Shambhu J. Upadhyaya
Orcid: 0000-0002-0596-1703Affiliations:
- State University of New York at Buffalo, Department of Computer Science and Engineering
According to our database1,
Shambhu J. Upadhyaya
authored at least 194 papers
between 1986 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Economic Incentives and Perceptions as Critical Factors for Understanding Insider Hacking Behavior.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024
2023
Apt Detection of Ransomware - An Approach to Detect Advanced Persistent Threats Using System Call Information.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
2022
A Game Theoretic Approach to the Design of Mitigation Strategies for Generic Ransomware.
Proceedings of the Information Systems Security and Privacy, 2022
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022
2021
ACM Trans. Manag. Inf. Syst., 2021
An Activity Theory Approach to Leak Detection and Mitigation in Patient Health Information (PHI).
J. Assoc. Inf. Syst., 2021
Inf. Syst. Frontiers, 2021
Inf. Syst. Frontiers, 2021
2020
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020
2019
IEEE Trans. Educ., 2019
J. Assoc. Inf. Syst., 2019
Proceedings of the Secure Knowledge Management In Artificial Intelligence Era, 2019
2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018
Proceedings of the Designing for a Digital and Globalized World, 2018
2017
Proceedings of the 2017 IEEE Workshop on Information Forensics and Security, 2017
Proceedings of the IEEE International Conference on Identity, 2017
Proceedings of the IEEE International Conference on Identity, 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Proceedings of the 3rd ACM on International Workshop on Security And Privacy Analytics, 2017
Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30, 2017
2016
Guest Editorial: Introduction to the Special Issue on Emerging Security Trends for Deeply-Embedded Computing Systems.
IEEE Trans. Emerg. Top. Comput., 2016
Online shopping intention in the context of data breach in online retail stores: An examination of older and younger adults.
Decis. Support Syst., 2016
Proceedings of the 25th International Conference on World Wide Web, 2016
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016
Proceedings of the IEEE 83rd Vehicular Technology Conference, 2016
Proceedings of the 2016 International Conference on Computing, 2016
Proceedings of the Decision and Game Theory for Security - 7th International Conference, 2016
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
Proceedings of the 8th IEEE International Conference on Biometrics Theory, 2016
Proceedings of the 8th IEEE International Conference on Biometrics Theory, 2016
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
2015
Secur. Informatics, 2015
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2015
Inf. Syst. Frontiers, 2015
Surviving advanced persistent threats in a distributed environment - Architecture and analysis.
Inf. Syst. Frontiers, 2015
Inf. Syst. Frontiers, 2015
Proceedings of the 34th IEEE Military Communications Conference, 2015
Investigating the Antecedents of Healthcare Workers' Perceptions of Organizational Resilience in Hospitals.
Proceedings of the International Conference on Information Systems, 2015
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, 2015
2014
IEEE Trans. Computers, 2014
Factors influencing online health information search: An empirical analysis of a national cancer-related survey.
Decis. Support Syst., 2014
An Activity Theory Approach to Specification of Access Control Policies in Transitive Health Workflows.
Proceedings of the International Conference on Information Systems, 2014
2013
ACM Trans. Manag. Inf. Syst., 2013
MIS Q., 2013
Proceedings of the IEEE 32nd Symposium on Reliable Distributed Systems, 2013
Proceedings of the International Conference on Computing, Networking and Communications, 2013
Proceedings of the 19th Americas Conference on Information Systems, 2013
2012
The Early (tweet-ing) Bird Spreads the Worm: An Assessment of Twitter for Malware Propagation.
Proceedings of the 3rd International Conference on Ambient Systems, 2012
Assessing roles of people, technology and structure in emergency management systems: a public sector perspective.
Behav. Inf. Technol., 2012
Data De-duplication and Event Processing for Security Applications on an Embedded Processor.
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012
Emergency Response System Design: An Examination of Emergency Communication Messages.
Proceedings of the Design Science Research in Information Systems. Advances in Theory and Practice, 2012
Design Principles for Emergency Collaborative Systems: A Situation Awareness Study of Buffalo Plane Crash.
Proceedings of the 18th Americas Conference on Information Systems, 2012
2011
Proceedings of the Encyclopedia of Knowledge Management, Second Edition, 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the 2nd International Conference on Ambient Systems, 2011
Accelerated Processing of Secure Email by Exploiting Built-in Security Features on the Intel EP80579 Integrated Processor with Intel QuickAssist Technology.
Proceedings of the 30th IEEE Symposium on Reliable Distributed Systems Workshops, 2011
Proceedings of the 16th annual conference reports on Innovation and technology in computer science education, 2011
Detecting Cheating Aggregators and Report Dropping Attacks in Wireless Sensor Networks.
Proceedings of the Cyber Security, Cyber Crime and Cyber Forensics, 2011
2010
IEEE Trans. Mob. Comput., 2010
Security protection design for deception and real system regimes: A model and analysis.
Eur. J. Oper. Res., 2010
An Empirical Examination of IT-Enabled Emergency Response: The Cases of Hurricane Katrina and Hurricane Rita.
Commun. Assoc. Inf. Syst., 2010
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010
Proceedings of the Computer Network Security, 2010
Proceedings of the 7th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2010
Protecting senior citizens from cyber security attacks in the e-health scenario: an international perspective.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010
2009
Proceedings of the Second ACM Conference on Wireless Network Security, 2009
On the Two Factors Affecting Information Systems Success in the Extreme Event Context.
Proceedings of the Exploring the Grand Challenges for Next Generation E-Business, 2009
An exploration of unintended online private information disclosure in educational institutions across four countries.
Proceedings of the 2009 eCrime Researchers Summit, 2009
2008
Emergency Response Information System Interoperability: Development of Chemical Incident Response Data Model.
J. Assoc. Inf. Syst., 2008
Design Considerations for High Performance RF Cores Based on Process Variation Study.
J. Electron. Test., 2008
J. Electron. Test., 2008
Proceedings of the Software Technologies for Embedded and Ubiquitous Systems, 2008
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008
Proceedings of the Advances in Digital Forensics IV, 2008
Data Model Development for Fire Related Extreme Events - An Activity Theory and Semiotics Approach.
Proceedings of the International Conference on Information Systems, 2008
Proceedings of the 11th International Conference on Information Fusion, 2008
Proceedings of the Learning from the past & charting the future of the discipline. 14th Americas Conference on Information Systems, 2008
Proceedings of the Learning from the past & charting the future of the discipline. 14th Americas Conference on Information Systems, 2008
Proceedings of the Learning from the past & charting the future of the discipline. 14th Americas Conference on Information Systems, 2008
Proceedings of the Learning from the past & charting the future of the discipline. 14th Americas Conference on Information Systems, 2008
2007
Inf. Syst. E Bus. Manag., 2007
Int. J. Sens. Networks, 2007
Decis. Support Syst., 2007
Efficiency of critical incident management systems: Instrument development and validation.
Decis. Support Syst., 2007
ASFALT: A Simple Fault-Tolerant Signature-based Localization Technique for Emergency Sensor Networks.
Proceedings of the 26th IEEE Symposium on Reliable Distributed Systems (SRDS 2007), 2007
Proceedings of the 2007 Workshop on New Security Paradigms, White Mountain Hotel and Resort, New Hampshire, USA, 2007
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007
Proceedings of the Advances in Digital Forensics III, 2007
On the Hardness of Minimum Cost Blocking Attacks on Multi-Path Wireless Routing Protocols.
Proceedings of IEEE International Conference on Communications, 2007
Proceedings of the Computer Security, 2007
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
2006
Design of a wireless test control network with radio-on-chip technology for nanometer system-on-a-chip.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2006
Proceedings of the 2006 International Symposium on a World of Wireless, 2006
Understanding multistage attacks by attack-track based visualization of heterogeneous event streams.
Proceedings of the 3rd International Workshop on Visualization for Computer Security, 2006
Proceedings of the Trust Management, 4th International Conference, 2006
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006
Proceedings of IEEE International Conference on Communications, 2006
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006
Proceedings of the 21th IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2006), 2006
A 3-port Register File Design for Improved Fault Tolerance on Resistive Defects in Core-Cells.
Proceedings of the 21th IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2006), 2006
USim: A User Behavior Simulation Framework for Training and Testing IDSes in GUI Based Systems.
Proceedings of the Proceedings 39th Annual Simulation Symposium (ANSS-39 2006), 2006
Proceedings of the Connecting the Americas. 12th Americas Conference on Information Systems, 2006
2005
Dynamically partitioned test scheduling with adaptive TAM configuration for power-constrained SoC testing.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2005
Information assurance metric development framework for electronic bill presentment and payment systems using transaction and workflow analysis.
Decis. Support Syst., 2005
Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA 2005), 2005
Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA 2005), 2005
Proceedings of the Intelligence and Security Informatics, 2005
A Framework for Examining Skill Specialization, Gender Inequity, and Career Advancement in the Information Security Field .
Proceedings of the Information Systems Security, First International Conference, 2005
Proceedings of the 10th European Test Symposium, 2005
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005
An Investigation of Risk Management Issues in the Context of Emergency Response Systems.
Proceedings of the A Conference on a Human Scale. 11th Americas Conference on Information Systems, 2005
2004
IEEE Trans. Reliab., 2004
A generic resource distribution and test scheduling scheme for embedded core-based SoCs.
IEEE Trans. Instrum. Meas., 2004
J. Organ. End User Comput., 2004
Proceedings of the 5th International Symposium on Quality of Electronic Design (ISQED 2004), 2004
Proceedings of the Intelligence and Security Informatics, 2004
WDP: A Wormhole Discovery Protocol for Mobile Ad-Hoc Networks.
Proceedings of the International Conference on Wireless Networks, 2004
Proceedings of the 20th International Conference on Data Engineering, 2004
A Solution Architecture for Financial Institutions to Handle Illegal Activities: A Neural Networks Approach.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004
Proceedings of the Computer Security, 2004
Proceedings of the Proceedings 37th Annual Simulation Symposium (ANSS-37 2004), 2004
Proceedings of the 10th Americas Conference on Information Systems, 2004
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004
RACOON: Rapidly Generating User Command Data For Anomaly Detection From Customizable Templates.
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004
Proceedings of the 6th International Conference on Electronic Commerce, 2004
2003
IEEE Trans. Computers, 2003
Proceedings of the 21st IEEE VLSI Test Symposium (VTS 2003), 27 April, 2003
Proceedings of the Computer Network Security, 2003
A Tamper-Resistant Framework for Unambiguous Detection of Attacks in User Space Using Process Monitors.
Proceedings of the First IEEE International Workshop on Information Assurance (IWIA'03), 2003
Intrusion Countermeasures Security Model Based on Prioritization Scheme for Intranet Access Security.
Proceedings of the IEEE Systems, 2003
Insecure Programming: How Culpable is a Language's Syntax?
Proceedings of the IEEE Systems, 2003
Proceedings of the 18th IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2003), 2003
2002
Proceedings of the 12th ACM Great Lakes Symposium on VLSI 2002, 2002
Proceedings of the 17th IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2002), 2002
Time Slot Specification Based Approach to Analog Fault Diagnosis Using Built-in Current Sensors and Test Point Insertion.
Proceedings of the 11th Asian Test Symposium (ATS 2002), 18-20 November 2002, Guam, USA, 2002
2001
IEEE Trans. Very Large Scale Integr. Syst., 2001
Proceedings of the 20th Symposium on Reliable Distributed Systems (SRDS 2001), 2001
2000
Design and Analysis of an Integrated Checkpointing Recovery Scheme for Distributed Applications.
IEEE Trans. Knowl. Data Eng., 2000
A Local/Global Strategy Based on Signal Strength for Message Routing in Wireless Mobile Ad-Hoc Networks.
Proceedings of the 2000 Academia / Industry Working Conference on Research Challenges (AIWoRC 2000), 2000
1999
A New Framework For Automatic Generation, Insertion and Verification of Memory Built-In Self Test Units.
Proceedings of the 17th IEEE VLSI Test Symposium (VTS '99), 1999
Proceedings of the 1999 International Symposium on Circuits and Systems, ISCAS 1999, Orlando, Florida, USA, May 30, 1999
Proceedings of the Digest of Papers: FTCS-29, 1999
Proceedings of the 1999 Design, 1999
1998
IEEE Trans. Computers, 1998
Artif. Intell. Eng., 1998
Automatic Insertion of Scan Structures to Enhance Testability of Embedded Memories, Cores and Chips.
Proceedings of the 16th IEEE VLSI Test Symposium (VTS '98), 28 April, 1998
Design and Analysis of a Hardware-Assisted Checkpointing and Recovery Scheme for Distributed Applications.
Proceedings of the Seventeenth Symposium on Reliable Distributed Systems, 1998
Proceedings of the Proceedings IEEE International Test Conference 1998, 1998
1997
IEEE Trans. Computers, 1997
Proceedings of the Digest of Papers: FTCS-27, 1997
1996
Proceedings of the Digest of Papers: FTCS-26, 1996
1995
Conference Reports.
IEEE Des. Test Comput., 1995
Appl. Artif. Intell., 1995
Utilizing spares in multichip modules for the dual function of fault coverage and fault diagnosis.
Proceedings of the 1995 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, 1995
1994
IEEE Trans. Computers, 1994
Modeling the Reliability of a Class of Fault-Tolerant VLSI/WSI Systems Based on Multiple-Level Redundancy.
IEEE Trans. Computers, 1994
Implementation of a Gracefully Degradable Binary Tree in Programmable.
Proceedings of the IEEE International Workshop on Defect and Fault Tolerance in VLSI Systems, 1994
Proceedings of the Proceedings 27th Annual Simulation Symposium, 1994
1993
Analysis of Noncoherent Systems and an Architecture for the Computation of the System Reliability.
IEEE Trans. Computers, 1993
Yield Analysis of Reconfigurable Array Processors Based on Multiple-Level Redundancy.
IEEE Trans. Computers, 1993
Reliability, Reconfiguration, and Spare Allocation Issues in Binary-Tree Architectures Based on Multiple-Level Redundancy.
IEEE Trans. Computers, 1993
Proceedings of the 1993 IEEE/ACM International Conference on Computer-Aided Design, 1993
A parallel VLSI implementation of Viterbi algorithm for accelerated word recognition.
Proceedings of the Third Great Lakes Symposium on Design Automation of High Performance VLSI Systems, 1993
1991
1990
Yield enhancement of field programmable logic arrays by inherent component redundancy.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 1990
An analysis of a reconfigurable binary tree architecture based on multiple-level redundancy.
Proceedings of the 20th International Symposium on Fault-Tolerant Computing, 1990
Proceedings of the 27th ACM/IEEE Design Automation Conference. Orlando, 1990
Proceedings of the Fourteenth Annual International Computer Software and Applications Conference, 1990
1988
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 1988
IEEE Trans. Computers, 1988
Proceedings of the Proceedings International Test Conference 1988, 1988
A Unified Approach to Designing Fault-Tolerant Processor Ensembles.
Proceedings of the International Conference on Parallel Processing, 1988
1987
Proceedings of the 24th ACM/IEEE Design Automation Conference. Miami Beach, FL, USA, June 28, 1987
1986
IEEE Trans. Software Eng., 1986