Mohammad Maifi Hasan Khan
TitleCited byYear
Dustminer: troubleshooting interactive complexity bugs in sensor networks
MMH Khan, HK Le, H Ahmadi, TF Abdelzaher, J Han
Proceedings of the 6th ACM conference on Embedded network sensor systems, 99-112, 2008
1232008
Performance prediction for apache spark platform
K Wang, MMH Khan
2015 IEEE 17th International Conference on High Performance Computing and …, 2015
892015
SNTS: Sensor network troubleshooting suite
MMH Khan, L Luo, C Huang, T Abdelzaher
International Conference on Distributed Computing in Sensor Systems, 142-157, 2007
572007
Why do they do what they do?: A study of what motivates users to (not) follow computer security advice
M Fagan, MMH Khan
Twelfth Symposium on Usable Privacy and Security ({SOUPS} 2016), 59-75, 2016
412016
Diagnostic powertracing for sensor node failure analysis
MMH Khan, HK Le, M LeMay, P Moinzadeh, L Wang, Y Yang, DK Noh, ...
Proceedings of the 9th ACM/IEEE international conference on information …, 2010
402010
A study of users’ experiences and beliefs about software update messages
M Fagan, MMH Khan, R Buck
Computers in Human Behavior 51, 504-519, 2015
382015
Towards diagnostic simulation in sensor networks
MMH Khan, T Abdelzaher, KK Gupta
International Conference on Distributed Computing in Sensor Systems, 252-265, 2008
282008
Pronet: Network trust assessment based on incomplete provenance
K Govindan, X Wang, M Khan, G Dogan, K Zeng, GM Powell, T Brown, ...
2011-MILCOM 2011 Military Communications Conference, 1213-1218, 2011
162011
Finding symbolic bug patterns in sensor networks
MMH Khan, T Abdelzaher, J Han, H Ahmadi
International Conference on Distributed Computing in Sensor Systems, 131-144, 2009
162009
An investigation into users’ considerations towards using password managers
M Fagan, Y Albayram, MMH Khan, R Buck
Human-centric Computing and Information Sciences 7 (1), 12, 2017
152017
Modeling interference for apache spark jobs
K Wang, MMH Khan, N Nguyen, S Gokhale
2016 IEEE 9th International Conference on Cloud Computing (CLOUD), 423-431, 2016
152016
Evaluation of network trust using provenance based on distributed local intelligence
G Dogan, T Brown, K Govindan, HKM Maifi, T Abdelzaher, P Mohapatra, ...
2011-MILCOM 2011 Military Communications Conference, 1493-1498, 2011
152011
How does this message make you feel? A study of user perspectives on software update/warning message design
M Fagan, MMH Khan, N Nguyen
Human-centric Computing and Information Sciences 5 (1), 36, 2015
142015
Troubleshooting interactive complexity bugs in wireless sensor networks using data mining techniques
MMH Khan, HK Le, H Ahmadi, TF Abdelzaher, J Han
ACM Transactions on Sensor Networks (TOSN) 10 (2), 31, 2014
142014
A study on designing video tutorials for promoting security features: A case study in the context of two-factor authentication (2FA)
Y Albayram, MMH Khan, M Fagan
International Journal of Human–Computer Interaction 33 (11), 927-942, 2017
122017
Designing challenge questions for location‐based authentication systems: a real‐life study
Y Albayram, MMH Khan, A Bamis, S Kentros, N Nguyen, R Jiang
Human-centric Computing and Information Sciences 5 (1), 17, 2015
122015
The user affective experience scale: A measure of emotions anticipated in response to pop-up computer warnings
R Buck, M Khan, M Fagan, E Coman
International Journal of Human–Computer Interaction 34 (1), 25-34, 2018
112018
Power-based diagnosis of node silence in remote high-end sensing systems
Y Yang, L Su, M Khan, M Lemay, T Abdelzaher, J Han
ACM Transactions on Sensor Networks (TOSN) 11 (2), 33, 2015
102015
Evaluating the effectiveness of using hints for autobiographical authentication: A field study
Y Albayram, MMH Khan
Eleventh Symposium On Usable Privacy and Security ({SOUPS} 2015), 211-224, 2015
92015
Context aware data acquisition framework for dynamic data driven applications systems (DDDAS)
N Nguyen, MMH Khan
MILCOM 2013-2013 IEEE Military Communications Conference, 334-341, 2013
92013
The system can't perform the operation now. Try again later.
Articles 1–20