14
Sagar Samtani, Ph.D. 1275 E. 10 th St, HH 4111, Bloomington, IN 47405 E-mail: [email protected] Phone Number: +1 (520)-971-4274 Website: www.sagarsamtani.com Last CV Update: June 30, 2020 __________________________________________________________________________________________________ 1 ACADEMIC EMPLOYMENT AND POSITIONS Assistant Professor and Grant Thornton Scholar Operations and Decision Technologies, Kelley School of Business Indiana University July 2020 – Present Fellow Center for Applied Cybersecurity Research (CACR) Indiana University June 2020 - Present Assistant Professor Department of Information Systems and Decision Sciences, Muma College of Business University of South Florida August 2018 – May 2020 Adjunct Lecturer (Limited Term) Department of Management Information Systems, Eller College of Management University of Arizona May – July 2018 Research Associate, Project Lead, Scholarship-for-Service Fellow Artificial Intelligence Lab, Department of Management Information Systems University of Arizona August 2014 – May 2018 Graduate Assistant MicroAge Lab, Department of Management Information Systems, Eller College of Management University of Arizona October 2013 – May 2014 EDUCATION Doctor of Philosophy (Ph.D.) Major: Management Information Systems Minor: Cognitive Science University of Arizona 2014-2018 Masters of Science (M.S.) Management Information Systems University of Arizona 2013-2014 Bachelors of Science in Business Administration (B.S.B.A) Management Information Systems University of Arizona 2009-2013 RESEARCH INTERESTS 1. Applications: (1) Cybersecurity – cyber threat intelligence (key hacker ID, emerging threat detection, visualizations) and smart vulnerability assessment (socio-technical; automated scanning); scientific cyberinfrastructure cybersecurity (GitHub, Docker, VM images) (2) social media analytics – automated Social Intelligence (SOCINT) Open Source Intelligence (OSINT) collection/mining; (3) health analytics – motion sensor-based fall detection/prediction, activity of daily living detection; mental health 2. Methods: (1) Deep learning (autoencoders, graph neural networks, adversarial learning, deep transfer learning, Bayesian deep learning, interpretable deep learning, deep structured semantic/entity matching); (2) computational linguistics (diachronic linguistics, word/document embeddings, cross-lingual knowledge transfer); (3) data/web mining (stream analytics, SOCINT/OSINT web crawling), (4) network science (graph/node embeddings), (5) cyber threat intelligence visualization DISSERTATION Title: Developing Proactive Cyber Threat Intelligence from the Online Hacker Community: A Computational Design Science Approach Winner, ACM SIGMIS Doctoral Dissertation Award, 2019 Runner-up, INFORMS ISS Nunamaker-Chen Dissertation Award, 2018 Committee Members: Dr. Hsinchun Chen (Chair), Dr. Jay Nunamaker (Member), and Dr. Sue Brown (Member)

Sagar Samtani, Ph.D.sagarsamtani.com/wp-content/uploads/2020/07/Sagar... · Learning and Analysis for Inferring Evolving IoT otnets in the Wild _ Computers and Security, Volume 91,

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Sagar Samtani, Ph.D.sagarsamtani.com/wp-content/uploads/2020/07/Sagar... · Learning and Analysis for Inferring Evolving IoT otnets in the Wild _ Computers and Security, Volume 91,

Sagar Samtani, Ph.D. 1275 E. 10th St, HH 4111, Bloomington, IN 47405

E-mail: [email protected] Phone Number: +1 (520)-971-4274

Website: www.sagarsamtani.com Last CV Update: June 30, 2020

__________________________________________________________________________________________________

1

ACADEMIC EMPLOYMENT AND POSITIONS Assistant Professor and Grant Thornton Scholar

Operations and Decision Technologies, Kelley School of Business

Indiana University

July 2020 – Present

Fellow

Center for Applied Cybersecurity Research (CACR) Indiana University

June 2020 - Present

Assistant Professor

Department of Information Systems and Decision Sciences, Muma College of Business

University of South Florida

August 2018 – May 2020

Adjunct Lecturer (Limited Term) Department of Management Information Systems, Eller College of Management

University of Arizona

May – July 2018

Research Associate, Project Lead, Scholarship-for-Service Fellow

Artificial Intelligence Lab, Department of Management Information Systems

University of Arizona

August 2014 – May 2018

Graduate Assistant MicroAge Lab, Department of Management Information Systems, Eller College of Management

University of Arizona

October 2013 – May 2014

EDUCATION Doctor of Philosophy (Ph.D.)

Major: Management Information Systems Minor: Cognitive Science

University of Arizona

2014-2018

Masters of Science (M.S.) Management Information Systems

University of Arizona

2013-2014

Bachelors of Science in Business Administration (B.S.B.A)

Management Information Systems University of Arizona

2009-2013

RESEARCH INTERESTS 1. Applications:

(1) Cybersecurity – cyber threat intelligence (key hacker ID, emerging threat detection, visualizations) and smart vulnerability assessment (socio-technical; automated scanning); scientific cyberinfrastructure cybersecurity (GitHub, Docker, VM images) (2) social media analytics – automated Social Intelligence (SOCINT) Open Source Intelligence (OSINT) collection/mining; (3) health analytics – motion sensor-based fall detection/prediction, activity of daily living detection; mental health

2. Methods: (1) Deep learning (autoencoders, graph neural networks, adversarial learning, deep transfer learning, Bayesian deep learning, interpretable deep learning, deep structured semantic/entity matching); (2) computational linguistics (diachronic linguistics, word/document embeddings, cross-lingual knowledge transfer); (3) data/web mining (stream analytics, SOCINT/OSINT web crawling), (4) network science (graph/node embeddings), (5) cyber threat intelligence visualization

DISSERTATION Title: Developing Proactive Cyber Threat Intelligence from the Online Hacker Community: A Computational Design Science Approach

• Winner, ACM SIGMIS Doctoral Dissertation Award, 2019

• Runner-up, INFORMS ISS Nunamaker-Chen Dissertation Award, 2018 Committee Members: Dr. Hsinchun Chen (Chair), Dr. Jay Nunamaker (Member), and Dr. Sue Brown (Member)

Page 2: Sagar Samtani, Ph.D.sagarsamtani.com/wp-content/uploads/2020/07/Sagar... · Learning and Analysis for Inferring Evolving IoT otnets in the Wild _ Computers and Security, Volume 91,

Sagar Samtani, Ph.D. 1275 E. 10th St, HH 4111, Bloomington, IN 47405

E-mail: [email protected] Phone Number: +1 (520)-971-4274

Website: www.sagarsamtani.com Last CV Update: June 30, 2020

__________________________________________________________________________________________________

2

JOURNAL PUBLICATIONS 1. S. Samtani, H. Zhu, and H. Chen, “Proactively Identifying Emerging Hacker Threats: A Diachronic Graph Embedding Framework

(D-GEF)” Forthcoming at ACM Transactions on Privacy and Security (TOPS).

2. H. Zhu, S. Samtani, R. Brown, and H. Chen, “A Deep Learning Approach for Recognizing Activity of Daily Living (ADL) for Senior Care: Exploiting Interaction Dependency and Temporal Patterns” Forthcoming at Management Information Systems Quarterly (MISQ).

3. Y. Liang, S. Samtani, B. Guo, and Z. Yu “Behavioral Biometrics for Continuous Authentication in the Internet of Things Era: An Artificial Intelligence Perspective” Forthcoming at IEEE Internet of Things Journal (IoTJ).

4. H. Zhu, S. Samtani, H. Chen, and J.F. Nunamaker, Jr., “Human Identification for Activities of Daily Living: A Deep Transfer Learning

Approach” Journal of Management Information Systems, Volume 37, Issue 2, Pages 457 – 483, 2020.

5. M. Pour, A. Mangino, K. Friday, M. Rathbun, E. Bou-Harb, F. Iqbal, S. Samtani, J. Crichigno, and N. Ghani “Into Data-driven Curation, Learning and Analysis for Inferring Evolving IoT Botnets in the Wild” Computers and Security, Volume 91, 101707, 2020.

6. S. Samtani, S. Yu, and H. Zhu, “Fear Appeals and Information Security Behaviors: An Empirical Study on Mechanical Turk” AIS Transactions on Replication Research, Volume 5, Number 5, Pages 1-22, 2019.

7. S. Samtani, S. Yu, H. Zhu, M. Patton, J. Matherly, and H. Chen, “Identifying SCADA Systems and their Vulnerabilities on the Internet of Things: A Text Mining Approach” IEEE Intelligent Systems, Volume 33, Issue 2, Pages 63-73, 2018.

8. S. Samtani, R. Chinn, H. Chen, and J. F. Nunamaker, Jr., “Exploring Emerging Hacker Assets and Key Hackers for Proactive Cyber

Threat Intelligence” Journal of Management Information Systems, Volume 34, Number 3, Pages 1023-1053, 2017.

JOURNAL PAPERS UNDER REVIEW 1. S. Samtani, Y. Chai, E. Garcia, and H. Chen, “Linking Exploits from the Dark Web to Known Vulnerabilities for Proactive Cyber

Threat Intelligence: An Attention-based Deep Structured Semantic Model Approach” Revise and Resubmit for Fourth Round Review at Management Information Systems Quarterly (MISQ).

2. M. Ebrahimi, Y. Chai, S. Samtani, and H. Chen, “Cross-Lingual Security Analytics: Cyber Threat in the International Dark Web with

Adversarial Deep Representation Learning” Revise and Resubmit for Third Round Review at Management Information Systems Quarterly (MISQ).

3. Y. Liang, H. Li, B. Guo, Z. Yu, X. Zheng, S. Samtani, and D. Zeng “Heterogeneous Attention Mechanisms in Multi-View

Convolutional Neural Networks for Text Classification” Revise and Resubmit for Second Round Review at Information Sciences. 4. Y. Chai, H. Liu, J. Xu, and S. Samtani “A Multi-Label Classification with Adversarial-based Denoising Autoencoder Approach for

Medical Image Annotation” Under Second Round Review at Information Processing and Management (IPM).

5. Y. Chai, S. Yu, S. Samtani, H. Liu, and H. Chen, “Motion Sensor-Based Fall Detection and Prediction: A Hidden Markov Model and Generative Adversarial Network (HMM-GAN) Approach” Revise and Resubmit for Third Round Review at Information Systems Research (ISR).

6. S. Samtani, W. Li, V. Benjamin, and H. Chen, “Developing Situational Awareness from the Dark Web: The AZSecure Hacker Assets

Portal” Under First Round Review at ACM Digital Threats Research and Practice (DTRAP).

Page 3: Sagar Samtani, Ph.D.sagarsamtani.com/wp-content/uploads/2020/07/Sagar... · Learning and Analysis for Inferring Evolving IoT otnets in the Wild _ Computers and Security, Volume 91,

Sagar Samtani, Ph.D. 1275 E. 10th St, HH 4111, Bloomington, IN 47405

E-mail: [email protected] Phone Number: +1 (520)-971-4274

Website: www.sagarsamtani.com Last CV Update: June 30, 2020

__________________________________________________________________________________________________

3

7. S. Chakraborty, A. Onuchowska, S. Samtani, W. Jank, and B. Wolfram, “Machine Learning for Automated Industrial IoT Attack Detection: An Efficiency – Complexity Tradeoff” Under First Round Review at ACM Transactions on Management Information Systems (TMIS).

WORKING JOURNAL PAPERS 1. S. Samtani, H. Zhu, Y. Chai, and H. Chen, “Identifying Exploit Sharing Hackers and Communities in Online Hacker Forums for

Proactive Cyber Threat Intelligence: A Graph Convolutional Autoencoder Approach” Targeted at IEEE Transactions on Information Forensics and Security (TIFS).

2. H. Zhu, S. Samtani, and H. Chen, “An Attention-Based Deep Learning Framework for Mobile Health: An Application on Activities of Daily Living” Targeted at Transactions on Knowledge and Data Engineering (TKDE).

3. S. Samtani, H. Chen, S. Brown, R. McIsaac, and M. Patton, “Designing and Delivering a Research-Oriented Scholarship-for-Service

Curriculum: Lessons and Guidelines from the AZSecure Fellowship Program” Targeted at IEEE Transactions on Education. 4. S. Samtani, H. Zhu, Y. Chai, B. Padmanabhan, and H. Chen “Deep Learning for Information Systems Research: Architectures and

Applications” Targeted at Management Information Systems Quarterly (MISQ).

5. F. Lin, S. Samtani, H. Zhu, and H. Chen “Automated Analysis of Changes in Privacy Policies: A Structured Self-Attentive Sentence Embedding Approach” Targeted at Management Information Systems Quarterly (MISQ).

6. S. Samtani and B. Ampel “A Survey of Opportunities for Developing Dark Web-Based Cyber Threat Intelligence Systems” Targeted at Computers and Security.

7. B. Ampel, S. Samtani, H. Zhu, and H. Chen “Labeling Hacker Exploits for Proactive Cyber Threat Intelligence: A Deep Transfer Learning Approach” Targeted at Journal of Management Information Systems (JMIS).

8. S. Ullman, S. Samtani, H. Zhu, M. Patton, B. Lazarine, and H. Chen “Smart Vulnerability Assessment for Scientific Cyberinfrastructure: A Multi-View Representation Learning Approach” Targeted at Journal of Management Information Systems (JMIS).

9. B. Lazarine, S. Samtani, M. Patton, H. Zhu, and H. Chen “Identifying Vulnerable GitHub Repositories and Users for Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach” Targeted at Journal of Management Information Systems (JMIS).

BOOK CHAPTERS 1. S. Samtani, M. Abate, V. Benjamin, and W. Li “Cybersecurity as an Industry: A Cyber Threat Intelligence Perspective” Palgrave

Handbook of International Cybercrime and Cyberdeviance, Springer, 2019.

2. V. Benjamin, S. Samtani, and H. Chen, “Conducting Large-Scale Analyses of Underground Hacker Communities” Cybercrime Through an Interdisciplinary Lens, Routledge, 2016.

REFEREED CONFERENCE PROCEEDINGS (* indicates that I was the presenting author) 1. M. Ebrahimi, S. Samtani, Y. Chai, and H. Chen “Detecting Cyber Threats in Non-English Hacker Forums: An Adversarial Cross-

Lingual Knowledge Transfer Approach” 41st IEEE Symposium on Security and Privacy (S&P), 3rd Deep Learning for Security (DLS) Workshop. San Francisco, CA. May 21, 2020.

2. P. Du, M. Ebrahimi, N. Zhang, H. Chen, R. Brown, and S. Samtani “Identifying High-Impact Opioid Products and Key Sellers in Dark

Page 4: Sagar Samtani, Ph.D.sagarsamtani.com/wp-content/uploads/2020/07/Sagar... · Learning and Analysis for Inferring Evolving IoT otnets in the Wild _ Computers and Security, Volume 91,

Sagar Samtani, Ph.D. 1275 E. 10th St, HH 4111, Bloomington, IN 47405

E-mail: [email protected] Phone Number: +1 (520)-971-4274

Website: www.sagarsamtani.com Last CV Update: June 30, 2020

__________________________________________________________________________________________________

4

Net Marketplaces: An Interpretable Text Analytics Approach” ISI 2019, Proceedings of 2019 IEEE Conference on Intelligence and Security Informatics. Shenzhen, CHN. July 1 – 3, 2019.

3. N. Arnold, M. Ebrahimi, N. Zhang, B. Lazarine, S. Samtani, M. Patton, and H. Chen “Dark-Net Ecosystem Cyber Threat Intelligence (CTI) Tool,” ISI 2019, Proceedings of 2019 IEEE Conference on Intelligence and Security Informatics. Shenzhen, CHN. July 1 – 3, 2019.

4. A. Onuchowska, D. Berndt, and S. Samtani “Rocket Ship or Blimp? – Implication of Malicious Accounts Removal on Twitter,” European Conference on Information Systems (ECIS). Stockholm and Uppsala, Sweden. June 8 – 14, 2019.

5. R. Williams, *S. Samtani, M. Patton, and H. Chen, “Incremental Hacker Forum Exploit Collection and Classification for Proactive Cyber Threat Intelligence: An Exploratory Study,” ISI 2018, Proceedings of 2018 IEEE Conference on Intelligence and Security Informatics. Miami, FL. November 8 – 10, 2018.

6. P. Du, N. Zhang, M. Ebrahimi, S. Samtani, B. Lazarine, N. Arnold, R. Dunn, S. Suntwal, G. Angeles, R. Schweitzer, H. Chen, “Identifying, Collecting and Presenting Hacker Community Data: Forums, IRC, Carding Shops, and DNMs, ” ISI 2018, Proceedings of 2018 IEEE Conference on Intelligence and Security Informatics. Miami, FL. November 8 – 10, 2018.

7. M. Ebrahimi, M. Surdeanu, S. Samtani, and H. Chen, “Detecting Cyber Threats in Non-English Dark Net Markets: A Cross-Lingual Transfer Learning Approach,” ISI 2018, Proceedings of 2018 IEEE Conference on Intelligence and Security Informatics. Miami, FL. November 8 – 10, 2018. (Runner-Up for Best Paper Award).

8. C. Harrell, S. Samtani, M. Patton, and H. Chen, “Vulnerability Assessment, Remediation, and Automated Reporting: Case Studies of Higher Education Institutions,” ISI 2018, Proceedings of 2018 IEEE Conference on Intelligence and Security Informatics. Miami, FL. November 8 – 10, 2018.

9. E. McMahon, M. Patton, S. Samtani, and H. Chen, “Benchmarking Vulnerability Assessment Tools for Enhanced Cyber-Physical System (CPS) Resiliency,” ISI 2018, Proceedings of 2018 IEEE Conference on Intelligence and Security Informatics. Miami, FL. November 8 – 10, 2018.

10. M. El, E. McMahon, S.Samtani, M. Patton, and H. Chen, “Benchmarking Vulnerability Scanners: An Experiment on SCADA Devices and Scientific Instruments,” ISI 2017, Proceedings of 2017 IEEE Conference on Intelligence and Security Informatics. Beijing, China. July, 2017. (Runner-Up for Best Paper Award).

11. E. McMahon, R. Williams, M. El, S. Samtani, M. Patton, and H. Chen, “Assessing Medical Device Vulnerabilities on the Internet of

Things,” ISI 2017, Proceedings of 2017 IEEE Conference on Intelligence and Security Informatics. Beijing, China. July, 2017.

12. J. Grisham, S. Samtani, M. Patton, and H. Chen, “Identifying Mobile Malware and Key Threat Actors in Online Hacker Forums for Proactive Cyber Threat Intelligence,” ISI 2017, Proceedings of 2017 IEEE Conference on Intelligence and Security Informatics. Beijing, China. July, 2017.

13. R. Williams, E. McMahon, S. Samtani, M. Patton, and H. Chen, “Identifying Vulnerabilities of Consumer Internet of Things (IoT)

Devices: A Scalable Approach,” ISI 2017, Proceedings of 2017 IEEE Conference on Intelligence and Security Informatics. Beijing, China. July, 2017.

14. *S. Samtani, K. Chinn, C. Larson, and H. Chen, “AZSecure Hacker Assets Portal: Cyber Threat Intelligence and Malware Analysis,”

ISI 2016, Proceedings of 2016 IEEE Conference on Intelligence and Security Informatics. Tucson, Arizona. September, 2016.

15. *S. Samtani, S. Yu, H. Zhu, M. Patton, and H. Chen, “Identifying SCADA Vulnerabilities using Passive and Active Vulnerability

Page 5: Sagar Samtani, Ph.D.sagarsamtani.com/wp-content/uploads/2020/07/Sagar... · Learning and Analysis for Inferring Evolving IoT otnets in the Wild _ Computers and Security, Volume 91,

Sagar Samtani, Ph.D. 1275 E. 10th St, HH 4111, Bloomington, IN 47405

E-mail: [email protected] Phone Number: +1 (520)-971-4274

Website: www.sagarsamtani.com Last CV Update: June 30, 2020

__________________________________________________________________________________________________

5

Assessment Techniques,” ISI 2016, Proceedings of 2016 IEEE Conference on Intelligence and Security Informatics. Tucson, Arizona. September, 2016.

16. *S. Samtani and H. Chen, “Using Social Network Analysis to Identify Key Hackers for Keylogging Tools in Hacker Forums,” ISI 2016,

Proceedings of 2016 IEEE Conference on Intelligence and Security Informatics. Tucson, Arizona. September, 2016. 17. *S. Samtani, R. Chinn, and H. Chen., “Exploring Hacker Assets in Underground Forums,” ISI 2015, Proceedings of 2015 IEEE

Conference on Intelligence and Security Informatics. Baltimore, Maryland. May, 2015.

OTHER REFEREED CONFERENCE PRESENTATIONS (no proceedings; * indicates that I was the presenting author) 1. M. Ebrahimi, Y. Chai, S. Samtani, and H. Chen “Cross-Lingual Security Analytics: Cyber Threat Detection in the International Dark

Web with Adversarial Deep Representation Learning,” Winter Conference on Business Analytics (WCBA). Snowbird, UT. March 12 – 14, 2019.

2. *S. Samtani, “Linking Exploits from the Dark Web to Known Vulnerabilities for Proactive Cyber Threat Intelligence: An Attention-based Deep Structured Semantic Model Approach,” Conference on Machine Learning for Information Security (CAMLIS). Washington, DC. October 25 – 26, 2019.

3. A. Onuchowska, D. Berndt, S. Samtani, and Saurav Chakraborty “Rocket Ship or Blimp? – Implication of Malicious Accounts Removal on Twitter,” GKMC Winter Conference on Business Intelligence (WCBA). Snowbird, UT. March 7 – 9, 2019.

4. R. Shenandoah, S. Samtani, M. Patton, and H. Chen., “Fostering Cybersecurity Big Data Research: A Case Study of the AZSecure

Data System,” Hawaii International Conference on System Sciences (HICSS) Cybersecurity Big Data Symposium. Hawaii. January 2018.

5. S. Samtani, M. Patton, and H. Chen., “Large-Scale Vulnerability Assessment of Venezuelan Internet of Things (IoT) Devices,” Hawaii

International Conference on System Sciences (HICSS) Cybersecurity Big Data Symposium. Hawaii. January 2017.

INVITED TALKS AND EXTERNAL PRESENTATIONS 1. 2020 INFORMS Annual Meeting. Session Title: Cybersecurity Analytics. Presentation Title: Linking Exploits from the Dark Web to

Known Vulnerabilities for Proactive Cyber Threat Intelligence: An Attention-based Deep Structured Semantic Model Approach. National Harbor, MD. November 8 – 11, 2020 (Planned).

2. Indiana University (IU) Center for Applied Cybersecurity Research (CACR) Brown Bag. Presentation Title: Cybersecurity for Scientific Cyberinfrastructure: An Artificial Intelligence Perspective. Bloomington, IN. Planned August 28, 2020.

3. Indiana University (IU) Luddy School of Informatics AI Seminar. Presentation Title: Cybersecurity for Scientific Cyberinfrastructure: An Artificial Intelligence Perspective. Bloomington, IN. Planned Summer 2020.

4. Carnegie Mellon University (CMU) Heinz College of Information Systems and Public Policy Research Seminar. Presentation Title: Linking Exploits from the Dark Web to Known Vulnerabilities for Proactive Cyber Threat Intelligence: An Attention-based Deep Structured Semantic Model Approach. Pittsburgh, PA. Planned April 9, 2020 (Postponed due to COVID-19).

5. Florida International University (FIU) Information Systems and Business Analytics Research Seminar. FIU Business School. Presentation Title: Linking Exploits from the Dark Web to Known Vulnerabilities for Proactive Cyber Threat Intelligence: An Attention-based Deep Structured Semantic Model Approach. Miami, FL. Planned April 3, 2020 (Postponed due to COVID-19).

6. Panel Title: AI, Cyber Threat Intelligence, and Dark Web. Event: Cyber Florida Annual Research Symposium. Miami, FL. April 1,

Page 6: Sagar Samtani, Ph.D.sagarsamtani.com/wp-content/uploads/2020/07/Sagar... · Learning and Analysis for Inferring Evolving IoT otnets in the Wild _ Computers and Security, Volume 91,

Sagar Samtani, Ph.D. 1275 E. 10th St, HH 4111, Bloomington, IN 47405

E-mail: [email protected] Phone Number: +1 (520)-971-4274

Website: www.sagarsamtani.com Last CV Update: June 30, 2020

__________________________________________________________________________________________________

6

2020 (Postponed due to COVID-19).

7. University of Minnesota Information and Decision Sciences Research Seminar. Carlson School of Management. Presentation Title: Linking Exploits from the Dark Web to Known Vulnerabilities for Proactive Cyber Threat Intelligence: An Attention-based Deep Structured Semantic Model Approach. Minneapolis, MN. Planned March 27, 2020 (Postponed due to COVID-19).

8. Muma College of Business Dean’s Speaker Series. Presentation Title: An Overview of the Dark Web: An Artificial Intelligence

Perspective. Tampa, FL. February 14, 2020.

9. Florida Bankers Association 6th Annual Cyber Security Symposium. Presentation Title: An Overview of the Dark Web: An Artificial Intelligence Perspective. Tampa, FL. Spring February 7, 2020.

10. American University. Presentation Title: Identifying Emerging Threats for Proactive Cyber Threat Intelligence (CTI): A Diachronic

Graph Convolutional Autoencoder Approach (D-GCAE). Washington, DC. February 5, 2020. 11. American University. Presentation Title: Text Mining, Network Science, and Machine Learning for Cyber Threat Intelligence

Applications. Washington, DC. February 4, 2020.

12. JABIL Research Institute. Presentation Title: An Overview of the Dark Web: An Artificial Intelligence Perspective. Tampa, FL. January 23, 2020.

13. Indiana University (IU) Operations and Decision Technologies (ODT) Research Seminar. Presentation Title: Linking Exploits from the Dark Web to Known Vulnerabilities for Proactive Cyber Threat Intelligence: An Attention-based Deep Structured Semantic Model Approach. Bloomington, IN. January 21, 2020.

14. Panel on Raising the Industry Defense: TSP-ISAO. Event: IT Nation. Orlando, FL. November 1, 2019.

15. Invited Participant for IT Nation Keynote. Orlando, FL. October 31, 2019.

16. 2019 Secure and Trustworthy Cyberspace (SaTC) Principal Investigators (PI) Meeting. Poster Title: Identifying Emerging Threats for Proactive Cyber Threat Intelligence (CTI): A Diachronic Graph Convolutional Autoencoder Approach (D-GCAE). Washington, DC. October 28 – 29, 2019.

17. JABIL Cybersecurity Awareness Fair. Presentation Title: An Overview of the Dark Web: An Artificial Intelligence Perspective. St. Petersburg, FL. October 22, 2019.

18. 2019 Cybersecurity Innovation for Cyberinfrastructure (CICI) Principal Investigators (PI) Meeting. Presentation Title: Identifying

the Breadth and Scope of CICI Projects. Minneapolis, MN. September 23 – 25, 2019.

19. 2019 Cybersecurity Innovation for Cyberinfrastructure (CICI) Kick-off. Presentation Title: Cybersecurity Innovation for Cyberinfrastructure PI Meeting: Project Overview. Tucson, AZ. September 6, 2019.

20. JP Morgan Chase Innovation Week. Presentation Title: An Overview of the Dark Web: An Artificial Intelligence Perspective. Tampa, FL. June 26, 2019.

21. 2019 Muma College of Business Executive Advisory Council (EAC) Meeting. Presentation Title: Identifying Emerging Threats for Proactive Cyber Threat Intelligence (CTI): A Diachronic Graph Convolutional Autoencoder Approach (D-GCAE). Tampa, FL. May 31, 2019.

Page 7: Sagar Samtani, Ph.D.sagarsamtani.com/wp-content/uploads/2020/07/Sagar... · Learning and Analysis for Inferring Evolving IoT otnets in the Wild _ Computers and Security, Volume 91,

Sagar Samtani, Ph.D. 1275 E. 10th St, HH 4111, Bloomington, IN 47405

E-mail: [email protected] Phone Number: +1 (520)-971-4274

Website: www.sagarsamtani.com Last CV Update: June 30, 2020

__________________________________________________________________________________________________

7

22. Muma College of Business Analytics Forum. Poster Title: Identifying Emerging Threats for Proactive Cyber Threat Intelligence (CTI): A Diachronic Graph Convolutional Autoencoder Approach (D-GCAE). Tampa, FL. May 14, 2019.

23. Panel on Artificial Intelligence and Machine Learning Topics in Cybersecurity. Event: Cyber Florida Annual Research Symposium. Tampa, FL. April 9, 2019.

24. Muma College of Business Dean’s Speaker Series. Presentation Title: An Overview of the Dark Web: An Artificial Intelligence Perspective. Tampa, FL. February 15, 2019.

25. Muma College of Business Executive MBA Meeting. Presentation Title: An Overview of the Dark Web: An Artificial Intelligence Perspective. Tampa, FL. February 16, 2019.

26. 2019 Muma College of Business Executive Advisory Council (EAC) Meeting. Presentation Title: An Overview of the Dark Web: An

Artificial Intelligence Perspective. Tampa, FL. February 1, 2019. 27. 2018 MIS Board of Advisors Dinner. Poster Title: Hacker Community Collection and Analytics. Tucson, AZ. April 12, 2018.

28. 2018 MIS Board of Advisors Dinner. Poster Title: Identifying Supervisory Control and Data Acquisition (SCADA) Devices and their

Vulnerabilities on the Internet of Things (IoT). Tucson, AZ. April 12, 2018.

29. University of South Florida (USF), Muma College of Business. Presentation Title: Developing Proactive Cyber Threat Intelligence: A Data and Text Mining Approach. Tampa, Florida. October 11, 2017.

30. University of Nevada Las Vegas (UNLV), Lee School of Business. Presentation Title: Developing Proactive Cyber Threat Intelligence: A Data and Text Mining Approach. Las Vegas, Nevada. October 6, 2017.

31. 2017 Women in Cybersecurity. Workshop Title: Cybersecurity Big Data and Analytics Sharing. Presentation Title: DIBBs Tool Inventory for ISI Research. Tucson, Arizona. March 31, 2017.

32. 2017 Women in Cybersecurity. Workshop Title: Cybersecurity Big Data and Analytics Sharing. Presentation Title: AZSecure Hacker

Assets Portal: Enhancing Cybersecurity Education. Tucson, Arizona. March 31, 2017. 33. CyberCorps Scholarship-for-Service (SFS) Job Fair 2017. Presentation Title: Hacker Web Assets Portal. Washington, DC. January 4

– 6, 2017. 34. 2017 Secure and Trustworthy Cyberspace (SaTC) Principal Investigators (PI) Meeting. Poster Title: Hacker Community Collection

and Analytics. Washington, DC. January 9 – 11, 2017. 35. 2017 Secure and Trustworthy Cyberspace (SaTC) Principal Investigators (PI) Meeting. Poster Title: Identifying SCADA Devices and

their Vulnerabilities on the IoT. Washington, DC. January 9-11, 2017.

36. 2016 INFORMS Annual Meeting. Session Title: Intelligence Applications in Social Media Analytics. Presentation Title: Understanding Malicious Tools in Underground Hacker Communities. Nashville, Tennessee. November 13 – 16, 2016.

37. 2016 INFORMS Annual Meeting. Session Title: Text Mining in Health and Security Analytics. Presentation Title: Exploring SCADA Devices and their Vulnerabilities on the Internet of Things. Nashville, Tennessee. November 13 – 16, 2016.

Page 8: Sagar Samtani, Ph.D.sagarsamtani.com/wp-content/uploads/2020/07/Sagar... · Learning and Analysis for Inferring Evolving IoT otnets in the Wild _ Computers and Security, Volume 91,

Sagar Samtani, Ph.D. 1275 E. 10th St, HH 4111, Bloomington, IN 47405

E-mail: [email protected] Phone Number: +1 (520)-971-4274

Website: www.sagarsamtani.com Last CV Update: June 30, 2020

__________________________________________________________________________________________________

8

38. University of Arizona GenCyber Summer Camp. Talk Title: Cybersecurity Research Overview. July 16 and July 30, 2015.

TEACHING EXPERIENCE

Role Course Delivery Method

# of Sections

# of students

Institution Semester Overall

Teaching Effectiveness

Lecturer T596: AI for Cybersecurity* edX 1 Indiana U. Fall 2020 Lecturer S364 Business Data Programming In-Person 3 Indiana U. Fall 2020

Lecturer ISM 6328: Information Security and Management

Online 2 44 U. of South Florida

Spring 2020 4.55/5.00

Lecturer ISM 6328: Information Security and Management

Online 4 89 U. of South Florida

Fall 2019 4.50/5.00

Lecturer ISM 6905: Independent Study Online 2 12 U. of South Florida

Fall 2019 4.63/5.00

Lecturer ISM 6328: Information Security and Management

Online 4 104 U. of South Florida

Spring 2019 4.50/5.00

Lecturer ISM 6328: Information Security and Management

Online 4 80 U. of South Florida

Fall 2018 4.50/5.00

Lecturer MIS 562: Cyber Threat Intelligence* Online 1 8 U. of Arizona Summer 2018 4.75/5.00

Lecturer MIS 562: Cyber Threat Intelligence In-Person 1 14 U. of Arizona Spring 2019 4.93/5.00

Lecturer MIS 596A: Special Topics in MIS – Cyber Threat Intelligence*

In-Person 1 14 U. of Arizona Spring 2018 4.36/5.00

Lecturer MIS 111: Computers and the Internetworked Society

In-Person 1 37 U. of Arizona Summer 2017 4.85/5.00

GTA MIS 611D: Topics in Data and Web Mining In-Person 1 14 U. of Arizona Spring 2016 -

GTA MIS 496A: Special Topics in Data Analytics In-Person 1 14 U. of Arizona Spring 2016 -

*Note: First time offered. Designed, developed, and delivered all content. **Regularly invited for guest lectures pertaining to text analytics, data mining, deep learning, and cybersecurity.

PROFESSIONAL WORKSHOPS AND SYMPOSIA DELIVERED 1. Hawaii International Conference on Systems Sciences (HICSS). Workshop Title: Cybersecurity Big Data. Kauai, Hawaii. January,

2021 (Planned).

2. IEEE International Conference on Data Mining (ICDM). Workshop Title: Deep Learning for Cyber Threat Intelligence (DL-CTI). Sorrento, Italy. November 17- 20, 2020 (Planned).

3. University of Arizona (UA) Management Information Systems (MIS) Scholarship-for-Service (SFS) Technical Workshop. Workshop Title: Research Bootcamp for SFS. Tucson, AZ. Fall, 2020 (Planned).

4. University of Arizona (UA) Management Information Systems (MIS) Scholarship-for-Service (SFS) Technical Workshop. Workshop Title: Research Bootcamp for SFS. Tucson, AZ. September 13, 2019.

5. University of South Florida (USF) Information Systems and Decision Sciences (ISDS) Technical Workshop. Workshop Title: Web

Crawling and API Access. Tampa, FL. February 22, 2019.

6. University of Arizona (UA) Management Information Systems (MIS) Scholarship-for-Service (SFS) Technical Workshop. Workshop Title: Research Bootcamp for SFS. Tucson, AZ. Fall, 2017.

7. University of Arizona (UA) Management Information Systems (MIS) Scholarship-for-Service (SFS) Technical Workshop. Workshop Title: Research Bootcamp for SFS. Tucson, AZ. Fall, 2016.

Page 9: Sagar Samtani, Ph.D.sagarsamtani.com/wp-content/uploads/2020/07/Sagar... · Learning and Analysis for Inferring Evolving IoT otnets in the Wild _ Computers and Security, Volume 91,

Sagar Samtani, Ph.D. 1275 E. 10th St, HH 4111, Bloomington, IN 47405

E-mail: [email protected] Phone Number: +1 (520)-971-4274

Website: www.sagarsamtani.com Last CV Update: June 30, 2020

__________________________________________________________________________________________________

9

8. University of Arizona (UA) Management Information Systems (MIS) Technical Workshop. Workshop Title: Hadoop and Spark: Data Collection, Loading, and Analysis. Tucson, AZ. Spring, 2016.

9. University of Arizona (UA) Management Information Systems (MIS) Technical Workshop. Workshop Title: Hadoop and Spark:

Infrastructure Installation, Setup, and Configuration. Tucson, AZ. Spring, 2016.

GRANTS FUNDED OR RECOMMENDED FOR FUNDING ($1.425M Total; $295K IU Share) 1. Year: 2019. Funding source: Arnie and Lauren Bellini Foundation. Grant Title: “Fight Back Initiative” Funding Amount: $250K.

Status: Awarded. Role: Sole-PI (Transferred to Dr. Manish Agrawal, USF).

2. Year: 2019. Funding source: National Science Foundation. Grant Title: “CRII: SaTC: Identifying Emerging Threats in the Online Hacker Community for Proactive Cyber Threat Intelligence: A Diachronic Graph Convolutional Autoencoder Framework” Funding Amount: $175K. Status: Awarded. Rating: Competitive. NSF Award Number: CNS-1850362. Role: Sole-PI. Duration: 2019 – 2021.

3. Year: 2019. Funding source: National Science Foundation. Grant Title: “CICI: SSC: Proactive Cyber Threat Intelligence and Comprehensive Network Monitoring for Scientific Cyberinfrastructure: The AZSecure Framework” Funding Amount: $1M (USF Share: $120K). Status: Awarded. Rating: Highly Competitive. NSF Award Number: OAC-1917117. Role: Co-PI. Duration: 2019 – 2022.

GRANT PROPOSALS UNDER REVIEW 4. Year: 2020. Funding source: National Science Foundation. Grant Title: “SaTC EAGER: AI for Cybersecurity (AI4Cyber) Research

Education at Scale” Funding Amount: $300K (IU Share: 100K). Status: Pre-Proposal Accepted; Full Proposal Under Review. Role: Co-PI.

5. Year: 2020. Funding source: National Science Foundation. Grant Title: “D-ISN: TRACK 1: Disrupting Illicit Dark Web Hacker

Community Networks: An Explainable AI Approach” Funding Amount: $1M (IU Share: $150K). Role: Co-PI.

GRANT PROPOSALS IN PREPARATION 6. Year: 2020. Funding source: National Science Foundation. Grant Title: “CRI for Cybersecurity: A Cyber Threat Intelligence (CTI)

Perspective” Funding Amount: $1.5M (IU Share: $100K). Role: Co-PI. 7. Year: 2020. Funding source: National Science Foundation. Grant Title: Research Experience for Undergraduates Supplement

Funding Amount: $28K. Role: PI.

8. Year: 2020. Funding source: National Science Foundation. Grant Title: “SaTC: TTP: Medium: Cybersecurity Transition-to-Practice Research: Identifying Key Hackers, Hacker Assets, and Emerging Threats” Funding Amount: $1.2M (IU Share: 122K). Role: Co-PI.

UNFUNDED GRANTS 9. Year: 2020. Funding source: University of South Florida (USF) Strategic Investment Pool (SIP). Grant Title: “Designing and Starting

a Cyber Threat Intelligence Research Lab” Funding Amount: $100K. Status: Declined. Role: PI.

10. Year: 2019. Funding source: National Science Foundation. Grant Title: “SaTC: TTP: Medium: Cybersecurity Transition-to-Practice Research: Identifying Key Hackers, Hacker Assets, and Emerging Threats” Funding Amount: $1.2M (USF Share: 122K). Status: Unfunded. Rating: Low Competitive. Role: Co-PI.

11. Year: 2019. Funding source: Adobe Faculty Award. Grant Title: “Identifying, Tracking, and Monitoring Customer Preference Evolution for Enhanced Customer Intelligence: A Temporal Graph Convolutional Autoencoder Perspective” Funding Amount:

Page 10: Sagar Samtani, Ph.D.sagarsamtani.com/wp-content/uploads/2020/07/Sagar... · Learning and Analysis for Inferring Evolving IoT otnets in the Wild _ Computers and Security, Volume 91,

Sagar Samtani, Ph.D. 1275 E. 10th St, HH 4111, Bloomington, IN 47405

E-mail: [email protected] Phone Number: +1 (520)-971-4274

Website: www.sagarsamtani.com Last CV Update: June 30, 2020

__________________________________________________________________________________________________

10

$50K. Status: Under Review. Role: PI (with B. Choi, USF Marketing).

12. Year: 2019. Funding source: National Science Foundation. Grant Title: “SaTC: EDU: Developing and Delivering a Cybersecurity Concentration for a Professional Doctoral Program” Funding Amount: $500K. Status: Unfunded. Role: Co-PI.

13. Year: 2019. Funding source: National Science Foundation. Grant Title: “CRI for Cybersecurity: A Cyber Threat Intelligence (CTI) Perspective” Funding Amount: $1.5M (USF Share: $100K). Status: Unfunded. Rating: Low Competitive. Role: Co-PI.

14. Year: 2018. Funding source: University of South Florida (USF) Strategic Investment Pool (SIP). Grant Title: “Designing and Developing a Cyber Threat Intelligence Research Lab” Funding Amount: $75K. Status: Letter of Intent Recommended; Full Proposal Unfunded. Role: PI.

15. Year: 2018. Funding source: National Science Foundation. Grant Title: “EAGER: Data Fusion of Hacker Community Platforms for Proactive Cyber Threat Intelligence” Funding Amount: $300K. Status: Project Concept Rejected. Role: PI.

16. Year: 2018. Funding source: National Science Foundation. Grant Title: “CICI: SSC: Proactive Cyber Threat Intelligence and Comprehensive Network Monitoring for Scientific Cyberinfrastructure: The AZSecure Framework” Funding Amount: $1M. Status: Unfunded. Rating: Low Competitive. Role: Co-PI.

17. Year: 2018. Funding source: Cyber Florida. Grant Title: “Collaborative Seminar Series in Proactive Artificial Intelligence for

Cybersecurity (SPAIC)” Funding Amount: $75K. Status: Unfunded. Role: Collaborator.

PROFESSIONAL SERVICE 1. Editorial Roles (2 Journals (3 Special Issues), 2 Conferences; IS and CS):

• Journals: o Guest Associate Editor for ACM Transactions on Management Information Systems (TMIS) Special Issue on

Analytics for Cybersecurity Applications, 2019 – 2020. o Guest Associate Editor for ACM Transactions on Management Information Systems (TMIS) Special Issue on

Analytics for Privacy Applications, 2019 – 2020. o Guest Editor for IEEE Transactions on Dependable and Secure Computing (TDSC) Special Issue on Explainable

Artificial Intelligence for Cyber Threat Intelligence (XAI-CTI), 2020 – 2021.

• Conferences: o Associate Editor for Pacific Asia Conference on Information Systems (PACIS) Track on Artificial Intelligence and

Big Data, 2020. o Associate Editor for International Conference on Information Systems (ICIS) Track on Advances in Research

Methods, 2020.

2. Ad-hoc Reviewer (31 Journals; IS and CS): • Journal of Management Information Systems (JMIS), 2018; Springer Security Informatics, 2018; Transactions on

Management information Systems (TMIS), 2018 – 2019; Information Systems Frontiers (ISF), 2018 – 2019; Management Information Systems Quarterly (MISQ), 2018 – 2020; IEEE Computer, 2018; Big Data, 2018; IEEE Intelligent Systems, 2018; Electronic Commerce Research and Applications, 2019; Journal of the Association of Information Systems (JAIS), 2019; Information Systems Research (ISR), 2019 – 2020; IEEE Access, 2019 – 2020; IEEE Transactions on Knowledge and Data Engineering (TKDE), 2019 – 2020; Security and Privacy, 2019; Science China Information Sciences (SCIS), 2019; Internet Technology Letters (ITL), 2019. Sensors, 2019; PLOS One, 2019 – 2020; IEEE Transactions on Industrial Informatics (TII), 2019; Future Generation Computer Systems (FGCS), 2019; Computers and Security (C&S), 2019 – 2020; Journal of Parallel and Distributed Computing (JPDC), 2019; Journal of Cyber Security Technology (TSEC), 2019 – 2020; Social Science Computer Review (SSCR), 2020; Journal of Network and Computer Applications (JNCA), 2020; Cluster

Page 11: Sagar Samtani, Ph.D.sagarsamtani.com/wp-content/uploads/2020/07/Sagar... · Learning and Analysis for Inferring Evolving IoT otnets in the Wild _ Computers and Security, Volume 91,

Sagar Samtani, Ph.D. 1275 E. 10th St, HH 4111, Bloomington, IN 47405

E-mail: [email protected] Phone Number: +1 (520)-971-4274

Website: www.sagarsamtani.com Last CV Update: June 30, 2020

__________________________________________________________________________________________________

11

Computing, 2020; Journal of Medical Systems (JOMS), 2020; Management Science, 2020; Information and Management, 2020; IEEE Transactions on Dependable and Secure Computing (TDSC), 2020; IEEE Transactions on Information Forensics and Security (TIFS), 2020.

3. Ad-hoc Reviewer (14 Conferences; IS and CS): • IEEE International Conference on Data Mining (ICDM), 2020; USENIX Security and Artificial Intelligence Networking

(ScAINet) Summit, 2020; IEEE Security and Privacy (S&P), 2020; International Conference on Secure Knowledge Management (SKM), 2019; International Conference on Computer Science Application Engineering, 2019. Workshop on Data Science (WDS), 2019. Advances in Social Network Analysis and Mining (ASONAM), 2019. International Conference on Design Science Research in Information Systems and Technology (DESRIST), 2019; Americas Conference on Information Systems (AMCIS), 2019; Workshop on Information Technologies and Systems (WITS), 2018-2019; International Conference on Information Systems (ICIS), 2017, 2019; Hawaii International Conference on System Sciences (HICSS), 2016, 2017; IEEE Intelligence and Security Informatics (ISI), 2016, 2019; ICIS Doctoral Consortium, 2018.

4. Conference Committees (11 Total):

• Program Committee, Workshop on Information Technologies and Systems (WITS), 2018-2019; Technical Program

Committee Foundations of Open Source Intelligence and Security Informatics (FOSINT-SI) – held with ASONAM 2019, 2020; Program Committee, IEEE Intelligence and Security Informatics (ISI), 2019; Program Committee, Workshop on Data Science (WDS), 2019 – 2020; Program Committee, International Conference on Secure Knowledge Management (SKM), 2019; Program Committee, GPC International Workshop on Pervasive Health with Artificial Intelligence (PHAI-20), 2020; Program Committee, IEEE Security and Privacy (IEEE S&P) Deep Learning for Security (DLS) Workshop, 2020; Program Committee, USENIX Security and Artificial Intelligence Networking (ScAINet) Summit, 2020; Program Committee, IEEE International Conference on Data Mining (ICDM) Workshop on Deep Learning for Internet of Things (DL-IoT), 2020; Program Committee, ACM Conference on Computer and Communications Security (CCS) AISec Workshop, 2020; Program Committee, Conference on Information Systems and Technology (CIST), 2020.

5. Conference Chair Positions (5 Total): • Co-Chair, IEEE International Conference on Data Mining (ICDM) Workshop on Deep Learning for Cyber Threat Intelligence

(DL-CTI) Workshop, 2020. Program Co-Chair, IEEE Intelligence and Security Informatics (ISI), 2020. Session Chair, INFORMS Annual Meeting. Session Title: “Artificial Intelligence for Social Media Applications.” 2017; Session Chair IEEE Intelligence and Security Informatics (ISI), 2018; Publicity Chair, International Conference on Secure Knowledge Management (SKM), 2019.

6. Other Service to the Field (IS and CS):

• Volunteer, IEEE Intelligence and Security Informatics (ISI), 2016. Tucson, Arizona; Volunteer, International Conference on Information Systems (ICIS), 2015. Fort Worth, Texas.

7. Service to the University of South Florida (USF): • Search Committee, Cybersecurity Faculty Positions (USF Sarasota Manatee; 2020)

• Information Systems and Decision Sciences (ISDS) Ph.D. Course Re-design (2019-2020) • Assisted in Center of Academic Excellence Cyber Defense Education (CAE-CDE) Designation Renewal (2018 – 2019)

• Director of Information Assurance (IA) Concentration for USF’s MS in Cybersecurity (2018 – present) 8. Dissertation Committees:

• Moez Farokhniahamedani, USF ISDS. (Dissertation Committee Member) – 2019 – 2020.

• Kimia Keshanian, USF ISDS. (Dissertation Committee Member) – 2019 – 2020.

• Saurav Chakraborty, USF ISDS (ICIS Doctoral Consortium Fellow, 2019). (Dissertation Committee Member) – 2018 – 2020. Initial Placement: University of Louisville.

Page 12: Sagar Samtani, Ph.D.sagarsamtani.com/wp-content/uploads/2020/07/Sagar... · Learning and Analysis for Inferring Evolving IoT otnets in the Wild _ Computers and Security, Volume 91,

Sagar Samtani, Ph.D. 1275 E. 10th St, HH 4111, Bloomington, IN 47405

E-mail: [email protected] Phone Number: +1 (520)-971-4274

Website: www.sagarsamtani.com Last CV Update: June 30, 2020

__________________________________________________________________________________________________

12

• Agnieszka Onuchowska, USF ISDS. (Dissertation Committee Member) – 2018 – 2020. Initial Placement: Southern Illinois University Edwardsville.

• Rebecca Perols, USF Accounting. (Dissertation Defense Chair) – Defended March 7, 2019. Initial Placement: San Diego State University (SDSU).

AWARDS AND RECOGNITION 1. Grant Thornton Scholar, Indiana University. 2020 – 2022. 2. Nominee, Scholarship-for-Service (SFS) Hall of Fame. 2020. 3. Winner, ACM SIGMIS Doctoral Dissertation Competition, International Conference on Information Systems (ICIS). 2019. 4. MIS Nominee for ACM SIGMIS Doctoral Dissertation Competition. University of Arizona. 2019. 5. National Science Foundation (NSF) CISE Research Initiation Initiative (CRII) Award. 2019. 6. Runner-up, Best Paper Award. IEEE Intelligence and Security Informatics (ISI). 2018. 7. Runner-up, INFORMS Information Systems Society (ISS) Nunamaker-Chen Dissertation Award. 2018. 8. Paul S. and Shirley Goodman Award in International Computer Technology. 2017. 9. Doctoral Consortium, International Conference on Information Systems (ICIS). 2017. 10. Runner-up, Best Paper Award. IEEE Intelligence and Security Informatics (ISI). 2017. 11. Doctoral Consortium, Americas Conference on Information Systems (AMCIS). 2017. 12. National Science Foundation (NSF) Scholarship-for-Service (SFS) Fellowship. 2014 – 2017. 13. MIS Nominee for the Eller College Teaching Award. University of Arizona. 2017. 14. Doctoral Consortium, IEEE Intelligence and Security Informatics (ISI). 2016. 15. James F. LaSalle Award for Teaching Excellence as a Graduate Student Instructor. University of Arizona. 2016.

PRESS AND MEDIA MENTIONS 1. “Cyber Threats Rise in Time of Uncertainty, Fear” Muma College of Business, March 26, 2020. 2. “What the Tampa Bay Rays Can Teach Us About Building a Successful Cyber Team” Cyber Florida, March 5, 2020. 3. “FBI: Don’t Pay the Ransom in a Cyberattack” BayNews9, December 10, 2019 4. “UArizona Researchers Going on Offense and Defense in Battle Against Hackers” UANews, University of Arizona. December 3,

2019. a. “Eller College Researchers Go on Offense, Defense in Battle Against Hackers” Eller College of Management, December 4,

2019. 5. “ConnectWise-initiated IT threat intelligence sharing body gears up for launch to provide ‘Star Wars’ defense against cyber

attacks” ChannelBuzz. November 5, 2019. a. “ConnectWise Parts Curtain on Evolving Cybersecurity Threat Sharing Initiative” ChannelProNetwork. November 1, 2019. b. “ConnectWise’s New TSP-ISAO Program Creates Hub for Cyberthreat Information” ChannelFutures. November 4, 2019. c. “ConnectWise IT Nation Connect 2019 – Recap” ConnectWise. November 14, 2019. d. “USF receives $250K from ConnectWise founder to study cybersecurity” Tampa Bay Business Journal. November 18,

2019. 6. “ISDS Professor Lands a $250K Grant to Study Cybersecurity, Dark Web” Muma College of Business. November 5, 2019. 7. “NSF renews grant for University of Arizona Cybersecurity Program” EurekAlert!, American Association for the Advancement of

Science. October 15, 2019. a. “NSF renews grant for University of Arizona Cybersecurity Program” Science Magazine, October 15, 2019. b. “NSF Grant Renews Cybersecurity Program in Eller College” Eller College of Management, October 18, 2019. c. “Cybersecurity Students Benefit from Scholarship Program” UANews, University of Arizona. October 18, 2019.

8. “Why shakedown artists find it so easy to bamboozle Florida cities out of cash and data” Miami Herald. August 23, 2019. 9. “New Projects in Business Education – September 2019” BizEd AACSB International. August 26, 2019. 10. “Artificial Intelligence and the Dark Web” Cyber Florida No Password Podcast. WUSF Public Media. August 15, 2019. 11. “USF Professor on Artificial Intelligence: ‘Data is the new oil’” Fox 13. August 6, 2019. 12. “Capital One Hack Sparks Discussion of Cyber Hygiene” WUSF Public Media. August 6, 2019.

Page 13: Sagar Samtani, Ph.D.sagarsamtani.com/wp-content/uploads/2020/07/Sagar... · Learning and Analysis for Inferring Evolving IoT otnets in the Wild _ Computers and Security, Volume 91,

Sagar Samtani, Ph.D. 1275 E. 10th St, HH 4111, Bloomington, IN 47405

E-mail: [email protected] Phone Number: +1 (520)-971-4274

Website: www.sagarsamtani.com Last CV Update: June 30, 2020

__________________________________________________________________________________________________

13

13. “What to Consider Before Claiming the $125 Settlement from the Equifax Hack” The Penny Hoarder. August 2, 2019. 14. “Cybersecurity to Get Added to the Business School Curriculum” Dark Web Link. June 14, 2019. 15. “USF Adds Cybersecurity to Business School Curriculum” Fox 13. June 12, 2019. 16. “ISDS Professor’s NSF Grant Will Fund Research Aimed at Protecting Scientific Instruments from Cyber Attack” Muma College of

Business. June 5, 2019. 17. “ISDS Assistant Professor Sagar Samtani Lands a National Science Foundation Grant to Study the Dark Web” Muma College of

Business. April 10, 2019. 18. “Faculty Spotlight: Sagar Samtani Dives Deep into the Dark Web to Find Answers, Solutions” Muma College of Business. February

8, 2019. 19. “ISDS Faculty Reaches New Heights in the Fall of 2018: Papers Published in Prestigious Journals, Research Presented, Awards

Given” Muma College of Business. February 5, 2019. 20. “Eller’s Artificial Intelligence Lab Celebrates 30th Anniversary” Eller College of Management. January 22, 2019. 21. “Research: Identification of Cyber Threats Across Non-English DarkNet Marketplaces” Deep.Dot.Web. December 27, 2018. 22. “What is Threat Intelligence Monitoring?” RSI Security, November 8, 2018. Research Mention. 23. “Cyber defense research designation could improve research opportunities” Arizona Daily Wildcat. August 30, 2017. 24. “Post-Snowden: More Conversations About Privacy, Cyber Security Innovation at the University of Arizona” Aired on April 8, 2016.

a. “Cybersecurity at the University of Arizona: Regents’ Professor Hsinchun Chen Featured on Arizona Public Media” Eller College of Management. April 25, 2019.

PROFESSIONAL AFFILIATIONS AND SOCIETIES 1. Association for Information Systems (AIS), Member

• Special Interest Groups (SIG) Artificial Intelligence and Autonomous (AIAA) and Security (SEC) 2. Association for Computing Machinery (ACM), Member 3. Institute of Electrical and Electronics Engineers (IEEE), Member

• Technical Committee on Security and Privacy

4. Institute for Operations Research and the Management Sciences (INFORMS), Member 5. International Neural Network Society (INNS), Member

PROFESSIONAL CONSULTING, COLLABORATIONS, AND EXPERT SERVICES 1. Founding member, Technology Solutions Provider Information Sharing and Analysis Organization (TSP-ISAO). 2019 – 2020. 2. University of Arizona, Management Information Systems (MIS) Department (CTI and AI for Cybersecurity Consultant). 2019 –

Present. 3. Cyber Florida (Faculty Expert on Cybersecurity, CTI, AI, and Dark Web). 2019 – 2020. 4. University of Arizona, Artificial Intelligence (AI) Lab (Faculty Collaborator). 2018 – Present. 5. University of South Florida, Muma College of Business (Cybersecurity Faculty Expert). 2018 – 2020.

PROFESSIONAL CYBERSECURITY CERTIFICATIONS 1. Information Systems Security Professional (CNSS certificate number 4011) 2. Senior Systems Manager (CNSS certificate number 4012) 3. Systems Administrator (CNSS certificate number 4013) 4. Risk Analyst (CNSS certificate number 4016)

PROFESSIONAL DEVELOPMENT PARTICIPATION: WORKSHOPS AND TRAININGS 1. Junior Faculty Consortium. International Conference on Information Systems. December 2019. 2. SEC 460: Enterprise Threat and Vulnerability Assessment. The SANS Institute. (August 25 – August 30, 2019). 3. USF Research and Innovation NSF CAREER Trainings and Workshops (October 2018; May 2019; November 2019). 4. Pre-Americas Conferences on Information Systems (AMCIS) MIS Quarterly Author Workshop. 2018. 5. Post- International Conference on Information Systems (ICIS) MIS Quarterly Reviewer Workshop. 2017.

Page 14: Sagar Samtani, Ph.D.sagarsamtani.com/wp-content/uploads/2020/07/Sagar... · Learning and Analysis for Inferring Evolving IoT otnets in the Wild _ Computers and Security, Volume 91,

Sagar Samtani, Ph.D. 1275 E. 10th St, HH 4111, Bloomington, IN 47405

E-mail: [email protected] Phone Number: +1 (520)-971-4274

Website: www.sagarsamtani.com Last CV Update: June 30, 2020

__________________________________________________________________________________________________

14

6. Practical Threat Intelligence. Black Hat USA. July 30 – 31, 2016. 7. Bypassing Security Defenses – Secret Penetration Testing Techniques. Black Hat USA. August 1 – 2, 2015.

RELEVANT TECHNOLOGY SKILLS 1. Databases: Oracle 11g, MySQL, PL/SQL 2. Programming Languages: Java, Python 3. Web Development: Joomla, WordPress 4. Visualization tools: Tableau, Spotfire, Gephi 5. Data mining tools: RapidMiner, SPSS Modeler, WEKA, scikit-learn 6. Deep learning toolkits: PyTorch, Keras 7. Security tools: Kali Linux, Shodan, NMap, Burpsuite, Nessus, Metasploit 8. Big Data Technologies: Hadoop and Spark

PERSONAL US Citizen (born in Queens, New York; security clearance eligible), unmarried