Mohammad Maifi Hasan Khan
Orcid: 0000-0001-5046-4100
According to our database1,
Mohammad Maifi Hasan Khan
authored at least 59 papers
between 2007 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Int. J. Hum. Comput. Interact., July, 2023
IEEE Trans. Affect. Comput., 2023
Divergences in Blame Attribution after a Security Breach based on Compliance Behavior: Implications for Post-breach Risk Communication.
Proceedings of the 2023 European Symposium on Usable Security, 2023
Effect of Device Risk Perceptions and Understandability of Data Management Features on Consumers' Willingness to Pay (WTP) for IoT Device Premium Data Management Plan.
Proceedings of the 2023 European Symposium on Usable Security, 2023
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023
2022
Proceedings of the HCI International 2022 - Late Breaking Papers: Interacting with eXtended Reality and Artificial Intelligence, 2022
2021
Trust and Anthropomorphism in Tandem: The Interrelated Nature of Automated Agent Appearance and Reliability in Trustworthiness Perceptions.
Proceedings of the DIS '21: Designing Interactive Systems Conference 2021, 2021
Do Integral Emotions Affect Trust? The Mediating Effect of Emotions on Trust in the Context of Human-Agent Interaction.
Proceedings of the DIS '21: Designing Interactive Systems Conference 2021, 2021
2020
Anticipated Emotions in Initial Trust Evaluations of a Drone System Based on Performance and Process Information.
Int. J. Hum. Comput. Interact., 2020
Proceedings of the Artificial Intelligence in HCI, 2020
Investigating the Effects of (Empty) Promises on Human-Automation Interaction and Trust Repair.
Proceedings of the HAI '20: 8th International Conference on Human-Agent Interaction, 2020
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020
Who Would Bob Blame? Factors in Blame Attribution in Cyberattacks Among the Non-Adopting Population in the Context of 2FA.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020
2019
Investigating the Effect of System Reliability, Risk, and Role on Users' Emotions and Attitudes toward a Safety-Critical Drone System.
Int. J. Hum. Comput. Interact., 2019
Design and implementation of an analytical framework for interference aware job scheduling on Apache Spark platform.
Clust. Comput., 2019
A Model Driven Approach Towards Improving the Performance of Apache Spark Applications.
Proceedings of the IEEE International Symposium on Performance Analysis of Systems and Software, 2019
Effect of Feedback on Users' Immediate Emotions: Analysis of Facial Expressions during a Simulated Target Detection Task.
Proceedings of the International Conference on Multimodal Interaction, 2019
The Apple Does Fall Far from the Tree: User Separation of a System from its Developers in Human-Automation Trust Repair.
Proceedings of the 2019 on Designing Interactive Systems Conference, DIS 2019, San Diego, 2019
2018
IEEE Internet Comput., 2018
The User Affective Experience Scale: A Measure of Emotions Anticipated in Response to Pop-Up Computer Warnings.
Int. J. Hum. Comput. Interact., 2018
The Effects of Risk and Role on Users' Anticipated Emotions in Safety-Critical Systems.
Proceedings of the Engineering Psychology and Cognitive Ergonomics, 2018
Initial Trustworthiness Perceptions of a Drone System based on Performance and Process Information.
Proceedings of the 6th International Conference on Human-Agent Interaction, 2018
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018
2017
A Study on Designing Video Tutorials for Promoting Security Features: A Case Study in the Context of Two-Factor Authentication (2FA).
Int. J. Hum. Comput. Interact., 2017
Hum. centric Comput. Inf. Sci., 2017
"...better to use a lock screen than to worry about saving a few seconds of time": Effect of Fear Appeal in the Context of Smartphone Locking Behavior.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017
Understanding the Influence of Configuration Settings: An Execution Model-Driven Framework for Apache Spark Platform.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017
2016
Evaluating smartphone-based dynamic security questions for fallback authentication: a field study.
Hum. centric Comput. Inf. Sci., 2016
Why Do They Do What They Do?: A Study of What Motivates Users to (Not) Follow Computer Security Advice.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016
CSMiner: An Automated Tool for Analyzing Changes in Configuration Settings across Multiple Versions of Large Scale Cloud Software.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016
2015
ACM Trans. Sens. Networks, 2015
A closed-loop context aware data acquisition and resource allocation framework for dynamic data driven applications systems (DDDAS) on the cloud.
J. Syst. Softw., 2015
Designing challenge questions for location-based authentication systems: a real-life study.
Hum. centric Comput. Inf. Sci., 2015
How does this message make you feel? A study of user perspectives on software update/warning message design.
Hum. centric Comput. Inf. Sci., 2015
Comput. Hum. Behav., 2015
Evaluating the Effectiveness of Using Hints for Autobiographical Authentication: A Field Study.
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015
2014
Troubleshooting interactive complexity bugs in wireless sensor networks using data mining techniques.
ACM Trans. Sens. Networks, 2014
Proceedings of the IEEE 15th International Conference on Mobile Data Management, 2014
2013
Context Aware Data Acquisition Framework for Dynamic Data Driven Applications Systems (DDDAS).
Proceedings of the 32th IEEE Military Communications Conference, 2013
Proceedings of the IEEE 32nd International Performance Computing and Communications Conference, 2013
2012
Proceedings of the 18th IEEE International Conference on Parallel and Distributed Systems, 2012
2011
Proceedings of the MILCOM 2011, 2011
Evaluation of network trust using provenance based on distributed local intelligence.
Proceedings of the MILCOM 2011, 2011
Power watermarking: Facilitating power-based diagnosis of node silence in remote high-end sensing systems.
Proceedings of the 10th International Conference on Information Processing in Sensor Networks, 2011
Proceedings of the 10th International Conference on Information Processing in Sensor Networks, 2011
Proceedings of the International Conference on Parallel Processing, 2011
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011
2010
Proceedings of the 9th International Conference on Information Processing in Sensor Networks, 2010
2009
Proceedings of the Distributed Computing in Sensor Systems, 2009
2008
Proceedings of the 6th International Conference on Embedded Networked Sensor Systems, 2008
Data Mining for Diagnostic Debugging in Sensor Networks: Preliminary Evidence and Lessons Learned.
Proceedings of the Knowledge Discovery from Sensor Data, 2008
Proceedings of the Distributed Computing in Sensor Systems, 2008
2007
Towards a Layered Architecture for Object-Based Execution in Wide-Area Deeply Embedded Computing.
Proceedings of the Tenth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2007), 2007
Leveraging Computational Grid Technologies for Building a Secure and Manageable Power Grid.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007
Proceedings of the Distributed Computing in Sensor Systems, 2007