-
Duan Q., M. Virendra, S. Upadhyaya and A. Sanzgiri, “Minimum Cost Blocking
Problem in Multi-path Wireless Routing Protocols”,
IEEE Transactions on Computers,
February 2013 (accepted). -
Sanzgiri A., A. Hughes, S. Upadhyaya, “Analysis
of Malware Propagation in Twitter”,
32nd IEEE International
Symposium on Reliable Distributed Systems, Braga, Portugal, October
2013. -
Valecha R., H.R. Rao, R. Sharman and S. Upadhyaya, “A
Dispatch-Mediated Communication Model for Emergency Response Systems,”
IEEE Transactions on Management Information Systems, Vol. 4, No. 1,
pp. 1-25, April 2013. -
Sanzgiri A., A. Nandugudi, S. Upadhyaya and C. Qiao, “SESAME:
Smartphone Enabled Secure Access to Multiple Entities”,
International Conference on Computing,
Networking and Communications, Internet Services and Applications, San
Diego, CA, January 2013. -
Nagarajaiah H., S. Upadhyaya and V. Gopal, “Data
De-duplication and Event Processing for Security Applications on an Embedded
Processor”, 5th International Workshop on Dependable Network
Computing and Mobile Systems (DNCMS 2012), in conjunction with IEEE
SRDS 2012, Irvine, CA, October 2012. -
Joyce J., A. Sanzgiri and S. Upadhyaya, “The
Early (tweet-ing) Bird Spreads the Worm: An Assessment of Twitter for Malware
Propagation”, 9th
International Conference on Mobile Web Information Systems (MobiWIS),
Niagara Falls, Ontario, Canada, August 2012. -
Mehresh R. and S. Upadhyaya, “A
Deception Framework for Survivability Against Next Generation Cyber Attacks”,
International Conference on Security and Management (SAM'12), Las
Vegas, NV, July 2012. -
Keshavamurthy V., S. Upadhyaya and V. Gopal, “Accelerated Processing of
Secure Email by Exploiting Built-in Security Features on the Intel® EP80579
Integrated Processor with Intel® QuickAssist Technology”,
4th International Workshop on
Dependable Network Computing and Mobile Systems (DNCMS 2011), in
conjunction with IEEE SRDS 2011, Madrid, Spain, October 2011. -
Salerno S., A. Sanzgiri and S. Upadhyaya, “Exploration
of Attacks on Current Generation Smartphones”,
8th International Conference on Mobile Web Information
Systems (MobiWIS), Niagara Falls, ON, Canada, September 2011. -
Mehresh R., S. Upadhyaya and K. Kwiat, “Secure
Proactive Recovery – a Hardware Based Mission Assurance Scheme”, Journal of
Network Forensics, Springer, Vol. 3, Issue 2, Spring 2011, pp. 32-48.
-
Mehresh R., J. Rao, S. Upadhyaya, S. Natarajan and
K. Kwiat, “Tamper-resistant Monitoring for Securing Multi-core Environments,
International Conference on Security and Management (SAM), Las
Vegas, NV, July 2011. -
Sankaranarayanan V., S. Upadhyaya and K.
Kwiat, “Inferring QoS Loss in
Disadvantaged Networks: A Game Theoretic Approach”, Journal of Autonomic
and Trusted Computing (JoATC), 2012 (accepted). -
Mathew S., S. Upadhyaya, M. Sudit and A. Stotz,
“Situation Awareness of Multistage Cyber Attacks by Semantic Event Fusion”,
IEEE MILCOM 2010, October 2010. -
Mathew S., M. Petropoulos, H.Q. Ngo and S.
Upadhyaya, “A Data-Centric Approach to Insider Attack Detection in Database
Systems”, 13th International Symposium on Recent Advances in Intrusion
Detection, Ottawa, Canada, September 2010. -
Gilbert B., R. Sharman, M. Gupta, H.R. Rao, S.
Upadhyaya and K. Mortensen, “Content-sensitive,
Temporally Adaptive Metadata”, 11th Annual New York State Cyber Security
Conference, Albany, NY, June 2008, pp. 47-52 (Best Paper Award). -
Zhong S., M. Jadliwala, S.
Upadhyaya and C. Qiao, "Towards
a Theory of Robust Localization against Malicious Beacon Nodes", 27th
IEEE International Conference on Computer Communications (INFOCOM 2008),
Phoenix, AZ, April 2008. -
Jadliwala M., S. Upadhyaya
and M. Taneja, “ASFALT: A Simple Fault-Tolerant Signature-based Localization
Technique for Emergency Sensor Networks”, IEEE Symposium on
Reliable Distributed Systems (SRDS 2007), Beijing, China, October 2007.
-
Jadliwala M., Qi Duan, Jinhui Xu and Shambhu Upadhyaya.
“On Extracting Consistent Graphs in
Wireless Sensor Networks”, International Journal of Sensor Networks (IJSNET):
Special Issue on Theoretical and Algorithmic Aspects in Sensor Networks, Vol. 2,
Nos 3/4, pp. 149-162, 2007. -
Sankaranarayanan V., M.
Chandrasekaran and S. Upadhyaya, “Towards Modeling Trust Based Decisions: A Game
Theoretic Approach”, 12th European Symposium on Research in
Computer Security (ESORICS 2007), Dresden, Germany, Sept. 2007.
-
Virendra M., A. Krishnamurthy, K. Narayanan,
S. Upadhyaya and K. Kwiat, “Environment-Aware
Trusted Data Delivery in Multipath Wireless Protocols”,
International Workshop on Mathematical Methods, Models and Architectures for
Computer Networks Security (MMM-ACNS-2007), St. Petersburg, Russia, Sept.
2007. -
Duan Q., M. Virendra and S.
Upadhyaya, “On the Hardness of Minimum Cost
Blocking Attacks on Multi-path Wireless Routing Protocols”,
IEEE International Conference on Communications (ICC 2007), Glasgow,
UK. -
Ha D., S.
Upadhyaya, H.Q. Ngo, S. Pramanik, R. Chinchani and S. Mathew, “Insider
Threat Analysis Using Information-Centric Modeling”, in P. Craiger and S.
Shenoi, Eds., Advances in Digital Forensics III, Springer, Boston, 2007. -
Park I., R.
Sharman, H.R. Rao and S. Upadhyaya, “Short
Term and Total Life Impact Analysis of Email Worms in Computer Systems”,
Decision Support Systems, 43 (2007) 827-841.
-
Chandrasekaran M., S.
Vidyaraman and S. Upadhyaya, “SpyCon: Emulating User Activities to Detect
Evasive Spyware”, 2nd International Swarm Intelligence &
Other Forms of Malware Workshop (Malware'07), New Orleans, LA, April
2007 (Best Paper Award). -
Mathew S., R. Giomundo, S. Upadhyaya, M. Sudit and A. Stotz,
“Understanding Multistage Attacks
by Attack-Track Based Visualization of Heterogeneous Event Streams”, ACM
VizSec Workshop in conjunction with ACM CCS, Nov. 2006. -
Garg A., V. Sankaranarayanan, S. Upadhyaya and K. Kwiat,
“USim: A User Behavior Simulation Framework for
Training and Testing IDSes in GUI Based Systems”, 39th Annual Simulation
Symposium, Huntsville, AL, April 2006. -
Mathew S., D. Britt, R. Giomundo, S. Upadhyaya, M. Sudit and A. Stotz,
"Real-time Multistage Attack Awareness Through Enhanced Intrusion Alert
Clustering", SIMA 2005, in conjunction with MILCOM 2005,
Atlantic City, NJ, October 2005.
-
Upadhyaya S., K. Kwiat, R. Chinchani and K. Mantha,
"Encapsulation of Owner's Intent - A New Proactive Intrusion Assessment Paradigm",
in Vipin Kumar, Jaideep Srivastava and Aleksandar Lazarevic, Eds.,
Managing Cyber Threats: Issues, Approaches and Challenges, Springer, pp. 221-245, 2005.
-
Upadhyaya, S., H.R. Rao and G. Padmanabhan,
"Secure Knowledge Management", in David Swartz, Ed.,
Encyclopedia of Knowledge Management, IDEA Group, pp. 795-801, 2005.
-
Chinchani R., A. Iyer, H. Ngo and S. Upadhyaya, "Towards a Theory of Insider
Threat Assessment", IEEE International Conference on Dependable Systems
and Networks (DSN 2005), Yokohama, Japan, June 2005.
-
Chen R., R. Sharman, H. R. Rao and S. Upadhyaya, "Design Principles of
Coordinated Multi-Incident Emergency Response Systems", IEEE Symposium on
Intelligence and Security Informatics, Atlanta, GA, May 2005.
-
Mathew S., C. Shah and S. Upadhyaya,
"An Alert Fusion Framework for Situation Awareness of Multistage Coordinated Attacks",
IEEE International Workshop on Information Assurance, Washington DC, March 2005.
-
Lee J.K., S. Upadhyaya, H.R. Rao and R. Sharman,
"Secure Knowledge Management and the Semantic Web",
Communications of the ACM, Special Section on Semantic E-Business Vision,
Volume 48, Issue 12, December 2005.
-
Chinchani R., Duc Ha, Anusha Iyer, Hung Q. Ngo, and Shambhu Upadhyaya,
"On the Hardness of Approximating the MIN-HACK Problem", Journal of
Combinatorial Optimization, Springer, Vol. 9, No. 3, pp. 295-311, May 2005.
-
Virendra M., M. Jadliwala, M. Chandrasekaran and S. Upadhyaya,
"Quantifying Trust in Mobile Ad-Hoc Networks", IEEE International Conference
on Integration of Knowledge Intensive Multi-Agent Systems (KIMAS 2005),
Boston, MA, April 2005.
-
Goldberg S., S. Upadhyaya and W.K. Fuchs,
"Recovery Schemes for Mesh Arrays Utilizing Dedicated Spares", IEEE Transactions on
Reliability, Vol. 53, No. 4, pp. 445-451, Dec. 2004.
-
Chinchani R., A. Muthukrishnan, M. Chandrasekaran and S. Upadhyaya,
"RACOON: Rapidly Generating User Command Data for Anomaly Detection from
Customizable Templates",
20th Annual Computer Security Applications Conference, Tucson, AZ, December 6-10, 2004.
-
Pramanik S., V. Sankarnarayanan and S. Upadhyaya,
"Security Policies to Mitigate Insider Threat in the Document Control Domain",
20th Annual Computer Security Applications Conference, Tucson, AZ, December, 2004.
-
Virendra M. and S. Upadhyaya,
"SWAN: A Secure Wireless LAN Architecture" 29th IEEE Conference on Local
Computer Networks, Tampa, FL, November 2004.
-
Chinchani R., A. Iyer, B. Jayaraman and S. Upadhyaya,
"ARCHERR: Architecture Driven Program Safety", 9th European Symposium on Research in
Computer Security (ESORICS 2004), Institut Eurcom, Sophia Antipolis,
French Riviera, France, September 2004.
-
Gummadidala R., C. Qiao and S. Upadhyaya,
"WDP: A Wormhole Discovery Protocol for Mobile Ad Hoc Networks",
International Workshop on Mobile and Wireless Ad Hoc Networking, Las Vegas, NV, June 2004.
-
Pramanik S. and S. Upadhyaya, "RABIT: A New Framework for Runtime Emulation
and Binary Translation", 37th IEEE Annual Simulation Symp., Washington DC, Apr. '04.
-
Zhao D. and S. Upadhyaya,
"A Generic Resource Distribution and Test Scheduling Scheme for Embedded Core-Based SoCs",
IEEE Transactions on Instrumentation and Measurement, Vol. 53, No. 2, pp. 318-329, April 2004.
-
Zhao, D., Upadhyaya, S. and Margala, M., "Control constrained resource partitioning for complex SoCs",
Proceedings, 18th IEEE International Symposium on Defect and
Fault Tolerance in VLSI Systems, November 2003, pages 425-432.
-
Chinchani, R., A.
Iyer, B. Jayaraman and S. Upadhyaya, "Insecure
Programming: How Culpable is a Language's Syntax?", IAW 2003: 158-163. -
Zhao, D., Upadhyaya, S. and Margala, M.,
"A New Distributed Test Control Architecture with Multihop
Wireless Test Connectivity and Communication for
GigaHertz Systems-on-Chip",
12th IEEE North Atlantic Test Workshop, Montauk, NY, May 2003.
-
Zarrineh K., S.J. Upadhyaya and S. Chakravarty,
"Automatic Generation and Compaction of March Tests for
Memory Arrays", IEEE Transactions on VLSI Systems,
Vol. 9, No. 6, December 2001, pp. 845-857.
-
Zarrineh K., S. Upadhyaya and V. Chickermane, "System-on-Chip Testability Using LSSD Scan Structures",
IEEE Design and Test of Computers, Vol. 18, No. 3, May-June 2001,
pp. 83-97.
-
Ramamurthy B., S.J. Upadhyaya and B. Bhargava,
"Design and analysis of an integrated checkpointing and recovery scheme
for distributed applications", IEEE Transactions on Knowledge
and Data Engineering, Vol. 12, No. 2, pp. 174-186, March/April 2000.
-
Tien T.C. and S. Upadhyaya, "A local/global strategy based on signal strength for message routing
in wireless mobile ad hoc networks",
IEEE Academic Industry Working Conference on Research Challenges,
Buffalo, NY, April 2000 (Best Student
Paper Award) (also to appear in Mobile Computing: Implementing Pervasive
Information and Communications Technologies, editors: S. Upadhyaya, K.
Kwiat, A. Chaudhuri and M. Weiser, Kluwer Academic Publishers
Book Series on Interfaces in Operations Research and Computer Science,
December 2001.
-
Zarrineh, K., S.J. Upadhyaya and S. Chakravarty,
"A new framework for generation of optimal march tests for memory
arrays", IEEE International Test Conference, Washington DC.,
pp. 73-82, October 1998.
-
Goldberg S. and S.J. Upadhyaya,
"Implementing degradable processing
arrays", IEEE Micro, Vol. 18, No. 1, Jan/Feb, 1998, pp. 64-74.
-
Nachman L., K.K. Saluja, S.J. Upadhyaya and Robert Reuse,
"A novel approach to random pattern testing of sequential circuits",
IEEE Transactions on Computers, Special Issue on Dependability of
Computing Systems, Vol. 47, No. 1, Jan. 1998, pp. 129-134.
-
Upadhyaya S.J.,
"Noise Generators", An invited article in
Encyclopedia of Electrical and Electronics Engineering, John Wiley and Sons Inc., John
Webster, Editor, Vol. 14, pp. 384-392, 1999.
-
Chen Y.Y., S.J. Upadhyaya and C.W. Cheng,
"A comprehensive reconfiguration scheme for fault-tolerant VLSI/WSI array
processors", IEEE Transactions on Computers, Vol. 46, No. 12, Dec. 1997,
pp. 1363-1370.
-
Ramamurthy B., S.J. Upadhyaya and R.K. Iyer,
"An object-oriented testbed for the evaluation of checkpointing
and recovery systems", IEEE Int. Symposium on Fault Tolerant Computing, Seattle, WA,
pp. 194-203, June 1997.
-
Spina R. and S.J. Upadhyaya,
"Linear circuit fault diagnosis using neuromorphic analyzers",
IEEE Trans. on Circuits and Systems -II, Vol. 43, No. 3, March 1997,
pp. 188-196.
-
Upadhyaya S.J. and I.S. Hwang,
"Design of a multi-level fault-tolerant mesh (MFTM) for
high reliability applications", International Journal of Reliability,
Quality, and Safety Engineering, Vol. 2, No. 4, December 1995, pp. 419-429.
-
Kumar A. and S.J. Upadhyaya,
"Function based candidate discrimination in model
based diagnosis", Journal of Applied Artificial Intelligence,
Vol. 9, No. 1, pp. 65-80, Jan. 1995.
-
Chen Y.Y. and S.J. Upadhyaya,
"A new approach to modeling the performance of a class of fault tolerant
VLSI/WSI systems based on multiple-level redundancy",
IEEE Transactions on Computers, Vol. 43, No. 6, pp. 737-748, June 1994.
-
Upadhyaya S.J. and B. Ramamurthy,
"Concurrent process monitoring with no reference signatures",
IEEE Transactions on Computers, Vol. 43, No. 4, pp. 475-480, Apr. 1994.
|