Rajendra Raj Headshot

Rajendra Raj

Professor

Department of Computer Science
Golisano College of Computing and Information Sciences

585-475-2595
Office Location
Office Mailing Address
Department of Computer Science Rochester Institut

Rajendra Raj

Professor

Department of Computer Science
Golisano College of Computing and Information Sciences

Education

B.Tech. in Electrical Engineering, IIT Madras, India; MS in Computer Science, University of Tennessee, Knoxville; Ph.D. in Computer Science, University of Washington, Seattle.

585-475-2595

Personal Links
Areas of Expertise

Select Scholarship

Published Conference Proceedings
Blair, Jean R. S., et al. "Infusing Principles and Practices for Secure Computing Throughout an Undergraduate Computer Science Curriculum." Proceedings of the ACM ITiCSE '20, Trondheim, Norway. Ed. NA. New York, NY: ACM, 2020. Print.
Raj, Rajendra K., et al. "High Performance Computing Education: Current Challenges and Future Directions." Proceedings of the ITiCSE-WGR '20, Trondheim, Norway. Ed. NA. New York, NY: Association for Computing Machinery, 2020. Print.
Alnemari, Asma, et al. "Protecting Personally Identifiable Information (PII) in Critical Infrastructure Data Using Differential Privacy." Proceedings of the 2019 IEEE International Symposium on Technologies for Homeland Security (HST 2019). Ed. John Aldridge, Rich Moro, and Arash Samani. Waltham, MA: IEEE, 2019. Print.
Mishra, Sumita, et al. "CyberCSP: Integrating Cybersecurity into the Computer Science Principles course." Proceedings of the 2017 IEEE Frontiers in Education Conference (FIE 2017). Ed. Melany Ciampi, et al. Indianapolis, IN: IEEE, 2017. Print.
Raj, Rajendra K, John Impagliazzo, and Allen Parrish. "Perspectives on the Future of Cybersecurity Education." Proceedings of the 2017 IEEE Frontiers in Education Conference (FIE 2017). Ed. Melany Ciampi, et al. Indianapolis, IN: IEEE, 2017. Print.
Raj, Rajendra K., et al. "Rebooting Information Technology Programs." Proceedings of the Proceedings of the 18th Annual ACM Conference on Information Technology Education. Ed. Tom Ayers and Dan Bogaard. Rochester, NY: ACM, 2017. Print.
Ekstrom, Joseph J, et al. "Information Technology as a Cyber Science." Proceedings of the Proceedings of the 18th Annual ACM Conference on Information Technology Education. Ed. Tom Ayers and Dan Bogaard. Rochester, NY: ACM, 2017. Print.
Alnemari, Asma, Carol Romanowski, and Rajendra K. Raj. "An Adaptive Differential Privacy Algorithm for Range Queries over Healthcare Data." Proceedings of the 2017 IEEE International Conference on Healthcare Informatics (ICHI 2017). Ed. Hiroshi Nakajima, Mollie Cummins, and Gerrit Meixner. Park City, UT: IEEE, 2017. Print.
Schneider, Jennifer, et al. "Building Forward: Strategic Community Resilience." Proceedings of the 2017 IEEE International Symposium on Technologies for Homeland Security (HST 2017). Ed. Gerald R. Larocque. Boston, MA: IEEE, 2017. Print.
Raj, Rajendra K., et al. "Modeling Threats: Insider Attacks on Critical Infrastructure Assets." Proceedings of the 2017 IEEE International Symposium on Technologies for Homeland Security (HST 2017). Ed. Gerald R. Larocque. Boston, MA: IEEE, 2017. Print.
Alshehri, Suhair, Sumita Mishra, and Rajendra K. Raj. "Using Access Control to Mitigate Insider Threats to Healthcare Systems." Proceedings of the 2016 IEEE International Conference on Healthcare Informatics (ICHI),. Ed. Wai-Tat Fu, et al. Chicago, IL: IEEE, 2016. Print.
Mishra, Sumita, et al. "A Modular Approach to Teaching Critical Infrastructure Protection Concepts to Engineering, Technology and Computing Students." Proceedings of the 2016 IEEE Frontiers in Education Conference (FIE). Ed. Steve Frezza and Dipo Onipede. Erie, PA: IEEE, 2016. Print.
Schneider, Jennifer, et al. "Mapping a Community Resilience Management System: Building Operational Knowledge." Proceedings of the 2016 IEEE Symposium on Technologies for Homeland Security (HST). Ed. Lance Fiondella and Kenneth Crowther. Boston, MA: IEEE, 2016. Print.
Romanowski, Carol, et al. "Response and Recovery: A Quantitative Approach to Emergency Management." Proceedings of the 2016 IEEE Symposium on Technologies for Homeland Security (HST). Ed. Lance Fiondella and Kenneth Crowther. Boston, MA: IEEE, 2016. Print.
Romanowski, Carol, et al. "A Multidisciplinary Predictive Model for Managing Critical Infrastructure Disruptions." Proceedings of the Critical Infrastructure Protection X: 10th IFIP WG 11.10 International Conference, ICCIP 2016. Ed. Mason Rice and Sujeet Shenoi. Arlington, VA: Springer International Publishing, 2016. Print.
Liu, Xumin, et al. "Incorporating Service-Oriented Programming into the Computer Science Curriculum." Proceedings of the 2016 ASEE Annual Conference & Exposition. Ed. N/A. New Orleans, LA: ASEE, 2016. Print.
Romanowski, Carol, et al. "Regional Response to Large Scale Emergency Events: Building on Historical Data." Proceedings of the Ninth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Ed. Sujeet Shenoi and Mason Rice. Arlington, VA: n.p., 2015. Print.
Mishra, Sumita, et al. "On Building Cybersecurity Expertise in Critical Infrastructure Protection." Proceedings of the 2015 IEEE International Symposium on Technologies for Homeland Security (HST 2015). Ed. Gerald Larocque and Mike French. Boston, MA: IEEE, 2015. Web.
Schneider, Jennifer, et al. "Measurement of Locality Specific Resilience." Proceedings of the 2015 IEEE International Symposium on Technologies for Homeland Security (HST 2015). Ed. Gerald Larocque and Mike French. Boston, MA: IEEE, 2015. Web.
Alshehri, Suhair, Sumita Mishra, and Rajendra K. Raj. "Insider Threats and Access Control in e-Health Systems." Proceedings of the 16th IEEE International Conference on E-health Networking, Application & Services, Natal, Brazil. October 2014. Ed. Augusto Venancio Neto and Jose Neuman de Souza. New York, NY: IEEE, 2014. Print.
Etlinger, Henry A. and Rajendra K. Raj. "Putting the 'Student' in Student Learning Outcomes [poster]." Proceedings of the Assessment Network of New York's Second Annual Conference (Using Assessments to Drive Improvement - Practical Applications from the Field). Ed. Raymond Galinski and Susan Parry. Rochester, NY: n.p., Print.
Romanowski, Carol J, et al. "Information Management and Decision Support in Critical Infrastructure Emergencies at the Local Level." Proceedings of the 2013 IEEE International Conference on Technologies for Homeland Security. Ed. Israel Soibelman. Boston, MA: IEEE, 2013. Print.
Liu, Xumin, et al. "Teaching Service-Oriented Programming to CS and SE Undergraduate Students, Workshop." Proceedings of the 2013 IEEE Frontiers in Education Conference. Ed. Randa Shehab, Jim Sluss and Deborah Trytten. Oklahoma City, OK: IEEE, 2013. Print.
Romanowski, Carol J. and Rajendra K. Raj. "Catching the Wave: Big Data in the Classroom, Mini-workshop." Proceedings of the 2013 IEEE Frontiers in Education Conference. Ed. Randa Shehab, Jim Sluss and Deborah Trytten. Oklahoma City, OK: IEEE, 2013. Print.
Mishra, Sumita, et al. "A Curricular Framework for Critical Infrastructure Protection Education for Engineering, Technology and Computing Majors." Proceedings of the 2013 IEEE Frontiers in Education Conference. Ed. Randa Shehab, Jim Sluss and Deborah Trytten. Oklahoma City, OK: IEEE, 2013. Print.
Butler, Zack, Rajendra K. Raj, and Minseok Kwon. "Integrating Highly-capable Corobots into a Computing Curriculum." Proceedings of the 2013 IEEE Frontiers in Education Conference. Ed. Randa Shehab, Jim Sluss and Deborah Trytten. Oklahoma City, OK: IEEE, 2013. Print.
Liu, Xumin, et al. "Incorporating Service-Oriented Programming Techniques into Undergraduate CS and SE Curricula." Proceedings of the 2013 IEEE Frontiers in Education Conference. Ed. Randa Shehab, Jim Sluss and Deborah Trytten. Oklahoma City, OK: IEEE, 2013. Print.
Alshehri, Suhair and Rajendra K. Raj. "Secure Access Control for Health Information Sharing Systems." Proceedings of the IEEE International Conference on Healthcare Informatics 2013 (ICHI 2013). Ed. Carlo Combi, Zhiyong Lu and Yin-Leng Theng. Philadelphia, PA: IEEE, 2013. Print.
Bailey, Reynold J., et al. "On Providing Successful Research Experiences for Undergraduates." Proceedings of the 41st ASEE/IEEE Frontiers in Education Conference (FIE 2011). Ed. Stuart Kellogg and Jennifer Karlin. Rapid City, SD: IEEE, 2011. Print.
Romanowski, Carol J., Rajendra K. Raj, and S. Manian Ramkumar. "Successful Practices for Online Computing, Engineering, and Technology Courses." Proceedings of the 41st ASEE/IEEE Frontiers in Education Conference (FIE 2011). Ed. Stuart Kellogg and Jennifer Karlin. Rapid City, SD: IEEE, 2011. Print.
Romanowski, Carol J., Rajendra K. Raj, and Minseok Kwon. "WIP: An Immersion Course Sequence in Mobile Web Computing." Proceedings of the 41st ASEE/IEEE Frontiers in Education Conference (FIE 2011). Ed. Stuart Kellogg and Jennifer Karlin. Rapid City, SD: IEEE, 2011. Print.
Howles, Trudy M., et al. "A Holistic, Modular Approach to Infuse Cyber Security into Undergraduate Degree Programs." Proceedings of the 6th Annual Symposium on Information Assurance (ASIA \'11), Academic Track of 14th Annual NYS Cyber Security Conference. Ed. Sanjay Goel. Albany, NY: ASIA, 2011. Print.
Raj, Rajendra K., et al. "CyberSecurity as General Education." Proceedings of the 15th Colloquium for Information Systems Security Education (CISSE),. Ed. Mark Hufe and Ronald Dodge. Fairborn, OH: n.p., 2011. Print.
Invited Article/Publication
Raj, Rajendra K. and Allen Parrish. "Toward Standards in Undergraduate Cybersecurity Education in 2018." IEEE Computer. (2018). Print.
Peer Reviewed/Juried Poster Presentation or Conference Paper
Liu, Xumin, et al. "Incorporating Service-Oriented Programming into the Computer Science Curriculum using Course Modules." Proceedings of the Envisioning the Future of Undergraduate STEM Education (EnFUSE): Research and Practice. Ed. N/A. Washington, DC: American Association for the Advancement of Science (AAAS) and the National Science Foundation's Division of Undergraduate Education.
Journal Paper
Romanowski, Carol, et al. "Regional Response to Large-scale Emergency Events: Building on Historical Data." International Journal of Critical Infrastructure Protection 11. (2015): 12-21. Print.
Etlinger, Henry A. and Rajendra K. Raj. "An Approach to Engaging Students in the Assessment Process." The Newsletter of the Assessment Network of New York 3. 3 (2014): 3-4. Web.

Currently Teaching

CSCI-620
3 Credits
This course provides a broad introduction to the exploration and management of large datasets being generated and used in the modern world. First, practical techniques used in exploratory data analysis and mining are introduced; topics include data preparation, visualization, statistics for understanding data, and grouping and prediction techniques. Second, approaches used to store, retrieve, and manage data in the real world are presented; topics include traditional database systems, query languages, and data integrity and quality. Case studies will examine issues in data capture, organization, storage, retrieval, visualization, and analysis in diverse settings such as urban crime, drug research, census data, social networking, and space exploration. Big data exploration and management projects, a term paper and a presentation are required. Sufficient background in database systems and statistics is recommended.
CSCI-622
3 Credits
This course examines policies, methods and mechanisms for securing enterprise and personal data and ensuring data privacy. Topics include data integrity and confidentiality; access control models; secure database architectures; secure transaction processing; information flow, aggregation, and inference controls; auditing; securing data in contemporary (relational, XML and other NO SQL) database systems; data privacy; and legal and ethical issues in data protection. Programming projects are required.
CSCI-642
3 Credits
This course provides an introduction to secure coding including topics such as principles of secure coding, security architectures and design, operational practices and testing, programmatic use of cryptography, and defenses against software exploitation. Other topics include software based fault isolation, type-safe languages, certifying compilers; proof-carrying code, and automated program analysis and program rewriting. Programming projects, presentations, and a term paper will be required.
CSCI-655
3 Credits
This course provides a graduate-level introduction to cybersecurity principles and practices, and emphasizes policies and mechanisms for building secure and trusted computer systems. It will cover cybersecurity principles, policies and mechanisms; core knowledge areas of data, software, component, connection, system, human, organizational and societal security; and crosscutting concepts of confidentiality, integrity, availability, risk, adversarial thinking, and systems thinking. Topics in privacy, and legal and ethical aspects will also be emphasized. The course also explores the current research in cybersecurity. Presentations, reports and projects are required.

In the News