D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 37 Citations 7,262 170 World Ranking 6725 National Ranking 3216

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • Computer network
  • The Internet

Distributed computing, Computer security, Distributed memory, Distributed shared memory and Shared memory are his primary areas of study. Mustaque Ahamad combines subjects such as Transaction processing, Concurrency control, Standard Operating Environment and Protocol with his study of Distributed computing. The study incorporates disciplines such as Ubiquitous computing and Internet privacy in addition to Computer security.

The various areas that Mustaque Ahamad examines in his Internet privacy study include Dissemination and Upload. Mustaque Ahamad interconnects Data diffusion machine, Uniform memory access and Flat memory model in the investigation of issues within Distributed memory. His Role-based access control research is multidisciplinary, relying on both Security policy, Technical report and Physical access.

His most cited work include:

  • Securing context-aware applications using environment roles (430 citations)
  • Causal memory: definitions, implementation, and programming (357 citations)
  • Incentives in BitTorrent induce free riding (233 citations)

What are the main themes of his work throughout his whole career to date?

Mustaque Ahamad mostly deals with Distributed computing, Computer security, Internet privacy, Computer network and Consistency. His Distributed computing study incorporates themes from Scalability, Distributed object, Distributed shared memory, Consistency model and Protocol. His work investigates the relationship between Distributed shared memory and topics such as Shared memory that intersect with problems in Uniform memory access and Synchronization.

Many of his studies on Computer security apply to Technical report as well. While the research belongs to areas of Internet privacy, Mustaque Ahamad spends his time largely on the problem of The Internet, intersecting his research to questions surrounding Telephony. His research investigates the connection with Consistency and areas like Replication which intersect with concerns in Service and Distributed database.

He most often published in these fields:

  • Distributed computing (44.38%)
  • Computer security (24.85%)
  • Internet privacy (21.30%)

What were the highlights of his more recent work (between 2008-2020)?

  • Internet privacy (21.30%)
  • Computer security (24.85%)
  • Telephony (7.69%)

In recent papers he was focusing on the following fields of study:

Mustaque Ahamad focuses on Internet privacy, Computer security, Telephony, The Internet and Authentication. The study incorporates disciplines such as Technical report, Information sensitivity and Social network in addition to Internet privacy. His work on Access control, Identity theft and Information security as part of general Computer security research is often related to Medical record and Data sharing, thus linking different fields of science.

His study in the field of Email spam and Domain Name System also crosses realms of Situation awareness and Public domain. His Authentication research incorporates elements of Scalability, Server, Login and Session Initiation Protocol. His Computer network study deals with Distributed computing intersecting with Orchestration.

Between 2008 and 2020, his most popular works were:

  • One-time cookies: Preventing session hijacking attacks with stateless authentication tokens (74 citations)
  • ExecScent: mining for new C&C domains in live networks with adaptive control protocol templates (73 citations)
  • Trust No One Else: Detecting MITM Attacks against SSL/TLS without Third-Parties (49 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • Computer network
  • The Internet

His main research concerns Computer security, Internet privacy, Telephony, The Internet and Computer network. His work on Information security and Authentication as part of general Computer security study is frequently linked to Medical record, Hash chain and Session hijacking, bridging the gap between disciplines. The Internet privacy study combines topics in areas such as Mobile device, Control and Spoofing attack.

His work in the fields of Computer network, such as Call management, Packet loss and Call control, overlaps with other areas such as 3pcc. In his works, Mustaque Ahamad conducts interdisciplinary research on Characterization and Distributed computing. His work carried out in the field of Distributed computing brings together such families of science as Domain, Blacklist and Orchestration.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Causal memory: definitions, implementation, and programming

Mustaque Ahamad;Gil Neiger;James E. Burns;Prince Kohli.
Distributed Computing (1995)

654 Citations

Causal memory: definitions, implementation, and programming

Mustaque Ahamad;Gil Neiger;James E. Burns;Prince Kohli.
Distributed Computing (1995)

654 Citations

Securing context-aware applications using environment roles

Michael J. Covington;Wende Long;Srividhya Srinivasan;Anind K. Dev.
symposium on access control models and technologies (2001)

641 Citations

Securing context-aware applications using environment roles

Michael J. Covington;Wende Long;Srividhya Srinivasan;Anind K. Dev.
symposium on access control models and technologies (2001)

641 Citations

The grid protocol: a high performance scheme for maintaining replicated data

S.Y. Cheung;M.H. Ammar;M. Ahamad.
IEEE Transactions on Knowledge and Data Engineering (1992)

443 Citations

The grid protocol: a high performance scheme for maintaining replicated data

S.Y. Cheung;M.H. Ammar;M. Ahamad.
IEEE Transactions on Knowledge and Data Engineering (1992)

443 Citations

Incentives in BitTorrent induce free riding

Seung Jun;Mustaque Ahamad.
acm special interest group on data communication (2005)

382 Citations

Incentives in BitTorrent induce free riding

Seung Jun;Mustaque Ahamad.
acm special interest group on data communication (2005)

382 Citations

The Clouds distributed operating system

P. Dasgupta;R.J. LeBlanc;M. Ahamad;U. Ramachandran.
IEEE Computer (1991)

349 Citations

The Clouds distributed operating system

P. Dasgupta;R.J. LeBlanc;M. Ahamad;U. Ramachandran.
IEEE Computer (1991)

349 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Mustaque Ahamad

Makoto Takizawa

Makoto Takizawa

Hosei University

Publications: 31

Michel Raynal

Michel Raynal

Institut de Recherche en Informatique et Systèmes Aléatoires

Publications: 27

Karsten Schwan

Karsten Schwan

Georgia Institute of Technology

Publications: 27

Divyakant Agrawal

Divyakant Agrawal

University of California, Santa Barbara

Publications: 20

Elisa Bertino

Elisa Bertino

Purdue University West Lafayette

Publications: 20

Willy Zwaenepoel

Willy Zwaenepoel

University of Sydney

Publications: 20

Michael K. Reiter

Michael K. Reiter

Duke University

Publications: 18

Rachid Guerraoui

Rachid Guerraoui

École Polytechnique Fédérale de Lausanne

Publications: 16

Roberto Baldoni

Roberto Baldoni

Sapienza University of Rome

Publications: 16

Roy Friedman

Roy Friedman

Technion – Israel Institute of Technology

Publications: 16

Dahlia Malkhi

Dahlia Malkhi

Diem Association

Publications: 15

Hagit Attiya

Hagit Attiya

Technion – Israel Institute of Technology

Publications: 13

Avishai Wool

Avishai Wool

Tel Aviv University

Publications: 13

Lorenzo Alvisi

Lorenzo Alvisi

Cornell University

Publications: 12

Ganesh Gopalakrishnan

Ganesh Gopalakrishnan

University of Utah

Publications: 12

Patrick Traynor

Patrick Traynor

University of Florida

Publications: 12

Trending Scientists

David Nahamoo

David Nahamoo

Pyron Inc.

Raymond M. Duch

Raymond M. Duch

University of Oxford

Mitsumasa Koyanagi

Mitsumasa Koyanagi

Tohoku University

Smith Eiamsa-ard

Smith Eiamsa-ard

Mahanakorn University of Technology

Michael L. Arnold

Michael L. Arnold

University of Georgia

Kyung Sook Bae

Kyung Sook Bae

Korea Research Institute of Bioscience and Biotechnology

Richard A. Holley

Richard A. Holley

University of Manitoba

Julius Adler

Julius Adler

University of Wisconsin–Madison

G. P. Robertson

G. P. Robertson

Michigan State University

Steven J. Siegel

Steven J. Siegel

University of Southern California

Terrence M. Tumpey

Terrence M. Tumpey

National Center for Immunization and Respiratory Diseases

David G. Warnock

David G. Warnock

University of Alabama at Birmingham

Fritz H. Schröder

Fritz H. Schröder

Erasmus MC

Karl R. Popper

Karl R. Popper

London School of Economics and Political Science

Lisa Gibbs

Lisa Gibbs

University of Melbourne

John Wood

John Wood

University College London

Something went wrong. Please try again later.