Shams Zawoad, Ph.D.
Shams Zawoad, Ph.D.
Lead Scientist, Visa Inc.
Verified email at - Homepage
Cited by
Cited by
SecLaaS: Secure Logging-as-a-Service for Cloud Forensics
S Zawoad, AK Dutta, R Hasan
ASIA CCS '13, 2013
Cloud forensics: a meta-study of challenges, approaches, and open problems
S Zawoad, R Hasan
arXiv preprint arXiv:1302.6312, 2013
FAIoT : Towards Building a Forensics Aware Eco System for the Internet of Things
S Zawoad, R Hasan
12th IEEE International Conference on Services Computing (IEEE SCC), 2015
Towards Building Forensics Enabled Cloud Through Secure Logging-as-a-Service
S Zawoad, A Dutta, R Hasan
IEEE Transactions on Dependable and Secure Computing (TDSC) SI-Cyber Crime …, 2016
Sensing-enabled channels for hard-to-detect command and control of mobile devices
R Hasan, N Saxena, T Haleviz, S Zawoad, D Rinehart
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
Digital Forensics in the Cloud
S Zawoad, R Hasan
The Journal of Defense Software Engineering (CrossTalk) 26 (5), 2013
OCF: An Open Cloud Forensics Model for Reliable Digital Forensics
S Zawoad, R Hasan, A Skjellum
8th IEEE International Conference on Cloud Computing (IEEE Cloud), 2015
Digital Forensics in the Age of Big Data: Challenges, Approaches, and Opportunities
S Zawoad, R Hasan
IEEE International Symposium on Big Data Security on Cloud (BigDataSecurity …, 2015
Probe-IoT: A public digital ledger based forensic investigation framework for IoT.
MM Hossain, R Hasan, S Zawoad
INFOCOM workshops, 1-2, 2018
OTIT: Towards Secure Provenance Modeling for Location Proofs
R Khan, S Zawoad, MM Haque, R Hasan
ASIA CCS '14, 2014
I have the proof: Providing proofs of past data possession in cloud forensics
S Zawoad, R Hasan
Cyber Security (CyberSecurity), 2012 International Conference on, 75-82, 2012
Trust-IoV: A Trustworthy Forensic Investigation Framework for the Internet of Vehicles (IoV).
MM Hossain, R Hasan, S Zawoad
ICIOT, 25-32, 2017
WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices
R Hasan, R Khan, S Zawoad, M Haque
IEEE Transactions on Emerging Topics in Computing (TETC) SI on Cyber Security, 2015
‘who, when, and where?’location proof assertion for mobile devices
R Khan, S Zawoad, MM Haque, R Hasan
IFIP Annual Conference on Data and Applications Security and Privacy, 146-162, 2014
FECloud: A Trustworthy Forensics-Enabled Cloud Architecture
S Zawoad, R Hasan
11th Annual IFIP WG 11.9 International Conference on Digital Forensics, 2015
Secure Techniques and Methods for Authenticating Visually Impaired Mobile Phone Users
MM Haque, S Zawoad, R Hasan
IEEE International Conference on Technologies for Homeland Security, 2013
Towards Building Proofs of Past Data Possession in Cloud Forensics
S Zawoad, R Hasan
ASE Science Journal, 2012
Trustworthy digital forensics in the cloud
S Zawoad, R Hasan
Computer 49 (3), 78-81, 2016
Phish-Net: Investigating Phish Clusters Using Drop Email Addresses
S Zawoad, A Dutta, A Sprague, R Hasan, J Britt, G Warner
APWG eCrime Researchers Summit-2013, 2013
SECAP: Towards Securing Application Provenance in the Cloud
S Zawoad, R Hasan
IEEE CLOUD 2016, 0
The system can't perform the operation now. Try again later.
Articles 1–20