Shams Zawoad, PhD

San Francisco Bay Area Contact Info
1K followers 500+ connections

Join to view profile

About

Shams Zawoad is currently working at Visa Inc. as the Director of Cyber Threat Analytics…

Experience & Education

  • Visa

View Shams’s full experience

See their title, tenure and more.

or

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Volunteer Experience

Publications

  • Towards Building Forensics Enabled Cloud Through Secure Logging-as-a-Service

    IEEE Transactions on Dependable and Secure Computing (TDSC), 2016. (Impact factor 1.351)

  • Trustworthy Digital Forensics in the Cloud

    IEEE Computer (Impact factor 1.443)

    Other authors
    See publication
  • Chronos: Towards Securing System Time in the Cloud for Reliable Forensics Investigation

    40th IEEE Computer Society International Conference on Computers, Software & Applications (COMPSAC)

    Other authors
  • How Secure is the Healthcare Network from Insider Attacks? An Audit Guideline for Vulnerability Analysis

    40th IEEE Computer Society International Conference on Computers, Software & Applications (COMPSAC)

    Other authors
  • StuxMob: A Situational-Aware Malware for Targeted Attack on Smart Mobile Devices

    Premier International Conference for Military Communications

    Other authors
  • Digital Forensics in the Age of Big Data: Challenges, Approaches, and Opportunities

    IEEE International Symposium on Big Data Security on Cloud (BigDataSecurity 2015)

    Other authors
  • FAIoT : Towards Building a Forensics Aware Eco System for the Internet of Things

    12th IEEE International Conference on Services Computing (IEEE SCC, 2015)

    Other authors
  • FECloud: A Trustworthy Forensics-Enabled Cloud Architecture

    11th Annual IFIP WG 11.9 International Conference on Digital Forensics

    Other authors
  • LINCS: Towards Building a Trustworthy Litigation Hold Enabled Cloud Storage System

    Digital Investigation, Elsevier, 2015. (Impact factor 1.648)

    Other authors
    See publication
  • OCF: An Open Cloud Forensics Model for Reliable Digital Forensics

    8th IEEE International Conference on Cloud Computing (IEEE Cloud 2015)

    Other authors
  • WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices

    IEEE Transactions on Emerging Topics in Computing SI on Cyber Security

    Other authors
  • `Who, When, and Where?’ Location Proof Assertion for Mobile Devices

    28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec)

    Other authors
  • CURLA: Cloud-Based Spam URL Analyzer for Very Large Datasets

    7th IEEE International Conference on Cloud Computing

    Other authors
  • Towards a Cloud-based Approach for Spam URL Deduplication for Big Datasets

    International Journal of Cloud Computing (IJCC)

    Other authors
  • Towards Building A Forensics Aware Language For Secure Logging

    Journal of Computer Science and Information Systems (ComSIS)

    Other authors
  • UDaaS: A Cloud-based URL-Deduplication-as-a-Service for Big Datasets

    4th IEEE International Conference on Big Data and Cloud Computing (BDCloud)

    Other authors
  • Digital Forensics in the Cloud

    The Journal of Defense Software Engineering (CrossTalk)

    Other authors
    See publication
  • Phish-Net: Investigating Phish Clusters Using Drop Email Addresses

    APWG eCrime Researchers Summit

    Other authors
  • FAL: A Forensics Aware Language for Secure Logging

    4th Workshop on Advances in Programming Languages (WAPL), 2013

    Other authors
  • SecLaaS: Secure Logging-as-a-Service for Cloud Forensics

    8th ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2013. (Acceptance rate: 16.2%)

    Other authors
  • Secure Techniques and Methods for Authenticating Visually Impaired Mobile Phone Users

    IEEE International Conference on Technologies for Homeland Security

    Other authors
  • Sensing-Enabled Channels for Hard-to-Detect Command and Control of Mobile Devices

    8th ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2013. (Acceptance rate: 16.2%)

    Other authors
  • I Have the Proof: Providing Proofs of Past Data Possession in Cloud Forensics

    ASE International Conference on Cyber Security (Acceptance rate: 9.4%)

    Other authors
    See publication
  • Towards Building Proofs of Past Data Possession in Cloud Forensics

    Academy of Science and Engineering Journal 2012

    Other authors
    See publication
  • OTIT: Towards Secure Provenance Modeling for Location Proofs

    9th ACM Symposium on Information, Computer and Communications Security (ASIACCS), Kyoto, Japan, June 2014

    Other authors
  • SECProv: Trustworthy and Efficient Provenance Management in the Cloud

    IEEE INFOCOM, 2018

    Other authors

Projects

  • Vela Core ERP Solution

    -

    Customized ERP solution using Java Enterprise Architecture
    Designed and Developed architecture and databases structure for Authentication and Authorization, Marketing, Commercial, and HR modules. Developed the form navigation framework of the application. Led the development of Marketing and Commercial modules.

    Other creators
    See project

Honors & Awards

  • The College of Arts and Sciences Dean’s Award (Doctoral)

    University of Alabama at Birmingham

  • 2nd position in 2013 UAB Graduate Student Research Days competition

    University of Alabama at Birmingham

  • Dean's List Award for academic excellence in several terms of undergraduate study.

    -

  • Secured 1st position among more than 200,000 examinees of the Rajshahi Education Board and 5th in the whole country among more than 1 million examinees in Higher Secondary Certificate examination, 2002 (equivalent to US High School Graduation).

    -

  • Secured 8th position among 250,000 students of the Rajshahi Education Board in Secondary School Certificate examination, 2000 (equivalent to US 10th grade).

    -

  • Sigma Xi Grant-in-Aid of Research award, 2015.

    -

  • Student Travel Gant - APWG eCrime Researchers Summit, 2013.

    -

  • Student Travel Grant - DFRWS US, 2015.

    -

  • Student Travel Grant - IEEE Syposium on Security and Privacy,2013

    -

  • Student Travel Grant - USENIX Federated Conferences Week 2012.

    -

  • Team member of runners up team in web site competition for CSE department of BUET.

    -

Recommendations received

View Shams’ full profile

  • See who you know in common
  • Get introduced
  • Contact Shams directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Add new skills with these courses