Skip to main content

Showing 1–3 of 3 results for author: Khan, S I

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.00068  [pdf, other

    cs.CR cs.LG

    A Data-Driven Predictive Analysis on Cyber Security Threats with Key Risk Factors

    Authors: Fatama Tuz Johora, Md Shahedul Islam Khan, Esrath Kanon, Mohammad Abu Tareq Rony, Md Zubair, Iqbal H. Sarker

    Abstract: Cyber risk refers to the risk of defacing reputation, monetary losses, or disruption of an organization or individuals, and this situation usually occurs by the unconscious use of cyber systems. The cyber risk is unhurriedly increasing day by day and it is right now a global threat. Develo** countries like Bangladesh face major cyber risk challenges. The growing cyber threat worldwide focuses on… ▽ More

    Submitted 28 March, 2024; originally announced April 2024.

    Comments: The paper contains 15 pages, 7 tables and 6 figures

  2. Transformer-Based Deep Learning Model for Stock Price Prediction: A Case Study on Bangladesh Stock Market

    Authors: Tashreef Muhammad, Anika Bintee Aftab, Md. Mainul Ahsan, Maishameem Meherin Muhu, Muhammad Ibrahim, Shahidul Islam Khan, Mohammad Shafiul Alam

    Abstract: In modern capital market the price of a stock is often considered to be highly volatile and unpredictable because of various social, financial, political and other dynamic factors. With calculated and thoughtful investment, stock market can ensure a handsome profit with minimal capital investment, while incorrect prediction can easily bring catastrophic financial loss to the investors. This paper… ▽ More

    Submitted 17 August, 2022; originally announced August 2022.

    Comments: 16 Pages, 14 Figures (including some containing subfigures)

    Journal ref: Preprint of an article published in [International Journal of Computational Intelligence and Applications, Volume 22, No. 01, 2023] \c{opyright} [copyright World Scientific Publishing Company] [https://www.worldscientific.com/worldscinet/ijcia]

  3. Characterizing Improper Input Validation Vulnerabilities of Mobile Crowdsourcing Services

    Authors: Sojhal Ismail Khan, Dominika Woszczyk, Chengzeng You, Soteris Demetriou, Muhammad Naveed

    Abstract: Mobile crowdsourcing services (MCS), enable fast and economical data acquisition at scale and find applications in a variety of domains. Prior work has shown that Foursquare and Waze (a location-based and a navigation MCS) are vulnerable to different kinds of data poisoning attacks. Such attacks can be upsetting and even dangerous especially when they are used to inject improper inputs to mislead… ▽ More

    Submitted 18 October, 2021; v1 submitted 16 October, 2021; originally announced October 2021.

    Journal ref: Annual Computer Security Applications Conference (ACSAC '21), December 6--10, 2021, USA