Ragib Hasan
Cited by
Cited by
Towards an analysis of security issues, challenges, and open problems in the internet of things
MM Hossain, M Fotouhi, R Hasan
2015 ieee world congress on services, 21-28, 2015
Preventing history forgery with secure provenance
R Hasan, R Sion, M Winslett
ACM Transactions on Storage (TOS) 5 (4), 1-43, 2009
A survey of peer-to-peer storage techniques for distributed file systems
R Hasan, Z Anwar, W Yurcik, L Brumbaugh, R Campbell
International Conference on Information Technology: Coding and Computing …, 2005
Introducing secure provenance: problems and challenges
R Hasan, R Sion, M Winslett
Proceedings of the 2007 ACM workshop on Storage security and survivability …, 2007
SecLaaS: secure logging-as-a-service for cloud forensics
S Zawoad, AK Dutta, R Hasan
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
Cloud forensics: a meta-study of challenges, approaches, and open problems
S Zawoad, R Hasan
arXiv preprint arXiv:1302.6312, 2013
Faiot: Towards building a forensics aware eco system for the internet of things
S Zawoad, R Hasan
2015 IEEE International Conference on Services Computing, 279-284, 2015
Toward a threat model for storage systems
R Hasan, S Myagmar, AJ Lee, W Yurcik
Proceedings of the 2005 ACM workshop on Storage security and survivability …, 2005
An Internet of Things-based health prescription assistant and its security system design
M Hossain, SMR Islam, F Ali, KS Kwak, R Hasan
Future generation computer systems 82, 422-439, 2018
Towards building forensics enabled cloud through secure logging-as-a-service
S Zawoad, AK Dutta, R Hasan
IEEE Transactions on Dependable and Secure Computing 13 (2), 148-162, 2015
A case study of sockpuppet detection in wikipedia
T Solorio, R Hasan, M Mizan
Proceedings of the Workshop on Language Analysis in Social Media, 59-68, 2013
Handbook of database security: applications and trends
M Gertz, S Jajodia
Springer Science & Business Media, 2007
Aura: An iot based cloud infrastructure for localized mobile computation outsourcing
R Hasan, MM Hossain, R Khan
2015 3rd IEEE International Conference on Mobile Cloud Computing, Services …, 2015
Sensing-enabled channels for hard-to-detect command and control of mobile devices
R Hasan, N Saxena, T Haleviz, S Zawoad, D Rinehart
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
A statistical analysis of disclosed storage security breaches
R Hasan, W Yurcik
Proceedings of the second ACM workshop on Storage security and survivability …, 2006
Cellcloud: A novel cost effective formation of mobile cloud based on bidding incentives
S Al Noor, R Hasan, MM Haque
2014 IEEE 7th International Conference on Cloud Computing, 200-207, 2014
Digital forensics in the cloud
S Zawoad, R Hasan
Crosstalk - Journal of Defense Software Engineering, 2013
Analyzing NASPInet data flows
R Hasan, R Bobba, H Khurana
2009 IEEE/PES Power Systems Conference and Exposition, 1-6, 2009
Where have you been? secure location provenance for mobile devices
R Hasan, R Burns
arXiv preprint arXiv:1107.1821, 2011
OCF: an open cloud forensics model for reliable digital forensics
S Zawoad, R Hasan, A Skjellum
2015 IEEE 8th international conference on cloud computing, 437-444, 2015
The system can't perform the operation now. Try again later.
Articles 1–20