Follow
Shambhu Upadhyaya
Shambhu Upadhyaya
Professor of Computer Science and Engineering, University at Buffalo
Verified email at buffalo.edu - Homepage
Title
Cited by
Cited by
Year
Self-healing systems—survey and synthesis
SU Debanjan Ghosh, Raj Sharman, H Raghav Rao
Decision support systems 42 (4), 2164-2185, 2007
486*2007
Coordination in emergency response management
R Chen, R Sharman, HR Rao, SJ Upadhyaya
Communications of the ACM 51 (5), 66-73, 2008
4792008
Factors influencing online health information search: An empirical analysis of a national cancer-related survey
N Xiao, R Sharman, HR Rao, S Upadhyaya
Decision Support Systems 57, 417-427, 2014
4542014
Phishing email detection based on structural properties
M Chandrasekaran, K Narayanan, S Upadhyaya
NYS cyber security conference 3, 2-8, 2006
3182006
Linear circuit fault diagnosis using neuromorphic analyzers
R Spina, S Upadhyaya
IEEE Transactions on Circuits and Systems II: Analog and Digital Signal …, 1997
2621997
Online shopping intention in the context of data breach in online retail stores: An examination of older and younger adults
R Chakraborty, J Lee, S Bagchi-Sen, S Upadhyaya, HR Rao
Decision Support Systems 83, 47-56, 2016
2462016
Is rssi a reliable parameter in sensor localization algorithms: An experimental study
AT Parameswaran, MI Husain, S Upadhyaya
Field failure data analysis workshop (F2DA09) 5, 2009
2382009
A data-centric approach to insider attack detection in database systems
S Mathew, M Petropoulos, HQ Ngo, S Upadhyaya
Recent Advances in Intrusion Detection: 13th International Symposium, RAID …, 2010
2372010
Towards a theory of insider threat assessment
R Chinchani, A Iyer, HQ Ngo, S Upadhyaya
2005 International Conference on Dependable Systems and Networks (DSN'05 …, 2005
2312005
Internet and online information privacy: An exploratory study of preteens and early teens
S Chai, S Bagchi-Sen, C Morrell, HR Rao, SJ Upadhyaya
IEEE Transactions on Professional Communication 52 (2), 167-182, 2009
1882009
Data model development for fire related extreme events: An activity theory approach
R Chen, R Sharman, HR Rao, SJ Upadhyaya
Mis Quarterly, 125-147, 2013
1652013
Quantifying trust in mobile ad-hoc networks
M Virendra, M Jadliwala, M Chandrasekaran, S Upadhyaya
International Conference on Integration of Knowledge Intensive Multi-Agent …, 2005
1612005
Emergency response information system interoperability: Development of chemical incident response data model
R Chen, R Sharman, N Chakravarti, HR Rao, SJ Upadhyaya
Journal of the Association for Information Systems 9 (3), 7, 2008
1392008
Efficiency of critical incident management systems: Instrument development and validation
JK Kim, R Sharman, HR Rao, S Upadhyaya
Decision Support Systems 44 (1), 235-250, 2007
1252007
On programmable memory built-in self test architectures
K Zarrineh, SJ Upadhyaya
Proceedings of the conference on Design, automation and test in Europe, 136-es, 1999
1241999
Phoney: Mimicking user response to detect phishing attacks
M Chandrasekaran, R Chinchani, S Upadhyaya
2006 International Symposium on a World of Wireless, Mobile and Multimedia …, 2006
1122006
Shared keystroke dataset for continuous authentication
Y Sun, H Ceker, S Upadhyaya
2016 IEEE international workshop on information forensics and security (WIFS …, 2016
972016
Security in grid computing: A review and synthesis
E Cody, R Sharman, RH Rao, S Upadhyaya
Decision Support Systems 44 (4), 749-764, 2008
942008
Design principles for critical incident response systems
R Chen, R Sharman, HR Rao, S Upadhyaya
Information Systems and E-Business Management 5, 201-227, 2007
942007
Profiling users in GUI based systems for masquerade detection
Garg, Rahalkar, Upadhyaya, Kwiat
2006 IEEE information assurance workshop, 48-54, 2006
812006
The system can't perform the operation now. Try again later.
Articles 1–20