An image steganography algorithm using LSB replacement through XOR substitution T Bhuiyan, AH Sarower, R Karim, M Hassan 2019 International Conference on Information and Communications Technology …, 2019 | 43 | 2019 |
Broken authentication and session management vulnerability: a case study of web application MM Hassan, SS Nipa, M Akter, R Haque, FN Deepa, M Rahman, ... Int. J. Simul. Syst. Sci. Technol 19 (2), 1-11, 2018 | 43 | 2018 |
A study on remote code execution vulnerability in web applications S Biswas, M Sohel, MM Sajal, T Afrin, T Bhuiyan, MM Hassan International conference on cyber security and computer science (ICONCS 2018 …, 2018 | 35 | 2018 |
Assessment of vulnerabilities of web applications of Bangladesh: A case study of XSS & CSRF T Farah, M Shojol, M Hassan, D Alam 2016 sixth international conference on digital information and communication …, 2016 | 31 | 2016 |
RFI and SQLi based local file inclusion vulnerabilities in web applications of Bangladesh A Begum, MM Hassan, T Bhuiyan, MH Sharif 2016 International Workshop on Computational Intelligence (IWCI), 21-25, 2016 | 27 | 2016 |
Patients’ intention to adopt fintech services: a study on Bangladesh healthcare sector MS Hassan, MA Islam, FA Sobhani, MM Hassan, MA Hassan International Journal of Environmental Research and Public Health 19 (22), 15302, 2022 | 17 | 2022 |
Extremely low loss optical waveguide for terahertz pulse guidance BK Paul, T Bhuiyan, LF Abdulrazak, K Sarker, MM Hassan, S Shariful, ... Results in Physics 15, 102666, 2019 | 17 | 2019 |
SAISAN: an automated local file inclusion vulnerability detection model MM Hassan, T Bhuyian, MK Sohel, MH Sharif, S Biswas International Journal of Engineering & Technology 7 (2-3), 4, 2018 | 17 | 2018 |
An Image Steganography Algorithm using LSB Replacement through XOR Substitution AH Sarower, R Karim, M Hassan Computer Science, 2019 | 15 | 2019 |
Quantitative assessment on broken access control vulnerability in web applications M Hassan, M Ali, T Bhuiyan, M Sharif, S Biswas International Conference on Cyber Security and Computer Science 2018, 2018 | 15 | 2018 |
An exploratory analysis of effect of adversarial machine learning attack on IoT-enabled industrial control systems S Trivedi, TA Tran, N Faruqui, MM Hassan 2023 International Conference on Smart Computing and Application (ICSCA), 1-8, 2023 | 14 | 2023 |
OSCRUM: A modified scrum for open source software development S Rahman, SA Mollah, S Anirban, MH Rahman, M Rahman, MM Hassan, ... International Journal of Simulation: Systems, Science and Technology 19 (3 …, 2018 | 14 | 2018 |
SQL injection vulnerability detection using deep learning: a feature-based approach MM Hassan, RB Ahmad, T Ghosh Indonesian Journal of Electrical Engineering and Informatics (IJEEI) 9 (3 …, 2021 | 13 | 2021 |
A study of Ajax template injection in web applications AD Noyon, YM Abid, MM Hassan, MH Sharif, FN Deepa, RI Rumel, ... International Journal of Engineering & Technology 7 (3), 123-127, 2018 | 9 | 2018 |
Study of race condition: a privilege escalation vulnerability T Farah, R Shelim, M Zaman, MM Hassan, D Alam WMSCI 2017-21st World Multi-Conference Syst. Cybern. Informatics, Proc 2 …, 2017 | 8 | 2017 |
Detection of Wordpress content injection vulnerability MM Hassan, K Sarker, S Biswas, MH Sharif arXiv preprint arXiv:1711.02447, 2017 | 7 | 2017 |
Comparing the performance of different ultrasonic images enhancement for speckle noise reduction in ultrasound images using techniques: a preference study MS Rana, K Sarker, T Bhuiyan, MM Hassan Second International Workshop on Pattern Recognition 10443, 157-163, 2017 | 6 | 2017 |
An enhancement of kerberos using biometric template and steganography M Tabassum, AH Sarower, A Esha, MM Hassan Cyber Security and Computer Science: Second EAI International Conference …, 2020 | 4 | 2020 |
Quantitative assessment of remote code execution vulnerability in web apps MM Hassan, U Mustain, S Khatun, MSA Karim, N Nishat, M Rahman InECCE2019: Proceedings of the 5th International Conference on Electrical …, 2020 | 4 | 2020 |
An Enhanced Model for Inpainting on Digital Images Using Dynamic Masking. MS Rana, M Hassan, T Bhuiyan J. Commun. 12 (4), 248-253, 2017 | 4 | 2017 |