Department of Computer Science and Engineering
Mr. Mohammad Jabed Morshed Chowdhury  Senior Lecturer
Name :
Mr. Mohammad Jabed Morshed Chowdhury
Employee ID
Senior Lecturer  
Department of Computer Science and Engineering
Faculty of Science and Information Technology
Personal Webpage

Master’s In Security and Mobile Computing, Norwegian University of Science and Technology, Norway

Bsc. Engineering in Computer Science and Engineering, Shah Jalal Univeristy of Science and Technology,  Bangladesh.

SSC and HSC from Mirzapur Cadet College

1.  EC council Certified Ethical Hacker
2.  Cisco Network Security Specialist (CCNA Security)
3.  Redhat Certified Engineer (RHCE)

4.  Redhat Certified System Administrator (RHCSA)
5.  Cisco Network Associate (CCNA)

Security, Web, Simulation




1.   Mohammad Jabed Morshed Chowdhury. “ Towards Security Risk- oriented Mal Activity Diagram”. International Journal of Computer Applications 56(10):47-52, October 2012. Published by Foundation of Computer Science, New York, USA.


2.   M. J. M. Chowdhury, “Universal Composability (UC) Framework for Internet Voting Protocol”, International Journal of Information Security, vol (6), Issue (2)





Conference Papers: 


  1. M. J. M. Chowdhury, R. Matulevičius, G. Sindre, and P. Karpati, “Aligning Mal-activity Diagrams and Security Risk Management for Security Requirements Definitions”, in Proceedings of REFSQ 2012, Springer-Verlag, LNCS 7195, pp. 132–139.
  2. Ferdous, M.S. Jabed, M. ;  Chowdhury, M. ;  Moniruzzaman, M. ; "Identity federations: A new perspective for Bangladesh" , In the preceding of International Conference on Informatics, Electronics & Vision (ICIEV), 2012.
  3.  M. J. M. Chowdhury, “Syntactic and Semantic Extensions of Mal Activity diagrams to support ISSRM”, Accepted in The Seventh International Workshop on Frontiers in Availability, Reliability and Security (FARES 2012).
  4. M. J. M. Chowdhury, “Universal Composability (UC) Framework for Internet Voting Protocol”, International Journal of Information Security, vol (6), Issue (2)
  5.  S Rizvi, M J M Chowdhury, S Scepanovic, “A1: A Secure and Energy Efficient Topology Construction Protocol for WSNs” , Poster (got the 2nd prize in NordSec conference, 2010)
  6. Mohammad Jabed Morshed Chowdhury and Tapas Pal, “A New Symmetric Key Encryption Algorithm based on 2-d Geometry”, in Proceedings of the 2009 International Conference on Electronic Computer Technology

Information Security

  1. Erusmus Mundas Scholarship for Master’s in Information Security from European Commission.
  2. University Scholarship for outstanding result in undergrad
  3. Government Scholarship for SSC and HSC result

Member, IEB

1.  CTO, Center For Technology Development
2. e-Admin Programmer, Access to Information Program (A2I) (A United Nations Development Program Project hosted at Prime Minister’s Office, Government of Bangladesh. )