Welcome!

I am a Computing and Information Systems Ph.D. Candidate in the department of Software and Information Systems at UNC Charlotte under the supervision of Dr. Weichao Wang.

My research interest lies on the intersection of Cybersecurity, AI, IoT, Cyber Physical Systems (CPS), and Data Provenance. In my doctoral research, I primarily focus on the design and development of AI-driven autonomous IoT security system that defends against agile attackers at runtime. My research work delves into the modeling of trigger-action IoT attacks and the development of Markov-based probabilistic defense mechanisms. Leveraging Reinforcement Learning and Deep Learning technologies, my research aims to tackle the dynamic nature of cyber threats.


Latest News


04/17/2024: Successfully defended my PhD Dissertation entitled "Modeling trigger-action IoT attacks and devising probabilistic defense mechanisms".

12/23/2023: Our research paper entitled "IoTWarden: A Deep Reinforcement Learning Based Real-time Defense System to Mitigate Trigger-action IoT Attacks" got accepted in 2024 IEEE WCNC. [1st author]

04/13/2022: Virtually presented our paper IoTMonitor in 2022 IEEE WCNC.

12/15/2021: Our research paper entitled "IoTMonitor: A Hidden Markov Model-based Security System to Identify Crucial Attack Nodes in Trigger-action IoT Platforms" got accepted in 2022 IEEE WCNC. [1st author]

06/18/2021: Our research paper entitled "A comprehensive survey on data provenance: State-of-the-art approaches and their deployments for IoT security enforcement" got published in Journal of Computer Security. [1st author]


Teaching Experience



Publications


  1. M. M. Alam , I. Jahan, and W. Wang, "IoTWarden: A Deep Reinforcement Learning Based Real-time Defense System to Mitigate Trigger-action IoT Attacks," 2024 IEEE Wireless Communications and Networking Conference (WCNC) , 2024. (Accepted)
    Preprint ResearchGate Bibtex Slides
  2. M. M. Alam , M. S. I. Sajid, W. Wang and J. Wei, "IoTMonitor: A Hidden Markov Model-based Security System to Identify Crucial Attack Nodes in Trigger-action IoT Platforms," 2022 IEEE Wireless Communications and Networking Conference (WCNC) , 2022, pp. 1695-1700, doi: 10.1109/WCNC51071.2022.9771878.
    Conference Author's Copy ResearchGate Bibtex Slides
  3. Alam, Md Morshed & Wang, Weichao. (2021). "A comprehensive survey on data provenance: State-of-the-art approaches and their deployments for IoT security enforcement," Journal of Computer Security , 2021, vol. 29, no. 4, pp. 423-446, doi: 10.3233/JCS-200108.
    Journal Copy Preprint ResearchGate Bibtex

Research Projects



Professional Services