Security Analysis of Cardiovascular Implantable Electronic Device (CIED) using a Threat Model-based Approach NMI Chowdhury, R Hasan SoutheastCon 2023, 81-88, 2023 | 7 | 2023 |
Exploiting Transfer Learning Ensemble for Visual Sentiment Analysis in Social Media E Chowdhury, AN Chy, NMI Chowdhury Proceedings of International Conference on Computational Intelligence, Data …, 2021 | 4 | 2021 |
A secure web server for e-banking O Sarker, M Hasan, NMI Chowdhury 2018 21st International Conference of Computer and Information Technology …, 2018 | 3 | 2018 |
Subject Oriented Data Partitioning–A Proposed Data Warehousing Schema A Moktadir, NMI Chowdhury 2019 1st International Conference on Advances in Science, Engineering and …, 2019 | 2 | 2019 |
How Secure is AI-based Coding?: A Security Analysis Using STRIDE and Data Flow Diagrams I Hossain, NMI Chowdhury, R Hasan 2023 IEEE Virtual Conference on Communications (VCC), 56-61, 2023 | 1 | 2023 |
An Overview of Cyber Attacks and Defenses on Intelligent Connected Vehicles NMI Chowdhury, MA Hoque, R Hasan Computer and Information Security Handbook, 1481-1494, 2025 | | 2025 |
How Trustworthy are Over-The-Air (OTA) Updates for Autonomous Vehicles (AV) to Ensure Public Safety?: A Threat Model-based Security Analysis NMI Chowdhury, R Hasan 2024 IEEE World Forum on Public Safety Technology (WFPST), 87-92, 2024 | | 2024 |
Security Analysis of Connected Autonomous Vehicles (CAVs): Challenges, Issues, Defenses, and Open Problems NMI Chowdhury, R Hasan 2024 IEEE World Forum on Public Safety Technology (WFPST), 81-86, 2024 | | 2024 |
Performance Evaluation of Proactive, Reactive and Hybrid Protocols by Varying Vehicle Nodes in Vehicular Ad-hoc Network MK Goud, NMI Chowdhury, MFI Nahiyan International Journal of Computer Sciences and Engineering 6 (11), 141-146, 2018 | | 2018 |