Ragib Hasan

According to our database1, Ragib Hasan authored at least 104 papers between 2005 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
IGaaS: An IoT Gateway-as-a-Service for On-demand Provisioning of IoT Gateways.
Proceedings of the 6th IEEE World Forum on Internet of Things, 2020

VFbed: An Architecture for Testbed-as-a-Service for Vehicular Fog-based Systems.
Proceedings of the 6th IEEE World Forum on Internet of Things, 2020

Towards Designing a Sustainable Green Smart City using Bluetooth Beacons.
Proceedings of the 6th IEEE World Forum on Internet of Things, 2020

Taming the Digital Bandits: An Analysis of Digital Bank Heists and a System for Detecting Fake Messages in Electronic Funds Transfer.
Proceedings of the National Cyber Summit (NCS) Research Track 2020, 2020

Digital Forensics Education Modules for Judicial Officials.
Proceedings of the National Cyber Summit (NCS) Research Track 2020, 2020

2019
Towards a Threat Model for Fog Computing.
Proceedings of the 10th IEEE Annual Ubiquitous Computing, 2019

Towards a Threat Model for Vehicular Fog Computing.
Proceedings of the 10th IEEE Annual Ubiquitous Computing, 2019

2018
An Internet of Things-based health prescription assistant and its security system design.
Future Gener. Comput. Syst., 2018

Aura: An incentive-driven ad-hoc IoT cloud framework for proximal mobile computation offloading.
Future Gener. Comput. Syst., 2018

Security-Aware Passwords and Services Usage in Developing Countries: A Case Study of Bangladesh.
Proceedings of the Services Computing - SCC 2018, 2018

SECProv: Trustworthy and Efficient Provenance Management in the Cloud.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Probe-IoT: A public digital ledger based forensic investigation framework for IoT.
Proceedings of the IEEE INFOCOM 2018, 2018

FIF-IoT: A Forensic Investigation Framework for IoT Using a Public Digital Ledger.
Proceedings of the 2018 IEEE International Congress on Internet of Things, 2018

SecuPAN: A Security Scheme to Mitigate Fragmentation-Based Network Attacks in 6LoWPAN.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

A conceptual framework for an IoT-based health assistant and its authorization model.
Proceedings of the IEEE 8th Annual Computing and Communication Workshop and Conference, 2018

Smart bracelets: Towards automating personal safety using wearable smart jewelry.
Proceedings of the 15th IEEE Annual Consumer Communications & Networking Conference, 2018

2017
Unified authentication factors and fuzzy service access using interaction provenance.
Comput. Secur., 2017

ROSAC: A Round-Wise Fair Scheduling Approach for Mobile Clouds Based on Task Asymptotic Complexity.
Proceedings of the 5th IEEE International Conference on Mobile Cloud Computing, 2017

HSC-IoT: A Hardware and Software Co-Verification Based Authentication Scheme for Internet of Things.
Proceedings of the 5th IEEE International Conference on Mobile Cloud Computing, 2017

IoTbed: A Generic Architecture for Testbed as a Service for Internet of Things-Based Systems.
Proceedings of the IEEE International Congress on Internet of Things, 2017

Trust-IoV: A Trustworthy Forensic Investigation Framework for the Internet of Vehicles (IoV).
Proceedings of the IEEE International Congress on Internet of Things, 2017

Boot-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of IoT Nodes.
Proceedings of the IEEE International Congress on Internet of Things, 2017

Securing the Internet of Things: A Meta-Study of Challenges, Approaches, and Open Problems.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017

DExaS: Delegated experience as a service for mobile and wearable devices.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017

Towards non-intrusive continuous healthcare monitoring with the Smart Hospital Gown.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017

ParkBid: An Incentive Based Crowdsourced Bidding Service for Parking Reservation.
Proceedings of the 2017 IEEE International Conference on Services Computing, 2017

Malware Secrets: De-Obfuscating in the Cloud.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

2016
WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices.
IEEE Trans. Emerg. Top. Comput., 2016

Towards Building Forensics Enabled Cloud Through Secure Logging-as-a-Service.
IEEE Trans. Dependable Secur. Comput., 2016

Trustworthy Digital Forensics in the Cloud.
Computer, 2016

CACROS: A Context-Aware Cloud Content Roaming Service.
Proceedings of the 2016 IEEE International Conference on Smart Cloud, 2016

Developing Hands-on Labware for Emerging Database Security.
Proceedings of the 17th Annual Conference on Information Technology Education and the 5th Annual Conference on Research in Information Technology, 2016

StuxMob: A situational-aware malware for targeted attack on smart mobile devices.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Chronos: Towards Securing System Time in the Cloud for Reliable Forensics Investigation.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

The Story of Naive Alice: Behavioral Analysis of Susceptible Internet Users.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

How Secure is the Healthcare Network from Insider Attacks? An Audit Guideline for Vulnerability Analysis.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

A Cloud You Can Wear: Towards a Mobile and Wearable Personal Cloud.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

SASCloud: Ad Hoc Cloud as Secure Storage.
Proceedings of the 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), 2016

Verifiable Data Redundancy in the Cloud.
Proceedings of the 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), 2016

SECAP: Towards Securing Application Provenance in the Cloud.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

Litigo: A Cost-Driven Model for Opaque Cloud Services.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

Jugo: A Generic Architecture for Composite Cloud as a Service.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

2015
e-ESAS: Evolution of a participatory design-based solution for breast cancer (BC) patients in rural Bangladesh.
Pers. Ubiquitous Comput., 2015

LINCS: Towards building a trustworthy litigation hold enabled cloud storage system.
Digit. Investig., 2015

High-Performance Classification of Phishing URLs Using a Multi-modal Approach with MapReduce.
Proceedings of the 2015 IEEE World Congress on Services, 2015

Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things.
Proceedings of the 2015 IEEE World Congress on Services, 2015

Towards a Systematic Analysis of Challenges and Issues in Secure Mobile Cloud Forensics.
Proceedings of the 3rd IEEE International Conference on Mobile Cloud Computing, 2015

SEPIA: Secure-PIN-Authentication-as-a-Service for ATM Using Mobile and Wearable Devices.
Proceedings of the 3rd IEEE International Conference on Mobile Cloud Computing, 2015

Aura: An IoT Based Cloud Infrastructure for Localized Mobile Computation Outsourcing.
Proceedings of the 3rd IEEE International Conference on Mobile Cloud Computing, 2015

A Trustworthy Cloud Forensics Environment.
Proceedings of the Advances in Digital Forensics XI, 2015

Digital Forensics in the Age of Big Data: Challenges, Approaches, and Opportunities.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

D-CLOC: A Delay Tolerant Cloud Formation Using Context-Aware Mobile Crowdsourcing.
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015

FAIoT: Towards Building a Forensics Aware Eco System for the Internet of Things.
Proceedings of the 2015 IEEE International Conference on Services Computing, 2015

MIDEP: Multiparty Identity Establishment Protocol for Decentralized Collaborative Services.
Proceedings of the 2015 IEEE International Conference on Services Computing, 2015

Fuzzy Authentication Using Interaction Provenance in Service Oriented Computing.
Proceedings of the 2015 IEEE International Conference on Services Computing, 2015

OCF: An Open Cloud Forensics Model for Reliable Digital Forensics.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

PLAG: Practical Landmark Allocation for Cloud Geolocation.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

2014
Hot Zone Identification: Analyzing Effects of Data Sampling on Spam Clustering.
J. Digit. Forensics Secur. Law, 2014

FAPA: flooding attack protection architecture in a cloud system.
Int. J. Cloud Comput., 2014

Towards building a forensics aware language for secure logging.
Comput. Sci. Inf. Syst., 2014

A trust based Information sharing model (TRUISM) in MANET in the presence of uncertainty.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

Sockpuppet Detection in Wikipedia: A Corpus of Real-World Deceptive Writing for Linking Identities.
Proceedings of the Ninth International Conference on Language Resources and Evaluation, 2014

A Straightforward Author Profiling Approach in MapReduce.
Proceedings of the Advances in Artificial Intelligence - IBERAMIA 2014, 2014

'Who, When, and Where?' Location Proof Assertion for Mobile Devices.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

Interaction provenance model for unified authentication factors in service oriented computing.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

OTIT: towards secure provenance modeling for location proofs.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

UDaaS: A Cloud-Based URL-Deduplication-as-a-Service for Big Datasets.
Proceedings of the 2014 IEEE Fourth International Conference on Big Data and Cloud Computing, 2014

CURLA: Cloud-Based Spam URL Analyzer for Very Large Datasets.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014

A Comparative Study on I/O Performance between Compute and Storage Optimized Instances of Amazon EC2.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014

CellCloud: A Novel Cost Effective Formation of Mobile Cloud Based on Bidding Incentives.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014

Security in Big Data and Cloud Computing: Challenges, Solutions, and Open Problems.
Proceedings of the Large Scale and Big Data - Processing and Management., 2014

2013
Cloud Forensics: A Meta-Study of Challenges, Approaches, and Open Problems
CoRR, 2013

Accountable proof of ownership for data using timing element in cloud services.
Proceedings of the International Conference on High Performance Computing & Simulation, 2013

How Much Does Storage Really Cost? Towards a Full Cost Accounting Model for Data Storage.
Proceedings of the Economics of Grids, Clouds, Systems, and Services, 2013

FAL: A Forensics Aware Language for Secure Logging.
Proceedings of the 2013 Federated Conference on Computer Science and Information Systems, 2013

SecLaaS: secure logging-as-a-service for cloud forensics.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

Sensing-enabled channels for hard-to-detect command and control of mobile devices.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
The Enemy Within: The Emerging Threats to Healthcare from Malicious Mobile Devices
CoRR, 2012

Cloud Based Content Fetching: Using Cloud Infrastructure to Obfuscate Phishing Scam Analysis.
Proceedings of the Eighth IEEE World Congress on Services, 2012

I Have the Proof: Providing Proofs of Past Data Possession in Cloud Forensics.
Proceedings of the 2012 ASE International Conference on Cyber Security, 2012

MANTICORE: Masking All Network Traffic via IP Concealment with OpenVPN Relaying to EC2.
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012

2011
Where Have You Been? Secure Location Provenance for Mobile Devices
CoRR, 2011

The Life and Death of Unwanted Bits: Towards Proactive Waste Data Management in Digital Ecosystems
CoRR, 2011

Efficient audit-based compliance for relational data retention.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
Trustworthy vacuuming and litigation holds in long-term high-integrity records retention.
Proceedings of the EDBT 2010, 2010

2009
Secure Provenance: Protecting theGenealogy of Bits.
login Usenix Mag., 2009

Preventing history forgery with secure provenance.
ACM Trans. Storage, 2009

The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance.
Proceedings of the 7th USENIX Conference on File and Storage Technologies, 2009

Remembrance: The Unbearable Sentience of Being Digital.
Proceedings of the CIDR 2009, 2009

2008
Database Issues in Trust Management and Trust Negotiation.
Proceedings of the Handbook of Database Security - Applications and Trends, 2008

Trustworthy Records Retention.
Proceedings of the Handbook of Database Security - Applications and Trends, 2008

A component-based framework for radio-astronomical imaging software systems.
Softw. Pract. Exp., 2008

Please Permit Me: Stateless Delegated Authorization in Mashups.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

2007
Introducing secure provenance: problems and challenges.
Proceedings of the 2007 ACM Workshop On Storage Security And Survivability, 2007

Requirements of Secure Storage Systems for Healthcare Records.
Proceedings of the Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, 2007

Improving multi-tier security using redundant authentication.
Proceedings of the 2007 ACM workshop on Computer Security Architecture, 2007

2006
UCLog+ : A Security Data Management System for Correlating Alerts, Incidents, and Raw Data From Remote Logs
CoRR, 2006

A statistical analysis of disclosed storage security breaches.
Proceedings of the 2006 ACM Workshop On Storage Security And Survivability, 2006

Synergy: A Policy-Driven, Trust-Aware Information Dissemination Framework.
Proceedings of the Intelligence and Security Informatics, 2006

2005
The evolution of storage service providers: techniques and challenges to outsourcing storage.
Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, 2005

Toward a threat model for storage systems.
Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, 2005

The techniques and challenges of immutable storage with applications in multimedia.
Proceedings of the Storage and Retrieval Methods and Applications for Multimedia 2005, 2005

Trade-Offs in Protecting Storage: A Meta-Data Comparison of Cryptographic, Backup/Versioning, Immutable/Tamper-Proof, and Redundant Storage Solutions.
Proceedings of the 22nd IEEE / 13th NASA Goddard Conference on Mass Storage Systems and Technologies (MSST 2005), 2005

A Survey of Peer-to-Peer Storage Techniques for Distributed File Systems.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005


  Loading...