Hassan, M. M., Ahmad, B. R., Esha, A., Risha, R., & Hasan, M. S. (2022). Important factors to remember when constructing a cross-site scripting prevention mechanism. Bulletin of Electrical Engineering and Informatics, 11(2), 965-973. (Scopus)
Hassan, M. M., Ahmad, R. B., & Ghosh, T. (2021). SQL Injection Vulnerability Detection Using Deep Learning: A Feature-based Approach. Indonesian Journal of Electrical Engineering and Informatics (IJEEI), 9(3), 702-718. (Scopus)
Hassan, M. M., Nipa, S. S., Akter, M., Haque, R., Deepa, F. N., Rahman, M., ... & Sharif, M. H. (2018). Broken authentication and session management vulnerability: a case study of web application. International Journal of Simulation Systems, Science & Technology, 19(2), 6-1. ISSN 1473-804x. DOI 10.5013/IJSSST.a.19.02.06
Noyon, A. D., Abid, Y. M., Hassan, M. M., Sharif, M. H., Deepa, F. N., Rumel, R. I., ... & Zaman, M. (2018). A study of ajax template injection in web applications. International Journal of Engineering & Technology, 7(3), 123-127. DOI: 10.14419/ijet.v7i3.13.16337
Hassan, M. M., Bhuyian, T., Sohel, M. K., Sharif, M. H., & Biswas, S. (2018). SAISAN: an automated local file inclusion vulnerability detection model. International Journal of Engineering & Technology, 7(2-3), 4. DOI: 10.14419/ijet.v7i2.3.9956 (Scopus)
Ahmed, M. I., Hassan, M. M., & Bhuyian, T. (2017, December). Local File Disclosure Vulnerability: A Case Study of Public-Sector Web Applications. In Journal of Physics: Conference Series (Vol. 933, No. 1, p. 012011). IOP Publishing. DOI :10.1088/1742-6596/933/1/012011 (Scopus)
Rana, M. S., Hassan, M. M., & Bhuiyan, T. (2017). An Enhanced Model for Inpainting on Digital Images Using Dynamic Masking. Journal of Communications, 12(4), 248-253. DOI: 10.12720/jcm.12.4.248-253 (Scopus)
Paul, B. K., Bhuiyan, T., Abdulrazak, L. F., Sarker, K., Hassan, M. M., Shariful, S., & Ahmed, K. (2019). Extremely low loss optical waveguide for terahertz pulse guidance. Results in Physics, 15, 102666. DOI: 10.1016/j.rinp.2019.102666 (Scopus)
Hassan, M., Sarker, K., Biswas, S., & Sharif, M. (2017). (2018). Detection of Wordpress content injection vulnerability. International Journal on Cybernetics & Informatics (IJCI). 6(3/4/5), 123-127. DOI: 10.5121/ijci.2017.6501
Hassan, M., Risha, R., & Esha, A. (2023). ADT-SQLi: An Automated Detection of SQL Injection Vulnerability in Web Applications. In Proceedings of International Conference on Frontiers in Computing and Systems (pp. 433-443). Springer, Singapore.
Tabassum, M., Sarower, A. H., Esha, A., & Hassan, M. M. (2020, February). An Enhancement of Kerberos Using Biometric Template and Steganography. In International Conference on Cyber Security and Computer Science (pp. 116-127). Springer, Cham. DOI: 10.1007/978-3-030-52856-0_9 (SCOPUS)
Alam, S. T., Jahan, N., & Hassan, M. M. (2020, February). A New 8-Directional Pixel Selection Technique of LSB Based Image Steganography. In International Conference on Cyber Security and Computer Science (pp. 101-115). Springer, Cham. DOI: 10.1007/978-3-030-52856-0_8 (SCOPUS)
Royel, R. I., Sharif, M. H., Risha, R., Bhuiyan, T., Hassan, M. M., & Hassan, M. S. (2020, February). A Risk Based Analysis on Linux Hosted E-Commerce Sites in Bangladesh. In International
Conference on Cyber Security and Computer Science (pp. 140-151). Springer, Cham. DOI: 10.1007/978-3-030-52856-0_11 (SCOPUS)
Hassan, M. M., Mustain, U., Khatun, S., Karim, M. S. A., Nishat, N., & Rahman, M. (2020). Quantitative Assessment of Remote Code Execution Vulnerability in Web Apps. In InECCE2019 (pp. 633-642). Springer, Singapore. DOI: 10.1007/978-981-15-2317-5_53 (Scopus)
Hossain, M. E., Rahman, M., Qaiduzzaman, K. M., Shakir, A. K., & Hassan, M. M. (2019, October). Efficient Anti-Kidnapping and Anti-Harassment (Avoidance-Detection-Notification) Mobile Application for Unwanted Incidents. In 2019 IEEE Student Conference on Research and Development (SCOReD) (pp. 112-116). IEEE. DOI: 10.1109/SCORED.2019.8896280 (Scopus)
Bhuiyan, T., Sarower, A. H., Karim, R., & Hassan, M. (2019, July). An image steganography algorithm using LSB replacement through XOR substitution. In 2019 International Conference on Information and Communications Technology (ICOIACT) (pp. 44-49). IEEE. DOI: 10.1109/ICOIACT46704.2019.8938486 (Scopus)
Rahman, S. S. M. M., Mollah, S. A., Anirban, S., Rahman, M. H., Rahman, M., Hassan, M. M., & Sharif, M. H. (2018). OSCRUM: A modified scrum for open source software development. International Journal of Simulation: Systems, Science and Technology, 19(3), 20-1. DOI: 10.5013/IJSSST.a.19.03.20 (Scopus)
Biswas, S., Sajal, M. M. H. K., Afrin, T., Bhuiyan, T., & Hassan, M. M. (2018). A study on remote code execution vulnerability in web applications. In International Conference on Cyber Security and Computer Science (ICONCS 2018). pp. 50-57. ISBN: 978-605-9554-32-9
Hassan, M. M., Ali, M. A., Bhuiyan, T., Sharif, M. H., & Biswas, S. Quantitative Assessment on Broken Access Control Vulnerability in Web Applications. In International Conference on Cyber Security and Computer Science (ICONCS 2018). pp. 26-32. ISBN: 978-605-9554-32-9
Farah, T., Shelim, R., Zaman, M., Hassan, M. M., & Alam, D. (2017). Study of race condition: A privilege escalation vulnerability. In WMSCI 2017-21st World Multi-Conference Syst. Cybern. Informatics, Proc (Vol. 2, pp. 100-105).
Rana, M. S., Sarker, K., Bhuiyan, T., & Hassan, M. M. (2017, June). Comparing the performance of different ultrasonic images enhancement for speckle noise reduction in ultrasound images using techniques: a preference study. In Second International Workshop on Pattern Recognition (Vol. 10443, p. 104430W). International Society for Optics and Photonics. DOI: 10.1117/12.2280277 (Scopus)
Begum, A., Hassan, M. M., Bhuiyan, T., & Sharif, M. H. (2016, December). RFI and SQLi based local file inclusion vulnerabilities in web applications of Bangladesh. In 2016 International Workshop on Computational Intelligence (IWCI) (pp. 21-25). IEEE. DOI: 10.1109/IWCI.2016.7860332 (Scopus)
Farah, T., Shojol, M., Hassan, M., & Alam, D. (2016, July). Assessment of vulnerabilities of web applications of Bangladesh: A case study of XSS & CSRF. In 2016 sixth international conference on digital information and communication technology and its applications (DICTAP) (pp. 74-78). IEEE. DOI: 10.1109/DICTAP.2016.7544004 (Scopus)
Hassan, M. M., Bhuiyan, T., & Biswas, S. (2016). An Investigation of Educational Web Applications in Bangladesh: A Case Study on Local File Disclosure Vulnerability. In 4th International Conf. on “Engineering & Technology, Computer, Basic & Applied Sciences” (ECBA-2016), Sydney.
Tabassum, M., Sarower, A. H., Esha, A., & Hassan, M. M. (2020, February). An Enhancement of Kerberos Using Biometric Template and Steganography. In International Conference on Cyber Security and Computer Science (pp. 116-127). Springer, Cham. DOI: 10.1007/978-3-030-52856-0_9 (Scopus)
Alam, S. T., Jahan, N., & Hassan, M. M. (2020, February). A New 8-Directional Pixel Selection Technique of LSB Based Image Steganography. In International Conference on Cyber Security and Computer Science (pp. 101-115). Springer, Cham. DOI: 10.1007/978-3-030-52856-0_8 (Scopus)
Royel, R. I., Sharif, M. H., Risha, R., Bhuiyan, T., Hassan, M. M., & Hassan, M. S. (2020, February). A Risk Based Analysis on Linux Hosted E-Commerce Sites in Bangladesh. In International Conference on Cyber Security and Computer Science (pp. 140-151). Springer, Cham. DOI: 10.1007/978-3-030-52856-0_11 (Scopus)
Hassan, M. M., Mustain, U., Khatun, S., Karim, M. S. A., Nishat, N., & Rahman, M. (2020). Quantitative Assessment of Remote Code Execution Vulnerability in Web Apps.