Aunshul Rege

Temple University Logo

Aunshul Rege

  • College of Liberal Arts

    • Criminal Justice

      • Associate Professor

Courses Taught

Number

Name

Level

CJ 3007

Cybercrime

Undergraduate

CJ 3403

Organized Crime

Undergraduate

CJ 8106

Theories of Crime and Deviance

Graduate

Selected Publications

Recent

  • Bleiman, R., Ducoste, M., & Rege, A. (2021). Understanding cybercriminals through analysis of penetration testing group dynamics. 2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment, CyberSA 2021. doi: 10.1109/CyberSA52016.2021.9478252.

  • Rege, A., Nguyen, T., & Bleiman, R. (2020). A social engineering awareness and training workshop for STEM students and practitioners. 2020 9th IEEE Integrated STEM Education Conference, ISEC 2020. doi: 10.1109/ISEC49744.2020.9280596.

  • Williams, K., Ducoste, M., & Rege, A. (2020). Educating multidisciplinary undergraduates on security and privacy. 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment, Cyber SA 2020. doi: 10.1109/CyberSA49311.2020.9139721.

  • Rege, A., Williams, K., Yang, S., Su, S., So, S., & Moskal, S. (2020). Dissecting cyberadversarial intrusion stages via interdisciplinary observations. IWSPA 2020 - Proceedings of the 6th International Workshop on Security and Privacy Analytics, 71-77. doi: 10.1145/3375708.3380317.

  • Rege, A. & Bleiman, R. (2020). Ransomware attacks against critical infrastructure. European Conference on Information Warfare and Security, ECCWS, 2020-June, 324-333. doi: 10.34190/EWS.20.115.

  • Bleiman, R. & Rege, A. (2020). An examination in social engineering: The susceptibility of disclosing private security information in college students. Proceedings of the 15th International Conference on Cyber Warfare and Security, ICCWS 2020, 47-56. doi: 10.34190/ICCWS.20.036.

  • Rege, A. & Mendlein, A. (2019). Security and Privacy Education for STEM Undergraduates: A Shoulder Surfing Course Project. Proceedings - Frontiers in Education Conference, FIE, 2019-October. doi: 10.1109/FIE43999.2019.9028560.

  • Rege, A., Williams, K., & Mendlein, A. (2019). A social engineering course project for undergraduate students across multiple disciplines. 2019 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2019. doi: 10.1109/CyberSecPODS.2019.8885085.

  • Rege, A. & Vanzant, S. (2019). Examining the roles of muhajirahs in the islamic state via twitter. 2019 International Conference on Cyber Situational Awareness, Data Analytics and Assessment, Cyber SA 2019. doi: 10.1109/CyberSA.2019.8899639.

  • Asadi, N., Rege, A., & Obradovic, Z. (2019). Pattern discovery in intrusion chains and adversarial movement. 2019 International Conference on Cyber Situational Awareness, Data Analytics and Assessment, Cyber SA 2019. doi: 10.1109/CyberSA.2019.8899391.

  • Rege, A., Williams, K., & Mendlein, A. (2019). An experiential learning cybersecurity project for multiple STEM undergraduates. 2019 9th IEEE Integrated STEM Education Conference, ISEC 2019, 169-176. doi: 10.1109/ISECon.2019.8882112.

  • Rege, A. & Adams, J. (2019). The need for more sophisticated cyber-physical systems war gaming exercises. European Conference on Information Warfare and Security, ECCWS, 2019-July, 403-411.

  • Asadi, N., Rege, A., & Obradovic, Z. (2018). Analysis of adversarial movement through characteristics of graph topological ordering. 2018 International Conference on Cyber Situational Awareness, Data Analytics and Assessment, CyberSA 2018. doi: 10.1109/CyberSA.2018.8551361.

  • Rege, A., Obradovic, Z., Asadi, N., Parker, E., Pandit, R., Masceri, N., & Singer, B. (2018). Predicting adversarial cyber-intrusion stages using autoregressive neural networks. IEEE Intelligent Systems, 33(2), 29-39. doi: 10.1109/MIS.2018.111145153.

  • Asadi, N., Rege, A., & Obradovic, Z. (2018). Assessment of group dynamics during cyber crime through temporal network topology. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 10899 LNCS, 401-407. doi: 10.1007/978-3-319-93372-6_44.

  • Dobson, G., Rege, A., & Carley, K. (2018). Virtual cyber warfare experiments based on empirically observed adversarial intrusion chain behavior. Proceedings of the 13th International Conference on Cyber Warfare and Security, ICCWS 2018, 2018-March, 174-181.

  • Rege, A., Biswas, S., Bai, L., Parker, E., & McJunkin, T. (2017). Using simulators to assess knowledge and behavior of "novice" operators of critical infrastructure under cyberattack events. Proceedings - 2017 Resilience Week, RWS 2017, 50-56. doi: 10.1109/RWEEK.2017.8088647.

  • Rege, A., Parker, E., & McJunkin, T. (2017). Using a critical infrastructure game to provide realistic observation of the human in the loop by criminal justice students. Proceedings - 2017 Resilience Week, RWS 2017, 154-160. doi: 10.1109/RWEEK.2017.8088665.

  • Rege, A., Obradovic, Z., Asadi, N., Singer, B., & Masceri, N. (2017). A temporal assessment of cyber intrusion chains using multidisciplinary frameworks and methodologies. 2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment, Cyber SA 2017. doi: 10.1109/CyberSA.2017.8073398.

  • Rege, A. & Lavorgna, A. (2017). Organization, operations, and success of environmental organized crime in Italy and India: A comparative analysis. European Journal of Criminology, 14(2), 160-182. doi: 10.1177/1477370816649627.

  • Rege, A., Obradovic, Z., Asadi, N., Parker, E., Masceri, N., Singer, B., & Pandit, R. (2017). Using a real-time cybersecurity exercise case study to understand temporal characteristics of cyberattacks. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 10354 LNCS, 127-132. doi: 10.1007/978-3-319-60240-0_16.

  • Rege, A., Singer, B., Masceri, N., & Heath, Q. (2017). Measuring cyber intrusion chains, adaptive adversarial behavior, and group dynamics. Proceedings of the 12th International Conference on Cyber Warfare and Security, ICCWS 2017, 285-294.

  • Rege, A., Adams, J., Parker, E., Singer, B., Masceri, N., & Pandit, R. (2017). Using cyber-security exercises to study adversarial intrusion chains, decision-making, and group dynamics. European Conference on Information Warfare and Security, ECCWS, 351-360.

  • Yang, S., Rege, A., & Kuhl, M. (2017). Learning, simulating, and predicting adversary attack behaviors for proactive cyber defense. CEUR Workshop Proceedings, 2057, 30-34.