Social sensitivity and classroom team projects: an empirical investigation L Bender, G Walia, K Kambhampaty, KE Nygard, TE Nygard Proceedings of the 43rd ACM technical symposium on Computer Science …, 2012 | 41 | 2012 |
Deception in Cyberspace: Performance Focused Con Resistant Trust Algorithm MM Chowdhury, KE Nygard, K Kambhampaty, M Alruwaythi The 4th Annual Conference on Computational Science & Computational …, 2017 | 30 | 2017 |
Social sensitivity correlations with the effectiveness of team process performance: An empirical study L Bender, G Walia, K Kambhampaty, KE Nygard, TE Nygard Proceedings of the ninth annual international conference on International …, 2012 | 30 | 2012 |
Cybersecurity Materials for K-12 Education KE Nygard, MM Chowdhury, K Kambhampaty, P Kotala | 19 | 2018 |
Trust and its Influence on Technology K Kambhampaty, M Alruwaythi, MM Chowdhury, KE Nygard Midwest Instruction and Computing Symposium April 2019, 2019 | 12 | 2019 |
Identifying Malicious Users Through Behavior K Kambhampaty, M Alruwaythi, MM Chowdhury, KE Nygard Midwest Instruction and Computing Symposium, 2019 | 11 | 2019 |
Honeypots: Security by Deceiving Threats J LaBar, MM Chowdhury, M Jochen, K Kambhampaty Midwest Instruction and Computing Symposium, 2019 | 10 | 2019 |
Cloud Security: Challenges, Attacks, and Techniques J Hanley, MM Chowdhury, M Jochen, K Kambhampaty Midwest Instruction and Computing Symposium, 2019 | 10 | 2019 |
IoT Security for Smart Home: Issues and Solutions I Antzoulis, M Chowdhury, S Latif, K Kambhampaty 2022 IEEE International Conference on Electro Information Technology (EIT), 2022 | 9 | 2022 |
Permissionless reputation‐based consensus algorithm for blockchain J Bou Abdo, R El Sibai, K Kambhampaty, J Demerjian Internet Technology Letters 3 (3), e151, 2020 | 9 | 2020 |
Password Security: What Are We Doing Wrong? D Davis, MM Chowdhury, K Kambhampaty 2022 IEEE International Conference on Electro Information Technology (EIT), 2022 | 8 | 2022 |
Card Skimming: A Cybercrime by Hackers K Guers, K Kambhampaty, MM Chowdhury 2022 IEEE International Conference on Electro Information Technology (EIT), 2022 | 8 | 2022 |
Strategies for Teaching Ideation and Ethics in Computer Science KE Nygard, L Bender, G Walia, K Brooks, K Kambhampaty, TE Nygard Proceedings of the International Conference on Frontiers in Education …, 2012 | 8 | 2012 |
Security Issues of SCADA Systems E Ciaravino, MM Chowdhury, M Jochen, K Kambhampaty Midwest Instruction and Computing Symposium, 2019 | 7 | 2019 |
User Behavior and Trust Evaluation in Cloud Computing M Alruwaythi, K Kambhampaty, KE Nygard International Society for Computers and their Application, 2019 | 6 | 2019 |
User behavior trust modeling in cloud security M Alruwaythi, K Kambampaty, K Nygard 2018 International Conference on Computational Science and Computational …, 2018 | 5 | 2018 |
Detecting Insider and Masquerade Attacks by Identifying Malicious User Behavior and Evaluating Trust in Cloud Computing and IoT Devices K Kambhampaty North Dakota State University, 2019 | 3 | 2019 |
Social Sensitivity Correlations with the Effectiveness of Team Process Performance: An Empirical Study.(2012) L Bender, G Walia, K Kambhampaty, KE Nygard, TE Nygard | 3 | 2012 |
Computational Trust for Securing IoT J Ortiz, MM Chowdhury, K Kambhampaty 2022 IEEE International Conference on Electro Information Technology (EIT), 2022 | 2 | 2022 |
Bitcoin: Cryptographic Algorithms, Security Vulnerabilities and Mitigations T Kowalski, MM Chowdhury, S Latif, K Kambhampaty 2022 IEEE International Conference on Electro Information Technology (eIT …, 2022 | 2 | 2022 |