Velagala, L., Hossain, G. (2023). Analyzing Insider Threats and Human Factors in Healthcare 5.0. 2023 IEEE 20th International Conference on Smart Communities: Improving Quality of Life using AI, Robotics and IoT (HONET).
Tusher, A., Hossain, G. (2023). Automated Phrasal Verb and Key-Phrase Checking with LSTM-Based Attention Mechanism. 2023 3rd International Conference on Computing and Information Technology (ICCIT), September 2023..
Tusher, A., Hossain, G. (2023). Automatic Sentence Classification: A Crucial Component of Sentiment Analysis. in International Conference on Data Intelligence and Cognitive Informatics, June 2023, Singapore: Springer Nature Singapore..
Tarrant, J., Hossain, G. (2023). CyberTMS: A Recommendation Framework for Cognitive Transportation Cybersecurity Management System in the Society 5.0. 2023 IEEE 11th International Symposium on Digital Forensics and Security (ISDFS), May 2023..
Westmoreland, D., Hossain, G. (2023). Enhancing Cloud Data Processing with Amortized Analysis and Splay Trees for Cyber Threat Intelligence. ," in Proceedings of the 2023 Fifteenth International Conference on Contemporary Computing, IEEE, August 2023..
Hossain, G., Shin, M., Mehnaz, P. (2023). Uncovering opinions on cybersecurity and accessibility in metaverse," in 13th Global TechMining Conference. in 13th Global TechMining Conference, 2023, San Antonio, TX, Hybrid Event, November 2023..
Hossain, G. (2022). A Novel Energy Efficient Task Scheduling Algorithm Towards Green Cloud Computing. Dubai, UAE: IEEE.
Hossain, G. (2022). Cybersecurity Risk with Wearable Technology in Sports: Why Should We Care?. Atlanta, GA: IEEE. https://ieeexplore-ieee-org.libproxy.library.unt.edu/document/10019146
Shin, M., Hossain, G. (2023). A content analysis of research on technology use for teaching mathematics to students with disabilities: word networks and topic modeling. International Journal of STEM Education. Springer.
Sultana, H., Kamal, A., Hossain, G. (2023). A novel hybrid edge detection and LBP Code-Based Robust Image Steganography method. MDPI Future Internet, vol. 15, no. 3, p. 108, 2023..
Nahar, M., Kamal, A., Hossain, G. (2023). Protecting health data in the cloud through steganography: A table-driven, blind method using neural networks and bit-shuffling algorithm. Journal of Network and Computer Applications. 217(103689), .