• Home
  • S. M. Zia Ur Rashid
S. M. Zia Ur Rashid

S. M. Zia Ur Rashid
Augmedix Inc. · Compliance and Security

Bachelor of Science in Electrical & Electronic Engineering

About

7
Publications
3,516
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
23
Citations
Introduction
S. M. Zia Ur Rashid, a self-motivated cybersecurity enthusiast and ethical hacker from Bangladesh. He completed his B.Sc. in Electrical & Electronics Engineering from International Islamic University Chittagong. His research interests encompass cyber security, cyber-physical systems security, blockchain technology.
Additional affiliations
June 2019 - March 2020
Cybrary Inc.
Position
  • Research Assistant
January 2017 - present
HackerOne Inc.
Position
  • Researcher
Education
October 2018 - November 2019
International Islamic University Chittagong
Field of study
  • Electrical and Electronic Engineering

Publications

Publications (7)
Conference Paper
Full-text available
With the impetuous improvement of cyber intelligence and networking technology, cybersecurity becomes an important area of research. Domain name system (DNS) has been an essential aspect of cyber security and a crucial part of internet services. The nameservers are responsible for the functionality and safety of their corresponding domain names. Bu...
Conference Paper
Full-text available
Surveillance is the monitoring of the behavior, activities or other changing information whereas security means the state of being protected from harmful activities. Nowadays proper surveillance security is considered as a challenging issue in the world and security has become a major concern from real life to virtual life. Tech-giants are implemen...
Conference Paper
Full-text available
Industrial Control System (ICS) devices are being increasingly targeted by cyber attackers due to the lack of internet-ready security controls. IDS, firewall, IPS, and other protection measures are often used to prevent attacks on these systems but their efficiency depends on the prior knowledge of the attack patterns. In case of sophisticated and...
Conference Paper
Full-text available
The digital evolution of Industry 4.0 enabled Operational Technology (OT) infrastructures to operate and remotely maintain cyber-physical systems bridging over IT infrastructures. It has also expanded new attack surfaces and steadily increased the number of malicious cyber incidents for the interconnected smart critical systems. Within Industrial C...
Conference Paper
Full-text available
This paper proposed an Electric voting (E-voting) model that ensures security, privacy and transparency. Our approach uses blockchain method, a distributed ledger technology where data are shared and distributed into a network. Blockchain system offers transparency, decentralization, irreversibility and reduces the involvement of intermediaries whi...
Chapter
The digital evolution of Industry 4.0 enabled Operational Technology (OT) infrastructures to operate and remotely maintain cyber-physical systems bridging over IT infrastructures. It has also expanded new attack surfaces and steadily increased the number of malicious cyber incidents for the interconnected smart critical systems. Within Industrial C...
Conference Paper
This paper intends to develop a cost-effective model of industrial manipulators on AVR system, which incorporates high-precision and real-time trajectory transition to perform repetitive Point-to-Point (PTP) tasks. We opt for Central Pattern Generator (CPG), a bio-inspired network that generates rhythmic trajectories without the aid of any sensory...

Network

Cited By