PLEASE CLICK ME TO VIEW MY GOOGLE SCHOLAR PROFILE
-Alam, M. N., Kaur, M., & Kabir, M. S. (2023). Explainable AI in Healthcare: Enhancing Transparency and Trust upon Legal and Ethical Consideration.
-M. N. Alam and M. S. Kabir, "Forensics in the Internet of Things: Application Specific Investigation Model, Challenges and Future Directions," 2023 4th International Conference for Emerging Technology (INCET), Belgaum, India, 2023, pp. 1-6, doi: 10.1109/INCET57972.2023.10170607.
-Alam, M. N., Sarma, D., Lima, F. F., Saha, I., &Hossain, S. (2020, August). Phishing Attacks Detection using Machine LearningApproach.In 2020 Third International Conferenceon Smart Systems and Inventive Technology (ICSSIT) (pp. 1173-1179). IEEE. https://ieeexplore.ieee.org/abstract/document/9214225
-Saha, I., Sarma, D., Chakma, R. J., Alam, M. N., Sultana, A., &Hossain, S. (2020, August). Phishing Attacks Detection using Deep Learning Approach. In 2020 Third International Conferenceon Smart Systems and Inventive Technology (ICSSIT)(pp. 1180-1185). IEEE. https://ieeexplore.ieee.org/abstract/document/9214132
-Sarma, D., Alam, W., Saha, I., Alam, M. N., Alam, M. J., & Hossain, S. (2020, July). Bank Fraud Detection using Community Detection Algorithm. In 2020 Second International Conference on Inventive Research in Computing Applications (ICIRCA) (pp. 642- 646). IEEE. https://ieeexplore.ieee.org/abstract/document/9182954
-Hossain, S., Sarma, D., Mittra, T., Alam, M. N., Saha, I., & Johora, F. T. (2020, July). Bengali Hand Sign Gestures Recognition using Convolutional Neural Network. In 2020 Second International Conference on Inventive Research in Computing Applications (ICIRCA) (pp. 636-641). IEEE. https://ieeexplore.ieee.org/abstract/document/9183357
-Khan, M. A. A., Butt, J., Mebrahtu, H., Shirvani, H., Sanaei, A., & Alam, M. N. (2019). Integration of Data-Driven Process Re- Engineering and Process Interdependence for Manufacturing Optimization Supported by Smart Structured Data. Designs, 3(3), 44. https://www.mdpi.com/2411-9660/3/3/44 or https://doi.org/10.3390/designs3030044
-Khan, M. A. A., Butt, J., Mebrahtu, H., Shirvani, H., & Alam, M.N. (2018). Data-Driven Process Reengineering and Optimization Using a Simulation and Verification Technique. Designs, 2(4), 42.https://www.mdpi.com/2411-9660/2/4/42 or https://doi.org/10.3390/designs2040042
-Barua, B. Karim, Razuan. Alam, M.N. (2019). Ambient Intelligence: Environmental Adaptability and Maturity of Ambient Intelligence by Identifying its Challenges and Maturity Stage-Security Issues.University of Science and Technology Annual(USTA),23(1),72-76.
-Alam, M. N., Hossain, S., & Alam, K. N. E. (2015). Use case application in requirements analysis using secure tropos to umlsec- security issues. International Journal of Computer Applications, 109(4).http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.695.3031&rep=rep1&type=pdf
-Alam, M. N., Paul, S. P., & Chowdhury, S. (2013). Security Engineering towards Building a Secure Software. International Journal of Computer Applications, 81(6).https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.401.8073&rep=rep1&type=pdf
মন্তব্যসমূহ
একটি মন্তব্য পোস্ট করুন