Rajni Goel

Orcid: 0000-0003-4078-7736

According to our database1, Rajni Goel authored at least 30 papers between 2000 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Likelihood and Bayesian inference for <i>k</i> Lindley populations under joint type-II censoring scheme.
Commun. Stat. Simul. Comput., August, 2023

2022
Statistical inference for two Lindley populations under balanced joint progressive type-II censoring scheme.
Comput. Stat., 2022

Inferences for two Lindley populations based on joint progressive type-II censored data.
Commun. Stat. Simul. Comput., 2022

2020
PRISM: a strategic decision framework for cybersecurity risk assessment.
Inf. Comput. Secur., 2020

2019
Establishing a Framework to Measure Strategic Social Value of Online Engagements: A Model for Determining Social Identity.
Proceedings of the 2019 on Computers and People Research Conference, 2019

2018
The Role of Tech Corporations at Historically Black Colleges and Universities in American STEM Education.
Proceedings of the 24th Americas Conference on Information Systems, 2018

2017
Location-Based Lightweight Security Scheme for Wireless Communications in ROAR Architecture.
Proceedings of the 2017 IEEE International Conference on Smart Cloud, 2017

A Public-Private-Social Ecosystem: An Interdisciplinary Framework for Cybersecurity Capacity Building.
Proceedings of the 2017 ACM SIGMIS Conference on Computers and People Research, 2017

2014
Security requirement derivation by noun-verb analysis of use-misuse case relationships: a case study using positive train control.
Innov. Syst. Softw. Eng., 2014

2013
Timely Delivery of Messages in Positive Train Control.
Proceedings of the Critical Infrastructure Protection VII, 2013

2012
Transportation.
Proceedings of the Critical Infrastructure Protection, 2012

2010
U.S. Federal Oversight of Rail Transportation of Toxic by Inhalation Materials.
Proceedings of the Critical Infrastructure Protection IV, 2010

2009
Secure Cross-Domain Train Scheduling.
Proceedings of the Critical Infrastructure Protection III, 2009

Meta-models for misuse cases.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009

2008
Security and the US rail infrastructure.
Int. J. Crit. Infrastructure Prot., 2008

Protection and Recovery of Railroad Event Recorder Data.
Proceedings of the Advances in Digital Forensics IV, 2008

2007
Key management requirements for PTC operations.
IEEE Veh. Technol. Mag., 2007

Managing RFID Consumer Privacy and Implementation Barriers.
Inf. Secur. J. A Glob. Perspect., 2007

PTC-VANET Interactions to Prevent Highway Rail Intersection Crossing Accidents.
Proceedings of the 65th IEEE Vehicular Technology Conference, 2007

The Security Threat Posed by Steganographic Content on the Internet.
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007

Research Directions in Quantum Cryptography.
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007

A Framework for Investigating Railroad Accidents.
Proceedings of the Advances in Digital Forensics III, 2007

Securing Positive Train Control Systems.
Proceedings of the Critical Infrastructure Protection, 2007

2006
Communications Based Positive Train Control Systems Architecture in the USA.
Proceedings of the 63rd IEEE Vehicular Technology Conference, 2006

Use-Misuse Case Driven Analysis of Positive Train Control.
Proceedings of the Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29, 2006

A Framework for Understanding Minority Students' Cyber Security Career Interests.
Proceedings of the Connecting the Americas. 12th Americas Conference on Information Systems, 2006

2003
A Checksum-based Corruption Detection Technique.
J. Comput. Secur., 2003

2002
Mining Malicious Corruption of Data with Hidden Markov Models.
Proceedings of the Research Directions in Data and Applications Security, 2002

2000
Using Checksums to Detect Data Corruption.
Proceedings of the Advances in Database Technology, 2000

Protecting File systems Against Corruption Using Checksums.
Proceedings of the Data and Application Security, 2000


  Loading...