Amit Kumar Dutta
Cited by
Cited by
SecLaaS: secure logging-as-a-service for cloud forensics
S Zawoad, AK Dutta, R Hasan
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
Towards building forensics enabled cloud through secure logging-as-a-service
S Zawoad, AK Dutta, R Hasan
IEEE Transactions on Dependable and Secure Computing 13 (2), 148-162, 2015
How much does storage really cost? Towards a full cost accounting model for data storage
AK Dutta, R Hasan
International Conference on Grid Economics and Business Models, 29-43, 2013
Phish-net: investigating phish clusters using drop email addresses
S Zawoad, AK Dutta, A Sprague, R Hasan, J Britt, G Warner
2013 APWG eCrime Researchers Summit, 1-13, 2013
Prefix transpositions on binary and ternary strings
AK Dutta, M Hasan, MS Rahman
Information Processing Letters 113 (8), 265-270, 2013
The system can't perform the operation now. Try again later.
Articles 1–5