- Misinformation and Its Impacts
- Public Relations and Crisis Communication
- Network Security and Intrusion Detection
- Smart Grid Security and Resilience
- Advanced Malware Detection Techniques
- Disaster Management and Resilience
- Information and Cyber Security
- Complex Network Analysis Techniques
- Opinion Dynamics and Social Influence
- Spam and Phishing Detection
- Crime Patterns and Interventions
- Privacy, Security, and Data Protection
- COVID-19 Digital Contact Tracing
- Gun Ownership and Violence Research
- Knowledge Management and Sharing
- Consumer Market Behavior and Pricing
- Forecasting Techniques and Applications
- Digital Marketing and Social Media
- Cybercrime and Law Enforcement Studies
- Sentiment Analysis and Opinion Mining
- Computational and Text Analysis Methods
The University of Texas at San Antonio
2018-2022
University of Portland
2021-2022
Integrating the internet of things (IoT) in medical applications has significantly improved healthcare operations and patient treatment activities. Real-time monitoring remote diagnostics allow physician to serve more patients save human lives using (IoMT) technology. However, IoMT devices are prone cyber attacks, security privacy have been a concern. The operate on low computing memory, implementing technology is not feasible. In this article, we propose particle swarm optimization deep...
People all over the world were under severe stress and concerned about their health after a devastating pandemic struck in form of novel coronavirus disease (COVID-19) late December 2019. Many nations imposed strict lockdowns quarantines, causing citizens to maintain social isolation, throwing many companies halt. Thousands people took Twitter during these challenging circumstances express feelings being caught middle storm. witnessed an outpouring emotions ranging from fear, anger, sadness...
In the current era of digital devices, concerns over data privacy and security breaches are rampant. Understanding these by analyzing messages posted on social media from linguistic perspective has been a challenge that is increasing in complexity as number sites increase volume increases. We investigate diffusion characteristics information attributed to breach messages, first based literary aspects message second, we build network users who directly involved spreading messages. found...
The cyber-physical system (CPS) has made tremendous progress in recent years and also disrupting technical fields ranging from health, transportation, industries, more. However, CPS security is still one of the concerns for wide adoption owing to high number devices connecting internet traditional solutions may not be suitable protect advanced, application-specific attacks. This paper presents a programmable device network layer architecture combat attacks efficient monitoring heterogeneous...
In the United States and around world, gun violence has become a long-standing public safety concern security threat, due to violent gun-related crimes, injuries, fatalities. Although legislators lawmakers have attempted mitigate its threats through legislation, research on confirms need for comprehensive approach prevention. This entails addressing problem in as many ways possible, such new technological advancements, re-engineering supply, administrative protocols, among others. The...
Abstract During emergency situations, a quick and concise summary from the deluge of messages improves “situation awareness” enables informed decisions. However, this is challenging due to volume, variety, veracity information. Grounded in Situation Awareness Theory, study presents streamlined protocol process millions social media render them an easily comprehensible format for various stakeholders gain deeper insights. Specifically, using design science approach, we develop set artifacts...
Customer reviews often include comparative comments on competing products. Adopting the "The Strength of Weak Ties" theory, we build a product social network around “strong tie” and “weak entities. By performing text mining customer collected from Amazon, successfully identify strong weak ties in compute strength these ties. Utilizing properties, generate graphs based different features discover underlying competitive relationships among them. In particular, our regression analysis shows...
Polarization, which refers to the formation of two opposing groups based on users' beliefs and opinions, has a growing body literature. However, social media polarization differs from offline in that change almost instantaneously as result events unfolding. We investigate uses communication resulted polarized opinions among individuals prior to, during, after January 6th Capitol riots. Analyses dominant narratives Twitter surrounding incident reveal high level throughout unfolding event,...
Cyber-Physical System (CPS) has made a tremendous progress in recent years and also disrupted many technical fields such as smart industries, health, transportation etc. to flourish the nations economy. However, CPS Security is still one of concerns for wide adoption owing high number devices connecting internet traditional security solutions may not be suitable protect advanced, application specific attacks. This paper presents programmable device network layer architecture combat attacks...