Ragib Hasan
Title
Cited by
Cited by
Year
Preventing history forgery with secure provenance
R Hasan, R Sion, M Winslett
ACM Transactions on Storage (TOS) 5 (4), 1-43, 2009
3502009
Towards an analysis of security issues, challenges, and open problems in the internet of things
MM Hossain, M Fotouhi, R Hasan
2015 IEEE World Congress on Services, 21-28, 2015
2912015
A survey of peer-to-peer storage techniques for distributed file systems
R Hasan, Z Anwar, W Yurcik, L Brumbaugh, R Campbell
International Conference on Information Technology: Coding and Computing …, 2005
1862005
Introducing secure provenance: problems and challenges
R Hasan, R Sion, M Winslett
Proceedings of the 2007 ACM workshop on Storage security and survivability …, 2007
1622007
SecLaaS: secure logging-as-a-service for cloud forensics
S Zawoad, AK Dutta, R Hasan
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
1502013
Cloud forensics: a meta-study of challenges, approaches, and open problems
S Zawoad, R Hasan
arXiv preprint arXiv:1302.6312, 2013
1262013
Faiot: Towards building a forensics aware eco system for the internet of things
S Zawoad, R Hasan
2015 IEEE International Conference on Services Computing, 279-284, 2015
862015
Toward a threat model for storage systems
R Hasan, S Myagmar, AJ Lee, W Yurcik
Proceedings of the 2005 ACM workshop on Storage security and survivability …, 2005
782005
A case study of sockpuppet detection in wikipedia
T Solorio, R Hasan, M Mizan
Proceedings of the Workshop on Language Analysis in Social Media, 59-68, 2013
712013
Towards building forensics enabled cloud through secure logging-as-a-service
S Zawoad, AK Dutta, R Hasan
IEEE Transactions on Dependable and Secure Computing 13 (2), 148-162, 2015
642015
Sensing-enabled channels for hard-to-detect command and control of mobile devices
R Hasan, N Saxena, T Haleviz, S Zawoad, D Rinehart
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
522013
Aura: An iot based cloud infrastructure for localized mobile computation outsourcing
R Hasan, MM Hossain, R Khan
2015 3rd IEEE International Conference on Mobile Cloud Computing, Services …, 2015
502015
A statistical analysis of disclosed storage security breaches
R Hasan, W Yurcik
Proceedings of the second ACM workshop on Storage security and survivability …, 2006
472006
Analyzing NASPInet data flows
R Hasan, R Bobba, H Khurana
2009 IEEE/PES Power Systems Conference and Exposition, 1-6, 2009
432009
Digital forensics in the cloud
S Zawoad, R Hasan
Crosstalk - Journal of Defense Software Engineering, 2013
412013
An internet of things-based health prescription assistant and its security system design
M Hossain, SMR Islam, F Ali, KS Kwak, R Hasan
Future generation computer systems 82, 422-439, 2018
392018
Cellcloud: A novel cost effective formation of mobile cloud based on bidding incentives
S Al Noor, R Hasan, MM Haque
2014 IEEE 7th International Conference on Cloud Computing, 200-207, 2014
382014
Where have you been? secure location provenance for mobile devices
R Hasan, R Burns
arXiv preprint arXiv:1107.1821, 2011
372011
History of linux
R Hasan
332002
Please permit me: Stateless delegated authorization in mashups
R Hasan, M Winslett, R Conlan, B Slesinsky, N Ramani
2008 Annual Computer Security Applications Conference (ACSAC), 173-182, 2008
302008
The system can't perform the operation now. Try again later.
Articles 1–20