Positions

Overview

  • Dr. Ragib Hasan is a tenured Associate Professor at the Department of Computer Science at the University of Alabama at Birmingham. He leads the SECuRE and Trustworthy Computing Lab (SECRETLab). He is also the founder of Shikkhok.com — an award-winning free education platform in Bengali language, and the co-ordinator of the BanglaBraille project, aimed at creating educational material for visually impaired children in South Asia.

    He is recipient of the NSF CAREER Award for his research on trustworthy cloud computing.

    In the past, Dr. Hasan was an NSF Computing Innovation Fellow and Assistant Research Scientist at the Dept. of Computer Science, Johns Hopkins University. His research was supported by the 2009 NSF/CRA Computing Innovation Postdoctoral Fellowship. At Hopkins, he was a member of the Hopkins Storage Systems Lab and collaborated with Prof. Randal Burns.

    He received his Ph.D. in Computer Science in 2009, from the University of Illinois at Urbana-Champaign.
  • Selected Publications

    Academic Article

    Year Title Altmetric
    2023 Could Wearables Protect Youth and Children on Farms? 2023
    2022 Cost-benefit analysis of a distracted pedestrian interventionInjury Prevention.  29:62-67. 2022
    2022 Someone to Watch Over You: Using Bluetooth Beacons for Alerting Distracted PedestriansIEEE Internet of Things.  9:23017-23030. 2022
    2022 Pedestrian safety using the Internet of Things and sensors: Issues, challenges, and open problems 2022
    2022 Hemodynamic Instability Resulting From Pseudomalfunction of a Leadless Pacemaker During Off-Pump Coronary Artery Bypass GraftingJournal of Cardiothoracic and Vascular Anesthesia.  36:2588-2592. 2022
    2022 IoTaaS: Drone-Based Internet of Things as a Service Framework for Smart CitiesIEEE Internet of Things.  9:12425-12439. 2022
    2022 CATComp: A Compression-Aware Authorization Protocol for Resource-Efficient Communications in IoT NetworksIEEE Internet of Things.  9:1667-1682. 2022
    2022 Distracted pedestrian behavior: An observational study of risk by situational environmentsTraffic Injury Prevention.  23:346-351. 2022
    2022 FinderX: A Bluetooth Beacon-Based System for Designing Sustainable Green Smart CitiesIEEE Consumer Electronics Magazine.  11:65-72. 2022
    2021 Reducing distracted pedestrian behavior using Bluetooth beacon technology: A crossover trialAccident Analysis and Prevention.  159. 2021
    2021 P-HIP: A Lightweight and Privacy-Aware Host Identity Protocol for Internet of ThingsIEEE Internet of Things.  8:555-571. 2021
    2020 Using Bluetooth beacon technology to reduce distracted pedestrian behaviour: A cross-over trial study protocolInjury Prevention.  26:295-298. 2020
    2018 Aura: An incentive-driven ad-hoc IoT cloud framework for proximal mobile computation offloading 2018
    2018 An Internet of Things-based health prescription assistant and its security system design 2018
    2017 Unified authentication factors and fuzzy service access using interaction provenanceComputers and Security.  67:211-231. 2017
    2016 How Secure is the Healthcare Network from Insider Attacks? An Audit Guideline for Vulnerability AnalysisCompsac -New York-.  1:417-422. 2016
    2016 Towards Building Forensics Enabled Cloud Through Secure Logging-as-a-ServiceIEEE Transactions on Dependable and Secure Computing.  13:148-162. 2016
    2016 Trustworthy Digital Forensics in the CloudComputer.  49:78-81. 2016
    2016 WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile DevicesIEEE Transactions on Emerging Topics in Computing.  4:128-141. 2016
    2015 Towards supply chain information integrity preservation 2015
    2015 e-ESAS: Evolution of a participatory design-based solution for breast cancer (BC) patients in rural BangladeshPersonal and Ubiquitous Computing.  19:395-413. 2015
    2015 LINCS: Towards building a trustworthy litigation hold enabled cloud storage systemDigital Investigation.  S55-S67. 2015
    2014 A straightforward author profiling approach in MapReduceLecture Notes in Artificial Intelligence.  8864:95-107. 2014
    2014 FAPA: flooding attack protection architecture in a cloud systemInternational Journal of Cloud Computing.  3:379. 2014
    2014 Hot Zone Identification: Analyzing Effects of Data Sampling On Spam ClusteringJournal of Digital Forensics, Security and Law2014
    2014 Sockpuppet detection in Wikipedia: A corpus of real-world deceptive writing for linking identities 2014
    2014 Towards building a forensics aware language for secure loggingSouth African Computer Journal.  11:1291-1314. 2014
    2013 The life and death of unwanted bits: Towards proactive waste data management in digital ecosystems 2013
    2013 Digital forensics in the cloud 2013
    2013 SecLaaS: Secure logging-as-a-service for cloud forensics 2013
    2013 Cloud Forensics: A Meta-Study of Challenges, Approaches, and Open Problems 2013
    2013 SecLaaS: Secure Logging-as-a-Service for Cloud Forensics 2013
    2012 The Enemy Within: The Emerging Threats to Healthcare from Malicious Mobile Devices 2012
    2012 I have the proof: Providing proofs of past data possession in cloud forensics 2012
    2011 Where Have You Been? Secure Location Provenance for Mobile Devices 2011
    2009 Preventing history forgery with secure provenanceTransactions on Storage.  5. 2009
    2009 Remembrance: The unbearable sentience of being digital 2009
    2008 A component-based framework for radio-astronomical imaging software systemsSoftware: Practice and Experience.  38:493-507. 2008
    2006 UCLog+ : A Security Data Management System for Correlating Alerts, Incidents, and Raw Data From Remote Logs 2006

    Book

    Year Title Altmetric
    2011 Message from the IDCS 2011 chairs.  Ed. 7017 LNCS.  2011
    2006 Reactivity on the Web.  Ed. 4254 LNCS.  2006

    Chapter

    Year Title Altmetric
    2022 Threat model and security analysis of video conferencing systems as a communication paradigm during the COVID-19 pandemic.  181-199. 2022
    2021 Bluetooth Low Energy (BLE) Beacon-Based Micro-Positioning for Pedestrians Using Smartphones in Urban Environments.  135-149. 2021
    2016 Cloud Forensics.  233-244. 2016
    2016 Secure Computation Outsourcing.  289-304. 2016
    2015 Privacy in the Cloud.  141-165. 2015
    2014 Virtualizing Resources for the Cloud.  510-549. 2014
    2014 Security in big data and cloud computing: Challenges, solutions, and open problems.  579-594. 2014
    2008 Database issues in trust management and trust negotiation.  73-113. 2008
    2008 Trustworthy records retention.  357-381. 2008
    ◾ Secure Computation Outsourcing.  315-330.

    Research Overview

  • Computer Security
    Cloud Computing
    Internet of Things (IoT)
    Fog Computing
    Smart City
    Digital Forensics
    Cloud Forensics
  • Teaching Activities

  • CS101 - Fluency With Information Techn (Fall Term 2012)
  • CS250 - Discrete Structures (Fall Term 2013)
  • CS250 - Discrete Structures (Spring Term 2012)
  • CS250 - Discrete Structures (Spring Term 2013)
  • CS250 - Discrete Structures (Spring Term 2014)
  • CS250 - Discrete Structures (Spring Term 2015)
  • CS250 - Discrete Structures (Spring Term 2017)
  • CS250 - Discrete Structures (Spring Term 2018)
  • CS250 - Discrete Structures (Spring Term 2019)
  • CS250 - Discrete Structures (Spring Term 2020)
  • CS250 - Discrete Structures (Spring Term 2021)
  • CS250 - Discrete Structures (Spring Term 2022)
  • CS250 - Discrete Structures (Spring Term 2023)
  • CS330 - Comp Organization/Assembl-Lang (Fall Term 2014)
  • CS330 - Comp Organization/Assembl-Lang (Fall Term 2015)
  • CS403 - Cloud Computing (Summer Term 2017)
  • CS403 - Cloud Computing (Summer Term 2018)
  • CS403 - Cloud Computing (Summer Term 2019)
  • CS403 - Cloud Computing (Summer Term 2020)
  • CS403 - Cloud Computing (Summer Term 2021)
  • CS403 - Cloud Computing (Summer Term 2022)
  • CS403L - Cloud Computing Lab (Summer Term 2019)
  • CS403L - Cloud Computing Lab (Summer Term 2020)
  • CS403L - Cloud Computing Lab (Summer Term 2021)
  • CS403L - Cloud Computing Lab (Summer Term 2022)
  • CS423 - Network Security (Spring Term 2023)
  • CS423L - Network Security Laboratory (Spring Term 2023)
  • CS436 - Computer Security (Fall Term 2016)
  • CS436 - Computer Security (Fall Term 2017)
  • CS436 - Computer Security (Fall Term 2018)
  • CS436 - Computer Security (Fall Term 2019)
  • CS436 - Computer Security (Fall Term 2020)
  • CS436 - Computer Security (Fall Term 2021)
  • CS436 - Computer Security (Fall Term 2022)
  • CS443 - Cloud Security (Fall Term 2015)
  • CS443 - Cloud Security (Fall Term 2017)
  • CS443 - Cloud Security (Fall Term 2018)
  • CS443 - Cloud Security (Fall Term 2019)
  • CS443 - Cloud Security (Fall Term 2020)
  • CS443 - Cloud Security (Fall Term 2021)
  • CS443 - Cloud Security (Fall Term 2022)
  • CS491 - Special Topics (Fall Term 2012)
  • CS623 - Network Security (Spring Term 2023)
  • CS623L - Network Security Laboratory (Spring Term 2023)
  • CS633 - Cloud Computing (Summer Term 2017)
  • CS633 - Cloud Computing (Summer Term 2018)
  • CS633 - Cloud Computing (Summer Term 2019)
  • CS633 - Cloud Computing (Summer Term 2020)
  • CS633 - Cloud Computing (Summer Term 2021)
  • CS633 - Cloud Computing (Summer Term 2022)
  • CS633L - Cloud Computing Lab (Summer Term 2019)
  • CS633L - Cloud Computing Lab (Summer Term 2020)
  • CS633L - Cloud Computing Lab (Summer Term 2021)
  • CS633L - Cloud Computing Lab (Summer Term 2022)
  • CS636 - Computer Security (Fall Term 2016)
  • CS636 - Computer Security (Fall Term 2016)
  • CS636 - Computer Security (Fall Term 2017)
  • CS636 - Computer Security (Fall Term 2018)
  • CS636 - Computer Security (Fall Term 2019)
  • CS636 - Computer Security (Fall Term 2020)
  • CS636 - Computer Security (Fall Term 2021)
  • CS636 - Computer Security (Fall Term 2022)
  • CS643 - Cloud Security (Fall Term 2014)
  • CS643 - Cloud Security (Fall Term 2015)
  • CS643 - Cloud Security (Fall Term 2017)
  • CS643 - Cloud Security (Fall Term 2018)
  • CS643 - Cloud Security (Fall Term 2019)
  • CS643 - Cloud Security (Fall Term 2020)
  • CS643 - Cloud Security (Fall Term 2021)
  • CS643 - Cloud Security (Fall Term 2022)
  • CS691 - Special Topics (Fall Term 2011)
  • CS691 - Special Topics (Fall Term 2012)
  • CS691 - Special Topics (Fall Term 2013)
  • CS723 - Network Security (Spring Term 2023)
  • CS723L - Network Security Laboratory (Spring Term 2023)
  • CS733 - Cloud Computing (Summer Term 2017)
  • CS733 - Cloud Computing (Summer Term 2018)
  • CS733 - Cloud Computing (Summer Term 2019)
  • CS733 - Cloud Computing (Summer Term 2020)
  • CS733 - Cloud Computing (Summer Term 2021)
  • CS733 - Cloud Computing (Summer Term 2022)
  • CS733L - Cloud Computing Lab (Summer Term 2019)
  • CS733L - Cloud Computing Lab (Summer Term 2020)
  • CS733L - Cloud Computing Lab (Summer Term 2021)
  • CS733L - Cloud Computing Lab (Summer Term 2022)
  • CS736 - Computer Security (Fall Term 2016)
  • CS736 - Computer Security (Fall Term 2018)
  • CS736 - Computer Security (Fall Term 2019)
  • CS736 - Computer Security (Fall Term 2020)
  • CS736 - Computer Security (Fall Term 2021)
  • CS736 - Computer Security (Fall Term 2022)
  • CS743 - Cloud Security (Fall Term 2014)
  • CS743 - Cloud Security (Fall Term 2015)
  • CS743 - Cloud Security (Fall Term 2017)
  • CS743 - Cloud Security (Fall Term 2018)
  • CS743 - Cloud Security (Fall Term 2019)
  • CS743 - Cloud Security (Fall Term 2020)
  • CS743 - Cloud Security (Fall Term 2021)
  • CS743 - Cloud Security (Fall Term 2022)
  • CS791 - Special Topics (Fall Term 2011)
  • CS791 - Special Topics (Fall Term 2012)
  • CS791 - Special Topics (Fall Term 2013)
  • CS796 - Directed Readings and Research (Fall Term 2020)
  • CS796 - Directed Readings and Research (Fall Term 2021)
  • CS796 - Directed Readings and Research (Fall Term 2022)
  • CS796 - Directed Readings and Research (Spring Term 2021)
  • CS796 - Directed Readings and Research (Spring Term 2022)
  • CS796 - Directed Readings and Research (Spring Term 2023)
  • CS796 - Directed Readings and Research (Summer Term 2021)
  • CS796 - Directed Readings and Research (Summer Term 2022)
  • CS799 - Dissertation Research (Fall Term 2020)
  • CS799 - Dissertation Research (Fall Term 2020)
  • CS799 - Dissertation Research (Fall Term 2021)
  • CS799 - Dissertation Research (Fall Term 2022)
  • CS799 - Dissertation Research (Spring Term 2021)
  • CS799 - Dissertation Research (Spring Term 2021)
  • CS799 - Dissertation Research (Spring Term 2022)
  • CS799 - Dissertation Research (Spring Term 2022)
  • CS799 - Dissertation Research (Spring Term 2023)
  • CS799 - Dissertation Research (Summer Term 2021)
  • CS799 - Dissertation Research (Summer Term 2021)
  • CS799 - Dissertation Research (Summer Term 2022)
  • CS799 - Dissertation Research (Summer Term 2022)
  • Education And Training

  • Johns Hopkins University Computer Science, Postdoctoral Fellowship
  • Doctor of Science or Mathematics in Computer and Information Sciences, University of Illinois System : Urbana-Champaign 2009
  • Master of Sciences or Mathematics in Computer Science, University of Illinois at Urbana - Champaign 2005
  • Bachelor of Science or Mathematics in Computer Engineering, Bangladesh University of Engineering and Technology 2003
  • Awards And Honors

    Full Name

  • Ragib Hasan