Mustaque Ahamad
Orcid: 0000-0002-7955-5126Affiliations:
- Georgia Institute of Technology, Atlanta GA, USA
According to our database1,
Mustaque Ahamad
authored at least 142 papers
between 1984 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
SoK: An Essential Guide For Using Malware Sandboxes In Security Applications: Challenges, Pitfalls, and Lessons Learned.
CoRR, 2024
Corrective or Backfire: Characterizing and Predicting User Response to Social Correction.
Proceedings of the 16th ACM Web Science Conference, 2024
Comparing Malware Evasion Theory with Practice: Results from Interviews with Expert Analysts.
Proceedings of the Twentieth Symposium on Usable Privacy and Security, 2024
Proceedings of the Companion Proceedings of the 26th International Conference on Multimodal Interaction, 2024
2023
Reinforcement Learning-based Counter-Misinformation Response Generation: A Case Study of COVID-19 Vaccine Misinformation.
Proceedings of the ACM Web Conference 2023, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
2022
Cross-Platform Multimodal Misinformation: Taxonomy, Characteristics and Detection for Textual Posts and Videos.
Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022
2021
Proceedings of the IEEE Security and Privacy Workshops, 2021
PETGEN: Personalized Text Generation Attack on Deep Sequence Embedding-based Classification Models.
Proceedings of the KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2021
Compromised Computers Meet Voice Assistants: Stealthily Exfiltrating Data as Voice over Telephony.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
Using Inaudible Audio and Voice Assistants to Transmit Sensitive Data over Telephony.
CoRR, 2020
CoRR, 2020
The Role of the Crowd in Countering Misinformation: A Case Study of the COVID-19 Infodemic.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2018
Exposing Search and Advertisement Abuse Tactics and Infrastructure of Technical Support Scammers.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018
Under the Shadow of Sunshine: Characterizing Spam Campaigns Abusing Phone Numbers Across Online Social Networks.
Proceedings of the 10th ACM Conference on Web Science, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
2017
By Hook or by Crook: Exposing the Diverse Abuse Tactics of Technical Support Scammers.
CoRR, 2017
Internet-scale Probing of CPS: Inference, Characterization and Orchestration Analysis.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017
2016
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the Computer Security - ESORICS 2016, 2016
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
2015
CoRR, 2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
2014
IBM J. Res. Dev., 2014
Proceedings of the 2014 IEEE International Conference on Healthcare Informatics, 2014
2013
ExecScent: Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
2012
One-time cookies: Preventing session hijacking attacks with stateless authentication tokens.
ACM Trans. Internet Techn., 2012
Proceedings of the 3rd USENIX Workshop on Health Security and Privacy, 2012
Enhancing accountability of electronic health record usage via patient-centric monitoring.
Proceedings of the ACM International Health Informatics Symposium, 2012
Proceedings of the Computer Security - ESORICS 2012, 2012
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012
2011
IEEE Trans. Parallel Distributed Syst., 2011
2010
Proceedings of the 1st USENIX Workshop on Health Security and Privacy, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Proceedings of the 2010 ACM/IEEE Symposium on Architecture for Networking and Communications Systems, 2010
2009
Proceedings of the Computer Security, 2009
Proceedings of the 5th Workshop on Digital Identity Management, 2009
2008
Int. J. Inf. Comput. Secur., 2008
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008
Proceedings of the 2008 EuroSys Conference, Glasgow, Scotland, UK, April 1-4, 2008, 2008
Proceedings of the 2nd ACM Workshop on Information Credibility on the Web, 2008
2007
Proceedings of the 3rd International Conference on Collaborative Computing: Networking, 2007
Proceedings of the CEAS 2007, 2007
2006
Comput. Networks, 2006
IEEE Computer Graphics and Applications, 2006
Proceedings of the 15th international conference on World Wide Web, 2006
Proceedings of the 2006 USENIX Annual Technical Conference, 2006
2005
Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic Queries.
Proceedings of the 2nd IEEE Workshop on Visualization for Computer Security, 2005
Agile Store: Experience with Quorum-Based Data Replication Techniques for Adaptive Byzantine Fault Tolerance.
Proceedings of the 24th IEEE Symposium on Reliable Distributed Systems (SRDS 2005), 2005
Attacking information visualization system usability overloading and deceiving the human.
Proceedings of the 1st Symposium on Usable Privacy and Security, 2005
Proceedings of the 2005 ACM SIGCOMM Workshop on Economics of Peer-to-Peer Systems, 2005
Improving Service Performance through Object Replication in Middleware: A Peer-to-Peer Approach.
Proceedings of the Fifth IEEE International Conference on Peer-to-Peer Computing (P2P 2005), 31 August, 2005
Filtering, Fusion and Dynamic Information Presentation: Towards a General Information Firewall.
Proceedings of the Intelligence and Security Informatics, 2005
Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS 2005), 2005
Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS 2005), 2005
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005
Proceedings of the 2005 IEEE International Conference on Cluster Computing (CLUSTER 2005), September 26, 2005
2004
Proceedings of the 10th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS 2004), 2004
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004
2003
Proceedings of the 22nd Symposium on Reliable Distributed Systems (SRDS 2003), 2003
Proceedings of the 2003 ACM Workshop on Survivable and Self-Regenerative Systems, 2003
Proceedings of the Future Directions in Distributed Computing, 2003
2002
IEEE Trans. Knowl. Data Eng., 2002
Real-time based strong consistency for distributed objects.
Comput. Syst. Sci. Eng., 2002
Proceedings of the 2002 Workshop on New Security Paradigms, 2002
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002
2001
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, 2001
Proceedings of the 21st International Conference on Distributed Computing Systems (ICDCS 2001), 2001
Proceedings of the 21st International Conference on Distributed Computing Systems (ICDCS 2001), 2001
A Secure and Highly Available Distributed Store for Meeting Diverse Data Storage Needs.
Proceedings of the 2001 International Conference on Dependable Systems and Networks (DSN 2001) (formerly: FTCS), 2001
2000
Proceedings of the Nineteenth Annual ACM Symposium on Principles of Distributed Computing, 2000
Proceedings of the Middleware 2000, 2000
1999
IEEE Trans. Parallel Distributed Syst., 1999
Distributed Syst. Eng., 1999
Distributed Comput., 1999
Proceedings of the 1999 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, 1999
Proceedings of the Eighteenth Annual ACM Symposium on Principles of Distributed Computing, 1999
PASS - A service for Efficient Large Scale Dissemination of Time Varying Data Using CORBA.
Proceedings of the 19th International Conference on Distributed Computing Systems, Austin, TX, USA, May 31, 1999
1998
Concurr. Pract. Exp., 1998
Proceedings of the Distributed Computing, 12th International Symposium, 1998
RAVEL, a support system for the development of distributed, multi-user VE applications.
Proceedings of the 1998 Virtual Reality Annual International Symposium, 1998
Proceedings of the Seventeenth Annual ACM Symposium on Principles of Distributed Computing, 1998
Proceedings of the Sixth Euromicro Workshop on Parallel and Distributed Processing, 1998
Proceedings of the 18th International Conference on Distributed Computing Systems, 1998
Flexible Batching and Consistency Mechanisms for Building Interactive Groupware Applications.
Proceedings of the 18th International Conference on Distributed Computing Systems, 1998
Proceedings of the 18th International Conference on Distributed Computing Systems, 1998
Proceedings of the 4th USENIX Conference on Object-Oriented Technologies and Systems (COOTS), 1998
1997
Proceedings of the 17th International Conference on Distributed Computing Systems, 1997
Proceedings of the 23rd EUROMICRO Conference '97, 1997
1996
Proceedings of the 7th ACM SIGOPS European Workshop: Systems Support for Worldwide Applications, 1996
Proceedings of the Fifteenth Annual ACM Symposium on Principles of Distributed Computing, 1996
A Scalable Technique for Implementing Multiple Consistency Levels for Distributed Objects.
Proceedings of the 16th International Conference on Distributed Computing Systems, 1996
1995
Distributed Comput., 1995
Optimizing a Generalized Polling Protocol for Resource Finding over a Multiple Access Channel.
Comput. Networks ISDN Syst., 1995
Proceedings of the 14th Symposium on Reliable Distributed Systems, 1995
1994
Proceedings of the First Workshop on Mobile Computing Systems and Applications, 1994
Causal Memory Meets the Consistency and Performance Needs of Distributed Applications.
Proceedings of the 6th ACM SIGOPS European Workshop: Matching Operating Systems to Application Needs, 1994
1993
Proceedings of the 5th Annual ACM Symposium on Parallel Algorithms and Architectures, 1993
Proceedings of the 1993 International Conference on Parallel Processing, 1993
Coherence, Synchronization and State-sharing in Distributed Shared-memory Applications.
Proceedings of the 1993 International Conference on Parallel Processing, 1993
1992
IEEE Trans. Knowl. Data Eng., 1992
1991
Proceedings of the Distributed Algorithms, 5th International Workshop, 1991
Proceedings of the 10th International Conference on Distributed Computing Systems (ICDCS 1991), 1991
1990
Distributed Comput., 1990
Optimizing the Performance of Quorum Consensus Replica Control Protocols.
Proceedings of the First Workshop on the Management of Replicated Data, 1990
Slow Memory: Weakening Consistency to Enchance Concurrency in Distributed Shared Memories.
Proceedings of the 10th International Conference on Distributed Computing Systems (ICDCS 1990), May 28, 1990
Multi-Dimensional Voting: A General Method for Implementing Synchronization in Distributed Systems.
Proceedings of the 10th International Conference on Distributed Computing Systems (ICDCS 1990), May 28, 1990
Proceedings of the 20th International Symposium on Fault-Tolerant Computing, 1990
1989
IEEE Trans. Software Eng., 1989
IEEE Trans. Knowl. Data Eng., 1989
Comput. Syst., 1989
Applying a Path-Compression technique to Obtain an Efficient Distributed Mutual Exclusion Algorithm.
Proceedings of the Distributed Algorithms, 1989
Proceedings of the Eigthth Symposium on Reliable Distributed Systems, 1989
Proceedings of the 14th Conference on Local Computer Networks, 1989
Proceedings of the Proceedings IEEE INFOCOM '89, 1989
Coherence of Distributed Shared Memory: Unifying Synchronization and Data Transfer.
Proceedings of the International Conference on Parallel Processing, 1989
Proceedings of the 9th International Conference on Distributed Computing Systems, 1989
1988
Proceedings of the 13th Conference on Local Computer Networks, 1988
Proceedings of the Seventh Annual Joint Conference of the IEEE Computer and Communcations Societies. Networks: Evolution or Revolution?, 1988
1987
Comput. Networks, 1987
Fault Tolerant Computing in Object Based Distributed Operating Systems.
Proceedings of the Sixth Symposium on Reliability in Distributed Software and Database Systems, 1987
Performance Characterization of Quorum-Consensus Allgorihms for Replicated Data.
Proceedings of the Sixth Symposium on Reliability in Distributed Software and Database Systems, 1987
1985
IEEE Trans. Software Eng., 1985
Multicast Communication in UNIX 4.2BSD.
Proceedings of the 5th International Conference on Distributed Computing Systems, 1985
1984
Executing Distributed Prolog Programs on a Broadcast Network.
Proceedings of the 1984 International Symposium on Logic Programming, 1984