Threat minimization by design and deployment of secured networking model S Islam, H Ali, A Habib, N Nobi, M Alam, D Hossain International Journal of Electronics and Information Engineering 8 (2), 135-144, 2018 | 20 | 2018 |
The basic concept of cyber crime O Goni, MH Ali, MM Alam, MA Shameem Journal of Technology Innovations and Energy 1 (2), 16-24, 2022 | 10 | 2022 |
Bengali Cyberbullying Detection in Social Media Using Machine Learning Algorithms S Saha, MS Islam, MM Alam, MM Rahman, MZH Majumder, MS Alam, ... 2023 5th International Conference on Sustainable Technologies for Industry 5 …, 2023 | 2 | 2023 |
Organizational Network Monitoring and Security Evaluation Using Next-Generation Firewall (NGFW) MS Islam, NK Datta, MIH Showrov, MM Alam, MH Ali, MD Hossain The Fourth Industrial Revolution and Beyond: Select Proceedings of IC4IR+ …, 2023 | 2 | 2023 |
Natural Language Processing and Machine Learning Approaches to Detect Bangla Hate Speech on Social Media MS Islam, S Saha, MM Alam, NK Datta, MH Ali, MD Hossain, ... 2023 26th International Conference on Computer and Information Technology …, 2023 | 1 | 2023 |
An Approach for the Normalization of Short Message Service to Detect Shorter Form of Words and Find out Actual Word M Alam, O Goni, A Shameem, S Islam, NK Datta, S Ahmed, G Moazzam International Journal of Electronics and Information Engineering 13 (3), 111-118, 2021 | 1 | 2021 |
Heart Disease Prediction Using Machine Learning Algorithms: Performance Analysis MASH Subrata Saha, Md. Motinur Rahman, Tahmid Tamrin Suki, Md. Mahbub Alam ... International Conference on Advancement in Electrical and Electronic …, 2024 | | 2024 |
Applying MVC to Shopping Management Application Using Ruby on Rails with Bangla Interface SI Md. Mahbub Alam, Al Nahian I.J. of Electronics and Information Engineering 8 (2), 88-95, 2018 | | 2018 |