Peer Reviewed Journal Papers:
M. M. Alam and W. Wang, "A comprehensive survey on data provenance: State-of-the-art approaches and their deployments for IoT security enforcement," in Journal of Computer Security, vol. 29, no. 4 , pp. 423–446, 27 April, 2021, doi: https://doi.org/10.3233/JCS-200108.
Peer Reviewed Conference Papers:
W. Wang, M. M. Alam and Y. Wang, "Privacy-Preserved and Incentivized Knowledge Sharing for Reinforced-Learning based IoT Platform Security," 2025 8th Artificial Intelligence and Cloud Computing Conference (AICCC 2025), Tokyo, Japan, 2025, pp. 430-437, doi: https://doi.org/10.1145/3789982.3790038
M. M. Alam, L. C. Das, S. Roy, S. Shetty and W. Wang, "RESTRAIN: Reinforcement Learning-Based Secure Framework for Trigger-Action IoT Environment," 2025 International Wireless Communications and Mobile Computing (IWCMC), Abu Dhabi, United Arab Emirates, 2025, pp. 562-567, doi: 10.1109/IWCMC65282.2025.11059593.
A. Chakraborty, S. Roy, M. M. Alam, D. Giri and S. Shetty, "A Zero-Knowledge Proof Approach on IoT Sensor Readings for Improving Data Security in Smart Agriculture," 2025 International Conference on Mathematics and Computing (ICMC 2025), IIT Bhilai, India, 2025, pp.43-56, doi: https://doi.org/10.1007/978-981-96-6941-7_4.
S. Ahmed, A. B. M Mohaimenur Rahman, M. M. Alam and M. S. Islam Sajid, "SPADE: Enhancing Adaptive Cyber Deception Strategies with Generative AI and Structured Prompt Engineering," 2025 IEEE 15th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 2025, pp. 01007-01013, doi: 10.1109/CCWC62904.2025.10903748.
M. M. Alam, A. B. M. Mohaimenur Rahman and W. Wang, "IoTHaven: An Online Defense System to Mitigate Remote Injection Attacks in Trigger-action IoT Platforms," 2024 IEEE 30th International Symposium on Local and Metropolitan Area Networks (LANMAN), Boston, MA, USA, 2024, pp. 15-20, doi: 10.1109/LANMAN61958.2024.10621894.
M. M. Alam, I. Jahan and W. Wang, "IoTWarden: A Deep Reinforcement Learning Based Real-Time Defense System to Mitigate Trigger-Action IoT Attacks," 2024 IEEE Wireless Communications and Networking Conference (WCNC), Dubai, United Arab Emirates, 2024, pp. 1-6, doi: 10.1109/WCNC57260.2024.10570786.
M. M. Alam, M. S. I. Sajid, W. Wang and J. Wei, "IoTMonitor: A Hidden Markov Model-based Security System to Identify Crucial Attack Nodes in Trigger-action IoT Platforms," 2022 IEEE Wireless Communications and Networking Conference (WCNC), Austin, TX, USA, 2022, pp. 1695-1700, doi: 10.1109/WCNC51071.2022.9771878.