Mohammad Maifi Hasan Khan
Title
Cited by
Cited by
Year
Dustminer: troubleshooting interactive complexity bugs in sensor networks
MMH Khan, HK Le, H Ahmadi, TF Abdelzaher, J Han
Proceedings of the 6th ACM conference on Embedded network sensor systems, 99-112, 2008
1282008
Performance prediction for apache spark platform
K Wang, MMH Khan
2015 IEEE 17th International Conference on High Performance Computing and …, 2015
1032015
SNTS: Sensor network troubleshooting suite
MMH Khan, L Luo, C Huang, T Abdelzaher
International Conference on Distributed Computing in Sensor Systems, 142-157, 2007
592007
Why do they do what they do?: A study of what motivates users to (not) follow computer security advice
M Fagan, MMH Khan
Twelfth Symposium on Usable Privacy and Security ({SOUPS} 2016), 59-75, 2016
572016
A study of users’ experiences and beliefs about software update messages
M Fagan, MMH Khan, R Buck
Computers in Human Behavior 51, 504-519, 2015
482015
Diagnostic powertracing for sensor node failure analysis
MMH Khan, HK Le, M LeMay, P Moinzadeh, L Wang, Y Yang, DK Noh, ...
Proceedings of the 9th ACM/IEEE international conference on information …, 2010
412010
Towards diagnostic simulation in sensor networks
MMH Khan, T Abdelzaher, KK Gupta
International Conference on Distributed Computing in Sensor Systems, 252-265, 2008
312008
Modeling interference for apache spark jobs
K Wang, MMH Khan, N Nguyen, S Gokhale
2016 IEEE 9th International Conference on Cloud Computing (CLOUD), 423-431, 2016
182016
An investigation into users’ considerations towards using password managers
M Fagan, Y Albayram, MMH Khan, R Buck
Human-centric Computing and Information Sciences 7 (1), 12, 2017
172017
The user affective experience scale: A measure of emotions anticipated in response to pop-up computer warnings
R Buck, M Khan, M Fagan, E Coman
International Journal of Human–Computer Interaction 34 (1), 25-34, 2018
162018
How does this message make you feel? A study of user perspectives on software update/warning message design
M Fagan, MMH Khan, N Nguyen
Human-centric Computing and Information Sciences 5 (1), 36, 2015
162015
Troubleshooting interactive complexity bugs in wireless sensor networks using data mining techniques
MMH Khan, HK Le, H Ahmadi, TF Abdelzaher, J Han
ACM Transactions on Sensor Networks (TOSN) 10 (2), 1-35, 2014
162014
Pronet: Network trust assessment based on incomplete provenance
K Govindan, X Wang, M Khan, G Dogan, K Zeng, GM Powell, T Brown, ...
2011-MILCOM 2011 Military Communications Conference, 1213-1218, 2011
162011
A study on designing video tutorials for promoting security features: A case study in the context of two-factor authentication (2FA)
Y Albayram, MMH Khan, M Fagan
International Journal of Human–Computer Interaction 33 (11), 927-942, 2017
152017
Finding symbolic bug patterns in sensor networks
MMH Khan, T Abdelzaher, J Han, H Ahmadi
International Conference on Distributed Computing in Sensor Systems, 131-144, 2009
152009
Evaluation of network trust using provenance based on distributed local intelligence
G Dogan, T Brown, K Govindan, HKM Maifi, T Abdelzaher, P Mohapatra, ...
2011-MILCOM 2011 Military Communications Conference, 1493-1498, 2011
142011
Designing challenge questions for location‐based authentication systems: a real‐life study
Y Albayram, MMH Khan, A Bamis, S Kentros, N Nguyen, R Jiang
Human-centric Computing and Information Sciences 5 (1), 17, 2015
132015
“... better to use a lock screen than to worry about saving a few seconds of time”: Effect of Fear Appeal in the Context of Smartphone Locking Behavior
Y Albayram, MMH Khan, T Jensen, N Nguyen
Thirteenth Symposium on Usable Privacy and Security ({SOUPS} 2017), 49-63, 2017
122017
Context aware data acquisition framework for dynamic data driven applications systems (DDDAS)
N Nguyen, MMH Khan
MILCOM 2013-2013 IEEE Military Communications Conference, 334-341, 2013
112013
A closed-loop context aware data acquisition and resource allocation framework for dynamic data driven applications systems (DDDAS) on the cloud
N Nguyen, MMH Khan
Journal of Systems and Software 109, 88-105, 2015
102015
The system can't perform the operation now. Try again later.
Articles 1–20