Profile
Researcher, educator, and practitioner in cybersecurity, digital forensics, ethical hacking, penetration testing, IoT/CPS, and AI-driven threat analysis.
I serve as a Graduate Research Assistant, Teaching Assistant, and Lab Assistant, contributing to both research and instruction in cybersecurity and digital forensics. My training spans electrical and electronic engineering, business, and cybersecurity, enabling me to connect low-level systems, organizational risk, and advanced analytics.
My work centers on forensic analysis of anonymous search engines, onion-based networks and browsers, and cyber-physical systems (CPS). I design and apply machine learning and deep learning models for phishing, malicious traffic, and ransomware, and I am actively exploring forensic tool development using LLMs and Generative AI. In parallel, I investigate digital evidence in e-commerce platforms such as Temu, AliExpress, and Shein, and study how accident detection can be automated from CCTV streams using YOLO-based models.
- Diminishing error in real-time data for malware and ransomware detection using machine learning models.
- Machine learning approaches to detect human diseases using multi-disease datasets.
- WUST Presidential Honor Certificate (Jan 2025)
- WUST Academic Honor Certificate for 2024 Summer
- Scholarship for Outstanding Result in MSCS – WUST (2024)
- Scholarship for Outstanding Result in BSc – UITS (2009 & 2010)
- Innovative Idea Award – UITS Scientific Fair, Dhaka
- PhD in Digital and Cyber Forensics, Sam Houston State University · Graduate Assistant
- Master’s in Cybersecurity, WUST · CGPA 3.92 / 4.00
- MBA, Jahangirnagar University · CGPA 3.13 / 4.00
- BSc in Electrical and Electronic Engineering (EEE), UITS · CGPA 3.83 / 4.00
- Cybersecurity and Risk Management Specialist – People Teach Institute of IT, USA
- Artificial Intelligence for Cybersecurity – LinkedIn Learning
- Oracle Cloud Infrastructure Foundations – LinkedIn Learning
- AWS Cloud Essentials – LinkedIn Learning
- Peer review training (Introduction to Peer Review; Typical Peer Review Process)
- PRINCE2 Fundamentals – Global Skill Development
- Renewable Energy & Its Application – University of Dhaka
- Cybersecurity / DFIR: digital forensic investigation, ethical hacking, penetration testing, ML for digital forensics
- Core skills: peer reviews, risk management, Active Directory
- Soft skills: team management, mentoring, motivational speaking
- Languages: Bangla (native), English (professional), Hindi (elementary)
News & Announcements
Latest updates from my research, teaching, and professional activities. You can share this section link (#news) directly in posts or emails.
📢 In-progress: E-commerce Forensics on Temu, AliExpress, and Shein
I am currently analyzing how popular e-commerce platforms leave forensic traces across devices and network traffic, with a focus on privacy, tracking, and evidence collection.
Updated: January 2025📢 YOLO-11 Live Accident Detection on CCTV Streams
Ongoing work on real-time detection of accidents and hazardous events from CCTV using YOLO-11, focusing on reliable detection, bounding boxes, and potential alerting strategies.
Updated: January 2025📢 Comparative Analysis of Digital Forensic Tools
I am benchmarking multiple forensic tools (e.g., Autopsy, FTK Imager, CAINE) to compare efficiency, artefact coverage, and practical usability for investigators.
Updated: January 2025
To share a specific update on LinkedIn or elsewhere, you can include a link such as:
https://YOUR-DOMAIN/#news so visitors land directly on this section and can explore your full profile.
Research areas & interests
Unifying forensic science, cybersecurity, and intelligent modeling to analyze complex “anonymous” and resource-constrained environments.
Forensic analysis of anonymous search engines, onion-based networks (e.g., Tor), and privacy-oriented browsers to understand what evidence can be collected and how anonymity degrades in practice.
Studying evidence sources and trace patterns in cross-border e-commerce platforms to support investigations into fraud, abuse, and privacy violations.
Evidence acquisition and analysis in IoT and cyber-physical systems, with emphasis on embedded memory, distributed telemetry, and multi-device event reconstruction.
Machine learning and deep learning models for detecting phishing, malicious network traffic, malware, and ransomware, focusing on robustness and interpretability.
Exploring offensive techniques to evaluate network, web application, and system vulnerabilities through controlled penetration testing and red-team style exercises.
Using LLMs, ML, and Generative AI to support evidence triage, artefact correlation, and report generation while keeping investigators in full control of decisions.
Selected research outputs
A sample of my published and in-progress work. For full details, please visit my Google Scholar and ResearchGate profiles.
- Diminishing error in real-time data for malware and ransomware detection using ML models.
- Forensic analysis of Temu, AliExpress, and Shein e-commerce platforms.
- Deep learning leaf multiple disease detection.
- YOLO-11 live accident object detection from CCTV.
- Comparative analysis of digital forensic tool efficiency.
Works on predicting heart disease, stroke, breast cancer, and chronic kidney disease from clinical and survey datasets, using comparative model evaluation and early detection strategies.
Contributions to transfer learning models for COVID-19 detection from CT scans, deep learning for chest cancer prognosis, and computational characterization of Nipah virus proteins.
Published work on hybrid PV–wind microgrids, energy storage sizing, energy management in RES-powered DC microgrids, and advanced control strategies in power systems.
Full publication list: Google Scholar · ResearchGate
Academic responsibilities
Supporting students through teaching, labs, and mentoring, while contributing to peer review and academic communities.
- Assisting in programming labs (e.g., Java, data structures), emphasizing clarity, performance, and problem-solving.
- Supporting cybersecurity, ethical hacking, and digital forensics labs, including log analysis, memory forensics, and web application testing.
- Providing feedback on lab reports, research-oriented assignments, and student projects.
- Peer reviewer for security and emerging technology articles in Springer / METoR-related initiatives.
- Active involvement in cybersecurity clubs, cultural clubs, and music, contributing to an inclusive learning environment.
- Mentoring students interested in IoT security, digital forensics, ML/DL threat detection, ethical hacking, penetration testing, and AI-assisted investigation tools.
Ongoing & selected projects
A snapshot of selected research and applied projects across cybersecurity, digital forensics, machine learning, ethical hacking, and engineering.
Investigating digital trace patterns, privacy weaknesses, and potential anti-forensic behavior in major e-commerce platforms.
Designing and evaluating deep learning models to detect and classify multiple plant leaf diseases for agricultural decision support.
Real-time detection of accidents and hazardous events in CCTV streams using YOLO-11, with emphasis on reliability and latency.
Benchmarking tools such as Autopsy, FTK Imager, and CAINE across acquisition reliability, efficiency, and artefact completeness.
Experimental study of how anonymous search engines and onion-based browsers leave traces on client systems and networks.
Designing supervised and deep learning models to detect phishing, malicious URLs, and ransomware activity using network and content features.
Developing lab scenarios using Nmap, Burp Suite, Metasploit, and OWASP methodologies to teach ethical hacking and penetration testing.
Prototyping workflows where LLMs help with log triage, artefact summarization, and structured report drafting.
Automated water tank alarm system using microcontroller, digital rail gate system design, solar-powered vehicle concepts, and automatic traffic signal design.
Hands-on experience with cybersecurity, digital forensics, ethical hacking, penetration testing, data analysis, and cloud environments.
Collaboration & supervision
I welcome research collaborations, student supervision, and industry–academia partnerships related to cybersecurity, digital forensics, IoT/CPS, ethical hacking, penetration testing, and AI-driven threat analysis.
• Forensic analysis of anonymous services and onion-based networks
• E-commerce forensics (Temu, AliExpress, Shein)
• Ethical hacking & penetration testing labs
• ML/DL models for phishing, ransomware, and malicious traffic
• IoT/CPS forensic case studies and testbeds
• LLM-assisted tools for investigation and reporting