default search action
Shambhu J. Upadhyaya
Person information
- affiliation: State University of New York at Buffalo, Department of Computer Science and Engineering
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c128]Laura Amo, Joana Gaia, David Murray, George Sanders, Sean Sanders, Raghvendra Singh, Shambhu J. Upadhyaya:
Economic Incentives and Perceptions as Critical Factors for Understanding Insider Hacking Behavior. HICSS 2024: 3223-3232 - 2023
- [c127]Rudra Prasad Baksi, Vishwas Nalka, Shambhu J. Upadhyaya:
Apt Detection of Ransomware - An Approach to Detect Advanced Persistent Threats Using System Call Information. TrustCom 2023: 1621-1630 - 2022
- [c126]Joana Gaia, David Murray, George Sanders, Sean Sanders, Shambhu J. Upadhyaya, Xunyi Wang, Chul Woo Yoo:
The interaction of dark traits with the perceptions of apprehension. HICSS 2022: 1-10 - [c125]Rudra Prasad Baksi, Shambhu J. Upadhyaya:
A Game Theoretic Approach to the Design of Mitigation Strategies for Generic Ransomware. ICISSP (Revised Selected Papers) 2022: 104-124 - [c124]Rudra Prasad Baksi, Shambhu J. Upadhyaya:
Game Theoretic Analysis of Ransomware: A Preliminary Study. ICISSP 2022: 242-251 - 2021
- [j62]Sanjay K. Sahay, Nihita Goel, Murtuza Jadliwala, Shambhu J. Upadhyaya:
Advances in Secure Knowledge Management in the Artificial Intelligence Era. Inf. Syst. Frontiers 23(4): 807-810 (2021) - [j61]Rudra Prasad Baksi, Shambhu J. Upadhyaya:
Decepticon: a Theoretical Framework to Counter Advanced Persistent Threats. Inf. Syst. Frontiers 23(4): 897-913 (2021) - [j60]Rohit Valecha, Shambhu J. Upadhyaya, H. Raghav Rao:
An Activity Theory Approach to Leak Detection and Mitigation in Patient Health Information (PHI). J. Assoc. Inf. Syst. 22(4): 6 (2021) - [j59]Gökhan Kul, Shambhu J. Upadhyaya, Andrew Hughes:
An Analysis of Complexity of Insider Attacks to Databases. ACM Trans. Manag. Inf. Syst. 12(1): 4:1-4:18 (2021) - 2020
- [c123]Joana Gaia, Bina Ramamurthy, George Sanders, Sean Sanders, Shambhu J. Upadhyaya, Xunyi Wang, Chul Woo Yoo:
Psychological Profiling of Hacking Potential. HICSS 2020: 1-10
2010 – 2019
- 2019
- [j58]Rohit Valecha, H. Raghav Rao, Shambhu J. Upadhyaya, Raj Sharman:
An Activity Theory Approach to Modeling Dispatch-Mediated Emergency Response. J. Assoc. Inf. Syst. 20(1): 2 (2019) - [j57]Laura C. Amo, Ruochen Liao, Emma Frank, H. Raghav Rao, Shambhu J. Upadhyaya:
Cybersecurity Interventions for Teens: Two Time-Based Approaches. IEEE Trans. Educ. 62(2): 134-140 (2019) - [c122]Rudra Prasad Baksi, Shambhu J. Upadhyaya:
Decepticon: A Hidden Markov Model Approach to Counter Advanced Persistent Threats. SKM 2019: 38-54 - 2018
- [j56]Gökhan Kul, Duc Thanh Anh Luong, Ting Xie, Varun Chandola, Oliver Kennedy, Shambhu J. Upadhyaya:
Similarity Metrics for SQL Query Clustering. IEEE Trans. Knowl. Data Eng. 30(12): 2408-2420 (2018) - [c121]Rohit Valecha, Rajarshi Chakraborty, H. Raghav Rao, Shambhu J. Upadhyaya:
A Prediction Model of Privacy Control for Online Social Networking Users. DESRIST 2018: 300-315 - [c120]Yan Sun, Shambhu J. Upadhyaya:
Synthetic Forgery Attack against Continuous Keystroke Authentication Systems. ICCCN 2018: 1-7 - [c119]Gökhan Kul, Shambhu J. Upadhyaya, Varun Chandola:
Detecting Data Leakage from Databases on Android Apps with Concept Drift. TrustCom/BigDataSE 2018: 905-913 - [i4]Gökhan Kul, Shambhu J. Upadhyaya, Varun Chandola:
Detecting Data Leakage from Databases on Android Apps with Concept Drift. CoRR abs/1805.11780 (2018) - 2017
- [c118]Gökhan Kul, Shambhu J. Upadhyaya, Andrew Hughes:
Complexity of Insider Attacks to Databases. MIST@CCS 2017: 25-32 - [c117]Shambhu J. Upadhyaya:
Continuous Authentication Using Behavioral Biometrics. IWSPA@CODASPY 2017: 29 - [c116]Jeffrey Spaulding, Shambhu J. Upadhyaya, Aziz Mohaisen:
You've Been Tricked! A User Study of the Effectiveness of Typosquatting Techniques. ICDCS 2017: 2593-2596 - [c115]Hayreddin Çeker, Shambhu J. Upadhyaya:
Transfer learning in long-text keystroke dynamics. ISBA 2017: 1-6 - [c114]Yan Sun, Hayreddin Çeker, Shambhu J. Upadhyaya:
Anatomy of secondary features in keystroke dynamics - achieving more with less. ISBA 2017: 1-6 - [c113]Hayreddin Çeker, Shambhu J. Upadhyaya:
Sensitivity analysis in keystroke dynamics using convolutional neural networks. WIFS 2017: 1-6 - [i3]Rudra Prasad Baksi, Shambhu J. Upadhyaya:
Kidemonas: The Silent Guardian. CoRR abs/1712.00841 (2017) - 2016
- [j55]Rajarshi Chakraborty, Jaeung Lee, Sharmistha Bagchi-Sen, Shambhu J. Upadhyaya, H. Raghav Rao:
Online shopping intention in the context of data breach in online retail stores: An examination of older and younger adults. Decis. Support Syst. 83: 47-56 (2016) - [j54]Mehran Mozaffari Kermani, Erkay Savas, Shambhu J. Upadhyaya:
Guest Editorial: Introduction to the Special Issue on Emerging Security Trends for Deeply-Embedded Computing Systems. IEEE Trans. Emerg. Top. Comput. 4(3): 318-320 (2016) - [c112]Jeffrey Spaulding, Shambhu J. Upadhyaya, Aziz Mohaisen:
The Landscape of Domain Name Typosquatting: Techniques and Countermeasures. ARES 2016: 284-289 - [c111]Hayreddin Çeker, Shambhu J. Upadhyaya:
Adaptive techniques for intra-user variability in keystroke dynamics. BTAS 2016: 1-6 - [c110]Hayreddin Çeker, Shambhu J. Upadhyaya:
User authentication with keystroke dynamics in long-text data. BTAS 2016: 1-6 - [c109]Jeffrey Spaulding, Ah Reum Kang, Shambhu J. Upadhyaya, Aziz Mohaisen:
A user study of the effectiveness of typosquatting techniques. CNS 2016: 360-361 - [c108]Hayreddin Çeker, Jun Zhuang, Shambhu J. Upadhyaya, Quang Duy La, Boon-Hee Soong:
Deception-Based Game Theoretical Approach to Mitigate DoS Attacks. GameSec 2016: 18-38 - [c107]Meng Tong, Ameya Sanzgiri, Dimitrios Koutsonikolas, Shambhu J. Upadhyaya:
Twitter structure as a composition of two distinct networks. ICNC 2016: 1-5 - [c106]Tamal Biswas, Ameya Sanzgiri, Shambhu J. Upadhyaya:
Building Long Term Trust in Vehicular Networks. VTC Spring 2016: 1-5 - [c105]Jiaju Huang, Daqing Hou, Stephanie Schuckers, Shambhu J. Upadhyaya:
Effects of text filtering on authentication performance of keystroke biometrics. WIFS 2016: 1-6 - [c104]Yan Sun, Hayreddin Çeker, Shambhu J. Upadhyaya:
Shared keystroke dataset for continuous authentication. WIFS 2016: 1-6 - [c103]Gökhan Kul, Duc Luong, Ting Xie, Patrick Coonan, Varun Chandola, Oliver Kennedy, Shambhu J. Upadhyaya:
Ettu: Analyzing Query Intents in Corporate Databases. WWW (Companion Volume) 2016: 463-466 - [i2]Jeffrey Spaulding, Shambhu J. Upadhyaya, Aziz Mohaisen:
The Landscape of Domain Name Typosquatting: Techniques and Countermeasures. CoRR abs/1603.02767 (2016) - [i1]Gökhan Kul, Duc Luong, Ting Xie, Patrick Coonan, Varun Chandola, Oliver Kennedy, Shambhu J. Upadhyaya:
Summarizing Large Query Logs in Ettu. CoRR abs/1608.01013 (2016) - 2015
- [j53]Chittaranjan Hota, Shambhu J. Upadhyaya, Jamal Nazzal Al-Karaki:
Advances in secure knowledge management in the big data era. Inf. Syst. Frontiers 17(5): 983-986 (2015) - [j52]Ruchika Mehresh, Shambhu J. Upadhyaya:
Surviving advanced persistent threats in a distributed environment - Architecture and analysis. Inf. Syst. Frontiers 17(5): 987-995 (2015) - [j51]Yan Sun, Shambhu J. Upadhyaya:
Secure and privacy preserving data processing support for active authentication. Inf. Syst. Frontiers 17(5): 1007-1015 (2015) - [j50]Gökhan Kul, Shambhu J. Upadhyaya:
Towards a Cyber Ontology for Insider Threats in the Financial Sector. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 6(4): 64-85 (2015) - [j49]Shuai Yuan, H. Raghav Rao, Shambhu J. Upadhyaya:
Emerging issues for education in E-discovery for electronic health records. Secur. Informatics 4(1): 3 (2015) - [c102]Gökhan Kul, Shambhu J. Upadhyaya:
A Preliminary Cyber Ontology for Insider Threats in the Financial Sector. MIST@CCS 2015: 75-78 - [c101]Victoria Kisekka, Raj Sharman, H. Raghav Rao, Shambhu J. Upadhyaya:
Investigating the Antecedents of Healthcare Workers' Perceptions of Organizational Resilience in Hospitals. ICIS 2015 - [c100]Hayreddin Çeker, Shambhu J. Upadhyaya:
Enhanced recognition of keystroke dynamics using Gaussian mixture models. MILCOM 2015: 1305-1310 - 2014
- [j48]Nan Xiao, Raj Sharman, H. Raghav Rao, Shambhu J. Upadhyaya:
Factors influencing online health information search: An empirical analysis of a national cancer-related survey. Decis. Support Syst. 57: 417-427 (2014) - [j47]Qi Duan, Mohit Virendra, Shambhu J. Upadhyaya, Ameya Sanzgiri:
Minimum Cost Blocking Problem in Multi-Path Wireless Routing Protocols. IEEE Trans. Computers 63(7): 1765-1777 (2014) - [c99]Rohit Valecha, Mandvika Kashyap, Swathi Rajeev, H. Raghav Rao, Shambhu J. Upadhyaya:
An Activity Theory Approach to Specification of Access Control Policies in Transitive Health Workflows. ICIS 2014 - 2013
- [j46]Rui Chen, Raj Sharman, H. Raghav Rao, Shambhu J. Upadhyaya:
Data Model Development for Fire Related Extreme Events: An Activity Theory Approach. MIS Q. 37(1): 125-147 (2013) - [j45]Rohit Valecha, Raj Sharman, H. Raghav Rao, Shambhu J. Upadhyaya:
A Dispatch-Mediated Communication Model for Emergency Response Systems. ACM Trans. Manag. Inf. Syst. 4(1): 2:1-2:25 (2013) - [c98]Rajarshi Chakraborty, H. Raghav Rao, Shambhu J. Upadhyaya, Sharmistha Bagchi-Sen:
A Conceptual Examination of Distrusting Beliefs in Older Adults about the Internet. AMCIS 2013 - [c97]Ameva Sanzziri, Anandatirtha Nandugudi, Shambhu J. Upadhyaya, Chunming Qiao:
SESAME: Smartphone enabled secure access to multiple entities. ICNC 2013: 879-883 - [c96]Ameya Sanzgiri, Andrew Hughes, Shambhu J. Upadhyaya:
Analysis of Malware Propagation in Twitter. SRDS 2013: 195-204 - 2012
- [j44]Minkyun Kim, Raj Sharman, Catherine P. Cook-Cottone, H. Raghav Rao, Shambhu J. Upadhyaya:
Assessing roles of people, technology and structure in emergency management systems: a public sector perspective. Behav. Inf. Technol. 31(12): 1147-1160 (2012) - [c95]Rohit Valecha, Raj Sharman, H. Raghav Rao, Shambhu J. Upadhyaya:
Design Principles for Emergency Collaborative Systems: A Situation Awareness Study of Buffalo Plane Crash. AMCIS 2012 - [c94]Rohit Valecha, Raj Sharman, H. Raghav Rao, Shambhu J. Upadhyaya:
Emergency Response System Design: An Examination of Emergency Communication Messages. DESRIST 2012: 139-146 - [c93]Harsha Nagarajaiah, Shambhu J. Upadhyaya, Vinodh Gopal:
Data De-duplication and Event Processing for Security Applications on an Embedded Processor. SRDS 2012: 418-423 - [c92]Ameya Sanzgiri, Jacob Joyce, Shambhu J. Upadhyaya:
The Early (tweet-ing) Bird Spreads the Worm: An Assessment of Twitter for Malware Propagation. ANT/MobiWIS 2012: 705-712 - 2011
- [c91]Lance C. Pérez, Stephen Cooper, Elizabeth K. Hawthorne, Susanne Wetzel, Joel Brynielsson, Asim Gencer Gökce, John Impagliazzo, Youry Khmelevsky, Karl J. Klee, Margaret Leary, Amelia Philips, Norbert Pohlmann, Blair Taylor, Shambhu J. Upadhyaya:
Information assurance education in two- and four-year institutions. ITiCSE-WGR 2011: 39-53 - [c90]Vallisha Keshavamurthy, Shambhu J. Upadhyaya, Vinodh Gopal:
Accelerated Processing of Secure Email by Exploiting Built-in Security Features on the Intel EP80579 Integrated Processor with Intel QuickAssist Technology. SRDS Workshops 2011: 1-8 - [c89]Steven Salerno, Ameya Sanzgiri, Shambhu J. Upadhyaya:
Exploration of Attacks on Current Generation Smartphones. ANT/MobiWIS 2011: 546-553 - [p1]Mohit Virendra, Qi Duan, Shambhu J. Upadhyaya:
Detecting Cheating Aggregators and Report Dropping Attacks in Wireless Sensor Networks. Cyber Security, Cyber Crime and Cyber Forensics 2011: 146-167 - [r2]Shambhu J. Upadhyaya:
Mandatory Access Control. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 756-758 - [r1]Shambhu J. Upadhyaya, H. Raghav Rao, G. Padmanabhan:
Secure Knowledge Management. Encyclopedia of Knowledge Management 2011: 1429-1437 - 2010
- [j43]Rui Chen, H. Raghav Rao, Raj Sharman, Shambhu J. Upadhyaya, Jin Ki Kim:
An Empirical Examination of IT-Enabled Emergency Response: The Cases of Hurricane Katrina and Hurricane Rita. Commun. Assoc. Inf. Syst. 26: 8 (2010) - [j42]Cyril Ryu, Raj Sharman, H. Raghav Rao, Shambhu J. Upadhyaya:
Security protection design for deception and real system regimes: A model and analysis. Eur. J. Oper. Res. 201(2): 545-556 (2010) - [j41]JinKyu Lee, Sharmistha Bagchi-Sen, H. Raghav Rao, Shambhu J. Upadhyaya:
Anatomy of the Information Security Workforce. IT Prof. 12(1): 14-23 (2010) - [j40]Sharmistha Bagchi-Sen, H. Raghav Rao, Shambhu J. Upadhyaya, Sangmi Chai:
Women in Cybersecurity: A Study of Career Advancement. IT Prof. 12(1): 24-31 (2010) - [j39]Murtuza Jadliwala, Sheng Zhong, Shambhu J. Upadhyaya, Chunming Qiao, Jean-Pierre Hubaux:
Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes. IEEE Trans. Mob. Comput. 9(6): 810-823 (2010) - [c88]Haricharan Rengamani, Shambhu J. Upadhyaya, H. Raghav Rao, Ponnurangam Kumaraguru:
Protecting senior citizens from cyber security attacks in the e-health scenario: an international perspective. CSIIRW 2010: 82 - [c87]Rui Chen, H. Raghav Rao, Raj Sharman, Shambhu J. Upadhyaya, Catherine P. Cook-Cottone:
Examination of emergency response from knowledge and psychology perspectives. ISCRAM 2010 - [c86]Vidyaraman Sankaranarayanan, Shambhu J. Upadhyaya, Kevin A. Kwiat:
QoS-T: QoS Throttling to Elicit User Cooperation in Computer Systems. MMM-ACNS 2010: 102-117 - [c85]Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo, Shambhu J. Upadhyaya:
A Data-Centric Approach to Insider Attack Detection in Database Systems. RAID 2010: 382-401 - [c84]Ruchika Mehresh, Shambhu J. Upadhyaya, Kevin A. Kwiat:
A Multi-step Simulation Approach toward Secure Fault Tolerant System Evaluation. SRDS 2010: 363-367
2000 – 2009
- 2009
- [c83]Onook Oh, Rajarshi Chakraborty, H. Raghav Rao, Shambhu J. Upadhyaya:
An exploration of unintended online private information disclosure in educational institutions across four countries. eCrime 2009: 1-11 - [c82]Insu Park, Raj Sharman, H. Raghav Rao, Shambhu J. Upadhyaya:
On the Two Factors Affecting Information Systems Success in the Extreme Event Context. WEB 2009: 181-185 - [c81]Murtuza Jadliwala, Qi Duan, Shambhu J. Upadhyaya, Jinhui Xu:
Towards a theory for securing time synchronization in wireless sensor networks. WISEC 2009: 201-212 - 2008
- [j38]Rui Chen, Raj Sharman, H. Raghav Rao, Shambhu J. Upadhyaya:
Coordination in emergency response management. Commun. ACM 51(5): 66-73 (2008) - [j37]Erin Cody, Raj Sharman, H. Raghav Rao, Shambhu J. Upadhyaya:
Security in grid computing: A review and synthesis. Decis. Support Syst. 44(4): 749-764 (2008) - [j36]Shambhu J. Upadhyaya, Nandakumar P. Venugopal, Nihal Shastry, Srinivasan Gopalakrishnan, Bharath V. Kuppuswamy, Rana Bhowmick, Prerna Mayor:
Design Considerations for High Performance RF Cores Based on Process Variation Study. J. Electron. Test. 24(1-3): 143-155 (2008) - [j35]Lushan Liu, Pradeep Nagaraj, Shambhu J. Upadhyaya, Ramalingam Sridhar:
Defect Analysis and Defect Tolerant Design of Multi-port SRAMs. J. Electron. Test. 24(1-3): 165-179 (2008) - [j34]Rui Chen, Raj Sharman, Nirupama Chakravarti, H. Raghav Rao, Shambhu J. Upadhyaya:
Emergency Response Information System Interoperability: Development of Chemical Incident Response Data Model. J. Assoc. Inf. Syst. 9(3): 7 (2008) - [c80]Insu Park, Raj Sharman, H. Raghav Rao, Shambhu J. Upadhyaya:
Perceived Risk and Resilience in the Face of Natural Disasters: A Study of Hospital. AMCIS 2008: 13 - [c79]Rui Chen, Raj Sharman, H. Raghav Rao, Shambhu J. Upadhyaya:
Information Theoretic Approach to Design of Emergency Response Systems. AMCIS 2008: 32 - [c78]Rajarshi Chakraborty, H. Raghav Rao, Vidyaraman Sankaranarayanan, Shambhu J. Upadhyaya:
Mediated Internet Experience for Senior Citizens. AMCIS 2008: 34 - [c77]Nan Xiao, Raj Sharman, H. Raghav Rao, Shambhu J. Upadhyaya:
Infastructure Interdependencies Modeling and Analysis - A Review and Synthesis. AMCIS 2008: 224 - [c76]Sunu Mathew, Shambhu J. Upadhyaya, Duc T. Ha, Hung Q. Ngo:
Insider abuse comprehension through capability acquisition graphs. FUSION 2008: 1-8 - [c75]Rui Chen, Raj Sharman, H. Raghav Rao, Shambhu J. Upadhyaya:
Data Model Development for Fire Related Extreme Events - An Activity Theory and Semiotics Approach. ICIS 2008: 217 - [c74]Madhusudhanan Chandrasekaran, Vidyaraman Sankaranarayanan, Shambhu J. Upadhyaya:
Inferring Sources of Leaks in Document Management Systems. IFIP Int. Conf. Digital Forensics 2008: 291-306 - [c73]Sheng Zhong, Murtuza Jadliwala, Shambhu J. Upadhyaya, Chunming Qiao:
Towards a Theory of Robust Localization Against Malicious Beacon Nodes. INFOCOM 2008: 1391-1399 - [c72]Mohammad Iftekhar Husain, Shambhu J. Upadhyaya, Madhusudhanan Chandrasekaran:
A Novel Approach for Security and Robustness in Wireless Embedded Systems. SEUS 2008: 323-335 - 2007
- [j33]Debanjan Ghosh, Raj Sharman, H. Raghav Rao, Shambhu J. Upadhyaya:
Self-healing systems - survey and synthesis. Decis. Support Syst. 42(4): 2164-2185 (2007) - [j32]Insu Park, Raj Sharman, H. Raghav Rao, Shambhu J. Upadhyaya:
Short Term and Total Life Impact analysis of email worms in computer systems. Decis. Support Syst. 43(3): 827-841 (2007) - [j31]Jin Ki Kim, Raj Sharman, H. Raghav Rao, Shambhu J. Upadhyaya:
Efficiency of critical incident management systems: Instrument development and validation. Decis. Support Syst. 44(1): 235-250 (2007) - [j30]Murtuza Jadliwala, Qi Duan, Jinhui Xu, Shambhu J. Upadhyaya:
On extracting consistent graphs in wireless sensor networks. Int. J. Sens. Networks 2(3/4): 149-162 (2007) - [j29]Rui Chen, Raj Sharman, H. Raghav Rao, Shambhu J. Upadhyaya:
Design principles for critical incident response systems. Inf. Syst. E Bus. Manag. 5(3): 201-227 (2007) - [c71]Vidyaraman Sankaranarayanan, Shambhu J. Upadhyaya, Kevin A. Kwiat:
QoS-LI: QoS Loss Inference in Disadvantaged Networks. AINA Workshops (2) 2007: 524-529 - [c70]Madhusudhanan Chandrasekaran, Mukarram Baig, Shambhu J. Upadhyaya:
AEGIS: A Proactive Methodology to Shield against Zero-Day Exploits. AINA Workshops (2) 2007: 556-563 - [c69]Rui Chen, Raj Sharman, H. Raghav Rao, Shambhu J. Upadhyaya:
Emergency Response Coordination and IT Support: Contingency and Strategies. AMCIS 2007: 296 - [c68]Vidyaraman Sankaranarayanan, Madhusudhanan Chandrasekaran, Shambhu J. Upadhyaya:
Towards Modeling Trust Based Decisions: A Game Theoretic Approach. ESORICS 2007: 485-500 - [c67]Qi Duan, Mohit Virendra, Shambhu J. Upadhyaya:
On the Hardness of Minimum Cost Blocking Attacks on Multi-Path Wireless Routing Protocols. ICC 2007: 4925-4930 - [c66]Duc T. Ha, Shambhu J. Upadhyaya, Hung Q. Ngo, Suranjan Pramanik, Ramkumar Chinchani, Sunu Mathew:
Insider Threat Analysis Using Information-Centric Modeling. IFIP Int. Conf. Digital Forensics 2007: 55-73 - [c65]Madhusudhanan Chandrasekaran, Vidyaraman Sankaranarayanan, Shambhu J. Upadhyaya:
SpyCon: Emulating User Activities to Detect Evasive Spyware. IPCCC 2007: 502-509 - [c64]Sangmi Chai, Raj Sharman, Smitha Patil, Shruta Satam, H. Raghav Rao, Shambhu J. Upadhyaya:
Surface Transportation and Cyber-Infrastructure: An Exploratory Study. ISI 2007: 124-128 - [c63]Vidyaraman Sankaranarayanan, Madhusudhanan Chandrasekaran, Shambhu J. Upadhyaya:
Position: the user is the enemy. NSPW 2007: 75-80 - [c62]Murtuza Jadliwala, Shambhu J. Upadhyaya, Manik Taneja:
ASFALT: A Simple Fault-Tolerant Signature-based Localization Technique for Emergency Sensor Networks. SRDS 2007: 3-12 - 2006
- [j28]Dan Zhao, Shambhu J. Upadhyaya, Martin Margala:
Design of a wireless test control network with radio-on-chip technology for nanometer system-on-a-chip. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 25(7): 1411-1418 (2006) - [c61]Sangmi Chai, Sharmistha Bagchi-Sen, Rajni Goel, H. Raghav Rao, Shambhu J. Upadhyaya:
A Framework for Understanding Minority Students' Cyber Security Career Interests. AMCIS 2006: 413 - [c60]Ashish Garg, Vidyaraman Sankaranarayanan, Shambhu J. Upadhyaya, Kevin A. Kwiat:
USim: A User Behavior Simulation Framework for Training and Testing IDSes in GUI Based Systems. Annual Simulation Symposium 2006: 196-203 - [c59]Nandakumar P. Venugopal, Nihal Shastry, Shambhu J. Upadhyaya:
Effect of Process Variation on the Performance of Phase Frequency Detector. DFT 2006: 525-534 - [c58]Lushan Liu, Ramalingam Sridhar, Shambhu J. Upadhyaya:
A 3-port Register File Design for Improved Fault Tolerance on Resistive Defects in Core-Cells. DFT 2006: 545-553 - [c57]Jin Ki Kim, Raj Sharman, H. Raghav Rao, Shambhu J. Upadhyaya:
Framework for Analyzing Critical Incident Management Systems (CIMS). HICSS 2006 - [c56]Vidyaraman Sankaranarayanan, Suranjan Pramanik, Shambhu J. Upadhyaya:
Detecting Masquerading Users in a Document Management System. ICC 2006: 2296-2301 - [c55]Madhusudhanan Chandrasekaran, Mukarram Baig, Shambhu J. Upadhyaya:
AVARE: aggregated vulnerability assessment and response against zero-day exploits. IPCCC 2006 - [c54]Vidyaraman Sankaranarayanan, Shambhu J. Upadhyaya:
A Trust Assignment Model Based on Alternate Actions Payoff. iTrust 2006: 339-353 - [c53]Sunu Mathew, Richard Giomundo, Shambhu J. Upadhyaya, Moises Sudit, Adam Stotz:
Understanding multistage attacks by attack-track based visualization of heterogeneous event streams. VizSEC 2006: 1-6 - [c52]Madhusudhanan Chandrasekaran, Ramkumar Chinchani, Shambhu J. Upadhyaya:
PHONEY: Mimicking User Response to Detect Phishing Attacks. WOWMOM 2006: 668-672 - 2005
- [j27]JinKyu Lee, Shambhu J. Upadhyaya, H. Raghav Rao, Raj Sharman:
Secure knowledge management and the semantic web. Commun. ACM 48(12): 48-54 (2005) - [j26]G. B. Tanna, Manish Gupta, H. Raghav Rao, Shambhu J. Upadhyaya:
Information assurance metric development framework for electronic bill presentment and payment systems using transaction and workflow analysis. Decis. Support Syst. 41(1): 242-261 (2005) - [j25]Ramkumar Chinchani, Duc T. Ha, Anusha Iyer, Hung Q. Ngo, Shambhu J. Upadhyaya:
On the Hardness of Approximating the Min-Hack Problem. J. Comb. Optim. 9(3): 295-311 (2005) - [j24]Dan Zhao, Shambhu J. Upadhyaya:
Dynamically partitioned test scheduling with adaptive TAM configuration for power-constrained SoC testing. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 24(6): 956-965 (2005) - [c51]Jin Ki Kim, Raj Sharman, H. Raghav Rao, Shambhu J. Upadhyaya:
An Investigation of Risk Management Issues in the Context of Emergency Response Systems. AMCIS 2005: 463 - [c50]Ramkumar Chinchani, Anusha Iyer, Hung Q. Ngo, Shambhu J. Upadhyaya:
Towards a Theory of Insider Threat Assessment. DSN 2005: 108-117 - [c49]Dan Zhao, Shambhu J. Upadhyaya, Martin Margala:
A new SoC test architecture with RF/wireless connectivity. ETS 2005: 14-19 - [c48]Sharmistha Bagchi-Sen, JinKyu Lee, H. Raghav Rao, Shambhu J. Upadhyaya:
A Framework for Examining Skill Specialization, Gender Inequity, and Career Advancement in the Information Security Field . ICISS 2005: 317-321 - [c47]Rui Chen, Raj Sharman, H. Raghav Rao, Shambhu J. Upadhyaya:
Design Principles of Coordinated Multi-incident Emergency Response Systems. ISI 2005: 81-98 - [c46]Mohit Virendra, Shambhu J. Upadhyaya, Vivek Kumar, Vishal Anand:
SAWAN: A Survivable Architecture for Wireless LANs. IWIA 2005: 71-82 - [c45]Sunu Mathew, Chintan Shah, Shambhu J. Upadhyaya:
An Alert Fusion Framework for Situation Awareness of Coordinated Multistage Attacks. IWIA 2005: 95-104 - 2004
- [j23]Manish Gupta, H. Raghav Rao, Shambhu J. Upadhyaya:
Electronic Banking and Information Assurance Issues: Surveys and Synthesis. J. Organ. End User Comput. 16(3): 1-21 (2004) - [j22]Dan Zhao, Shambhu J. Upadhyaya:
A generic resource distribution and test scheduling scheme for embedded core-based SoCs. IEEE Trans. Instrum. Meas. 53(2): 318-329 (2004) - [j21]Stephanie R. Goldberg, Shambhu J. Upadhyaya, W. Kent Fuchs:
Recovery schemes for mesh arrays utilizing dedicated spares. IEEE Trans. Reliab. 53(4): 445-451 (2004) - [c44]Manish Agrawal, Hemant Padmanabhan, Lokesh Pandey, H. Raghav Rao, Shambhu J. Upadhyaya:
A conceptual approach to information security in financial account aggregation. ICEC 2004: 619-626 - [c43]Ramkumar Chinchani, Aarthie Muthukrishnan, Madhusudhanan Chandrasekaran, Shambhu J. Upadhyaya:
RACOON: Rapidly Generating User Command Data For Anomaly Detection From Customizable Templates. ACSAC 2004: 189-204 - [c42]Suranjan Pramanik, Vidyaraman Sankaranarayanan, Shambhu J. Upadhyaya:
Security Policies to Mitigate Insider Threat in the Document Control Domain. ACSAC 2004: 304-313 - [c41]Raj Sharman, H. Raghav Rao, Shambhu J. Upadhyaya:
Metrics for Information Security - A literature review. AMCIS 2004: 181 - [c40]Suranjan Pramanik, Shambhu J. Upadhyaya:
RABIT: A New Framework for Runtime Emulation and Binary Translation. Annual Simulation Symposium 2004: 213-220 - [c39]Ramkumar Chinchani, Anusha Iyer, Bharat Jayaraman, Shambhu J. Upadhyaya:
ARCHERR: Runtime Environment Driven Program Safety. ESORICS 2004: 385-406 - [c38]Raj Sharman, H. Raghav Rao, Shambhu J. Upadhyaya, Partha Khot, Sumit Manocha, Saumitra Ganguly:
Functionality Defense by Heterogeneity: A new paradigm for Securing Systems. HICSS 2004 - [c37]Ashish Vikram, Sivakumar Chennuru, H. Raghav Rao, Shambhu J. Upadhyaya:
A Solution Architecture for Financial Institutions to Handle Illegal Activities: A Neural Networks Approach. HICSS 2004 - [c36]Jian Pei, Shambhu J. Upadhyaya, Faisal Farooq, Venugopal Govindaraju:
Data Mining for Intrusion Detection: Techniques, Applications and Systems. ICDE 2004: 877 - [c35]Ravindranath Gummadidala, Chunming Qiao, Shambhu J. Upadhyaya:
WDP: A Wormhole Discovery Protocol for Mobile Ad-Hoc Networks. International Conference on Wireless Networks 2004: 46-51 - [c34]Raj Sharman, Himabindu Challapalli, H. Raghav Rao, Shambhu J. Upadhyaya:
A Framework for a Secure Federated Patient Healthcare System. ISI 2004: 512-513 - [c33]Karthik Sundararaman, Shambhu J. Upadhyaya, Martin Margala:
Cost Model Analysis of DFT Based Fault Tolerant SOC Designs. ISQED 2004: 465-469 - 2003
- [j20]Shambhu J. Upadhyaya, Andrea Bondavalli:
Guest Editorial: Special Issue on Reliable Distributed Systems. IEEE Trans. Computers 52(2): 97-98 (2003) - [c32]Dan Zhao, Shambhu J. Upadhyaya, Martin Margala:
Control Constrained Resource Partitioning for Complex SoCs. DFT 2003: 425-432 - [c31]Ramkumar Chinchani, Anusha Iyer, Bharat Jayaraman, Shambhu J. Upadhyaya:
Insecure Programming: How Culpable is a Language's Syntax? IAW 2003: 158-163 - [c30]Manish Gupta, Shamik Banerjee, H. Raghav Rao, Shambhu J. Upadhyaya:
Intrusion Countermeasures Security Model Based on Prioritization Scheme for Intranet Access Security. IAW 2003: 174-181 - [c29]Ramkumar Chinchani, Shambhu J. Upadhyaya, Kevin A. Kwiat:
A Tamper-Resistant Framework for Unambiguous Detection of Attacks in User Space Using Process Monitors. IWIA 2003: 25-36 - [c28]Shambhu J. Upadhyaya:
Real-Time Intrusion Detection with Emphasis on Insider Attacks. MMM-ACNS 2003: 82-85 - [c27]Dan Zhao, Shambhu J. Upadhyaya:
Power Constrained Test Scheduling with Dynamically Varied TAM. VTS 2003: 273-278 - 2002
- [c26]Shambhu J. Upadhyaya, Jae Min Lee, Padmanabhan Nair:
Time Slot Specification Based Approach to Analog Fault Diagnosis Using Built-in Current Sensors and Test Point Insertion. Asian Test Symposium 2002: 429-434 - [c25]Dan Zhao, Shambhu J. Upadhyaya:
Adaptive Test Scheduling in SoC's by Dynamic Partitioning. DFT 2002: 334-344 - [c24]Dan Zhao, Shambhu J. Upadhyaya, Martin Margala:
Minimizing concurrent test time in SoC's by balancing resource usage. ACM Great Lakes Symposium on VLSI 2002: 77-82 - 2001
- [j19]Kamran Zarrineh, Shambhu J. Upadhyaya, Vivek Chickermane:
System-on-Chip Testability Using LSSD Scan Structures. IEEE Des. Test Comput. 18(3): 83-97 (2001) - [j18]Kamran Zarrineh, Shambhu J. Upadhyaya, Sreejit Chakravarty:
Automatic generation and compaction of March tests for memory arrays. IEEE Trans. Very Large Scale Integr. Syst. 9(6): 845-857 (2001) - [c23]Shambhu J. Upadhyaya, Ramkumar Chinchani, Kevin A. Kwiat:
An Analytical Framework for Reasoning about Intrusions. SRDS 2001: 99- - 2000
- [j17]Bina Ramamurthy, Shambhu J. Upadhyaya, Bharat K. Bhargava:
Design and Analysis of an Integrated Checkpointing Recovery Scheme for Distributed Applications. IEEE Trans. Knowl. Data Eng. 12(2): 174-186 (2000) - [c22]Tien-Chung Tien, Shambhu J. Upadhyaya:
A Local/Global Strategy Based on Signal Strength for Message Routing in Wireless Mobile Ad-Hoc Networks. AIWoRC 2000: 227-232
1990 – 1999
- 1999
- [c21]Kamran Zarrineh, Shambhu J. Upadhyaya:
On Programmable Memory Built-In Self Test Architectures. DATE 1999: 708-713 - [c20]Kamran Zarrineh, Shambhu J. Upadhyaya:
Programmable Memory BIST and a New Synthesis Framework. FTCS 1999: 352-355 - [c19]Kamran Zarrineh, Shambhu J. Upadhyaya:
A design for test perspective on memory synthesis. ISCAS (1) 1999: 101-104 - [c18]Kamran Zarrineh, Shambhu J. Upadhyaya:
A New Framework For Automatic Generation, Insertion and Verification of Memory Built-In Self Test Units. VTS 1999: 391-397 - 1998
- [j16]Amruth N. Kumar, Shambhu J. Upadhyaya:
Component-ontological representation of function for reasoning about devices. Artif. Intell. Eng. 12(4): 399-415 (1998) - [j15]Stephanie R. Goldberg, Shambhu J. Upadhyaya:
Implementing degradable processing arrays. IEEE Micro 18(1): 64-74 (1998) - [j14]Lama Nachman, Kewal K. Saluja, Shambhu J. Upadhyaya, Robert Reuse:
A Novel Approach to Random Pattern Testing of Sequential Circuits. IEEE Trans. Computers 47(1): 129-134 (1998) - [c17]Kamran Zarrineh, Shambhu J. Upadhyaya, Sreejit Chakravarty:
A new framework for generating optimal March tests for memory arrays. ITC 1998: 73-82 - [c16]Bina Ramamurthy, Shambhu J. Upadhyaya, Bharat K. Bhargava:
Design and Analysis of a Hardware-Assisted Checkpointing and Recovery Scheme for Distributed Applications. SRDS 1998: 84-90 - [c15]Kamran Zarrineh, Shambhu J. Upadhyaya, Philip Shephard III:
Automatic Insertion of Scan Structures to Enhance Testability of Embedded Memories, Cores and Chips. VTS 1998: 98-105 - 1997
- [j13]Yung-Yuan Chen, Shambhu J. Upadhyaya, Ching-Hwa Cheng:
A Comprehensive Reconfiguration Scheme for Fault-Tolerant VLSI/WSI Array Processors. IEEE Trans. Computers 46(12): 1363-1371 (1997) - [c14]Bina Ramamurthy, Shambhu J. Upadhyaya, Ravishankar K. Iyer:
An Object-Oriented Testbed for the Evaluation of Checkpointing and Recovery Systems. FTCS 1997: 194-203 - 1996
- [c13]Stephanie R. Goldberg, Shambhu J. Upadhyaya, W. Kent Fuchs:
Recovery Schemes for Mesh Arrays Utilizing Dedicated Spares. DFT 1996: 318-326 - [c12]Lama Nachman, Kewal K. Saluja, Shambhu J. Upadhyaya, Robert Reuse:
Random Pattern Testing for Sequential Circuits Revisited. FTCS 1996: 44-52 - 1995
- [j12]Amruth N. Kumar, Shambhu J. Upadhyaya:
Function-based candidate discrimination during model-based diagnosis. Appl. Artif. Intell. 9(1): 65-80 (1995) - [j11]Sreejit Chakravarty, Ramalingam Sridhar, Shambhu J. Upadhyaya, Yervant Zorian, Gil Philips, Bozena Kaminska, Bernard Courtois:
Conference Reports. IEEE Des. Test Comput. 12(4): 95-97 (1995) - [c11]Stephanie R. Goldberg, Shambhu J. Upadhyaya:
Utilizing spares in multichip modules for the dual function of fault coverage and fault diagnosis. DFT 1995: 234-242 - 1994
- [j10]Shambhu J. Upadhyaya, Bina Ramamurthy:
Concurrent Process Monitoring with No Reference Signatures. IEEE Trans. Computers 43(4): 475-480 (1994) - [j9]Yung-Yuan Chen, Shambhu J. Upadhyaya:
Modeling the Reliability of a Class of Fault-Tolerant VLSI/WSI Systems Based on Multiple-Level Redundancy. IEEE Trans. Computers 43(6): 737-748 (1994) - [c10]Aravindan Ranganathan, Shambhu J. Upadhyaya:
Simulation analysis of a dynamic checkpointing strategy for real-time systems. Annual Simulation Symposium 1994: 181-187 - [c9]Stephanie R. Goldberg, Shambhu J. Upadhyaya:
Implementation of a Gracefully Degradable Binary Tree in Programmable. DFT 1994: 28-36 - 1993
- [j8]Shambhu J. Upadhyaya, Hoang Pham:
Analysis of Noncoherent Systems and an Architecture for the Computation of the System Reliability. IEEE Trans. Computers 42(4): 484-493 (1993) - [j7]Yung-Yuan Chen, Shambhu J. Upadhyaya:
Reliability, Reconfiguration, and Spare Allocation Issues in Binary-Tree Architectures Based on Multiple-Level Redundancy. IEEE Trans. Computers 42(6): 713-723 (1993) - [j6]Yung-Yuan Chen, Shambhu J. Upadhyaya:
Yield Analysis of Reconfigurable Array Processors Based on Multiple-Level Redundancy. IEEE Trans. Computers 42(9): 1136-1141 (1993) - [c8]V. Upadhyaya, Shambhu J. Upadhyaya, Amlan Kundu:
A parallel VLSI implementation of Viterbi algorithm for accelerated word recognition. Great Lakes Symposium on VLSI 1993: 37-41 - [c7]Shambhu J. Upadhyaya, Liang-Chi Chen:
On-chip test generation for combinational circuits by LFSR modification. ICCAD 1993: 84-87 - 1991
- [j5]Amruth N. Kumar, Shambhu J. Upadhyaya:
Focusing candidate generation. Artif. Intell. Eng. 6(3): 156-159 (1991) - 1990
- [j4]Michael Demjanenko, Shambhu J. Upadhyaya:
Yield enhancement of field programmable logic arrays by inherent component redundancy. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 9(8): 876-884 (1990) - [c6]Shambhu J. Upadhyaya:
Rollback recovery in real-time systems with dynamic constraints. COMPSAC 1990: 524-529 - [c5]Shambhu J. Upadhyaya, John A. Thodiyil:
BIST PLAs, Pass or Fail - A Case Study. DAC 1990: 724-727 - [c4]Yung-Yuan Chen, Shambhu J. Upadhyaya:
An analysis of a reconfigurable binary tree architecture based on multiple-level redundancy. FTCS 1990: 192-199
1980 – 1989
- 1988
- [j3]Shambhu J. Upadhyaya, Kewal K. Saluja:
An experimental study to determine task size for rollback recovery systems. IEEE Trans. Computers 37(6): 872-877 (1988) - [j2]Shambhu J. Upadhyaya, Kewal K. Saluja:
A new approach to the design of built-in self-testing PLAs for high fault coverage. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 7(1): 60-67 (1988) - [c3]Sreejit Chakravarty, Shambhu J. Upadhyaya:
A Unified Approach to Designing Fault-Tolerant Processor Ensembles. ICPP (1) 1988: 339-342 - [c2]Michael Demjanenko, Shambhu J. Upadhyaya:
Dynamic Techniques for Yield Enhancement of Field Programmable Logic Arrays. ITC 1988: 485-491 - 1987
- [c1]Chun-Yeh Liu, Kewal K. Saluja, Shambhu J. Upadhyaya:
BIST-PLA: A Built-in Self-Test Design of Large Programmable Logic Arrays. DAC 1987: 385-391 - 1986
- [j1]Shambhu J. Upadhyaya, Kewal K. Saluja:
A Wachtdog Processor Based General Rollback Technique with Multiple Retries. IEEE Trans. Software Eng. 12(1): 87-95 (1986)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-05 21:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint