Hossain Shahriar

Dr. Hossain Shahriar is the Associate Professor of Information Technology at Kennesaw State University, Georgia, USA. His research interests include mobile and web security, EMR and healthcare security, malware analysis, automatic checking of vulnerabilities and mitigation, security education. He has published over 100 peer-reviewed articles in IEEE/ACM conferences, journals and book chapters. Some of his research projects have been supported by various agencies including National Science Foundation (USA), USG Affordable Learning Georgia, NSERC (Canada). Dr. Shahriar has served as Program Chair (SIN 2016), Publication Chair (ACM SAC 2017-current, IEEE COMPSAC 2019- current), Workshop Chair (IEEE STPSA 2017 - current). He is also a Symposium Chair on Smart and Connected Health (in IEEE COMPSAC 2019).

Publications

Technology Adoption Model-Based Comparison of Clinical Trial Software: A Case Study Using Jeeva and REDCap
Hossain Shahriar, Evbusogie Sogbesan, Lorna Migiro, Temitope Balogun, Sweta Sneha, Harsha Rajasimha, Arleen Joy Patinga, Masrura Tasnim. © 2023. 24 pages.
Clinical research management systems are mainly used by both pharmaceutical companies and biotechnology companies to manage the clinical trial process from start to finish. Due...
Assessing HIPAA Compliance of Open Source Electronic Health Record Applications
Hossain Shahriar, Hisham M. Haddad, Maryam Farhadi. © 2022. 17 pages.
Electronic health record (EHR) applications are digital versions of paper-based patient health information. EHR applications are increasingly being adopted in many countries....
Impact of Health Information Technologies on the Quality of Healthcare Deliveries
Patricia Whitley, Hossain Shahriar, Sweta Sneha. © 2021. 15 pages.
Through a literary review of recent research, this paper examines the mixed impact of health information technology (HIT) on patient care, medical errors, and the quality of...
Assessing HIPAA Compliance of Open Source Electronic Health Record Applications
Hossain Shahriar, Hisham M. Haddad, Maryam Farhadi. © 2021. 15 pages.
Electronic health record (EHR) applications are digital versions of paper-based patient health information. EHR applications are increasingly being adopted in many countries....
Compliance of Electronic Health Record Applications With HIPAA Security and Privacy Requirements
Maryam Farhadi, Hisham M. Haddad, Hossain Shahriar. © 2019. 14 pages.
Electronic health record (EHR) applications are digital versions of paper-based patients health information. EHR applications are increasingly being adopted in many countries....
Fuzzy Rule-Based Vulnerability Assessment Framework for Web Applications
Hossain Shahriar, Hisham M. Haddad. © 2018. 20 pages.
This paper addresses the problem of assessing risk in web application due to implementation level vulnerabilities. In particular, the authors address the common research...
Information Theoretic XSS Attack Detection in Web Applications
Hossain Shahriar, Sarah North, Wei-Chuen Chen, Edward Mawangi. © 2018. 16 pages.
Cross-Site Scripting (XSS) has been ranked among the top three vulnerabilities over the last few years. XSS vulnerability allows an attacker to inject arbitrary JavaScript code...
Compliance of Electronic Health Record Applications With HIPAA Security and Privacy Requirements
Maryam Farhadi, Hisham M. Haddad, Hossain Shahriar. © 2018. 15 pages.
Electronic health record (EHR) applications are digital versions of paper-based patients health information. EHR applications are increasingly being adopted in many countries....
Classification of Web-Service-Based Attacks and Mitigation Techniques
Hossain Shahriar, Victor Clincy, William Bond. © 2018. 19 pages.
Web services are being widely used for business integration. Understanding what these web services are and how they work is important. Attacks on these web services are a major...
International Journal of Systems and Software Security and Protection (IJSSSP)
Mehdi Khosrow-Pour. Est. 2018.
The International Journal of Systems and Software Security and Protection (IJSSSP) publishes original research on the security concerns that arise with systems and software....
Development and Mitigation of Android Malware
Vanessa N. Cooper, Hossain Shahriar, Hisham M. Haddad. © 2015. 16 pages.
As mobile applications are being developed at a faster pace, the security aspect of user information is being neglected. A compromised smartphone can inflict severe damage to...
International Journal of Secure Software Engineering (IJSSE)
Martin Gilje Jaatun. Est. 2010.
The International Journal of Secure Software Engineering (IJSSE) publishes original research on the security concerns that construe during the software development practice....