Touhid Bhuiyah

Dr. Touhid Bhuiyan

PhD in Information Technology

Lecturer in Cyber Security


Research and teaching specialties

Cyber Security, Artificial Intelligence, Online Learning, Database Management, Software Engineering

Biography

Dr. Touhid Bhuiyan has received his PhD from Queensland University of Technology, Australia in the area of Information Security focusing on Trust Management for Intelligent Recommendations. He is a Certified Ethical Hacker. He has received the Cyber Security: Cyber Risk and Resilience certificate from the University of Oxford. He is the recipient of the Australian Postgraduate Award (APA) and Deputy Vice-Chancellor’s Initiative Scholarship from QUT, Australia. He was the Director of the Cyber Security Centre, Daffodil International University (DIU), Bangladesh. He was also the Head and Professor of the Software Engineering department at the same University. His research interests are in cyber security, intelligent recommendations, social network, trust management, bigdata analytics, e-Health, e-Learning etc. Before joining at AIB, he worked for several institutions including Monash University, The University of Western Australia, Queensland University of Technology, University of Western Sydney and Central College Sydney. He has more than 114 research publications in renowned national and international journals, books and conference proceedings.

Publications and Presentations

Book Chapters:

Bhuiyan, T. (2013). Trust for Intelligent Recommendation. SpringerBriefs in Electrical and Computer Engineering, Springer NY, ISBN 978-1-4614-6894-3.

Sardar A.A.M., Sanzidul Islam M., Bhuiyan T. (2021) A Review on Automatic Speech Emotion Recognition with an Experiment Using Multilayer Perceptron Classifier. Borah S., Pradhan R., Dey N., Gupta P. (eds) Soft Computing Techniques and Applications. Advances in Intelligent Systems and Computing, Vol 1248. Springer, Singapore. https://doi.org/10.1007/978-981-15-7394-1_36

Hossain S.S., Arafat Y., Amin T., Bhuiyan T. (2020). Requirements Re-usability in Global Software Development: A Systematic Mapping Study. Gervasi O. et al. (eds) Computational Science and Its Applications – ICCSA 2020. Lecture Notes in Computer Science, Vol 12252, pp 960-974. Springer

Hasan M.R., Begum A., Zamal F.B., Rawshan L., Bhuiyan T. (2020). Android Malware Detection by Machine Learning Apprehension and Static Feature Characterization. In: Bhuiyan T., Rahman M., Ali M. (eds) Cyber Security and Computer Science. ICONCS 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Vol 325, pp 59-71. Springer, Cham.

Royel R.I., Sharif M.H., Risha R., Bhuiyan T., Hassan M.M., Hassan M.S. (2020). A Risk Based Analysis on Linux Hosted E-Commerce Sites in Bangladesh. In: Bhuiyan T., Rahman M., Ali M. (eds) Cyber Security and Computer Science. ICONCS 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Vol 325, pp 140-151. Springer, Cham.

Sohan M.F., Kabir M.A., Rahman M., Hasan Mahmud S.M., Bhuiyan T. (2020). Training Data Selection Using Ensemble Dataset Approach for Software Defect Prediction. In: Bhuiyan T., Rahman M., Ali M. (eds) Cyber Security and Computer Science. ICONCS 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Vol 325, pp 243-256. Springer, Cham.

Sohan M.F., Kabir M.A., Rahman M., Bhuiyan T., Jabiullah M.I., Felix E.A. (2020). Prevalence of Machine Learning Techniques in Software Defect Prediction. In: Bhuiyan T., Rahman M., Ali M. (eds) Cyber Security and Computer Science. ICONCS 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Vol 325, pp 257-269. Springer, Cham.

Juthi J.H., Gomes A., Bhuiyan T. and Mahmud I. (2020). Music Emotion Recognition with the Extraction of Audio Features Using Machine Learning Approaches. Singh P., Panigrahi B., Suryadevara N., Sharma S., Singh A. (eds) Proceedings of ICETIT 2019. Lecture Notes in Electrical Engineering, Vol 605. Springer.

Jeba M.T., Sadia F., Rahman T., Hossain K.M.I. and Bhuiyan T. (2020). Usability and Accessibility Testing: A Study on Public Sector and Government Websites of Bangladesh. Singh P., Panigrahi B., Suryadevara N., Sharma S., Singh A. (eds) Proceedings of ICETIT 2019. Lecture Notes in Electrical Engineering, Vol 605. Springer.

Hossain, M. E., Bhuiyan, T., Mahmud, I., Ramayah, T. and Scholtz, B. (2018). Role of Absorptive Capacity in Predicting Continuance Intention to Use Digital Libraries: An Empirical Study. Emerging Technologies in Computing, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Springer.

Rana, MS., Bhuiyan T. and Satter A.K.M.Z. (2018). e-School: Design and Implementation of Web Based Teaching Institution for Enhancing E-Learning Experiences. Nguyen N., Pimenidis E., Khan Z., Trawiński B. (eds) Computational Collective Intelligence. ICCCI 2018. Lecture Notes in Computer Science, Vol. 11055. Springer.

Hossain R., Hasan Mahmud S.M., Hossin M.A., Bhuiyan T., Hua Y.X. (2019). Effects of Cognitive Ability, Trust and Time-Saving: Predicting Further Amelioration and Successive Usage of E-ticketing with TAM, TPB and Cognitive Frameworks. Fong S., Akashe S., Mahalle P. (eds) Information and Communication Technology for Competitive Strategies. Lecture Notes in Networks and Systems, Vol 40, pp. 41-51. Springer

Razzak, M. A., Bhuiyan, T. and Ahmed, R. (2015). Knowledge Management in Distributed Agile Software Development Projects. Mercier-Laurent, E., Owoc, M. L., Boulanger, D., Editor, Artificial Intelligence for Knowledge Management. Vol. 469, SpringerNature, ISBN: 978-3-319-28867-3.

Imtiaz-Ud-Din, K. M., Bhuiyan, T. and Ripon, S. (2014). Circle of Trust- One Hop Trust Based Security Paradigm for Resource Constraint MANET. Mohapatra, D. P. and Patnaik, S., Editor, Intelligent Computing, Networking, and Informatics. 243, Springer India, ISBN 978-81-322-1664-3.

Bhuiyan, T., Josang, A. and Xu, Y. (2010). Managing Trust in Online Social Networks. Furht, B., Editor, Handbook of Social Network Technologies and Applications. Springer US, ISBN 978-1-4419-7141-8.

Bhuiyan, T., Josang, A. and Xu, Y. (2010). Trust and Reputation Management in Web-based Social Network. Usmani, Z., Editor, Web Intelligence and Intelligent Agents. In-Tech, Croatia. ISBN 978-953-7619-85-5.

Bhuiyan, T., Xu, Y., Josang, A., Liang, H. and Cox, C. (2010). Developing Trust Networks Based on User Tagging Information for Recommendation Making. Chen, L., Triantafillou, P. and Suel, T. Editor, Web Information System Engineering. LNCS Vol. 6488, Springer, ISBN 978-3-642-17615-9.

Josang, A., Bhuiyan, T., Xu, Y. and Cox, C. (2008). Combining Trust and Reputation Management for Web-Based Services. Furnell, S., Katsikas, S. and Lioy, A., Editor, Trust, Privacy and Security in Digital Business. LNCS Vol. 5185, Springer Berlin Heidelberg, ISBN 978-3-5408-5734-1.

 

Papers in Refereed Conference Proceedings:

Hossain, S.S., Arani, S.A., Rahman, M.T., Bhuiyan, T., Alam, D., Zaman, M. (2019). E-voting system using Blockchain technology. 2nd International Conference on Blockchain Technology and Applications, Xián, China, pp. 113–117.

Rawshan, L., Rahman, T., Begum, A., Hossain, SS. and Bhuiyan, T. (2019). A Comparative Study on GA-based Scheduling on Cloud Computing. 2nd International Conference on Computational Intelligence and Intelligent Systems, Bangkok, Thailand, pp. 74–78.

Hossain, S. S., Jubayer, S. A. M., Rahman, S., Bhuiyan, T., Rawshan, L. and Islam, S. (2019). Customer Feedback Prioritization Technique: A Case Study on Lean Startup. International Conference on Computational Science and Its Applications, Saint Petersburg, Russia, Springer, pp. 70-81.

Bhuiyan, T., Sarower, A. H., Karim, R. and Hassan, M. (2019). An Image Steganography Algorithm using LSB Replacement through XOR Substitution. International Conference on Information and Communications Technology, Yogyakarta, Indonesia, pp. 44-49.

Wahid, Z., Satter, A.K.M.Z., Imran, AA. and Bhuiyan, T. (2019). Predicting Absenteeism at Work Using Tree-Based Learners. 3rd International Conference on Machine Learning and Soft Computing, Da Lat, Vietnam, pp. 7–11.

Hossain, ME, Bhuiyan, T., Mahmud, I. and Arman, MS. (2018). Modelling the Knowledge Sharing Behaviour of Students on Facebook. 13th International Conference on e- Learning, Porto, Portugal.

Kabir, M. A., Hossin, M. A., Mahmud, SMH., Noori, SRH. and Bhuiyan, T. (2018). Usability Evaluation of Mobile Applications: An Empirical Analysis of Supply Chain Management Systems. 4th International Conference on Computer and Communications, Chengdu, China, pp. 2525-2531.

Efat, M. I. A., Bashar, R., Imtiaz-Ud-Din, K. M. and Bhuiyan, T. (2018). Trend Estimation of Stock Market: An Intelligent Decision System. International Conference on Cyber Security and Computer Science (ICONCS’18), 18-20 October, Karabük, Turkey.

Hossen, M. A., Siddika, F., Chanda, T. K. and Bhuiyan, T. (2018). A comparison of some soft computing methods on Imbalanced data. International Conference on Cyber Security and Computer Science (ICONCS), October 2018, Karabük, Turkey.

Hassan, M. M., Bhuiyan, T., Ali, M. A., Sharif, M. H. and Biswas, S. (2018). Quantitative Assessment on Broken Access Control Vulnerability in Web Applications. International Conference on Cyber Security and Computer Science (ICONCS 2018), 18-20 October, Karabük, Turkey.

Biswas, S., Sajal, M. M. H. K., Afrin, T., Bhuiyan, T., Mohammad, K. S. and Hassan, M. (2018). A Study on Remote Code Execution Vulnerability in Web Applications. International Conference on Cyber Security and Computer Science (ICONCS 2018), 18-20 October, Karabük, Turkey.

Hassan, M. M., Bhuiyan, T., Sohel, M. K., Sharif, M. H. and Biswas, S. (2018). SAISAN: An Automated Local File Inclusion Vulnerability Detection Model, 7th International Conference on Computing, Engineering and Communication Technologies (ICCECT 2018).

Hossain, S. S., Amin, T., Bhuiyan, T. (2018). A Systematic Mapping Study on Requirement Reusability in Agile Development, International Conference on Electrical, Electronics, Computers, Communication, Mechanical and Computing (EECCMC)”

Hossain, M. E., Bhuiyan, T., Mahmud, I., & Arman, M. S. (2018). Modelling the Knowledge-Sharing Behavior of Students on Facebook. In ICEL. 13th International Conference on e-Learning (p. 84). Academic Conferences and publishing limited.

Sadia, F., Jahan, N., Rawshan, L., Jeba, M. and Bhuiyan, T. (2017). A Dynamic Resource Mapping Algorithm for Load Balancing in Cloud.International Conference on Advances in Electrical Engineering, 28-30 September, 2017, Dhaka, Bangladesh.

Bhuiyan, T., Rana, M. S., Sarker, K., and Wahid, Z. (2017). A Proposed PST Model for Enhancing E-Learning Experiences. Proceedings of the International Conference on Digital Technology in Education, Aug 6-8, 2017, Taipei, Taiwan, pp. 44-48.

Rana, M., S., Satter, A. K. M. Z., Zaman, W., Bhuiyan, T. (2017). Inpainting on digital images using convolution-based method – A Comparison Study. Proceedings of the International Conference on Biomedical Engineering and Bioinformatics, 14-16 Sep, Bangkok, Thailand, pp. 38-42.

Rana, M. S., Sarker, K., Bhuiyan, T. and Hassan, M. M. (2017). Comparing the Performance of Different Ultrasonic Image Enhancement Techniques for Speckle Noise Reduction in Ultrasound Images: A Preference Study. Proceedings of the 2017 the Second International Workshop on Pattern Recognition, May 1-3, 2017, Singapore.

Rana, M. S., Hassan, M. M. and Bhuiyan, T. (2017). An Enhanced Model for Inpainting on Digital Images Using Dynamic Masking. Proceedings of the 2017 International Conference on Frontiers of Image Processing, March 3-5, 2017, Kathmandu, Nepal.

Zamal, M.F.B., Sayed, S., Bhuiyan, T., Rahman, M. (2017). An Efficient Multi-sensing and GSM Equipped Fire Monitoring System. International Conference on Emerging Electronic Solutions for IoT, 11 Dec, 2017.

Haque, S., Bhuiyan, T. and Hassan, M. M. (2017). An Investigation of Health Sector Web Applications in Bangladesh: A Case Study on Cross Site Scripting. 146th International Academic Conference on Engineering, Technology and Innovations (IACETI), Bali, Indonesia, 2017.

Haque, S. and Bhuiyan, T. (2017). Rise of Ransomware and the Readiness of Bangladesh. 10th International Conference on Latest Trends in Engineering and Technology (ICLTET’2017), Pattaya, Thailand, 2017, pp.75-79.

Begum, A., Hassan, M. M., Bhuiyan, T. and Sharif, M. H. (2016). RFI and SQLi based local file inclusion vulnerabilities in web applications of Bangladesh.International Workshop on Computational Intelligence (IWCI), 12-13 Dec, Dhaka, Bangladesh, pp. 21-25.

Hassan, M. M., Bhuiyan, T. and Biswas, S. (2016). An Investigation of Education Web Applications in Bangladesh: A Case Study on Local File Disclosure Vulnerability. The 4th International Conference on Engineering & Technology, Computer, Basic & Applied Sciences (ECBA), 19-20 Nov, 2016, Sydney, Australia.

Ali, M. N. B., Saudi, M. M., Bhuiyan, T. (2016). A Systematic Review Analysis for Intrusion Prevention System (IPS) based on Bio-Inspired Algorithm. The 4th Postgraduate Seminar FST 2016 (KoSiST’16), 7 Nov, 2016, Universiti Sains Islam Malaysia, Nilai, Malaysia.

Bhuiyan, T. and Mahmud, I. (2015). Searching Barriers of Technology Enabled Innovation: Role of Technostress and Switching-Exhaustion. International Conference of Inclusive Innovation and Innovative Management, 25-26 Nov, 2015, Valaya Alongkorn Rajabhat University, Pathumthani, Thailand.

Bhuiyan, T. and Mahmud, I. (2015). Digital Game-based Education: A Meta Analysis. International Conference of Inclusive Innovation and Innovative Management, 25-26 Nov, 2015, Valaya Alongkorn Rajabhat University, Pathumthani, Thailand.

Alam, D., Bhuiyan, T., Kabir, M. A. and Farah, T. (2015). SQLi Vulnerability in Education Sector Websites of Bangladesh. The Second International Conference on Information Security and Cyber Forensics, 15-17 Nov, 2015, Cape Town, South Africa.

Alam, D., Kabir, M. A., Bhuiyan, T. and Farah, T. (2015). A Case Study of SQL Injection Vulnerabilities Assessment of .bd Domain Web Applications. The Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, 29-31 Oct, 2015, Jakarta, Indonesia.

Farah, T., Alam, D., Kabir, M. A., and Bhuiyan, T. (2015). SQLi Penetration Testing of Financial Web Applications: Investigation of Bangladesh Region. World Congress on Internet Security, 19-21 Oct, 2015, Dublin, Ireland.

Bhuiyan, T. and Mahmud, I. (2014). Flip Classroom: An Innovative Way of Teaching to Excel Learning. International Conference on Advances in Computer Science, Engineering and Architecture, 19-20 Nov, 2014, Simon Fraser University, Vancouver, Canada.

Bhuiyan, T., Khan, S., and Nahar, A. (2013). Evaluation of the Effectiveness of a Web-based e-Learning System for Tertiary Educational Institution. 5th International Conference on Software Technology and Engineering, 28-29 Sept, 2013, Bandar Seri Begawan, Brunei Darussalam.

Ripon, S., Hossain, S. J. and Bhuiyan, T. (2013). Logic-Based Analysis of Product Line Variant Model. Second International Conference on Recent Trends in Communication Engineering and Network Technologies, 11-12 July, 2013, Dubai, UAE.

Bhuiyan, T., Yousuf, K. B., Khan, S., Nahar, A. and Ali, N. Y. (2013). Development of a Web-based e-Learning System for Teaching Institution. 3rd International Conference on Intelligent Computational Systems, 29-30 April, 2013, Singapore.

Imtiaz-Ud-Din, K. M., Bhuiyan, T. and Ripon, S. (2013). Circle of Trust- One Hop Trust Based Security Paradigm for Resource Constraint MANET. International Conference on Advanced Computing, Networking, and Informatics, 12-14 June, 2013, Chhattisgarh, India.

Bhuiyan, T. and Kundo, R. (2012). Implementation of a Learning Management System to support e-Learning courses. Global Engineering, Science and Technology Conference, 28-29 Dec, 2012, Dhaka, Bangladesh.

Bhuiyan, T., Xu, Y., Josang, A., Liang, H. and Cox, C. (2010). Developing Trust Networks Based on User Tagging Information for Recommendation Making. The 11th International Conference on Web Information System Engineering. 12-14 Dec, 2010, Hong Kong, China.

Bhuiyan, T., Xu, Y. and Josang, A. (2010). SimTrust: A New Method of Trust Network Generation. The 6th International Symposium on Trusted Computing and Communications. 11-13 Dec, 2010, Hong Kong, China.

Bhuiyan, T., Xu, Y. And Josang, A. (2010). The Potential Relationship between Trust and Interest Similarity. The 11th International Conference on Internet Computing. 12-15 July, 2010, Nevada, USA.

Bhuiyan, T., Xu, Y. And Josang, A. (2010). A Review of Trust in Online Social Networks to Explore New Research Agenda. The 11th International Conference on Internet Computing. 12-15 July, 2010, Nevada, USA.

Bhuiyan, T. (2010). Impact of Knowledge Sharing in Supply Chain Networks. The 9th International Conference on Information and Knowledge Engineering. 12-15 July, 2010, Nevada, USA.

Bhuiyan, T. (2010). A Model of a Feed Forward Multi Layered Neural Network to Recognize Hand Written Bengali Digits. The 12th International Conference on Artificial Intelligence. 12-15 July, 2010, Nevada, USA.

Bhuiyan, T. (2010). Exploring the Challenges of E-Learning Adoption in Developing Countries. International Conference on Education and New Learning Technologies. 5-7 July, 2010, Barcelona, Spain.

Bhuiyan, T. (2010). A Survey on Acceptability of E-Learning MBA Offered by the Private Universities in Bangladesh. International Conference on Education and New Learning Technologies. 5-7 July, 2010, Barcelona, Spain.

Bhuiyan, T., Rahman, A. and Abbey, S. (2010). Derivation of Design Rainfall Temporal Patterns in Australia’s Gold Coast Region. The 9th International Conference on Information and Knowledge Engineering. 12-15 July, 2010, Nevada, USA.

Bhuiyan, T., Josang, A. and Xu, Y. (2009). An Analysis of Trust Transitivity Taking Base Rate into Account. The Symposia of the 6th International Conference on Autonomic and Trusted Computing, 7-9 July, 2009, Brisbane, Australia.

Bhuiyan, T., Xu, Y. And Josang, A. (2009). State-of-the-Art Review on Opinion Mining from Online Customers’ Feedback. The 9th Asia-Pacific Complex Systems Conference, 4-7 November, 2009, Tokyo, Japan.

Rahman, A., Islam, M. and Bhuiyan T. (2009). An Algorithm for Derivation of Design Rainfall Temporal Patterns for Short and Long Duration Storms. The 2nd International Conference on Water & Flood Management. March 15-17, 2009, Dhaka, Bangladesh.

Josang, A., Bhuiyan, T., Xu, Y. and Cox, C. (2008). Combining Trust and Reputation Management for Web-Based Services. The 5th International Conference on Trust, Privacy & Security in Digital Business. 1-5 September, 2008, Turin, Italy.

Josang, A. and Bhuiyan, T. (2008). Optimal Trust Network Analysis with Subjective Logic. The Second International Conference on Emerging Security Information, Systems and Technologies, August 25-31, 2008. Cap Esterel, France.

Bhuiyan, T., Xu, Y. and Josang, A. (2008). Integrating Trust with Public Reputation in Location-based Social Networks for Recommendation Making. The Workshop of the International Conference on Web Intelligence and Intelligent Agent Technology, Dec 9-12, 2008, Sydney, Australia.

Rahman, A., Islam, M. and Bhuiyan, T. (2008). A Windows-Based Computing Tool for Rainwater Tank Analysis and Design in Multi-storied Developments. The 4th International Conference on Water Resources and Environment Research. 2755-2766, 14-17 April 2008, Adelaide, Australia.

Masum, S., Ali, A. and Bhuiyan, T. (2006). Asynchronous Leader Election in Mobile Ad Hoc Networks. The 20th IEEE International Conference on Advanced Information Networking and Applications. Volume 2, pp 827-831, Vienna, Austria.

 

Refereed Journal Publications

Shadhin, K. A., Hasan, M. R., Paul, B. K., Ahmed, K., Moni, M. A., Kahrizi, D., Bhuyian, T. and Ibrahim, S. M., 2020. Analysis of topological properties and drug discovery for bipolar disorder and associated diseases: A bioinformatics approach. Cellular and Molecular Biology, Vol. 66. No. 7. Pp.153-161.

Banu, B., Asaduzzaman , S., Akter , N., Hossain, S.M. and Bhuiyan, T., 2020. Concurrent Field Practice Act as an Efficient Teaching Pedagogy to Originate Public Health Professionals: A Bangladesh Context. Universal Journal of Public Health, 8(4), pp. 113-119.

Kawsar, M., Taz, T.A., Paul, B.K., Mahmud, S., Islam, M.M., Bhuyian, T. and Ahmed, K., 2020. Analysis of gene network model of Thyroid Disorder and associated diseases: A bioinformatics approach. Informatics in Medicine Unlocked, 100381.

Islam, M.N., Shaolin, S.S., Paul, B.K., Islam, M., Bhuyian, T. and Ahmed, K., 2020. Mining and predicting protein-drug interaction network of breast cancer risk genes. Gene Reports, 100753.

Hasan, M.R., Paul, B.K., Ahmed, K., Mahmud, S., Dutta, M., Hosen, M.S., Hassan, M.M. and Bhuyian, T., 2020. Computational analysis of network model based relationship of mental disorder with depression. Biointerface Research in Applied Chemistry, 10(5), pp.6293-6305.

Ahmed, M.L., Islam, M.R., Paul, B.K., Ahmed, K. and Bhuyian, T., 2020. Computational modeling and analysis of gene regulatory interaction network for metabolic disorder: a bioinformatics approach. Biointerface Research in Applied Chemistry, 10(4), pp.5910-5917.

Hasan, M.R., Paul, B.K., Ahmed, K. and Bhuyian, T., 2020. Design protein-protein interaction network and protein-drug interaction network for common cancer diseases: A bioinformatics approach. Informatics in Medicine Unlocked, 100311.

Taz, T.A., Kawsar, M., Paul, B.K., Ahmed, K. and Bhuyian, T., 2020. Characterizing topological properties and network pathway model among vector borne diseases. Informatics in Medicine Unlocked, 100312.

Islam, MR., Ahmed, ML., Paul, BK., Bhuiyan, T., Ahmed, K., Moni, MA. (2020). Identification of the core ontologies and signature genes of polycystic ovary syndrome (PCOS): A bioinformatics analysis. Informatics in Medicine Unlocked, Volume 18, 2020, 100304.

Paul, BK., Bhuiyan, T., Abdulrazak, LF., Sarker, K., Hassan, MM., Shariful, S., Ahmed, K. (2019). Extremely low loss optical waveguide for terahertz pulse guidance. Results in Physics, Volume 15, 2019, 102666.

Sarker, K., Rahman, H., Rahman, KF., Arman, MS., Biswas, S., Bhuiyan, T. (2019). A Comparative Analysis of the Cyber Security Strategy of Bangladesh. International Journal on Cybernetics and Informatics, Vol. 8, No.2, pp. 01-21.

Rana, MS., Hossin, MA., Mahmud, SMH., Jahan, H., Satter, AKMZ., Bhuiyan, T. (2019). MinFinder: A New Approach in Sorting Algorithm. Procedia Computer Science, Elsevier, Vol. 154, pp. 130-136.

Islam, M.R., Ahmed, M.L., Paul, B.K., Bhuiyan, T. and Ahmed, K. (2019). Potential therapeutic drugs for ischemic stroke and stress disorder: A bioinformatics analysis. Informatics in Medicine Unlocked, Volume 17, 2019, 100259.

Zaman, M., Alam, D., Bhuiyan, T., Farah, T. (2018). A Study of the Effects of Heartbleed Vulnerability in Bangladesh. International Journal of Cyber-Security and Digital Forensics, 7, No. 3, pp. 243-248.

Bhuiyan, T., Begum, A., Rahman, S. and Hadid, I. (2018). API Vulnerabilities: Current Status and Dependencies. International Journal of Engineering and Technology, Vol. 3, No. 2.3, pp. 9-13.

Asaduzzaman, S., Paul, B. K., Ahmed, K., Bhuiyan, T. and Rahman, S. M. (2018). Highly sensitive SPR based PCF for biological substance sensing: Design and Analysis. Biophotonics: Photonic Solutions for Better Health Care. 10685, p. 106851R.

Anas, M. T., Asaduzzaman, S., Ahmed, K. and Bhuiyan, T. (2018). Investigation of highly birefringent and highly nonlinear Hexa Sectored PCF with low confinement loss. Results in Physics, 11, pp. 1039-1043.

Asaduzzaman, S., Al Masud, F., Bhuiyan, T., Ahmed, K., Paul, B. K. and Rahman, S. M. (2018). Dataset on Significant Risk Factors for Type 1 Diabetes: A Bangladeshi Perspective. Data in Brief, 21, 700-708.

Ali, M. N. B., Saudi, M. M., Bhuiyan, T. and Bakar, A. A. (2018). Comparative Study of Traditional and Next Generation IPS. International Journal of Engineering & Technology, Vol. 7, pp. 55-58.

Ahmed, M. I., Hassan, Md. M. and Bhuiyan, T. (2017). Local File Disclosure Vulnerability: A Case Study of Public-Sector Web Applications. Journal of Physics: Conference Series, Vol 933, IOP Publishing, Edmonton, Canada.

Rana, M. S., Hassan, M. M. and Bhuiyan, T. (2017). An enhanced model for inpainting on digital images using dynamic masking. Journal of Communications. Vol. 12, No. 4, pp. 248-253.

Islam, M. A., Ahmed, K., Asaduzzaman, A., Paul, B. K., Bhuiyan, T., Sen, S., Islam, M. S. and Chowdhury, S. (2017). Design of single mode spiral photonic crystal fiber for gas sensing applications. Sensing and Bio-Sensing Research. Vol. 13, Apr’17, pp. 55-62, ISSN: 2214-1804.

Ali, S., Ahmed, N., Aljunid, S., Islam, M., Rana, S. and Bhuiyan, T. (2017). Effects of Triangular Core Rotation of a Hybrid Porous Core Terahertz Waveguide. International Journal of Electronics and Telecommunications. Vol 63, No 1, pp. 25-31, ISSN 2300-1933.

Shalauddin, M., Hoque, M. S. and Bhuiyan, T. (2017). Cognitive study of image schema and dying-mind in Tagore’s Near-Death Experience (NDE) poems. Rupkatha Journal on Interdisciplinary Studies in Humanities. Vol. 9, No. 2, pp. 301-320, ISSN 0975-2935.

Haque, S., Bhuiyan, T. (2017). An Investigation of Health Sector Web Application in Bangladesh: A Case Study on Cross Site Scripting. International Journal of Advances in Electronics and Computer Science, 4, No. 5, pp 34-38.

Sahmsujjoha, M. and Bhuiyan, T. (2016). A Content-Based Image Retrieval Semantic Model for Shaped and Unshaped Objects. IOSR Journal of Computer Engineering, Vol. 18, No. 1, pp. 43-60, ISSN 2278-8727.

Asaduzzaman, S., Ahmed, K., Bhuiyan, T. and Farah, T. (2016). Hybrid Photonic Crystal Fiber in Chemical Sensing. SpringerPlus, 5, No. 1, pp. 1.

Asaduzzaman, S., Chakraborty, S., Hossain, M. G., Bashar, M. I. and Bhuiyan, T., Chandan, S. S. and Ahmed, K. (2016). Hazardous Consequences of Polygamy, Contraceptives and Number of Children on Cervical Cancer in a Low Incoming Country: Bangladesh. Cumuhuriate Science Journal, Vol. 37, No. 1, pp-74-84.

Asaduzzaman, S., Ahmed, K. and Bhuiyan, T. and Arif, M. F. H. (2016). Design of a Simple Structure Gas Sensor based on Hybrid Photonic Crystal Fiber. Cumuhuriate Science Journal, Vol 37, No. 3, pp. 187-196.

Bhuiyan, T., Alam, D. and Farah, T. (2015). Evaluating the Readiness of Cyber Resilient Bangladesh.  Journal of Internet Technology and Secured Transactions (JITST), Vol. 4, No. 3, pp. 405-415, ISSN 2046-3723.

Bhuiyan, T., Peng, W. W. and Mahmud, I. (2015). Measuring learning motivation of students in supply chain management games setting: a case study of Innov8.0 game. Problems and Perspectives in Management, Vol. 13, No. 4, pp. 92-101, ISSN 1727-7051.

Bhuiyan, T. and Mahmud, I. (2015). Flip Classroom: An Innovative Way of Teaching to Excel Learning. Canadian International Journal of Science and Technology, 2, No.1, pp. 241-249, ISSN 2356-9085.

Asaduzzaman, S., Ahmed, K., Chakraborty, S., Hossain, G., Bashar, M. I., Bhuiyan, T. and Chandan, S. S. (2015). Anticipation of the Significance of Risk Factors in Cervical Cancer for Low Incoming Country: Bangladesh Perspective. International Journal of Scientific and Engineering Research, Vol. 6, No. 11, pp. 876-881, ISSN 2229-5518.

Ahmed, K., Asaduzzaman, S., Bashar, M. I., Hossain, G. and Bhuiyan, T. (2015). Association Assessment among Risk Factors and Breast Cancer in a Low Income Country: Bangladesh. Asian Pacific Journal of Cancer Prevention, Vol. 16, No. 17, pp. 7507-7512, ISSN 1513-7368.

Bhuiyan, T., Khan, S., and Nahar, A. (2014). Evaluation of the Effectiveness of a Web-based e-Learning System for Tertiary Educational Institution. Lecture Notes on Software Engineering, 2, No. 1, pp. 6-10, ISSN 2301-3559.

Bhuiyan, T. and Kundo, R. (2014). Developing and Evaluating a Desktop-Based Learning Management System. Journal of Modern Science and Technology, 2, No. 1, pp. 82-99, ISSN 2201-6686.

Ripon, S., Hossain, S. J. and Bhuiyan, T. (2014). Logic-Based Analysis of Product Line Variant Model. International Journal on Recent Trends in Engineering & Technology, Vol. 11, No. 2, pp. 541-550, ISSN 2158-5555.

Bhuiyan, T., Mahmud, I., and Alam, B. (2013). Usability Analysis of SMS Alert System for Immunization in the Context of Bangladesh. International Journal of Research in Engineering and Technology, 2, No. 11, pp. 300-305, ISSN 2321-7308.

Ripon, S., Hossain. S. J. and Bhuiyan T. (2013). Managing and Analysing Software Product Line Requirements.International Journal of Software Engineering & Applications, Vol. 4, No. 5, pp. 63-75, ISSN 0976-2221.

Bhuiyan, T. (2010). A Survey on the Relationship between Trust and Interest Similarity in Online Social Networks. Journal of Emerging Technologies in Web Intelligence, Vol 2, Issue 4, pp. 291-299, ISSN 1798-0461.

Bhuiyan, T. and Josang, A. (2010). Analysing Trust Transitivity and the Effects of Unknown Dependence. International Journal of Engineering Business Management, Vol 2, Issue 1, pp. 23-28, ISSN 1847-9790.

Bhuiyan, T. (2009). Taxonomy of Online Opinion Mining Research. International Transactions on Computer Science and Engineering, 57, No. 1, pp. 220-230, ISSN 1738-6438.

Pavel, D., Chowdhury, S. H., Bhuiyan, T. and Shah, F (2005). An ideal approach towards Integration of Bangla Computing Support in OpenOffice.org using Unicode. The Journal of Victoria University, 1, No. 1, pp. 58-63, ISSN 1818-0868.