Ragib Hasan
TitleCited byYear
Preventing history forgery with secure provenance
R Hasan, R Sion, M Winslett
ACM Transactions on Storage (TOS) 5 (4), 12, 2009
3582009
Towards an analysis of security issues, challenges, and open problems in the internet of things
MM Hossain, M Fotouhi, R Hasan
2015 IEEE World Congress on Services, 21-28, 2015
2402015
A survey of peer-to-peer storage techniques for distributed file systems
R Hasan, Z Anwar, W Yurcik, L Brumbaugh, R Campbell
International Conference on Information Technology: Coding and Computing …, 2005
1822005
Introducing secure provenance: problems and challenges
R Hasan, R Sion, M Winslett
Proceedings of the 2007 ACM workshop on Storage security and survivability …, 2007
1592007
SecLaaS: secure logging-as-a-service for cloud forensics
S Zawoad, AK Dutta, R Hasan
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
1432013
Cloud forensics: a meta-study of challenges, approaches, and open problems
S Zawoad, R Hasan
arXiv preprint arXiv:1302.6312, 2013
1222013
Toward a threat model for storage systems
R Hasan, S Myagmar, AJ Lee, W Yurcik
Proceedings of the 2005 ACM workshop on Storage security and survivability …, 2005
732005
Faiot: Towards building a forensics aware eco system for the internet of things
S Zawoad, R Hasan
2015 IEEE International Conference on Services Computing, 279-284, 2015
712015
A case study of sockpuppet detection in wikipedia
T Solorio, R Hasan, M Mizan
Proceedings of the Workshop on Language Analysis in Social Media, 59-68, 2013
652013
Towards building forensics enabled cloud through secure logging-as-a-service
S Zawoad, AK Dutta, R Hasan
IEEE Transactions on Dependable and Secure Computing 13 (2), 148-162, 2015
582015
Aura: An iot based cloud infrastructure for localized mobile computation outsourcing
R Hasan, MM Hossain, R Khan
2015 3rd IEEE International Conference on Mobile Cloud Computing, Services …, 2015
512015
Sensing-enabled channels for hard-to-detect command and control of mobile devices
R Hasan, N Saxena, T Haleviz, S Zawoad, D Rinehart
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
502013
A statistical analysis of disclosed storage security breaches
R Hasan, W Yurcik
Proceedings of the second ACM workshop on Storage security and survivability …, 2006
472006
Where have you been? secure location provenance for mobile devices
R Hasan, R Burns
arXiv preprint arXiv:1107.1821, 2011
412011
Analyzing NASPInet data flows
R Hasan, R Bobba, H Khurana
2009 IEEE/PES Power Systems Conference and Exposition, 1-6, 2009
412009
Digital forensics in the cloud
S Zawoad, R Hasan
Crosstalk - Journal of Defense Software Engineering, 2013
382013
Cellcloud: A novel cost effective formation of mobile cloud based on bidding incentives
S Al Noor, R Hasan, MM Haque
2014 IEEE 7th International Conference on Cloud Computing, 200-207, 2014
362014
History of linux
R Hasan
332002
An Internet of Things-based health prescription assistant and its security system design
M Hossain, SMR Islam, F Ali, KS Kwak, R Hasan
Future generation computer systems 82, 422-439, 2018
322018
Please permit me: Stateless delegated authorization in mashups
R Hasan, M Winslett, R Conlan, B Slesinsky, N Ramani
2008 Annual Computer Security Applications Conference (ACSAC), 173-182, 2008
292008
The system can't perform the operation now. Try again later.
Articles 1–20