scispace - formally typeset
M

Mahmud Hossain

Researcher at University of Alabama at Birmingham

Publications -  26
Citations -  2480

Mahmud Hossain is an academic researcher from University of Alabama at Birmingham. The author has contributed to research in topics: Cloud computing & Universal Plug and Play. The author has an hindex of 9, co-authored 24 publications receiving 1889 citations. Previous affiliations of Mahmud Hossain include University of Alabama & Temple University.

Papers
More filters
Journal ArticleDOI

The Internet of Things for Health Care: A Comprehensive Survey

TL;DR: An intelligent collaborative security model to minimize security risk is proposed; how different innovations such as big data, ambient intelligence, and wearables can be leveraged in a health care context is discussed; and various IoT and eHealth policies and regulations are addressed to determine how they can facilitate economies and societies in terms of sustainable development.
Proceedings ArticleDOI

FIF-IoT: A Forensic Investigation Framework for IoT Using a Public Digital Ledger

TL;DR: FIF-IoT presents a framework that ensures integrity, confidentiality, anonymity, and non-repudiation of the evidence stored in the public digital ledger, and provides a mechanism to acquire evidence from the ledger and to verify the integrity of the obtained evidence.
Proceedings ArticleDOI

Trust-IoV: A Trustworthy Forensic Investigation Framework for the Internet of Vehicles (IoV)

TL;DR: This article proposes TrustIoV – a digital forensic framework for the IoV systems that provides mechanisms to collect and store trustworthy evidence from the distributed infrastructure and maintains a secure provenance of the evidence to ensure the integrity of the stored evidence.
Proceedings ArticleDOI

Probe-IoT: A public digital ledger based forensic investigation framework for IoT

TL;DR: Probe-IoT — a forensic investigation framework using a public digital ledger to find facts in criminal incidents in IoT-based systems and provides a mechanism to acquire evidence from the ledger and verify the authenticity and integrity of the obtained evidence.
Proceedings ArticleDOI

Securing the Internet of Things: A Meta-Study of Challenges, Approaches, and Open Problems

TL;DR: This paper provides a systematic analysis of security issues of IoT-based systems and highlights a set of open problems and provides a detailed description for each.