Shams Zawoad

According to our database1, Shams Zawoad authored at least 29 papers between 2012 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Privacy-Preserving Application-to-Application Authentication Using Dynamic Runtime Behaviors.
CoRR, 2022

2018
SECProv: Trustworthy and Efficient Provenance Management in the Cloud.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Probe-IoT: A public digital ledger based forensic investigation framework for IoT.
Proceedings of the IEEE INFOCOM 2018, 2018

2017
Trust-IoV: A Trustworthy Forensic Investigation Framework for the Internet of Vehicles (IoV).
Proceedings of the 2017 IEEE International Congress on Internet of Things, 2017

2016
WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices.
IEEE Trans. Emerg. Top. Comput., 2016

Towards Building Forensics Enabled Cloud Through Secure Logging-as-a-Service.
IEEE Trans. Dependable Secur. Comput., 2016

Trustworthy Digital Forensics in the Cloud.
Computer, 2016

StuxMob: A situational-aware malware for targeted attack on smart mobile devices.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Chronos: Towards Securing System Time in the Cloud for Reliable Forensics Investigation.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

How Secure is the Healthcare Network from Insider Attacks? An Audit Guideline for Vulnerability Analysis.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

SECAP: Towards Securing Application Provenance in the Cloud.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

2015
LINCS: Towards building a trustworthy litigation hold enabled cloud storage system.
Digit. Investig., 2015

Towards a Systematic Analysis of Challenges and Issues in Secure Mobile Cloud Forensics.
Proceedings of the 3rd IEEE International Conference on Mobile Cloud Computing, 2015

A Trustworthy Cloud Forensics Environment.
Proceedings of the Advances in Digital Forensics XI, 2015

Digital Forensics in the Age of Big Data: Challenges, Approaches, and Opportunities.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

FAIoT: Towards Building a Forensics Aware Eco System for the Internet of Things.
Proceedings of the 2015 IEEE International Conference on Services Computing, 2015

OCF: An Open Cloud Forensics Model for Reliable Digital Forensics.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

2014
Towards building a forensics aware language for secure logging.
Comput. Sci. Inf. Syst., 2014

'Who, When, and Where?' Location Proof Assertion for Mobile Devices.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

OTIT: towards secure provenance modeling for location proofs.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

UDaaS: A Cloud-Based URL-Deduplication-as-a-Service for Big Datasets.
Proceedings of the 2014 IEEE Fourth International Conference on Big Data and Cloud Computing, 2014

CURLA: Cloud-Based Spam URL Analyzer for Very Large Datasets.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014

2013
Cloud Forensics: A Meta-Study of Challenges, Approaches, and Open Problems
CoRR, 2013

FAL: A Forensics Aware Language for Secure Logging.
Proceedings of the 2013 Federated Conference on Computer Science and Information Systems, 2013

Phish-Net: Investigating phish clusters using drop email addresses.
Proceedings of the 2013 APWG eCrime Researchers Summit, 2013

SecLaaS: secure logging-as-a-service for cloud forensics.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

Sensing-enabled channels for hard-to-detect command and control of mobile devices.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
The Enemy Within: The Emerging Threats to Healthcare from Malicious Mobile Devices
CoRR, 2012

I Have the Proof: Providing Proofs of Past Data Possession in Cloud Forensics.
Proceedings of the 2012 ASE International Conference on Cyber Security, 2012


  Loading...