Education
Ph.D., Computer Science (2008), University of Pittsburgh, Pittsburgh, PA
M.S., Computer Engineering (2004), Texas A&M University, College Station, TX
Ph.D., Computer Science (2008), University of Pittsburgh, Pittsburgh, PA
M.S., Computer Engineering (2004), Texas A&M University, College Station, TX
Healthcare Information Security and Privacy, Cyber Physical Systems, Medical Analytics, System Security, Trusted Computing, Information Security Management, Secure Health Informatics, Secure Mobile Systems, Ethical & Privacy Issues in Computing Systems
Healthcare Information Security and Privacy, Cyber Physical Systems, Medical Analytics, System Security, Trusted Computing, Information Security Management, Secure Health Informatics, Secure Mobile Systems, Ethical & Privacy Issues in Computing Systems
S. Acharya (PI), Design and Evaluation of HealthCare Information Security System (External); Funded by: University of Pittsburgh Medical Center (UPMC-Altoona), 2011-2017; Funding Amount: $402,000; Period: March 2011 – December 2017
M. O’Leary (PI), S. Acharya (co-PI), L. Ray (co-PI), W. Yu (co-PI), S. Kaza (co-PI), Basic Recruitment and Capacity Building (External); Funded by: Department of Defense (DoD), Information Assurance Scholarship Program (IASP), 2010; Funding Amount: $95,716; Period: September 2010 – August 2011
M. O’Leary (PI), S. Acharya (co-PI), Yeong-Tae Song (co-PI), S. Kaza (co-PI), S. Chakraborty (co-PI), J. Dehlinger (co-PI), Expanding an Applied Information Technology Master’s Program (External); Funded by: Base Realignment and Closure-Maryland Higher Education Investment Fund Grant, 2009; Funding Amount: $90,990; Period: January 2009 – January 2010
IEEE, ACM, WIMHE, CRA-W
Security Education, Women in Computing, STEM Education (K-12)
S. Acharya, J. Wang, Z. Ge and A. Greenberg, “Methods and Apparatus for Optimizing a Firewall”, US patent, Docket No. 2005-0520, June, 2011, uspto.gov, http://www.google.com/patents/US20080005795
S. Acharya, “HTTPV: Verifiable HTTP across an Untrusted Channel”, book chapter in Network Security Technologies: Design and Applications, Publisher: IGI Global USA, March, 2014, http://www.igi-global.com/publish/call-for-papers/call-details/213
S. Acharya, “Accelerating Firewalls: Tools, Techniques and Metrics for Optimizing Distributed Firewalls”, book chapter in the Handbook of Optimization – From Classical to Modern Approach, Intelligent System Reference Library, Volume 38, Pages: 529-551, Publisher: Springer, 2013, XII, 1100 p. 460 illus., http://link.springer.com/chapter/10.1007/978-3-642-30504-7_21
S. Acharya, “GCD: A Global Collaborative Defense approach to Thwart Internet Attacks”, book chapter in the Situational Awareness in Computer Network Defense: Principles, Methods and Applications, Publisher: IGI Global, USA, January, 2012, http://www.igi-global.com/chapter/gcd-global-collaborative-defense-approach/62382
S. Acharya, “PITWALL: Tools, Techniques and Metrics for the Optimization of Enterprise Network Defense Systems” book chapter in Situational Awareness in Computer Network Defense: Principles, Methods and Applications, Publisher: IGI Global, USA, January, 2012, http://www.igi-global.com/chapter/pitwall-tools-techniques-metrics-optimization/62389
S. Acharya, S. Khatiwada***, K. Elkins, “CSI-Pi: A novel automated secure solution to interpret on-site colorimetric tests”, Colonial Academic Alliance Undergraduate Research Journal (CAAURJ), Volume 5, Fall, 2015
J. Cohen*, S. Acharya, “Towards a Trusted HDFS Storage Platform: Mitigating Threats to Hadoop Infrastructures Using Hardware-Accelerated Encryption with TPM-Rooted Key Protection”, Elsevier Journal of Information Security and Applications Special Issue, July, 2014, http://www.sciencedirect.com/science/article/pii/S2214212614000155
B. Coats*, S. Acharya, “Leveraging the Cloud for Electronic Health Record Access”, American Health Information Management (AHIMA) Research Journal of Perspectives in Health Information Management, January, 2014.
S. Acharya, S. Gorman*** (Undergraduate Student), “Reclaiming Information Privacy Online”, Colonial Academic Alliance Undergraduate Research Journal, December, 2013, http://scholarworks.gsu.edu/caaurj/vol4/iss1/4
S. Acharya, Michael Terry** (Graduate Student), and Ogbeide Derrick Oigiagbe (Undergraduate Student), “A Comprehensive Security Assessment Toolkit for HealthCare Systems"”, Colonial Academic Alliance Undergraduate Research Journal, December, 2013 http://scholarworks.gsu.edu/caaurj/vol4/iss1/6/
S. Acharya, B. Namovicz***, J. Wiseman***, “A Hybrid Root-kit for Linux Operating System”, Colonial Academic Alliance Undergraduate Research Journal, Volume 1, Issue 1, October 2010
S. Acharya, G. Joshi**, “Improved Anti-Virus Defense Via Efficient Clustering Techniques”, International Journal of Computer Science and Network Security, Vol. 10, No. 6, June 2010
S. Acharya, R. N. Mahapatra, “A Dynamic Slack Management Technique for Real-Time Distributed Embedded System”, IEEE Transactions on Computers, Vol. 57(2), 2008