Journal Articles
Maguluri, D. S., Kasturi, S. N., Velagala, L. P., Hossain, G., & Haque, M. N. (2025). Cybersecurity education podcasts: A framework for effective high school instructional design. International Journal of Computer Applications, 186(74).
Bissadu, K. D., Hossain, G., & Velagala, L. P. (2024). Identifying sensors data integrity threats of smart agriculture: A collaborative filtering approach. Journal of Artificial Intelligence in Agriculture.
Bissadu, K. D., Sonko, S., & Hossain, G. (2024). Society 5.0 enabled agriculture: Drivers, enabling technologies, architectures, opportunities, and challenges. Information Processing in Agriculture.
Salman, Y., & Hossain, G. (2025). A meta-review on Zero Trust cybersecurity in the U.S. banking sector. Organizational Cybersecurity Journal: Practice, Process and People. (Under major revision)
Myers, M. H., & Hossain, G. (2024). Advances in non-invasive brain stimulation techniques. Frontiers in Neuroscience, 18, 1524097.
Hossain, G., & Elkins, J. D. (2024). Cognitive effort assessment through pupillary responses: Insights from multinomial processing tree modeling and neural interconnections. Online Journal of Communication and Media Technologies, 14(1), e202413.
Nahar, M., Kamal, A. H. M., & Hossain, G. (2023). Protecting health data in the cloud through steganography: A table-driven, blind method using neural networks and bit-shuffling algorithm. Journal of Network and Computer Applications, 217, 103689.
Sultana, H., Kamal, A. H. M., Hossain, G., & Kabir, M. A. (2023). A novel hybrid edge detection and LBP code-based robust image steganography method. Future Internet, 15(3), 108.
Rahman, M. M., Hossain, G., Rajab, C., & Mrizkal, M. R. (2022). iRestroom: A smart restroom cyberinfrastructure for elderly people. Internet of Things, 100573.
Anderson, B., & Hossain, G. (2025). Enhancing Kalman filter resilience in electric vehicles: Cyber-attack mitigation with machine learning-based adaptive filtering. In IEEE International Conference on AI in Cybersecurity (ICAIC).
Tandon, B., Vajpayee, P., & Hossain, G. (2025). Evaluating ransomware risks in transportation 5.0: A data-driven approach. In IEEE ICAIC.
Vajpayee, P., & Hossain, G. (2024). ChatGPT and cyber risks: Need of custom large language models. In International Conference on Data, Decision and Systems.
Vajpayee, P., & Hossain, G. (2024). Cognitive cybersecurity in transportation 5.0 and supply chain: A multi-objective optimization framework. In IEEE Electro Information Technology (eIT) Conference.
Hossain, G., & Kinshuk. (2024). CyberSkiller: Empowering STEM undergraduates for the future of cybersecurity. In IEEE Frontiers in Education (FIE).
Hossain, G., Shin, M., & Afroz, M. (2024). Bridging the gap: Exploring cybersecurity careers for high school students. In IEEE Frontiers in Education (FIE).
Jogarajah, J., & Hossain, G. (2025). The concept of cognitive CyTutor utilizing federated learning for cybersecurity education. In IEEE CCWC 2025.