selected publications academic article Nag, A. K., Bhadauria, V. S., Gibson, C., Neupane, R. C., & Creider, D. (2022). A Conceptual Learning Framework of Cybersecurity Education for Military and Law Enforcement. 13(1), 1-14. Gupta, K. D., Rahman, M. L., Nag, A. K., Mahmud, M., & Sadman, N. (2021). Utilizing Computational Complexity to Protect Cryptocurrency Against Quantum Threats: A Review. IT Professional: technology solutions for the enterprise. 23(5), 50-55. Ahsan, M. M., Gupta, K. D., Nag, A. K., Poudyal, S., Kouzani, A. Z., & Mahmud, M. (2020). Applications and Evaluations of Bio-Inspired Approaches in Cloud Security: A Review. IEEE Access. 8, 180799-180814. Dasgupta, D., Nag, A. K., Ferebee, D., Saha, S. K., Subedi, K. P., Roy, A., ... Williams, J. R. (2019). Design and implementation of Negative Authentication System. International Journal of Information Security. 18(1), 23-48. Dasgupta, D., Roy, A., & Nag, A. (2016). Toward the design of adaptive selection strategies for multi-factor authentication. Computers and Security. 63, 85-116. Saha, S. K., Nag, A. K., & Dasgupta, D. (2015). Human-Cognition-Based CAPTCHAs. IT Professional: technology solutions for the enterprise. 17(5), 42-48. book Dasgupta, D., Roy, A., & Nag, A. (2017). Advances in User Authentication. Springer Nature. conference paper Hammad, E., Nag, A. K., Chennamaneni, A., Aghashahi, M., & Dogdu, E. (2021). A Deep-Defense Approach for Next-Gen Cyber-Resilient Inter-Dependent Critical Infrastructure Systems. 1-7. Nag, A. K., Roy, A., & Dasgupta, D. (2015). An Adaptive Approach Towards the Selection of Multi-factor Authentication. 463-472. Dasgupta, D., Ferebee, D., Saha, S., Nag, A. K., Subedi, K. P., Madero, A., Sanchez, A., & Williams, J. (2014). G-NAS: A grid-based approach for negative authentication. 1-10. Nag, A. K., & Dasgupta, D. (2014). An adaptive approach for continuous multi-factor authentication in an identity eco-system. 65-68. Dasgupta, D., Ferebee, D., Saha, S., Nag, A. K., Subedi, K. P., Madero, A., Sanchez, A., & Williams, J. (2014). G-NAS: A Grid-Based Approach for Negative Authentication. 9-18.
education and training Ph.D. in Computer Science, University of Memphis - (Memphis, Tennessee, United States) 2016 M.S. in Computer Engineering, University of Memphis - (Memphis, Tennessee, United States) 2012