Curriculum Vitae
Curriculum Vitae Link
Education
-
MS, University of Memphis, 2014
Major: Computer Engineering
-
PhD, University of Memphis, 2014
Major: Computer Engineering
-
Certificate, University of Memphis, 2011
Major: Cognitive Science
Current Scheduled Teaching
INFO 5709.402 | Data Visualization and Communication | Spring 2025 |
|
|
INFO 5709.405 | Data Visualization and Communication | Fall 2024 |
|
|
INFO 6900.048 | Special Problems | Fall 2024 |
|
|
Texas Education Code 51.974 (HB 2504) requires each institution of higher education to make available to the public, a syllabus for undergraduate lecture courses offered for credit by the institution.
Previous Scheduled Teaching
INFO 5709.003 | Data Visualization and Communication | Summer 5W2 2024 |
|
SPOT
|
INFO 6900.714 | Special Problems | Summer 10W 2024 |
|
|
INFO 5709.002 | Data Visualization and Communication | Spring 2024 |
|
SPOT
|
INFO 6950.728 | Doctoral Dissertation | Spring 2024 |
|
|
INFO 6900.723 | Special Problems | Spring 2024 |
|
|
INFO 5709.005 | Data Visualization and Communication | Fall 2023 |
|
SPOT
|
INFO 6950.046 | Doctoral Dissertation | Fall 2023 |
|
|
INFO 6900.048 | Special Problems | Fall 2023 |
|
|
INFO 6900.052 | Special Problems | Fall 8W2 2023 |
|
|
INFO 6910.031 | Special Problems | Fall 8W2 2023 |
|
|
INFO 5709.001 | Data Visualization and Communication | Summer 5W2 2023 |
|
SPOT
|
INFO 5709.002 | Data Visualization and Communication | Spring 2023 |
|
SPOT
|
INFO 6660.024 | Readings in Information Science | Spring 2023 |
|
|
INFO 6900.723 | Special Problems | Spring 2023 |
|
|
INFO 5709.003 | Data Visualization and Communication | Fall 2022 |
|
SPOT
|
Texas Education Code 51.974 (HB 2504) requires each institution of higher education to make available to the public, a syllabus for undergraduate lecture courses offered for credit by the institution.
Published Intellectual Contributions
- Velagala, L., Hossain, G. (2023). Analyzing Insider Threats and Human Factors in Healthcare 5.0. 2023 IEEE 20th International Conference on Smart Communities: Improving Quality of Life using AI, Robotics and IoT (HONET).
- Tusher, A., Hossain, G. (2023). Automated Phrasal Verb and Key-Phrase Checking with LSTM-Based Attention Mechanism. 2023 3rd International Conference on Computing and Information Technology (ICCIT), September 2023..
- Tusher, A., Hossain, G. (2023). Automatic Sentence Classification: A Crucial Component of Sentiment Analysis. in International Conference on Data Intelligence and Cognitive Informatics, June 2023, Singapore: Springer Nature Singapore..
- Tarrant, J., Hossain, G. (2023). CyberTMS: A Recommendation Framework for Cognitive Transportation Cybersecurity Management System in the Society 5.0. 2023 IEEE 11th International Symposium on Digital Forensics and Security (ISDFS), May 2023..
- Westmoreland, D., Hossain, G. (2023). Enhancing Cloud Data Processing with Amortized Analysis and Splay Trees for Cyber Threat Intelligence. ," in Proceedings of the 2023 Fifteenth International Conference on Contemporary Computing, IEEE, August 2023..
- Hossain, G., Shin, M., Mehnaz, P. (2023). Uncovering opinions on cybersecurity and accessibility in metaverse," in 13th Global TechMining Conference. in 13th Global TechMining Conference, 2023, San Antonio, TX, Hybrid Event, November 2023..
- Hossain, G. (2022). A Novel Energy Efficient Task Scheduling Algorithm Towards Green Cloud Computing. Dubai, UAE, IEEE.
- Hossain, G. (2022). Cybersecurity Risk with Wearable Technology in Sports: Why Should We Care?. Atlanta, GA, IEEE. https://ieeexplore-ieee-org.libproxy.library.unt.edu/document/10019146
- Shin, M., Hossain, G. (2023). A content analysis of research on technology use for teaching mathematics to students with disabilities: word networks and topic modeling. International Journal of STEM Education. Springer.
- Sultana, H., Kamal, A., Hossain, G. (2023). A novel hybrid edge detection and LBP Code-Based Robust Image Steganography method. MDPI Future Internet, vol. 15, no. 3, p. 108, 2023..
- Nahar, M., Kamal, A., Hossain, G. (2023). Protecting health data in the cloud through steganography: A table-driven, blind method using neural networks and bit-shuffling algorithm. Journal of Network and Computer Applications. 217 (103689)
Contracts, Grants and Sponsored Research
- Hossain, G. (Principal), Chang, H. (Co-Principal), Lund, B. (Co-Principal), Hossain, T. (Co-Principal), Hawamdeh, S.M. (Co-Principal), "Cyber-CREWS: Minority Community Cybersecurity Research, Educational Engagement, Workforce Development, and Security Best Practices," sponsored by Department of Homeland Security, Federal, $999688 Funded. (2023 - 2028).
- Hossain, G. (Principal), Hawamdeh, S.M. (Co-Principal), "Minority Cyber-CREWS: Minority Community Cybersecurity Research, Educational Engagement, Workforce Development, and Security Best Practices," sponsored by Department of Homeland Security (DHS), Federal, $999688 Funded. (2023 - 2028).