Book Chapters
Ferdous, M. S., Biswas, K., Chowdhury, M. J. M., Chowdhury, N., & Muthukkumarasamy, V. (2019). Integrated platforms for blockchain enablement. In S. Kim, G. C. Deka, & P. Zhang (Eds.), Advances in Computers (Vol. 115, pp. 41–72). Academic Press Inc. https://doi.org/10.1016/bs.adcom.2019.01.001
Ferdous, M. S., Chowdhury, F., & Poet, R. (2017). A hybrid model of attribute aggregation in federated identity management. In V. Chang, M. Ramachandran, R. J. Walters, & G. Wills (Eds.), Enterprise Security. Springer. https://doi.org/10.1007/978-3-319-54380-2_6
Ferdous, M. S., Hussein Khalid Hussein, R., Alassafi Obad, M., Alharthi Ayad, A., Walters, R., & Wills, G. (2016). Threat taxonomy for cloud of things. In A. Al-Sabbagh & R. Alsabah (Eds.), Internet of Things and Big Data Analysis: Recent Trends and Challenges (pp. 149–190). United Scholars Publications. https://eprints.soton.ac.uk/404527/
Ferdous, M. S., & Jøsang, A. (2013). Entity authentication and trust validation in PKI using petname systems. In A. Elçi, J. Pieprzyk, A. G. Chefranov, M. A. Orgun, H. Wang, & R. Shankaran (Eds.), Theory and Practice of Cryptography Solutions for Secure Information Systems (pp. 302–333). IGI Global. https://doi.org/10.4018/978-1-4666-4030-6.ch013
Journals
Chowdhury, M. J. M., Usman, M., Ferdous, M. S., Chowdhury, N., Harun, A. I., Jannat, U. S., & Biswas, K. (2021). A cross-layer trust-based consensus protocol for peer-to-peer energy trading using fuzzy logic. IEEE Internet of Things Journal. https://doi.org/10.1109/JIOT.2021.3063710
Shammee, T. I., Akter, T., Mou, M., Chowdhury, F., & Ferdous, M. S. (2020). A systematic literature review of graphical password schemes. Journal of Computing Science and Engineering, 16(4), 163–185. https://doi.org/10.5626/JCSE.2020.14.4.163
Chowdhury, M. J. M., Ferdous, M. S., Biswas, K., Chowdhury, N., & Muthukkumarasamy, V. (2020). COVID-19 contact tracing: Challenges and future directions. IEEE Access, 8, 225703–225729. https://doi.org/10.1109/ACCESS.2020.3036718
Ferdous, M. S., Chowdhury, F., Alassafi, M. O., Alshdadi, A. A., & Chang, V. (2020). Social anchor: Privacy-friendly attribute aggregation from social networks. IEEE Access, 8, 61844–61871. https://doi.org/10.1109/ACCESS.2020.2981553
Ferdous, M. S., Chowdhury, M. J. M., Biswas, K., Chowdhury, N., & Muthukkumarasamy, V. (2020). Immutable autobiography of smart cars leveraging blockchain technology. Knowledge Engineering Review. https://doi.org/10.1017/S0269888920000028
Ferdous, M. S., Chowdhury, F., & Alassafi, M. O. (2019). In search of self-sovereign identity leveraging blockchain technology. IEEE Access, 7, 103059–103079. https://doi.org/10.1109/ACCESS.2019.2931173
Chowdhury, M. J. M., Ferdous, M. S., Biswas, K., Chowdhury, N., Kayes, A. S. M., Alazab, M., & Watters, P. (2019). A comparative analysis of distributed ledger technology platforms. IEEE Access, 7, 167930–167943. https://doi.org/10.1109/ACCESS.2019.2953729
Chowdhury, F., & Ferdous, M. S. (2017). Performance analysis of R/Kademlia, Pastry and Bamboo using recursive routing in mobile networks. International Journal of Computer Networks and Communications, 9(5), 41–54. https://doi.org/10.5121/ijcnc.2017.9504
Ferdous, M. S., Chowdhury, S., & Jose, J. M. (2017). Analysing privacy in visual lifelogging. Pervasive and Mobile Computing, 40, 430–449. https://doi.org/10.1016/j.pmcj.2017.03.003
Ferdous, M. S., & Poet, R. (2015). Managing dynamic identity federations using Security Assertion Markup Language. Journal of Theoretical and Applied Electronic Commerce Research, 10(2), 53–76. https://doi.org/10.4067/S0718-18762015000200005
Ferdous, M. S., Chowdhury, M. J. M., & Hoque, M. A. (2021). A survey of consensus algorithms in public blockchain systems for crypto-currencies. Journal of Network and Computer Applications, 182, 103035. https://doi.org/https://doi.org/10.1016/j.jnca.2021.103035
Chowdhury, M. J. M., Ferdous, M. S., Biswas, K., Chowdhury, N., & Muthukkumarasamy, V. (2020). A survey on blockchain-based platforms for IoT use-cases. The Knowledge Engineering Review, 35, e19. https://doi.org/10.1017/S0269888920000284
Ferdous, M. S., Chowdhury, S., & Jose, J. M. (2017). Geo-tagging news stories using contextual modelling. International Journal of Information Retrieval Research, 7(4), 50–71. https://doi.org/10.4018/IJIRR.2017100104
Conferences
Alom, I., Eshita, R. M., Harun, A. I., Ferdous, M. S., Shuhan, M. K. B., Chowdhury, M. J. M., & Rahman, M. S. (2021). Dynamic management of identity federations using blockchain. 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 1–9. https://doi.org/10.1109/ICBC51069.2021.9461128
Chowdhury, A. A., Chowdhury, F., & Ferdous, M. S. (2020). A study of password security factors among Bangladeshi government websites. 23rd International Conference on Computer and Information Technology, ICCIT 2020. https://doi.org/10.1109/ICCIT51783.2020.9392745
Shahriar, M. A., Bappy, F. H., Hossain, A. K. M. F., Saikat, D. D., Ferdous, M. S., Chowdhury, M. J. M., & Bhuiyan, M. Z. A. (2020). Modelling attacks in blockchain systems using petri nets. 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, 1069–1078. https://doi.org/10.1109/TrustCom50675.2020.00142
Bhuiyan, M. S. I., Razzak, A., Ferdous, M. S., Chowdhury, M. J. M., Hoque, M. A., & Tarkoma, S. (2020). BONIK: A blockchain empowered chatbot for financial transactions. In G. Wang, R. Ko, M. Z. A. Bhuiyan, & Y. Pan (Eds.), 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020 (pp. 1079–1088). IEEE. https://doi.org/10.1109/TrustCom50675.2020.00143
Moniruzzaman, M., Chowdhury, F., & Ferdous, M. S. (2020). Examining usability issues in blockchain-based cryptocurrency wallets. In T. Bhuiyan, M. M. Rahman, & M. A. Ali (Eds.), 2nd International Conference on Computer Science and Cyber Security, ICONCS 2020 (pp. 631–643). Springer. https://doi.org/10.1007/978-3-030-52856-0_50
Sarker, S., Saha, A. K., & Ferdous, M. S. (2020, December). A survey on blockchain cloud integration. 23rd International Conference on Computer and Information Technology, ICCIT 2020. https://doi.org/10.1109/ICCIT51783.2020.9392748
Moniruzzaman, M., Chowdhury, F., & Ferdous, M. S. (2019, February). Measuring vulnerabilities of Bangladeshi websites. 2nd International Conference on Electrical, Computer and Communication Engineering, ECCE 2019. https://doi.org/10.1109/ECACE.2019.8679426
Chowdhury, M. J. M., Ferdous, M. S., Biswas, K., Chowdhury, N., Kayes, A. S. M., Watters, P., & Ng, A. (2019). Trust modeling for blockchain-based wearable data market. In J. Chen & L. T. Yang (Eds.), 2019 IEEE International Conference on Cloud Computing Technology and Science (CloudCom) (pp. 411–417). IEEE. https://doi.org/10.1109/CloudCom.2019.00070
Jannat, U. S., Hasnayeen, S. M., Bashar Shuhan, M. K., & Ferdous, M. S. (2019, February). Analysis and detection of malware in android applications using machine learning. 2nd International Conference on Electrical, Computer and Communication Engineering, ECCE 2019. https://doi.org/10.1109/ECACE.2019.8679493
Siddiki, M. R., Talha, M. A., Chowdhury, F., & Ferdous, M. S. (2018). CrowdsouRS: A crowdsourced reputation system for identifying deceptive online contents. 20th International Conference of Computer and Information Technology, ICCIT 2017, 1–6. https://doi.org/10.1109/ICCITECHN.2017.8281829
Chowdhury, M., Ferdous, M. S., & Biswas, K. (2018, July 5). Blockchain platforms for IoT Use-cases. 2nd Symposium on Distributed Ledger Technology (SDLT), 2019. https://doi.org/10.13140/RG.2.2.26129.94562
Ferdous, M. S., Chowdhury, M., Biswas, K., & Chowdhury, N. (2018, October 19). Immutable autobiography of smart cars. 3rd Symposium on Distributed Ledger Technology (SDLT), 2018.
Margheri, A., Ferdous, M. S., Yang, M., & Sassone, V. (2017). A distributed infrastructure for democratic cloud federations. In G. C. Fox (Ed.), 10th IEEE International Conference on Cloud Computing, CLOUD 2017 (pp. 688–691). IEEE. https://doi.org/10.1109/CLOUD.2017.93
Ferdous, M. S., Margheri, A., Paci, F., Yang, M., & Sassone, V. (2017). Decentralised runtime monitoring for access control systems in cloud federations. In K. Lee & L. Liu (Eds.), 37th IEEE International Conference on Distributed Computing Systems, ICDCS 2017 (pp. 2632–2633). IEEE. https://doi.org/10.1109/ICDCS.2017.178
Ferdous, M. S., Chowdhury, F., & Poet, R. (2017). A hybrid model of attribute aggregation in federated identity management. In V. Chang, M. Ramachandran, R. J. Walters, & G. Wills (Eds.), International Workshop on Enterprise Security, ES 2015 (Vol. 10131, pp. 120–154). Springer. https://doi.org/10.1007/978-3-319-54380-2_6
Chowdhury, S., Ferdous, M. S., & Jose, J. M. (2016). Understanding lifelog sharing preferences of lifeloggers. In P. C. (Ed.), 28th Australian Computer-Human Interaction Conference, OzCHI 2016 (pp. 649–651). ACM Digital Library. https://doi.org/10.1145/3010915.3011852
Chowdhury, S., Ferdous, M. S., & Jose, J. M. (2016). Exploring lifelog sharing and privacy. In C. Parker (Ed.), 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp 2016 (pp. 553–558). ACM Digital Library. https://doi.org/10.1145/2968219.2968320
Ferdous, M. S., Chowdhury, S., & Jose, J. M. (2016). Privacy threat model in lifelogging. 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp 2016, 576–581. https://doi.org/10.1145/2968219.2968324
Chowdhury, S., Ferdous, M. S., & Jose, J. M. (2016). Bystander privacy in lifelogging. 30th International BCS Human Computer Interaction Conference, HCI 2016. https://doi.org/10.14236/ewic/HCI2016.62
Ferdous, M. S., & Poet, R. (2016). Formalising identity management protocols. 14th Annual Conference on Privacy, Security and Trust, PST 2016, 137–146. https://doi.org/10.1109/PST.2016.7906948
Chowdhury, S., Ferdous, M. S., & Jose, J. M. (2016, June). A user-study examining visualization of lifelogs. 14th International Workshop on Content-Based Multimedia Indexing, CBMI 2016. https://doi.org/10.1109/CBMI.2016.7500236
Chowdhury, S., Ferdous, M. S., & Jose, J. M. (2016, July). Lifelogging user study: Bystander privacy. 30th International BCS Human Computer Interaction Conference, HCI 2016. https://doi.org/10.5555/3114770.3114810
Chowdhury, S., McParlane, P. J., Ferdous, M. S., & Jose, J. (2015). My day in review visually summarising noisy lifelog data. 5th ACM International Conference on Multimedia Retrieval, ICMR 2015, 607–610. https://doi.org/10.1145/2671188.2749393
Ferdous, M. S., Norman, G., Jøsang, A., & Poet, R. (2015). Mathematical modelling of trust issues in federated identity management. In C. D. Jensen, S. Marsh, T. Dimitrakos, & Y. Murayama (Eds.), 9th IFIP Working Group 11.11 International Conference on Trust Management, IFIPTM 2015 (Vol. 454, pp. 13–29). Springer. https://doi.org/10.1007/978-3-319-18491-3_2
Ferdous, M. S., & Poet, R. (2014). CAFS: A framework for context-aware federated services. 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014, 130–139. https://doi.org/10.1109/TrustCom.2014.21
Ferdous, M. S., Norman, G., & Poet, R. (2014). Mathematical modelling of identity, Identity Management and other related topics. In R. Poet (Ed.), 7th International Conference on Security of Information and Networks, SIN 2014 (pp. 9–16). ACM Digital Library. https://doi.org/10.1145/2659651.2659729
Ferdous, M. S., & Poet, R. (2013). Portable personal identity provider in mobile phones. 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013, 736–745. https://doi.org/10.1109/TrustCom.2013.89
Ferdous, M. S., & Poet, R. (2013). Analysing attribute aggregation models in federated identity management. 6th International Conference on Security of Information and Networks, SIN 2013, 181–188. https://doi.org/10.1145/2523514.2526998
Ferdous, M. S., & Poet, R. (2012). A comparative analysis of identity management systems. 2012 10th Annual International Conference on High Performance Computing and Simulation, HPCS 2012, 454–461. https://doi.org/10.1109/HPCSim.2012.6266958
Chadwick, D. W., Inman, G., Siu, K. W. S., & Ferdous, M. S. (2011). Leveraging social networks to gain access to organisational resources. 7th ACM Workshop on Digital Identity Management, DIM’11 - Co-Located with 18th ACM Conference on Computer and Communications Security, CCS 2011, 43–51. https://doi.org/10.1145/2046642.2046653
Moniruzzaman, M., Ferdous, M. S., & Hossain, R. (2010). A study of privacy policy enforcement in access control models. 2010 13th International Conference on Computer and Information Technology, ICCIT 2010, 352–357. https://doi.org/10.1109/ICCITECHN.2010.5723883
Ferdous, M. S., Jøsang, A., Singh, K., & Borgaonkar, R. (2009). Security usability of petname systems. In A. Jøsang, T. Maseng, & S. J. Knapskog (Eds.), 14th Nordic Conference on Secure IT Systems: Identity and Privacy in the Internet Age, NordSec 2009 (pp. 44–59). Springer. https://doi.org/10.1007/978-3-642-04766-4_4
Kuldeep, S., Audun, J., Ferdous, M. S., & Borgaonkar, R. (2009). Spam filter optimality based on signal detection theory. 2nd International Conference on Security of Information and Networks, SIN’09, 219–224. https://doi.org/10.1145/1626195.1626250
Ferdous, M. S., & Chowdhury, F. (2008). Covert channel communication in RFID (short paper). 1st International Conference on Security of Information and Networks, SIN 2007, 47–52.
Ferdous, M. S., Chowdhury, F., & Acharjee, J. C. (2007). An extended algorithm to enhance the performance of the current NAPT. ICICT 2007: International Conference on Information and Communication Technology, 315–318. https://doi.org/10.1109/ICICT.2007.375401