Mohammad Maifi Hasan Khan

Orcid: 0000-0001-5046-4100

According to our database1, Mohammad Maifi Hasan Khan authored at least 59 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Human vs. Automation: Which One Will You Trust More If You Are About to Lose Money?
Int. J. Hum. Comput. Interact., July, 2023

The Mediating Effect of Emotions on Trust in the Context of Automated System Usage.
IEEE Trans. Affect. Comput., 2023

Divergences in Blame Attribution after a Security Breach based on Compliance Behavior: Implications for Post-breach Risk Communication.
Proceedings of the 2023 European Symposium on Usable Security, 2023

Effect of Device Risk Perceptions and Understandability of Data Management Features on Consumers' Willingness to Pay (WTP) for IoT Device Premium Data Management Plan.
Proceedings of the 2023 European Symposium on Usable Security, 2023

The Nuanced Nature of Trust and Privacy Control Adoption in the Context of Google.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

2022
I'm Only Human: The Effects of Trust Dampening by Anthropomorphic Agents.
Proceedings of the HCI International 2022 - Late Breaking Papers: Interacting with eXtended Reality and Artificial Intelligence, 2022

2021
Trust and Anthropomorphism in Tandem: The Interrelated Nature of Automated Agent Appearance and Reliability in Trustworthiness Perceptions.
Proceedings of the DIS '21: Designing Interactive Systems Conference 2021, 2021

Do Integral Emotions Affect Trust? The Mediating Effect of Emotions on Trust in the Context of Human-Agent Interaction.
Proceedings of the DIS '21: Designing Interactive Systems Conference 2021, 2021

2020
Anticipated Emotions in Initial Trust Evaluations of a Drone System Based on Performance and Process Information.
Int. J. Hum. Comput. Interact., 2020

The Role of Behavioral Anthropomorphism in Human-Automation Trust Calibration.
Proceedings of the Artificial Intelligence in HCI, 2020

Investigating the Effects of (Empty) Promises on Human-Automation Interaction and Trust Repair.
Proceedings of the HAI '20: 8th International Conference on Human-Agent Interaction, 2020

A Dynamic Resource Allocation Framework for Apache Spark Applications.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

Who Would Bob Blame? Factors in Blame Attribution in Cyberattacks Among the Non-Adopting Population in the Context of 2FA.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

2019
Investigating the Effect of System Reliability, Risk, and Role on Users' Emotions and Attitudes toward a Safety-Critical Drone System.
Int. J. Hum. Comput. Interact., 2019

Design and implementation of an analytical framework for interference aware job scheduling on Apache Spark platform.
Clust. Comput., 2019

A Model Driven Approach Towards Improving the Performance of Apache Spark Applications.
Proceedings of the IEEE International Symposium on Performance Analysis of Systems and Software, 2019

Effect of Feedback on Users' Immediate Emotions: Analysis of Facial Expressions during a Simulated Target Detection Task.
Proceedings of the International Conference on Multimodal Interaction, 2019

The Apple Does Fall Far from the Tree: User Separation of a System from its Developers in Human-Automation Trust Repair.
Proceedings of the 2019 on Designing Interactive Systems Conference, DIS 2019, San Diego, 2019

2018
To Follow or Not to Follow: A Study of User Motivations around Cybersecurity Advice.
IEEE Internet Comput., 2018

The User Affective Experience Scale: A Measure of Emotions Anticipated in Response to Pop-Up Computer Warnings.
Int. J. Hum. Comput. Interact., 2018

The Effects of Risk and Role on Users' Anticipated Emotions in Safety-Critical Systems.
Proceedings of the Engineering Psychology and Cognitive Ergonomics, 2018

Initial Trustworthiness Perceptions of a Drone System based on Performance and Process Information.
Proceedings of the 6th International Conference on Human-Agent Interaction, 2018

Towards Automatic Tuning of Apache Spark Configuration.
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018

2017
A Study on Designing Video Tutorials for Promoting Security Features: A Case Study in the Context of Two-Factor Authentication (2FA).
Int. J. Hum. Comput. Interact., 2017

An investigation into users' considerations towards using password managers.
Hum. centric Comput. Inf. Sci., 2017

"...better to use a lock screen than to worry about saving a few seconds of time": Effect of Fear Appeal in the Context of Smartphone Locking Behavior.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

Arion: A Model-Driven Middleware for Minimizing Data Loss in Stream Data Storage.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

Understanding the Influence of Configuration Settings: An Execution Model-Driven Framework for Apache Spark Platform.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

2016
Evaluating smartphone-based dynamic security questions for fallback authentication: a field study.
Hum. centric Comput. Inf. Sci., 2016

Why Do They Do What They Do?: A Study of What Motivates Users to (Not) Follow Computer Security Advice.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016

Modeling Interference for Apache Spark Jobs.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

CSMiner: An Automated Tool for Analyzing Changes in Configuration Settings across Multiple Versions of Large Scale Cloud Software.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

2015
Power-Based Diagnosis of Node Silence in Remote High-End Sensing Systems.
ACM Trans. Sens. Networks, 2015

A closed-loop context aware data acquisition and resource allocation framework for dynamic data driven applications systems (DDDAS) on the cloud.
J. Syst. Softw., 2015

Designing challenge questions for location-based authentication systems: a real-life study.
Hum. centric Comput. Inf. Sci., 2015

How does this message make you feel? A study of user perspectives on software update/warning message design.
Hum. centric Comput. Inf. Sci., 2015

A study of users' experiences and beliefs about software update messages.
Comput. Hum. Behav., 2015

Evaluating the Effectiveness of Using Hints for Autobiographical Authentication: A Field Study.
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015

Performance Prediction for Apache Spark Platform.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

2014
Troubleshooting interactive complexity bugs in wireless sensor networks using data mining techniques.
ACM Trans. Sens. Networks, 2014

A Location-Based Authentication System Leveraging Smartphones.
Proceedings of the IEEE 15th International Conference on Mobile Data Management, 2014

2013
Context Aware Data Acquisition Framework for Dynamic Data Driven Applications Systems (DDDAS).
Proceedings of the 32th IEEE Military Communications Conference, 2013

Performance analysis of a fault-tolerant exact motif mining algorithm on the cloud.
Proceedings of the IEEE 32nd International Performance Computing and Communications Conference, 2013

2012
Leveraging Cloud Infrastructure for Troubleshooting Edge Computing Systems.
Proceedings of the 18th IEEE International Conference on Parallel and Distributed Systems, 2012

2011
Troubleshooting interactive complexity bugs
PhD thesis, 2011

PRONET: Network trust assessment based on incomplete provenance.
Proceedings of the MILCOM 2011, 2011

Evaluation of network trust using provenance based on distributed local intelligence.
Proceedings of the MILCOM 2011, 2011

Power watermarking: Facilitating power-based diagnosis of node silence in remote high-end sensing systems.
Proceedings of the 10th International Conference on Information Processing in Sensor Networks, 2011

DustDoctor: A self-healing sensor data collection system.
Proceedings of the 10th International Conference on Information Processing in Sensor Networks, 2011

Exposing Complex Bug-Triggering Conditions in Distributed Systems via Graph Mining.
Proceedings of the International Conference on Parallel Processing, 2011

Understanding Vicious Cycles in Server Clusters.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

2010
Diagnostic powertracing for sensor node failure analysis.
Proceedings of the 9th International Conference on Information Processing in Sensor Networks, 2010

2009
Finding Symbolic Bug Patterns in Sensor Networks.
Proceedings of the Distributed Computing in Sensor Systems, 2009

2008
Dustminer: troubleshooting interactive complexity bugs in sensor networks.
Proceedings of the 6th International Conference on Embedded Networked Sensor Systems, 2008

Data Mining for Diagnostic Debugging in Sensor Networks: Preliminary Evidence and Lessons Learned.
Proceedings of the Knowledge Discovery from Sensor Data, 2008

Towards Diagnostic Simulation in Sensor Networks.
Proceedings of the Distributed Computing in Sensor Systems, 2008

2007
Towards a Layered Architecture for Object-Based Execution in Wide-Area Deeply Embedded Computing.
Proceedings of the Tenth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2007), 2007

Leveraging Computational Grid Technologies for Building a Secure and Manageable Power Grid.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

SNTS: Sensor Network Troubleshooting Suite.
Proceedings of the Distributed Computing in Sensor Systems, 2007


  Loading...