Ragib Hasan
Orcid: 0000-0001-5248-8341Affiliations:
- University of Alabama at Birmingham, USA
- University of Illinois, USA (former)
According to our database1,
Ragib Hasan
authored at least 137 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on twitter.com
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
A Holistic Analysis of Internet of Things (IoT) Security: Principles, Practices, and New Perspectives.
Future Internet, February, 2024
2023
Improving Security Practices in Health Information Systems with STRIDE Threat Modeling.
Proceedings of the 9th IEEE World Forum on Internet of Things, 2023
Proceedings of the 9th IEEE World Forum on Internet of Things, 2023
How Secure is AI-based Coding?: A Security Analysis Using STRIDE and Data Flow Diagrams.
Proceedings of the 2023 IEEE Virtual Conference on Communications (VCC), 2023
Threat Model-based Security Analysis and Mitigation Strategies for a Trustworthy Metaverse.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023
2022
CATComp: A Compression-Aware Authorization Protocol for Resource-Efficient Communications in IoT Networks.
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
Someone to Watch Over You: Using Bluetooth Beacons for Alerting Distracted Pedestrians.
IEEE Internet Things J., 2022
Pedestrian safety using the Internet of Things and sensors: Issues, challenges, and open problems.
Future Gener. Comput. Syst., 2022
FinderX: A Bluetooth Beacon-Based System for Designing Sustainable Green Smart Cities.
IEEE Consumer Electron. Mag., 2022
Proceedings of the IEEE International Conference on Wireless for Space and Extreme Environments, 2022
Autonomous Driving Security: A Comprehensive Threat Model of Attacks and Mitigation Strategies.
Proceedings of the 8th IEEE World Forum on Internet of Things, 2022
Proceedings of the 8th IEEE World Forum on Internet of Things, 2022
Proceedings of the 8th IEEE World Forum on Internet of Things, 2022
Proceedings of the 8th IEEE World Forum on Internet of Things, 2022
Towards Strengthening the Security of Healthcare Devices using Secure Configuration Provenance.
Proceedings of the IEEE International Conference on Digital Health, 2022
A Trust Management Framework for Connected Autonomous Vehicles Using Interaction Provenance.
Proceedings of the IEEE International Conference on Communications, 2022
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022
Smart City Technology for Disaster Management: Demonstrating the Use of Bluetooth Low Energy (BLE) Beacons for Emergency Alert Dissemination.
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022
2021
P-HIP: A Lightweight and Privacy-Aware Host Identity Protocol for Internet of Things.
IEEE Internet Things J., 2021
Proceedings of the 7th IEEE World Forum on Internet of Things, 2021
Proceedings of the ICC 2021, 2021
StreetBit: A Bluetooth Beacon-based Personal Safety Application for Distracted Pedestrians.
Proceedings of the 18th IEEE Annual Consumer Communications & Networking Conference, 2021
Proceedings of the 18th IEEE Annual Consumer Communications & Networking Conference, 2021
Proceedings of the 18th IEEE Annual Consumer Communications & Networking Conference, 2021
Proceedings of the 4th IEEE 5G World Forum, 2021
2020
Proceedings of the 6th IEEE World Forum on Internet of Things, 2020
Proceedings of the 6th IEEE World Forum on Internet of Things, 2020
Proceedings of the 6th IEEE World Forum on Internet of Things, 2020
Proceedings of the 11th IEEE Annual Ubiquitous Computing, 2020
Taming the Digital Bandits: An Analysis of Digital Bank Heists and a System for Detecting Fake Messages in Electronic Funds Transfer.
Proceedings of the National Cyber Summit (NCS) Research Track 2020, 2020
Proceedings of the National Cyber Summit (NCS) Research Track 2020, 2020
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020
2019
Proceedings of the 10th IEEE Annual Ubiquitous Computing, 2019
Proceedings of the 10th IEEE Annual Ubiquitous Computing, 2019
2018
An Internet of Things-based health prescription assistant and its security system design.
Future Gener. Comput. Syst., 2018
Aura: An incentive-driven ad-hoc IoT cloud framework for proximal mobile computation offloading.
Future Gener. Comput. Syst., 2018
Security-Aware Passwords and Services Usage in Developing Countries: A Case Study of Bangladesh.
Proceedings of the Services Computing - SCC 2018, 2018
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Proceedings of the IEEE INFOCOM 2018, 2018
Proceedings of the 2018 IEEE International Congress on Internet of Things, 2018
SecuPAN: A Security Scheme to Mitigate Fragmentation-Based Network Attacks in 6LoWPAN.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018
A conceptual framework for an IoT-based health assistant and its authorization model.
Proceedings of the IEEE 8th Annual Computing and Communication Workshop and Conference, 2018
Proceedings of the 15th IEEE Annual Consumer Communications & Networking Conference, 2018
2017
Unified authentication factors and fuzzy service access using interaction provenance.
Comput. Secur., 2017
ROSAC: A Round-Wise Fair Scheduling Approach for Mobile Clouds Based on Task Asymptotic Complexity.
Proceedings of the 5th IEEE International Conference on Mobile Cloud Computing, 2017
HSC-IoT: A Hardware and Software Co-Verification Based Authentication Scheme for Internet of Things.
Proceedings of the 5th IEEE International Conference on Mobile Cloud Computing, 2017
IoTbed: A Generic Architecture for Testbed as a Service for Internet of Things-Based Systems.
Proceedings of the 2017 IEEE International Congress on Internet of Things, 2017
Trust-IoV: A Trustworthy Forensic Investigation Framework for the Internet of Vehicles (IoV).
Proceedings of the 2017 IEEE International Congress on Internet of Things, 2017
Boot-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of IoT Nodes.
Proceedings of the 2017 IEEE International Congress on Internet of Things, 2017
Securing the Internet of Things: A Meta-Study of Challenges, Approaches, and Open Problems.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017
Proceedings of the 2017 IEEE International Conference on Services Computing, 2017
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017
2016
IEEE Trans. Emerg. Top. Comput., 2016
IEEE Trans. Dependable Secur. Comput., 2016
Proceedings of the 2016 IEEE International Conference on Smart Cloud, 2016
Proceedings of the 17th Annual Conference on Information Technology Education and the 5th Annual Conference on Research in Information Technology, 2016
Proceedings of the 17th Annual Conference on Information Technology Education and the 5th Annual Conference on Research in Information Technology, 2016
Proceedings of the 2016 IEEE Military Communications Conference, 2016
Chronos: Towards Securing System Time in the Cloud for Reliable Forensics Investigation.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
How Secure is the Healthcare Network from Insider Attacks? An Audit Guideline for Vulnerability Analysis.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
Proceedings of the 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), 2016
Proceedings of the 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), 2016
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016
2015
e-ESAS: Evolution of a participatory design-based solution for breast cancer (BC) patients in rural Bangladesh.
Pers. Ubiquitous Comput., 2015
Digit. Investig., 2015
High-Performance Classification of Phishing URLs Using a Multi-modal Approach with MapReduce.
Proceedings of the 2015 IEEE World Congress on Services, 2015
Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things.
Proceedings of the 2015 IEEE World Congress on Services, 2015
Towards a Systematic Analysis of Challenges and Issues in Secure Mobile Cloud Forensics.
Proceedings of the 3rd IEEE International Conference on Mobile Cloud Computing, 2015
SEPIA: Secure-PIN-Authentication-as-a-Service for ATM Using Mobile and Wearable Devices.
Proceedings of the 3rd IEEE International Conference on Mobile Cloud Computing, 2015
Aura: An IoT Based Cloud Infrastructure for Localized Mobile Computation Outsourcing.
Proceedings of the 3rd IEEE International Conference on Mobile Cloud Computing, 2015
Proceedings of the Advances in Digital Forensics XI, 2015
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015
Proceedings of the 2015 IEEE International Conference on Services Computing, 2015
MIDEP: Multiparty Identity Establishment Protocol for Decentralized Collaborative Services.
Proceedings of the 2015 IEEE International Conference on Services Computing, 2015
Proceedings of the 2015 IEEE International Conference on Services Computing, 2015
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015
2014
J. Digit. Forensics Secur. Law, 2014
Int. J. Cloud Comput., 2014
Comput. Sci. Inf. Syst., 2014
A trust based Information sharing model (TRUISM) in MANET in the presence of uncertainty.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014
Sockpuppet Detection in Wikipedia: A Corpus of Real-World Deceptive Writing for Linking Identities.
Proceedings of the Ninth International Conference on Language Resources and Evaluation, 2014
Proceedings of the Advances in Artificial Intelligence - IBERAMIA 2014, 2014
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014
Interaction provenance model for unified authentication factors in service oriented computing.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
Proceedings of the 2014 IEEE Fourth International Conference on Big Data and Cloud Computing, 2014
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014
A Comparative Study on I/O Performance between Compute and Storage Optimized Instances of Amazon EC2.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014
CellCloud: A Novel Cost Effective Formation of Mobile Cloud Based on Bidding Incentives.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014
Proceedings of the Large Scale and Big Data - Processing and Management., 2014
2013
CoRR, 2013
Proceedings of the International Conference on High Performance Computing & Simulation, 2013
How Much Does Storage Really Cost? Towards a Full Cost Accounting Model for Data Storage.
Proceedings of the Economics of Grids, Clouds, Systems, and Services, 2013
Proceedings of the 2013 Federated Conference on Computer Science and Information Systems, 2013
Proceedings of the 2013 APWG eCrime Researchers Summit, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
2012
CoRR, 2012
Cloud Based Content Fetching: Using Cloud Infrastructure to Obfuscate Phishing Scam Analysis.
Proceedings of the Eighth IEEE World Congress on Services, 2012
Proceedings of the 2012 ASE International Conference on Cyber Security, 2012
MANTICORE: Masking All Network Traffic via IP Concealment with OpenVPN Relaying to EC2.
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012
2011
The Life and Death of Unwanted Bits: Towards Proactive Waste Data Management in Digital Ecosystems
CoRR, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
2010
Trustworthy vacuuming and litigation holds in long-term high-integrity records retention.
Proceedings of the EDBT 2010, 2010
2009
Proceedings of the 7th USENIX Conference on File and Storage Technologies, 2009
Proceedings of the Fourth Biennial Conference on Innovative Data Systems Research, 2009
2008
Proceedings of the Handbook of Database Security - Applications and Trends, 2008
Proceedings of the Handbook of Database Security - Applications and Trends, 2008
Softw. Pract. Exp., 2008
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008
2007
Proceedings of the 2007 ACM Workshop On Storage Security And Survivability, 2007
Proceedings of the Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, 2007
Proceedings of the 2007 ACM workshop on Computer Security Architecture, 2007
2006
UCLog+ : A Security Data Management System for Correlating Alerts, Incidents, and Raw Data From Remote Logs
CoRR, 2006
Proceedings of the 2006 ACM Workshop On Storage Security And Survivability, 2006
Proceedings of the Intelligence and Security Informatics, 2006
2005
The evolution of storage service providers: techniques and challenges to outsourcing storage.
Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, 2005
Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, 2005
Proceedings of the Storage and Retrieval Methods and Applications for Multimedia 2005, 2005
Trade-Offs in Protecting Storage: A Meta-Data Comparison of Cryptographic, Backup/Versioning, Immutable/Tamper-Proof, and Redundant Storage Solutions.
Proceedings of the 22nd IEEE / 13th NASA Goddard Conference on Mass Storage Systems and Technologies (MSST 2005), 2005
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005