Sanjay Goel

Orcid: 0000-0002-7164-8395

According to our database1, Sanjay Goel authored at least 74 papers between 1997 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
The Impact of Cognitive Load on Responses to Security Alerts.
Proceedings of the 30th Americas Conference on Information Systems: Elevating Life through Digital Social Entrepreneurship, 2024

The Impact of Cognitive Load on Belief in Fake News and Real News.
Proceedings of the 30th Americas Conference on Information Systems: Elevating Life through Digital Social Entrepreneurship, 2024

Operationalizing AI Auditability Measures: An AI Audit Case Study of College Admissions System.
Proceedings of the 30th Americas Conference on Information Systems: Elevating Life through Digital Social Entrepreneurship, 2024

2023
An Investigation of the Factors that Influence Job Performance During Extreme Events: The Role of Information Security Policies.
Inf. Syst. Frontiers, 2023

2022
<i>In silico</i> comparative analysis of <i>KRAS</i> mutations at codons 12 and 13: Structural modifications of P-Loop, switch I&II regions preventing GTP hydrolysis.
Comput. Biol. Medicine, 2022

Are External Auditors Capable of Dealing with Cybersecurity Risks?
Proceedings of the Digital Forensics and Cyber Crime - 13th EAI International Conference, 2022

Deepfake Audio Detection.
Proceedings of the 28th Americas Conference on Information Systems, 2022

2021
Attribution Across Cyber Attack Types: Network Intrusions and Information Operations.
IEEE Open J. Commun. Soc., 2021

Can financial incentives help with the struggle for security policy compliance?
Inf. Manag., 2021

Disambiguating Between Privacy and Security in the Context of Health Care: New Insights on the Determinants of Health Technologies Use.
Cyberpsychology Behav. Soc. Netw., 2021

2020
A Cross Industry Study of Institutional Pressures on Organizational Effort to Raise Information Security Awareness.
Inf. Syst. Frontiers, 2020

Continuous Conflict Prediction during Collaborative Software Development: A step-before Continuous Integration.
Proceedings of the ICSIM '20: The 3rd International Conference on Software Engineering and Information Management, 2020

Understanding the Role of Incentives in Security Behavior.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

Is Privacy Really a Paradox? Laying the Groundwork to Study the Gap between Privacy Valuation and Behavior.
Proceedings of the 26th Americas Conference on Information Systems, 2020

2019
Infusing Software Quality Concepts in Computer Science Engineering Courses.
Proceedings of the 2019 Twelfth International Conference on Contemporary Computing, 2019

2018
Supporting E-Mentoring for Programming Labs in Engineering Education.
Proceedings of the 2018 Eleventh International Conference on Contemporary Computing, 2018

Are we Predisposed to Behave Securely? Influence of Risk Disposition on Individual Security Behaviours.
Proceedings of the 26th European Conference on Information Systems: Beyond Digitization, 2018

2017
Supporting collaborative software development over GitHub.
Softw. Pract. Exp., 2017

Shared Benefits and Information Privacy: What Determines Smart Meter Technology Adoption?
J. Assoc. Inf. Syst., 2017

Got Phished? Internet Security and Human Vulnerability.
J. Assoc. Inf. Syst., 2017

Self-Organization in Traffic Lights: Evolution of Signal Control with Advances in Sensors and Communications.
CoRR, 2017

Discovering energy communities for microgrids on the power grid.
Proceedings of the 2017 IEEE International Conference on Smart Grid Communications, 2017

Supporting collaborative software development in academic learning environment: A collaborative pair and quadruple programming based approach.
Proceedings of the Tenth International Conference on Contemporary Computing, 2017

Can Privacy and Security Be Friends? A Cultural Framework to Differentiate Security and Privacy Behaviors on Online Social Networks.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

Using Active Probes to Detect Insiders Before They Steal Data.
Proceedings of the 23rd Americas Conference on Information Systems, 2017

Understanding Nuances of Privacy and Security in the Context of Information Systems.
Proceedings of the 23rd Americas Conference on Information Systems, 2017

2016
Special Issue on Connected Vehicles [Guest Editorial].
IEEE Intell. Transp. Syst. Mag., 2016

The Security Expertise Assessment Measure (SEAM): Developing a scale for hacker expertise.
Comput. Secur., 2016

Using dependency graphs to support collaboration over GitHub: The Neo4j graph database approach.
Proceedings of the Ninth International Conference on Contemporary Computing, 2016

Priming Security Behavior: A Study Based on Self-Concept Maintenance Theory.
Proceedings of the 22nd Americas Conference on Information Systems, 2016

An SEC 10-K XML Schema Extension to Extract Cyber Security Risks.
Proceedings of the 22nd Americas Conference on Information Systems, 2016

2015
Cyber War Games: Strategic Jostling Among Traditional Adversaries.
Proceedings of the Cyber Warfare - Building the Scientific Foundation, 2015

Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility.
IEEE Trans. Dependable Secur. Comput., 2015

Emerging Research in Connected Vehicles [Guest Editorial].
IEEE Intell. Transp. Syst. Mag., 2015

Anonymity vs. Security: The Right Balance for the Smart Grid.
Commun. Assoc. Inf. Syst., 2015

Privacy preserving driving style recognition.
Proceedings of the International Conference on Connected Vehicles and Expo, 2015

Collaborative teaching in large classes of computer science courses.
Proceedings of the Eighth International Conference on Contemporary Computing, 2015

Investigating syntactic and semantic inconsistencies in Collaborative Software Development.
Proceedings of the Eighth International Conference on Contemporary Computing, 2015

2014
The Impact of Federal and State Notification Laws on Security Breach Announcements.
Commun. Assoc. Inf. Syst., 2014

Enabling a self-organized traffic system in existing legacy hardware.
Proceedings of the International Conference on Connected Vehicles and Expo, 2014

Self-organization of traffic lights for minimizing vehicle delay.
Proceedings of the International Conference on Connected Vehicles and Expo, 2014

PoGest: A vision based tool for facilitating Kathak learning.
Proceedings of the Seventh International Conference on Contemporary Computing, 2014

LectureKhoj: Automatic tagging and semantic segmentation of online lecture videos.
Proceedings of the Seventh International Conference on Contemporary Computing, 2014

CoSDEES: A framework for developing CSD environments for educational settings.
Proceedings of the Seventh International Conference on Contemporary Computing, 2014

2013
Persistence Length as a Metric for Modeling and Simulation of Nanoscale Communication Networks.
IEEE J. Sel. Areas Commun., 2013

An empirical evaluation of wavelets based viz-a-viz classical state-of-art to image denoising.
Proceedings of the Sixth International Conference on Contemporary Computing, 2013

2012
Collaboration in software development: a spotlight.
Proceedings of the CUBE International IT Conference & Exhibition, 2012

Learning to Write Programs with Others: Collaborative Quadruple Programming.
Proceedings of the 25th IEEE Conference on Software Engineering Education and Training, 2012

2011
Cyberwarfare: connecting the dots in cyber intelligence.
Commun. ACM, 2011

2010
Metrics for characterizing the form of security policies.
J. Strateg. Inf. Syst., 2010

A Novel Approach for Collaborative Pair Programming.
J. Inf. Technol. Educ., 2010

Quantification, Optimization and Uncertainty Modeling in Information Security Risks: A Matrix-Based Approach.
Inf. Resour. Manag. J., 2010

2009
Resilience Metrics for Service-Oriented Networks: A Service Allocation Approach.
IEEE Trans. Serv. Comput., 2009

Estimating the market impact of security breach announcements on firm values.
Inf. Manag., 2009

The Impact of Persistence Length on the Communication Efficiency of Microtubules and CNTs.
Proceedings of the Nano-Net - 4th International ICST Conference, 2009

Vehicle License Plate Identification and Recognition.
Proceedings of the 2009 International Conference on Image Processing, 2009

Enriching the Culture of Software Engineering Education through Theories of Knowledge and Learning.
Proceedings of the Proceedings 22nd Conference on Software Engineering Education and Training, 2009

Software Engineering Approach for Teaching Development of Scalable Enterprise Applications.
Proceedings of the Proceedings 22nd Conference on Software Engineering Education and Training, 2009

2008
Mapping Engineering Design Processes onto a Service-grid: Turbine Design Optimization.
Concurr. Eng. Res. Appl., 2008

Towards Real-Time Monocular Video-Based Avatar Animation.
Proceedings of the Advances in Visual Computing, 4th International Symposium, 2008

Content Based Retrieval System for Archaeological Images.
Proceedings of the 2008 International Conference on Image Processing, 2008

2007
On decision support for distributed systems protection: A perspective based on the human immune response system and epidemiology.
Int. J. Inf. Manag., 2007

Service-based P2P overlay network for collaborative problem solving.
Decis. Support Syst., 2007

2006
Competency Focused Engineering Education with Reference to IT Related Disciplines: Is the Indian System Ready for Transformation?
J. Inf. Technol. Educ., 2006

Innovative model for information assurance curriculum: A teaching hospital.
ACM J. Educ. Resour. Comput., 2006

Graph Spectra of Carbon Nanotube Networks.
Proceedings of the 1st International ICST Conference on Nano-Networks, 2006

2005
An active model-based prototype for predictive network management.
IEEE J. Sel. Areas Commun., 2005

Guest Editors' Introduction.
Inf. Syst. Frontiers, 2005

Structure-Based Resilience Metrics for Service-Oriented Networks.
Proceedings of the Dependable Computing, 2005

2004
Biological Models of Security for Virus Propagation in Computer Networks.
login Usenix Mag., 2004

A Resilient Network that Can Operate Under Duress: To Support Communication between Government Agencies during Crisis Situations.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

2003
Kolmogorov complexity estimates for detection of viruses in biologically inspired security systems: A comparison with traditional approaches.
Complex., 2003

Model for Trust Among Peers in Electronic Multiparty Transactions.
Proceedings of the 9th Americas Conference on Information Systems, 2003

1997
Multimedia Systems for Art and Culture: A Case Study of Brihadisvara Temple.
Proceedings of the Storage and Retrieval for Image and Video Databases V, 1997


  Loading...