Self-healing systems—survey and synthesis SU Debanjan Ghosh, Raj Sharman, H Raghav Rao Decision support systems 42 (4), 2164-2185, 2007 | 486* | 2007 |
Coordination in emergency response management R Chen, R Sharman, HR Rao, SJ Upadhyaya Communications of the ACM 51 (5), 66-73, 2008 | 479 | 2008 |
Factors influencing online health information search: An empirical analysis of a national cancer-related survey N Xiao, R Sharman, HR Rao, S Upadhyaya Decision Support Systems 57, 417-427, 2014 | 454 | 2014 |
Phishing email detection based on structural properties M Chandrasekaran, K Narayanan, S Upadhyaya NYS cyber security conference 3, 2-8, 2006 | 318 | 2006 |
Linear circuit fault diagnosis using neuromorphic analyzers R Spina, S Upadhyaya IEEE Transactions on Circuits and Systems II: Analog and Digital Signal …, 1997 | 262 | 1997 |
Online shopping intention in the context of data breach in online retail stores: An examination of older and younger adults R Chakraborty, J Lee, S Bagchi-Sen, S Upadhyaya, HR Rao Decision Support Systems 83, 47-56, 2016 | 246 | 2016 |
Is rssi a reliable parameter in sensor localization algorithms: An experimental study AT Parameswaran, MI Husain, S Upadhyaya Field failure data analysis workshop (F2DA09) 5, 2009 | 238 | 2009 |
A data-centric approach to insider attack detection in database systems S Mathew, M Petropoulos, HQ Ngo, S Upadhyaya Recent Advances in Intrusion Detection: 13th International Symposium, RAID …, 2010 | 237 | 2010 |
Towards a theory of insider threat assessment R Chinchani, A Iyer, HQ Ngo, S Upadhyaya 2005 International Conference on Dependable Systems and Networks (DSN'05 …, 2005 | 231 | 2005 |
Internet and online information privacy: An exploratory study of preteens and early teens S Chai, S Bagchi-Sen, C Morrell, HR Rao, SJ Upadhyaya IEEE Transactions on Professional Communication 52 (2), 167-182, 2009 | 188 | 2009 |
Data model development for fire related extreme events: An activity theory approach R Chen, R Sharman, HR Rao, SJ Upadhyaya Mis Quarterly, 125-147, 2013 | 165 | 2013 |
Quantifying trust in mobile ad-hoc networks M Virendra, M Jadliwala, M Chandrasekaran, S Upadhyaya International Conference on Integration of Knowledge Intensive Multi-Agent …, 2005 | 161 | 2005 |
Emergency response information system interoperability: Development of chemical incident response data model R Chen, R Sharman, N Chakravarti, HR Rao, SJ Upadhyaya Journal of the Association for Information Systems 9 (3), 7, 2008 | 139 | 2008 |
Efficiency of critical incident management systems: Instrument development and validation JK Kim, R Sharman, HR Rao, S Upadhyaya Decision Support Systems 44 (1), 235-250, 2007 | 125 | 2007 |
On programmable memory built-in self test architectures K Zarrineh, SJ Upadhyaya Proceedings of the conference on Design, automation and test in Europe, 136-es, 1999 | 124 | 1999 |
Phoney: Mimicking user response to detect phishing attacks M Chandrasekaran, R Chinchani, S Upadhyaya 2006 International Symposium on a World of Wireless, Mobile and Multimedia …, 2006 | 112 | 2006 |
Shared keystroke dataset for continuous authentication Y Sun, H Ceker, S Upadhyaya 2016 IEEE international workshop on information forensics and security (WIFS …, 2016 | 97 | 2016 |
Security in grid computing: A review and synthesis E Cody, R Sharman, RH Rao, S Upadhyaya Decision Support Systems 44 (4), 749-764, 2008 | 94 | 2008 |
Design principles for critical incident response systems R Chen, R Sharman, HR Rao, S Upadhyaya Information Systems and E-Business Management 5, 201-227, 2007 | 94 | 2007 |
Profiling users in GUI based systems for masquerade detection Garg, Rahalkar, Upadhyaya, Kwiat 2006 IEEE information assurance workshop, 48-54, 2006 | 81 | 2006 |