Publications

[Journal] [Book Chapters] [Conference/Workshop] [Poster]

Journal Publications

    1. Mohammad Aminul Hoque, Mahmud Hossain, Shahid Noor, S. M. Riazul Islam, and Ragib  Hasan,  “IoTaaS: Drone Based IoT-as-a-Service Framework For Smart Cities”,  IEEE Internet of Things Journal, Accepted for Publications, 2021.(Impact factor:  11.705)
    2. J Brad Meers, Scott W Snyder,Ragib Hasan, Yuliang Zheng, James Davies, and Ahmed Zaky, “Hemodynamic Instability Resulting from Pseudo-malfunction of A Leadless Pacemaker During Off-Pump Coronary Artery Bypass Grafting”, Journal of Cardiothoracic and Vascular Anesthesia, In Press, Published online:  November 1, 2021, doi:  https://doi.org/10.1053/j.jvca.2021.10.038(Impact Factor:  2.628)
    3. David Schwebel, Ragib Hasan, Russell Griffin, Raiful Hasan Mohammad Aminul Hoque,Md. Yasser Karim, Kevin Luo, Anna Johnston, “Reducing Distracted Pedestrian Behavior using Bluetooth Beacon Technology: A Crossover Trial”, Accident Analysis and Prevention, to appear,2021 (Impact Factor: 4.993).
    4. Mahmud Hossain, Golam Kayas, Yasser Karim, Ragib Hasan, Jamie Payton, and S. M.Riazul Islam, “CATComp: A Compression-aware Authorization Protocol for Resource-efficient Communications in IoT Networks”, In IEEE IoT Journal, Accepted for Publications, 2021.(Impact factor: 11.705)
    5. Raiful Hasan and Ragib Hasan, “FinderX: A Bluetooth Beacon Based System forDesigning Sustainable Green Smart Cities,” in IEEE Consumer Electronics Magazine, doi:10.1109/MCE.2021.3076290, 2021
    6. Mahmud Hossain and Ragib Hasan, “P-HIP: A Lightweight and Privacy-Aware Host Identity Protocol for Internet of Things,” in IEEE Internet of Things Journal, Published Online in July 2020. doi: 10.1109/JIOT.2020.3009024.
    7. Arsh Arora, Ragib Hasan, and Gary Warner, “Obsolete Ransomware: A Comprehensive Study of the Continued Threat to Users”, International Journal of Internet Technology and Secured Transactions 7(3), 2020.
    8. David C. Schwebel, Ragib Hasan, Russell Griffin, “Using Bluetooth Beacon Technology to Reduce Distracted Pedestrian Behavior: A Crossover Trial Study Protocol”, Published Online:30 December 2019. doi: 10.1136/injuryprev-2019-043436, Injury Prevention, 2019, (Impact factor:2.987).
    9. Ragib Hasan, Md. Mahmud Hossain, and Rasib Khan, “Aura: An Incentive-DrivenAd-Hoc IoT Cloud Framework for Proximal Mobile Computation Offloading”, To appear at Future Generation Computer Systems, Elsevier, 2018 (Impact factor: 3.997).
    10. Mahmud Hossain, S.M. Riazul Islam, Farman Ali, Kyung-Sup Kwak, and Ragib Hasan,“An Internet of Things-based health prescription assistant and its security system design”, Future Generation Computer Systems, Elsevier, 2018 (Impact factor: 3.997).
    11. Ragib Hasan and Rasib Khan, “Unified authentication factors and fuzzy service access using interaction provenance”, Computers & Security, Volume 67, June 2017, Pages 211-231.(Impact factor 1.640).
    12. Shams Zawoad, Amit Dutta, and Ragib Hasan, “Towards Building Forensics Enabled Cloud Through Secure Logging-as-a-Service”, IEEE Transactions on Dependable and Secure Computing (TDSC), SI-Cyber Crime, vol. 13, no. 2, pp. 148-162, 2016. (Impact factor 1.351) [pdf]
    13. Ragib Hasan, Rasib Khan, Shams Zawoad, Md Haque, “WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices”, IEEE Transactions on Emerging Topics in Computing (TETC) SI on Cyber Security, vol. 4, no. 1, pp. 128-141, 2016. [pdf].
    14. Shams Zawoad, Ragib Hasan, and John W Grimes, “LINCS: Towards Building a Trustworthy Litigation Hold Enabled Cloud Storage System”, Digital Investigation, Elsevier, Vol 14, pp. S55 – S67, 2015. (Impact factor 1.648) [pdf]
    15. Rasib Khan, Md Munirul Haque, and Ragib Hasan, “Towards Supply Chain Information Integrity Preservation“, The Journal of Defense Software Engineering (CrossTalk), pp. 4-10, Sep-Oct 2015.
    16. Shams Zawoad, Ragib Hasan, Gary Warner, Md Munirul Haque “Towards a Cloud-based Approach for SPAM URL Deduplication for Big Datasets “, International Journal of Cloud Computing (IJCC), 2(3), 2014, pp. 1-14.
    17. Shahid Noor, Ragib Hasan, Md. Munirul Haque, “CellCloud: Towards A Cost-Effective Formation of Mobile Cloud Based on Bidding Incentives“, Accepted for publication at the International Journal of Cloud Computing (IJCC), 2015.
    18. Rasib Khan, Mainul Mizan, Ragib Hasan, Alan Sprague: “Hot Zone Identification: Analyzing Effects of Data Sampling on Spam Clustering”, Journal of Digital Forensics, Security and Law (JDFSL), 9(1): 67-82 (2014).
      [Note: This paper supersedes the conference version from ADFSL 2014 below.]
    19. Md Haque, Ferdaus Kawsar, Md Adibuzzaman, Sheikh Iqbal Ahamed, Md Uddin, Richard Love, Ragib Hasan, Rumana Dowla, Tahmina Ferdousy, and Reza Salim, “e-ESAS: Evolution of a Participatory Design based Solution for Breast Cancer (BC) Patients in Rural Bangladesh”,  Springer Journal of Personal and Ubiquitous Computing, Volume 19, Issue 2, pp 395-413, February 2015.
    20. Shams Zawoad, Marjan Mernik, and Ragib Hasan. “Towards Building A Forensics Aware Language For Secure Logging“, Computer Science and Information Systems, Volume 11, Issue 4, Pages: 1291-1314, 2014.
    21. Kazi Zunnurhain, Susan Vrbsky, and Ragib Hasan, “FAPA: Flooding Attack Protection Architecture in a Cloud System”, International Journal of Cloud Computing, Vol 3, No. 4, ppp. 379-401, Inderscience, 2014.
    22. Shams Zawoad and Ragib Hasan, “Digital Forensics in the Cloud”, The Journal of Defense Software Engineering (CrossTalk) Sept 2013, Vol. 26, No 5, pp. 17-20 [pdf]
    23. Shams Zawoad and Ragib Hasan, “Towards Building Proofs of Past Data Possession in Cloud Forensics”, Academy of Science and Engineering Journal 2012, Vol. 1, Issue 4, pp. 195-207 (Acceptance rate: 3%). [pdf]
    24. Ragib Hasan, Radu Sion, and Marianne Winslett, “Preventing History forgery with Secure Provenance”, ACM Transactions on Storage, Vol. 5, Issue 4, pp. 12:1-12:43, December 2009, ACM Press. [pdf]
    25. Athol J. Kemball, Richard M. Crutcher, and Ragib Hasan, “A component-based framework for radio-astronomical imaging software systems”,Software: Practice and Experience (SP&E), John Wiley & Sons, Ltd, June 2007.

Book Chapters

    1. Shams Zawoad and Ragib Hasan, “Cloud Forensics” in “Encyclopedia of Cloud Computing “, WILEY, 2014.
    2. Ragib Hasan,
      “Security and Privacy in Big Data and Cloud Computing: Challenges, Solutions, and Open Problems”
      in “Advances in data processing techniques in the era of Big Data“, CRC Press, 2013.
    3. Ragib Hasan, Marianne Winslett, Windsor Hsu, and Radu Sion,
      “Trustworthy Record Retention”,
      in “The Handbook of Database Security: Applications and Trends”, M. Gertz and S. Jajodia (editors), Springer Verlag 2007 [Amazon]
    4. Dongyi Li, Will Winsborough, Ragib Hasan, and Marianne Winslett,
      “Trust Management”,
      in “The Handbook of Database Security: Applications and Trends”, M. Gertz and S. Jajodia (editors), Springer Verlag 2007. [Amazon]

Recent Conference/Workshop Publications

    • 2021
      1. Mohammad Aminul Hoque and Ragib Hasan, “AVGuard: A Forensic Investigation Framework for Autonomous Vehicles”, In Proceedings of the IEEE Conference on Communications(IEEE ICC), 2021.
      2. Raiful Hasan, Mohammad Aminul Hoque, Yasser Karim, Russell Griffin, David Schwebel, Ragib Hasan, “StreetBit: A Bluetooth Beacon-based Personal Safety Application for DistractedPedestrians”, in Proceedings of the IEEE Consumer Communications & Networking Conference (CCNC), 2021.
      3. Raiful Hasan and Ragib Hasan, “ConSec: Video Conferencing System Security ThreatModeling and Analysis”, in Proceedings of the IEEE Consumer Communications & Networking Conference (CCNC), 2021.
      4. Raiful Hasan and Ragib Hasan, “InSight: A Bluetooth Beacon-based Ad-hoc EmergencyAlert System for Smart Cities”, in Proceedings of the IEEE Consumer Communications & Networking Conference (CCNC), 2021.
    • 2020
      1. Raiful Hasan and Ragib Hasan, “BeaCloud: A Generic Architecture for Sustainable Smart City Using Bluetooth Beacons”, In Proceedings of the 18th IEEE International Conference on Smart City (SmartCity-2020), December 2020.
      2. Shahid Noor, Yasser Karim, Mahmud Hossain, and Ragib Hasan, “CrowdPick: A GenericFramework for Delivering Service Specific Crowd Infrastructure”, In Proceedings of the 11th IEEE Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON),2020. (Recipient of Best presenter award.)
      3. Shahid Noor, Mahmud Hossain, Rasib Khan, Ragib Hasan, and S. M. Riazul Islam, “Bepari: A Cost-Aware Comprehensive Agent Architecture for Opaque Cloud Services”, In Proceedings of the 11th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), 2020
      4. Ragib Hasan, Yuliang Zheng, and Jeffery T. Walker, “Digital Forensics Education for Judicial Officials”, National Cyber Summit, 2020.
      5. Yasser Karim and Ragib Hasan, “Taming the Digital Bandits: An Analysis of Digital BankHeists and A System for Detecting Fake Messages in Electronic Funds Transfer”, National Cyber Summit, 2020.
      6. Raiful Hasan, Mohammad Aminul Hoque, Yasser Karim, Russell Griffin, David Schwebel, Ragib Hasan, “Smartphone-based Distracted Pedestrian Localization using Bluetooth Low Energy Beacons”, In Proceedings of IEEE Southeastcon, Raleigh, NC, 2020.
      7. Yasser Karim and Ragib Hasan, “Securing the Fog using Software-Defined Networking: AStudy of Challenges, Approaches, and Open Problems”, In Proceedings of IEEE Southeastcon, Raleigh, NC, 2020.
      8. Yasser Karim and Ragib Hasan, “FogTestBed: A Generic Architecture for Testbed forFog-based Systems ”, In Proceedings of IEEE Southeastcon, Raleigh, NC, 2020.
      9. Raiful Hasan and Ragib Hasan, “Towards Designing a Sustainable Green Smart City Using Bluetooth Beacons”, In Proceedings of the 6th IEEE World Forum on Internet of Things, NewOrleans, Louisiana, USA, 2020.
      10. Mohammad Aminul Hoque, Mahmud Hossain, and Ragib Hasan, “IGaaS: An IoT Gateway-as-a-Service for On-demand Provisioning of IoT Gateways”, In Proceedings of the 6th IEEE WorldForum on Internet of Things, New Orleans, Louisiana, USA, 2020.
      11. Mohammad Aminul Hoque and Ragib Hasan, “VFbed: An Architecture for Testbed-as-a-Service for Vehicular Fog-based Systems”, In Proceedings of the 6th IEEE World Forum on Internet of Things, New Orleans, Louisiana, USA, 2020.
    • 2019
      1. Arsh Arora, Ragib Hasan, and Gary Warner, “2017 Ransomware Case Study: What is Old, May not be Dead”, in Proceedings of the 14th International Conference for Internet Technology and Secured Transactions (ICITST-2019), London, UK, December 9-11, 2019.
      2. Mohammad Aminul Hoque and Ragib Hasan, “Towards a Threat Model for Vehicular Fog Computing”, Proceedings of The IEEE 10th Annual Ubiquitous Computing, ElectronicsMobile Communication Conference (UEMCON), New York, NY, USA, October 10-12, 2019.
      3. Yasser Karim and Ragib Hasan, “Towards a Threat Model for Fog Computing”, Proceedings of The IEEE 10th Annual Ubiquitous Computing, Electronics Mobile CommunicationConference (UEMCON), New York, NY, USA, October 10-12, 2019.
      4. David J Hoxie, Saad Raja, and Ragib Hasan, “Entropy of PRNGs and the Accuracy of Monte-Carlo Simulations in a Publicly Distributed Computing Environment”, Proceedings of IEEE Southeastcon, Huntsville, AL, April 11-14, 2019.
      5. Yasser Karim, Kiavash Satvat, Mahshid Hosseini, andRagib Hasan, “PurgeMEM: To-wards Building A Memory Safe Cloud”, Proceedings of IEEE Southeastcon, Huntsville, AL, April11-14, 2019.
      6. Mohammad Aminul Hoque and Ragib Hasan, “Towards an Analysis of the Architecture, Security, and Privacy Issues in Vehicular Fog Computing”, Proceedings of IEEE Southeastcon, Huntsville, AL, April 11-14, 2019.
    • 2018
        1. Mahmud Hossain, Yasser Karim, and Ragib Hasan, “FIF-IoT: A Forensic Investigation Framework for IoT Using a Public Digital Ledger”, IEEE International Congress on Internet of Things (ICIOT 2018), San Francisco, CA, June 2018.
        2. Rasib Khan and Ragib Hasan, “Security-Aware Passwords and Services Usage in Develop- ing Countries: A Case Study of Bangladesh”, In Proceedings of the 2018 International Conference on Services Computing (SCC 2018), Seattle, Washington, June 2018.
        3. Mahmud Hossain, Md. Yasser Karim, and Ragib Hasan, “SecuPAN: A Security Scheme to Mitigate Fragmentation-Based Network Attacks in 6LoWPAN”, In Proceedings of the 8th ACM Conference on Data and Application Security and Privacy (CODASPY), Tempe, AZ, March 2018.
        4. Shams Zawoad and Ragib Hasan, “SECProv: Trustworthy and Efficient Provenance Management in the Cloud”, In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), Honolulu, Hawaii, April 2018 (Acceptance rate: 19.2%).
        5. S. M. Riazul Islam, Mahmud Hossain, and Ragib Hasan, “A Conceptual Framework for an IoT-Based Health Assistant and Its Authorization Model”, in Proceedings of the 8th IEEE Annual Computing and Communication Workshop and Conference (IEEE CCWC), Las Vegas, NV, USA, 2018.
        6. Jayun Patel and Ragib Hasan, “Smart Bracelets: Towards Automating Personal Safety using Wearable Smart Jewelry”, in Proceedings of the 15th Annual IEEE Consumer Communications & Networking Conference (CCNC), Las Vegas, USA, January 2018.

       

      • 2017
        1. Shahid Al Noor, Ragib Hasan, and Arsh Arora, ”ParkBid: An Incentive-Based Crowdsourced Bidding Service for Parking Reservation”, in Proceedings of the 14th IEEE International Conference on Services Computing (SCC), Honolulu, Hawaii, 2017. (Acceptance Rate 20%). [pdf]
        2. Mahmud Hossain, Ragib Hasan, and Anthony Skjellum, “Securing the Internet of Things: A Meta-Study of Challenges, Approaches, and Open Problems”, IEEE International Workshop on the Internet of Things Computing and Applications (IoTCA), Atlanta, GA, USA, 2017.
        3. Mahmud Hossain, Shahid Al Noor, Yasser Karim, and Ragib Hasan, ”IoTbed: A Generic Architecture for Testbed as a Service for Internet of Things-based Systems”, in Proceedings of the 2nd IEEE International Congress on Internet of Things (ICIoT), Honolulu, Hawaii, 2017. [pdf]
        4. Mahmud Hossain and Ragib Hasan, “Boot-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of IoT Nodes”, in Proceedings of the 2nd IEEE International Congress on Internet of Things (ICIoT), Honolulu, Hawaii, 2017.
        5. Mahmud Hossain, Ragib Hasan, and Shams Zawoad, ”Trust-IoV: A Trustworthy Forensic Investigation Framework for the Internet of Vehicles (IoV)”, in Proceedings of the 2nd IEEE International Congress on Internet of Things (ICIoT), Honolulu, Hawaii, 2017.
        6. Arsh Arora, Thomas Stallings, Ragib Hasan, and Gary Warner, “Malware Secrets: De-obfuscating in the cloud”, in the 10th IEEE International Conference on Cloud Computing (CLOUD), Honolulu, Hawaii, USA, 2017. [pdf]
        7. Md. Mahmud Hossain, Shahid Al Noor, and Ragib Hasan, “HSC-IoT: A Hardware and Software Co- Verification based Authentication Scheme for Internet of Things”, in Proceedings of the 5th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (IEEE Mobile Cloud), San Francisco, CA, April 2017.
        8. Shahid Al Noor and Ragib Hasan, ROSAC: A Round-Wise Fair Scheduling Approach for Mobile Cloud Based on Task Asymptotic Complexity’‘, in Proceedings of the 5th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (IEEE Mobile Cloud), San Francisco, CA, April 2017.
        9. Rasib Khan and Ragib Hasan, “DExaS: Delegated Experience as a Service for Mobile and Wearable Devices’‘, In Proceedings of the 14th Annual IEEE Consumer Communications \& Networking Conference (CCNC), Las Vegas, USA, January 2017.
        10. Maya Guru, Ragib Hasan, and Rasib Khan, “Towards Non-intrusive Continuous Healthcare Monitoring with the Smart Hospital Gown”, In Proceedings of the 14th Annual IEEE Consumer Communications & Networking Conference (CCNC), Las Vegas, USA, January 2017.
      • 2016
        1. Rasib Khan and Ragib Hasan, “DExaS: Delegated Experience as a Service for Mobile and Wearable Devices”, In Proceedings of the 14th Annual IEEE Consumer Communications & Networking Conference (CCNC), Las Vegas, USA, January 2017.
        2. Mahmud Hossain, Shahid Noor, Dibya Mukhapadhay, Ragib Hasan, and Lei Li, “CACROS: A Context Aware Cloud Content Roaming Service”, In Proceedings of the IEEE International Conference on Smart Cloud (SmartCloud 2016) November 18th-20th, 2016, New York, USA.
        3. Ragib Hasan, Shams Zawoad, and Md. Munirul Haque, “StuxMob: A Situational-Aware Malware for Targeted Attack on Smart Mobile Devices”, In Proceedings of the 35th IEEE international Conference for Military Communications (IEEE MILCOM), Baltimore, MD, November 2016.
        4. Shahid Noor, Mahmud Hossain, and Ragib Hasan, “SASCloud: Ad hoc Cloud as Secure Storage”, In Proceedings of the 6th IEEE International Conference on Big Data and Cloud Computing (BDCloud), Atlanta, GA, October 2016.
        5. Mohammad Kamrul Islam and Ragib Hasan, “Verifiable Data Redundancy in The cloud”, In Proceedings of the 6th IEEE International Conference on Big Data and Cloud Computing (BDCloud), Atlanta, GA, October 2016.
        6. Lei Li, Kai Qian, and Ragib Hasan, “The Art of War: Developing Role-based Hands-on Labware for Emerging Database Security”, in Proceedings of SIGITE/RIIT, September  2016.
        7. Shahid Al Noor, Rasib Khan, Md. Mahmud Hossain,and Ragib Hasan, “Litigo: A Cost-Driven Model for Opaque Cloud Services”, In Proceedings of the 9th IEEE International Conference on Cloud Computing (IEEE CLOUD), San Francisco, CA, July 2016. (Acceptance Rate 15%).
        8. Md. Mahmud Hossain, Rasib Khan, Shahid Al Noor, and Ragib Hasan, “Jugo: A Generic Architecture for Composite Cloud as a Service”, In Proceedings of the 9th IEEE International Conference on Cloud Computing (IEEE CLOUD), San Francisco, CA, July 2016. (Acceptance Rate 15%).
        9. Shams Zawoad and Ragib Hasan, “SECAP: Towards Securing Application Provenance in the Cloud”, In Proceedings of the 9th IEEE International Conference on Cloud Computing (IEEE CLOUD), San Francisco, CA, July 2016. (Acceptance Rate 15%).
        10. Shams Zawoad and Ragib Hasan “Chronos: Towards Securing System Time in the Cloud for Reliable Forensics Investigation“, In Proceedings of the 40th IEEE Computer Society International Conference on Computers, Software & Applications (COMPSAC), Atlanta, Georgia, June 2016. (Acceptance rate 18%)
        11. Ragib Hasan, Shams Zawoad, Shahid Noor, Md Munirul Haque, and Darrell Burke “How Secure is the Healthcare Network from Insider Attacks? An Audit Guideline for Vulnerability Analysis“, In Proceedings of the 40th IEEE Computer Society International Conference on Computers, Software & Applications (COMPSAC), Atlanta, Georgia, June 2016. (Acceptance rate 20%)
        12. Rasib Khan and Ragib Hasan, “The Story of Naive Alice: Behavioral Analysis of Susceptible Users on the Internet“, In Proceedings of the 40th IEEE Computer Society International Conference on Computers, Software & Applications (COMPSAC), Atlanta, Georgia, June 2016. (Acceptance rate 20%)
        13. Ragib Hasan and Rasib Khan, “A Cloud You can Wear: Towards a Mobile and Wearable Personal Cloud“, In Proceedings of the 40th IEEE Computer Society International Conference on Computers, Software & Applications (COMPSAC), Atlanta, Georgia, June 2016. (Acceptance rate 20%)
      • 2015
          1. Shahid Noor and Ragib Hasan, “D-CLOC: A Delay Tolerant Cloud Formation Using Context-Aware Mobile Crowdsourcing”, In Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, Vancouver, Canada, November 2015. (Acceptance rate 48/189=25.4%).
          2. Shams Zawoad and Ragib Hasan, “Digital Forensics in the Age of Big Data: Challenges, Approaches, and Opportunities”, In Proceedings of the IEEE International Symposium on Big Data Security on Cloud (BigDataSecurity 2015), New York, August 2015.
          3. Shams Zawoad and Ragib Hasan,  “FAIoT : Towards Building a Forensics Aware Eco System for the Internet of Thing“, In Proceedings of the 12th IEEE International Conference on Services Computing (SCC), New York, USA, June 2015.
          4. Md. Mahmud Hossain, Maziar Fotouhi, and Ragib Hasan, “Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things“,In Proceedings of the IEEE Services Visionary Track on Internet of Things, New York, USA, June 2015.
          5. Niju Shrestha, Rajan Kharel, Jason Britt, Ragib Hasan, “High-performance Classification of Phishing URLs Using a Multi-modal Approach with MapReduce”, In Proceedings of the IEEE Services Visionary Track on Security and Privacy Engineering (SPE2015), New York, USA, June 2015.
          6. Shams Zawoad, Ragib Hasan, Anthony Skjellum, “OCF: An Open Cloud Forensics Model for Reliable Digital Forensics”,In Proceedings of the 8th IEEE International Conference on Cloud Computing, New York, USA, June 2015 (Acceptance rate: 14%).
          7. Maziar Foutohi, Abhishek Anand, Ragib Hasan, “PLAG: Practical Landmark Allocation for Cloud Geolocation”,In Proceedings of the 8th IEEE International Conference on Cloud Computing, New York, USA, June 2015
          8. Rasib Khan, Ragib Hasan, “MIDEP: Multiparty Identity Establishment Protocol for Decentralized Collaborative Services”,In Proceedings of the 12th IEEE International Conference on Services Computing (SCC), New York, USA, June 2015.
          9. Rasib Khan and Ragib Hasan, “Fuzzy Authentication using Interaction Provenance in Service Oriented Computing’‘, In Proceedings of the 12th IEEE International Conference on Services Computing, New York, June 2015.
          10. Shams Zawoad, Ragib Hasan, and John Grimes, “LINCS: Towards Building a Trustworthy Litigation Hold Enabled Cloud Storage System“, In Proceedings of the 15th Annual DFRWS Digital Forensics Conference, Philadelphia, PA, August, 2015.
          11. Rasib Khan, Ragib Hasan, and Jinfang Xu, “SEPIA: Secure-PIN-Authentication-as-a-Service for ATM using Mobile and Wearable Devices”, In Proceedings of the 3rd International Conference on Mobile Cloud Computing, Services, and Engineering, San Francisco (IEEE Mobile Cloud), March 2015.
          12. Ragib Hasan, Md. Mahmud Hossain, Rasib Khan, “Aura: An IoT based Cloud Infrastructure for Localized Mobile Computation Outsourcing”, short paper In Proceedings of the 3rd International Conference on Mobile Cloud Computing, Services, and Engineering, San Francisco (IEEE Mobile Cloud), March 2015.
          13. Shams Zawoad and Ragib Hasan, “Towards a Systematic Analysis of Challenges and Issues in Secure Mobile Cloud Forensics”, In Proceedings of the 3rd International Conference on Mobile Cloud Computing, Services, and Engineering, San Francisco (IEEE Mobile Cloud), March 2015.
          14. Shams Zawoad and Ragib Hasan, “FECloud: A Trustworthy Forensics-Enabled Cloud Architecture”, In Proceedings of the 11th Annual IFIP WG 11.9 International Conference on Digital Forensics, Orlando, Florida, January 2015
        2014
        1. Shams Zawoad, Ragib Hasan, Gary Warner, and Anthony Skjellum, “UDaaS: A Cloud-based URL-Deduplication-as-a-Service for Big Datasets“, in Proceedings of the 4th IEEE International Conference on Big Data and Cloud Computing (BDCloud 2014), Sydney, Australia, December 2014.
        2. Suraj Maharjan, Prasha Shrestha, Thamar Solorio, and Ragib Hasan, “A Straightforward Author Profiling Approach in MapReduce“, In Proceedings of the 14th edition of the Ibero-American Conference on Artificial Intelligence, Santiago, Chile, November, 2014.
        3. Khalid Bijon, Md Munirul Haque, and Ragib Hasan, “A TRUst based Information Sharing Model (TRUISM) in MANET in the Presence of Uncertainty“, In Proceedings of the 12th International Conference on Privacy, Security and Trust (PST), Toronto, Canada, July 2014.
        4. Rasib Khan, Shams Zawoad, Md Munirul Haque, and Ragib Hasan, “Who, When, and Where? Location Proof Assertion for Mobile Devices“, In Proceedings of the 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Vienna, Austria, July 14-16, 2014.
        5. Rasib H Khan and Ragib Hasan, “SecP2PSIP: A Distributed Overlay Architecture for Secure P2PSIP“, In Proceedings of the The Third ASE International Conference on Cyber Security (CyberSecurity), Stanford, CA, 2014.
        6. Md Munirul Haque, Sheikh Iqbal Ahamed, Ferdaus Kawsar, Md Adibuzzaman, Md Miftah Uddin, Richard Love, Ragib Hasan, Rumana Dowla, and Reza Salim, “Barriers for Breast Cancer (BC) Patients in Rural Bangladesh: Design and Deployment of a Mobile based Solution”, In Proceedings of the 20th Americas Conference on Information Systems (AMCIS 2014), August 7 – 10, 2014, Savannah, Georgia.
        7. Abu Awal Md Shoeb, Ragib Hasan, Md. Haque, and Meng Hu, ”A Comparative Study on I/O Performance between Compute and Storage Optimized Instances of Amazon EC2“. In Proceedings of the 7th IEEE International Conference on Cloud Computing (IEEE Cloud), Work in Progress Track, June 27 – July 2, 2014, Alaska, USA.
        8. Shams Zawoad, Md. Haque, and Ragib Hasan, “CURLA: Cloud-Based Spam URL Analyzer for Very Large Datasets“, In Proceedings of the 7th IEEE International Conference on Cloud Computing June 27 – July 2, 2014, Alaska, USA. (Acceptance Rate 20%).
        9. Shahid Noor, Md. Haque, and Ragib Hasan, “CellCloud: A Novel Cost Effective Formation of Mobile Cloud Based on Bidding Incentives“, In Proceedings of the 7th IEEE International Conference on Cloud Computing June 27 – July 2, 2014, Alaska, USA. (Acceptance Rate 20%).
        10. Rasib Khan, Mainul Mizan, Ragib Hasan, and Alan Sprague, “Hot Zone Identification: Analyzing Effects of Data Sampling on Spam Clustering“, ADFSL Conference on Digital Forensics, Security and Law Richmond, VA, USA, May 2014. [Note: This paper is superseded by the journal version]
        11. Rasib Khan, Shams Zawoad, Md. Haque, and Ragib Hasan, “OTIT: Towards Secure Provenance Modeling for Location Proofs“, in Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS), Kyoto, Japan, June 2014.
        12. Thamar Solorio, Ragib Hasan, and Mainul Mizan, “Sockpuppet Detection in Wikipedia: A Corpus of Real-World Deceptive Writing for Linking Identities”, In Proceedings of the 9th International Conference on Language Resources and Evaluation (LREC), Reykjavik, Iceland, May 2014.
      • 2013
        1. Shams Zawoad, Amit Dutta, Alan Sprague, Ragib Hasan and Jason Britt, “Phish-Net: Investigating Phish Clusters Using Drop Email Addresses”, In Proceedings of the 2013 APWG eCrime Researchers Summit, San Francisco, CA, September 17-18, 2013.
        2. Rasib Khan, Md Munirul Haque, and Ragib Hasan, “A Secure Location Proof Generation Scheme for Supply Chain Integrity Preservation”, In Proceedings of IEEE International Conference on Technologies for Homeland Security, Waltham, MA, November, 2013.
        3. Md Munirul Haque, Shams Zawoad, and Ragib Hasan, “Secure Techniques and Methods for Authenticating Visually Impaired Mobile Phone Users”, In the Proceedings of IEEE International Conference on Technologies for Homeland Security, Waltham, MA, November, 2013.
        4. Amit K. Dutta and Ragib Hasan, “How Much Does Storage Really Cost? Towards a Full Cost Accounting Model for Data Storage“, In Proceedings of the 10th International Conference on Economics of Grids, Clouds, Systems, and Services (GECON),  Spain, September, 2013.
        5. Ragib Hasan and Randal Burns, “The Life and Death of Unwanted Bits: Towards Proactive Waste Data Management in Digital Ecosystems“, In Proceedings of the 3rd International Conference on Innovative Computing Technology (INTECH), London, August 2013.
        6. Shams Zawoad, Marjan Mernik , and Ragib Hasan “FAL: A Forensics Aware Language for Secure Logging”, In Proceedings of the 4th Workshop on Advances in Programming Languages (WAPL), 2013.
        7. Mainul Mizan, Md Lutfor Rahman, Rasib Khan, Munirul Haque, and Ragib Hasan “Accountable Proof of Ownership for Data using Timing Element in Cloud Services”, In Proceedings of the International Symposium on Cloud Computing and Services for High Performance Computing Systems (InterCloud-HPC 2013).
        8. Thamar Solorio, Ragib Hasan, and Mainul Mizan “A Case Study of Sockpuppet Detection in Wikipedia”, In Proceedings of the NAACL/HLT Workshop on Language Analysis in Social Media (LASM 2013).
        9. Ragib Hasan, Nitesh Saxena, Tzipora Halevi, Shams Zawoad, and Dustin Rinehart, “Sensing-Enabled Channels for Hard-to-Detect Command and Control of Mobile Devices”, In Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2013. (Acceptance rate: 16.2%). [pdf]
        10. Shams Zawoad, Amit Dutta, and Ragib Hasan “SecLaaS: Secure Logging-as-a-Service for Cloud Forensics”, In Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2013. (Acceptance rate: 16.2%). [pdf]

Posters