|  
Duan Q., M. Virendra, S. Upadhyaya and A. Sanzgiri, “Minimum Cost Blocking 
Problem in Multi-path Wireless Routing Protocols”,
IEEE Transactions on Computers, 
February 2013 (accepted).
	
	Sanzgiri A., A. Hughes, S. Upadhyaya, “Analysis 
	of Malware Propagation in Twitter”,
	32nd IEEE International 
	Symposium on Reliable Distributed Systems, Braga, Portugal, October 
	2013.
	
	Valecha R., H.R. Rao, R. Sharman and S. Upadhyaya, “A 
	Dispatch-Mediated Communication Model for Emergency Response Systems,”
	IEEE Transactions on Management Information Systems, Vol. 4, No. 1, 
	pp. 1-25, April 2013.
	
	Sanzgiri A., A. Nandugudi, S. Upadhyaya and C. Qiao, “SESAME: 
	Smartphone Enabled Secure Access to Multiple Entities”,
	International Conference on Computing, 
	Networking and Communications, Internet Services and Applications, San 
	Diego, CA, January 2013.
	
	Nagarajaiah H., S. Upadhyaya and V. Gopal, “Data 
	De-duplication and Event Processing for Security Applications on an Embedded 
	Processor”, 5th International Workshop on Dependable Network 
	Computing and Mobile Systems (DNCMS 2012), in conjunction with IEEE 
	SRDS 2012, Irvine, CA, October 2012.  
	
	Joyce J., A. Sanzgiri and S. Upadhyaya, “The 
Early (tweet-ing) Bird Spreads the Worm: An Assessment of Twitter for Malware 
Propagation”, 9th 
International Conference on Mobile Web Information Systems (MobiWIS), 
Niagara Falls, Ontario, Canada, August 2012.
	
	Mehresh R. and S. Upadhyaya, “A 
	Deception Framework for Survivability Against Next Generation Cyber Attacks”,
	International Conference on Security and Management (SAM'12), Las 
	Vegas, NV, July 2012.
	
	Keshavamurthy V., S. Upadhyaya and V. Gopal, “Accelerated Processing of 
	Secure Email by Exploiting Built-in Security Features on the Intel® EP80579 
	Integrated Processor with Intel® QuickAssist Technology”, 
	4th International Workshop on 
	Dependable Network Computing and Mobile Systems (DNCMS 2011), in 
	conjunction with IEEE SRDS 2011, Madrid, Spain, October 2011. 
	
	Salerno S., A. Sanzgiri and S. Upadhyaya, “Exploration 
	of Attacks on Current Generation Smartphones”,
	8th International Conference on Mobile Web Information 
	Systems (MobiWIS), Niagara Falls, ON, Canada, September 2011.
	
	Mehresh R., S. Upadhyaya and K. Kwiat, “Secure 
Proactive Recovery – a Hardware Based Mission Assurance Scheme”, Journal of 
Network Forensics, Springer, Vol. 3, Issue 2, Spring 2011, pp. 32-48.
	
	Mehresh R., J. Rao, S. Upadhyaya, S. Natarajan and 
	K. Kwiat, “Tamper-resistant Monitoring for Securing Multi-core Environments,
	International Conference on Security and Management (SAM), Las 
	Vegas, NV, July 2011.
	
	Sankaranarayanan V., S. Upadhyaya and K. 
Kwiat, “Inferring QoS Loss in 
Disadvantaged Networks: A Game Theoretic Approach”, Journal of Autonomic 
and Trusted Computing (JoATC),  2012 (accepted).
	
	Mathew S., S. Upadhyaya, M. Sudit and A. Stotz, 
	“Situation Awareness of Multistage Cyber Attacks by Semantic Event Fusion”,
	IEEE MILCOM 2010, October 2010.
	
	Mathew S., M. Petropoulos, H.Q. Ngo and S. 
	Upadhyaya, “A Data-Centric Approach to Insider Attack Detection in Database 
	Systems”, 13th International Symposium on Recent Advances in Intrusion 
	Detection, Ottawa, Canada, September 2010.
Gilbert B., R. Sharman, M. Gupta, H.R. Rao, S. 
Upadhyaya and K. Mortensen, “Content-sensitive, 
Temporally Adaptive Metadata”, 11th Annual New York State Cyber Security 
Conference, Albany, NY, June 2008, pp. 47-52 (Best Paper Award).
Zhong S., M. Jadliwala, S. 
Upadhyaya and C. Qiao, "Towards 
a Theory of Robust Localization against Malicious Beacon Nodes", 27th 
IEEE International Conference on Computer Communications (INFOCOM 2008), 
Phoenix, AZ, April 2008.
Jadliwala M., S. Upadhyaya 
and M. Taneja, “ASFALT: A Simple Fault-Tolerant Signature-based Localization 
Technique for Emergency Sensor Networks”,  IEEE Symposium on 
Reliable Distributed Systems (SRDS 2007), Beijing, China, October 2007. 
Jadliwala M., Qi Duan, Jinhui Xu and Shambhu Upadhyaya. 
“On Extracting Consistent Graphs in 
Wireless Sensor Networks”, International Journal of Sensor Networks (IJSNET): 
Special Issue on Theoretical and Algorithmic Aspects in Sensor Networks, Vol. 2, 
Nos 3/4, pp. 149-162, 2007.
Sankaranarayanan V., M. 
Chandrasekaran and S. Upadhyaya, “Towards Modeling Trust Based Decisions: A Game 
Theoretic Approach”, 12th European Symposium on Research in 
Computer Security (ESORICS 2007), Dresden, Germany, Sept. 2007. 
Virendra M., A. Krishnamurthy, K. Narayanan, 
S. Upadhyaya and K. Kwiat, “Environment-Aware 
Trusted Data Delivery in Multipath Wireless Protocols”, 
International Workshop on Mathematical Methods, Models and Architectures for 
Computer Networks Security (MMM-ACNS-2007), St. Petersburg, Russia, Sept. 
2007.
Duan Q., M. Virendra and S. 
Upadhyaya, “On the Hardness of Minimum Cost 
Blocking Attacks on Multi-path Wireless Routing Protocols”, 
IEEE International Conference on Communications (ICC 2007), Glasgow, 
UK.
Ha D., S. 
Upadhyaya, H.Q. Ngo, S. Pramanik, R. Chinchani and S. Mathew, “Insider 
Threat Analysis Using Information-Centric Modeling”, in P. Craiger and S. 
Shenoi,  Eds., Advances in Digital Forensics III, Springer, Boston, 2007.
Park I., R. 
Sharman, H.R. Rao and S. Upadhyaya, “Short 
Term and Total Life Impact Analysis of Email Worms in Computer Systems”, 
Decision Support Systems, 43 (2007) 827-841.
Chandrasekaran M., S. 
Vidyaraman and S. Upadhyaya, “SpyCon: Emulating User Activities to Detect 
Evasive Spyware”, 2nd International Swarm Intelligence & 
Other Forms of Malware Workshop (Malware'07), New Orleans, LA, April 
2007 (Best Paper Award).
Mathew S., R. Giomundo, S. Upadhyaya, M. Sudit and A. Stotz,
“Understanding Multistage Attacks 
by Attack-Track Based Visualization of Heterogeneous Event Streams”, ACM 
VizSec Workshop in conjunction with ACM CCS, Nov. 2006.
Garg A., V. Sankaranarayanan, S. Upadhyaya and K. Kwiat,
“USim: A User Behavior Simulation Framework for 
Training and Testing IDSes in GUI Based Systems”, 39th Annual Simulation 
Symposium, Huntsville, AL, April 2006.
Mathew S., D. Britt, R. Giomundo, S. Upadhyaya, M. Sudit and A. Stotz, 
"Real-time Multistage Attack Awareness Through Enhanced Intrusion Alert 
Clustering", SIMA 2005, in conjunction with MILCOM 2005, 
Atlantic City, NJ, October 2005. 
Upadhyaya S., K. Kwiat, R. Chinchani and K. Mantha, 
"Encapsulation of Owner's Intent -  A New Proactive Intrusion Assessment Paradigm", 
in Vipin Kumar, Jaideep Srivastava and Aleksandar Lazarevic, Eds., 
Managing Cyber Threats: Issues, Approaches and Challenges, Springer, pp. 221-245, 2005.
Upadhyaya, S., H.R. Rao and G. Padmanabhan, 
"Secure Knowledge Management", in David Swartz, Ed., 
Encyclopedia of Knowledge Management, IDEA Group, pp. 795-801, 2005. 
Chinchani R., A. Iyer, H. Ngo and S. Upadhyaya, "Towards a Theory of Insider 
Threat Assessment", IEEE International Conference on Dependable Systems 
and Networks (DSN 2005), Yokohama, Japan, June 2005.  
Chen R., R. Sharman, H. R. Rao and S. Upadhyaya, "Design Principles of 
Coordinated Multi-Incident Emergency Response Systems", IEEE Symposium on 
Intelligence and Security Informatics, Atlanta, GA, May 2005. 
Mathew S., C. Shah and S. Upadhyaya, 
"An Alert Fusion Framework for Situation Awareness of Multistage Coordinated Attacks", 
IEEE International Workshop on Information Assurance, Washington DC, March 2005. 
 
Lee J.K., S. Upadhyaya, H.R. Rao and R. Sharman, 
"Secure Knowledge Management and the Semantic Web",
Communications of the ACM, Special Section on Semantic E-Business Vision, 
Volume 48,  Issue 12, December 2005. 
Chinchani R., Duc Ha, Anusha Iyer, Hung Q. Ngo, and Shambhu Upadhyaya, 
"On the Hardness of Approximating the MIN-HACK Problem", Journal of 
Combinatorial Optimization, Springer, Vol. 9, No. 3, pp. 295-311, May 2005.
Virendra M., M. Jadliwala, M. Chandrasekaran and S. Upadhyaya, 
"Quantifying Trust in Mobile Ad-Hoc Networks", IEEE International Conference 
on Integration of Knowledge Intensive Multi-Agent Systems (KIMAS 2005), 
Boston, MA, April 2005. 
Goldberg S., S. Upadhyaya and W.K. Fuchs, 
"Recovery Schemes for Mesh Arrays Utilizing Dedicated Spares", IEEE Transactions on 
Reliability, Vol. 53, No. 4, pp. 445-451, Dec. 2004.
Chinchani R., A. Muthukrishnan, M. Chandrasekaran and S. Upadhyaya, 
"RACOON: Rapidly Generating User Command Data for Anomaly Detection from 
Customizable Templates", 
20th Annual Computer Security Applications Conference, Tucson, AZ, December 6-10, 2004. 
Pramanik S., V. Sankarnarayanan and S. Upadhyaya, 
"Security Policies to Mitigate Insider Threat in the Document Control Domain", 
20th Annual Computer Security Applications Conference, Tucson, AZ, December, 2004.
Virendra M. and S. Upadhyaya, 
"SWAN: A Secure Wireless LAN Architecture" 29th IEEE Conference on Local 
Computer Networks, Tampa, FL, November 2004.
Chinchani R., A. Iyer, B. Jayaraman and S. Upadhyaya, 
"ARCHERR: Architecture Driven Program Safety", 9th European Symposium on Research in 
Computer Security (ESORICS 2004), Institut Eurcom, Sophia Antipolis, 
French Riviera, France, September 2004. 
Gummadidala R., C. Qiao and S. Upadhyaya, 
"WDP: A Wormhole Discovery Protocol for Mobile Ad Hoc Networks", 
International Workshop on Mobile and Wireless Ad Hoc Networking, Las Vegas, NV, June 2004.
Pramanik S. and S. Upadhyaya, "RABIT: A New Framework for Runtime Emulation 
and Binary Translation", 37th IEEE Annual Simulation Symp., Washington DC, Apr. '04.
Zhao D. and S. Upadhyaya, 
"A Generic Resource Distribution and Test Scheduling Scheme for Embedded Core-Based SoCs", 
IEEE Transactions on Instrumentation and Measurement, Vol. 53, No. 2, pp. 318-329, April 2004.
Zhao, D., Upadhyaya, S. and Margala, M., "Control constrained resource partitioning for complex SoCs", 
Proceedings, 18th IEEE International Symposium on Defect and 
Fault Tolerance in VLSI Systems, November 2003, pages 425-432. 
Chinchani, R., A. 
Iyer, B. Jayaraman and S. Upadhyaya, "Insecure 
Programming: How Culpable is a Language's Syntax?", IAW 2003: 158-163.
Zhao, D., Upadhyaya, S. and Margala, M., 
"A New Distributed Test Control Architecture with Multihop
Wireless Test Connectivity and Communication for 
GigaHertz Systems-on-Chip", 
12th IEEE North Atlantic Test Workshop, Montauk, NY, May 2003. 
Zarrineh K., S.J. Upadhyaya and S. Chakravarty,
"Automatic Generation and Compaction of March Tests for
Memory Arrays", IEEE Transactions on VLSI Systems,
Vol. 9, No. 6, December 2001, pp. 845-857.
Zarrineh K., S. Upadhyaya and V. Chickermane, "System-on-Chip Testability Using LSSD Scan Structures", 
IEEE Design and Test of Computers, Vol. 18, No. 3, May-June 2001, 
pp. 83-97. 
Ramamurthy B., S.J. Upadhyaya and B. Bhargava, 
"Design and analysis of an integrated checkpointing and recovery scheme 
for distributed applications", IEEE Transactions on Knowledge 
and Data Engineering, Vol. 12, No. 2, pp. 174-186, March/April 2000.
Tien T.C. and S. Upadhyaya, "A local/global strategy based on signal strength for message routing 
in wireless mobile ad hoc networks",  
IEEE Academic Industry Working Conference on Research Challenges, 
Buffalo, NY, April 2000 (Best Student
Paper Award) (also to appear in Mobile Computing: Implementing Pervasive
Information and Communications Technologies, editors: S. Upadhyaya, K. 
Kwiat, A. Chaudhuri and M. Weiser, Kluwer Academic Publishers 
Book Series on Interfaces in Operations Research and Computer Science,
December 2001.  
Zarrineh, K., S.J. Upadhyaya and S. Chakravarty,
"A new framework for generation of optimal march tests for memory
arrays", IEEE International Test Conference, Washington DC.,
pp. 73-82, October 1998.
 
Goldberg S. and S.J. Upadhyaya, 
"Implementing degradable processing 
arrays", IEEE Micro, Vol. 18, No. 1, Jan/Feb, 1998, pp. 64-74.
 
Nachman L., K.K. Saluja, S.J. Upadhyaya and Robert Reuse,
"A novel approach to random pattern testing of sequential circuits",
IEEE Transactions on Computers, Special Issue on Dependability of 
Computing Systems, Vol. 47, No. 1, Jan. 1998, pp. 129-134.
 
Upadhyaya S.J.,
"Noise Generators", An invited article in 
 
Encyclopedia of Electrical and Electronics Engineering, John Wiley and Sons Inc., John 
Webster, Editor, Vol. 14, pp. 384-392, 1999.
 
Chen Y.Y., S.J. Upadhyaya and C.W. Cheng,
"A comprehensive reconfiguration scheme for fault-tolerant VLSI/WSI array 
processors", IEEE Transactions on Computers, Vol. 46, No. 12, Dec. 1997,
pp. 1363-1370. 
Ramamurthy B., S.J. Upadhyaya and R.K. Iyer,
"An object-oriented testbed for the evaluation of checkpointing
and recovery systems", IEEE Int. Symposium on Fault Tolerant Computing, Seattle, WA,
pp. 194-203, June 1997.
 
Spina R. and S.J. Upadhyaya,
"Linear circuit fault diagnosis using neuromorphic analyzers", 
IEEE Trans. on Circuits and Systems -II, Vol. 43, No. 3, March 1997,  
pp. 188-196. 
 
Upadhyaya S.J. and I.S. Hwang,
"Design of a multi-level fault-tolerant mesh (MFTM) for
high reliability applications", International Journal of Reliability, 
Quality, and Safety Engineering, Vol. 2, No. 4, December 1995, pp. 419-429.
 
Kumar A. and S.J. Upadhyaya,
"Function based candidate discrimination in model
based diagnosis", Journal of Applied Artificial Intelligence,
Vol. 9, No. 1, pp. 65-80, Jan. 1995.
 
Chen Y.Y. and S.J. Upadhyaya,
"A new approach to modeling the performance of a class of fault tolerant
VLSI/WSI systems based on multiple-level redundancy",
IEEE Transactions on Computers, Vol. 43, No. 6, pp. 737-748, June 1994.
 
Upadhyaya S.J. and B. Ramamurthy,
"Concurrent process monitoring with no reference signatures",
IEEE Transactions on Computers, Vol. 43, No. 4, pp. 475-480, Apr. 1994.
 
  |