Biography
Hossain Shahriar is an assistant professor of computer science at Kennesaw State University. He received his PhD from Queen’s University, Canada. His research is currently focused on web application security vulnerabilities and their mitigation techniques, and mobile application security. Dr. Sharhiar has served as a program committee member in various international conferences including IEEE COMPSAC 2013, IEEE STPSA 2013, IEEE HASE 2014, and ACM SAC 2014. He is an associate editor of International Journal of Secure Software Engineering. Shahriar is currently a member of the IEEE, ACM, and ACM SIGAPP.
Industry Expertise (2)
Computer/Network Security
Computer Software
Areas of Expertise (20)
Cybersecurity
Ethical hacking
Hacking Education
Hacking
Security Vulnerabilities
Security
Web Application Security
Mobile Application Security
Data Structures
Data Analysis
Eclipse
Latex
Visual Studio
C
Algorithms
Software Engineering
Java
Python
C++
Programming
Education (3)
Queen's University: Ph.D., Computing and Information Science 2011
Queen's University: M.S., Computing and Information Science 2008
Bangladesh University of Engineering and Technology: B.S., Engineering, Computer Science and Engineering 2003
Affiliations (3)
- IEEE
- ACM
- ACM SIGAPP
Links (1)
Media Appearances (1)
Prep Your Business for a Data Breach
Cobb in Focus print
2016-10-27
Hossain Shahriar, assistant professor of information technology in KSU's College of Computing and Software Engineering, teaches an ethical hacking course to help students find and identify system threats. "Once they know the system's weaknesses, they're better prepared to detect possible breaches," Shahriar says. "They learn how to scan networks and discover what's there, even if it's not readily obvious." Shahriar pointed out that a large number of corporate breaches in recent months occurred long before they were detected. "Some were only found through routine data audits, after the damage was done."
Event Appearances (5)
A Signature-Based Intrusion Detection System for Web Applications based on Genetic Algorithm
9th International Conference on Security of Information and Networks Rutgers University, New Jersey
2016-07-20
Object injection Vulnerability Discovery Based on Latent Semantic Indexing
31st Annual ACM Symposium on Applied Computing Pisa, Italy
2016-04-04
Security Concerns and Mitigation Approaches for MOOC-Based Applications
10th International Conference for Internet Technology and Secured Transactions Barcelona, Spain
2015-12-14
Comparing MOOC-Based Platforms: Reflection on Pedagogical Support, Framework and Learning Analytics
International Conference on Collaboration Technologies and Systems Atlanta, Georgia
2015-06-01
Classification of Lightweight Directory Access Protocol Query Injection Attacks and Mitigation Techniques
International Conference on Collaboration Technologies and Systems Atlanta, Georgia
2015-06-01
Recent Papers (5)
Fuzzy Rule-Based Vulnerability Assessment Framework for Web Applications
International Journal of Secure Software Engineering
2016 This paper addresses the problem of assessing risk in web application due to implementation level vulnerabilities. In particular, the authors address the common research challenge of finding enough historical data to compute the probability of vulnerabilities and exploitations.
Request and Response Analysis Framework for Mitigating Clickjacking Attacks
International Journal of Secure Software Engineering
2015 This paper addresses the detection of clickjacking attacks, which is an emerging web application security issue. The authors propose a web application request and response page analysis framework to detect clickjacking attacks.
A Comparative Study of Email Forensic Tools
Journal of Information Security
2015 This paper examines a set of common features to compare and contrast five popular open source email forensic tools. The study finds that all email forensic tools are not similar, offer diverse types of facility.
Mobile Phishing Attacks and Mitigation Techniques
Journal of Information Security
2015 This paper discusses various phishing attacks using mobile devices followed by some discussion on countermeasures. The discussion is intended to bring more awareness to emerging mobile device-based phishing attacks.
Client-Side Detection of Clickjacking Attacks
International Journal of Information Security and Privacy
2015-01-01
2015 Clickjacking attacks are emerging threat for web application users where click operations performed by victims lead to security breaches such as compromising webcams and posting unintended messages. Effective client-side defense technique could prevent the possible victims. This paper presents a client side approach to detect clickjacking attacks.