Skip to main content
Science of Security Virtual Organization

Header Menu

  • Research
    • Virtual Institutes
    • Lablets
    • Projects
    • Publications
  • Competitions
    • Cybersecurity Paper Competition
    • ISEF
  • Meetings
    • HotSoS Symposium
    • HCSS Conference
    • C3E Workshop
    • SCC Meeting
Not a member? Forgot your password?

Hamburger Menu

  • Home
  • Projects
  • News
  • Events

Breadcrumb

  • Home /
  • Md Chowdhury
First name
Md
Middle name
Minhaz
Last name
Chowdhury
Toth, E. M., & Chowdhury, M. M. (2022). Honeynets and Cloud Security. In (pp. 270–275). http://doi.org/10.1109/AIIoT54504.2022.9817263 (Original work published 2025)
View
Toth, E. M., & Chowdhury, M. M. (2022). Honeynets and Cloud Security. In (pp. 270–275). http://doi.org/10.1109/AIIoT54504.2022.9817263 (Original work published 2025)
View
Toth, E. M., & Chowdhury, M. M. (2022). Honeynets and Cloud Security. In (p. 270—275). http://doi.org/10.1109/AIIoT54504.2022.9817263 (Original work published 2025)
View
Toth, E. M., & Chowdhury, M. M. (2022). Honeynets and Cloud Security. In (p. 270—275). http://doi.org/10.1109/AIIoT54504.2022.9817263 (Original work published 2025)
View
Sweigert, D., Chowdhury, M. M., & Rifat, N. (2022). Exploit Security Vulnerabilities by Penetration Testing. In 2022 IEEE International Conference on Electro Information Technology (eIT) (pp. 527–532).
View
Kowalski, T., Chowdhury, M. M., Latif, S., & Kambhampaty, K. (2022). Bitcoin: Cryptographic Algorithms, Security Vulnerabilities and Mitigations. In 2022 IEEE International Conference on Electro Information Technology (eIT) (pp. 544–549).
View
© 2025 Science of Security Virtual Organization

Footer

  • Terms
  • Follow Us on X