Publications

Home ] About Me ] Students ] Old News ] [ Publications ] Research Projects ] Teaching ] Miscellaneous ] Contact ]

Selected Publications:

  • Duan Q., M. Virendra, S. Upadhyaya and A. Sanzgiri, “Minimum Cost Blocking Problem in Multi-path Wireless Routing Protocols”, IEEE Transactions on Computers, February 2013 (accepted).

  • Sanzgiri A., A. Hughes, S. Upadhyaya, “Analysis of Malware Propagation in Twitter”, 32nd IEEE International Symposium on Reliable Distributed Systems, Braga, Portugal, October 2013.

  • Valecha R., H.R. Rao, R. Sharman and S. Upadhyaya, “A Dispatch-Mediated Communication Model for Emergency Response Systems,” IEEE Transactions on Management Information Systems, Vol. 4, No. 1, pp. 1-25, April 2013.

  • Sanzgiri A., A. Nandugudi, S. Upadhyaya and C. Qiao, “SESAME: Smartphone Enabled Secure Access to Multiple Entities”, International Conference on Computing, Networking and Communications, Internet Services and Applications, San Diego, CA, January 2013.

  • Nagarajaiah H., S. Upadhyaya and V. Gopal, “Data De-duplication and Event Processing for Security Applications on an Embedded Processor”, 5th International Workshop on Dependable Network Computing and Mobile Systems (DNCMS 2012), in conjunction with IEEE SRDS 2012, Irvine, CA, October 2012. 

  • Joyce J., A. Sanzgiri and S. Upadhyaya, “The Early (tweet-ing) Bird Spreads the Worm: An Assessment of Twitter for Malware Propagation”, 9th International Conference on Mobile Web Information Systems (MobiWIS), Niagara Falls, Ontario, Canada, August 2012.

  • Mehresh R. and S. Upadhyaya, “A Deception Framework for Survivability Against Next Generation Cyber Attacks”, International Conference on Security and Management (SAM'12), Las Vegas, NV, July 2012.

  • Keshavamurthy V., S. Upadhyaya and V. Gopal, “Accelerated Processing of Secure Email by Exploiting Built-in Security Features on the Intel® EP80579 Integrated Processor with Intel® QuickAssist Technology”, 4th International Workshop on Dependable Network Computing and Mobile Systems (DNCMS 2011), in conjunction with IEEE SRDS 2011, Madrid, Spain, October 2011.

  • Salerno S., A. Sanzgiri and S. Upadhyaya, “Exploration of Attacks on Current Generation Smartphones”, 8th International Conference on Mobile Web Information Systems (MobiWIS), Niagara Falls, ON, Canada, September 2011.

  • Mehresh R., S. Upadhyaya and K. Kwiat, “Secure Proactive Recovery – a Hardware Based Mission Assurance Scheme”, Journal of Network Forensics, Springer, Vol. 3, Issue 2, Spring 2011, pp. 32-48.

  • Mehresh R., J. Rao, S. Upadhyaya, S. Natarajan and K. Kwiat, “Tamper-resistant Monitoring for Securing Multi-core Environments, International Conference on Security and Management (SAM), Las Vegas, NV, July 2011.

  • Sankaranarayanan V., S. Upadhyaya and K. Kwiat, “Inferring QoS Loss in Disadvantaged Networks: A Game Theoretic Approach”, Journal of Autonomic and Trusted Computing (JoATC),  2012 (accepted).

  • Mathew S., S. Upadhyaya, M. Sudit and A. Stotz, “Situation Awareness of Multistage Cyber Attacks by Semantic Event Fusion”, IEEE MILCOM 2010, October 2010.

  • Mathew S., M. Petropoulos, H.Q. Ngo and S. Upadhyaya, “A Data-Centric Approach to Insider Attack Detection in Database Systems”, 13th International Symposium on Recent Advances in Intrusion Detection, Ottawa, Canada, September 2010.

  • Gilbert B., R. Sharman, M. Gupta, H.R. Rao, S. Upadhyaya and K. Mortensen, “Content-sensitive, Temporally Adaptive Metadata”, 11th Annual New York State Cyber Security Conference, Albany, NY, June 2008, pp. 47-52 (Best Paper Award).

  • Zhong S., M. Jadliwala, S. Upadhyaya and C. Qiao, "Towards a Theory of Robust Localization against Malicious Beacon Nodes", 27th IEEE International Conference on Computer Communications (INFOCOM 2008), Phoenix, AZ, April 2008.

  • Jadliwala M., S. Upadhyaya and M. Taneja, “ASFALT: A Simple Fault-Tolerant Signature-based Localization Technique for Emergency Sensor Networks”,  IEEE Symposium on Reliable Distributed Systems (SRDS 2007), Beijing, China, October 2007.

  • Jadliwala M., Qi Duan, Jinhui Xu and Shambhu Upadhyaya. “On Extracting Consistent Graphs in Wireless Sensor Networks”, International Journal of Sensor Networks (IJSNET): Special Issue on Theoretical and Algorithmic Aspects in Sensor Networks, Vol. 2, Nos 3/4, pp. 149-162, 2007.

  • Sankaranarayanan V., M. Chandrasekaran and S. Upadhyaya, “Towards Modeling Trust Based Decisions: A Game Theoretic Approach”, 12th European Symposium on Research in Computer Security (ESORICS 2007), Dresden, Germany, Sept. 2007.

  • Virendra M., A. Krishnamurthy, K. Narayanan, S. Upadhyaya and K. Kwiat, “Environment-Aware Trusted Data Delivery in Multipath Wireless Protocols”, International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security (MMM-ACNS-2007), St. Petersburg, Russia, Sept. 2007.

  • Duan Q., M. Virendra and S. Upadhyaya, “On the Hardness of Minimum Cost Blocking Attacks on Multi-path Wireless Routing Protocols”, IEEE International Conference on Communications (ICC 2007), Glasgow, UK.

  • Ha D., S. Upadhyaya, H.Q. Ngo, S. Pramanik, R. Chinchani and S. Mathew, “Insider Threat Analysis Using Information-Centric Modeling”, in P. Craiger and S. Shenoi,  Eds., Advances in Digital Forensics III, Springer, Boston, 2007.

  • Park I., R. Sharman, H.R. Rao and S. Upadhyaya, “Short Term and Total Life Impact Analysis of Email Worms in Computer Systems”, Decision Support Systems, 43 (2007) 827-841.

  • Chandrasekaran M., S. Vidyaraman and S. Upadhyaya, “SpyCon: Emulating User Activities to Detect Evasive Spyware”, 2nd International Swarm Intelligence & Other Forms of Malware Workshop (Malware'07), New Orleans, LA, April 2007 (Best Paper Award).

  • Mathew S., R. Giomundo, S. Upadhyaya, M. Sudit and A. Stotz, “Understanding Multistage Attacks by Attack-Track Based Visualization of Heterogeneous Event Streams”, ACM VizSec Workshop in conjunction with ACM CCS, Nov. 2006.

  • Garg A., V. Sankaranarayanan, S. Upadhyaya and K. Kwiat, “USim: A User Behavior Simulation Framework for Training and Testing IDSes in GUI Based Systems”, 39th Annual Simulation Symposium, Huntsville, AL, April 2006.

  • Mathew S., D. Britt, R. Giomundo, S. Upadhyaya, M. Sudit and A. Stotz, "Real-time Multistage Attack Awareness Through Enhanced Intrusion Alert Clustering", SIMA 2005, in conjunction with MILCOM 2005, Atlantic City, NJ, October 2005.

  • Upadhyaya S., K. Kwiat, R. Chinchani and K. Mantha, "Encapsulation of Owner's Intent - A New Proactive Intrusion Assessment Paradigm", in Vipin Kumar, Jaideep Srivastava and Aleksandar Lazarevic, Eds., Managing Cyber Threats: Issues, Approaches and Challenges, Springer, pp. 221-245, 2005.

  • Upadhyaya, S., H.R. Rao and G. Padmanabhan, "Secure Knowledge Management", in David Swartz, Ed., Encyclopedia of Knowledge Management, IDEA Group, pp. 795-801, 2005.

  • Chinchani R., A. Iyer, H. Ngo and S. Upadhyaya, "Towards a Theory of Insider Threat Assessment", IEEE International Conference on Dependable Systems and Networks (DSN 2005), Yokohama, Japan, June 2005.

  • Chen R., R. Sharman, H. R. Rao and S. Upadhyaya, "Design Principles of Coordinated Multi-Incident Emergency Response Systems", IEEE Symposium on Intelligence and Security Informatics, Atlanta, GA, May 2005.

  • Mathew S., C. Shah and S. Upadhyaya, "An Alert Fusion Framework for Situation Awareness of Multistage Coordinated Attacks", IEEE International Workshop on Information Assurance, Washington DC, March 2005.

  • Lee J.K., S. Upadhyaya, H.R. Rao and R. Sharman, "Secure Knowledge Management and the Semantic Web", Communications of the ACM, Special Section on Semantic E-Business Vision, Volume 48,  Issue 12, December 2005.

  • Chinchani R., Duc Ha, Anusha Iyer, Hung Q. Ngo, and Shambhu Upadhyaya, "On the Hardness of Approximating the MIN-HACK Problem", Journal of Combinatorial Optimization, Springer, Vol. 9, No. 3, pp. 295-311, May 2005.

  • Virendra M., M. Jadliwala, M. Chandrasekaran and S. Upadhyaya, "Quantifying Trust in Mobile Ad-Hoc Networks", IEEE International Conference on Integration of Knowledge Intensive Multi-Agent Systems (KIMAS 2005), Boston, MA, April 2005.

  • Goldberg S., S. Upadhyaya and W.K. Fuchs, "Recovery Schemes for Mesh Arrays Utilizing Dedicated Spares", IEEE Transactions on Reliability, Vol. 53, No. 4, pp. 445-451, Dec. 2004.

  • Chinchani R., A. Muthukrishnan, M. Chandrasekaran and S. Upadhyaya, "RACOON: Rapidly Generating User Command Data for Anomaly Detection from Customizable Templates", 20th Annual Computer Security Applications Conference, Tucson, AZ, December 6-10, 2004.

  • Pramanik S., V. Sankarnarayanan and S. Upadhyaya, "Security Policies to Mitigate Insider Threat in the Document Control Domain", 20th Annual Computer Security Applications Conference, Tucson, AZ, December, 2004.

  • Virendra M. and S. Upadhyaya, "SWAN: A Secure Wireless LAN Architecture" 29th IEEE Conference on Local Computer Networks, Tampa, FL, November 2004.

  • Chinchani R., A. Iyer, B. Jayaraman and S. Upadhyaya, "ARCHERR: Architecture Driven Program Safety", 9th European Symposium on Research in Computer Security (ESORICS 2004), Institut Eurcom, Sophia Antipolis, French Riviera, France, September 2004.

  • Gummadidala R., C. Qiao and S. Upadhyaya, "WDP: A Wormhole Discovery Protocol for Mobile Ad Hoc Networks", International Workshop on Mobile and Wireless Ad Hoc Networking, Las Vegas, NV, June 2004.

  • Pramanik S. and S. Upadhyaya, "RABIT: A New Framework for Runtime Emulation and Binary Translation", 37th IEEE Annual Simulation Symp., Washington DC, Apr. '04.

  • Zhao D. and S. Upadhyaya, "A Generic Resource Distribution and Test Scheduling Scheme for Embedded Core-Based SoCs", IEEE Transactions on Instrumentation and Measurement, Vol. 53, No. 2, pp. 318-329, April 2004.

  • Zhao, D., Upadhyaya, S. and Margala, M., "Control constrained resource partitioning for complex SoCs", Proceedings, 18th IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems, November 2003, pages 425-432.

  • Chinchani, R., A. Iyer, B. Jayaraman and S. Upadhyaya, "Insecure Programming: How Culpable is a Language's Syntax?", IAW 2003: 158-163.

  • Zhao, D., Upadhyaya, S. and Margala, M., "A New Distributed Test Control Architecture with Multihop Wireless Test Connectivity and Communication for GigaHertz Systems-on-Chip", 12th IEEE North Atlantic Test Workshop, Montauk, NY, May 2003.

  • Zarrineh K., S.J. Upadhyaya and S. Chakravarty, "Automatic Generation and Compaction of March Tests for Memory Arrays", IEEE Transactions on VLSI Systems, Vol. 9, No. 6, December 2001, pp. 845-857.

  • Zarrineh K., S. Upadhyaya and V. Chickermane, "System-on-Chip Testability Using LSSD Scan Structures", IEEE Design and Test of Computers, Vol. 18, No. 3, May-June 2001, pp. 83-97.

  • Ramamurthy B., S.J. Upadhyaya and B. Bhargava, "Design and analysis of an integrated checkpointing and recovery scheme for distributed applications", IEEE Transactions on Knowledge and Data Engineering, Vol. 12, No. 2, pp. 174-186, March/April 2000.

  • Tien T.C. and S. Upadhyaya, "A local/global strategy based on signal strength for message routing in wireless mobile ad hoc networks", IEEE Academic Industry Working Conference on Research Challenges, Buffalo, NY, April 2000 (Best Student Paper Award) (also to appear in Mobile Computing: Implementing Pervasive Information and Communications Technologies, editors: S. Upadhyaya, K. Kwiat, A. Chaudhuri and M. Weiser, Kluwer Academic Publishers Book Series on Interfaces in Operations Research and Computer Science, December 2001.

  • Zarrineh, K., S.J. Upadhyaya and S. Chakravarty, "A new framework for generation of optimal march tests for memory arrays", IEEE International Test Conference, Washington DC., pp. 73-82, October 1998.

  • Goldberg S. and S.J. Upadhyaya, "Implementing degradable processing arrays", IEEE Micro, Vol. 18, No. 1, Jan/Feb, 1998, pp. 64-74.

  • Nachman L., K.K. Saluja, S.J. Upadhyaya and Robert Reuse, "A novel approach to random pattern testing of sequential circuits", IEEE Transactions on Computers, Special Issue on Dependability of Computing Systems, Vol. 47, No. 1, Jan. 1998, pp. 129-134.

  • Upadhyaya S.J., "Noise Generators", An invited article in Encyclopedia of Electrical and Electronics Engineering, John Wiley and Sons Inc., John Webster, Editor, Vol. 14, pp. 384-392, 1999.

  • Chen Y.Y., S.J. Upadhyaya and C.W. Cheng, "A comprehensive reconfiguration scheme for fault-tolerant VLSI/WSI array processors", IEEE Transactions on Computers, Vol. 46, No. 12, Dec. 1997, pp. 1363-1370.

  • Ramamurthy B., S.J. Upadhyaya and R.K. Iyer, "An object-oriented testbed for the evaluation of checkpointing and recovery systems", IEEE Int. Symposium on Fault Tolerant Computing, Seattle, WA, pp. 194-203, June 1997.

  • Spina R. and S.J. Upadhyaya, "Linear circuit fault diagnosis using neuromorphic analyzers", IEEE Trans. on Circuits and Systems -II, Vol. 43, No. 3, March 1997, pp. 188-196.

  • Upadhyaya S.J. and I.S. Hwang, "Design of a multi-level fault-tolerant mesh (MFTM) for high reliability applications", International Journal of Reliability, Quality, and Safety Engineering, Vol. 2, No. 4, December 1995, pp. 419-429.

  • Kumar A. and S.J. Upadhyaya, "Function based candidate discrimination in model based diagnosis", Journal of Applied Artificial Intelligence, Vol. 9, No. 1, pp. 65-80, Jan. 1995.

  • Chen Y.Y. and S.J. Upadhyaya, "A new approach to modeling the performance of a class of fault tolerant VLSI/WSI systems based on multiple-level redundancy", IEEE Transactions on Computers, Vol. 43, No. 6, pp. 737-748, June 1994.

  • Upadhyaya S.J. and B. Ramamurthy, "Concurrent process monitoring with no reference signatures", IEEE Transactions on Computers, Vol. 43, No. 4, pp. 475-480, Apr. 1994.

 

 
 

Home | Contact