Mustaque Ahamad

According to our database1, Mustaque Ahamad
  • authored at least 124 papers between 1984 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2017
SoK: Fraud in Telephony Networks.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

2016
Towards Measuring and Mitigating Social Engineering Software Download Attacks.
Proceedings of the 25th USENIX Security Symposium, 2016

Understanding Cross-Channel Abuse with SMS-Spam Support Infrastructure Attribution.
Proceedings of the Computer Security - ESORICS 2016, 2016

Exploiting Phone Numbers and Cross-Application Features in Targeted Mobile Attacks.
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, 2016

MobiPot: Understanding Mobile Telephony Threats with Honeycards.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Abusing Phone Numbers and Cross-Application Features for Crafting Targeted Attacks.
CoRR, 2015

WebWitness: Investigating, Categorizing, and Mitigating Malware Download Paths.
Proceedings of the 24th USENIX Security Symposium, 2015

Phoneypot: Data-driven Understanding of Telephony Threats.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

2014
Augmenting security and accountability within the eHealth Exchange.
IBM Journal of Research and Development, 2014

Combating Abuse of Health Data in the Age of eHealth Exchange.
Proceedings of the 2014 IEEE International Conference on Healthcare Informatics, 2014

2013
ExecScent: Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

2012
One-time cookies: Preventing session hijacking attacks with stateless authentication tokens.
ACM Trans. Internet Techn., 2012

Enabling Robust Information Accountability in E-healthcare Systems.
Proceedings of the 3rd USENIX Workshop on Health Security and Privacy, 2012

Enhancing accountability of electronic health record usage via patient-centric monitoring.
Proceedings of the ACM International Health Informatics Symposium, 2012

Trust No One Else: Detecting MITM Attacks against SSL/TLS without Third-Parties.
Proceedings of the Computer Security - ESORICS 2012, 2012

Protecting health information on mobile devices.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

2011
Improving Authentication Performance of Distributed SIP Proxies.
IEEE Trans. Parallel Distrib. Syst., 2011

2010
Protecting E-healthcare Client Devices against Malware and Physical Theft.
Proceedings of the 1st USENIX Workshop on Health Security and Privacy, 2010

PinDr0p: using single-ended audio features to determine call provenance.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Packet scheduling for deep packet inspection on multi-core architectures.
Proceedings of the 2010 ACM/IEEE Symposium on Architecture for Networking and Communications Systems, 2010

2009
Improving authentication performance of distributed SIP proxies.
Proceedings of the Principles, 2009

User-Centric Handling of Identity Agent Compromise.
Proceedings of the Computer Security, 2009

Using identity credential usage logs to detect anomalous service accesses.
Proceedings of the 5th Workshop on Digital Identity Management, 2009

2008
Privacy analysis and enhancements for data sharing in *nix systems.
IJICS, 2008

SERvartuka: Dynamic Distribution of State to Improve SIP Server Scalability.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008

Protectit: trusted distributed services operating on sensitive data.
Proceedings of the 2008 EuroSys Conference, Glasgow, Scotland, UK, April 1-4, 2008, 2008

ALPACA: a lightweight platform for analyzing claim acceptability.
Proceedings of the 2nd ACM Workshop on Information Credibility on the Web, 2008

2007
Countering feedback sparsity and manipulation in reputation systems.
Proceedings of the 3rd International Conference on Collaborative Computing: Networking, 2007

CallRank: Combating SPIT Using Call Duration, Social Networks and Global Reputation.
Proceedings of the CEAS 2007, 2007

2006
Trade-offs between reliability and overheads in peer-to-peer reputation tracking.
Computer Networks, 2006

Countering Security Information Overload through Alert and Packet Visualization.
IEEE Computer Graphics and Applications, 2006

FeedEx: collaborative exchange of news feeds.
Proceedings of the 15th international conference on World Wide Web, 2006

Privacy Analysis for Data Sharing in *nix Systems.
Proceedings of the 2006 USENIX Annual Technical Conference, Boston, MA, USA, May 30, 2006

2005
A Framework for Countering Denial-of-Information Attacks.
IEEE Security & Privacy, 2005

Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic Queries.
Proceedings of the IEEE Workshop on Visualization for Computer Security (VizSEC 2005), 2005

Agile Store: Experience with Quorum-Based Data Replication Techniques for Adaptive Byzantine Fault Tolerance.
Proceedings of the 24th IEEE Symposium on Reliable Distributed Systems (SRDS 2005), 2005

Attacking information visualization system usability overloading and deceiving the human.
Proceedings of the 1st Symposium on Usable Privacy and Security, 2005

Improving Service Performance through Object Replication in Middleware: A Peer-to-Peer Approach.
Proceedings of the Fifth IEEE International Conference on Peer-to-Peer Computing (P2P 2005), 31 August, 2005

Filtering, Fusion and Dynamic Information Presentation: Towards a General Information Firewall.
Proceedings of the Intelligence and Security Informatics, 2005

Mixed Consistency Model: Meeting Data Sharing Needs of Heterogeneous Users.
Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS 2005), 2005

Robust Information Dissemination in Uncooperative Environments.
Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS 2005), 2005

Preference-aware overlay topologies for group communication.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

Harnessing Shared Wide-area Clusters for Dynamic High End Services.
Proceedings of the 2005 IEEE International Conference on Cluster Computing (CLUSTER 2005), September 26, 2005

2004
GT-P2PRMI: Improving Middleware Performance Using Peer-to-Peer Service Replication.
Proceedings of the 10th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS 2004), 2004

Parameterized Authentication.
Proceedings of the Computer Security, 2004

Collective Endorsement and the Dissemination Problem in Malicious Environments.
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004

Resisting SPAM Delivery by TCP Damping.
Proceedings of the CEAS 2004, 2004

2003
Responsive Security for Stored Data.
IEEE Trans. Parallel Distrib. Syst., 2003

A Reconfigurable Byzantine Quorum Approach for the Agile Store.
Proceedings of the 22nd Symposium on Reliable Distributed Systems (SRDS 2003), 2003

Responsive Security for Stored Data.
Proceedings of the 23rd International Conference on Distributed Computing Systems (ICDCS 2003), 2003

Ordering vs Timeliness: Two Facets of Consistency?
Proceedings of the Future Directions in Distributed Computing, 2003

2002
Flexible Robust Programming in Distributed Object Systems.
IEEE Trans. Knowl. Data Eng., 2002

Real-time based strong consistency for distributed objects.
Comput. Syst. Sci. Eng., 2002

Guarding the next Internet frontier: countering denial of information attacks.
Proceedings of the 2002 Workshop on New Security Paradigms, 2002

A Context-Aware Security Architecture for Emerging Applications.
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002

2001
Real-Time Based Strong Consistency for Distributed Objects.
Proceedings of the 6th Workshop on Object-Oriented Real-Time Dependable Systems (WORDS 2001), 2001

Securing context-aware applications using environment roles.
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, 2001

Generalized Role-Based Access Control.
Proceedings of the 21st International Conference on Distributed Computing Systems (ICDCS 2001), 2001

Shared State Consistency for Time-Sensitive Distributed Applications.
Proceedings of the 21st International Conference on Distributed Computing Systems (ICDCS 2001), 2001

A Secure and Highly Available Distributed Store for Meeting Diverse Data Storage Needs.
Proceedings of the 2001 International Conference on Dependable Systems and Networks (DSN 2001) (formerly: FTCS), 2001

2000
1/k phase stamping for continuous shared data (extended abstract).
Proceedings of the Nineteenth Annual ACM Symposium on Principles of Distributed Computing, 2000

Distributed Object Implementations for Interactive Applications.
Proceedings of the Middleware 2000, 2000

1999
Scalable Consistency Protocols for Distributed Services.
IEEE Trans. Parallel Distrib. Syst., 1999

An adaptive architecture for causally consistent distributed services.
Distributed Systems Engineering, 1999

Plausible Clocks: Constant Size Logical Clocks for Distributed Systems.
Distributed Computing, 1999

Workload Modeling for Highly Interactive Applications.
Proceedings of the 1999 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, 1999

Timed Consistency for Shared Distributed Objects.
Proceedings of the Eighteenth Annual ACM Symposium on Principles of Distributed Computing, 1999

PASS - A service for Efficient Large Scale Dissemination of Time Varying Data Using CORBA.
Proceedings of the 19th International Conference on Distributed Computing Systems, Austin, TX, USA, May 31, 1999

1998
Indigo: user-level support for building distributed shared abstractions.
Concurrency - Practice and Experience, 1998

Lifetime Based Consistency Protocols for Distributed Objects.
Proceedings of the Distributed Computing, 12th International Symposium, 1998

RAVEL, a support system for the development of distributed, multi-user VE applications.
Proceedings of the 1998 Virtual Reality Annual International Symposium, 1998

Responsiveness and Consistency Tradoffs in Interactive Groupware.
Proceedings of the Seventeenth Annual ACM Symposium on Principles of Distributed Computing, 1998

Exploiting write semantics in implementing partially replicated causal objects.
PDP, 1998

Robust State Sharing for Wide Area Distributed Applications.
Proceedings of the 18th International Conference on Distributed Computing Systems, 1998

Flexible Batching and Consistency Mechanisms for Building Interactive Groupware Applications.
Proceedings of the 18th International Conference on Distributed Computing Systems, 1998

An Adaptive Protocol for Implementing Causally Consistent Distributed Services.
Proceedings of the 18th International Conference on Distributed Computing Systems, 1998

Efficient Implementation of Java Remote Method Invocation (RMI).
Proceedings of the 4th USENIX Conference on Object-Oriented Technologies and Systems (COOTS), 1998

1997
Exploiting Temporal and Spatial Constraints on Distributed Shared Objects.
Proceedings of the 17th International Conference on Distributed Computing Systems, 1997

From serializable to causal transactions for collaborative applications.
Proceedings of the 23rd EUROMICRO Conference '97, 1997

1996
Object Caching in a CORBA Compliant System.
Computing Systems, 1996

Plausible Clocks: Constant Size Logical Clocks for Distributed Systems.
Proceedings of the Distributed Algorithms, 10th International Workshop, 1996

Scalable information sharing in large scale distributed systems.
Proceedings of the 7th ACM SIGOPS European Workshop: Systems Support for Worldwide Applications, 1996

From Serializable to Causal Transactions (Abstract).
Proceedings of the Fifteenth Annual ACM Symposium on Principles of Distributed Computing, 1996

A Scalable Technique for Implementing Multiple Consistency Levels for Distributed Objects.
Proceedings of the 16th International Conference on Distributed Computing Systems, 1996

Object Caching in a CORBA Compliant System.
Proceedings of the USENIX Conference on Object-Oriented Technologies, 1996

1995
Causal Memory: Definitions, Implementation, and Programming.
Distributed Computing, 1995

Optimizing a Generalized Polling Protocol for Resource Finding over a Multiple Access Channel.
Computer Networks and ISDN Systems, 1995

System Support for Robust Collaborative Applications.
Proceedings of the 14th Symposium on Reliable Distributed Systems, 1995

Indigo: User-Level Support for Building Distributed Shared Abstractions.
Proceedings of the 4th International Symposium on High Performance Distributed Computing (HPDC '95), 1995

1994
Detecting Mutual Consistency of Shared Objects.
Proceedings of the First Workshop on Mobile Computing Systems and Applications, 1994

Causal Memory Meets the Consistency and Performance Needs of Distributed Applications.
Proceedings of the 6th ACM SIGOPS European Workshop: Matching Operating Systems to Application Needs, 1994

1993
The Power of Processor Consistency.
SPAA, 1993

A Characterization of Scalable Shared Memories.
Proceedings of the 1993 International Conference on Parallel Processing, 1993

Coherence, Synchronization and State-sharing in Distributed Shared-memory Applications.
Proceedings of the 1993 International Conference on Parallel Processing, 1993

1992
The Grid Protocol: A High Performance Scheme for Maintaining Replicated Data.
IEEE Trans. Knowl. Data Eng., 1992

1991
Multidimensional Voting.
ACM Trans. Comput. Syst., 1991

The Clouds Distributed Operating System.
IEEE Computer, 1991

Resource Finding in Store-and-Forward Networks.
Acta Inf., 1991

Causal Memory.
Proceedings of the Distributed Algorithms, 5th International Workshop, 1991

Implementing and programming causal distributed shared memory.
Proceedings of the 10th International Conference on Distributed Computing Systems (ICDCS 1991), 1991

1990
Fault-Tolerant Atomic Computations in an Object-Based Distributed System.
Distributed Computing, 1990

Optimizing the Performance of Quorum Consensus Replica Control Protocols.
Workshop on the Management of Replicated Data, 1990

Resource Finding in Store-and-Forward Networks.
Proceedings of the Proceedings IEEE INFOCOM '90, 1990

The Grid Protocol: A High Performance Scheme for Maintaining Replicated Data.
Proceedings of the Sixth International Conference on Data Engineering, 1990

Slow Memory: Weakening Consistency to Enchance Concurrency in Distributed Shared Memories.
Proceedings of the 10th International Conference on Distributed Computing Systems (ICDCS 1990), May 28, 1990

Multi-Dimensional Voting: A General Method for Implementing Synchronization in Distributed Systems.
Proceedings of the 10th International Conference on Distributed Computing Systems (ICDCS 1990), May 28, 1990

Checkpointing and rollback-recovery in distributed object based systems.
Proceedings of the 20th International Symposium on Fault-Tolerant Computing, 1990

1989
Performance Characterization of Quorum-Consensus Algorithms for Replicated Data.
IEEE Trans. Software Eng., 1989

Optimizing Vote and Quorum Assignments for Reading and Writing Replicated Data.
IEEE Trans. Knowl. Data Eng., 1989

The Design and Implementation of the Clouds Distributed Operating System.
Computing Systems, 1989

Applying a Path-Compression technique to Obtain an Efficient Distributed Mutual Exclusion Algorithm.
Proceedings of the Distributed Algorithms, 1989

Using Checkpoints to Localize the Effects of Faults in Distributed Systems.
Proceedings of the Eigthth Symposium on Reliable Distributed Systems, 1989

Using multicast communication for dynamic load balancing in local area networks.
Proceedings of the 14th Conference on Local Computer Networks, 1989

Optimal Selection of Multicast Groups for Resource Location on a Distributed System.
Proceedings of the Proceedings IEEE INFOCOM '89, 1989

Coherence of Distributed Shared Memory: Unifying Synchronization and Data Transfer.
Proceedings of the International Conference on Parallel Processing, 1989

Optimizing Vote and Quorum Assignments for Reading and Writing Replicated Data.
Proceedings of the Fifth International Conference on Data Engineering, 1989

Low Cost Algorithms for Message Delivery in Dynamic Multicast Groups.
Proceedings of the 9th International Conference on Distributed Computing Systems, 1989

1988
Using multicast communication to locate resources in LAN-based distributed system.
Proceedings of the 13th Conference on Local Computer Networks, 1988

1987
An Efficient Algorithm for Name Resolution in Computer Networks.
Computer Networks, 1987

Fault Tolerant Computing in Object Based Distributed Operating Systems.
Proceedings of the Sixth Symposium on Reliability in Distributed Software and Database Systems, 1987

Performance Characterization of Quorum-Consensus Allgorihms for Replicated Data.
Proceedings of the Sixth Symposium on Reliability in Distributed Software and Database Systems, 1987

1985
An Application of Name Based Addressing to Low Level Distributed Algorithms.
IEEE Trans. Software Eng., 1985

Multicast Communication in UNIX 4.2BSD.
Proceedings of the 5th International Conference on Distributed Computing Systems, 1985

1984
Executing Distributed Prolog Programs on a Broadcast Network.
Proceedings of the 1984 International Symposium on Logic Programming, 1984


  Loading...