Search filters

List of works by Shams Zawoad

A TRUSTWORTHY CLOUD FORENSICS ENVIRONMENT

CURLA: Cloud-Based Spam URL Analyzer for Very Large Datasets

Chronos: Towards Securing System Time in the Cloud for Reliable Forensics Investigation

Digital Forensics in the Age of Big Data: Challenges, Approaches, and Opportunities

FAIoT: Towards Building a Forensics Aware Eco System for the Internet of Things

conference paper published in 2015

How Secure is the Healthcare Network from Insider Attacks? An Audit Guideline for Vulnerability Analysis

article

I Have the Proof: Providing Proofs of Past Data Possession in Cloud Forensics

LINCS: Towards building a trustworthy litigation hold enabled cloud storage system

OCF: An Open Cloud Forensics Model for Reliable Digital Forensics

article

OTIT

Phish-Net: Investigating phish clusters using drop email addresses

Privacy in the Cloud

SECAP: Towards Securing Application Provenance in the Cloud

SecLaaS

article

Secure techniques and methods for authenticating visually impaired mobile phone users

Sensing-enabled channels for hard-to-detect command and control of mobile devices

StuxMob: A situational-aware malware for targeted attack on smart mobile devices

article published in 2016

Towards Building Forensics Enabled Cloud Through Secure Logging-as-a-Service

Towards a Systematic Analysis of Challenges and Issues in Secure Mobile Cloud Forensics

article published in 2015

Towards building a forensics aware language for secure logging

Trust-IoV: A Trustworthy Forensic Investigation Framework for the Internet of Vehicles (IoV)

conference paper published in 2017

Trustworthy Digital Forensics in the Cloud

UDaaS: A Cloud-Based URL-Deduplication-as-a-Service for Big Datasets

WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices

‘Who, When, and Where?’ Location Proof Assertion for Mobile Devices

article by Rasib Khan et al published 2014 in Lecture Notes in Computer Science