Top Tier Publications
-
Cybersecurity of Energy SystemsKumar, S., Tripathi, K., and Das, S. (2025)in Method of Process Systems in Energy Systems: Emerging Energy Systems Part II. 1st edn. [Volume 9]. Available at: Elsevier
-
From Process Design to Control: Advancing Instrumented Energy Systems for Sustainable and Efficient OperationsBang, M., Gupta, A., Kumar, S. and Tripathi, K. (2025)in Method of Process Systems in Energy Systems: Emerging Energy Systems Part II. 1st edn. [Volume 9]. Available at: Elsevier
-
Demystifying the Perceptions Gap Between Designers and Practitioners in Two Security StandardsKumar, S., Crowe, E., and Gu, G. (2025)10th IEEE European Symposium on Security and Privacy (Euro S&P), Venice, Italy, 1-5 July 2025
-
Incentivizing Security Excellence in Cyber Liability InsuranceKumar, S., Dewitte, P., and Gu, G. (2025)10th IEEE European Symposium on Security and Privacy (Euro S&P), Venice, Italy, 1-5 July 2025
-
Enhancing Government Efficiency Through Cybersecurity HardeningKumar, S., Garg, A., and Niranjan, M. (2025)26th Annual International Conference on Digital Government Research (dg.o), Porto Alegre City, Brazil, 9-12 June 2025
-
Cyber Security Kill Chain – Tactics and Strategies (Book)Nagar, G. and Kumar, S. (2025)Packt Publishers, Birmingham, UK, June 2025
-
Are the Processing Facilities Safe and Secured Against Cyber Threats?Arunthavanathan, R., Khan, F., Sajid, Z., Amin, T., Kota, R., and Kumar, S. (2025)Reliability Engineering & System Safety, Elsevier, Volume 258, Article 111011, June 2025
-
The SUCCESS Framework For SMBs: Bridging Perceptions, Incentives, And Trust For Usable CybersecurityKumar, S. (2025)Ph.D. Thesis, Texas A&M University
Other Publications
2025
-
Artistic Intelligence: Comparing Human And AI-Generated Art Through Perception And AI Analysis"Kumar, S., Jha, A., and Nigam, A. (2025)5th International Conference on AI Research (ICAIR), Genoa, Italy, 11-12 Dec 2025
-
Adaptive AI Sentinels Against Phishing Attacks: Democratizing Cybersecurity through Interactive LearningKumar, S., Pagaria, R., Xiong, J. and Huang, R.(2025)5th International Conference on AI Research (ICAIR), Genoa, Italy, 11-12 Dec 2025
-
The Ethics and Security Risks of AI Notetakers in the WorkplaceMcCarthy, J., Sax, S., Ishio, J., Gonzalez, J. and Kumar, S. (2025)5th International Conference on AI Research (ICAIR), Genoa, Italy, 11-12 Dec 2025
-
Seeds of Deception: Securing AI-Driven Agriculture Against Adversarial ThreatsBhat, R., and Kumar, S. (2025)5th International Conference on AI Research (ICAIR), Genoa, Italy, 11-12 Dec 2025
-
AGS-INTEL: Authentic & Granular Source for Data Breach IntelligenceKumar, S., Parthasarathi, A., and Cho, S. (2025)5th International Conference on AI Research (ICAIR), Genoa, Italy, 11-12 Dec 2025
-
Preliminary Study of TexAI: Where Adaptive AI Reimagines Law Enforcement TrainingKumar, S., Vohra, C., Rai, M, and Singh, A. (2025)5th International Conference on AI Research (ICAIR), Genoa, Italy, 11-12 Dec 2025
-
AI and Differential Privacy in African PoliticsKumar, S., Gadia, R., and Mordi., A (2025)5th International Conference on AI Research (ICAIR), Genoa, Italy, 11-12 Dec 2025
-
Cracking the Chip: AI-Powered Security for Semiconductor ThreatsKumar, S., Oruganti, S., and Virk, I. (2025)5th International Conference on AI Research (ICAIR), Genoa, Italy, 11-12 Dec 2025
-
Cyber Threats to Nuclear Safety: Game Theory Strategies for Enhanced DeterrenceKumar, S., Yim, M., Agarwal, A., Garg, A., and Bhatnagar, D. (2025)24th European Conference on Cyber Warfare and Security (ECCWS), Kaiserslautern, Germany, 26-27 June 2025
-
Quantum Apocalypse: Fortifying Critical Infrastructure in the Age of Cyber WarfareKumar, S., Klappenecker, A., Brown, G., and Saravanan, S. (2025)24th European Conference on Cyber Warfare and Security (ECCWS), Kaiserslautern, Germany, 26-27 June 2025
-
NATO Self-Defense – Is Article 5 the Right Framework for Responding to Sub-kinetic Cyber Aggression?Kumar, S., Brown, G., Ragavan, S., Cerrato, M., and Nagar, G. (2025)24th European Conference on Cyber Warfare and Security (ECCWS), Kaiserslautern, Germany, 26-27 June 2025
-
Building Trust in Smart TVs: AI-Enhanced Cybersecurity for Privacy and Ethical MonetizationSingh, N., Kumar, S., Singh, T., and Kumar, P. (2025)24th European Conference on Cyber Warfare and Security (ECCWS), Kaiserslautern, Germany, 26-27 June 2025
-
Securing the Skies: Innovating Cybersecurity Governance for India’s Emerging Small AirportsKumar, S., Gangwar, S.P., Singh, N., and Pagaria, R., Garg, A. (2025)24th European Conference on Cyber Warfare and Security (ECCWS), Kaiserslautern, Germany, 26-27 June 2025
-
Impact of AI in Social Media: Addressing Cyber Crimes and Gender DynamicsKumar, S., Menezes, A., Agrawal, G., Bajaj, N., Naren, M., and Jindal, S. (2025)12th European Conference on Social Media (ECSM), Porto, Portugal, 22-23 May 2025
-
Humanizing Cyber War: Proposal for a Geneva Convention Equivalent for Cyber WarfareKumar, S., Niranjan, M., Nagar, G., Tripathi, K., and Peddoju, S. (2025)20th International Conference on Cyber Warfare and Security (ICCWS), Williamsburg, VA, 28-29 March 2025
-
AI-Driven Cybersecurity Strategies for ISPs: Balancing Threat Mitigation and MonetizationSingh, N., and Kumar, S. (2025)20th International Conference on Cyber Warfare and Security (ICCWS), Williamsburg, VA, 28-29 March 2025
2024
-
What The Phish! Effects of AI on Phishing Attacks and DefenceKumar, S., Menezes, A., Giri, S., and Kotikela, S. (2024)4th International Conference on AI Research (ICAIR), Lisbon, Portugal
-
Blockchain Applications for Cyber Liability InsuranceKumar, S., Kocian, L., and Loo, L. (2024)International Journal on Cybernetics & Informatics (IJCI), Volume 13, No.5, p.119–139, October 2024
-
Threat Modeling for Cyber Warfare Against Less Cyber-dependent AdversariesKumar, S., and Nagar, G. (2024)23rd European Conference on Cyber Warfare and Security (ECCWS), Jyväskylä, Finland, 27-28 June 2024
Research In Progress
-
Lack of Trust is Killing Zero Trust: A Practitioner-centric StudyKumar, S., Huang, J., and Gu, G. (2025)Annual Computer Security Applications Conference (ACSAC), December 2025, Honolulu, Hawaii, USA (submitted)
-
Cybersecurity Bridges The Gap: Safeguarding Infrastructure From Compromised Cargo VesselsKumar, S., Girimaji, S., Koola, P., and Spahiu, A. (2025)University R&D Showcase, Offshore Technology Conference (OTC 2025), Houston, TX, USA (accepted)
-
Cyber-Chemical Terrorism: The Convergence of Cyber Warfare and Chemical ThreatsKumar, S., Bajaj, N., Tripathi, K., and Rana, R. (2025)Journal of Information Warfare (abstract accepted)
-
Resilience Under Fire: An Information Systems Framework for SME Cybersecurity Amid Kinetic and Cyber AggressionKumar, S., Honcharenko, S., Das, S., and Mendoza, A. (2025)MIS Quarterly (manuscript submitted)
-
AI powered Insider Threat Detection AlgorithmBajaj, N., and Kumar, S. (2025)(in progress)
-
Enhancing Blockchain Enabled Resilience in the U.S. Beef Supply ChainVeetil, V., Kaniyamattam, K., and Kumar, S. (2025)(in progress)
-
Legal Framework for Space Mining: A Strategic Blueprint for Texas and U.S. LeadershipKumar, S., Brown, G., and Ragavan, S. (2025)(in progress)
-
Understanding the Trends and Evolution of Mobile Software Vulnerabilities: A Ten-Year RetrospectiveMendoza, A., Kumar, S., Alvarez, A., and Garg, A. (2025)(in progress)
-
Transforming Healthcare with AI: Security and Privacy in Remote AI-Enabled StethoscopesKumar, S., Glenwinkel, W., and Singh, A. (2025)TechConnect World Innovation Conference, June 9–10, Austin, Texas (abstract accepted, Winner: Best Student Abstract Award)
-
Talk the Talk and Walk the Walk: A User and Data-Centric Approach to Understanding and Improving Security OperationsKumar, S., Crowe, E., and Gu, G. (2025)(in progress)
-
The Psychology of Password Negligence: Examining Present Bias and Hyperbolic Discounting in Personal Cybersecurity HabitsCrowe, E., Ghosh, P., Kumar, S., and Gu, G. (2025)(in progress)
-
Cyberbiosecurity: Safeguarding Biological Data and Systems in the Digital AgeDaruka, A., Nigam, A., and Kumar, S. (2025)WiCyS 2025 Conference, April 2–5, Dallas, TX (poster accepted)
-
Scaling Mentorship with AI: Transforming Student Support for Holistic DevelopmentKumar, S., and Garg, A. (2025)(in progress)
-
AI-Driven Detection and Prevention of Gender-Based Bullying in eSportsKumar, S., Agrawal, G., Menezes, A., Hoyt, G., and Bajaj, N. (2025)(in progress)
-
Ransomware and Cyber Liability Insurance: Business Risks and ComplexityKumar, S., and Kumar, A. (2025)(in progress)
-
AI-Augmented Web Vulnerability Detection: Bridging Static Analysis and Live Attack Simulation for Critical System DefenseKumar, S., and Niranjan, M. (2025)(in progress)