Rahman, Mohammad
- Assistant Professor, Electrical and Computer Engineering , College of Engineering and Computing

Overview
overview
- I am an Assistant Professor in the Department of Electrical and Computer Engineering at Florida International University. I joined FIU in Spring 2019. Before joining FIU, I was an Assistant Professor in the Department of Computer Science at Tennessee Tech University. I obtained my Ph.D. degree in computing and information systems from the University of North Carolina at Charlotte in 2015 under the supervision of Prof. Ehab Al-Shaer. Previously, I received the BS and MS degrees in computer science and engineering from Bangladesh University of Engineering and Technology (BUET), Dhaka, in 2004 and 2007, respectively. I received the prestigious NSF CRII Award in 2017 for my research on the smart grid security analysis. I lead the Analytics of Cyber Defense (ACyD) Lab at FIU. I am a senior member of IEEE and a member of ACM. Here is my curriculum vitae for further information.
research interests
- Cyber and Cyber-physical systems security, aritifical intelligence-based analytics; cybersecurity
Scholarly & Creative Works
selected publications
-
Article
-
2021A Survey on Security and Privacy Issues in Modern Healthcare SystemsFull Text via DOI: 10.1145/3453176
-
2021Resiliency-Aware Deployment of SDN in Smart Grid SCADA: A Formal Synthesis ModelFull Text via DOI: 10.1109/TNSM.2021.3050148 Web of Science: 000660636700024
-
2021Strategic Defense Against Stealthy Link Flooding Attacks: A Signaling Game ApproachFull Text via DOI: 10.1109/TNSE.2021.3052090 Web of Science: 000631202700058
-
2020An energy-efficient load distribution framework for SDN controllersFull Text via DOI: 10.1007/s00607-019-00751-2 Web of Science: 000563818500006
-
2020A game-theoretic analysis to defend against remote operating system fingerprintingFull Text via DOI: 10.1016/j.jisa.2020.102456 Web of Science: 000536940000005
-
2020Impact of Stealthy Attacks on Optimal Power Flow: A Simulink-Driven Formal AnalysisFull Text via DOI: 10.1109/TDSC.2018.2806969 Web of Science: 000531423200001
-
2020A signaling game approach to mitigate co-resident attacks in an IaaS cloud environmentFull Text via DOI: 10.1016/j.jisa.2019.102397 Web of Science: 000505033600001
-
2019An adaptive load balancing scheme for software-defined network controllersFull Text via DOI: 10.1016/j.comnet.2019.106918 Web of Science: 000497254100019
-
2019A Requirement-Oriented Design of NFV Topology by Formal SynthesisFull Text via DOI: 10.1109/TNSM.2019.2920824 Web of Science: 000502781000032
-
2019Security design against stealthy attacks on power system state estimation: A formal approachFull Text via DOI: 10.1016/j.cose.2019.03.022 Web of Science: 000471358700019
-
2017Data-driven analytics for cyber-threat intelligence and information sharingFull Text via DOI: 10.1016/j.cose.2017.02.005 Web of Science: 000401213200003
-
2017Automated Synthesis of Distributed Network Access Controls: A Formal Framework with RefinementFull Text via DOI: 10.1109/TPDS.2016.2585108 Web of Science: 000393995600009
-
2017Secure and efficient protection of consumer privacy in Advanced Metering Infrastructure supporting fine-grained data analysisFull Text via DOI: 10.1016/j.jcss.2016.06.005 Web of Science: 000384038500007
-
2013Response of Non-Linear Shock Absorbers-Boundary Value Problem AnalysisFull Text via DOI: 10.2478/ijame-2013-0048
-
2012Wetting behavior and drainage of water droplets on microgrooved brass surfaces.Full Text via DOI: 10.1021/la302669g
-
2012Wetting, Frost Formation and Melt Water Retention Pattern on Microgrooved SurfacesFull Text via DOI: 10.1115/1.4006721
-
2010A permission based hierarchical algorithm for mutual exclusionFull Text via DOI: 10.4304/jcp.5.12.1789-1799
-
2010A consensus-based ℓ-Exclusion algorithm for mobile ad hoc networksFull Text via DOI: 10.1016/j.adhoc.2009.03.002
-
Book
-
2016Security and Resiliency Analytics for Smart Grids Static and Dynamic Approaches Preface. Ed. 67.Web of Science: 000389483100001
-
Book Chapter
-
2021Evaluating Future Threats of Climate Change on Riverine and Coastal Chars. 185-211.Full Text via DOI: 10.1007/978-3-030-73592-0_11
-
2021iDDAF: An Intelligent Deceptive Data Acquisition Framework for Secure Cyber-Physical Systems. 338-359.Full Text via DOI: 10.1007/978-3-030-90022-9_17 Web of Science: 000769464900017
-
2020A Review of Moving Target Defense Mechanisms for Internet of Things Applications. 563-614.Full Text via DOI: 10.1002/9781119593386.ch24
-
2019Toward the science of industrial control systems security and resiliency. 51-69.Full Text via DOI: 10.1007/978-3-030-18214-4_4
-
2016Intrusion Detection Systems for AMI. 105-134.Full Text via DOI: 10.1007/978-3-319-32871-3_5 Web of Science: 000389483100008
-
2016Security Analytics for EMS Modules. 61-103.Full Text via DOI: 10.1007/978-3-319-32871-3_4 Web of Science: 000389483100007
-
2016Smart Grids and Security Challenges. 3-13.Full Text via DOI: 10.1007/978-3-319-32871-3_1 Web of Science: 000389483100003
-
2013A declarative logic-based approach for threat analysis of advanced metering infrastructure. 59-77.Full Text via DOI: 10.1007/978-3-319-01433-3_4
-
-
Conference
-
2022Ontology-Based Semantic Modeling for Steel Bridge Coating Systems. 1106-1115.Web of Science: 000776568400116
-
2021Bayesian Hyperparameter Optimization for Deep Neural Network-Based Network Intrusion Detection. 5413-5419.Full Text via DOI: 10.1109/BigData52589.2021.9671576 Web of Science: 000800559505063
-
2021Ride-Hailing for Autonomous Vehicles: Hyperledger Fabric-Based Secure and Decentralize Blockchain Platform. 5450-5459.Full Text via DOI: 10.1109/BigData52589.2021.9671379 Web of Science: 000800559505067
-
2021CURE: Enabling RF Energy Harvesting Using Cell-Free Massive MIMO UAVs Assisted by RIS. 533-540.Full Text via DOI: 10.1109/LCN52139.2021.9524984 Web of Science: 000766931400082
-
2021iAttackGen: Generative Synthesis of False Data Injection Attacks in Cyber-physical Systems. 200-208.Full Text via DOI: 10.1109/CNS53000.2021.9705034 Web of Science: 000786954200029
-
2021BIOCAD: Bio-Inspired Optimization for Classification and Anomaly Detection in Digital Healthcare Systems. 48-58.Full Text via DOI: 10.1109/ICDH52753.2021.00017
-
2021Towards Blockchain-Based Secure Data Management for Remote Patient Monitoring. 299-308.Full Text via DOI: 10.1109/ICDH52753.2021.00054
-
2021REPlanner: Efficient UAV Trajectory-Planning using Economic Reinforcement Learning. 153-160.Full Text via DOI: 10.1109/SMARTCOMP52413.2021.00041
-
2021False Data Injection Attack Against Power System Small-Signal StabilityFull Text via DOI: 10.1109/PESGM46819.2021.9638112 Web of Science: 000821942400294
-
2021False Relay Operation Attacks In Power Systems with High RenewablesFull Text via DOI: 10.1109/PESGM46819.2021.9637969 Web of Science: 000821942400151
-
2021DDAF: Deceptive Data Acquisition Framework against Stealthy Attacks in Cyber-Physical Systems. 725-734.Full Text via DOI: 10.1109/COMPSAC51774.2021.00104 Web of Science: 000706529000093
-
2021Ensemble-based Efficient Anomaly Detection for Smart Building Control Systems. 504-513.Full Text via DOI: 10.1109/COMPSAC51774.2021.00075 Web of Science: 000706529000064
-
2021BIoTA: Control-Aware Attack Analytics for Building Internet of ThingsFull Text via DOI: 10.1109/SECON52354.2021.9491621 Web of Science: 000709091000041
-
2021Buckling of pushrods made of superelastic shape memory alloy. 030008.Full Text via DOI: 10.1063/5.0037613
-
2021Buckling of thin-walled cylindrical shells made of mild steel due to vacuum and its prevention-experimental study. 030016.Full Text via DOI: 10.1063/5.0037609
-
2021Whirling of a Jeffcott rotor on a superelastic SMA shaft. 030027.Full Text via DOI: 10.1063/5.0037615
-
20215G Core Security in Edge Networks: A Vulnerability Assessment ApproachFull Text via DOI: 10.1109/ISCC53001.2021.9631531
-
2020Actionable Knowledge Extraction Framework for COVID-19. 4036-4041.Full Text via DOI: 10.1109/BigData50022.2020.9378398 Web of Science: 000662554704017
-
2020Adversarial Attacks to Machine Learning-Based Smart Healthcare SystemsFull Text via DOI: 10.1109/GLOBECOM42002.2020.9322472 Web of Science: 000668970502097
-
2020G-IDS: Generative Adversarial Networks Assisted Intrusion Detection System. 376-385.Full Text via DOI: 10.1109/COMPSAC48688.2020.0-218 Web of Science: 000629086600051
-
2020WTC2: Impact-Aware Threat Analysis for Water Treatment Centers. 473-482.Full Text via DOI: 10.1109/COMPSAC48688.2020.0-206 Web of Science: 000629086600063
-
2020On Incentive Compatible Role-based Reward Distribution in Algorand. 452-463.Full Text via DOI: 10.1109/DSN48063.2020.00059 Web of Science: 000617924900039
-
2019HealthGuard: A Machine Learning-Based Security Framework for Smart Healthcare Systems. 389-396.Web of Science: 000526061400057
-
2019Forensic analysis of a fatal fire incident in a high-rise residential building in Bangladesh, 2010 using fire modelling. 090002.Full Text via DOI: 10.1063/1.5115930
-
2019A Game-Theoretic Analysis of Pricing Competition between Aggregators in V2G Systems. 549-558.Full Text via DOI: 10.1109/COMPSAC.2019.00085 Web of Science: 000538791700074
-
2019DroidPatrol: A Static Analysis Plugin For Secure Mobile Software Development. 565-569.Full Text via DOI: 10.1109/COMPSAC.2019.00087 Web of Science: 000538791700076
-
2019Hands-on File Inclusion Vulnerablity and Proactive Control for Secure Software Development. 604-609.Full Text via DOI: 10.1109/COMPSAC.2019.10274 Web of Science: 000538781300100
-
2019LIPs: A Protocol for Leadership Incentives for Heterogeneous and Dynamic Platoons. 535-544.Full Text via DOI: 10.1109/COMPSAC.2019.00082 Web of Science: 000538791700071
-
2019Blockchain-based Charging Coordination Mechanism for Smart Grid Energy Storage Units. 504-509.Full Text via DOI: 10.1109/Blockchain.2019.00076 Web of Science: 000528931600067
-
2019
-
2019False Data Injection Attacks against Contingency Analysis in Power Grids. 343-344.Full Text via DOI: 10.1145/3317549.3326323 Web of Science: 000477981300058
-
2019Privacy Preserving Fine-Grained Data Distribution Aggregation for Smart Grid AMI Networks. 249-254.Full Text via DOI: 10.1109/MILCOM.2018.8599856
-
2019Data Protection Labware for Mobile Security. 183-195.Full Text via DOI: 10.1007/978-3-030-24907-6_15
-
2018Effect of velocity on the corrosion behavior of hyper-eutectic Al-Si automotive alloy in 3.5% NaCl heated solution. 030014.Full Text via DOI: 10.1063/1.5044293
-
2018Study of precipitation behaviour of hyper-eutectic Al-Si automotive alloy. 030013.Full Text via DOI: 10.1063/1.5044292
-
2018Chained of Things: A Secure and Dependable Design of Autonomous Vehicle Services. 498-503.Full Text via DOI: 10.1109/COMPSAC.2018.10283
-
2018Formal Analysis of k-Resiliency for Collaborative UAVs. 583-592.Full Text via DOI: 10.1109/COMPSAC.2018.00089
-
2018A New Approach for Energy Efficiency in Software Defined Network. 67-73.Web of Science: 000435292300010
-
2018Poster Abstract: Chained of Things: A Secure and Dependable Design of Autonomous Vehicle Services. 298-299.Full Text via DOI: 10.1109/IoTDI.2018.00048 Web of Science: 000583888700038
-
2018Poster Abstract: Safety Analysis for UAV Networks. 294-295.Full Text via DOI: 10.1109/IoTDI.2018.00046 Web of Science: 000583888700036
-
2017Cyber threat analysis framework for the wind energy based power system. 81-92.Full Text via DOI: 10.1145/3140241.3140247
-
2017A cost-effective security management for clouds: A game-theoretic deception mechanism. 98-106.Full Text via DOI: 10.23919/INM.2017.7987269
-
2017Formal Modelling and Verification of Requirements of Adaptive Routing Protocol for Mobile Ad-Hoc Network. 548-556.Full Text via DOI: 10.1109/COMPSAC.2017.132 Web of Science: 000424861400072
-
2017A Formal Framework of Resource Management for VNFaaS in Cloud. 254-261.Full Text via DOI: 10.1109/CLOUD.2017.40 Web of Science: 000427068800032
-
2017Protection by Detection: A Signaling Game Approach to Mitigate Co-Resident Attacks in Cloud. 552-559.Full Text via DOI: 10.1109/CLOUD.2017.76 Web of Science: 000427068800069
-
2017Optimal Deployment of Charging Stations for Electric Vehicles: A Formal Approach. 83-90.Full Text via DOI: 10.1109/ICDCSW.2017.26 Web of Science: 000428586800013
-
2017Dynamic DDoS Defense Resource Allocation using Network Function Virtualization. 37-42.Full Text via DOI: 10.1145/3040992.3041000 Web of Science: 000725212200007
-
2016Electric Vehicle Consumption Markets: An Economic Analysis. 906-910.Web of Science: 000672803000184
-
2016Mitigating Crossfire Attacks using SDN-based Moving Target Defense. 627-630.Full Text via DOI: 10.1109/LCN.2016.108 Web of Science: 000391436100100
-
2016Automated Synthesis of Resiliency Configurations for Cyber Networks. 243-251.Web of Science: 000402623000028
-
2016IoTSAT: A Formal Framework for Security Analysis of the Internet of Things (IoT). 180-188.Web of Science: 000402623000021
-
2016Formal analysis for dependable supervisory control and data acquisition in smart grids. 263-274.Full Text via DOI: 10.1109/DSN.2016.32
-
2016Design, fabrication and experimental study of a single plane balancing machine. 060001.Full Text via DOI: 10.1063/1.4958442
-
2016A Novel Secure and Efficient Policy Management Framework for Software Defined Network. 423-430.Full Text via DOI: 10.1109/COMPSAC.2016.31 Web of Science: 000389532200067
-
2016VFence: A Defense against Distributed Denial of Service Attacks using Network Function Virtualization. 431-436.Full Text via DOI: 10.1109/COMPSAC.2016.219 Web of Science: 000389532200068
-
2015Formal Synthesis of Dependable Configurations for Advanced Metering Infrastructures. 289-294.Web of Science: 000380423300049
-
2015Automated Decision Making for Active Cyber Defense. 59-59.Full Text via DOI: 10.1145/2809826.2809828
-
2015SafeConfig 2015 preface. iii.
-
2015SafeConfig 2015: Workshop on Automated Decision Making for Active Cyber Defense. 1711-1712.Full Text via DOI: 10.1145/2810103.2812624 Web of Science: 000412403900164
-
2014Moving target defense for hardening the security of the power system state estimation. 59-68.Full Text via DOI: 10.1145/2663474.2663482
-
2014Security threat analytics and countermeasure synthesis for power system state estimation. 156-167.Full Text via DOI: 10.1109/DSN.2014.29
-
2014Impact analysis of topology poisoning attacks on economic operation of the smart power grid. 649-659.Full Text via DOI: 10.1109/ICDCS.2014.72
-
2014A formal model for verifying the impact of stealthy attacks on optimal power flow in power grids. 175-186.Full Text via DOI: 10.1109/ICCPS.2014.6843721
-
2013A formal model for sustainable vehicle-to-grid management. 81-92.Full Text via DOI: 10.1145/2516930.2516937
-
2013A formal framework for network security design synthesis. 560-570.Full Text via DOI: 10.1109/ICDCS.2013.70
-
2013A formal model for verifying stealthy attacks on state estimation in power grids. 414-419.Full Text via DOI: 10.1109/SmartGridComm.2013.6687993
-
2013Energy efficient navigation management for hybrid electric vehicles on highways. 21-30.Full Text via DOI: 10.1109/ICCPS.2013.6603996
-
2013Energy efficient navigation management for hybrid electric vehicles on highways. 21-30.Full Text via DOI: 10.1145/2502524.2502528
-
2013A game-theoretic approach for deceiving remote operating system fingerprinting. 73-81.Full Text via DOI: 10.1109/CNS.2013.6682694
-
2012Secure distributed solution for optimal energy consumption scheduling in smart grid. 279-286.Full Text via DOI: 10.1109/TrustCom.2012.252
-
2012SmartAnalyzer: A noninvasive security threat analyzer for AMI smart grid. 2255-2263.Full Text via DOI: 10.1109/INFCOM.2012.6195611
-
2011AMIAnalyzer: Security analysis of AMI configurationsFull Text via DOI: 10.1109/SafeConfig.2011.6111662
-
2011A declarative approach for global network security configuration verification and evaluation. 531-538.Full Text via DOI: 10.1109/INM.2011.5990556
-
2011Experimental Study of Wetting Anisotropy and Condensate Drainage Enhancement on Microgrooved Aluminum Surface. 51-59.Full Text via DOI: 10.1115/imece2011-64247
-
2011Wetting Behavior and Drainage of Water Droplets on Microgrooved Brass Surface. 61-69.Full Text via DOI: 10.1115/imece2011-64255
-
2009A two-layer hierarchical permission based mutual exclusion algorithm. 25-31.Full Text via DOI: 10.1109/ICCIT.2009.5407172
-
-
Other Scholarly Work
-
2014Simple top-down preparation of magnetic Bi₀.₉Gd₀.₁Fe₁-xTixO₃ nanoparticles by ultrasonication of multiferroic bulk material.. 14336-14342.Full Text via DOI: 10.1039/c4nr03150d
-
-
Preprint
Research
principal investigator on
- I-Corps: Smart Healthcare System Threat Analyzer awarded by National Science Foundation 2021 - 2023
- CRII: CPS: Noninvasive Security Analysis for Smart Grid Energy Management System awarded by National Science Foundation 2019 - 2022
- ARO Travel Grant Support for ACM WiSec 2019 Conference awarded by U.S. Army 2019 - 2020
co-principal investigator on
Contact
full name
- Mohammad Rahman
- Mohammad Ashiqur Rahman
Identifiers
ORCID iD
- https://orcid.org/0000-0002-2963-7430 (confirmed)
- https://orcid.org/0000-0003-4666-6943 (confirmed)