Ragib Hasan
Cited by
Cited by
Towards an analysis of security issues, challenges, and open problems in the internet of things
MM Hossain, M Fotouhi, R Hasan
2015 IEEE World Congress on Services, 21-28, 2015
Preventing history forgery with secure provenance
R Hasan, R Sion, M Winslett
ACM Transactions on Storage (TOS) 5 (4), 1-43, 2009
A survey of peer-to-peer storage techniques for distributed file systems
R Hasan, Z Anwar, W Yurcik, L Brumbaugh, R Campbell
International Conference on Information Technology: Coding and Computing …, 2005
SecLaaS: secure logging-as-a-service for cloud forensics
S Zawoad, AK Dutta, R Hasan
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
Introducing secure provenance: problems and challenges
R Hasan, R Sion, M Winslett
Proceedings of the 2007 ACM workshop on Storage security and survivability …, 2007
Faiot: Towards building a forensics aware eco system for the internet of things
S Zawoad, R Hasan
2015 IEEE International Conference on Services Computing, 279-284, 2015
Cloud forensics: a meta-study of challenges, approaches, and open problems
S Zawoad, R Hasan
arXiv preprint arXiv:1302.6312, 2013
An Internet of Things-based health prescription assistant and its security system design
M Hossain, SMR Islam, F Ali, KS Kwak, R Hasan
Future generation computer systems 82, 422-439, 2018
Towards building forensics enabled cloud through secure logging-as-a-service
S Zawoad, AK Dutta, R Hasan
IEEE Transactions on Dependable and Secure Computing 13 (2), 148-162, 2015
Toward a threat model for storage systems
R Hasan, S Myagmar, AJ Lee, W Yurcik
Proceedings of the 2005 ACM workshop on Storage security and survivability …, 2005
A case study of sockpuppet detection in wikipedia
T Solorio, R Hasan, M Mizan
Proceedings of the Workshop on Language Analysis in Social Media, 59-68, 2013
Handbook of database security: applications and trends
M Gertz, S Jajodia
Springer Science & Business Media, 2007
Aura: An iot based cloud infrastructure for localized mobile computation outsourcing
R Hasan, MM Hossain, R Khan
2015 3rd IEEE International Conference on Mobile Cloud Computing, Services …, 2015
Sensing-enabled channels for hard-to-detect command and control of mobile devices
R Hasan, N Saxena, T Haleviz, S Zawoad, D Rinehart
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
FIF-IoT: A forensic investigation framework for IoT using a public digital ledger
M Hossain, Y Karim, R Hasan
2018 IEEE International Congress on Internet of Things (ICIOT), 33-40, 2018
Digital forensics in the cloud
S Zawoad, R Hasan
Crosstalk - Journal of Defense Software Engineering, 2013
Trust-IoV: A Trustworthy Forensic Investigation Framework for the Internet of Vehicles (IoV).
MM Hossain, R Hasan, S Zawoad
ICIOT, 25-32, 2017
A statistical analysis of disclosed storage security breaches
R Hasan, W Yurcik
Proceedings of the second ACM workshop on Storage security and survivability …, 2006
Cellcloud: A novel cost effective formation of mobile cloud based on bidding incentives
S Al Noor, R Hasan, MM Haque
2014 IEEE 7th International Conference on Cloud Computing, 200-207, 2014
Aura: An incentive-driven ad-hoc IoT cloud framework for proximal mobile computation offloading
R Hasan, M Hossain, R Khan
Future Generation Computer Systems 86, 821-835, 2018
The system can't perform the operation now. Try again later.
Articles 1–20