Md. Minhaz Chowdhury
East Stroudsburg University
H-index: 17
North America-United States
Top articles of Md. Minhaz Chowdhury
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
AI and Cybersecurity: Collaborator or Confrontation | Proceedings of 39th International Confer | Collin Orner Md Chowdhury | 2024/3/21 |
Evaluating Cybersecurity Risks in NLP Models: Google Bard as Bard of Prey and ChatGPT as Cyber Crime Aide | Proceedings of 39th International Confer | Cameron Wohlbach Md Minhaz Chowdhury Shadman Latif | 2024/3/21 |
ChatGPT: A threat against the CIA triad of cyber security | MD Minhaz Chowdhury Nafiz Rifat Mostofa Ahsan Shadman Latif Rahul Gomes | 2023/5/18 | |
Deep Learning Application for Detection of Malaria | Md Saifur Rahman Nafiz Rifat Mostofa Ahsan Sabrina Islam Md Chowdhury | 2023/5/18 | |
Vision Transformer-based Classification for Lung and Colon Cancer using Histopathology Images | Munjur Hasan Md Saifur Rahman Sabrina Islam Tanvir Ahmed Nafiz Rifat | 2023/12/15 | |
ChatGPT: The Curious Case of Attack Vectors' Supply Chain Management Improvement | Minhaz Chowdhury Nafiz Rifat Shadman Latif Mostofa Ahsan Md Saifur Rahman | 2023/5/18 | |
Bert against social engineering attack: Phishing text detection | Nafiz Rifat Mostofa Ahsan Md Chowdhury Rahul Gomes | 2022/5/19 | |
Honeynets and Cloud Security | Eric M Toth MD Minhaz Chowdhury | 2022/6/6 | |
Intrusion detection for IoT network security with deep neural network | Roya Morshedi S Mojtaba Matinkhah Mohammad Taghi Sadeghi | 2023/3/8 | |
Card skimming: a cybercrime by hackers | Kyle Guers Md Minhaz Chowdhury Nafiz Rifat | 2022/5/19 | |
Uncover Security Weakness Before the Attacker Through Penetration Testing | Christian D Hines Md Minhaz Chowdhury | 2022/5/19 | |
Bitcoin: cryptographic algorithms, security vulnerabilities and mitigations | Timothy Kowalski Md Minhaz Chowdhury Shadman Latif Krishna Kambhampaty | 2022/5/19 | |
A Survey of Intrusion Detection and Prevention Systems | Tristan Erney MD Minhaz Chowdhury | 2022/6/6 | |
Covid-19 sentiment analysis applying bert | Nafiz Rifat Mostofa Ahsan Rahul Gomes Md Chowdhury | 2022/5/19 | |
Detecting cyber attacks: A reinforcement learning based intrusion detection system | Mostofa Ahsan Nafiz Rifat Md Chowdhury Rahul Gomes | 2022/5/19 | |
Password Security: What Are We Doing Wrong? | 2022 IEEE International Conference on Electro Information Technology (EIT) | Donald Davis Md Minhaz Chowdhury Krishna Kambhampaty | 2022/5 |
Data breaches: vulnerable privacy | Aaron Fleury-Charles Md Minhaz Chowdhury Nafiz Rifat | 2022/5/19 | |
Cybersecurity threats and their mitigation approaches using Machine Learning—A Review | Mostofa Ahsan Kendall E Nygard Rahul Gomes Md Minhaz Chowdhury Nafiz Rifat | 2022/7/10 | |
Ethical hacking: Skills to fight cybersecurity threats | EPiC Series in Computing | Logan A Smith Md Minhaz Chowdhury Shadman Latif | 2022/3/18 |
Computer Forensics: Complementing Cyber Security | Quinn R McCluskey Md Minhaz Chowdhury Shadman Latif Krishna Kambhampaty | 2022/5/19 |