


default search action
Ragib Hasan
Person information
- affiliation: University of Alabama at Birmingham, USA
- affiliation (former): University of Illinois, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j21]Md. Mahmud Hossain, Golam Kayas, Ragib Hasan
, Anthony Skjellum, Shahid Al Noor, S. M. Riazul Islam
:
A Holistic Analysis of Internet of Things (IoT) Security: Principles, Practices, and New Perspectives. Future Internet 16(2): 40 (2024) - 2023
- [c107]Md. Ismail Hossain, Ragib Hasan
:
Threat Model-based Security Analysis and Mitigation Strategies for a Trustworthy Metaverse. MetaCom 2023: 33-40 - [c106]Md. Ismail Hossain, N. M. Istiak Chowdhury, Ragib Hasan:
How Secure is AI-based Coding?: A Security Analysis Using STRIDE and Data Flow Diagrams. VCC 2023: 56-61 - [c105]Md. Ismail Hossain, Ragib Hasan
:
Enhancing Security in Ambient Intelligence: A STRIDE Threat Modeling Perspective. WF-IoT 2023: 1-6 - [c104]Md. Ismail Hossain, Ragib Hasan
:
Improving Security Practices in Health Information Systems with STRIDE Threat Modeling. WF-IoT 2023: 1-6 - 2022
- [j20]Raiful Hasan
, Ragib Hasan
:
FinderX: A Bluetooth Beacon-Based System for Designing Sustainable Green Smart Cities. IEEE Consumer Electron. Mag. 11(1): 65-72 (2022) - [j19]Raiful Hasan
, Ragib Hasan
:
Pedestrian safety using the Internet of Things and sensors: Issues, challenges, and open problems. Future Gener. Comput. Syst. 134: 187-203 (2022) - [j18]Md. Mahmud Hossain
, Golam Kayas
, Yasser Karim, Ragib Hasan
, Jamie Payton, S. M. Riazul Islam
:
CATComp: A Compression-Aware Authorization Protocol for Resource-Efficient Communications in IoT Networks. IEEE Internet Things J. 9(3): 1667-1682 (2022) - [j17]Mohammad Aminul Hoque
, Md. Mahmud Hossain
, Shahid Al Noor, S. M. Riazul Islam
, Ragib Hasan
:
IoTaaS: Drone-Based Internet of Things as a Service Framework for Smart Cities. IEEE Internet Things J. 9(14): 12425-12439 (2022) - [j16]Raiful Hasan
, Mohammad Aminul Hoque
, Yasser Karim, Russell Griffin
, David C. Schwebel
, Ragib Hasan
:
Someone to Watch Over You: Using Bluetooth Beacons for Alerting Distracted Pedestrians. IEEE Internet Things J. 9(22): 23017-23030 (2022) - [c103]Raiful Hasan, Ragib Hasan
:
X-Fidence: Post-Pandemic Wellness By Density Monitoring with Privacy Preservation. CCNC 2022: 578-583 - [c102]Mohammad Aminul Hoque, Md. Mahmud Hossain, Ragib Hasan
:
BenchAV: A Security Benchmarking Framework for Autonomous Driving. CCNC 2022: 729-730 - [c101]Mohammad Aminul Hoque, Ragib Hasan
:
An Interaction Provenance-based Trust Management Scheme For Connected Vehicles. CCNC 2022: 731-732 - [c100]Raiful Hasan, Ragib Hasan
, Tanveer Islam:
Smart City Technology for Disaster Management: Demonstrating the Use of Bluetooth Low Energy (BLE) Beacons for Emergency Alert Dissemination. CCNC 2022: 931-932 - [c99]Mohammad Aminul Hoque, Ragib Hasan
:
A Trust Management Framework for Connected Autonomous Vehicles Using Interaction Provenance. ICC 2022: 2236-2241 - [c98]Ragib Hasan
:
Towards Strengthening the Security of Healthcare Devices using Secure Configuration Provenance. ICDH 2022: 228-233 - [c97]Raiful Hasan, Ragib Hasan
:
RoadNote: Automated Road Closure Detection using Urban Sensing. WF-IoT 2022: 1-6 - [c96]Raiful Hasan, Mohammad Aminul Hoque, Ragib Hasan
:
Towards a Threat Model and Security Analysis for Contact Tracing Applications. WF-IoT 2022: 1-6 - [c95]Mohammad Aminul Hoque, Ragib Hasan
:
Exposing Adaptive Cruise Control in Advanced Driving Assistance Systems. WF-IoT 2022: 1-6 - [c94]Mohammad Aminul Hoque, Ragib Hasan
:
Autonomous Driving Security: A Comprehensive Threat Model of Attacks and Mitigation Strategies. WF-IoT 2022: 1-6 - [c93]Ragib Hasan
, Raiful Hasan:
Towards a Threat Model and Security Analysis of Spacecraft Computing Systems. WiSEE 2022: 87-92 - 2021
- [j15]Md. Mahmud Hossain
, Ragib Hasan
:
P-HIP: A Lightweight and Privacy-Aware Host Identity Protocol for Internet of Things. IEEE Internet Things J. 8(1): 555-571 (2021) - [c92]Raiful Hasan, Ragib Hasan
:
Towards a Threat Model and Privacy Analysis for V2P in 5G Networks. 5GWF 2021: 383-387 - [c91]Raiful Hasan, Ragib Hasan
:
Towards a Threat Model and Security Analysis of Video Conferencing Systems. CCNC 2021: 1-4 - [c90]Raiful Hasan, Ragib Hasan
, Tanveer Islam:
InSight: A Bluetooth Beacon-based Ad-hoc Emergency Alert System for Smart Cities. CCNC 2021: 1-6 - [c89]Raiful Hasan, Mohammad Aminul Hoque, Yasser Karim, Russell Griffin
, David C. Schwebel, Ragib Hasan
:
StreetBit: A Bluetooth Beacon-based Personal Safety Application for Distracted Pedestrians. CCNC 2021: 1-2 - [c88]Mohammad Aminul Hoque
, Ragib Hasan
:
AVGuard: A Forensic Investigation Framework for Autonomous Vehicles. ICC 2021: 1-6 - [c87]Mohammad Aminul Hoque, Raiful Hasan, Ragib Hasan
:
R-CAV: On-Demand Edge Computing Platform for Connected Autonomous Vehicles. WF-IoT 2021: 65-70 - 2020
- [c86]Raiful Hasan, Ragib Hasan
:
BeaCloud: A Generic Architecture for Sustainable Smart City using Bluetooth Beacons. HPCC/DSS/SmartCity 2020: 1150-1157 - [c85]Ragib Hasan
, Yuliang Zheng
, Jeffery T. Walker:
Digital Forensics Education Modules for Judicial Officials. NCS 2020: 46-60 - [c84]Yasser Karim, Ragib Hasan
:
Taming the Digital Bandits: An Analysis of Digital Bank Heists and a System for Detecting Fake Messages in Electronic Funds Transfer. NCS 2020: 193-210 - [c83]Shahid Al Noor, Yasser Karim, Md. Mahmud Hossain, Ragib Hasan
:
CrowdPick: A Generic Framework for Delivering Service Specific Crowd Infrastructure. UEMCON 2020: 1-7 - [c82]Raiful Hasan, Ragib Hasan
:
Towards Designing a Sustainable Green Smart City using Bluetooth Beacons. WF-IoT 2020: 1-6 - [c81]Mohammad Aminul Hoque, Ragib Hasan
:
VFbed: An Architecture for Testbed-as-a-Service for Vehicular Fog-based Systems. WF-IoT 2020: 1-6 - [c80]Mohammad Aminul Hoque, Md. Mahmud Hossain, Ragib Hasan
:
IGaaS: An IoT Gateway-as-a-Service for On-demand Provisioning of IoT Gateways. WF-IoT 2020: 1-6
2010 – 2019
- 2019
- [c79]Mohammad Aminul Hoque, Ragib Hasan
:
Towards a Threat Model for Vehicular Fog Computing. UEMCON 2019: 1051-1057 - [c78]Yasser Karim, Ragib Hasan
:
Towards a Threat Model for Fog Computing. UEMCON 2019: 1110-1116 - 2018
- [j14]Md. Mahmud Hossain
, S. M. Riazul Islam
, Farman Ali
, Kyung Sup Kwak, Ragib Hasan
:
An Internet of Things-based health prescription assistant and its security system design. Future Gener. Comput. Syst. 82: 422-439 (2018) - [j13]Ragib Hasan
, Md. Mahmud Hossain
, Rasib Khan:
Aura: An incentive-driven ad-hoc IoT cloud framework for proximal mobile computation offloading. Future Gener. Comput. Syst. 86: 821-835 (2018) - [c77]Jayun Patel, Ragib Hasan
:
Smart bracelets: Towards automating personal safety using wearable smart jewelry. CCNC 2018: 1-2 - [c76]S. M. Riazul Islam, Md. Mahmud Hossain
, Ragib Hasan
, Trung Q. Duong:
A conceptual framework for an IoT-based health assistant and its authorization model. CCWC 2018: 616-621 - [c75]Md. Mahmud Hossain
, Yasser Karim, Ragib Hasan
:
SecuPAN: A Security Scheme to Mitigate Fragmentation-Based Network Attacks in 6LoWPAN. CODASPY 2018: 307-318 - [c74]Md. Mahmud Hossain
, Yasser Karim, Ragib Hasan
:
FIF-IoT: A Forensic Investigation Framework for IoT Using a Public Digital Ledger. ICIOT 2018: 33-40 - [c73]Md. Mahmud Hossain
, Ragib Hasan
, Shams Zawoad:
Probe-IoT: A public digital ledger based forensic investigation framework for IoT. INFOCOM Workshops 2018: 1-2 - [c72]Shams Zawoad, Ragib Hasan
, Mohammad Kamrul Islam:
SECProv: Trustworthy and Efficient Provenance Management in the Cloud. INFOCOM 2018: 1241-1249 - [c71]Rasib Khan, Ragib Hasan
:
Security-Aware Passwords and Services Usage in Developing Countries: A Case Study of Bangladesh. SCC 2018: 67-84 - 2017
- [j12]Ragib Hasan
, Rasib Khan
:
Unified authentication factors and fuzzy service access using interaction provenance. Comput. Secur. 67: 211-231 (2017) - [c70]Arsh Arora, Thomas Stallings, Ragib Hasan
, Gary Warner
:
Malware Secrets: De-Obfuscating in the Cloud. CLOUD 2017: 753-756 - [c69]Shahid Al Noor, Ragib Hasan
, Arsh Arora:
ParkBid: An Incentive Based Crowdsourced Bidding Service for Parking Reservation. SCC 2017: 60-67 - [c68]Rasib Khan, Ragib Hasan
:
DExaS: Delegated experience as a service for mobile and wearable devices. CCNC 2017: 383-388 - [c67]Maya Guru, Ragib Hasan
, Rasib Khan:
Towards non-intrusive continuous healthcare monitoring with the Smart Hospital Gown. CCNC 2017: 618-619 - [c66]Md. Mahmud Hossain
, Ragib Hasan
, Anthony Skjellum:
Securing the Internet of Things: A Meta-Study of Challenges, Approaches, and Open Problems. ICDCS Workshops 2017: 220-225 - [c65]Md. Mahmud Hossain
, Ragib Hasan
:
Boot-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of IoT Nodes. ICIOT 2017: 1-8 - [c64]Md. Mahmud Hossain
, Ragib Hasan
, Shams Zawoad:
Trust-IoV: A Trustworthy Forensic Investigation Framework for the Internet of Vehicles (IoV). ICIOT 2017: 25-32 - [c63]Md. Mahmud Hossain
, Shahid Al Noor, Yasser Karim, Ragib Hasan
:
IoTbed: A Generic Architecture for Testbed as a Service for Internet of Things-Based Systems. ICIOT 2017: 42-49 - [c62]Shahid Al Noor, Ragib Hasan
:
ROSAC: A Round-Wise Fair Scheduling Approach for Mobile Clouds Based on Task Asymptotic Complexity. MobileCloud 2017: 60-65 - [c61]Md. Mahmud Hossain
, Shahid Al Noor, Ragib Hasan
:
HSC-IoT: A Hardware and Software Co-Verification Based Authentication Scheme for Internet of Things. MobileCloud 2017: 109-116 - 2016
- [j11]Shams Zawoad, Ragib Hasan
:
Trustworthy Digital Forensics in the Cloud. Computer 49(3): 78-81 (2016) - [j10]Shams Zawoad, Amit Kumar Dutta, Ragib Hasan
:
Towards Building Forensics Enabled Cloud Through Secure Logging-as-a-Service. IEEE Trans. Dependable Secur. Comput. 13(2): 148-162 (2016) - [j9]Ragib Hasan
, Rasib Khan, Shams Zawoad, Md Munirul Haque:
WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices. IEEE Trans. Emerg. Top. Comput. 4(1): 128-141 (2016) - [c60]Shahid Al Noor, Rasib Khan, Md. Mahmud Hossain
, Ragib Hasan
:
Litigo: A Cost-Driven Model for Opaque Cloud Services. CLOUD 2016: 172-179 - [c59]Md. Mahmud Hossain
, Rasib Khan, Shahid Al Noor, Ragib Hasan
:
Jugo: A Generic Architecture for Composite Cloud as a Service. CLOUD 2016: 806-809 - [c58]Shams Zawoad, Ragib Hasan
:
SECAP: Towards Securing Application Provenance in the Cloud. CLOUD 2016: 900-903 - [c57]Mohammad Kamrul Islam, Ragib Hasan
:
Verifiable Data Redundancy in the Cloud. BDCloud-SocialCom-SustainCom 2016: 29-36 - [c56]Shahid Al Noor, Md. Mahmud Hossain
, Ragib Hasan
:
SASCloud: Ad Hoc Cloud as Secure Storage. BDCloud-SocialCom-SustainCom 2016: 37-44 - [c55]Rasib Khan, Ragib Hasan
:
The Story of Naive Alice: Behavioral Analysis of Susceptible Internet Users. COMPSAC 2016: 390-395 - [c54]Ragib Hasan
, Shams Zawoad, Shahid Al Noor, Md Munirul Haque, Darrell Burke:
How Secure is the Healthcare Network from Insider Attacks? An Audit Guideline for Vulnerability Analysis. COMPSAC 2016: 417-422 - [c53]Shams Zawoad, Ragib Hasan
:
Chronos: Towards Securing System Time in the Cloud for Reliable Forensics Investigation. COMPSAC 2016: 423-432 - [c52]Ragib Hasan
, Rasib Khan:
A Cloud You Can Wear: Towards a Mobile and Wearable Personal Cloud. COMPSAC 2016: 823-828 - [c51]Ragib Hasan
, Shams Zawoad, Md Munirul Haque:
StuxMob: A situational-aware malware for targeted attack on smart mobile devices. MILCOM 2016: 509-514 - [c50]Lei Li, Kai Qian, Qian Chen, Ragib Hasan
, Guifeng Shao:
Developing Hands-on Labware for Emerging Database Security. SIGITE 2016: 60-64 - [c49]Lei Li, Kai Qian, Ragib Hasan
, Qian Chen, Dalei Wu
, Yong Shi:
An Open and Portable Platform for Learning Data Security in Mobile Cloud Computing. SIGITE 2016: 108 - [c48]Md. Mahmud Hossain
, Shahid Al Noor, Dibya Mukhopadhyay, Ragib Hasan
, Lei Li:
CACROS: A Context-Aware Cloud Content Roaming Service. SmartCloud 2016: 57-68 - 2015
- [j8]Shams Zawoad, Ragib Hasan
, John Grimes:
LINCS: Towards building a trustworthy litigation hold enabled cloud storage system. Digit. Investig. 14 Supplement 1: S55-S67 (2015) - [j7]Md Munirul Haque, Ferdaus Ahmed Kawsar, Mohammad Adibuzzaman, Md. Miftah Uddin, Sheikh Iqbal Ahamed, Richard Love, Ragib Hasan
, Rumana Dowla, Tahmina Ferdousy, Reza Salim:
e-ESAS: Evolution of a participatory design-based solution for breast cancer (BC) patients in rural Bangladesh. Pers. Ubiquitous Comput. 19(2): 395-413 (2015) - [c47]Shams Zawoad, Ragib Hasan
, Anthony Skjellum:
OCF: An Open Cloud Forensics Model for Reliable Digital Forensics. CLOUD 2015: 437-444 - [c46]Maziar Fotouhi, Abhishek Anand, Ragib Hasan
:
PLAG: Practical Landmark Allocation for Cloud Geolocation. CLOUD 2015: 1103-1106 - [c45]Rasib Khan, Ragib Hasan
:
Fuzzy Authentication Using Interaction Provenance in Service Oriented Computing. SCC 2015: 170-177 - [c44]Shams Zawoad, Ragib Hasan
:
FAIoT: Towards Building a Forensics Aware Eco System for the Internet of Things. SCC 2015: 279-284 - [c43]Rasib Khan, Ragib Hasan
:
MIDEP: Multiparty Identity Establishment Protocol for Decentralized Collaborative Services. SCC 2015: 546-553 - [c42]Shahid Al Noor, Ragib Hasan
:
D-CLOC: A Delay Tolerant Cloud Formation Using Context-Aware Mobile Crowdsourcing. CloudCom 2015: 147-154 - [c41]Shams Zawoad, Ragib Hasan
:
Digital Forensics in the Age of Big Data: Challenges, Approaches, and Opportunities. HPCC/CSS/ICESS 2015: 1320-1325 - [c40]Shams Zawoad, Ragib Hasan
:
A Trustworthy Cloud Forensics Environment. IFIP Int. Conf. Digital Forensics 2015: 271-285 - [c39]Rasib Khan, Ragib Hasan
, Jinfang Xu:
SEPIA: Secure-PIN-Authentication-as-a-Service for ATM Using Mobile and Wearable Devices. MobileCloud 2015: 41-50 - [c38]Ragib Hasan
, Md. Mahmud Hossain
, Rasib Khan:
Aura: An IoT Based Cloud Infrastructure for Localized Mobile Computation Outsourcing. MobileCloud 2015: 183-188 - [c37]Shams Zawoad, Ragib Hasan
:
Towards a Systematic Analysis of Challenges and Issues in Secure Mobile Cloud Forensics. MobileCloud 2015: 237-238 - [c36]Md. Mahmud Hossain
, Maziar Fotouhi, Ragib Hasan
:
Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things. SERVICES 2015: 21-28 - [c35]Niju Shrestha, Rajan Kumar Kharel, Jason Britt, Ragib Hasan
:
High-Performance Classification of Phishing URLs Using a Multi-modal Approach with MapReduce. SERVICES 2015: 206-212 - 2014
- [j6]Shams Zawoad, Marjan Mernik, Ragib Hasan
:
Towards building a forensics aware language for secure logging. Comput. Sci. Inf. Syst. 11(4): 1291-1314 (2014) - [j5]Kazi Zunnurhain, Susan V. Vrbsky, Ragib Hasan
:
FAPA: flooding attack protection architecture in a cloud system. Int. J. Cloud Comput. 3(4): 379-401 (2014) - [j4]Rasib Khan, Mainul Mizan, Ragib Hasan
, Alan P. Sprague:
Hot Zone Identification: Analyzing Effects of Data Sampling on Spam Clustering. J. Digit. Forensics Secur. Law 9(1): 67-82 (2014) - [c34]Shahid Al Noor, Ragib Hasan
, Md Munirul Haque:
CellCloud: A Novel Cost Effective Formation of Mobile Cloud Based on Bidding Incentives. IEEE CLOUD 2014: 200-207 - [c33]Shams Zawoad, Ragib Hasan
, Md Munirul Haque, Gary Warner
:
CURLA: Cloud-Based Spam URL Analyzer for Very Large Datasets. IEEE CLOUD 2014: 729-736 - [c32]Abu Awal Md Shoeb, Ragib Hasan
, Md. Haque, Meng Hu:
A Comparative Study on I/O Performance between Compute and Storage Optimized Instances of Amazon EC2. IEEE CLOUD 2014: 970-971 - [c31]Shams Zawoad, Ragib Hasan
, Gary Warner
, Anthony Skjellum:
UDaaS: A Cloud-Based URL-Deduplication-as-a-Service for Big Datasets. BDCloud 2014: 271-272 - [c30]Rasib Khan, Shams Zawoad, Munirul M. Haque, Ragib Hasan
:
OTIT: towards secure provenance modeling for location proofs. AsiaCCS 2014: 87-98 - [c29]Ragib Hasan
, Rasib Khan:
Interaction provenance model for unified authentication factors in service oriented computing. CODASPY 2014: 127-130 - [c28]Rasib Khan, Shams Zawoad, Md Munirul Haque, Ragib Hasan
:
'Who, When, and Where?' Location Proof Assertion for Mobile Devices. DBSec 2014: 146-162 - [c27]Suraj Maharjan, Prasha Shrestha, Thamar Solorio, Ragib Hasan
:
A Straightforward Author Profiling Approach in MapReduce. IBERAMIA 2014: 95-107 - [c26]Thamar Solorio, Ragib Hasan, Mainul Mizan:
Sockpuppet Detection in Wikipedia: A Corpus of Real-World Deceptive Writing for Linking Identities. LREC 2014: 1355-1358 - [c25]Khalid Zaman Bijon, Md Munirul Haque, Ragib Hasan
:
A trust based Information sharing model (TRUISM) in MANET in the presence of uncertainty. PST 2014: 347-354 - [p3]Ragib Hasan
:
Security in Big Data and Cloud Computing: Challenges, Solutions, and Open Problems. Large Scale and Big Data 2014: 579-594 - 2013
- [c24]Shams Zawoad, Amit Kumar Dutta, Ragib Hasan
:
SecLaaS: secure logging-as-a-service for cloud forensics. AsiaCCS 2013: 219-230 - [c23]Ragib Hasan
, Nitesh Saxena, Tzipora Halevi, Shams Zawoad, Dustin Rinehart:
Sensing-enabled channels for hard-to-detect command and control of mobile devices. AsiaCCS 2013: 469-480 - [c22]Shams Zawoad, Amit Kumar Dutta, Alan P. Sprague, Ragib Hasan
, Jason Britt, Gary Warner
:
Phish-Net: Investigating phish clusters using drop email addresses. eCrime 2013: 1-13 - [c21]Shams Zawoad, Marjan Mernik, Ragib Hasan:
FAL: A Forensics Aware Language for Secure Logging. FedCSIS 2013: 1567-1574 - [c20]Amit Kumar Dutta, Ragib Hasan
:
How Much Does Storage Really Cost? Towards a Full Cost Accounting Model for Data Storage. GECON 2013: 29-43 - [c19]Mainul Mizan, Md. Lutfor Rahman, Rasib Khan, Munirul M. Haque, Ragib Hasan
:
Accountable proof of ownership for data using timing element in cloud services. HPCS 2013: 57-64 - [i9]Shams Zawoad, Amit Kumar Dutta, Ragib Hasan:
SecLaaS: Secure Logging-as-a-Service for Cloud Forensics. CoRR abs/1302.6267 (2013) - [i8]Shams Zawoad, Ragib Hasan:
Cloud Forensics: A Meta-Study of Challenges, Approaches, and Open Problems. CoRR abs/1302.6312 (2013) - [i7]Thamar Solorio, Ragib Hasan, Mainul Mizan:
Sockpuppet Detection in Wikipedia: A Corpus of Real-World Deceptive Writing for Linking Identities. CoRR abs/1310.6772 (2013) - 2012
- [c18]Patrick Butler, Adam Rhodes, Ragib Hasan
:
MANTICORE: Masking All Network Traffic via IP Concealment with OpenVPN Relaying to EC2. IEEE CLOUD 2012: 487-493 - [c17]Shams Zawoad, Ragib Hasan
:
I Have the Proof: Providing Proofs of Past Data Possession in Cloud Forensics. CyberSecurity 2012: 75-82 - [c16]Edward Ferguson, Joseph Weber, Ragib Hasan
:
Cloud Based Content Fetching: Using Cloud Infrastructure to Obfuscate Phishing Scam Analysis. SERVICES 2012: 255-261 - [i6]Shams Zawoad, Ragib Hasan:
The Enemy Within: The Emerging Threats to Healthcare from Malicious Mobile Devices. CoRR abs/1210.2149 (2012) - [i5]Shams Zawoad, Ragib Hasan:
I Have the Proof: Providing Proofs of Past Data Possession in Cloud Forensics. CoRR abs/1211.4328 (2012) - 2011
- [c15]Ragib Hasan
, Marianne Winslett:
Efficient audit-based compliance for relational data retention. AsiaCCS 2011: 238-248 - [i4]Ragib Hasan, Randal C. Burns:
The Life and Death of Unwanted Bits: Towards Proactive Waste Data Management in Digital Ecosystems. CoRR abs/1106.6062 (2011) - [i3]