Publications

  • Uppuluri. P, Panelist, Higher Education outreach efforts, National K-12 Cybersecurity Education Conference, Linthicum, MD 2015 [VIDEO]

  • Uppuluri. P, Panelist, Higher Education efforts: prepping for cyber defense competitions, National K-12 Cybersecurity Education Conference, Linthicum, MD 2015 [VIDEO]

  • Uppuluri. P, Panelist, K12 Working Group , The Colloquium for Information Systems Security Education (CISSE), Las Vegas, NV June 2015

  • Chase, J. D., Uppuluri, P., Lewis-Williams, T. L., Barland, I., Pittges, J. J. (2015). Integrating Live Projects Into Computing Curriculum. Proceedings of the 46th ACM Technical Symposium on Computer Science Education (pp. 82–83). New York, NY, USA: ACM. http://doi.acm.org/10.1145/2676723.2677320

  • Uppuluri, P., Chase, J. D., Pittges, J. J. (2015). Scare, Prepare and Dare: High impact, low cost incorporation of cyber security into high school curriculum. (Roundtable) Maryland: The Colloquium on Information Systems Security Education (CISSE).

  • Uppuluri, P., Pittges, J. J., Chase, J. D. (2014). Scare and Prepare: Increasing Awareness, Safety, and Passion for Cyber-security (Abstract Only). Proceedings of the 45th ACM Technical Symposium on Computer Science Education (pp. 720–720). New York, NY, USA: ACM. http://doi.acm.org/10.1145/2538862.2544294

  • Uppuluri, P., Pittges, J. J. In Ninth International Conference on Information Technology (Ed.), A Comprehensive Undergraduate Application Security Project. New York, NY: IEEE Computer Society. http://dx.doi.org/10.1109/ITNG.2012.127

  • Prem Uppuluri, Jeff Pittges, Robert Phillips, Experiences in Designing and Implementing an Undergraduate Certificate in Information Security, Colloquium for Information Systems Security Education (CISSE), June 2010.

  • Kenny King, Justin Rutherford, Prem Uppuluri, Executing Resource Intensive Applications on Mobile Devices, ACM Southeast, 2010

  • Prem Uppuluri, Alok Tongaonkar, Vivek Diwakara, Vikas Rajegowda, Securing the interactions between X clients, International Journal of Computer Science and Network Security, Vol 9(9), pp 205-213, September 2009