2021 |
ChatGPT: The Curious Case of Attack Vectors' Supply Chain Management Improvement M Chowdhury, N Rifat, S Latif, M Ahsan, MS Rahman, R Gomes 2023 IEEE International Conference on Electro Information Technology (eIT …, 2023 | 9 | 2023 |
Protecting business from data breach MD Morgan, MM Chowdhury, S Latif 2021 International Conference on Electrical, Computer, Communications and …, 2021 | 9 | 2021 |
Security Issues of Mobile Devices G Helm, S Latif, M Chowdhury The 2021 IEEE International Conference on Electro Information Technology, 14-15, 2021 | 8 | 2021 |
IoT Security for Smart Home: Issues and Solutions I Antzoulis, MM Chowdhury, S Latif 2022 IEEE International Conference on Electro Information Technology (eIT), 1-7, 2022 | 7 | 2022 |
ChatGPT: A threat against the CIA triad of cyber security MDM Chowdhury, N Rifat, M Ahsan, S Latif, R Gomes, MS Rahman 2023 IEEE International Conference on Electro Information Technology (eIT), 1-6, 2023 | 6 | 2023 |
Dark web: A facilitator of crime R Cole, S Latif, MM Chowdhury 2021 international conference on electrical, computer, communications and …, 2021 | 6 | 2021 |
Mobile devices vulnerabilities M Schneider, MM Chowdhury, S Latif EPiC Series in Computing 82, 92-101, 2022 | 5 | 2022 |
A comparative study of os security GJ Ruiz, MM Chowdhury, S Latif 2021 International Conference on Electrical, Computer, Communications and …, 2021 | 3 | 2021 |
Bitcoin: cryptographic algorithms, security vulnerabilities and mitigations T Kowalski, MM Chowdhury, S Latif, K Kambhampaty 2022 IEEE International Conference on Electro Information Technology (eIT …, 2022 | 2 | 2022 |
Raspberry Pis for Network Security AS Fetter, MM Chowdhury, S Latif 2021 International Conference on Electrical, Computer, Communications and …, 2021 | 2 | 2021 |
Comparison of OS Security GJ Ruiz, MM Chowdhury, S Latif Mauritius, 2021 | 2 | 2021 |
Evaluating Cybersecurity Risks in NLP Models: Google Bard as Bard of Prey and ChatGPT as Cyber Crime Aide C Wohlbach, MM Chowdhury, S Latif Proceedings of 39th International Confer 98, 159-168, 2024 | | 2024 |
Computer Forensics: Complementing Cyber Security QR McCluskey, MM Chowdhury, S Latif, K Kambhampaty 2022 IEEE International Conference on Electro Information Technology (eIT …, 2022 | | 2022 |