hero image
Hossain  Shahriar, Ph.D. - Kennesaw State University. Kennesaw, GA, US

Hossain Shahriar, Ph.D. Hossain  Shahriar, Ph.D.

Assistant Professor, Department of Information Technology | Kennesaw State University

Kennesaw, GA, UNITED STATES

Hossain Shahriar researches web application security vulnerabilities and their mitigation techniques, and mobile application security.

Biography

Hossain Shahriar is an assistant professor of computer science at Kennesaw State University. He received his PhD from Queen’s University, Canada. His research is currently focused on web application security vulnerabilities and their mitigation techniques, and mobile application security. Dr. Sharhiar has served as a program committee member in various international conferences including IEEE COMPSAC 2013, IEEE STPSA 2013, IEEE HASE 2014, and ACM SAC 2014. He is an associate editor of International Journal of Secure Software Engineering. Shahriar is currently a member of the IEEE, ACM, and ACM SIGAPP.

Industry Expertise (2)

Computer/Network Security Computer Software

Areas of Expertise (20)

Cybersecurity Ethical hacking Hacking Education Hacking Security Vulnerabilities Security Web Application Security Mobile Application Security Data Structures Data Analysis Eclipse Latex Visual Studio C Algorithms Software Engineering Java Python C++ Programming

Education (3)

Queen's University: Ph.D., Computing and Information Science 2011

Queen's University: M.S., Computing and Information Science 2008

Bangladesh University of Engineering and Technology: B.S., Engineering, Computer Science and Engineering 2003

Affiliations (3)

  • IEEE
  • ACM
  • ACM SIGAPP

Media Appearances (1)

Prep Your Business for a Data Breach

Cobb in Focus  print

2016-10-27

Hossain Shahriar, assistant professor of information technology in KSU's College of Computing and Software Engineering, teaches an ethical hacking course to help students find and identify system threats.

"Once they know the system's weaknesses, they're better prepared to detect possible breaches," Shahriar says. "They learn how to scan networks and discover what's there, even if it's not readily obvious."

Shahriar pointed out that a large number of corporate breaches in recent months occurred long before they were detected.

"Some were only found through routine data audits, after the damage was done."

view more

Event Appearances (5)

A Signature-Based Intrusion Detection System for Web Applications based on Genetic Algorithm

9th International Conference on Security of Information and Networks  Rutgers University, New Jersey

2016-07-20

Object injection Vulnerability Discovery Based on Latent Semantic Indexing

31st Annual ACM Symposium on Applied Computing  Pisa, Italy

2016-04-04

Security Concerns and Mitigation Approaches for MOOC-Based Applications

10th International Conference for Internet Technology and Secured Transactions  Barcelona, Spain

2015-12-14

Comparing MOOC-Based Platforms: Reflection on Pedagogical Support, Framework and Learning Analytics

International Conference on Collaboration Technologies and Systems  Atlanta, Georgia

2015-06-01

Classification of Lightweight Directory Access Protocol Query Injection Attacks and Mitigation Techniques

International Conference on Collaboration Technologies and Systems  Atlanta, Georgia

2015-06-01

Recent Papers (5)

Fuzzy Rule-Based Vulnerability Assessment Framework for Web Applications International Journal of Secure Software Engineering

2016

This paper addresses the problem of assessing risk in web application due to implementation level vulnerabilities. In particular, the authors address the common research challenge of finding enough historical data to compute the probability of vulnerabilities and exploitations.

view more

Request and Response Analysis Framework for Mitigating Clickjacking Attacks International Journal of Secure Software Engineering

2015

This paper addresses the detection of clickjacking attacks, which is an emerging web application security issue. The authors propose a web application request and response page analysis framework to detect clickjacking attacks.

view more

A Comparative Study of Email Forensic Tools Journal of Information Security

2015

This paper examines a set of common features to compare and contrast five popular open source email forensic tools. The study finds that all email forensic tools are not similar, offer diverse types of facility.

view more

Mobile Phishing Attacks and Mitigation Techniques Journal of Information Security

2015

This paper discusses various phishing attacks using mobile devices followed by some discussion on countermeasures. The discussion is intended to bring more awareness to emerging mobile device-based phishing attacks.

view more

Client-Side Detection of Clickjacking Attacks International Journal of Information Security and Privacy

2015-01-01

2015

Clickjacking attacks are emerging threat for web application users where click operations performed by victims lead to security breaches such as compromising webcams and posting unintended messages. Effective client-side defense technique could prevent the possible victims. This paper presents a client side approach to detect clickjacking attacks.

view more

Contact