Naga Vemprala

ORCID: 0000-0002-8141-3274
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Misinformation and Its Impacts
  • Public Relations and Crisis Communication
  • Network Security and Intrusion Detection
  • Smart Grid Security and Resilience
  • Advanced Malware Detection Techniques
  • Disaster Management and Resilience
  • Information and Cyber Security
  • Complex Network Analysis Techniques
  • Opinion Dynamics and Social Influence
  • Spam and Phishing Detection
  • Crime Patterns and Interventions
  • Privacy, Security, and Data Protection
  • COVID-19 Digital Contact Tracing
  • Gun Ownership and Violence Research
  • Knowledge Management and Sharing
  • Consumer Market Behavior and Pricing
  • Forecasting Techniques and Applications
  • Digital Marketing and Social Media
  • Cybercrime and Law Enforcement Studies
  • Sentiment Analysis and Opinion Mining
  • Computational and Text Analysis Methods

The University of Texas at San Antonio
2018-2022

University of Portland
2021-2022

Integrating the internet of things (IoT) in medical applications has significantly improved healthcare operations and patient treatment activities. Real-time monitoring remote diagnostics allow physician to serve more patients save human lives using (IoMT) technology. However, IoMT devices are prone cyber attacks, security privacy have been a concern. The operate on low computing memory, implementing technology is not feasible. In this article, we propose particle swarm optimization deep...

10.3390/su141912828 article EN Sustainability 2022-10-08

People all over the world were under severe stress and concerned about their health after a devastating pandemic struck in form of novel coronavirus disease (COVID-19) late December 2019. Many nations imposed strict lockdowns quarantines, causing citizens to maintain social isolation, throwing many companies halt. Thousands people took Twitter during these challenging circumstances express feelings being caught middle storm. witnessed an outpouring emotions ranging from fear, anger, sadness...

10.1177/00027642211050901 article EN cc-by American Behavioral Scientist 2021-10-25

In the current era of digital devices, concerns over data privacy and security breaches are rampant. Understanding these by analyzing messages posted on social media from linguistic perspective has been a challenge that is increasing in complexity as number sites increase volume increases. We investigate diffusion characteristics information attributed to breach messages, first based literary aspects message second, we build network users who directly involved spreading messages. found...

10.24251/hicss.2019.862 article EN cc-by-nc-nd Proceedings of the ... Annual Hawaii International Conference on System Sciences/Proceedings of the Annual Hawaii International Conference on System Sciences 2019-01-01

The cyber-physical system (CPS) has made tremendous progress in recent years and also disrupting technical fields ranging from health, transportation, industries, more. However, CPS security is still one of the concerns for wide adoption owing to high number devices connecting internet traditional solutions may not be suitable protect advanced, application-specific attacks. This paper presents a programmable device network layer architecture combat attacks efficient monitoring heterogeneous...

10.4018/ijsst.2021070103 article EN International Journal of Smart Security Technologies 2021-07-01

In the United States and around world, gun violence has become a long-standing public safety concern security threat, due to violent gun-related crimes, injuries, fatalities. Although legislators lawmakers have attempted mitigate its threats through legislation, research on confirms need for comprehensive approach prevention. This entails addressing problem in as many ways possible, such new technological advancements, re-engineering supply, administrative protocols, among others. The...

10.1145/3571290 article EN ACM Transactions on Management Information Systems 2022-11-14

Abstract During emergency situations, a quick and concise summary from the deluge of messages improves “situation awareness” enables informed decisions. However, this is challenging due to volume, variety, veracity information. Grounded in Situation Awareness Theory, study presents streamlined protocol process millions social media render them an easily comprehensible format for various stakeholders gain deeper insights. Specifically, using design science approach, we develop set artifacts...

10.1111/deci.12527 article EN Decision Sciences 2021-05-26

Customer reviews often include comparative comments on competing products. Adopting the "The Strength of Weak Ties" theory, we build a product social network around “strong tie” and “weak entities. By performing text mining customer collected from Amazon, successfully identify strong weak ties in compute strength these ties. Utilizing properties, generate graphs based different features discover underlying competitive relationships among them. In particular, our regression analysis shows...

10.24251/hicss.2019.283 article EN cc-by-nc-nd Proceedings of the ... Annual Hawaii International Conference on System Sciences/Proceedings of the Annual Hawaii International Conference on System Sciences 2019-01-01

Polarization, which refers to the formation of two opposing groups based on users' beliefs and opinions, has a growing body literature. However, social media polarization differs from offline in that change almost instantaneously as result events unfolding. We investigate uses communication resulted polarized opinions among individuals prior to, during, after January 6th Capitol riots. Analyses dominant narratives Twitter surrounding incident reveal high level throughout unfolding event,...

10.24251/hicss.2023.297 article EN Proceedings of the ... Annual Hawaii International Conference on System Sciences/Proceedings of the Annual Hawaii International Conference on System Sciences 2023-01-01

Cyber-Physical System (CPS) has made a tremendous progress in recent years and also disrupted many technical fields such as smart industries, health, transportation etc. to flourish the nations economy. However, CPS Security is still one of concerns for wide adoption owing high number devices connecting internet traditional security solutions may not be suitable protect advanced, application specific attacks. This paper presents programmable device network layer architecture combat attacks...

10.48550/arxiv.2102.00647 preprint EN cc-by arXiv (Cornell University) 2021-01-01
Coming Soon ...