default search action
Subrata Acharya
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c32]Sonal Dekhane, Subrata Acharya:
Research Expansion and Infrastructure Investment for Capacity Building. SIGCSE (2) 2024: 1895 - 2023
- [c31]Jumoke Ladeji-Osias, Huihui Wang, Abiodun Ilumoka, Christine Grant, Alexandra Medina-Borja, Subrata Acharya, Elsa Gonzalez, Sonal Dekhane, Matthew Verleger:
Workshop: Preparing Competitive NSF Proposals of Engineering and Computing Education. FIE 2023: 1-4 - 2020
- [j5]Alexis R. Neigel, Victoria L. Claypoole, Grace E. Waldfogle, Subrata Acharya, Gabriella M. Hancock:
Holistic cyber hygiene education: Accounting for the human factors. Comput. Secur. 92: 101731 (2020) - [j4]Camden Thatcher, Subrata Acharya:
RxBlock: Towards the design of a distributed immutable electronic prescription system. Netw. Model. Anal. Health Informatics Bioinform. 9(1): 58 (2020)
2010 – 2019
- 2019
- [c30]Michelle Bowman, Subrata Acharya:
Risk assessment of pharmacies & electronic prescriptions. ASONAM 2019: 641-644 - [c29]Maria Camila Rivera Serna, Subrata Acharya:
FastestER: a web application to enable effective emergency department service. ASONAM 2019: 645-648 - [c28]Gretchen Hook-Podhorniak, Subrata Acharya:
Effectual Emergency Severity Adaptation for Improved Triage Care Operations. BIBM 2019: 2628-2633 - [c27]Zakina McGee, Subrata Acharya:
Security Analysis of OpenEMR. BIBM 2019: 2655-2660 - [c26]Niya Werts, Subrata Acharya:
A Framework for Enhancing Health Information Data Security: Application of the Consolidated Framework for Implementation Research to Breach Analysis. HCI (33) 2019: 219-224 - 2018
- [c25]Poornima Patel, Subrata Acharya:
Signaling System 7: Limitations and Resolutions. ANTS 2018: 1-6 - [c24]Camden Thatcher, Subrata Acharya:
Pharmaceutical uses of Blockchain Technology. ANTS 2018: 1-6 - [c23]Karen Kemp, Subrata Acharya:
Towards the Design of a Forensic Tool for Mobile Data Visualization. HCI (13) 2018: 462-470 - 2017
- [j3]Subrata Acharya, Reza Sarraf:
A novel preventative solution for effective asthma management: a practical evaluation. Netw. Model. Anal. Health Informatics Bioinform. 6(1): 15 (2017) - [c22]Subrata Acharya, Omotayo Victor Imani:
A novel resource management approach for paramedic triage systems. BIBM 2017: 836-839 - [c21]Subrata Acharya, Yuehan Yin, Alexander Mak:
Towards the design of a secure and compliant framework for OpenEMR. BIBM 2017: 992-999 - [c20]Subrata Acharya, Anoli Patel:
Towards the design of a comprehensive data de-identification solution. BIBM 2017: 1554-1561 - 2016
- [c19]Subrata Acharya, Gabriel Susai, Kelly M. Elkins:
Towards the Design of a Cross Platform Solution for Efficient Colorimetric Tests. HCI (27) 2016: 295-300 - [c18]Ziying Tang, Jin Guo, Sheng Miao, Subrata Acharya, Jinjuan Heidi Feng:
Ambient Intelligence Based Context-Aware Assistive System to Improve Independence for People with Autism Spectrum Disorder. HICSS 2016: 3339-3348 - 2015
- [c17]Subrata Acharya, Reza Sarraf:
An automated approach to conduct effective on-site presumptive drug tests. BIBE 2015: 1-6 - [c16]Subrata Acharya, William Glenn, Matthew Carr:
A GRReat framework for incident response in healthcare. BIBM 2015: 776-778 - [c15]Subrata Acharya, Gabriel Susai, Manoj Pillai:
Patient portals: Anytime, anywhere. BIBM 2015: 779-781 - [c14]Subrata Acharya, Branden Ehrenreich, James Marciniak:
OWASP inspired mobile security. BIBM 2015: 782-784 - 2014
- [j2]Jason C. Cohen, Subrata Acharya:
Towards a trusted HDFS storage platform: Mitigating threats to Hadoop infrastructures using hardware-accelerated encryption with TPM-rooted key protection. J. Inf. Secur. Appl. 19(3): 224-244 (2014) - [c13]Subrata Acharya, Reza Sarraf:
Proactive Real-Time Solution for Asthma Management. BIBE 2014: 270-276 - [c12]Subrata Acharya, Brian Coats, Arpit Saluja, Dale Fuller:
From Regulations to Practice: Achieving Information Security Compliance in Healthcare. HCI (24) 2014: 209-220 - [c11]Brian Coats, Subrata Acharya:
Bridging Electronic Health Record Access to the Cloud. HICSS 2014: 2948-2957 - 2013
- [c10]Brian Coats, Subrata Acharya:
The forecast for electronic health record access: partly cloudy. ASONAM 2013: 937-942 - [c9]Subrata Acharya:
SP-CIP: A Secure and Privacy Aware Patient Centric Information Portal. HCI (3) 2013: 3-9 - [c8]Brian Coats, Subrata Acharya:
Achieving Electronic Health Record Access from the Cloud. HCI (2) 2013: 26-35 - [c7]Subrata Acharya, Brian Coats, Arpit Saluja, Dale Fuller:
Secure Electronic Health Record Exchange: Achieving the Meaningful Use Objectives. HICSS 2013: 2555-2564 - [p1]Subrata Acharya:
Accelerating Firewalls: Tools, Techniques and Metrics for Optimizing Distributed Enterprise Firewalls. Handbook of Optimization 2013: 529-551 - 2012
- [c6]Jason C. Cohen, Subrata Acharya:
Incorporating hardware trust mechanisms in Apache Hadoop: To improve the integrity and confidentiality of data in a distributed Apache Hadoop file system: An information technology infrastructure and software approach. GLOBECOM Workshops 2012: 769-774 - [c5]Shiva Azadegan, Wei Yu, Hui Liu, Ali Sistani, Subrata Acharya:
Novel Anti-forensics Approaches for Smart Phones. HICSS 2012: 5424-5431 - 2011
- [c4]Hui Liu, Shiva Azadegan, Wei Yu, Subrata Acharya, Ali Sistani:
Are We Relying Too Much on Forensics Tools? SERA (selected papers) 2011: 145-156
2000 – 2009
- 2008
- [j1]Subrata Acharya, Rabi N. Mahapatra:
A Dynamic Slack Management Technique for Real-Time Distributed Embedded Systems. IEEE Trans. Computers 57(2): 215-230 (2008) - 2007
- [c3]Subrata Acharya, Bryan N. Mills, Mehmud Abliz, Taieb Znati, Jia Wang, Zihui Ge, Albert G. Greenberg:
OPTWALL: A Hierarchical Traffic-Aware Firewall. NDSS 2007 - 2006
- [c2]Subrata Acharya, Jia Wang, Zihui Ge, Taieb Znati, Albert G. Greenberg:
Simulation Study of Firewalls to Aid Improved Performance. Annual Simulation Symposium 2006: 18-26 - [c1]Subrata Acharya, Jia Wang, Zihui Ge, Taieb Znati, Albert G. Greenberg:
Traffic-Aware Firewall Optimization Strategies. ICC 2006: 2225-2230
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint