Folgen
Shambhu Upadhyaya
Shambhu Upadhyaya
Professor of Computer Science and Engineering, University at Buffalo
Bestätigte E-Mail-Adresse bei buffalo.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Coordination in emergency response management
R Chen, R Sharman, HR Rao, SJ Upadhyaya
Communications of the ACM 51 (5), 66-73, 2008
4692008
Self-healing systems—survey and synthesis
SU Debanjan Ghosh, Raj Sharman, H Raghav Rao
Decision support systems 42 (4), 2164-2185, 2007
465*2007
Factors influencing online health information search: An empirical analysis of a national cancer-related survey
N Xiao, R Sharman, HR Rao, S Upadhyaya
Decision Support Systems 57, 417-427, 2014
4222014
Phishing email detection based on structural properties
M Chandrasekaran, K Narayanan, S Upadhyaya
NYS cyber security conference 3, 2-8, 2006
3042006
Linear circuit fault diagnosis using neuromorphic analyzers
R Spina, S Upadhyaya
IEEE Transactions on Circuits and Systems II: Analog and Digital Signal …, 1997
2571997
Is rssi a reliable parameter in sensor localization algorithms: An experimental study
AT Parameswaran, MI Husain, S Upadhyaya
Field failure data analysis workshop (F2DA09) 5, 2009
2312009
A data-centric approach to insider attack detection in database systems
S Mathew, M Petropoulos, HQ Ngo, S Upadhyaya
Recent Advances in Intrusion Detection: 13th International Symposium, RAID …, 2010
2302010
Online shopping intention in the context of data breach in online retail stores: An examination of older and younger adults
R Chakraborty, J Lee, S Bagchi-Sen, S Upadhyaya, HR Rao
Decision Support Systems 83, 47-56, 2016
2262016
Towards a theory of insider threat assessment
R Chinchani, A Iyer, HQ Ngo, S Upadhyaya
2005 International Conference on Dependable Systems and Networks (DSN'05 …, 2005
2262005
Internet and online information privacy: An exploratory study of preteens and early teens
S Chai, S Bagchi-Sen, C Morrell, HR Rao, SJ Upadhyaya
IEEE Transactions on Professional Communication 52 (2), 167-182, 2009
1742009
Quantifying trust in mobile ad-hoc networks
M Virendra, M Jadliwala, M Chandrasekaran, S Upadhyaya
International Conference on Integration of Knowledge Intensive Multi-Agent …, 2005
1592005
Data model development for fire related extreme events: An activity theory approach
R Chen, R Sharman, HR Rao, SJ Upadhyaya
Mis Quarterly, 125-147, 2013
1532013
Emergency response information system interoperability: Development of chemical incident response data model
R Chen, R Sharman, N Chakravarti, HR Rao, SJ Upadhyaya
Journal of the Association for Information Systems 9 (3), 7, 2008
1292008
On programmable memory built-in self test architectures
K Zarrineh, SJ Upadhyaya
Proceedings of the conference on Design, automation and test in Europe, 136-es, 1999
1221999
Efficiency of critical incident management systems: Instrument development and validation
JK Kim, R Sharman, HR Rao, S Upadhyaya
Decision Support Systems 44 (1), 235-250, 2007
1212007
Phoney: Mimicking user response to detect phishing attacks
M Chandrasekaran, R Chinchani, S Upadhyaya
2006 International Symposium on a World of Wireless, Mobile and Multimedia …, 2006
1122006
Security in grid computing: A review and synthesis
E Cody, R Sharman, RH Rao, S Upadhyaya
Decision Support Systems 44 (4), 749-764, 2008
952008
Design principles for critical incident response systems
R Chen, R Sharman, HR Rao, S Upadhyaya
Information Systems and E-Business Management 5, 201-227, 2007
922007
Shared keystroke dataset for continuous authentication
Y Sun, H Ceker, S Upadhyaya
2016 IEEE International Workshop on Information Forensics and Security (WIFS …, 2016
812016
Secure distance-based localization in the presence of cheating beacon nodes
M Jadliwala, S Zhong, SJ Upadhyaya, C Qiao, JP Hubaux
IEEE Transactions on mobile computing 9 (6), 810-823, 2010
782010
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20