Posts by Collection

portfolio

publications

Towards Developing Attentive Wireless Sensor Networks

Published in International Journal of Multimedia and Ubiquitous Engineering (Authors: Renita Machado, Sirin Tekinay), 2009

Wireless sensor networks gather data about the environment. In that sense, they are paying attention to the environment in which they are deployed. This paper develops a foundation for understanding the association between the nature of attention in WSNs and their real-world applications.

Download Paper

Redundancy Estimation and Adaptive Density Control in Wireless Sensor Networks

Published in Adhoc and Sensor Wireless Networks (Authors: Renita Machado, Haibo He, Guiling Wang, Sirin Tekinay), 2010

In a random deployments of sensor nodes, how can we estimate the redundancy of the network without location information? This paper uses an information-theoretic approach to estimating this redundancy, and also studies the relationship between redundancy and network lifetime in WSNs.

Download Paper

Diffusion-based approach to deploying wireless sensor networks

Published in International Journal of Sensor Networks (Authors: Renita Machado, Sirin Tekinay, Wensheng Zhang, Guiling Wang), 2010

This paper studies a diffusion-based deployment approach for wireless sensor nodes that can satisfy a given level of reliability, where reliability is measured in terms of the amount of data sensed by the WSN.

Download Paper

Wireless body area networks for healthcare: A survey

Published in International Journal of Ad Hoc, Sensor & Ubiquitous Computing (Authors: Garth V Crosby, Tirthankar Ghosh, Renita Murimi, Craig A Chin), 2012

This paper presents a survey of design challenges in networks of wearable or implantable sensors that can be used in healthcare.

Download Paper

Wireless body area networks in mhealth

Published in Mobile Health: A Technology Road Map (Publisher: Springer International Publishing) - Authors: Garth V Crosby, Craig A Chin, Tirthankar Ghosh, Renita Murimi, 2015

This chapter provides an overview of design and performance challenges in the use of wireless body area networks for healthcare.

An Analysis of Trimming in Digital Social Networks

Published in Proceedings of the Workshops of the 30th AAAI Conference on Artificial Intelligence Incentives and Trust in Electronic Communities: Technical Report WS-16-09 (Author: Renita Murimi), 2016

This paper studies how social networks decrease in size, as a function of sharing preferences of the user and their contacts (friends) within the network.

Download Paper

Use of Botnets for mining cryptocurrencies

Published in Botnets (Publisher: Taylor & Francis CRC Press) - Author: Renita Murimi, 2019

This chapter describes the challenges posed by botnets to the mining of cryptocurrencies and offers a range of countermeasures to mitigate these challenges.

On Elastic Incentives for Blockchain Oracles

Published in Journal of Database Management (Authors: Renita Murimi, Guiling Wang), 2021

Blockchain oracles serve as an intermediary between a trusted blockchain environment and the untrusted external environment. This paper provides a framework for a commoditized trust mechanism that considers the selfishness of the oracle, and the collective trust placed by the blockchain in the oracle.

Download Paper

A Framework for Contractual Graphs

Published in Frontiers in Big Data: Representation Learning for Graph Mining and Generation (Author: Renita Murimi), 2021

A contract between two entities can be conceptualized as the addition of an edge to a graph. This paper studies graphs of smart contracts, and the role of ambiguity in contract parameters as well as timing of contract initiation on the the computational resource allocation specified in the contracts.

Download Paper

A framework for enterprise cybersecurity risk management

Published in Advances in Cybersecurity Nanagement (Publisher: Springer International Publishing) Authors: Samir Jarjoui, Renita Murimi, 2021

This chapter uses a systems theory perspective to propose a framework for enterprise cybersecurity risk management that focuses on business and IT alignment along multiple key dimensions.

The Vagaries of Robotic Trolls

Published in Proceedings of the 6th International Conference on Computational Social Science IC2S2 (Authors: Brett Bourbon, Renita Murimi), 2021

This paper studies robotic troll behavior in the 2016 Presidential election in the United States.

Download Paper

The Gossip Economy of Online Social Media

Published in Proceedings of the 2021 ACM CHI Misinformation Workshop (Authors: Brett Bourbon and Renita Murimi), 2021

This paper conceptualizes the spread of information as part of an economy of gossip, where social dynamics rather than veracity are key drivers of the spread of information and misinformation.

Download Paper

On the Design of Social Robots Using Sheaf Theory and Smart Contracts

Published in Frontiers in Robotics and AI (An earlier version was presented at the 2019 MIT Media Lab: Symposium on Blockchain, Robotics, and AI systems (BRAIS 2019)) - Author: Renita Murimi, 2021

This paper proposes a framework that uses the blockchain for the storage of robotic interactions, and the use of sheaf theory for analysis of these interactions.

Download Paper

On a Territorial Notion of a Smart Home

Published in Proceedings of the 1st ACM Workshop on Cybersecurity and Social Sciences (CySSS) - Authors: Shreenidhi Ayinala and Renita Murimi, 2022

A home is a personal territory. Yet smart homes are vulnerable to violations of this notion of territorial integrity due to cyberattacks. This paper uses a territorial notion of a smart home to analyze how cyberattacks on smart devices can disrupt our experience of a home.

Download Paper

A Decade of Development of Mental Models in Cybersecurity and Lessons for the Future

Published in Proceedings of the IEEE International Conference on Cybersecurity, Situational Awareness and Social Media, and part of the book series: Springer Proceedings in Complexity (SPCOM) (Authors: Robert Murimi, Sandra Blanke, and Renita Murimi), 2022

Mental models help us learn and adapt to new and complex environments. This paper presents an overview of research over the past decade in the area of mental models in cybersecurity.

Download Paper

What Makes AI Addictive? The Role of Discounting, Risk Aversion and Self-regulation

Published in Proceedings of the International Conference on Big Data Intelligence and Computing (DataCom), and part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13864)) - Author: Renita Murimi, 2022

We have limited attention spans, and children, more so. This paper uses game-theoretic models to investigate the impact of short-term and long-term discounting tendencies, as well as the degree of risk-aversion in influencing the ability of children to get hooked to addictive AI-enabled technologies.

Download Paper

Equifinality in Cybersecurity Research: Opportunities and Future Research

Published in Effective Cybersecurity Operations for Enterprise-Wide Systems. (Publisher: IGI Global) - Authors: Brett Landry, Renita Murimi, Greg Bell, 2023

There are many paths to achieving cybersecurity resilience. Equifinality denotes this notion of multiple paths leading to a final outcome. This chapter explores how equifinality in cybersecurity resilience can be achieved through efforts at individual, firm, and community levels.

Blockchains: A review and research agenda for international business

Published in Research in International Business and Finance (Authors: Renita Murimi, Greg Bell, Abdul A Rasheed, Sri Beldona), 2023

Trust is a prerequisite for business transactions.This paper makes the case that the emerging applications of blockchain technology help to mitigate the issues surrounding trust in international business transactions, thus facilitating transactions by minimizing transaction costs, reducing uncertainty, and improving speed.

Download Paper

A Framework for Building Cognitive Knowledge Management Systems

Published in Proceedings of the International Information Management Association (IIMA) Annual Conference (Authors: Samir Jarjoui and Renita Murimi), 2023

This paper provides a framework for the development of cognitive knowledge management systems that are focused on strategy, people, processes, learning, and technology for improving knowledge management and organizational memory.

Download Paper

Medical Advisories as Deterrents in Healthcare Cybercrime

Published in Proceedings of the IEEE Cyber Awareness and Research Symposium (CARS) - Authors: Nastaran Hadipour, Renita Murimi, 2024

This paper provides an overview of medical advisories published by the CISA as part of their Industrial Control Systems (ICS) advisories intitiative, and highlights the cybersecurity-related complexity in the networked environments within which healthcare operates.

Download Paper

talks

teaching

Teaching experience 1

Undergraduate course, University 1, Department, 2014

This is a description of a teaching experience. You can use markdown like any other post.

Teaching experience 2

Workshop, University 1, Department, 2015

This is a description of a teaching experience. You can use markdown like any other post.