Our paper on “Digital Forensics in the Cloud” got published in Securing the Cloud issue of The Journal of Defense Software Engineering (CrossTalk)
Shams Zawoad, Amit Dutta, Alan Sprague, Ragib Hasan, and Jason Britt “Phish-Net: Investigating Phish Clusters Using Drop Email Addresses”, To appear in the Proceedings of 2013 APWG eCrime Researchers Summit, San Francisco, CA, September, 2013
2 papers on Supply Chain Integrity and Authentication Scheme for Blind Mobile Phone Users have been accepted as full paper in IEEE International Conference on Technologies for Homeland Security, 2013
Shams Zawoad, Marjan Mernik, and Ragib Hasan “FAL: A Forensics Aware Language for Secure Logging “, To appear at the 4th Workshop on Advances in Programming Languages (WAPL), 2013.
Amit K. Dutta and Ragib Hasan “How Much Does Storage Really Cost? Towards a Full Cost Accounting Model for Data Storage”, To appear at the 10th International Conference on Economics of Grids, Clouds, Systems, and Services (GECON), 2013.
Our work on sensing-enabled channels for triggering mobile malware got huge media attention.
2 posters on P2PSIP and Mobile Malware have been accepted in IEEE Symposium on Security & Privacy, 2013.
Thamar Solorio, Ragib Hasan, and Mainul Mizan “A Case Study of Sockpuppet Detection in Wikipedia”, To appear at the NAACL/HLT Workshop on Language Analysis in Social Media (LASM 2013).
Mainul Mizan, Md Lutfor Rahman, Rasib Khan, Munirul Haque, and Ragib Hasan “Accountable Proof of Ownership for Data using Timing Element in Cloud Services”, To appear at the International Symposium on Cloud Computing and Services for High Performance Computing Systems (InterCloud-HPC 2013).