Positions

Selected Publications

Academic Article

Year Title Altmetric
2018 Outbreak investigation of ceftriaxone-resistant Salmonella enterica serotype Typhi and its risk factors among the general population in Hyderabad, Pakistan: a matched case-control studyLancet Infectious Diseases.  18:1368-1376. 2018
2018 Integrating standardized whole genome sequence analysis with a global Mycobacterium tuberculosis antibiotic resistance knowledgebase.Scientific Reports.  8:15382. 2018
2018 Aura: An incentive-driven ad-hoc IoT cloud framework for proximal mobile computation offloadingFuture Generation Computer Systems.  86:821-835. 2018
2018 Trends, Associations, and Antimicrobial Resistance of Salmonella Typhi and Paratyphi in Pakistan.American Journal of Tropical Medicine and Hygiene.  99:48-54. 2018
2018 Late diagnosis of human immunodeficiency virus infections in high-risk groups in Karachi, Pakistan.International Journal of STD and AIDS.  956462418785264. 2018
2018 High heterotrophic counts in potable water and antimicrobial resistance among indicator organisms in two peri-urban communities of Karachi, Pakistan.BMC Research Notes.  11:350. 2018
2018 Complete Genome Sequence of Buffalopox Virus.Genome Announcements.  6. 2018
2018 An Internet of Things-based health prescription assistant and its security system designFuture Generation Computer Systems.  82:422-439. 2018
2018 Author Correction: Genome-wide analysis of multi- and extensively drug-resistant Mycobacterium tuberculosis.Nature Genetics.  50:764. 2018
2018 Efflux pump as alternate mechanism for drug resistance in Mycobacterium tuberculosisIndian Journal of Tuberculosis2018
2017 Unified authentication factors and fuzzy service access using interaction provenanceComputers and Security.  67:211-231. 2017
2016 How Secure is the Healthcare Network from Insider Attacks? An Audit Guideline for Vulnerability AnalysisCompsac -New York-.  1:417-422. 2016
2016 Towards Building Forensics Enabled Cloud Through Secure Logging-as-a-ServiceIEEE Transactions on Dependable and Secure Computing.  13:148-162. 2016
2016 Trustworthy Digital Forensics in the CloudComputer.  49:78-81. 2016
2016 WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile DevicesIEEE Transactions on Emerging Topics in Computing.  4:129-141. 2016
2015 LINCS: Towards building a trustworthy litigation hold enabled cloud storage systemDigital Investigation.  14:S55-S67. 2015
2015 Towards supply chain information integrity preservationCrossTalk.  28:4-10. 2015
2015 e-ESAS: Evolution of a participatory design-based solution for breast cancer (BC) patients in rural BangladeshPersonal Technologies.  19:395-413. 2015
2014 e-ESAS: Evolution of a participatory design-based solution for breast cancer (BC) patients in rural BangladeshPersonal Technologies2014
2014 A straightforward author profiling approach in MapReduceLecture Notes in Artificial Intelligence.  8864:95-107. 2014
2014 FAPA: flooding attack protection architecture in a cloud systemInternational Journal of Cloud Computing.  3:379-379. 2014
2014 Sockpuppet detection in Wikipedia: A corpus of real-world deceptive writing for linking identitiesProceedings of the 9th International Conference on Language Resources and Evaluation, LREC 2014.  1355-1358. 2014
2014 Towards building a forensics aware language for secure loggingComputer Science and Information Systems.  11:1291-1314. 2014
2013 The life and death of unwanted bits: Towards proactive waste data management in digital ecosystems2013 3rd International Conference on Innovative Computing Technology, INTECH 2013.  144-148. 2013
2013 Digital forensics in the cloudCrossTalk.  26:17-20. 2013
2013 I have the proof: Providing proofs of past data possession in cloud forensicsProceedings of the 2012 ASE International Conference on Cyber Security, CyberSecurity 2012.  75-82. 2013
2013 SecLaaS: Secure logging-as-a-service for cloud forensicsASIA CCS 2013 - Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security.  219-230. 2013
2013 Cloud Forensics: A Meta-Study of Challenges, Approaches, and Open Problems 2013
2013 SecLaaS: Secure Logging-as-a-Service for Cloud ForensicsCoRR.  abs/1302.6267. 2013
2012 The Enemy Within: The Emerging Threats to Healthcare from Malicious Mobile Devices 2012
2011 Where Have You Been? Secure Location Provenance for Mobile Devices 2011
2009 Preventing history forgery with secure provenanceTransactions on Storage.  5. 2009
2009 Remembrance: The unbearable sentience of being digitalCIDR 2009 - 4th Biennal Conference on Innovative Data Systems Research2009

Book

Year Title Altmetric
2011 Message from the IDCS 2011 chairs.  Ed. 7017 LNCS.  2011
2006 Reactivity on the Web.  Ed. 4254 LNCS.  2006

Chapter

Year Title Altmetric
2014 Security in big data and cloud computing: Challenges, solutions, and open problems.  579-594. 2014
2008 Database issues in trust management and trust negotiation.  73-113. 2008
2008 Trustworthy records retention.  357-381. 2008

Teaching Activities

  • CS436 - Computer Security (Fall Term 2018) 2018
  • CS443 - Cloud Security (Fall Term 2018) 2018
  • CS636 - Computer Security (Fall Term 2018) 2018
  • CS643 - Cloud Security (Fall Term 2018) 2018
  • CS736 - Computer Security (Fall Term 2018) 2018
  • CS743 - Cloud Security (Fall Term 2018) 2018
  • CS403 - Cloud Computing (Summer Term 2018) 2018
  • CS633 - Cloud Computing (Summer Term 2018) 2018
  • CS733 - Cloud Computing (Summer Term 2018) 2018
  • CS250 - Discrete Structures (Spring Term 2018) 2018
  • CS436 - Computer Security (Fall Term 2017) 2017
  • CS443 - Cloud Security (Fall Term 2017) 2017
  • CS636 - Computer Security (Fall Term 2017) 2017
  • CS643 - Cloud Security (Fall Term 2017) 2017
  • CS743 - Cloud Security (Fall Term 2017) 2017
  • CS403 - Cloud Computing (Summer Term 2017) 2017
  • CS633 - Cloud Computing (Summer Term 2017) 2017
  • CS733 - Cloud Computing (Summer Term 2017) 2017
  • CS250 - Discrete Structures (Spring Term 2017) 2017
  • CS436 - Computer Security (Fall Term 2016) 2016
  • CS636 - Computer Security (Fall Term 2016) 2016
  • CS636 - Computer Security (Fall Term 2016) 2016
  • CS736 - Computer Security (Fall Term 2016) 2016
  • CS330 - Comp Organization/Assembl-Lang (Fall Term 2015) 2015
  • CS443 - Cloud Security (Fall Term 2015) 2015
  • CS643 - Cloud Security (Fall Term 2015) 2015
  • CS743 - Cloud Security (Fall Term 2015) 2015
  • CS250 - Discrete Structures (Spring Term 2015) 2015
  • CS330 - Comp Organization/Assembl-Lang (Fall Term 2014) 2014
  • CS643 - Cloud Security (Fall Term 2014) 2014
  • CS743 - Cloud Security (Fall Term 2014) 2014
  • CS250 - Discrete Structures (Spring Term 2014) 2014
  • CS250 - Discrete Structures (Fall Term 2013) 2013
  • CS691 - Special Topics (Fall Term 2013) 2013
  • CS791 - Special Topics (Fall Term 2013) 2013
  • CS250 - Discrete Structures (Spring Term 2013) 2013
  • CS101 - Fluency With Information Techn (Fall Term 2012) 2012
  • CS491 - Special Topics (Fall Term 2012) 2012
  • CS691 - Special Topics (Fall Term 2012) 2012
  • CS791 - Special Topics (Fall Term 2012) 2012
  • CS250 - Discrete Structures (Spring Term 2012) 2012
  • CS691 - Special Topics (Fall Term 2011) 2011
  • CS791 - Special Topics (Fall Term 2011) 2011
  • Education And Training

  • Bachelor of Science or Mathematics in Computer Engineering, Bangladesh University of Engineering and Technology
  • Doctor of Science or Mathematics in Computer and Information Sciences, University of Illinois System : Urbana-Champaign
  • Master of Sciences or Mathematics in Computer Science, University of Illinois at Urbana - Champaign
  • Awards And Honors

    Full Name

  • Ragib Hasan
  • Blazerid

  • ragib