• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Shreyas Kumar
  • Research
  • Research and Academic Milestones
  • People
  • Cybersecurity Resources

Shreyas Kumar

Texas A&M University College of Engineering

Shreyas Kumar

Professor of Practice

Department of Computer Science and Engineering
Department of Multidisciplinary Engineering (Joint Courtesy Faculty Appointment)

 

Fall 2025 Teaching
  • CSCE 703/CYBR 603/MARA 655: Cybersecurity Risk
    • Prerequisite: G7/G8 Classification, A curious mind
  • CSCE 477/CYBR 403: Cybersecurity Risk 
    • Prerequisite: A curious mind
  • CSCE 689: Special Topics: Security Engineering
    • Prerequisite: G7/G8 Classification, UG Engineering Honors
  • CSCE 482: Senior Capstone Design
    • Prerequisite: Grade of C or better in CSCE 411, and CSCE 315 or CSCE 331; senior classification;
  • CSCE 691: Graduate Research 
  • CSCE 685: Directed Studies  
  • CSCE 491: Undergraduate Research 
  • CSCE 491/291: Undergraduate Directed Studies   
Spring 2025 Teaching
  • CSCE 703/CYBR 603/MARA 655: Cybersecurity Risk
    • Prerequisite: Grad classification or my permission
  • CSCE 477/CYBR 403: Cybersecurity Risk
    • Prerequisite:  Grade of C or better in CYBR 201/CSCE 201, CSCE 201/CYBR 201, or CSCE 221; junior or senior classification.
  • CSCE 482: Senior Capstone Design (Section 934)
    • Prerequisite: Grade of C or better in CSCE 411, and CSCE 315 or CSCE 331; senior classification;
  • CSCE 120: Program Design and Concepts (Sections 516 to 519)
    • Prerequisite: Grade of C or better in ENGR 102, CSCE 110, CSCE 111, CSCE 206, or PHYS 150.
  • CSCE 485: Directed Studies
  • ITDE 685: Directed Studies
Fall 2024 Teaching
  • ENGR-689-303: Applied Blockchain for Engineers
    • Prerequisite: G7/G8 Classification or Undergrads via Instructor Approval
    • Syllabus and details
    • For registration, CRN# 59797
  • CSCE 120: Program Design and Concepts (Sections 508, 509, 510, 511, 512, 513, 514 & 515)
    • Prerequisite: Grade of C or better in ENGR 102, CSCE 110, CSCE 111, CSCE 206, or PHYS 150.

Current Research (Details at AGGIES Lab site)

  • AI and Cybersecurity
  • Cyber Warfare
  • Small Business Security
  • Cyber Liability Insurance
  • Blockchains Security

Publications

  • Kumar, S., Crowe, E., and Gu, G., 2025. Demystifying the Perceptions Gap Between Designers and Practitioners in Two Security Standards.10th IEEE European Symposium on Security and Privacy (Euro S&P 2025),  June 30 – July 4, 2025, Venice, Italy.
  • Kumar, S., Dewitte, P., and Gu, G., 2025. Incentivizing Security Excellence in Cyber Liability Insurance. 10th IEEE European Symposium on Security and Privacy, (Euro S&P 2025),  June 30 – July 4, 2025, Venice, Italy
  • Kumar, S., Yim, M., Agarwal, A., Garg, A.,  and Bhatnagar, D., 2025. Cyber Threats to Nuclear Safety: Game Theory Strategies for Enhanced Deterrence. 24th European Conference on Cyber Warfare and Security (ECCWS), 26-27 June, Kaiserslautern, Germany
  • Kumar, S. , Klappenecker, A. Brown, G. and Saravanan, S. 2025. Quantum Apocalypse: Fortifying Critical Infrastructure in the Age of Cyber Warfare. 24th European Conference on Cyber Warfare and Security (ECCWS), 26-27 June, Kaiserslautern, Germany 
  • Kumar, S. , Brown, G. , Ragavan S. , Cerrato, M. and Nagar, G. 2025. NATO Self-Defense – Is Article 5 the Right Framework for Responding to Sub-kinetic Cyber Aggression? 24th European Conference on Cyber Warfare and Security (ECCWS), 26-27 June, Kaiserslautern, Germany
  • Singh, N., Kumar, S., Singh, T., and Kumar, P.  2025, Building Trust in Smart TVs: AI-Enhanced Cybersecurity for Privacy and Ethical Monetization, 24th European Conference on Cyber Warfare and Security (ECCWS), 26-27 June, Kaiserslautern, Germany
  • Kumar, S., Gangwar, S.P., Singh, N., Pagaria, R., Garg, A., and Das, S. 2005.Securing the Skies: Innovating Cybersecurity Governance for India’s Emerging Small Airports, 24th European Conference on Cyber Warfare and Security (ECCWS), 26-27 June, Kaiserslautern, Germany
  • Kumar, S., Garg, A., and Niranjan, M.,  2025 Enhancing Government Efficiency Through Cybersecurity Hardening. 26th Annual International Conference on Digital Government Research – dg.o. June 9-12, 2025, Porto Alegre City, Brazil. (This work was presented to Texas State Legislature, on invitation by the Chairman of the Committee on Government Efficiency)
  • Kumar, S., Menezes, A., Agrawal, G., Bajaj, N., Naren, M., and Jindal,S., 2025. Impact of AI in Social Media: Addressing Cyber Crimes and Gender Dynamics. 12th European Conference on Social Media (ECSM), 22-23 May, Porto, Portugal.
  • Kumar, S., Niranjan, M., Nagar, G., Tripathi K. and Peddoju S., 2025. Humanizing Cyber War: Proposal for a Geneva Convention Equivalent for Cyber Warfare. 20th International Conference on Cyber Warfare and Security (ICCWS), 28-29 March, Williamsburg, Virginia, USA. (Winner, TAMU SRW Poster)
  • Singh, N., and Kumar, S., 2025. AI-Driven Cybersecurity Strategies for ISPs: Balancing Threat Mitigation and Monetization. 20th International Conference on Cyber Warfare and Security (ICCWS), 28-29 March, Williamsburg, Virginia, USA.
  • Arunthavanathan, R., Khan, F., Sajid, Z., Amin, T., Kota, R. and Kumar, S. 2025. Are the processing facilities safe and secured against cyber threats? Reliability Engineering & System Safety, Elsevier, Vol 258, June 2025, p.111011
  • Kumar S.,Menezes, A., Giri, S. and Kotikela, S. 2024. What The Phish! Effects of AI on Phishing Attacks and Defence. 4th International Conference on AI Research (ICAIR), 05-06 Dec, Lisbon, Portugal.
  • Nagar, G. and Kumar S. 2025. Cyber Security Kill Chain – Tactics and Strategies (Book) Packt Publishers, Birmingham, UK.
  • Kumar, S. , Kocian, L. and Loo, L. 2024. Blockchain Applications for Cyber Liability Insurance.  International Journal on Cybernetics & Informatics (IJCI) Vol.13, No.5, October 2024 pp.119-139. 
  • Kumar, S. and Nagar, G. 2024. Threat Modeling for Cyber Warfare against Less Cyber-dependent Adversaries. 23rd European Conference on Cyber Warfare and Security (ECCWS), 27-28 June, Jyväskylä, Finland.
  • Sanchez, H. and Kumar, S. 2011. Twitter Bullying Detection. ser. NSDI, 12(2011), p.15.
  • Kumar, S. 2021. Securing Business Implementations of Blockchain. Secure World West Coast 202, San Jose, California
  • Kumar, S. and Kurmi, A. 2019. Best Practices for Identity and Access Management for Public Clouds. ISC2 Security Conference New Orleans USA
  • Kumar, S. and Shipman, F. 2005. Patterns in the daily diary of the 41st president, George Bush. Master’s Thesis. Texas A&M University.

Research in Progress

  • Kumar, S. , Girimaji, S. Koola, P. and Spahiu, A. 2025. Cybersecurity Bridges The Gap: Safeguarding Infrastructure From Compromised Cargo Vessels. Accepted for University R&D Showcase, Offshore Technology Conference (OTC 2025), Houston, TX, USA.
  • Kumar, S., Gangwar, S.P., Singh, Pagaria, R., Garg, A., and Das, S. 2005.Securing the Skies: Innovating Cybersecurity Governance for India’s Emerging Small Airports, 24th European Conference on Cyber Warfare and Security (ECCWS), 26-27 June, Kaiserslautern, Germany (abstract accepted).
  • Kumar, S., Bajaj, N., Tripathi K. and  Rana, R. 2025. Cyber-Chemical Terrorism: The Convergence of Cyber Warfare and Chemical Threats. Journal of Information Warfare. (abstract accepted).
  • Kumar, S.,  Honcharenko, S., Das, S., and Mendoza, A. 2025. Resilience Under Fire: An Information Systems Framework for SME Cybersecurity Amid Kinetic and Cyber Aggression, MIS Quarterly (manuscript submitted).
  • Veetil, V., Kaniyamattam K. and Kumar, S. 2025. Enhancing Blockchain Enabled Resilience in the U.S. Beef Supply Chain (in progress).
  • Kumar, S. , Brown, G. , and Ragavan S. 2025. Legal Framework for Space Mining: A Strategic Blueprint for Texas and U.S. Leadership. (in progress).
  • Kumar, S., Garg, A. and Niranjan, M.,. AI powered Nuclear Security. (in progress).
  • Kumar, S., Garg, A., Menezes, A., Agrawal, G., Niranjan, M. and Das, R., 2025. Securing Privacy in AI Algorithms: Addressing Gender Bias in Social Media. (in progress)
  • Mendoza, A., Kumar, S., Alvarez, A. and Garg, A. 2025. Understanding the Trends and Evolution of Mobile Software Vulnerabilities: A Ten-Year Retrospective. (in progress)
  • Kumar, S., Glenwinkel, W., and Singh, A., 2025. Transforming Healthcare with AI: Security and Privacy in Remote AI-Enabled Stethoscopes TechConnect World Innovation Conference, 9-10 June, Austin, Texas (abstract accepted), (Winner, Best Student Abstract Award)
  • Kumar, S., Mitrani, A. and Gu, G., 2025. SUCCESS: A First Step Towards Usable Security Standards for Small Businesses. 34th USENIX Security Symposium, Seattle, USA. (in progress)
  • Kumar, S., Huang, J., and Gu, G., 2025. Lack of Trust is Killing Zero Trust: A Practitioner-centric Study. (in progress)
  • Kumar, S., Crowe, E., and Gu, G., 2025. Talk the Talk and Walk the Walk: A User and Data-Centric Approach to Understanding and Improving Security Operations.  (in progress)
  • Crowe, E. Ghosh, P., Kumar, S., , and Gu, G., 2025. The Psychology of Password Negligence: Examining Present Bias and Hyperbolic Discounting in Personal Cybersecurity Habits. (in progress)
  • Daruka, A., Nigam, A, Kumar, S. 2025, Cyberbiosecurity: Safeguarding Biological Data and Systems in the Digital Age. WiCyS 2025 Conference April 2-5 in Dallas, TX (poster accepted)
  • Bajaj, N., and Kumar, S. 2025, AI powered Insider Threat Detection Algorithm. (in progress)
  • Kumar, S., and Garg, A., 2025, AI powered Scaling Mentorship with AI: Transforming Student Support for Holistic Development. (in progress)
  • Kumar, S., Agrawal, G., Menezes, A., Hoyt, G., and Bajaj, N., 2025. AI-Driven Detection and Prevention of Gender-Based Bullying in eSports (in progress)
  • Kumar, S.,  and Kumar, A., 2025. Ransomware and Cyber Liability Insurance: Business Risks and Complexity. (in progress)
  • Kumar, S., and Pagaria, R., 2025. Adaptive AI Sentinels Against Phishing Attacks: Democratizing Cybersecurity through Interactive Learning (in progress).
  • Kumar, S., and Niranjan, M., 2025. AI-Augmented Web Vulnerability Detection: Bridging Static Analysis and Live Attack Simulation for Critical System Defense (in progress).
  • Kumar, S., and Garg, A., 2025. AI-Powered Nuclear Engineering Security (in progress).

Leadership and Service

  • Academic and Professional (at Texas A&M)
    • 2025-2027, Member of Data Governance Committee, University-wide IT Governance (ITG) program,Texas A&M University
    • 2024-current, Member of Master’s Admissions and Recruiting Committee, Department of CSE, Texas A&M University 
    • 2025-current, Elected Member of Promotions and Tenure Committee, Department of CSE, Texas A&M University 
    • 2025-current, Faculty Advisor, FATE (Freshman Aspiring Towards Excellence), Texas A&M University 
    • 2024-2005, School of Computing Planning Committee, College of Engineering, Texas A&M University 
    • 2020-2024, Member, External Advisory Board, Department of CSE, Texas A&M University
  • Academic and Professional (National and International)
    • 2024-2027, Member of U.S. National Committee Tech Advisory Group (USNC-TAG) for the IEC/ISO Joint Tech Committee on Quantum Technologies 
    • 2024 – current, Advisor, Technology Incubation and Entrepreneurship Development Society (TIDES), Indian Institute of Technology, Roorkee
    • 2024 – current, Member, FBI Infragard
    • 2023-24, Mentor and Leadership Coach, US National Cyber Team
    • 2024-25, Visiting Professor of Cybersecurity, Indian Institute of Technology, Roorkee
    • 2025, Member of Program Committee, 24th European Conference on Cyber Warfare and Security (ECCWS), 26-27 June, Kaiserslautern, Germany
    • 2025, Member of Program Committee, 26th Annual International Conference on Digital Government Research – dg.o 2025, Porto Alegre City, Brazil
    • 2025, Member of Privacy Committee of the Department of Homeland Security
  • Community
    • 2024-26, Member, Executive Committee, IIT Roorkee Alumni Association
    • 2024-current, Member, Rotary Club of College Station
    • 2022-current, Member of the Board of Directors, ACT for Metal Health, San Jose
    • 2022-24, Mentor, Women in Cybersecurity (WiCys)WiCyS

 

<< Link to my CSE Webpage

Pages

  • AI for Government, Grid, Infrastructure & Engineering Security (AGGIES Lab)
  • Cybersecurity Resources
  • Research and Academic Milestones
  • Shreyas Kumar

© 2016–2025 Shreyas Kumar Log in

Texas A&M Engineering Experiment Station Logo
  • College of Engineering
  • Facebook
  • Twitter
  • State of Texas
  • Open Records
  • Risk, Fraud & Misconduct Hotline
  • Statewide Search
  • Site Links & Policies
  • Accommodations
  • Environmental Health, Safety & Security
  • Employment