Publications by Year
2025
J04. Rahman, M., Ahsan, M.S., Chen, CW. et al. A census-based genetic algorithm for target set selection problem in social networks. Neural Comput & Applic (2025). https://doi.org/10.1007/s00521-025-11480-3 (PDF)
J03. Ahsan, M. S., Islam, S., & Shatabda, S. (2025). A systematic review of metaheuristics-based and machine learning-driven intrusion detection systems in IoT. Swarm and Evolutionary Computation, 96, 101984. (PDF)
J02. Ahsan, M. S., & Pathan, A. S. K. (2025). A Comprehensive Survey on the Requirements, Applications, and Future Challenges for Access Control Models in IoT: The State of the Art. IoT, 6(1), 9. (PDF)
2024
C03. Ahsan, M. S., Ahmed, A. R., & Saidur Rahman, M. (2024, December). Randomized Algorithm for Online k-Server Problem on a Line. In International Conference on Information and Communication Technology for Competitive Strategies (pp. 371-381). Singapore: Springer Nature Singapore. (PDF)
C02. Ahmed, S. N., Sajib, M. S. I., Ahmed, N., Ali, U. S., Fariha, L. T. J., Afroz, A., ... & Ahsan, M. S. (2024, October). AI and RBAC Enhanced Security System for Hospitals in Bangladesh. In Proceedings of the 3rd International Conference on Computing Advancements (pp. 169-176). (PDF)
C01. Uddin, M. A., Sonali, S. H., Rahman, M. S., & Ahsan, M. S. (2024, September). Deep Learning for Agile Malware Detection. In 2024 IEEE Region 10 Symposium (TENSYMP) (pp. 1-6). IEEE. (PDF)
J01. Ahsan, M. S., Islam, M. S., Hossain, M. S., & Das, A. (2024). “Detecting Smart Home Device Activities Using Packet-Level Signatures from Encrypted Traffic.” IEEE Transactions on Dependable and Secure Computing (TDSC). (PDF)