Search Results - "Kaza, Siddharth"

Refine Results
  1. 1

    Security Injections@Towson: Integrating Secure Coding into Introductory Computer Science Courses by Taylor, Blair, Kaza, Siddharth

    Published in ACM transactions on computing education (01-10-2016)
    “…Despite the critical societal importance of computer security, security is not well integrated into the undergraduate computing curriculum. Security classes…”
    Get more information
    Journal Article
  2. 2

    Evaluating ontology mapping techniques: An experiment in public safety information sharing by Kaza, Siddharth, Chen, Hsinchun

    Published in Decision Support Systems (01-11-2008)
    “…The public safety community in the United States consists of thousands of local, state, and federal agencies, each with its own information system. In the past…”
    Get full text
    Journal Article
  3. 3
  4. 4

    Enhancing border security: Mutual information analysis to identify suspect vehicles by Kaza, Siddharth, Wang, Yuan, Chen, Hsinchun

    Published in Decision Support Systems (01-02-2007)
    “…In recent years border safety has been identified as a critical part of homeland security. The Department of Homeland Security searches vehicles entering the…”
    Get full text
    Journal Article
  5. 5

    Topological Analysis of Criminal Activity Networks: Enhancing Transportation Security by Kaza, S., Xu, J., Marshall, B., Hsinchun Chen

    “…The security of border and transportation systems is a critical component of the national strategy for homeland security. The security concerns at the border…”
    Get full text
    Journal Article
  6. 6

    Designing, Implementing, and Evaluating Information Systems for Law Enforcement—A Long-Term Design-Science Research Project by Kaza, Siddharth, Hu, Paul Jen-Hwa, Hu, Han-Fen, Chen, Hsinchun

    “…The design science research (DSR) paradigm prescribes building and evaluating an Information Technology (IT) artifact to address organizational problems…”
    Get full text
    Journal Article
  7. 7

    Instance, evolution, and predictive modeling of social networks by Kaza, Siddharth

    Published 01-01-2008
    “…Various phenomena within the information systems discipline can be studied using the social network paradigm that views social entities as nodes with links…”
    Get full text
    Dissertation
  8. 8

    Effect of Inventor Status on Intra-Organizational Innovation Evolution by Kaza, S., Hsinchun Chen

    “…Innovation is one of the primary characteristics that separates successful from unsuccessful organizations. Organizations have a choice in selecting knowledge…”
    Get full text
    Conference Proceeding
  9. 9

    Using eye-tracking to investigate content skipping: A study on learning modules in cybersecurity by Raina, Sagar, Bernard, Leon, Taylor, Blair, Kaza, Siddharth

    “…Students skipping content is common in learning modules that present a large amount of information in a linear format. This may result in lower student…”
    Get full text
    Conference Proceeding
  10. 10

    Determining inventor status and its effect on knowledge diffusion: A study on nanotechnology literature from China, Russia, and India by Liu, Xuan, Kaza, Siddharth, Zhang, Pengzhu, Chen, Hsinchun

    “…In an increasingly global research landscape, it is important to identify the most prolific researchers in various institutions and their influence on the…”
    Get full text
    Journal Article
  11. 11

    Challenges, lessons learned and results from establishing a CyberCorps: Scholarship for Service program targeting undergraduate students by Azadegan, Shiva, Dehlinger, Josh, Kaza, Siddharth, Taylor, Blair, Yu, Wei

    “…To attract and encourage the best and the brightest students to pursue state, federal and tribal government careers in cybersecurity, the National Science…”
    Get full text
    Conference Proceeding
  12. 12

    Identifying significant facilitators of dark network evolution by Hu, Daning, Kaza, Siddharth, Chen, Hsinchun

    “…Social networks evolve over time with the addition and removal of nodes and links to survive and thrive in their environments. Previous studies have shown that…”
    Get full text
    Journal Article
  13. 13

    Evaluating Link-Based Techniques for Detecting Fake Pharmacy Websites by Abbasi, Ahmed, Kaza, Siddharth, Zahedi, F. Mariam

    Published 27-09-2013
    “…Fake online pharmacies have become increasingly pervasive, constituting over 90% of online pharmacy websites. There is a need for fake website detection…”
    Get full text
    Journal Article
  14. 14

    Using importance flooding to identify interesting networks of criminal activity by Marshall, Byron, Chen, Hsinchun, Kaza, Siddharth

    “…Effectively harnessing available data to support homeland‐security‐related applications is a major focus in the emerging science of intelligence and security…”
    Get full text
    Journal Article
  15. 15

    Exploratory experiments to identify fake websites by using features from the network stack by Koepke, Jason, Kaza, Siddharth, Abbasi, Ahmed

    “…Users on the web are unknowingly becoming more susceptible to scams from cyber deviants and malicious websites. There has been much work in the identification…”
    Get full text
    Conference Proceeding
  16. 16

    Dynamic Social Network Analysis of a Dark Network: Identifying Significant Facilitators by Kaza, Siddharth, Hu, Daning, Chen, Hsinchun

    “…"Dark Networks" refer to various illegal and covert social networks like criminal and terrorist networks. These networks evolve over time with the formation…”
    Get full text
    Conference Proceeding
  17. 17

    Using burst detection techniques to identify suspicious vehicular traffic at border crossings by Kaza, Siddharth, Lu, Hsin-Min, Zeng, Daniel, Chen, Hsinchun

    “…Border safety is a critical part of national and international security. The Department of Homeland Security (DHS) searches vehicles entering the country at…”
    Get full text
    Conference Proceeding
  18. 18

    The Arizona IDMatcher: A Probabilistic Identity Matching System by Wang, G. Alan, Kaza, Siddharth, Joshi, Shailesh, Chang, Kris, Atabakhsh, Homa, Chen, Hsinchun

    “…Various law enforcement and intelligence tasks require managing identity information in an effective and efficient way. However, the quality issues of identity…”
    Get full text
    Conference Proceeding
  19. 19

    Target vehicle identification for border safety using mutual information by Kaza, S., Tao Wang, Gowda, H., Hsinchun Chen

    “…The security of border and transportation systems is a critical component of the national strategy for homeland security. The security concerns at the border…”
    Get full text
    Conference Proceeding
  20. 20

    Identification of deliberately doctored text documents using frequent keyword chain (FKC) model by Kaza, S., Murthy, S.N.J., Gongzhu Hu

    “…Text documents have always been the most dominant source of data available. A number of classification techniques are used to organize these documents and a…”
    Get full text
    Conference Proceeding