Fingerprint
- 1 Similar Profiles
Collaborations and top research areas from the last five years
Grants & Projects
- 17 Finished
-
SPIR: High-Speed Inline Encryption
Upadhyaya, S. (PI) & Leyh, T. (CoI)
05/15/19 → 01/31/20
Project: Research
-
CyberCorps(R): SFS (Scholarship Track): Renewal: An Interdisciplinary Cyber Security Curriculum
Upadhyaya, S. (PI), Bartholomew, M. (CoI), Cusick, T. (CoI) & Sanders, G. (CoI)
09/1/18 → 08/31/25
Project: Research
-
Buffalo GenCyber Camp 2018
Upadhyaya, S. (PI), Amo, L. (CoI) & Murray, D. (CoI)
04/13/18 → 05/6/19
Project: Research
-
DMD-101 Course Development
Lewis, K. (PI), Crassidis, J. (CoI), Dargush, G. (CoI), English, K. (CoI), Leyh, T. (CoI), Stephens, L. (CoI), Upadhyaya, S. (CoI), Zhou, C. (CoI), Behdad, S. (CoI), Krovi, V. (CoI) & Rai, R. (CoI)
05/17/16 → 12/31/17
Project: Research
-
DOD Information Assurance Scholarship Program
Upadhyaya, S. (PI) & Rao, H. (CoI)
09/28/10 → 12/27/11
Project: Research
-
Microft: Exploring and Mitigating Cross-State Control-Flow Hijacking Attacks on ARM Cortex-M TrustZone
Ma, Z., Tan, X., Ziarek, L., Zhang, N., Upadhyaya, S., Hu, H. & Zhao, Z., Oct 24 2025, In: IEEE Transactions on Information Forensics and Security. 20, p. 12096-12111 16 p.Research output: Contribution to journal › Article › peer-review
-
The Role of Economic Incentives and Disincentives in Deterring Insider Hacking Behavior
Amor, L., Gaia, J., Murray, D., Sanders, G. L., Sanders, S., Singh, R. & Upadhyaya, S., 2025, (Accepted/In press) In: IEEE Engineering Management Review.Research output: Contribution to journal › Article › peer-review
-
Economic Incentives and Perceptions as Critical Factors for Understanding Insider Hacking Behavior
Amo, L., Gaia, J., Murray, D., Sanders, G. L., Sanders, S., Singh, R. & Upadhyaya, S., 2024, Proceedings of the 57th Annual Hawaii International Conference on System Sciences, HICSS 2024. Bui, T. X. (ed.). IEEE Computer Society, p. 3223-3232 10 p. (Proceedings of the Annual Hawaii International Conference on System Sciences).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
1 Scopus citations -
A Game Theoretic Approach to the Design of Mitigation Strategies for Generic Ransomware
Baksi, R. P. & Upadhyaya, S., 2023, Information Systems Security and Privacy - 7th International Conference, ICISSP 2021, and 8th International Conference, ICISSP 2022, Revised Selected Papers. Mori, P., Lenzini, G. & Furnell, S. (eds.). Springer Science and Business Media Deutschland GmbH, p. 104-124 21 p. (Communications in Computer and Information Science; vol. 1851 CCIS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
1 Scopus citations -
Apt Detection of Ransomware - An Approach to Detect Advanced Persistent Threats Using System Call Information
Baksi, R. P., Nalka, V. & Upadhyaya, S., 2023, Proceedings - 2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom/BigDataSE/CSE/EUC/iSCI 2023. Hu, J., Min, G. & Wang, G. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 1621-1630 10 p. (Proceedings - 2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom/BigDataSE/CSE/EUC/iSCI 2023).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
1 Scopus citations