Department of Software Engineering
Mr. Md. Maruf Hassan  Assistant Professor
Name :
Mr. Md. Maruf Hassan
Employee ID
710001741
Designation
Assistant Professor  
Department
Department of Software Engineering
Faculty
Faculty of Science and Information Technology
Personal Webpage
https://faculty.daffodilvarsity.edu.bd/profile/swe/hassan-swe.html
E-mail
maruf.swe@diu.edu.bd
Phone
Cell-Phone
01718520275

M.Sc. in Computer Science & Engineering

  1. IT Risk Management, IT Audit Management in Banks and Financial Institutions, IT Security Risk Management in Banks and Financial Institutions, Core Banking System and IT Audit, Privacy, Workplace Security, Database
    Fundamentals, Object-Oriented Analysis: Dynamic Modeling, Application Testing – Solutions, etc.
  2. Participatory Engaging Techniques (PET) for teachers regarding “The way of conducting class for students in classroom” organized by Daffodil International University (January, 2017) conducted by Professor Dr. Yousuf Mahbubul Islam;
  3. Training for teachers “How to use Google Classroom for students for effective e-Learning” organized by Daffodil International University (January, 2017).

 

Software Security; Information Security; Distributed Computing & Network Security; Operating System.

Publication

  1. B. K. Paul, T. Bhuiyan, L. F. Abdulrazak, K. Sarker, M. M. Hassan, S. Shariful, & K. Ahmed, "Extremely low loss optical waveguide for terahertz pulse guidance," Results in Physics 15 (2019): 102666. (Scopus & Impact Factor – 3.042)
  2. M. E. Hossain, M. Rahman, K. M. Qaiduzzaman, A. K. Shakir and M. M. Hassan, "Efficient Anti-Kidnapping and Anti-Harassment (Avoidance-Detection-Notification) Mobile Application for Unwanted Incidents," 2019 IEEE Student Conference on Research and Development (SCOReD), Bandar Seri Iskandar, Malaysia, 2019, pp. 112-116. (Scopus)
  3. M. M. Hassan, U. Mustain, S. Khatun, M. S. A. Karim, N. Nishat, M. Rahman, “Quantitative Assessment on Remote Code Execution Vulnerability in Web Apps ," 2019 5th International Conference on Electrical, Control and Computer Engineering (InECCE2019), 29-30 July, Pahang, Malaysia. (will be published in SCOPUS)
  4. T. Bhuiyan, A. H. Sarower, M. R. Karim and M. M. Hassan, “An Image Steganography Algorithm using LSB Replacement through XOR Substitution ," 2019 International Conference on Information and Communications Technology (ICOIACT 2019), 24-25 July, Yogyakarta, Indonesia. (will be published in SCOPUS)
  5. M. M. Hassan, T. Bhuiyan, M. A. Ali, M. H. Sharif, and S. Biswas, “Quantitative Assessment on Broken Access Control Vulnerability in Web Applications," 2018 International Conference on Cyber Security and Computer Science (ICONCS 2018), 18-20 October, Karabük, Turkey.
  6. S. Biswas, M. M. H. K. Sajal, T. Afrin, T. Bhuiyan, K. S. Mohammad and M. M. Hassan, “A Study on Remote Code Execution Vulnerability in Web Applications," 2018 International Conference on Cyber Security and Computer Science (ICONCS 2018), 18-20 October, Karabük, Turkey.
  7. A. D. Noyon, Y. M. Abid, M. M. Hassan, M. H. Sharif, F. N. Deepa, R. I. Rumel, R. Haque, S. Nasrin, and M. Zaman, “A Study of Ajax Template Injection in Web Applications”, International Journal of Engineering & Technology 7, no. 3.13 (2018): 123-127. DOI: 10.14419/ijet.v7i3.13.16337 (Scopus)
  8. M. M. Hassan, S. S. Nipa, M. Akter, R. Haque, F. N. Deepa, M. Rahman, M. A. Siddiqui, M. H. Sharif, “Broken Authentication And Session Management Vulnerability: A Case Study Of Web Application”, International Journal of Simulation Systems, Science & Technology, Vol. 19, No. 2, p. 6.1-6.11, ISSN 1473-804x , DOI 10.5013/IJSSST.a.19.02.06 (Scopus)
  9. S. S. M. M. Rahman, S. A. Mollah, S. Anirban, M. H. Rahman, M. Rahman, M. M. Hassan, M. H. Sharif, “OSCRUM: A Modified Scrum For Open Source Software Development”, International Journal of Simulation Systems, Science & Technology, Vol. 19, No. 3, p. 20.1-20.7, ISSN 1473-804x , DOI 10.5013/IJSSST.a.19.03.20 (Scopus)
  10. M. M. Hassan, T. Bhuyian, M. K. Sohel, M. H. Sharif, S. Biswas, “SAISAN: An Automated Local File Inclusion Vulnerability Detection Model”, International Journal of Engineering & Technology 7, no. 2.3 (2018): 4-8. DOI: 10.14419/ijet.v7i2.3.9956 (Scopus)
  11. M. M. Hassan, K. Sarker, S. Biswas, M. H. Sharif, “Detection of Wordpress Content Injection Vulnerability”, International Journal on Cybernetics & Informatics (IJCI), Vol. 6, No.3/4/5, October 2017. DOI: 10.5121/ijci.2017.6501
  12. M. I. Ahmed, M. M. Hassan, T. Bhuyian, “Local File Disclosure Vulnerability: A Case Study of Public-Sector Web Applications”, Journal of Physics: Conference Series (Vol. 933, No. 1, p. 012011). IOP Publishing. DOI:10.1088/1742-6596/933/1/012011 (Scopus)
  13. T. Farah, R. Shelim, M. Zaman, M. M. Hassan, D. Alam, “Study of Race Condition: A Privilege Escalation Vulnerability, 21st World Multi-Conference on Systemics” (WMSCI 2017), Cybernetics and Informatics, Orlando, Florida, USA, July 8 - 11, 2017.
  14. M. S. Rana, K. Sarker, T. Bhuyian and M. M. Hassan, “Comparing the Performance of Different Ultrasonic Image Enhancement Techniques for Speckle Noise Reduction in Ultrasound Images: A Preference Study.” Proceedings of the 2017 the Second International Workshop on Pattern Recognition; 2017 May 1-3; Singapore; 2017. (Scopus)
  15. M. S. Rana, M. M. Hassan, and T. Bhuiyan, "An Enhanced Model for Inpainting on Digital Images Using Dynamic Masking," Journal of Communications, Vol. 12, no. 4, pp. 248-253, 2017. (Scopus)
  16. A. Begum, M. M. Hassan, T. Bhuiyan and M. H. Sharif, "RFI and SQLi based local file inclusion vulnerabilities in web applications of Bangladesh," 2016 International Workshop on Computational Intelligence (IWCI), Dhaka, 2016, pp. 21-25. (Scopus)
  17. M. M. Hassan, T. Bhuiyan and S. Biswas, “An Investigation of Educational Web Applications in Bangladesh: A Case Study on Local File Disclosure Vulnerability," 2016 4th International Conference on “Engineering & Technology, Computer, Basic & Applied Sciences” (ECBA- 2016), Sydney, Australia, pp-11.
  18. T. Farah, M. Shojol, M. Hassan and D. Alam, "Assessment of vulnerabilities of web applications of Bangladesh: A case study of XSS & CSRF," 2016 Sixth International Conference on Digital Information and Communication Technology and its Applications (DICTAP), Konya, 2016, pp. 74-78. (Scopus)

1. Cyber Security;
2. Malware Detection;
3. Machine Learning;
4. Image Processing.

Received best paper award from 21st World Multi-Conference on Systemics (WMSCI 2017), Cybernetics and Informatics, Orlando, Florida, USA on July 8 - 11, 2017.

 EC-Council, ISACA, Australian Computer Society and CTO Forum Bangladesh.

The Premier Bank Ltd.
National Credit and Commerce Bank Ltd.
LEADS Corporation.
Hoda Vasi Chowdhury & Co. (an affiliated firm of  Deloitte)
Commonwealth Bank of Australia
Australian Taxation Office (Department of Revenue of Australian Government)
Accenture Australia