Follow
Shams Zawoad, Ph.D.
Shams Zawoad, Ph.D.
Lead Scientist, Visa Inc.
Verified email at visa.com - Homepage
Title
Cited by
Cited by
Year
FAIoT : Towards Building a Forensics Aware Eco System for the Internet of Things
S Zawoad, R Hasan
12th IEEE International Conference on Services Computing (IEEE SCC), 2015
2152015
SecLaaS: Secure Logging-as-a-Service for Cloud Forensics
S Zawoad, AK Dutta, R Hasan
ASIA CCS '13, 2013
2112013
Cloud Forensics
S Zawoad, R Hasan
Encyclopedia of Cloud Computing, 233-244, 2016
1722016
Towards Building Forensics Enabled Cloud Through Secure Logging-as-a-Service
S Zawoad, A Dutta, R Hasan
IEEE Transactions on Dependable and Secure Computing (TDSC) SI-Cyber Crime …, 2016
1302016
Digital Forensics in the Cloud
S Zawoad, R Hasan
The Journal of Defense Software Engineering (CrossTalk) 26 (5), 2013
83*2013
Sensing-enabled channels for hard-to-detect command and control of mobile devices
R Hasan, N Saxena, T Haleviz, S Zawoad, D Rinehart
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
762013
Trust-IoV: A Trustworthy Forensic Investigation Framework for the Internet of Vehicles (IoV).
MM Hossain, R Hasan, S Zawoad
ICIOT, 25-32, 2017
722017
Digital Forensics in the Age of Big Data: Challenges, Approaches, and Opportunities
S Zawoad, R Hasan
IEEE International Symposium on Big Data Security on Cloud (BigDataSecurity …, 2015
602015
OCF: An Open Cloud Forensics Model for Reliable Digital Forensics
S Zawoad, R Hasan, A Skjellum
8th IEEE International Conference on Cloud Computing (IEEE Cloud), 2015
582015
Probe-IoT: A public digital ledger based forensic investigation framework for IoT.
MM Hossain, R Hasan, S Zawoad
INFOCOM workshops, 1-2, 2018
572018
I have the proof: Providing proofs of past data possession in cloud forensics
S Zawoad, R Hasan
Cyber Security (CyberSecurity), 2012 International Conference on, 75-82, 2012
34*2012
OTIT: Towards Secure Provenance Modeling for Location Proofs
R Khan, S Zawoad, MM Haque, R Hasan
ASIA CCS '14, 2014
332014
Identifying malicious network devices
DMS Zawoad, P Desch
US Patent 11,425,148, 2022
322022
WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices
R Hasan, R Khan, S Zawoad, M Haque
IEEE Transactions on Emerging Topics in Computing (TETC) SI on Cyber Security, 2015
302015
‘who, when, and where?’location proof assertion for mobile devices
R Khan, S Zawoad, MM Haque, R Hasan
Data and Applications Security and Privacy XXVIII: 28th Annual IFIP WG 11.3 …, 2014
242014
Secure Techniques and Methods for Authenticating Visually Impaired Mobile Phone Users
MM Haque, S Zawoad, R Hasan
IEEE International Conference on Technologies for Homeland Security, 2013
242013
How Secure is the Healthcare Network from Insider Attacks? An Audit Guideline for Vulnerability Analysis
R Hasan, S Zawoad, S Noor, MM Haque, D Burke
40th IEEE Computer Society International Conference on Computers, Software …, 2016
222016
FECloud: A Trustworthy Forensics-Enabled Cloud Architecture
S Zawoad, R Hasan
11th Annual IFIP WG 11.9 International Conference on Digital Forensics, 2015
21*2015
Phish-Net: Investigating Phish Clusters Using Drop Email Addresses
S Zawoad, A Dutta, A Sprague, R Hasan, J Britt, G Warner
APWG eCrime Researchers Summit-2013, 2013
192013
Secprov: Trustworthy and efficient provenance management in the cloud
S Zawoad, R Hasan, K Islam
IEEE INFOCOM 2018-IEEE Conference on Computer Communications, 1241-1249, 2018
182018
The system can't perform the operation now. Try again later.
Articles 1–20