SANDIP C. PATEL (Fulbright Scholar and US citizen) Associate Professor Graves School of Business Management 1700 E. Cold Spring Lane Morgan State University Baltimore, Maryland 21251 Phone: (443) 885-3836 E-mail: Sandip.Patel@Morgan.edu EDUCATIONAL QUALIFICATION Doctor of Philosophy: University of Louisville, Kentucky, Computer Science, May 2006. GPA: 4.0. Dissertation: Secure Internet-Based Communication Protocol for SCADA Networks. Master of Science: Georgia Institute of Technology, Atlanta. Information and Computer Science, 1988. Bachelor of Engineering: Gujarat [State] University, India, 1983. Refereed Journal Articles: INTELLECTUAL CONTRIBUTION 1. Mangle, A. & Patel, S. C. (in press, 2014). Issues in User Authentication Using Security Questions. International Journal of Information and Computer Security. 2. Patel, S., Bhatt, G., & Emdad, A. (2014). Development of a Simulator for Complex Systems: A Students' Learning Perspective. American Journal of Information Technology, 4 (1), 33-49. 3. Patel, S. C., Karanja, E., & Maheshwari, S. K. (2013). Web-based Artificial Intelligence Agents. DIAS Technology Review, the International Journal of Business and IT, 9(1), 56-64. 4. Krishnamoorthy, A., Patel, S. C., Shetterly, D. R., & Maheshwari, S. (2012). Use of Technology in Managing Currency Exchange-Rate Exposure in the Public Sector. Delhi Business Review, 13 (2), 17-29. 5. Karanja, E. & Patel, S. C. (2012). A Review of Research Trends in Strategic Information-Systems Planning. International Journal of Business Information, 10(1), 151-177. 6. Thiruvadi, S. & Patel, S. C. (2011). Survey of Data-mining Techniques used in Fraud Detection and Prevention. Information Technology Journal, 10 (4), 710-716. 1
7. Patel, S. C. & Zaveri, J. (2010). Framework to Assess Financial Cost of Cyber Attacks on Control Systems. Journal of Digital Business, 4 (1,2), 36-45. 8. Patel, S., Hieb, J. L., & Graham, J. H. (2010). Secure Internet-Based SCADA for Monitoring and Control of Industrial Processes. International Journal of Computers and Their Applications, 17 (1) 41-51. 9. Bapna, S. & Patel, S. (2010). Securing Computerized Models and Data against Integrity Attacks. International Journal of Electronic Finance, 4 (4), 343-354. 10. Patel, S. & Zaveri, J. (2010). A Risk Assessment Model for Cyber Attacks on Information Systems. Journal of Computers, 5 (3), 352-359. 11. Patel, S. C. & Graham, J. H. (2010). Proving Correctness of SCADA Security-Enhancement Models. Journal of Information Systems Security, 6 (2), 47-67. 12. Patagundi, B., Patel, S., & Viswanath, N. S. (2009). Analysis of Microsoft Client Business Using the Critical-Mass Management Concepts. International Journal of Business and Management Research, 2 (1), 4-16. 13. Patel, S. & Zu, X. (2009). E-Government-Application Development Using The Six Sigma Approach. Electronic Government: An International Journal, 6 (3), 295-306. 14. Hua, J., Patel, S. C., & Zaveri, J. (2009). Securing Business Information Systems from Cyber- Attacks. Journal of Digital Business, 3 (1,2), 35-53. 15. Patel, S. C., Bhatt, G. D., & Graham, J. H. (2009). Improving the Cyber Security of SCADA Communication Networks. Communications of the ACM, 52 (7), 139-142. 16. Patel, S. C. & Emdad, A. F. (2008). Security Considerations for RFID in Supply Chain Management. Academy of Taiwan Business Management Review, 4 (2), 12-19. 17. Patel, S. C., Graham, J. H., & Ralston, P. A. S. (2008). Quantitatively assessing the vulnerability of critical information systems: A new method for evaluating security enhancements. International Journal of Information Management, 28 (6), 483-491. 18. Sanyal, P. & Patel, S. C. (2008). Pattern Recognition Method to Detect Two Diseases in Rice Plants. The Imaging Science Journal, 56 (6), 319-325. 19. Patel, S. C., Shetterly, D. R., & Krishnamoorthy, A. (2008). Information-Technology Security in Higher-Education Curricula. International Journal of Information and Operations Management Education, 2 (4), 378-387. 20. Patel, S. & Sanyal, P. (2008). Securing SCADA Systems. Information Management & Computer Security, 16 (4), 398-414. 21. Patel, S., and Yu, Y., Analysis of SCADA Security Models, The International Management Review 3(2), 2007, 68-76. 2
22. Graham, J., and Patel, S. Internet-based Secure Monitoring and Control for Utility Companies and Process Plants, DIAS Technology Review, The International Journal of Business and IT, 3(1), 2006, 28-33. 23. Graham, J., and Patel, S., Security Issues in SCADA Systems, DIAS Technology Review: The International Journal of Business and IT, 1(2), 2005, 51-57. 24. Patel, S., and Hayes, J., Case Study: Teaching an Electronic Course, Journal for Advancement of Marketing Education. 1(2) Summer, 7-17, 2002. 25. Patel, S., and Maheshwari, S. Information System and Performance Measurement Life Cycle, Delhi Business Review, 1(2),19-24, 2000. Book Chapters: 1. Hieb, J., Patel, S., and Graham, J., "Security Enhancements for Distributed Control Systems" in IFIP International Federation for Information Processing, Volume 253, Critical Infrastructure Protection, S. Shenoi and E. Goetz, Eds. Boston: Springer, pp. 133-146, 2008. Conference Proceedings (recent): 1. Patel, S. and Bhatt, G. D., Simulating the Transmission of Epidemics through Complex Systems: a Classic Model, Proceedings of 2014 Hawaii Global Conference on Business and Finance, 9(1), Honolulu, HI, January 6-9, 2014, 125-131. 2. Bhatt, G. D. and Patel, S., An Exploratory Study of Complex Social Systems through Simulation, Proceedings of the 43rd Annual Meeting of the Decision Sciences Institute, San Francisco, November 17-20, 2012, 10901-10908. 3. Bhatt, G. and Patel, S., Examining the Effect of Information Systems (IS) Competence in Creating Business Advantages, Proceedings of the 38th Annual Meeting of the Decision Sciences Institute, Phoenix, AZ, November 17-20, 2007, 4701-4706. 4. Bapna, S. and Patel, S., Securing Business Models and Data Against Integrity Attacks, Proceedings of the 38th Annual Meeting of the Decision Sciences Institute, Phoenix, AZ, November 17-20, 2007, 4541-4546. 5. Hua, J, Patel, S., and Zaveri, J., A Framework for IT-based Information Systems Security, Proceedings of the 38th Annual Meeting of the Decision Sciences Institute, Phoenix, AZ, November 17-20, 2007, 2301-2306. 6. Karanja, E., Zaveri, J, and Patel, S., The Role of Access Control and Authentication in Information System Security, Proceedings of the 38th Annual Meeting of the Decision Sciences Institute, Phoenix, AZ, November 17-20, 2007, 2281-2286 7. Patel, S. and Zu, X., Internet Application Development Using the Six Sigma Approach, 3
Proceedings of International Conference on Internet Computing, June 25-28, 2007, Las Vegas, 54-62. 8. Sanyal, P. Bhattacharya, U. Parui, S.Bandyopadhyay, S, and Patel, S., Color Texture Analysis of Rice Leaves Diagnosing Deficiency in the Balance of Mineral Levels Towards Improvement of Crop Productivity International Information Technology Conference (ICIT) 17th 20th December 2007. Rourkela, India, 85-90. 9. Yu, Y. and Patel, S.,"Incorporating Soft Computing Techniques for Intrusion Detection Systems" Proceedings of International Symposium on Computer Science and Technology: (ISCST 2007), Ningbo, China, May 18-20, 2007, pp 1-5. 10. Shetterly, D., Patel, S., and Krishnamoorthy, A., Integration of SCADA into MBA and MPA Curricula in the Post 9/11 Era, 30th Annual Teaching Public Administration Conference, Harrisburg, PA., May 24 25, 2007. 11. Graham, J., Mostafa S., Arazi, B., Tantawy, A., Hieb, J., Ralston, P., and, Patel, S. Improvements in SCADA and DCS systems security, Proceedings of International Conference on Computers and Their Applications, Honolulu, Hawaii, March 28-30, 2007, pp. 194-200. 12. Patel, S., Graham, J., and Ralston, P., Security Enhancement for SCADA Communication Protocols Using Augmented Vulnerability Trees, Proceedings of the Computer Applications in Industry and Engineering, Las Vegas, NV, November 13-15, 2006, pp. 244-251. 13. Patel, S., and Graham, J., Ralston, P., and Tantalean-Carrasco, R., Secure SCADA Communications, Monitoring, and Control over the Internet, Proceedings of the 18 th Computer Applications in Industry and Engineering, Honolulu, Hawaii, November 9-11, 2005, pp.169-174. 14. Awarded Best Paper: Graham, J., and Patel, S., Correctness Proofs for SCADA Communication Protocols, Proceedings of the 9 th World Multi-Conference on Systemics, Cybernetics and Informatics, Orlando, FL, July 10-13, 2005, pp. 392-397. Abstracts in Conferences: 1. Yu, Y. and Patel, S. (2009). Web-Based AI Agents. Abstract in Proceedings of ACM Mid-Southeast Conference, November 12 13, 2009, Gatlinburg, Tennessee, 79-80. 2. Yu, Y. and Patel, S. (2008). A Survey of Security Issues and Enhancements of SCADA Networks. Abstract in Proceedings of the ACM Mid-Southeast Conference, November 20 21, 2008, Gatlinburg, Tennessee, 64-65. Paper Presentations: 1. Patel, S. (2010). Data Coordination, 2010 Spring Faculty-Institute Meeting, Morgan State University, Baltimore, Maryland 2. Patel, S., and Zaveri, J. (2009), Risk Assessment to Electronic Services from Cyber Attacks, International Conference on Service Management, Orlando, Florida, May 21-24. 4
3. Patel, S. (2009). SCADA Security: Recent Issues & Research, Invited presentation at the Centers for Medicare & Medicaid Services, Baltimore, Maryland. AWARD 2014-15: Fulbright Core Academic and Professional Excellence award by United States Department of State: Bureau of Educational and Cultural Affairs for research on Smart Farming with SCADA-Sensor Based Irrigation for Coastal Areas of Gujarat State, India. TEACHING and INDUSTRY EXPERIENCE Associate Professor: (August 2010 to present) and Assistant Professor: (August 2006 to August 2010): Information Science and Systems Department, Graves School of Business Management, Morgan State University, Baltimore, Maryland. Taught the following courses: Doctoral Course - Information Systems Security Undergraduate Courses: - Capstone Course on Information - Electronic Commerce Systems Development - Management Information Systems - Server-Side Programming - Database Systems - Client-Side Programming - Introduction to Computer-Based Information Systems Research Assistant : (August 2002 to May 2006): University of Louisville, Kentucky and University of Kentucky. Instructor: (August 1999 to May 2002): Marshall University, West Virginia. Taught the following courses to the undergraduates (four courses each semester): - Advanced Programming - Introduction to Programming Using Visual Basic - Principles of MIS - Telecommunication Systems - Statistics (via electronic media) - Systems Analysis and Design - Statistics (in the classroom) Owner and Consultant: (February 1996 to August 1999): Smart Resources Inc., Florida. Assessed customers computerization needs, developed and implemented solutions. Provided maintenance support to customers on site. Consultant/Programmer: (Feb. 1992 to Feb. 1996): IBM, Florida: OS/2 Microkernel Performance and IBM, New York: AIX/ESA System Test. 5
Designed, developed, and maintained Microkernel functionality programs and performance benchmark programs. Analyzed the results and implemented solutions. Designed, created, and evaluated results of test cases simulating different AIX/ESA system users. Software Engineer: (1988 to Feb. 1992) NCR/AT & T South Carolina: Quality Assurance. Certified UNIX operating system versions for the customers of NCR Tower 800 (mid-frames), LAN Manager/X network environment, and application programs. Assistant Engineer: (June 1983 to June 1985) State Government of Gujarat, India. 6