List of Journal Articles
[1] Hikmat A. M. Abdeljaber, Md. Alamgir Hossain, Sultan Ahmad3, Ahmed Alsanad, Md Alimul Haque, Sudan Jha, and Jabeen Nazeer, “A Novel Ensemble Learning Approach for Enhanced IoT Attack Detection: Redefining Security Paradigms in Connected Systems,” Human-centric Computing and Information Sciences (HCIS) (Scopus Indexed (Q2)), vol. 16, pp. 1-17, Jan. 2026, doi: 10.22967/HCIS.2026.16.001.
[2] Mohammad Nowsin Amin Sheikh, Muhammad Saibtain Raza, I-Shyan Hwang, Md. Alamgir Hossain, Ihsan Ullah, Tahmid Hasan, Mohammad Syuhaimi Ab-Rahman, “SDN-Enabled IoT Based Transport Layer DDoS Attacks Detection Using RNNs,” Computers, Materials & Continua (Tech Science Press) (Scopus Indexed (Q2)), Sep. 2025, doi: 10.32604/cmc.2025.065850.
[3] W. I and Md. Alamgir Hossain, et al., “CST-AFNet: A dual attention-based deep learning framework for intrusion detection in IoT networks,” Array (Scopus Indexed (Q1)), Aug. 2025, doi:10.1016/j.array.2025.100501.
[4] Md. Alamgir Hossain, et al., “A novel federated learning approach for IoT botnet intrusion detection using SHAP-based knowledge distillation,” Complex & Intelligent Systems (Scopus Indexed (Q1)), Aug. 2025, doi: 10.1007/s40747-025-02001-9.
[5] Md. Alamgir Hossain, and Md. Samiul Islam, “Towards Decentralized Cybersecurity: A Novel Privacy-Preserving Federated Learning Approach for Botnet Attack Detection,” Blockchain: Research and Applications (Scopus Indexed (Q1)), Aug. 2025, doi: 10.1016/j.bcra.2025.100355.
[6] Md. Alamgir Hossain, “FED-GEM-CN: A federated dual-CNN architecture with contrastive cross-attention for maritime radar intrusion detection,” Array, vol. 27, p. 100456, Sep. 2025, doi: 10.1016/j.array.2025.100456.
[7] Md. Alamgir Hossain, “Deep Q-learning intrusion detection system (DQ-IDS): A novel reinforcement learning approach for adaptive and self-learning cybersecurity,” ICT Express (Scopus Indexed (Q1)), pp. 1-6, Jun. 2025, doi: 10.1016/j.icte.2025.05.007.
[8] Md. Alamgir Hossain, M. D. Hossain, R. Choupani, and E. Doǧdu, “MRS-PFIDS: federated learning driven detection of network intrusions in maritime radar systems,” International Journal of Information Security (Scopus Indexed (Q2)), vol. 24, no. 2, pp. 1-19, Apr. 2025, doi: 10.1007/s10207-025-01008-0.
[9] Md. Alamgir Hossain and M. S. Islam, “A novel feature selection-driven ensemble learning approach for accurate botnet attack detection,” Alexandria Engineering Journal (Scopus Indexed (Q1)), vol. 118, pp. 261–277, Apr. 2025, doi: 10.1016/j.aej.2025.01.042.
[10] Md. Alamgir Hossain et al., “Deep learning and ensemble methods for anomaly detection in ICS security,” International Journal of Information Technology (Scopus Indexed (Q2)), vol. 16, no. 8, pp. 1-15, Dec. 2024, doi: 10.1007/s41870-024-02299-7.
[11] M. S. Hossain, M. A. Hossain, and Md. S. Islam, “I-MPaFS: enhancing EDoS attack detection in cloud computing through a data-driven approach,” J Cloud Comp, vol. 13, no. 1, p. 151, Oct. 2024, doi: 10.1186/s13677-024-00699-5.
[12] M. A. Hossain, T. Hasan, F. Ahmed, S. H. Cheragee, M. H. Kanchan, and M. A. Haque, “Towards Superior Android Ransomware Detection: An Ensemble Machine Learning Perspective,” Cyber Security and Applications, p. 100076, Oct. 2024, doi: 10.1016/j.csa.2024.100076.
[13] M. A. Haque and M. A. Hossain et al., “Internet of things enabled E-learning system for academic achievement among university students,” E-Learning and Digital Media, p. 20427530241280080, Sep. 2024, doi: 10.1177/20427530241280078.
[14] M. A. Hossain et al., “Implication of Different Data Split Ratios on the Performance of Models in Price Prediction of Used Vehicles Using Regression Analysis,” Data and Metadata, Jul. 2024, doi: 10.56294/dm2024425.
[15] M. A. Hossain et al., “AI-enabled approach for enhancing obfuscated malware detection: a hybrid ensemble learning with combined feature selection techniques,” International Journal of System Assurance Engineering and Management, Mar. 2024, doi: 10.1007/s13198-024-02294-y.
[16] M. A. Hosssain et al., “6G Wireless Communication Networks: Challenges and Potential Solution,” International Journal of Business Data Communications and Networking, vol. 19, no. 1, pp. 1–27, Mar. 2024, doi: 10.4018/IJBDCN.339889.
[17] M. A. Hossain and M. S. Islam, “Enhancing DDoS attack detection with hybrid feature selection and ensemble-based classifier: A promising solution for robust cybersecurity,” Measurement: Sensors, vol. 32, p. 101037, Apr. 2024, doi: 10.1016/j.measen.2024.101037.
[18] M. A. Hossain and M. S. Islam, “Enhanced detection of obfuscated malware in memory dumps: a machine learning approach for advanced cybersecurity,” Cybersecurity, vol. 7, no. 1, Jan. 2024 doi: 10.1186/s42400-024-00205-z.
[19] M. A. Hossain and M. S. Islam, “A Novel Hybrid Feature Selection and Ensemble-Based Machine Learning Approach for Botnet Detection,” Scientific Reports, vol. 13, pp. 1-28, Nov. 2023, doi: 10.1038/s41598-023-48230-1.
[20] M. A. Hossain, “Enhanced Ensemble-Based Distributed Denial-of-Service (DDoS) Attack Detection with Novel Feature Selection: A Robust Cybersecurity Approach,” Artificial Intelligence Evolution, vol. 4, no. 2, pp. 165–186, Aug. 2023, doi: 10.37256/aie.4220233337.
[21] M. A. Hossain and M. S. Islam, “Ensuring network security with a robust intrusion detection system using ensemble-based machine learning,” Array, p. 100306, Jul. 2023, doi: 10.1016/j.array.2023.100306.
[22] M. A. Hossain, I. Ahammad, Md. K. Ahmed, and M. I. Ahmed, “Prediction of the Computer Science Department’s Educational Performance through Machine Learning Model by Analyzing Students’ Academic Statements,” Artificial Intelligence Evolution, vol. 4, no. 1, pp. 70–87, May 2023, doi: 10.37256/aie.4120232569.
[23] M. A. Hossain and Md. A. Al Hasan, “Improving cloud data security through hybrid verification technique based on biometrics and encryption system,” International Journal of Computers and Applications, vol. 44, no. 5, pp. 455–464, May 2022, doi: 10.1080/1206212X.2020.1809177.
[24] M. A. Hossain et al., “Predicting the Specialized Areas of Computer Science Students of Bachelor of Science Level Analyzing Academic Statements Using Machine-learning Approaches,” International Journal of Computer Science & Programming languages, vol. 8, no. 2, pp. 30–51, 2022, link: https://computers.journalspub.info/index.php?journal=JCSPL.
[25] M. A. Hossain and F. Yasmin, “Emergency Online Teaching-Learning Model in the Context of Higher-Level Education due to the COVID-19 Pandemic,” JSHE, vol. 2, no. 4, pp. 327–341, Aug. 2022, doi: 10.35912/jshe.v2i4.1109.
[26] M. A. Hossain, J. Ferdush, and M. Khatun, “A study and implementation of large-scale log-determinant computation to cloud,” International Journal of Computers and Applications, vol. 43, no. 10, pp. 1020–1028, Nov. 2021, doi: 10.1080/1206212X.2019.1648632.
[27] S. Akter, M. A. Hossain, and Md. M. Rahman Redoy Akanda, “A Noble Security Analysis of Various Distributed Systems,” Int. J. Eng. Scie. and Inform. Technology., vol. 1, no. 2, pp. 62–71, Apr. 2021, doi: 10.52088/ijesty.v1i2.101.
[28] F. Yasmin and M. A. Hossain, “How do smart devices control and changes the lifestyle habits of human being? A study in the context of Bangladesh,” Journal of Social, Humanity, and Education, vol. 2, no. 1, pp. 85–100, Nov. 2021, doi: 10.35912/jshe.v2i1.832.
[29] M. M. R. R. Akanda and M. A. Hossain, “Smart-devices in Human Behavior Manipula-tion: Process diagram with exploratory assessment,” Int. J. Eng. Scie. and Inform. Technology., vol. 1, no. 3, pp. 54–58, Jul. 2021, doi: 10.52088/ijesty.v1i3.88.
[30] F. Yasmin and M. A. Hossain, “We Decided we Would Commit Suicide but we Couldn’t The Most Unique and Functional Decision of the Young Generation during the Pandemic Situation of Covid-19,” JHSS, vol. 12, no. 2, Dec. 2021, doi: 10.46422/jhss.v12i2.171.
[31] M. A. Hossain and S. Akter, “A REVIEW ON DIFFERENT CLASSIFICATION, FEATURE EXTRACTION AND SEGMENTATION METHODOLOGIES OF LEAF DISEASE DETECTION USING IMAGE PROCESSING APPROACH,” World Academy of Informatics and Management Sciences, vol. 9, no. 4, pp. 9434–9440, Jul. 2020.
[32] M. A. Hossain, F. Yasmin, O. J. Mondal, and Md. R. Rahman, “Impact of Smart Devices on Family Relationship: An Analysis in the Context of Bangladesh,” Prime University Journal, vol. 15, no. 2, pp. 26–40, 2021. Link: https://www.primeuniversity.edu.bd/file/crhp_details/1699265856.pdf.