Ragib Hasan

Affiliations:
  • University of Alabama at Birmingham, USA
  • University of Illinois, USA (former)


According to our database1, Ragib Hasan authored at least 133 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Holistic Analysis of Internet of Things (IoT) Security: Principles, Practices, and New Perspectives.
Future Internet, February, 2024

2022
CATComp: A Compression-Aware Authorization Protocol for Resource-Efficient Communications in IoT Networks.
IEEE Internet Things J., 2022

IoTaaS: Drone-Based Internet of Things as a Service Framework for Smart Cities.
IEEE Internet Things J., 2022

Someone to Watch Over You: Using Bluetooth Beacons for Alerting Distracted Pedestrians.
IEEE Internet Things J., 2022

Pedestrian safety using the Internet of Things and sensors: Issues, challenges, and open problems.
Future Gener. Comput. Syst., 2022

FinderX: A Bluetooth Beacon-Based System for Designing Sustainable Green Smart Cities.
IEEE Consumer Electron. Mag., 2022

Towards a Threat Model and Security Analysis of Spacecraft Computing Systems.
Proceedings of the IEEE International Conference on Wireless for Space and Extreme Environments, 2022

Autonomous Driving Security: A Comprehensive Threat Model of Attacks and Mitigation Strategies.
Proceedings of the 8th IEEE World Forum on Internet of Things, 2022

Exposing Adaptive Cruise Control in Advanced Driving Assistance Systems.
Proceedings of the 8th IEEE World Forum on Internet of Things, 2022

Towards a Threat Model and Security Analysis for Contact Tracing Applications.
Proceedings of the 8th IEEE World Forum on Internet of Things, 2022

RoadNote: Automated Road Closure Detection using Urban Sensing.
Proceedings of the 8th IEEE World Forum on Internet of Things, 2022

Towards Strengthening the Security of Healthcare Devices using Secure Configuration Provenance.
Proceedings of the IEEE International Conference on Digital Health, 2022

A Trust Management Framework for Connected Autonomous Vehicles Using Interaction Provenance.
Proceedings of the IEEE International Conference on Communications, 2022

BenchAV: A Security Benchmarking Framework for Autonomous Driving.
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022

An Interaction Provenance-based Trust Management Scheme For Connected Vehicles.
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022

Smart City Technology for Disaster Management: Demonstrating the Use of Bluetooth Low Energy (BLE) Beacons for Emergency Alert Dissemination.
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022

X-Fidence: Post-Pandemic Wellness By Density Monitoring with Privacy Preservation.
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022

2021
P-HIP: A Lightweight and Privacy-Aware Host Identity Protocol for Internet of Things.
IEEE Internet Things J., 2021

R-CAV: On-Demand Edge Computing Platform for Connected Autonomous Vehicles.
Proceedings of the 7th IEEE World Forum on Internet of Things, 2021

AVGuard: A Forensic Investigation Framework for Autonomous Vehicles.
Proceedings of the ICC 2021, 2021

StreetBit: A Bluetooth Beacon-based Personal Safety Application for Distracted Pedestrians.
Proceedings of the 18th IEEE Annual Consumer Communications & Networking Conference, 2021

InSight: A Bluetooth Beacon-based Ad-hoc Emergency Alert System for Smart Cities.
Proceedings of the 18th IEEE Annual Consumer Communications & Networking Conference, 2021

Towards a Threat Model and Security Analysis of Video Conferencing Systems.
Proceedings of the 18th IEEE Annual Consumer Communications & Networking Conference, 2021

Towards a Threat Model and Privacy Analysis for V2P in 5G Networks.
Proceedings of the 4th IEEE 5G World Forum, 2021

2020
IGaaS: An IoT Gateway-as-a-Service for On-demand Provisioning of IoT Gateways.
Proceedings of the 6th IEEE World Forum on Internet of Things, 2020

VFbed: An Architecture for Testbed-as-a-Service for Vehicular Fog-based Systems.
Proceedings of the 6th IEEE World Forum on Internet of Things, 2020

Towards Designing a Sustainable Green Smart City using Bluetooth Beacons.
Proceedings of the 6th IEEE World Forum on Internet of Things, 2020

CrowdPick: A Generic Framework for Delivering Service Specific Crowd Infrastructure.
Proceedings of the 11th IEEE Annual Ubiquitous Computing, 2020

Taming the Digital Bandits: An Analysis of Digital Bank Heists and a System for Detecting Fake Messages in Electronic Funds Transfer.
Proceedings of the National Cyber Summit (NCS) Research Track 2020, 2020

Digital Forensics Education Modules for Judicial Officials.
Proceedings of the National Cyber Summit (NCS) Research Track 2020, 2020

BeaCloud: A Generic Architecture for Sustainable Smart City using Bluetooth Beacons.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

2019
Towards a Threat Model for Fog Computing.
Proceedings of the 10th IEEE Annual Ubiquitous Computing, 2019

Towards a Threat Model for Vehicular Fog Computing.
Proceedings of the 10th IEEE Annual Ubiquitous Computing, 2019

2018
An Internet of Things-based health prescription assistant and its security system design.
Future Gener. Comput. Syst., 2018

Aura: An incentive-driven ad-hoc IoT cloud framework for proximal mobile computation offloading.
Future Gener. Comput. Syst., 2018

Security-Aware Passwords and Services Usage in Developing Countries: A Case Study of Bangladesh.
Proceedings of the Services Computing - SCC 2018, 2018

SECProv: Trustworthy and Efficient Provenance Management in the Cloud.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Probe-IoT: A public digital ledger based forensic investigation framework for IoT.
Proceedings of the IEEE INFOCOM 2018, 2018

FIF-IoT: A Forensic Investigation Framework for IoT Using a Public Digital Ledger.
Proceedings of the 2018 IEEE International Congress on Internet of Things, 2018

SecuPAN: A Security Scheme to Mitigate Fragmentation-Based Network Attacks in 6LoWPAN.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

A conceptual framework for an IoT-based health assistant and its authorization model.
Proceedings of the IEEE 8th Annual Computing and Communication Workshop and Conference, 2018

Smart bracelets: Towards automating personal safety using wearable smart jewelry.
Proceedings of the 15th IEEE Annual Consumer Communications & Networking Conference, 2018

2017
Unified authentication factors and fuzzy service access using interaction provenance.
Comput. Secur., 2017

ROSAC: A Round-Wise Fair Scheduling Approach for Mobile Clouds Based on Task Asymptotic Complexity.
Proceedings of the 5th IEEE International Conference on Mobile Cloud Computing, 2017

HSC-IoT: A Hardware and Software Co-Verification Based Authentication Scheme for Internet of Things.
Proceedings of the 5th IEEE International Conference on Mobile Cloud Computing, 2017

IoTbed: A Generic Architecture for Testbed as a Service for Internet of Things-Based Systems.
Proceedings of the 2017 IEEE International Congress on Internet of Things, 2017

Trust-IoV: A Trustworthy Forensic Investigation Framework for the Internet of Vehicles (IoV).
Proceedings of the 2017 IEEE International Congress on Internet of Things, 2017

Boot-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of IoT Nodes.
Proceedings of the 2017 IEEE International Congress on Internet of Things, 2017

Securing the Internet of Things: A Meta-Study of Challenges, Approaches, and Open Problems.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017

DExaS: Delegated experience as a service for mobile and wearable devices.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017

Towards non-intrusive continuous healthcare monitoring with the Smart Hospital Gown.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017

ParkBid: An Incentive Based Crowdsourced Bidding Service for Parking Reservation.
Proceedings of the 2017 IEEE International Conference on Services Computing, 2017

Malware Secrets: De-Obfuscating in the Cloud.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

2016
WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices.
IEEE Trans. Emerg. Top. Comput., 2016

Towards Building Forensics Enabled Cloud Through Secure Logging-as-a-Service.
IEEE Trans. Dependable Secur. Comput., 2016

Trustworthy Digital Forensics in the Cloud.
Computer, 2016

CACROS: A Context-Aware Cloud Content Roaming Service.
Proceedings of the 2016 IEEE International Conference on Smart Cloud, 2016

An Open and Portable Platform for Learning Data Security in Mobile Cloud Computing.
Proceedings of the 17th Annual Conference on Information Technology Education and the 5th Annual Conference on Research in Information Technology, 2016

Developing Hands-on Labware for Emerging Database Security.
Proceedings of the 17th Annual Conference on Information Technology Education and the 5th Annual Conference on Research in Information Technology, 2016

StuxMob: A situational-aware malware for targeted attack on smart mobile devices.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Chronos: Towards Securing System Time in the Cloud for Reliable Forensics Investigation.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

The Story of Naive Alice: Behavioral Analysis of Susceptible Internet Users.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

How Secure is the Healthcare Network from Insider Attacks? An Audit Guideline for Vulnerability Analysis.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

A Cloud You Can Wear: Towards a Mobile and Wearable Personal Cloud.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

SASCloud: Ad Hoc Cloud as Secure Storage.
Proceedings of the 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), 2016

Verifiable Data Redundancy in the Cloud.
Proceedings of the 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), 2016

SECAP: Towards Securing Application Provenance in the Cloud.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

Litigo: A Cost-Driven Model for Opaque Cloud Services.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

Jugo: A Generic Architecture for Composite Cloud as a Service.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

2015
e-ESAS: Evolution of a participatory design-based solution for breast cancer (BC) patients in rural Bangladesh.
Pers. Ubiquitous Comput., 2015

LINCS: Towards building a trustworthy litigation hold enabled cloud storage system.
Digit. Investig., 2015

High-Performance Classification of Phishing URLs Using a Multi-modal Approach with MapReduce.
Proceedings of the 2015 IEEE World Congress on Services, 2015

Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things.
Proceedings of the 2015 IEEE World Congress on Services, 2015

Towards a Systematic Analysis of Challenges and Issues in Secure Mobile Cloud Forensics.
Proceedings of the 3rd IEEE International Conference on Mobile Cloud Computing, 2015

SEPIA: Secure-PIN-Authentication-as-a-Service for ATM Using Mobile and Wearable Devices.
Proceedings of the 3rd IEEE International Conference on Mobile Cloud Computing, 2015

Aura: An IoT Based Cloud Infrastructure for Localized Mobile Computation Outsourcing.
Proceedings of the 3rd IEEE International Conference on Mobile Cloud Computing, 2015

A Trustworthy Cloud Forensics Environment.
Proceedings of the Advances in Digital Forensics XI, 2015

Digital Forensics in the Age of Big Data: Challenges, Approaches, and Opportunities.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

D-CLOC: A Delay Tolerant Cloud Formation Using Context-Aware Mobile Crowdsourcing.
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015

FAIoT: Towards Building a Forensics Aware Eco System for the Internet of Things.
Proceedings of the 2015 IEEE International Conference on Services Computing, 2015

MIDEP: Multiparty Identity Establishment Protocol for Decentralized Collaborative Services.
Proceedings of the 2015 IEEE International Conference on Services Computing, 2015

Fuzzy Authentication Using Interaction Provenance in Service Oriented Computing.
Proceedings of the 2015 IEEE International Conference on Services Computing, 2015

OCF: An Open Cloud Forensics Model for Reliable Digital Forensics.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

PLAG: Practical Landmark Allocation for Cloud Geolocation.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

2014
Hot Zone Identification: Analyzing Effects of Data Sampling on Spam Clustering.
J. Digit. Forensics Secur. Law, 2014

FAPA: flooding attack protection architecture in a cloud system.
Int. J. Cloud Comput., 2014

Towards building a forensics aware language for secure logging.
Comput. Sci. Inf. Syst., 2014

A trust based Information sharing model (TRUISM) in MANET in the presence of uncertainty.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

Sockpuppet Detection in Wikipedia: A Corpus of Real-World Deceptive Writing for Linking Identities.
Proceedings of the Ninth International Conference on Language Resources and Evaluation, 2014

A Straightforward Author Profiling Approach in MapReduce.
Proceedings of the Advances in Artificial Intelligence - IBERAMIA 2014, 2014

'Who, When, and Where?' Location Proof Assertion for Mobile Devices.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

Interaction provenance model for unified authentication factors in service oriented computing.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

OTIT: towards secure provenance modeling for location proofs.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

UDaaS: A Cloud-Based URL-Deduplication-as-a-Service for Big Datasets.
Proceedings of the 2014 IEEE Fourth International Conference on Big Data and Cloud Computing, 2014

CURLA: Cloud-Based Spam URL Analyzer for Very Large Datasets.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014

A Comparative Study on I/O Performance between Compute and Storage Optimized Instances of Amazon EC2.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014

CellCloud: A Novel Cost Effective Formation of Mobile Cloud Based on Bidding Incentives.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014

Security in Big Data and Cloud Computing: Challenges, Solutions, and Open Problems.
Proceedings of the Large Scale and Big Data - Processing and Management., 2014

2013
Cloud Forensics: A Meta-Study of Challenges, Approaches, and Open Problems
CoRR, 2013

Accountable proof of ownership for data using timing element in cloud services.
Proceedings of the International Conference on High Performance Computing & Simulation, 2013

How Much Does Storage Really Cost? Towards a Full Cost Accounting Model for Data Storage.
Proceedings of the Economics of Grids, Clouds, Systems, and Services, 2013

FAL: A Forensics Aware Language for Secure Logging.
Proceedings of the 2013 Federated Conference on Computer Science and Information Systems, 2013

Phish-Net: Investigating phish clusters using drop email addresses.
Proceedings of the 2013 APWG eCrime Researchers Summit, 2013

SecLaaS: secure logging-as-a-service for cloud forensics.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

Sensing-enabled channels for hard-to-detect command and control of mobile devices.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
The Enemy Within: The Emerging Threats to Healthcare from Malicious Mobile Devices
CoRR, 2012

Cloud Based Content Fetching: Using Cloud Infrastructure to Obfuscate Phishing Scam Analysis.
Proceedings of the Eighth IEEE World Congress on Services, 2012

I Have the Proof: Providing Proofs of Past Data Possession in Cloud Forensics.
Proceedings of the 2012 ASE International Conference on Cyber Security, 2012

MANTICORE: Masking All Network Traffic via IP Concealment with OpenVPN Relaying to EC2.
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012

2011
Where Have You Been? Secure Location Provenance for Mobile Devices
CoRR, 2011

The Life and Death of Unwanted Bits: Towards Proactive Waste Data Management in Digital Ecosystems
CoRR, 2011

Efficient audit-based compliance for relational data retention.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
Trustworthy vacuuming and litigation holds in long-term high-integrity records retention.
Proceedings of the EDBT 2010, 2010

2009
Trustworthy History and Provenance for Files and Databases
PhD thesis, 2009

Secure Provenance: Protecting theGenealogy of Bits.
login Usenix Mag., 2009

Preventing history forgery with secure provenance.
ACM Trans. Storage, 2009

The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance.
Proceedings of the 7th USENIX Conference on File and Storage Technologies, 2009

Remembrance: The Unbearable Sentience of Being Digital.
Proceedings of the Fourth Biennial Conference on Innovative Data Systems Research, 2009

2008
Database Issues in Trust Management and Trust Negotiation.
Proceedings of the Handbook of Database Security - Applications and Trends, 2008

Trustworthy Records Retention.
Proceedings of the Handbook of Database Security - Applications and Trends, 2008

A component-based framework for radio-astronomical imaging software systems.
Softw. Pract. Exp., 2008

Please Permit Me: Stateless Delegated Authorization in Mashups.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

2007
Introducing secure provenance: problems and challenges.
Proceedings of the 2007 ACM Workshop On Storage Security And Survivability, 2007

Requirements of Secure Storage Systems for Healthcare Records.
Proceedings of the Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, 2007

Improving multi-tier security using redundant authentication.
Proceedings of the 2007 ACM workshop on Computer Security Architecture, 2007

2006
UCLog+ : A Security Data Management System for Correlating Alerts, Incidents, and Raw Data From Remote Logs
CoRR, 2006

A statistical analysis of disclosed storage security breaches.
Proceedings of the 2006 ACM Workshop On Storage Security And Survivability, 2006

Synergy: A Policy-Driven, Trust-Aware Information Dissemination Framework.
Proceedings of the Intelligence and Security Informatics, 2006

2005
The evolution of storage service providers: techniques and challenges to outsourcing storage.
Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, 2005

Toward a threat model for storage systems.
Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, 2005

The techniques and challenges of immutable storage with applications in multimedia.
Proceedings of the Storage and Retrieval Methods and Applications for Multimedia 2005, 2005

Trade-Offs in Protecting Storage: A Meta-Data Comparison of Cryptographic, Backup/Versioning, Immutable/Tamper-Proof, and Redundant Storage Solutions.
Proceedings of the 22nd IEEE / 13th NASA Goddard Conference on Mass Storage Systems and Technologies (MSST 2005), 2005

A Survey of Peer-to-Peer Storage Techniques for Distributed File Systems.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005


  Loading...