var bibbase_data = {"data":"\"Loading..\"\n\n
\n\n \n\n \n\n \n \n\n \n\n \n \n\n \n\n \n
\n generated by\n \n \"bibbase.org\"\n\n \n
\n \n\n
\n\n \n\n\n
\n\n Excellent! Next you can\n create a new website with this list, or\n embed it in an existing web page by copying & pasting\n any of the following snippets.\n\n
\n JavaScript\n (easiest)\n
\n \n <script src=\"https://bibbase.org/show?bib=https%3A%2F%2Fbibbase.org%2Fnetwork%2Ffiles%2Fee2XGn5boqwjmKHHf&jsonp=1&noBootstrap=1&jsonp=1\"></script>\n \n
\n\n PHP\n
\n \n <?php\n $contents = file_get_contents(\"https://bibbase.org/show?bib=https%3A%2F%2Fbibbase.org%2Fnetwork%2Ffiles%2Fee2XGn5boqwjmKHHf&jsonp=1&noBootstrap=1\");\n print_r($contents);\n ?>\n \n
\n\n iFrame\n (not recommended)\n
\n \n <iframe src=\"https://bibbase.org/show?bib=https%3A%2F%2Fbibbase.org%2Fnetwork%2Ffiles%2Fee2XGn5boqwjmKHHf&jsonp=1&noBootstrap=1\"></iframe>\n \n
\n\n

\n For more details see the documention.\n

\n
\n
\n\n
\n\n This is a preview! To use this list on your own web site\n or create a new web site from it,\n create a free account. The file will be added\n and you will be able to edit it in the File Manager.\n We will show you instructions once you've created your account.\n
\n\n
\n\n

To the site owner:

\n\n

Action required! Mendeley is changing its\n API. In order to keep using Mendeley with BibBase past April\n 14th, you need to:\n

    \n
  1. renew the authorization for BibBase on Mendeley, and
  2. \n
  3. update the BibBase URL\n in your page the same way you did when you initially set up\n this page.\n
  4. \n
\n

\n\n

\n \n \n Fix it now\n

\n
\n\n
\n\n\n
\n \n \n
\n
\n  \n 2024\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Deep-IDS: A Real-Time Intrusion Detector for IoT Nodes Using Deep Learning.\n \n \n \n\n\n \n Racherla, S.; Sripathi, P.; Faruqui, N.; Kabir, M. A.; Whaiduzzaman, M.; and Shah, S. A.\n\n\n \n\n\n\n IEEE Access. 2024.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 3 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{racherla2024deep,\n  title={Deep-IDS: A Real-Time Intrusion Detector for IoT Nodes Using Deep Learning},\n  author={Racherla, Sandeepkumar and Sripathi, Prathyusha and Faruqui, Nuruzzaman and Kabir, Md Alamgir and Whaiduzzaman, Md and Shah, Syed Aziz},\n  journal={IEEE Access},\n  year={2024},\n  publisher={IEEE}\n}
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2023\n \n \n (7)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n On the use of deep learning for video classification.\n \n \n \n\n\n \n Ur Rehman, A.; Belhaouari, S. B.; Kabir, M. A.; and Khan, A.\n\n\n \n\n\n\n Applied Sciences, 13(3): 2007. 2023.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{ur2023use,\n  title={On the use of deep learning for video classification},\n  author={Ur Rehman, Atiq and Belhaouari, Samir Brahim and Kabir, Md Alamgir and Khan, Adnan},\n  journal={Applied Sciences},\n  volume={13},\n  number={3},\n  pages={2007},\n  year={2023},\n  publisher={MDPI}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Review of artifact detection methods for automated analysis and diagnosis in digital pathology.\n \n \n \n\n\n \n Shakhawat, H.; Hossain, S.; Kabir, A.; Mahmud, S. H.; Islam, M. M.; and Tariq, F.\n\n\n \n\n\n\n In Artificial Intelligence For Disease Diagnosis And Prognosis In Smart Healthcare, pages 177–202. CRC Press, 2023.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@incollection{shakhawat2023review,\n  title={Review of artifact detection methods for automated analysis and diagnosis in digital pathology},\n  author={Shakhawat, Hossain and Hossain, Sakir and Kabir, Alamgir and Mahmud, SM Hasan and Islam, MM Manjurul and Tariq, Faisal},\n  booktitle={Artificial Intelligence For Disease Diagnosis And Prognosis In Smart Healthcare},\n  pages={177--202},\n  year={2023},\n  publisher={CRC Press}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Deep learning for video classification: A review.\n \n \n \n\n\n \n Rehman, A.; and Belhaouari, S. B.\n\n\n \n\n\n\n Authorea Preprints. 2023.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{rehman2023deep,\n  title={Deep learning for video classification: A review},\n  author={Rehman, Atiq and Belhaouari, Samir Brahim},\n  journal={Authorea Preprints},\n  year={2023},\n  publisher={Authorea}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Salp Swarm Algorithm for Drift Compensation in E-nose.\n \n \n \n\n\n \n ur Rehman, A.; Kabir, M. A.; Ijaz, M.; Al-Mohsin, H. M; and Bermak, A.\n\n\n \n\n\n\n In 2023 15th International Conference on Advanced Computational Intelligence (ICACI), pages 1–6, 2023. IEEE\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{ur2023salp,\n  title={Salp Swarm Algorithm for Drift Compensation in E-nose},\n  author={ur Rehman, Atiq and Kabir, Md Alamgir and Ijaz, Muhammad and Al-Mohsin, Hanadi M and Bermak, Amine},\n  booktitle={2023 15th International Conference on Advanced Computational Intelligence (ICACI)},\n  pages={1--6},\n  year={2023},\n  organization={IEEE}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Trackez: an iot-based 3d-object tracking from 2d pixel matrix using mez and fsl algorithm.\n \n \n \n\n\n \n Faruqui, N.; Kabir, M. A.; Yousuf, M. A.; Whaiduzzaman, M.; Barros, A.; and Mahmud, I.\n\n\n \n\n\n\n IEEE Access, 11: 61453–61467. 2023.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{faruqui2023trackez,\n  title={Trackez: an iot-based 3d-object tracking from 2d pixel matrix using mez and fsl algorithm},\n  author={Faruqui, Nuruzzaman and Kabir, Md Alamgir and Yousuf, Mohammad Abu and Whaiduzzaman, Md and Barros, Alistair and Mahmud, Imran},\n  journal={IEEE Access},\n  volume={11},\n  pages={61453--61467},\n  year={2023},\n  publisher={IEEE}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Cross-Version Software Defect Prediction Considering Concept Drift and Chronological Splitting.\n \n \n \n\n\n \n Kabir, M. A.; Rehman, A. U.; Islam, M. M.; Ali, N.; and Baptista, M. L\n\n\n \n\n\n\n Symmetry, 15(10): 1934. 2023.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{kabir2023cross,\n  title={Cross-Version Software Defect Prediction Considering Concept Drift and Chronological Splitting},\n  author={Kabir, Md Alamgir and Rehman, Atiq Ur and Islam, MM Manjurul and Ali, Nazakat and Baptista, Marcia L},\n  journal={Symmetry},\n  volume={15},\n  number={10},\n  pages={1934},\n  year={2023},\n  publisher={MDPI}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n The effects of class rebalancing techniques on ensemble classifiers on credit card fraud detection: An empirical study.\n \n \n \n\n\n \n Kaushik, M. M.; Mahmud, S.; Kabir, M. A.; and Nandi, D.\n\n\n \n\n\n\n In AIP Conference Proceedings, volume 2916, 2023. AIP Publishing\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{kaushik2023effects,\n  title={The effects of class rebalancing techniques on ensemble classifiers on credit card fraud detection: An empirical study},\n  author={Kaushik, Mehedi Mahmud and Mahmud, SM and Kabir, Md Alamgir and Nandi, Dip},\n  booktitle={AIP Conference Proceedings},\n  volume={2916},\n  number={1},\n  year={2023},\n  organization={AIP Publishing}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2022\n \n \n (4)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Spectrum Impact Analysis of Fault Proneness Statement for Improved Fault Localization.\n \n \n \n\n\n \n Kabir, M. A.; Islam, M. M.; Mahmud, S. H.; and Elahe, M. F.\n\n\n \n\n\n\n In Proceedings of the 2nd International Conference on Computing Advancements, pages 59–66, 2022. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{kabir2022spectrum,\n  title={Spectrum Impact Analysis of Fault Proneness Statement for Improved Fault Localization},\n  author={Kabir, Md Alamgir and Islam, MM Manjurul and Mahmud, SM Hasan and Elahe, Md Fazla},\n  booktitle={Proceedings of the 2nd International Conference on Computing Advancements},\n  pages={59--66},\n  year={2022}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Software risk prediction: systematic literature review on machine learning techniques.\n \n \n \n\n\n \n Mahmud, M. H.; Nayan, M. T. H.; Ashir, D. M. N. A.; and Kabir, M. A.\n\n\n \n\n\n\n Applied Sciences, 12(22): 11694. 2022.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{mahmud2022software,\n  title={Software risk prediction: systematic literature review on machine learning techniques},\n  author={Mahmud, Mahmudul Hoque and Nayan, Md Tanzirul Haque and Ashir, Dewan Md Nur Anjum and Kabir, Md Alamgir},\n  journal={Applied Sciences},\n  volume={12},\n  number={22},\n  pages={11694},\n  year={2022},\n  publisher={MDPI}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n CODE: A Moving-Window-Based Framework for Detecting Concept Drift in Software Defect Prediction.\n \n \n \n\n\n \n Kabir, M. A.; Begum, S.; Ahmed, M. U.; and Rehman, A. U.\n\n\n \n\n\n\n Symmetry, 14(12): 2508. 2022.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{kabir2022code,\n  title={CODE: A Moving-Window-Based Framework for Detecting Concept Drift in Software Defect Prediction},\n  author={Kabir, Md Alamgir and Begum, Shahina and Ahmed, Mobyen Uddin and Rehman, Atiq Ur},\n  journal={Symmetry},\n  volume={14},\n  number={12},\n  pages={2508},\n  year={2022},\n  publisher={MDPI}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Factors Impacting Short-Term Load Forecasting of Charging Station to Electric Vehicle.\n \n \n \n\n\n \n Elahe, M. F.; Kabir, M. A.; Mahmud, S. H.; and Azim, R.\n\n\n \n\n\n\n Electronics, 12(1): 55. 2022.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{elahe2022factors,\n  title={Factors Impacting Short-Term Load Forecasting of Charging Station to Electric Vehicle},\n  author={Elahe, Md Fazla and Kabir, Md Alamgir and Mahmud, SM Hasan and Azim, Riasat},\n  journal={Electronics},\n  volume={12},\n  number={1},\n  pages={55},\n  year={2022},\n  publisher={MDPI}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2021\n \n \n (4)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n COSTE: Complexity-based OverSampling TEchnique to alleviate the class imbalance problem in software defect prediction.\n \n \n \n\n\n \n Feng, S.; Keung, J.; Yu, X.; Xiao, Y.; Bennin, K. E.; Kabir, M. A.; and Zhang, M.\n\n\n \n\n\n\n Information and Software Technology, 129: 106432. 2021.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{feng2021coste,\n  title={COSTE: Complexity-based OverSampling TEchnique to alleviate the class imbalance problem in software defect prediction},\n  author={Feng, Shuo and Keung, Jacky and Yu, Xiao and Xiao, Yan and Bennin, Kwabena Ebo and Kabir, Md Alamgir and Zhang, Miao},\n  journal={Information and Software Technology},\n  volume={129},\n  pages={106432},\n  year={2021},\n  publisher={Elsevier}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Evaluating the effects of similar-class combination on class integration test order generation.\n \n \n \n\n\n \n Zhang, M.; Keung, J. W.; Xiao, Y.; and Kabir, M. A.\n\n\n \n\n\n\n Information and Software Technology, 129: 106438. 2021.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{zhang2021evaluating,\n  title={Evaluating the effects of similar-class combination on class integration test order generation},\n  author={Zhang, Miao and Keung, Jacky Wai and Xiao, Yan and Kabir, Md Alamgir},\n  journal={Information and Software Technology},\n  volume={129},\n  pages={106438},\n  year={2021},\n  publisher={Elsevier}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n AComNN: Attention enhanced Compound Neural Network for financial time-series forecasting with cross-regional features.\n \n \n \n\n\n \n Yang, Z.; Keung, J.; Kabir, M. A.; Yu, X.; Tang, Y.; Zhang, M.; and Feng, S.\n\n\n \n\n\n\n Applied Soft Computing, 111: 107649. 2021.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{yang2021acomnn,\n  title={AComNN: Attention enhanced Compound Neural Network for financial time-series forecasting with cross-regional features},\n  author={Yang, Zhen and Keung, Jacky and Kabir, Md Alamgir and Yu, Xiao and Tang, Yutian and Zhang, Miao and Feng, Shuo},\n  journal={Applied Soft Computing},\n  volume={111},\n  pages={107649},\n  year={2021},\n  publisher={Elsevier}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Inter-release defect prediction with feature selection using temporal chunk-based learning: An empirical study.\n \n \n \n\n\n \n Kabir, M. A.; Keung, J.; Turhan, B.; and Bennin, K. E.\n\n\n \n\n\n\n Applied Soft Computing, 113: 107870. 2021.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{kabir2021inter,\n  title={Inter-release defect prediction with feature selection using temporal chunk-based learning: An empirical study},\n  author={Kabir, Md Alamgir and Keung, Jacky and Turhan, Burak and Bennin, Kwabena Ebo},\n  journal={Applied Soft Computing},\n  volume={113},\n  pages={107870},\n  year={2021},\n  publisher={Elsevier}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2020\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Prevalence of machine learning techniques in software defect prediction.\n \n \n \n\n\n \n Sohan, M. F.; Kabir, M. A.; Rahman, M.; Bhuiyan, T.; Jabiullah, M. I.; and Felix, E. A.\n\n\n \n\n\n\n In Cyber Security and Computer Science: Second EAI International Conference, ICONCS 2020, Dhaka, Bangladesh, February 15-16, 2020, Proceedings 2, pages 257–269, 2020. Springer International Publishing\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{sohan2020prevalence,\n  title={Prevalence of machine learning techniques in software defect prediction},\n  author={Sohan, Md Fahimuzzman and Kabir, Md Alamgir and Rahman, Mostafijur and Bhuiyan, Touhid and Jabiullah, Md Ismail and Felix, Ebubeogu Amarachukwu},\n  booktitle={Cyber Security and Computer Science: Second EAI International Conference, ICONCS 2020, Dhaka, Bangladesh, February 15-16, 2020, Proceedings 2},\n  pages={257--269},\n  year={2020},\n  organization={Springer International Publishing}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Training Data Selection Using Ensemble Dataset Approach for Software Defect Prediction.\n \n \n \n\n\n \n Sohan, M. F.; Kabir, M. A.; Rahman, M.; Hasan Mahmud, S.; and Bhuiyan, T.\n\n\n \n\n\n\n In Cyber Security and Computer Science: Second EAI International Conference, ICONCS 2020, Dhaka, Bangladesh, February 15-16, 2020, Proceedings 2, pages 243–256, 2020. Springer International Publishing\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{sohan2020training,\n  title={Training Data Selection Using Ensemble Dataset Approach for Software Defect Prediction},\n  author={Sohan, Md Fahimuzzman and Kabir, Md Alamgir and Rahman, Mostafijur and Hasan Mahmud, SM and Bhuiyan, Touhid},\n  booktitle={Cyber Security and Computer Science: Second EAI International Conference, ICONCS 2020, Dhaka, Bangladesh, February 15-16, 2020, Proceedings 2},\n  pages={243--256},\n  year={2020},\n  organization={Springer International Publishing}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n A drift propensity detection technique to improve the performance for cross-version software defect prediction.\n \n \n \n\n\n \n Kabir, M. A.; Keung, J. W; Bennin, K. E; and Zhang, M.\n\n\n \n\n\n\n In 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC), pages 882–891, 2020. IEEE\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{kabir2020drift,\n  title={A drift propensity detection technique to improve the performance for cross-version software defect prediction},\n  author={Kabir, Md Alamgir and Keung, Jacky W and Bennin, Kwabena E and Zhang, Miao},\n  booktitle={2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)},\n  pages={882--891},\n  year={2020},\n  organization={IEEE}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2019\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Revisiting the class imbalance issue in software defect prediction.\n \n \n \n\n\n \n Sohan, M. F.; Kabir, M. A.; Jabiullah, M. I.; and Rahman, S. S. M. M.\n\n\n \n\n\n\n In 2019 International Conference on Electrical, Computer and Communication Engineering (ECCE), pages 1–6, 2019. IEEE\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{sohan2019revisiting,\n  title={Revisiting the class imbalance issue in software defect prediction},\n  author={Sohan, Md Fahimuzzman and Kabir, Md Alamgir and Jabiullah, Md Ismail and Rahman, Sheikh Shah Mohammad Motiur},\n  booktitle={2019 International Conference on Electrical, Computer and Communication Engineering (ECCE)},\n  pages={1--6},\n  year={2019},\n  organization={IEEE}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Assessing the Significant Impact of Concept Drift in Software Defect Prediction.\n \n \n \n\n\n \n Kabir, M. A.; Keung, J. W; Bennin, K. E; and Zhang, M.\n\n\n \n\n\n\n In 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC), volume 1, pages 53–58, 2019. IEEE\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{kabir2019assessing,\n  title={Assessing the Significant Impact of Concept Drift in Software Defect Prediction},\n  author={Kabir, Md Alamgir and Keung, Jacky W and Bennin, Kwabena E and Zhang, Miao},\n  booktitle={2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC)},\n  volume={1},\n  pages={53--58},\n  year={2019},\n  organization={IEEE}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n A heuristic approach to break cycles for the class integration test order generation.\n \n \n \n\n\n \n Zhang, M.; Keung, J.; Xiao, Y.; Kabir, M. A.; and Feng, S.\n\n\n \n\n\n\n In 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC), volume 1, pages 47–52, 2019. IEEE\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{zhang2019heuristic,\n  title={A heuristic approach to break cycles for the class integration test order generation},\n  author={Zhang, Miao and Keung, Jacky and Xiao, Yan and Kabir, Md Alamgir and Feng, Shuo},\n  booktitle={2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC)},\n  volume={1},\n  pages={47--52},\n  year={2019},\n  organization={IEEE}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2018\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Usability Evaluation of Mobile Applications: An Empirical Analysis of Supply Chain Management Systems.\n \n \n \n\n\n \n Kabir, M. A.; Hossin, M. A.; Mahmud, S. H.; Noori, S. R. H.; and Bhuiyan, T.\n\n\n \n\n\n\n In 2018 IEEE 4th International Conference on Computer and Communications (ICCC), pages 2525–2531, 2018. IEEE\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{kabir2018usability,\n  title={Usability Evaluation of Mobile Applications: An Empirical Analysis of Supply Chain Management Systems},\n  author={Kabir, Md Alamgir and Hossin, Md Altab and Mahmud, SM Hasan and Noori, Sheak Rashed Haider and Bhuiyan, Touhid},\n  booktitle={2018 IEEE 4th International Conference on Computer and Communications (ICCC)},\n  pages={2525--2531},\n  year={2018},\n  organization={IEEE}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2017\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Discovering knowledge from mobile application users for usability improvement: A fuzzy association rule mining approach.\n \n \n \n\n\n \n Kabir, M. A.; Salem, O. A.; and Rehman, M. U.\n\n\n \n\n\n\n In 2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS), pages 126–129, 2017. IEEE\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{kabir2017discovering,\n  title={Discovering knowledge from mobile application users for usability improvement: A fuzzy association rule mining approach},\n  author={Kabir, Md Alamgir and Salem, Omar AM and Rehman, Muaan Ur},\n  booktitle={2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)},\n  pages={126--129},\n  year={2017},\n  organization={IEEE}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2016\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n An analytical and comparative study of software usability quality factors.\n \n \n \n\n\n \n Kabir, M. A.; Rehman, M. U.; and Majumdar, S. I.\n\n\n \n\n\n\n In 2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS), pages 800–803, 2016. IEEE\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{kabir2016analytical,\n  title={An analytical and comparative study of software usability quality factors},\n  author={Kabir, Md Alamgir and Rehman, Muaan Ur and Majumdar, Shariful Islam},\n  booktitle={2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)},\n  pages={800--803},\n  year={2016},\n  organization={IEEE}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n An improved usability evaluation model for point-of-sale systems.\n \n \n \n\n\n \n Kabir, M. A.; and Han, B.\n\n\n \n\n\n\n International Journal of Smart Home, 10(7): 269–282. 2016.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{kabir2016improved,\n  title={An improved usability evaluation model for point-of-sale systems},\n  author={Kabir, Md Alamgir and Han, Bo},\n  journal={International Journal of Smart Home},\n  volume={10},\n  number={7},\n  pages={269--282},\n  year={2016}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n The comparative analysis of online shopping information platform's security based on customer satisfaction.\n \n \n \n\n\n \n Mahmud, S. H.; Kabir, M. A.; Salem, O. A.; and Fernand, K. N. G.\n\n\n \n\n\n\n In 2016 5th International Conference on Computer Science and Network Technology (ICCSNT), pages 157–161, 2016. IEEE\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{mahmud2016comparative,\n  title={The comparative analysis of online shopping information platform's security based on customer satisfaction},\n  author={Mahmud, SM Hasan and Kabir, Md Alamgir and Salem, Omar AM and Fernand, Kazihise Ntikurako Guy},\n  booktitle={2016 5th International Conference on Computer Science and Network Technology (ICCSNT)},\n  pages={157--161},\n  year={2016},\n  organization={IEEE}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2015\n \n \n (5)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n SQLi vulnerabilty in education sector websites of Bangladesh.\n \n \n \n\n\n \n Alam, D.; Bhuiyan, T.; Kabir, M. A.; and Farah, T.\n\n\n \n\n\n\n In 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec), pages 152–157, 2015. IEEE\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{alam2015sqli,\n  title={SQLi vulnerabilty in education sector websites of Bangladesh},\n  author={Alam, Delwar and Bhuiyan, Touhid and Kabir, Md Alamgir and Farah, Tanjila},\n  booktitle={2015 Second International Conference on Information Security and Cyber Forensics (InfoSec)},\n  pages={152--157},\n  year={2015},\n  organization={IEEE}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n SQLi penetration testing of financial Web applications: Investigation of Bangladesh region.\n \n \n \n\n\n \n Farah, T.; Alam, D.; Kabir, M. A.; and Bhuiyan, T.\n\n\n \n\n\n\n In 2015 World Congress on Internet Security (WorldCIS), pages 146–151, 2015. IEEE\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{farah2015sqli,\n  title={SQLi penetration testing of financial Web applications: Investigation of Bangladesh region},\n  author={Farah, Tanjila and Alam, Delwar and Kabir, Md Alamgir and Bhuiyan, Touhid},\n  booktitle={2015 World Congress on Internet Security (WorldCIS)},\n  pages={146--151},\n  year={2015},\n  organization={IEEE}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n A case study of sql injection vulnerabilities assessment of. bd domain web applications.\n \n \n \n\n\n \n Alam, D.; Kabir, M. A.; Bhuiyan, T.; and Farah, T.\n\n\n \n\n\n\n In 2015 Fourth international conference on cyber security, cyber warfare, and digital forensic (CyberSec), pages 73–77, 2015. IEEE\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{alam2015case,\n  title={A case study of sql injection vulnerabilities assessment of. bd domain web applications},\n  author={Alam, Delwar and Kabir, Md Alamgir and Bhuiyan, Touhid and Farah, Tanjila},\n  booktitle={2015 Fourth international conference on cyber security, cyber warfare, and digital forensic (CyberSec)},\n  pages={73--77},\n  year={2015},\n  organization={IEEE}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Investigation of Bangladesh region based web applications: A case study of 64 based, local, and global SQLi vulnerability.\n \n \n \n\n\n \n Farah, T.; Alam, D.; Ali, M. N. B.; and Kabir, M. A.\n\n\n \n\n\n\n In 2015 IEEE International WIE Conference on Electrical and Computer Engineering (WIECON-ECE), pages 177–180, 2015. IEEE\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{farah2015investigation,\n  title={Investigation of Bangladesh region based web applications: A case study of 64 based, local, and global SQLi vulnerability},\n  author={Farah, Tanjila and Alam, Delwar and Ali, Md Nadir Bin and Kabir, Md Alamgir},\n  booktitle={2015 IEEE International WIE Conference on Electrical and Computer Engineering (WIECON-ECE)},\n  pages={177--180},\n  year={2015},\n  organization={IEEE}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Exploring the SQL injection vulnerabilities of. bd domain web applications.\n \n \n \n\n\n \n Alam, D.; Farah, T.; and Kabir, M. A.\n\n\n \n\n\n\n In 3rd International Conference on Advances in Computing, Electronics and Communication (ACEC 2015), pages 10–11, 2015. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{alam2015exploring,\n  title={Exploring the SQL injection vulnerabilities of. bd domain web applications},\n  author={Alam, Delwar and Farah, Tanjila and Kabir, Md Alamgir},\n  booktitle={3rd International Conference on Advances in Computing, Electronics and Communication (ACEC 2015)},\n  pages={10--11},\n  year={2015}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2013\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n A survey on security requirements elicitation and presentation in requirements engineering phase.\n \n \n \n\n\n \n Kabir, M. A.; and Rahman, M. M.\n\n\n \n\n\n\n American Journal of Engineering Research (AJER), 2(12): 360–366. 2013.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{kabir2013survey,\n  title={A survey on security requirements elicitation and presentation in requirements engineering phase},\n  author={Kabir, Md Alamgir and Rahman, Md Mijanur},\n  journal={American Journal of Engineering Research (AJER)},\n  volume={2},\n  number={12},\n  pages={360--366},\n  year={2013},\n  publisher={American Journal of Engineering Research (AJER)}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Model for Identifying the Security of a System: A Case Study of Point Of Sale System.\n \n \n \n\n\n \n Sagar, M. A. K.; Rahman, M. M.; and Jabiullah, M. I.\n\n\n \n\n\n\n IOSR Journal of Computer Engineering (IOSR-JCE). 2013.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{sagar2013model,\n  title={Model for Identifying the Security of a System: A Case Study of Point Of Sale System},\n  author={Sagar, Md Alamgir Kabir and Rahman, Md Mijanur and Jabiullah, Md Ismail},\n  journal={IOSR Journal of Computer Engineering (IOSR-JCE)},\n  year={2013}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2012\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Life Cycle Implementation of an Android Application for Self-Communication with Increasing Efficiency, Storage Space and High Performance.\n \n \n \n\n\n \n Kabir, M. A.; and Jabiullah, A. I. R. M. I.\n\n\n \n\n\n\n Green University Review, ISSN 2218, 5283: 74–78. 2012.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{kabir2012life,\n  title={Life Cycle Implementation of an Android Application for Self-Communication with Increasing Efficiency, Storage Space and High Performance},\n  author={Kabir, Md Alamgir and Jabiullah, AJM Imtiajur Rahmanand Md Ismail},\n  journal={Green University Review, ISSN 2218},\n  volume={5283},\n  pages={74--78},\n  year={2012}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Strong Message Authentication and Confidentiality Checking Approach through Authentication Code Tied to Ciphertext.\n \n \n \n\n\n \n Khan, S. I.; Kabir, M. A.; Rahman, A.; Jabiullah, M. I.; and Rahman, M L.\n\n\n \n\n\n\n J. Bangladesh Electron. 2012.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{khan2012strong,\n  title={Strong Message Authentication and Confidentiality Checking Approach through Authentication Code Tied to Ciphertext},\n  author={Khan, Sydul Islam and Kabir, Md Alamgir and Rahman, Anisur and Jabiullah, Md Ismail and Rahman, M Lutfar},\n  journal={J. Bangladesh Electron},\n  year={2012}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n\n\n \n\n \n \n \n \n\n
\n"}; document.write(bibbase_data.data);