Office Address: Professor
Institute of Shahjalal University of Science and Technology, Sylhet-3114, Bangladesh
Phone: +8801743018917
Email: deeba.bd@gmail.com
Education
PhD in Structured Peer-to-Peer Overlays for NATed Churn Intensive Networks at University of Stirling, Stirling, Scotland, UK.
MSc. in Network and e-Business Centred Computing at the University of Reading, UK; Aristotle University of Thessaloniki, Greece and Universidad Carlos(III) de Madrid, Spain.
BSc. Engineering in Computer Science and Engineering, Shahjalal University of Science and Technology, Sylhet, Bangladesh.
Research Interests
Peer-to-Peer (P2P) Networking
Mobile Networks
Usable Security
Human Computer Interaction (HCI)
Active Research Project
Investigating Information Security Awareness: An Empirical Research among Students and Staffs in Shahjalal University of Science and Technology, Sylhet, Bangladesh. Research Grant funded by SUST Research Centre, Shahjalal University of Science and Technology, Bangladesh, July 2020.
Previous Research Project
Understanding the impacts of using social media in relation to the study-time allocation, academic achievement and mental health of university students at the Shahjalal University campus, Sylhet, Bangladesh. Research Grant funded by SUST Research Centre, Shahjalal University of Science and Technology, Bangladesh, July 2019.
Understanding the Necessity of Establishing a Students Support Services Center at SUST Campus: A need based assessment for ensuring a sustainable academic environment for the students of Shahjalal University of Science and Technology, Sylhet, Bangladesh. Research Grant funded by SUST Research Centre, Shahjalal University of Science and Technology, Bangladesh, July 2018.
Journal Publish
1. 1. A Systematic Literature Review on Wearable Health Data Publishing under Differential Privacy. M. Saifuzzaman, T. N. Ananna, M. J. M. Chowdhury, M. S. Ferdous & F. Chowdhury. International Journal of Information Security, 21, 847 - 872 (2022).
2. Shammee, T. I. , Akter, T., Mou, M., Chowdhury, F., Ferdous, M. S. (2021). A Systematic Literature Review of Graphical Password Schemes. In the International Journal of Computing Science and Engineering, 14 (4), (pp. 163-185).
3. Ferdous, M. S., Chowdhury, F., Alassafi, M. O., Alshdadi, A. A., & Chang, V. (2020). Social Anchor: Privacy-friendly Attribute Aggregation from Social Networks. IEEE Access, 8, 61844-61871.
4. Ferdous, M. S., Chowdhury, F., & Alassafi, M. O. (2019). In Search of Self-sovereign Identity Leveraging Blockchain Technology. IEEE Access, 7, 103059-103079.
5. Chowdhury, F., Furness, J., & Kolberg, M. (2017). Performance analysis of structured peer-to-peer overlays for mobile networks. International Journal of Parallel, Emergent and Distributed Systems, 32(5), (pp. 522-548).
6. Chowdhury, F., Ferdous, M. S. (2017). Performance Analysis of R/KADEMLIA, Pastry and Bamboo Using Recursive Routing in Mobile Networks. In the International Journal of Computer Networks & Communications. IJCNC, 9:(5), (pp. 41-54).
7. Chowdhury, F., Ferdous, M.S. (2017). Modelling Cyber Attacks. International Journal of Network Security & Its Applications (IJNSA) Vol, 9.
8. Ferdous, M. S., Chowdhury, F., & Poet, R. (2015, November). A Hybrid Model of Attribute Aggregation in Federated Identity Management. In Enterprise Security (pp. 120-154). Springer, Cham.
Awards & Recognition
Erasmus-Mundus MSc Scholarship for Network and e-Business Centred Computing (NeBCC).
Google Anita Borg Memorial Scholarship- Europe, Middle East, and Africa: FINALIST.
Scottish Informatics and Computer Science Alliance (SICSA) Studentship for PhD.
Conference
1. Chowdhury, A. A., Chowdhury, F., & Ferdous, M. S. (2020). A Study of Password Security Factors among Bangladeshi Government Websites. arXiv preprint arXiv:2012.01765.
2. Islam, M. R., Rahman, J., Talha, M. R., & Chowdhury, F. (2020, June). Query Expansion for Bangla Search Engine Pipilika. In the IEEE Region 10 Symposium, TENSYMP, (pp. 1367-1370). IEEE.
3. Moniruzzaman, M., Chowdhury, F., & Ferdous, M. S. (2020, February). Examining Usability Issues in Blockchain-Based Cryptocurrency Wallets. In the International Conference on Cyber Security and Computer Science (pp. 631-643). Springer, Cham.
4. Saurav, J. R., Haque, S., & Chowdhury, F. (2019, September). End to End Parts of Speech Tagging and Named Entity Recognition in Bangla Language. In the International Conference on Bangla Speech and Language Processing, ICBSLP 2019, (pp. 1-5). IEEE.
5. Moniruzzaman, M., Chowdhury, F., & Ferdous, M. S. (2019, February). Measuring Vulnerabilities of Bangladeshi Websites. In the International Conference on Electrical, Computer and Communication Engineering, ECCE 2019, (pp. 1-7). IEEE.
6. Ahmad, A., Talha, M. R., Amin, M. R., & Chowdhury, F. (2018, September). Pipilika N-Gram viewer: an efficient large scale N-Gram model for Bengali. In the International Conference on Bangla Speech and Language Processing, ICBSLP 2018, (pp. 1-5). IEEE.
7. Ahmad, A., Amin, M. R., & Chowdhury, F. (2018, September). Bengali Document Clustering Using Word Movers Distance. In the International Conference on Bangla Speech and Language Processing, ICBSLP 2018, (pp. 1-6). IEEE.
8. Siddiki, M. R., Talha, M. A., Chowdhury, F., & Ferdous, M. S. (2017, December). CrowdsouRS: A Crowdsourced Reputation System for Identifying Deceptive Online Contents. In the 20th International Conference of Computer and Information Technology, ICCIT 2017, (pp. 1-6). IEEE.
9. Furness, J., Chowdhury, F., & Kolberg, M. (2014). An Evaluation of Epichord in Oversim. In Networks and Communications, NetCom, (pp. 3-19). Springer, Cham.
10. Chowdhury, F., & Kolberg, M. (2013, December). Performance Evaluation of Structured Peer-to-Peer Overlays for Use on Mobile Networks. In the 6th International Conference on Developments in eSystems Engineering, DeSe 2013, (pp. 57-62). IEEE.
11. Chowdhury, F., & Kolberg, M. (2013, November). Performance Evaluation of EpiChord under High Churn. In the 8th ACM workshop on Performance Monitoring and Measurement of Heterogeneous Wireless and Wired Networks, PM2HW2N 2013, (pp. 29-36).
12. Chowdhury, F., & Kolberg, M. (2012). A Survey of Peer-to-Peer Solutions in Mobile and Cellular Networks. In the 13th Annual Post Graduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting (PGNet 2012).
13. Ferdous, M. S., Jabed, M., Chowdhury, M., Moniruzzaman, M., & Chowdhury, F. (2012, May). Identity federations: A new perspective for Bangladesh. In the International Conference on Informatics, Electronics & Vision (ICIEV), 2012, (pp. 219-224). IEEE.
14. Ferdous, M. S. and Chowdhury, F. (2007). Covert Channel Communication in RFID (Short Paper). In the 1st International Conference on Security of Information and Networks, SIN 2007, (pp. 47-52).
15. Ferdous, M. S., Chowdhury, F., & Acharjee, J. C. (2007, March). An Extended Algorithm to Enhance the Performance of the Current NAPT. In the International Conference on Information and Communication Technology, ICCIT 2007, (pp. 315-318). IEEE.
16. Ferdous, M. S., & Chowdhury, F. (2007, January). Middleware Distributed Approach to Synchronous Detection of ARP Cache Poisoning. In the 1st Indian Conference on Computational Intelligence and Information Security, ICCIIS 2007, (pp. 22-25).
17. Ferdous, M. S., Chowdhury, F., & Moniruzzaman, M. (2007, January). A Taxonomy of Attack Methods on Peer-to-Peer Network. In the 1st Indian conference on computational intelligence and information security. ICCIIS 2007, (pp. 132-138).