Threat minimization by design and deployment of secured networking model S Islam, H Ali, A Habib, N Nobi, M Alam, D Hossain International Journal of Electronics and Information Engineering 8 (2), 135-144, 2018 | 20 | 2018 |
The basic concept of cyber crime O Goni, MH Ali, A Showrov, M Alam, A Shameem Journal of Technology Innovations and Energy 1 (2), 29-39, 2022 | 9 | 2022 |
Organizational Network Monitoring and Security Evaluation Using Next-Generation Firewall (NGFW) MS Islam, NK Datta, MIH Showrov, MM Alam, MH Ali, MD Hossain The Fourth Industrial Revolution and Beyond: Select Proceedings of IC4IR+ …, 2023 | 2 | 2023 |
An Approach for the Normalization of Short Message Service to Detect Shorter Form of Words and Find out Actual Word M Alam, O Goni, A Shameem, S Islam, NK Datta, S Ahmed, G Moazzam International Journal of Electronics and Information Engineering 13 (3), 111-118, 2021 | 1 | 2021 |
Natural Language Processing and Machine Learning Approaches to Detect Bangla Hate Speech on Social Media MS Islam, S Saha, MM Alam, NK Datta, MH Ali, MD Hossain, ... 2023 26th International Conference on Computer and Information Technology …, 2023 | | 2023 |
Bengali Cyberbullying Detection in Social Media Using Machine Learning Algorithms S Saha, MS Islam, MM Alam, MM Rahman, MZH Majumder, MS Alam, ... 2023 5th International Conference on Sustainable Technologies for Industry 5 …, 2023 | | 2023 |
Applying MVC to Shopping Management Application Using Ruby on Rails with Bangla Interface SI Md. Mahbub Alam, Al Nahian I.J. of Electronics and Information Engineering 8 (2), 88-95, 2018 | | 2018 |