Follow
Shadman Latif
Title
Cited by
Cited by
Year
Ethical hacking: Skills to fight cybersecurity threats
L Smith, MM Chowdhury, S Latif
EPiC Series in Computing 82 (5), 102-111, 2022
162022
Managing the cyber world: Hacker edition
S Vandervelden, MM Chowdhury, S Latif
2021 International Conference on Electrical, Computer, Communications and …, 2021
162021
Denial of service: A growing underrated threat
W Bonasera, MM Chowdhury, S Latif
2021 International Conference on Electrical, Computer, Communications and …, 2021
142021
Investigation of Machine Learning Algorithms for Network Intrusion Detection.
S Latif, FF Dola, MD Afsar, IJ Esha, D Nandi
International Journal of Information Engineering & Electronic Business 14 (2), 2022
132022
Data breaches in corporate setting
D Chen, MM Chowdhury, S Latif
2021 International Conference on Electrical, Computer, Communications and …, 2021
132021
Risks and anatomy of data breaches
S Caston, MM Chowdhury, S Latif
2021 International Conference on Electrical, Computer, Communications and …, 2021
102021
ChatGPT: The Curious Case of Attack Vectors' Supply Chain Management Improvement
M Chowdhury, N Rifat, S Latif, M Ahsan, MS Rahman, R Gomes
2023 IEEE International Conference on Electro Information Technology (eIT …, 2023
92023
Protecting business from data breach
MD Morgan, MM Chowdhury, S Latif
2021 International Conference on Electrical, Computer, Communications and …, 2021
92021
Security Issues of Mobile Devices
G Helm, S Latif, M Chowdhury
The 2021 IEEE International Conference on Electro Information Technology, 14-15, 2021
82021
IoT Security for Smart Home: Issues and Solutions
I Antzoulis, MM Chowdhury, S Latif
2022 IEEE International Conference on Electro Information Technology (eIT), 1-7, 2022
72022
ChatGPT: A threat against the CIA triad of cyber security
MDM Chowdhury, N Rifat, M Ahsan, S Latif, R Gomes, MS Rahman
2023 IEEE International Conference on Electro Information Technology (eIT), 1-6, 2023
62023
Dark web: A facilitator of crime
R Cole, S Latif, MM Chowdhury
2021 international conference on electrical, computer, communications and …, 2021
62021
Mobile devices vulnerabilities
M Schneider, MM Chowdhury, S Latif
EPiC Series in Computing 82, 92-101, 2022
52022
A comparative study of os security
GJ Ruiz, MM Chowdhury, S Latif
2021 International Conference on Electrical, Computer, Communications and …, 2021
32021
Bitcoin: cryptographic algorithms, security vulnerabilities and mitigations
T Kowalski, MM Chowdhury, S Latif, K Kambhampaty
2022 IEEE International Conference on Electro Information Technology (eIT …, 2022
22022
Raspberry Pis for Network Security
AS Fetter, MM Chowdhury, S Latif
2021 International Conference on Electrical, Computer, Communications and …, 2021
22021
Comparison of OS Security
GJ Ruiz, MM Chowdhury, S Latif
Mauritius, 2021
22021
Evaluating Cybersecurity Risks in NLP Models: Google Bard as Bard of Prey and ChatGPT as Cyber Crime Aide
C Wohlbach, MM Chowdhury, S Latif
Proceedings of 39th International Confer 98, 159-168, 2024
2024
Computer Forensics: Complementing Cyber Security
QR McCluskey, MM Chowdhury, S Latif, K Kambhampaty
2022 IEEE International Conference on Electro Information Technology (eIT …, 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–19