default search action
Gahangir Hossain
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c29]Prashant Vajpayee, Gahangir Hossain:
Risk Assessment of Cybersecurity IoT Anomalies Through Cyber Value at Risk (CVaR). AIIoT 2024: 77-83 - [c28]Enamul Hassan, Gahangir Hossain, Prashant Vajpayee:
Reducing Cyber Risks in IoT Device Resource Management: A Probabilistic Banker's Algorithm Approach. AIIoT 2024: 205-211 - [c27]Kossi Bissadu, Gahangir Hossain, Prashant Vajpayee:
Agriculture 5.0 Cybersecurity: Monitoring Agricultural Cyber Threats with Digital Twin Technology. AIIoT 2024: 252-258 - [c26]Kossi Bissadu, Gahangir Hossain:
Designing a High School Course on Machine Learning for Cyberthreat Analytics. CCWC 2024: 214-219 - [c25]Shafi Parvez Mohammed, Gahangir Hossain:
ChatGPT in Education, Healthcare, and Cybersecurity: Opportunities and Challenges. CCWC 2024: 316-321 - [c24]Gahangir Hossain, Dedeepya Yarra:
Learning Blockchain Technology in High School: Towards Cybersecurity Education. CCWC 2024: 421-427 - [c23]Zenaida Simpson Pomare, Gahangir Hossain, Durga Srikari Maguluri, Prashant Vajpayee, Gayle Prybutok:
ChatGPT in the Context of Dementia Care and Cognitive Support. EIT 2024: 592-597 - [c22]Prashant Vajpayee, Gahangir Hossain:
Cognitive Cybersecurity in Transportation 5.0 and Supply Chain: A Multi-Objective Optimization Framework. EIT 2024: 698-704 - [c21]Kossi Bissadu, Gahangir Hossain, Leela Pavani Velagala:
A Enhancing Cybersecurity Resilience for Low-Income Farmers in Developing Nations: A Fuzzy Cognitive Mapping Approach. ICCE 2024: 1-6 - [c20]Gahangir Hossain, Znaida Simpson Pomare, Gayle Prybutok:
ChatGPT: A Companion for Dementia Care. ICCE 2024: 1-6 - [c19]Gahangir Hossain, Mikyung Shin, Mehnaz Afrose:
Empowering K-12 STEM Educators: Enhancing Cybersecurity Awareness Through Professional Development. ICCE 2024: 1-5 - [c18]Kossi Bissadu, Gahangir Hossain, Leela Pavani Velagala, Salleh Sonko:
Analyzing Insider Cyber Threats and Human Factors within the Framework of Agriculture 5.0. ISDFS 2024: 1-5 - [c17]Durga Srikari Maguluri, Leela Pavani Velagala, Gahangir Hossain:
Securing Healthcare 5.0: Exploring BYOD Cyber Risks, Misuse Cases, and Best Practices. ISDFS 2024: 1-6 - [c16]Shafi Parvez Mohammed, Gahangir Hossain, Syed Yaseen Quadri Ameen:
Cybersecurity Data Visualization: Designing a Course for Future High School Students. ISDFS 2024: 1-7 - [c15]Prashant Vajpayee, Gahangir Hossain:
Multi-Tenant Cloud Security- Risk Prediction through Cyber-Value-at-Risk (CVaR). ISDFS 2024: 1-7 - [c14]Prashant Vajpayee, Gahangir Hossain:
Cognitive Bias in Cyber-Value-at-Risk: Identification and Mitigation Approach. SIGMIS-CPR 2024: 12:1-12:2 - 2023
- [j10]Habiba Sultana, A. H. M. Kamal, Gahangir Hossain, Muhammad Ashad Kabir:
A Novel Hybrid Edge Detection and LBP Code-Based Robust Image Steganography Method. Future Internet 15(3): 108 (2023) - [j9]Mahbubun Nahar, A. H. M. Kamal, Gahangir Hossain:
Protecting health data in the cloud through steganography: A table-driven, blind method using neural networks and bit-shuffling algorithm. J. Netw. Comput. Appl. 217: 103689 (2023) - [c13]Deven Westmoreland, Gahangir Hossain:
Enhancing Cloud Data Processing with Amortized Analysis and Splay Trees for Cyber Threat Intelligence. IC3 2023: 142-146 - [c12]Gahangir Hossain, Josh Tarrant:
CyberTMS : A Recommendation Framework for Cognitive Transportation Cybersecurity Management System in the Society 5.0. ISDFS 2023: 1-6 - 2022
- [j8]Mohammad Moshiur Rahman, Gahangir Hossain, Rajab Challoo, Maher E. Rizkalla:
iRestroom : A smart restroom cyberinfrastructure for elderly people. Internet Things 19: 100573 (2022) - [j7]Saiteja Prasad Chatrati, Gahangir Hossain, Ayush Goyal, Anupama Bhan, Sayantan Bhattacharya, Devottam Gaurav, Sanju Mishra Tiwari:
Smart home health monitoring system for predicting type 2 diabetes and hypertension. J. King Saud Univ. Comput. Inf. Sci. 34(3): 862-870 (2022) - [c11]Rahul Khullar, Gahangir Hossain:
A New Algorithm for Energy Efficient Task Scheduling Towards Optimal Green Cloud Computing. AICCSA 2022: 1-6 - 2020
- [i1]Parisa Ghane, Gahangir Hossain:
Learning Patterns in Imaginary Vowels for an Intelligent Brain Computer Interface (BCI) Design. CoRR abs/2010.12066 (2020)
2010 – 2019
- 2018
- [j6]Gahangir Hossain, Joshua D. Elkins:
When does an easy task become hard? A systematic review of human task-evoked pupillary dynamics versus cognitive efforts. Neural Comput. Appl. 30(1): 29-43 (2018) - [c10]Sunayana Tirumalasetty, Manish K. Arya, Rajeev Agrawal, Gahangir Hossain, Adityan Jothi, Ashwani Kumar Dubey, Rajab Challoo, Ayush Goyal:
Developement of a Neurological Disease Prediction Framework for Assisting Neurologits to Automatically Segment Gray and White Matter Regions in Brain MRI Images of Patients. EIT 2018: 1-7 - [c9]George Toscano, Gahangir Hossain:
Predicting the Effect of Parental Education and Income on Infant Mortality Through Statistical Learning. ICDIS 2018: 99-102 - [c8]Jayraj Gondaliya, Savani Savani, Vivek Sheetal Dhaduvai, Gahangir Hossain:
Hybrid Security RSA Algorithm in Application of Web Service. ICDIS 2018: 149-152 - 2017
- [j5]Gahangir Hossain:
Rethinking self-reported measure in subjective evaluation of assistive technology. Hum. centric Comput. Inf. Sci. 7: 23 (2017) - [j4]Gahangir Hossain:
Design Analytics of Complex Communication Systems Involving Two Different Sensory Disabilities. Int. J. Heal. Inf. Syst. Informatics 12(2): 65-80 (2017) - [j3]Gahangir Hossain, Mohammed Yeasin:
Analysis of Cognitive Dissonance and Overload through Ability-Demand Gap Models. IEEE Trans. Cogn. Dev. Syst. 9(2): 170-182 (2017) - 2016
- [j2]Romisa Rohani Ghahari, Jennifer George-Palilonis, Gahangir Hossain, Lindsay N. Kaser, Davide Bolchini:
Semi-aural Interfaces: Investigating Voice-controlled Aural Flows. Interact. Comput. 28(6): 826-842 (2016) - 2015
- [c7]Joshua D. Elkins, Gahangir Hossain:
Multinomial processing models in visual cognitive effort diagnostics. CVPR Workshops 2015: 9-15 - 2014
- [j1]Gahangir Hossain, Mohammed Yeasin:
Cognitive Ability-Demand Gap Analysis With Latent Response Models. IEEE Access 2: 711-724 (2014) - [c6]Gahangir Hossain, Mohammed Yeasin:
Understanding Effects of Cognitive Load from Pupillary Responses Using Hilbert Analytic Phase. CVPR Workshops 2014: 381-386 - 2012
- [c5]Gahangir Hossain, Mark H. Myers, Robert Kozma:
Study of Phase Relationships in ECoG Signals Using Hilbert-Huang Transforms. BICS 2012: 174-182 - [c4]Roger Azevedo, Ronald S. Landis, Reza Feyzi-Behnagh, Melissa Duffy, Gregory Trevors, Jason M. Harley, François Bouchet, Jonathan D. Burlison, Michelle Taub, Nicole Pacampara, Mohammed Yeasin, A. K. M. Mahbubur Rahman, Md. Iftekhar Tanveer, Gahangir Hossain:
The Effectiveness of Pedagogical Agents' Prompting and Feedback in Facilitating Co-adapted Learning with MetaTutor. ITS 2012: 212-221 - 2011
- [c3]Gahangir Hossain, Mohammed Yeasin:
Cognitive Load Based Adaptive Assistive Technology Design for Reconfigured Mobile Android Phone. MobiCASE 2011: 374-380 - [c2]Gahangir Hossain, Akbar S. Shaik, Mohammed Yeasin:
Cognitive load and usability analysis of R-MAP for the people who are blind or visual impaired. SIGDOC 2011: 137-144 - 2010
- [c1]Akbar S. Shaik, Gahangir Hossain, Mohammed Yeasin:
Design, development and performance evaluation of reconfigured mobile Android phone for people who are blind or visually impaired. SIGDOC 2010: 159-166
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-02 00:08 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint