2025 Publications
-
Demystifying the Perceptions Gap Between Designers and Practitioners in Two Security StandardsKumar, S., Crowe, E., and Gu, G. (2025)10th IEEE European Symposium on Security and Privacy (Euro S&P 2025), Venice, Italy
-
Incentivizing Security Excellence in Cyber Liability InsuranceKumar, S., Dewitte, P., and Gu, G. (2025)10th IEEE European Symposium on Security and Privacy (Euro S&P 2025), Venice, Italy
-
Cyber Threats to Nuclear Safety: Game Theory Strategies for Enhanced DeterrenceKumar, S., Yim, M., Agarwal, A., Garg, A., and Bhatnagar, D. (2025)24th European Conference on Cyber Warfare and Security (ECCWS), 26-27 June, Kaiserslautern, Germany
-
Quantum Apocalypse: Fortifying Critical Infrastructure in the Age of Cyber WarfareKumar, S., Klappenecker, A., Brown, G., and Saravanan, S. (2025)24th European Conference on Cyber Warfare and Security (ECCWS), 26-27 June, Kaiserslautern, Germany
-
NATO Self-Defense – Is Article 5 the Right Framework for Responding to Sub-kinetic Cyber Aggression?Kumar, S., Brown, G., Ragavan, S., Cerrato, M., and Nagar, G. (2025)24th European Conference on Cyber Warfare and Security (ECCWS), 26-27 June, Kaiserslautern, Germany
-
Building Trust in Smart TVs: AI-Enhanced Cybersecurity for Privacy and Ethical MonetizationSingh, N., Kumar, S., Singh, T., and Kumar, P. (2025)24th European Conference on Cyber Warfare and Security (ECCWS), 26-27 June, Kaiserslautern, Germany
-
Securing the Skies: Innovating Cybersecurity Governance for India’s Emerging Small AirportsKumar, S., Gangwar, S.P., Singh, N., and Pagaria, R., Garg, A. (2025)24th European Conference on Cyber Warfare and Security (ECCWS), 26-27 June, Kaiserslautern, Germany
-
Enhancing Government Efficiency Through Cybersecurity HardeningKumar, S., Garg, A., and Niranjan, M. (2025)26th Annual International Conference on Digital Government Research – dg.o, Porto Alegre City, Brazil
-
Cyber Security Kill Chain – Tactics and Strategies (Book)Nagar, G. and Kumar, S. (2025)Packt Publishers, Birmingham, UK
-
Impact of AI in Social Media: Addressing Cyber Crimes and Gender DynamicsKumar, S., Menezes, A., Agrawal, G., Bajaj, N., Naren, M., and Jindal, S. (2025)12th European Conference on Social Media (ECSM), Porto, Portugal
-
Humanizing Cyber War: Proposal for a Geneva Convention Equivalent for Cyber WarfareKumar, S., Niranjan, M., Nagar, G., Tripathi, K., and Peddoju, S. (2025)ICCWS 2025, Williamsburg, VA
-
AI-Driven Cybersecurity Strategies for ISPs: Balancing Threat Mitigation and MonetizationSingh, N., and Kumar, S. (2025)ICCWS 2025, Williamsburg, VA
-
Are the Processing Facilities Safe and Secured Against Cyber Threats?Arunthavanathan, R., Khan, F., Sajid, Z., Amin, T., Kota, R., and Kumar, S. (2025)*Reliability Engineering & System Safety*, Elsevier, Vol 258, June 2025, p.111011
2024 Publications
-
What The Phish! Effects of AI on Phishing Attacks and DefenceKumar, S., Menezes, A., Giri, S., and Kotikela, S. (2024)4th International Conference on AI Research (ICAIR), Lisbon, Portugal
-
Blockchain Applications for Cyber Liability InsuranceKumar, S., Kocian, L., and Loo, L. (2024)*International Journal on Cybernetics & Informatics (IJCI)*, Vol.13, No.5, October 2024, pp.119–139
-
Threat Modeling for Cyber Warfare Against Less Cyber-dependent AdversariesKumar, S., and Nagar, G. (2024)ECCWS 2024, Finland
Research In Progress
-
SUCCESS: A First Step Towards Usable Security Standards for Small BusinessesKumar, S., Mitrani, A., and Gu, G. (2025)Annual Computer Security Applications Conference (ACSAC), December 2025, Honolulu, Hawaii, USA (submitted)
-
Lack of Trust is Killing Zero Trust: A Practitioner-centric StudyKumar, S., Huang, J., and Gu, G. (2025)Annual Computer Security Applications Conference (ACSAC), December 2025, Honolulu, Hawaii, USA (submitted)
-
Cybersecurity Bridges The Gap: Safeguarding Infrastructure From Compromised Cargo VesselsKumar, S., Girimaji, S., Koola, P., and Spahiu, A. (2025)University R&D Showcase, Offshore Technology Conference (OTC 2025), Houston, TX, USA (accepted)
-
Cyber-Chemical Terrorism: The Convergence of Cyber Warfare and Chemical ThreatsKumar, S., Bajaj, N., Tripathi, K., and Rana, R. (2025)Journal of Information Warfare (abstract accepted)
-
Resilience Under Fire: An Information Systems Framework for SME Cybersecurity Amid Kinetic and Cyber AggressionKumar, S., Honcharenko, S., Das, S., and Mendoza, A. (2025)MIS Quarterly (manuscript submitted)
-
AI powered Insider Threat Detection AlgorithmBajaj, N., and Kumar, S. (2025)(in progress)
-
Enhancing Blockchain Enabled Resilience in the U.S. Beef Supply ChainVeetil, V., Kaniyamattam, K., and Kumar, S. (2025)(in progress)
-
Legal Framework for Space Mining: A Strategic Blueprint for Texas and U.S. LeadershipKumar, S., Brown, G., and Ragavan, S. (2025)(in progress)
-
AI powered Nuclear SecurityKumar, S., Garg, A., and Niranjan, M. (2025)(in progress)
-
Securing Privacy in AI Algorithms: Addressing Gender Bias in Social MediaKumar, S., Garg, A., Menezes, A., Agrawal, G., Niranjan, M., and Das, R. (2025)(in progress)
-
Understanding the Trends and Evolution of Mobile Software Vulnerabilities: A Ten-Year RetrospectiveMendoza, A., Kumar, S., Alvarez, A., and Garg, A. (2025)(in progress)
-
Transforming Healthcare with AI: Security and Privacy in Remote AI-Enabled StethoscopesKumar, S., Glenwinkel, W., and Singh, A. (2025)TechConnect World Innovation Conference, June 9–10, Austin, Texas (abstract accepted, Winner: Best Student Abstract Award)
-
Talk the Talk and Walk the Walk: A User and Data-Centric Approach to Understanding and Improving Security OperationsKumar, S., Crowe, E., and Gu, G. (2025)(in progress)
-
The Psychology of Password Negligence: Examining Present Bias and Hyperbolic Discounting in Personal Cybersecurity HabitsCrowe, E., Ghosh, P., Kumar, S., and Gu, G. (2025)(in progress)
-
Cyberbiosecurity: Safeguarding Biological Data and Systems in the Digital AgeDaruka, A., Nigam, A., and Kumar, S. (2025)WiCyS 2025 Conference, April 2–5, Dallas, TX (poster accepted)
-
Scaling Mentorship with AI: Transforming Student Support for Holistic DevelopmentKumar, S., and Garg, A. (2025)(in progress)
-
AI-Driven Detection and Prevention of Gender-Based Bullying in eSportsKumar, S., Agrawal, G., Menezes, A., Hoyt, G., and Bajaj, N. (2025)(in progress)
-
Ransomware and Cyber Liability Insurance: Business Risks and ComplexityKumar, S., and Kumar, A. (2025)(in progress)
-
Adaptive AI Sentinels Against Phishing Attacks: Democratizing Cybersecurity through Interactive LearningKumar, S., Pagaria, R., and Xiong, J. (2025)(in progress)
-
AI-Augmented Web Vulnerability Detection: Bridging Static Analysis and Live Attack Simulation for Critical System DefenseKumar, S., and Niranjan, M. (2025)(in progress)