Shams Zawoad, Ph.D.
Shams Zawoad, Ph.D.
Lead Scientist, Visa Inc.
Verified email at visa.com - Homepage
Title
Cited by
Cited by
Year
SecLaaS: Secure Logging-as-a-Service for Cloud Forensics
S Zawoad, AK Dutta, R Hasan
ASIA CCS '13, 2013
1532013
Cloud forensics: a meta-study of challenges, approaches, and open problems
S Zawoad, R Hasan
arXiv preprint arXiv:1302.6312, 2013
1312013
FAIoT : Towards Building a Forensics Aware Eco System for the Internet of Things
S Zawoad, R Hasan
12th IEEE International Conference on Services Computing (IEEE SCC), 2015
972015
Towards Building Forensics Enabled Cloud Through Secure Logging-as-a-Service
S Zawoad, A Dutta, R Hasan
IEEE Transactions on Dependable and Secure Computing (TDSC) SI-Cyber Crime …, 2016
702016
Sensing-enabled channels for hard-to-detect command and control of mobile devices
R Hasan, N Saxena, T Haleviz, S Zawoad, D Rinehart
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
532013
Digital Forensics in the Cloud
S Zawoad, R Hasan
The Journal of Defense Software Engineering (CrossTalk) 26 (5), 2013
432013
OCF: An Open Cloud Forensics Model for Reliable Digital Forensics
S Zawoad, R Hasan, A Skjellum
8th IEEE International Conference on Cloud Computing (IEEE Cloud), 2015
292015
I have the proof: Providing proofs of past data possession in cloud forensics
S Zawoad, R Hasan
Cyber Security (CyberSecurity), 2012 International Conference on, 75-82, 2012
27*2012
Digital Forensics in the Age of Big Data: Challenges, Approaches, and Opportunities
S Zawoad, R Hasan
IEEE International Symposium on Big Data Security on Cloud (BigDataSecurity …, 2015
262015
OTIT: Towards Secure Provenance Modeling for Location Proofs
R Khan, S Zawoad, MM Haque, R Hasan
ASIA CCS '14, 2014
262014
Cloud computing security: foundations and challenges
JR Vacca
CRC Press, 2016
232016
Probe-IoT: A public digital ledger based forensic investigation framework for IoT.
MM Hossain, R Hasan, S Zawoad
INFOCOM workshops, 1-2, 2018
212018
WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices
R Hasan, R Khan, S Zawoad, M Haque
IEEE Transactions on Emerging Topics in Computing (TETC) SI on Cyber Security, 2015
212015
Trust-IoV: A Trustworthy Forensic Investigation Framework for the Internet of Vehicles (IoV).
MM Hossain, R Hasan, S Zawoad
ICIOT, 25-32, 2017
172017
FECloud: A Trustworthy Forensics-Enabled Cloud Architecture
S Zawoad, R Hasan
11th Annual IFIP WG 11.9 International Conference on Digital Forensics, 2015
17*2015
‘who, when, and where?’location proof assertion for mobile devices
R Khan, S Zawoad, MM Haque, R Hasan
IFIP Annual Conference on Data and Applications Security and Privacy, 146-162, 2014
172014
Secure Techniques and Methods for Authenticating Visually Impaired Mobile Phone Users
MM Haque, S Zawoad, R Hasan
IEEE International Conference on Technologies for Homeland Security, 2013
172013
Towards Building Proofs of Past Data Possession in Cloud Forensics
S Zawoad, R Hasan
ASE Science Journal, 2012
152012
Trustworthy digital forensics in the cloud
S Zawoad, R Hasan
Computer 49 (3), 78-81, 2016
132016
SECAP: Towards Securing Application Provenance in the Cloud
S Zawoad, R Hasan
IEEE CLOUD 2016, 0
12*
The system can't perform the operation now. Try again later.
Articles 1–20