CV


Current Position (2012-present)

Associate Professor
Department of Criminal Justice
Gladfelter Hall, 5th floor
Temple University
1115 Polett Walk
Philadelphia PA 19122

Click below to jump to particular section
Education
Areas of Specialization
Teaching Interests
Publications, Papers & Talks
Training Workshops Organized
Awards/Grants


Education

Ph.D. Criminal Justice, Rutgers University, Newark, NJ, USA, May 2012
Thesis Title: Cybercrimes against the Electricity Sector: Exploring Hacker and Industry Perceptions

M.A. Criminal Justice, Rutgers University, Newark, NJ, USA, May 2010

M.A. Criminology, Saint Mary’s University, Halifax, NS, Canada, June 2008
Thesis Title: Cybercrimes@Gambling_Sites.com

B.A. (Hons.) Criminology, Saint Mary’s University, Halifax, NS, Canada, May 2006
Thesis Title: Hack-Attack! Cyberextortion and Internet Gambling: A Study of Criminal Techniques in a Virtual World

B.Sc. Computer Science, University of British Columbia, Vancouver, BC, Canada, May 2002

Areas of Specialization

Cybercrime and Cybersecurity
Advanced Persistent Threats and Critical Infrastructure Protection
Social Engineering
Experiential learning in Cybersecurity Education
War and Terrorism in the Digital Age
(International) Organized Crime
(International) Corporate Crime
Media and Crime
Crimes Against the Environment
(Harms) measurement and metrics

Teaching Interests

Cybercrime
Organized Crime
Corporate Crime
Crimes Against the Environment
Global and Transnational Crime
Criminological Theory
Media, Crime and Criminal Justice

Publications, Papers & Talks

Click below to jump to particular section
Peer Reviewed Published Conference Proceedings
Articles in Refereed Journals
Chapters in Edited Volumes
Conference Paper Presentations
Invited Addresses and Colloquia

Peer Reviewed Published Conference Proceedings [ (*) = undergraduate student co-author; (+) = graduate student co-author ]

  1. Ducoste, M. (+), Bleiman, R. (+), Nguyen, T (+). & Rege, A. (forthcoming). “An Examination of Industry Standards of Success within Penetration Testing Groups”. Proceedings from the 10th IEEE Integrated STEM Education Conference (ISEC).

  2. Williams, K. (+), Ducoste, M. (+) & Rege, A. (2020). “Educating multidisciplinary undergraduates on security and privacy”. Proceedings of the IEEE Cyber Science Conference.

  3. Rege, A. & Bleiman, R. (*). (2020). “Ransomware attacks against critical infrastructure”. Proceedings from the 19th European Conference on Cyber Warfare and Security.

  4. Mendlein, A. (+), Nguyen, T. (+) & Rege, A. (2020). “Cybersecurity Awareness and Training Through a Multidisciplinary OSINT Course Project”. Proceedings from the 2020 ASEE Annual Conference & Exposition.

  5. Rege, A., Nguyen, T. (+), & Bleiman, R. (*). (2020). "A social engineering awareness and training workshop for STEM students and practitioners". Proceedings from the 10th IEEE Integrated STEM Education Conference (ISEC).

  6. Rege, A., Yang, S., Mendlein, A. (+), Williams, K. (+), Su, S (+) & Moskal, S. (+). (2020). "Dissecting Cyberadversarial Intrusion Stages via Interdisciplinary Observations". Proceedings from the 6th ACM International Workshop on Security and Privacy Analytics 2020.

  7. Bleiman, R. (*) & Rege, A. (2020). "The susceptibility of humans in disclosing sensitive information". Proceedings from the 15th International Conference on Cyber Warfare and Security.

  8. Rege, A., Mendlein, A. (+) & Williams, K. (+) (2019). "Security and Privacy Education for STEM Undergraduates: A Shoulder Surfing Course Project". Proceedings of the IEEE Frontiers in Education.

  9. Ulrich, T., Boring, R., McJunkin, T. & Rege, A. (2019). "A visualization approach to performing task analysis of time series event log data from a microworld simulation". Proceedings of the Human Factors and Ergonomics Society Annual Meeting (Vol. 63, No. 1, pp. 1867-1871). Sage CA: Los Angeles, CA: SAGE Publications.

  10. Rege, A. & Adams, J. (2019). “The need for more sophisticated cyber-physical systems war gaming exercises”. 18th European Conference on Cyber Warfare and Security.

  11. Rege, A., VanZant, S. (2019). "Examining the Roles of Muhajirahs in the Islamic State via Twitter". Proceedings of the IEEE Cyber Science Conference.Winner of Best Paper Award

  12. Rege, A., Williams, K. (+) & Mendlein, A. (+) (2019). "A Social Engineering Course Project for Undergraduate Students Across Multiple Disciplines". Proceedings of the IEEE Cyber Science Conference.

  13. Asadi, N. (+), Rege, A., Obradovic, Z. (2019). "Pattern discovery in intrusion chains and adversarial movement". Proceedings of the IEEE Cyber Science Conference.

  14. Rege, A., Williams, K. (+) & Mendlein, A. (+) (2019). "An experiential learning cybersecurity project for multiple STEM undergraduates". Proceedings of the 9th IEEE Integrated STEM Education Conference (ISEC).

  15. Asadi, N. (+), Rege, A. & Obradovic, Z. (2018). "An Assessment of Group Dynamics During Cyber Crime Through Temporal Network Topology". Proceedings of the 10th International Conference on Social Computing, Behavioral-Cultural Modeling & Prediction and Behavior Representation in Modeling and Simulation (SBP-BRiMS).

  16. Asadi, N. (+), Rege, A. & Obradovic, Z. (2018). “Analysis of Adversarial Movement Through Characteristics of Graph Topological Ordering”. Proceedings of the International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA). Institute of Electrical and Electronics Engineers (IEEE) Xplore Digital Library.

  17. Dobson, G.(+), Rege, A. & Carley, K. (2018). “Virtual Cyber Warfare Experiments based on Empirically Observed Adversarial Intrusion Chain Behavior”. Proceedings from the 13th International Conference on Cyber Warfare and Security.

  18. Yang, S. J., Rege, A. & Kuhl, M. E. (2017). "Learning, Simulating and Predicting Adversary Attack Behaviors for Proactive Cyber Defense", in Proceedings of NATO IST-152 Workshop on Intelligent Autonomous Agents for Cyber Defence and Resilience, pp. 30-34, October 18-20, 2017, Prague, Czech Republic.

  19. Rege, A., Biswas, S., Bai, L., Parker, E. (+) & McJunkin, T. (2017). “Using Simulators to Assess Knowledge and Behavior of “Novice” Operators of Critical Infrastructure under Cyberattack Events”. Proceedings of the 10th International Symposium on Resilient Control Systems (ISRCS). Institute of Electrical and Electronics Engineers (IEEE).

  20. Rege, A., Parker, E. (+) & McJunkin, T. (2017). “Using a Critical Infrastructure Game to Provide Realistic Observation of the Human in the Loop by Criminal Justice Students”. Proceedings of the 10th International Symposium on Resilient Control Systems (ISRCS). Institute of Electrical and Electronics Engineers (IEEE).

  21. Rege, A., Obradovic, Z., Asadi, N.(+), Singer, S.(*) & Masceri, N.(*) (2017). “A Temporal Assessment of Cyber Intrusion Chains Using Multidisciplinary Frameworks and Methodologies”. Proceedings of the International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA 2017). Institute of Electrical and Electronics Engineers (IEEE) Xplore Digital Library.

  22. Rege, A., Adams, J., Parker, E. (+), Singer, B. (*), Masceri, N. (*) & Pandit, R. (*) (2017). “Using Cyber-security Exercises to Study Adversarial Intrusion Chains, Decision-Making, and Group Dynamics”. Proceedings of the 16th European Conference on Cyber Warfare and Security.

  23. Rege, A., Obradovic, Z., Asadi, N. (+), Parker, E. (+), Masceri, N. (*), Singer, B. (*) & Pandit, R.(*) (2017). “Using a Real-Time Cybersecurity Exercise Case Study to Understand Temporal Characteristics of Cyberattacks”. Proceedings of the 10th International Conference on Social Computing, Behavioral-Cultural Modeling & Prediction and Behavior Representation in Modeling and Simulation (SBP-BRiMS).

  24. Rege, A., Singer, B. (*), Masceri, N. (*) & Heath, Q. (*) (2017). “Measuring Cyber Intrusion Chains, Adaptive Adversarial Behavior, and Group Dynamics”. Proceedings of the 12th International Conference on Cyber Warfare and Security.

  25. Rege, A. (2016). “Incorporating the Human Element in Anticipatory and Dynamic Cyber Defense”. Proceedings of the The 4th International Conference on Cybercrime and Computer Forensics (ICCCF). Institute of Electrical and Electronics Engineers (IEEE).

  26. McJunkin, T. R., Rieger, C. G., Rege, A., Biswas, S. K., Haney, M., Santora, M. J., Johnson, B. K., Boring, R. L., Naidu, D. S., & Gardner, J. F. (2016), “Multidisciplinary Game-based Approach for Generating Student Enthusiasm for Addressing Critical Infrastructure Challenges”. ASEE Annual Conference & Exposition, New Orleans, Louisiana. 10.18260/p.25763.

  27. Rege, A. (2015). “Multidisciplinary Experiential Learning for Holistic Cybersecurity Education, Research and Evaluation”. Proceedings of the 2015 USENIX Summit on Gaming, Games, and Gamification in Security Education. (3GSE 15).

  28. Rege, A., Ferrese, F., Biswas, S., & Bai, L. (2014). “Adversary dynamics and smart grid security: A multiagent system approach”. Proceedings of the 7th International Symposium on Resilient Control Systems (ISRCS). Institute of Electrical and Electronics Engineers (IEEE). pp. 1-7. IEEE Catalog Number: CFP1469H-ART [ISBN: 978-1-4799-4187-2] DOI: 10.1109/ISRCS.2014.6900101.

  29. Rege, A. (2013). 10v3.c0ns [love.cons]: A Criminological Investigation of Online Dating Crimes. Proceedings of the 2013 IEEE eCrime Researchers Summit. Institute of Electrical and Electronics Engineers (IEEE). pp. 123-131. IEEE Catalog Number: CFP13ECR-POD [ISBN: 978-1-4799-1159-2].

Articles in Refereed Journals [ (*) = undergraduate student co-author; (+) = graduate student co-author ]

  1. Magliocca, N., Torres, A., Margulies, J., McSweeney, K., Arroyo-Quiroz, I., Carter, N., Curtin, K., Easter, T., Gore, M., Hübschle, A., Massé, F., Rege, A, Tellman, E. (2021). Comparative Analysis of Illicit Supply Network Structure and Operations: Cocaine, Wildlife, and Sand. Journal of Illicit Economies and Development, 3(1): 1-24.

  2. Dobson, G., Rege, A. & Carley, K. (2018). Informing Active Cyber Defense with Realistic Adversarial Behavior. Journal of Information Warfare., 17(2), pp. 16-31.

  3. Rege, A., Obradovic, Z., Asadi, N. (+), Parker, E. (+), Pandit, R.(*), Masceri, N. (*) & Singer, B. (*). (2018). Predicting Adversarial Cyber Intrusion Stages Using Autoregressive Neural Networks. Special Issue: Data Mining for Cyber Security. IEEE Intelligent Systems. Impact Factor 2.374

  4. Rege, A., Parker, E. (+), Singer, B.(*) & Masceri, N(*). (2017). A Qualitative Exploration of Adversarial Adaptability, Group Dynamics, and Cyber Intrusion Chains. Journal of Information Warfare 16(3): 1-16.

  5. Rege, A. & Lavogrna, A. (2017). Organization, operations, and success of environmental organized crime in Italy and India: a comparative analysis. European Journal of Criminology 14(2): 160-182. Impact Factor 1.305

  6. Rege, A. (2016). Not Biting the Dust: Using a Tri-Partite Model of Organized Crime to Examine India’s Sand Mafia. International Journal of Comparative and Applied Criminal Justice 40(2): 101-121. Read my media interview here

  7. Rege, A. (2014). A Criminological Perspective on Power Grid Cyberattacks: Using Routine Activities Theory and Rational Choice Perspective to Explore Adversarial Decision-Making. Journal of Homeland Security and Emergency Management (JHSEM) 11(4): 463-487. Impact Factor 0.566

  8. Rege, A. (2014). Digital Information Warfare Trends in Eurasia. Security Journal 27(2): 374-398. Impact factor 0.341

  9. McMullan, J. & Rege, A. (2010). Online crime and internet gambling. Journal of Gambling Issues. Issue 24: 54-85.

  10. Rege, A. (2009). What’s Love Got to Do With It? Exploring Online Dating Scams and Identity Fraud. International Journal of Cybercriminology. 3 (2): 494-512. [article available here]

  11. Rege-Patwardhan, A. (2009). Cybercrimes against critical infrastructures: a study of online criminal organization and techniques. Criminal Justice Studies: A Critical Journal of Crime, Law and Society. 22 (3): 261-271.

  12. McMullan, J. & Rege, A. (2007). Cyber-Extortion at Online Gambling Sites: Criminal Organization and Legal Challenges. Gaming Law Review. 11 (6): 648-665.

Chapters in Edited Volumes

  1. Rege, A. (2013). Factors Impacting Attacker Decision-Making in Power Grid Cyberattacks: Policy and Research Implications. In Butts, J. and Shenoi, S. (eds.) International Federation for Information Processing Advances in Information and Communication Technology-Critical Infrastructure Protection, Critical Infrastructure Protection VII. Pp. 125-138. New York: Springer.

  2. Rege, A. (2010). Industrial Control Systems and Cybercrime, in Holt, T. (ed). Crime On-line: Correlates, Causes, and Context. Pp. 191-218. Durham, North Carolina: Carolina Academic Press.

  3. Finckenauer, J. & Rege, A. (2013). Criminal Organizations and Harms Assessment: A Research Proposal, Grigol Robakidze University Academic Digest. Law. N2. Tbilisi 2013. ISSN 2298-0202.

Article Reprints

McMullan, J. & Rege, A. (2009). Cyberextortion at Online Gambling Sites: Criminal Organization and Legal Challenges. In I. Carr, (Ed.), Computer Crime – International Library of Criminology, Criminal Justice and Penology – Second Series. UK: Ashgate Publishing.

Conference Paper Presentations

Presented at Professional Meetings [ (*) = undergraduate student co-author; (+) = graduate student co-author ]

2006-present

  1. Rege, A. & Laverty, P. (2020). “Human Vulnerability in Cyberattacks via a Social Engineering Capture the Flag Competition”. 2020 NICE Virtual Conference and Expo.

  2. Rege, A. & Bleiman, R. (+) (2020). “Using MITRE PRE-ATT&CK and ATT&CK in Cybercrime Education and Research”. MITRE ATT&CKcon Power Hour. October 9, 2020.

  3. Rege, A. (2020). “The role of social science in cybersecurity research and education”. BSides Boston.

  4. Williams, K. (+), Ducoste, M. (+) & Rege, A. (2020). “Educating multidisciplinary undergraduates on security and privacy”. Proceedings of the IEEE Cyber Science Conference.

  5. Rege, A. & Bleiman, R. (*). (2020). “Ransomware attacks against critical infrastructure”. Proceedings from the 19th European Conference on Cyber Warfare and Security.

  6. Mendlein, A. (+), Nguyen, T. (+) & Rege, A. (2020). “Cybersecurity Awareness and Training Through a Multidisciplinary OSINT Course Project”. Proceedings from the 2020 ASEE Annual Conference & Exposition.

  7. Rege, A., Nguyen, T. (+), & Bleiman, R. (*). (2020). "A social engineering awareness and training workshop for STEM students and practitioners". Proceedings from the 10th IEEE Integrated STEM Education Conference (ISEC).

  8. Rege, A., Yang, S., Mendlein, A. (+), Williams, K. (+), Su, S. (+) & Moskal, S. (+). (2020). "Dissecting Cyberadversarial Intrusion Stages via Interdisciplinary Observations". Proceedings from the 6th ACM International Workshop on Security and Privacy Analytics 2020.

  9. Ulrich, T., Boring, R., McJunkin, T. & Rege, A. (2019). "A visualization approach to performing task analysis of time series event log data from a microworld simulation". Paper presented at the 63rd Human Factors and Ergonomics Society Annual Meeting, October 28 – November 1, 2019, Seattle, Washington.

  10. Rege, A. (2019). “Hacking the Human: Exploiting the Weakest Link in Cyber Attacks”. Presented at the 2019 National Science Foundation Trusted CI Cybersecurity Summit.

  11. Rege, A., Mendlein, A. (+) & Williams, K. (+) (2019). "Security and Privacy Education for STEM Undergraduates: A Shoulder Surfing Course Project". Paper presented at the IEEE Frontiers in Education, October 17-19, Cincinnati, Ohio.

  12. Rege, A. (2019). “I agreed to what? How the average person handles (online) terms and conditions statements”. Paper presented at BSides St. John’s, Newfoundland, Canada.

  13. Rege, A. & Adams, J. (2019). “The need for more sophisticated cyber-physical systems war gaming exercises”. Paper presented at the annual meetings of the 18th European Conference on Cyber Warfare and Security, University of Coimbra, Portugal.

  14. Rege, A., VanZant, S. (2019). “Examining the Roles of Muhajirahs in the Islamic State via Twitter”. IEEE Cyber Science Conference, Oxford University, Oxford, UK.

  15. Rege, A., Williams, K. (+) & Mendlein, A. (+) (2019). "A Social Engineering Course Project for Undergraduate Students Across Multiple Disciplines". IEEE Cyber Science Conference, Oxford University, Oxford, UK.

  16. Asadi, N. (+), Rege, A., Obradovic, Z. (2019). "Pattern discovery in intrusion chains and adversarial movement". IEEE Cyber Science Conference, Oxford University, Oxford, UK.

  17. Rege, A. (2019). “A Social Engineering Experiential Learning Project for Undergraduate Students”. Paper presented at the annual meetings of Women in Cybersecurity (WiCYS) conference. Pittsburgh, PA, USA.

  18. Williams, K. (+) & Rege, A. (2019). "A Qualitative Exploration of Adversarial Adaptability, Group Dynamics, and Cyber Intrusion Chains". Paper presented at the annual meetings of the Academy of Criminal Justice Sciences, Baltimore, MD, USA.

  19. Asadi, N. (+) & Rege, A. (2019). "A Temporal Assessment of Cyber Intrusion Chains Using Multidisciplinary Frameworks and Methodologies". Paper presented at the annual meetings of the Academy of Criminal Justice Sciences, Baltimore, MD, USA.

  20. Rege, A. (2019). "Using a Critical Infrastructure Game to Provide Realistic Observation of the Human in the Loop by Criminal Justice Students". Paper presented at the annual meetings of the Academy of Criminal Justice Sciences, Baltimore, MD, USA.

  21. Mendlein, A. (+) & Rege, A. (2019). “A Social Engineering Course Project for Undergraduate Students Across All Disciplines”. Paper presented at the annual meetings of the Academy of Criminal Justice Sciences, Baltimore, MD, USA.

  22. Rege, A., Williams, K. (+), Mendlein, A. (+) (2019). “An experiential learning cybersecurity project for multiple STEM undergraduates”. Paper presented at the annual meetings of the IEEE Integrated STEM Education Conference. Princeton University, Princeton, New Jersey, USA.

  23. Rege, A. “Inside the Culture and Practices of India's Sand Mafia”. Paper presented at the annual meetings of the Western Society of Criminology Conference. February 7-9, 2019. Honolulu, Hawai’i, USA.

  24. Rege, A. (2018). “Social Engineering Course Projects for Undergraduate Students“. Paper presented at Def Con 26, August 9-12, 2018, Las Vegas, USA.

  25. Rege, A. (2018). “Social engineering class project for undergraduate students in multiple disciplines”. Paper presented at SE-RI, Newport, Rhode Island, USA.

  26. Asadi, N. (+), Rege, A. & Obradovic, Z. (2018). "An Assessment of Group Dynamics During Cyber Crime Through Temporal Network Topology". Paper presented at the 10th International Conference on Social Computing, Behavioral-Cultural Modeling & Prediction and Behavior Representation in Modeling and Simulation (SBP-BRiMS), Washington DC, USA.

  27. Asadi, N. (+), Rege, A. & Obradovic, Z. (2018). “Analysis of Adversarial Movement Through Characteristics of Graph Topological Ordering”. Paper presented at the annual meetings of the International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA). Glasgow, UK.

  28. Rege, A. (2018). “A social engineering course project case study”. Paper presented at the annual meetings of AtlSecCon, Halifax, Nova Scotia, Canada.

  29. Dobson, G.(+), Rege, A. & Carley, K. (2018). “Virtual Cyber Warfare Experiments based on Empirically Observed Adversarial Intrusion Chain Behavior”. Paper presented at the 13th International Conference on Cyber Warfare and Security, Washington DC, USA.

  30. Rege, A. (2018). “Multidisciplinary Experiential Learning in Cybersecurity for Non-STEM Students”. Paper presented at the annual meetings of the Academy of Criminal Justice Sciences, New Orleans, LA, USA.

  31. Rege, A. (2018). “A social science approach to cybersecurity education for all disciplines”. Paper presented at Shmoocon XIV, Washington DC, USA.

  32. Parker, E. (+) & Rege, A. (2018). "Group Dynamics and Decision-Making in Critical Infrastructure Cyberattacks". Paper presented at the annual meetings of the American Society of Criminology, Philadelphia, PA, USA.

  33. Asadi, N. (+) & Rege, A. (2018). "A Temporal Assessment of Cyber Intrusion Chains Using Multidisciplinary Frameworks and Methodologies". Paper presented at the annual meetings of the American Society of Criminology, Philadelphia, PA, USA.

  34. Rege, A. (2017). “Leveraging simulators to educate non-STEM students in conducting real-time cybersecurity field research”. Paper presented at the annual meetings of the National Initiative for Cybersecurity Education (NICE), Dayton, OH, USA.

  35. Rege, A., Biswas, S., Bai, L., Parker, E. (+) & McJunkin, T. (2017). “Using Simulators to Assess Knowledge and Behavior of “Novice” Operators of Critical Infrastructure under Cyberattack Events”. Paper presented at the 10th International Symposium on Resilient Control Systems (ISRCS), Wilmington, DE, USA.

  36. Rege, A., Parker, E. (+) & McJunkin, T. (2017). “Using a Critical Infrastructure Game to Provide Realistic Observation of the Human in the Loop by Criminal Justice Students”. Paper presented at the 10th International Symposium on Resilient Control Systems (ISRCS), Wilmington, DE, USA.

  37. Rege, A., Obradovic, A., Asadi, N.(+), Singer, S.(*) & Masceri, N.(*) (2017). “A Temporal Assessment of Cyber Intrusion Chains Using Multidisciplinary Frameworks and Methodologies”. Paper presented at the annual meetings of the International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA 2017), London, England, UK.

  38. Rege, A. (2017). “Examining the Roles of Muhajirahs in the Islamic State via Twitter”. Paper presented at the Terrorism and Social Media Conference, Swansea, UK.

  39. Rege, A., Adams, J., Parker, E. (+), Singer, B. (*), Masceri, N. (*) & Pandit, R. (*) (2017). "Using Cyber-security Exercises to Study Adversarial Intrusion Chains, Decision-Making, and Group Dynamics". Paper presented at the 16th European Conference on Cyber Warfare and Security, Dublin, Ireland.

  40. Rege, A., Obradovic, Z., Asadi, N. (+), Parker, E. (+), Masceri, N. (*), Singer, B. (*) & Pandit, R.(*) (2017). “Using a Real-Time Cybersecurity Exercise Case Study to Understand Temporal Characteristics of Cyberattacks”. Paper presented at the 10th International Conference on Social Computing, Behavioral-Cultural Modeling & Prediction and Behavior Representation in Modeling and Simulation (SBP-BRiMS), Washington, DC, USA.

  41. Rege, A., Singer, B. (*), Masceri, N. (*) & Heath, Q. (*) (2017). "Measuring Cyber Intrusion Chains, Adaptive Adversarial Behavior, and Group Dynamics". Paper presented at the 12th International Conference on Cyber Warfare and Security, Dayton, OH, USA.

  42. Rege, A. (2016). “The Digital Squeeze: Extortion Rackets in Cyberspace”. Paper presented at the annual meetings of the American Society of Criminology Conference, New Orleans, LA, USA.

  43. Singer, B., Masceri, N. (*), Rege, A. (2016). “Traditional Qualitative Methodology in an Innovative Setting: Cybercrime Research on Adversarial Decision-Making, Behavior, and Group Dynamics”. Paper presented at the annual meetings of the American Society of Criminology Conference, New Orleans, LA, USA.

  44. Rege, A. & Heath, Q. (*) (2016). “What the Hack? Perceptions of Hackers and Cybercriminals in Popular Culture”. Paper presented at the annual meetings of the Hackers on Planet Earth (HOPE), New York, USA.

  45. Rege, A. (2016). “Developing a Framework to Assess and Prioritize the Harms Caused by India's Sand Mafia”. Paper presented at the annual meetings of the C4 conference (Conference on Conservation, Computation, & Criminology), Cornell University, Ithica, NY, USA.

  46. Rege, A. (2016). “Incorporating the Human Element in Anticipatory and Dynamic Cyber Defense”. Paper presented at the 4th International Conference on Cybercrime and Computer Forensics (ICCCF). Vancouver, Canada.

  47. McJunkin, T. R., & Rieger, C. G., & Rege, A., & Biswas, S. K., & Haney, M., & Santora, M. J., & Johnson, B. K., & Boring, R. L., & Naidu, D. S., & Gardner, J. F. (2016). “Multidisciplinary Game-based Approach for Generating Student Enthusiasm for Addressing Critical Infrastructure Challenges”. Paper presented at the annual meetings of the ASEE Annual Conference & Exposition, New Orleans, Louisiana, USA.

  48. Heath, Q. (*) & Rege, A. (2015). "What the Hack? Perceptions of Hackers and Cybercriminals in Popular Culture". Paper presented at the annual meetings of the American Society of Criminology Conference, Washington DC, November.

  49. Rege, A. (2015). "ISIS Jihadettes: Examining the Role of Women in ISIS". Paper presented at the annual meetings of the American Society of Criminology Conference, Washington DC, USA.

  50. Lavorgna, A. & Rege, A. (2015). “Organization, Operations, and Success of Environmental Organized Crime in Italy and India: A Comparative Analysis”. Paper presented at the Stockholm Criminology Symposium, Stockholm, Sweden.

  51. Rege, A. (2015). “A Criminological Perspective On Intrusion Kill Chains And Adaptive Adversaries”. Paper presented at the annual meetings of the Honeynet Project Workshop, Stavanger, Norway.

  52. Koehnlein, J. (*) & Rege, A. (2015). “The Fentanyl-Laced Heroin Epidemic: Investigating Underlying Factors And Organized Crimes Involvement In Philadelphia”. Paper presented at the annual meetings of the Academy of Criminal Justice Sciences Conference, Orlando, FL.

  53. Rege, A. & VanZant, S. (*) (2015). “Twitter and the Interactive Theatrics of Terror”. Paper presented at the annual meetings of the Academy of Criminal Justice Sciences Conference, Orlando, FL.

  54. Slater, K. (*) & Rege, A. (2015). “Pentiti Of Palermo: The Impact Of Incentives And Local Factors On Organized Crime Testimony”. Paper presented at the annual meetings of the Academy of Criminal Justice Sciences Conference, Orlando, FL.

  55. Rege, A., Koehnlein, J. (*) & Yody, K. (*) (2014). “Measuring and Quantifying the Environmental Harms Caused by Illegal Sand Mining in India”. Paper presented at the annual meetings of the American Society of Criminology Conference, San Francisco, November.

  56. Slater, K. (*) & Rege, A. (2014). “Lessons from Palermo: Strategies for Increasing Organized Crime Testimony”. Paper presented at the annual meetings of the American Society of Criminology Conference, San Francisco, November.

  57. Lavorgna, A. & Rege, A (2014). “Comparing the Organization, Operation, and Success of Ecomafias in Italy and India”. Paper presented at the annual meetings of the American Society of Criminology Conference, San Francisco, November.

  58. Slater, K. (*) & Rege, A. (2014). “Reconstructing history: Multiple methods in organized crime research”. Paper presented at the annual meetings of the Southern Criminal Justice Association, Clearwater, FL.

  59. VanZant, S. (*), Coladonato, J. (*) & Rege, A. (2014) “How Terrorists Use Social Media: An Analysis Through Twitter APIs”. Paper presented at the annual meetings of the PUMPCON (hacker conference), Philadelphia, October 25, 2014.

  60. Rege, A., Ferrese, F., Biswas, S. & Bai, L. (2014). "Adversary Dynamics and Smart Grid Security: A Multiagent System Approach". Paper presented at the annual meetings of Resilience Week, Denver, August.

  61. Rege, A. (2014). "Adversarial Decision-Making in Intrusion Chain and STIX Frameworks". Paper presented at the bi-annual meetings of the Industrial Control Systems Joint Working Group, Indianapolis, June.

  62. Rege, A. (2014). "Not Biting the Dust: Assessing the Properties and Success of India’s Sand Mafia". Paper presented at the MAFIAs: Realities and Representations of Organized Crime Conference hosted by CUNY John D. Calandra Italian American Institute's conference, New York, April.

  63. Beaye, W. (*) & Rege, A. (2014). "(Cyber) Extortion: An Assessment of the Enforcement Complications in Both Cyber and Physical Space". Paper presented at the MAFIAs: Realities and Representations of Organized Crime Conference hosted by CUNY John D. Calandra Italian American Institute's conference, New York, April.

  64. Slater, K. (*) & Rege, A. (2014). "At the Nexus of Politics and Organized Crime: Examining Corruption in Philadelphia". Paper presented at the MAFIAs: Realities and Representations of Organized Crime Conference hosted by CUNY John D. Calandra Italian American Institute's conference, New York, April.

  65. Rege, A. (2014). "The Human Element in Adversarial Cyberattack Kill Chains". Paper presented at the 9th International Conference on Cyber Warfare and Security, West Lafayette, March.

  66. Rege, A. (2014). An Investigation into the Illegal Mining Operations of India’s Sand Mafia. Paper presented at the annual meetings of the Academy of Criminal Justice Sciences, Philadelphia, February.

  67. Beaye, W. (*) & Rege, A. (2014). (Cyber) Extortion: An Assessment of the Enforcement Complications in Cyber and Physical Space. Paper presented at the annual meetings of the Academy of Criminal Justice Sciences, Philadelphia, February.

  68. Slater, K. (*) & Rege, A. (2014). The Role of Political Corruption in the Success of Organized Crime: Philadelphia as a Case Study", Academy of Criminal Justice Sciences, Philadelphia, February.

  69. Rege, A. (2013). Hackers Wanted: Creating an Interactive Cyberattack Playbook. Paper presented at the annual meetings of BSides , Wilmington, Delaware, November.

  70. Rege, A. (2013). Developing Dynamic Critical Infrastructure Cybersecurity Measures. Paper presented at the International Symposium on Environmental Criminology and Crime Analysis (ECCA), Philadelphia, June.

  71. Rege, A. (2013). Adversarial Decision Making in Critical Infrastructure Cyberattacks. Paper presented at the annual SOURCE Conference, Boston, April.

  72. Rege, A. (2013). Attacker Decision-Making in Power Grid Cyberattacks. Paper presented at the Seventh Annual International Federation for Information Processing Working Group 11.10 International Conference on Critical Infrastructure Protection, Washington DC, March.

  73. Rege, A. (2012). Bizarre E-Bazaars: Selling Credit Cards in Virtual Black Markets. Paper presented at the annual meetings of the Academy of Criminal Justice Sciences, New York, March.

  74. McMullan, J. & Rege, A. (2012). An Integrated Theory for Crime in Cyberspace: Possibilities and Problems. Paper presented at the annual meetings of the Academy of Criminal Justice Sciences, New York, March.

  75. Rege, A. (2012). Lights Out! Exploring Offender Rationality for Cyber-crimes Against the Electricity Sector. Paper presented at the annual meetings of the American Society of Criminology, Chicago, November.

  76. Rege, A. (2010). Digital Information Warfare Trends in Eurasia. Paper presented at the annual meetings of the American Society of Criminology, San Francisco, November.

  77. Rege, A. (2009). Love Bytes, Date Baits, and Cyber Sweethearts: A Study of Online Dating Crimes and Criminals. Paper presented at the annual meetings of the American Society of Criminology, Philadelphia, November.

  78. McMullan, J. & Rege, A. (2009). Cybernomads, Dot.cons, and Criminal Assemblages. Paper presented at the Canadian Criminal Justice Association, Halifax, October.

  79. McMullan, J. & Rege, A. (2009). Online Crime and Internet Gambling. Paper presented at the Canadian Alcohol and Gaming Regulators Association, Halifax, July.

  80. McMullan, J. & Rege, A. (2009). Cheating and Cybercrime @ Gambling Sites.com. Paper presented at the Alberta Gaming Research Institute Conference on Internet Gambling, Banff, March.

  81. Rege, A. (2009). Cyberattacks Against Critical Infrastructures: A Study of Online Criminal Techniques and Organization. Paper presented at the annual meetings of the Academy of Criminal Justice Sciences, Boston, March.

  82. Rege, A. (2007). Cybercrime, Online Gambling, and the Problem of Governance. Paper presented at the Crime, Law and Regulation: An Interdisciplinary Graduate Conference, Toronto, October.

  83. McMullan, J. & Rege, A. (2006). Fear and Trembling on the Internet: Hacking and Cyber-Extortion at Online Gambling Sites. Paper presented at the Nova Scotia Responsible Gambling Conference, Halifax, October.

Invited Addresses and Colloquia

  1. Rege, A. (2021). “CARE Lab”. Trusted CI Webinar Series. February 22, 2021.

  2. Rege, A. (2021). “Social engineering and blockchain”. Keynote Address. COMSNETS 2021, Workshop on Cyber Security and Blockchain. January 5-9, Bengluru, India.

  3. Rege, A. (2020). Human Factor in Cybersecurity, Cybersecurity Panel, Temple University’s Association for Information Systems Student Chapter, Fox School of Business.

  4. Rege, A. (2020). Adversarial movement in intrusion chains: a criminological and multidisciplinary approach. UKIERI-DST virtual workshop on “adversarial cybersecurity”. UK-India Education and Research Initiative UKIERI). September 23-24, 2020.

  5. Rege, A. (2020). A View into Temple Cyber Research and Industry Partnerships Panel, Temple University’s Cyber@Temple Lunch Series, “State of Cyber Security: Current Industry Practices in Testing and Cyber Research Innovations”, September 16, 2020.

  6. Rege, A. (2019). Illicit Sand Mining, Illicit Supply Networks Conference, University of Alabama in Tuscaloosa.

  7. Rege, A. (2019). Human Factors Panel. NSF Cybersecurity Research Transition To Practice (TTP) workshop, June 19, 2019, Chicago, IL, USA.

  8. Rege, A. (2019). “The Role of the Social Sciences in the Cybersecurity Dialog”. Keynote Address. Cyber Situational Awareness. June 3-4, 2019, University of Oxford, Oxford, England, UK.

  9. Rege, A. (2019). CLA Graduation Ceremony Faculty Address. Temple University, January 31, 2019, Philadelphia, PA, USA.

  10. Rege, A. (2018). “Cyberattack Forecasting – Hype or Hope?” Panel. MILCOM, October 29-30, 2018, Los Angeles, CA, USA.

  11. Rege, A. (2018). Case Studies on the Application of Cognitive and Social Sciences to the Cyber-Physical World. Resilience Week, August 20-23, 2018, Denver, CO, USA.

  12. Rege, A. (2018). A Temporal Assessment of Adversarial Intrusion Chains, Adaptation and Group Dynamics Using a Real-time Cybersecurity Exercise Case Study. Great Lakes Software Excellence Conference (GLSEC), Grand Rapids, MI.

  13. Rege, A. (2017). Tainted Love: Social Engineering at Dating Websites, Cyber Security Summer School, Tallinn, Estonia, July 10-14.

  14. Rege, A. (2016). “Understanding, Measuring & Evaluating the Human Component in Adversarial Attack Paths”. Adversarial Risk Analysis for Critical Infrastructure, Lorentz Center workshop, Leiden, Netherlands, May 23-27.

  15. Rege, A. (2015). The Evolution of Transnational Organized Crime (TOC) Networks, US Special Operations Command (SOCOM's) Annual Counter Threat Finance Working Group, September 22-24.

  16. Rege, A. (2015). Anticipating Transnational Threats and Risks, NIJ Expert Working Group on the future of Transnational Organized Crime, April 28-29.

  17. Rege, A. (2014). Cyberwar and National Security. Lessons from the Edge: Strategies of Cyber-Security, Fox School of Business, Temple University, March 10.

  18. Rege, A. (2013). The Adaptive Adversary: Investigating the Human Element in Power Grid Cyberattacks, Florida International University, November 1.

  19. Rege, A. (2012). Offender Decision Making in Industrial Control Systems Cybercrime. Cyber Infrastructure Protection '12, September 13-14.

  20. Rege, A. (2008). Cybercriminology: Moving Towards a Theory for Crime and Criminality in Cyberspace. Rutgers Center for Information Management, Integration and Connectivity, September 24.


Workshops and Events Organized

[ (*) = undergraduate student co-author; (+) = graduate student co-author ]
  1. Rege, A., Bleiman, R (+). (2020). Social Engineering Capture-the-flag Competition and Training Event. Temple University, October 2-4, 2020. National Science Foundation. Award # 1453040.

  2. Rege, A., Bleiman, R (+). (2020). Social Engineering Capture-the-flag Competition and Training Event. Temple University, October 2-4, 2020. National Science Foundation. Award # 1453040.

  3. Rege, A., Bleiman, R.(+) & Ducoste, M.(+) (2020). Social engineering for multiple undergraduate STEM fields. The 10th IEEE Integrated STEM Education Conference (ISEC). Princeton University, August 2020. National Science Foundation. Award # 1453040.

  4. Rege, A., Nguyen, T. & Bleiman, R. Social Engineering Workshop. Women in Cybersecurity Conference. Denver, Colorado, March 14, 2020. – accepted, but conference cancelled due to covid-19.

  5. Rege, A., Nguyen, T.(+) & Bleiman, R.(*) (2019). Social Engineering Workshop. 2019 NSF Cybersecurity Summit. San Diego, California, October 15, 2019. National Science Foundation. Award # 1453040.


Awards/Grants

Rege, A. (PI). "SaTC: EDU: Educating STEM Students and Teachers about the Relevance of Social Engineering in Cyberattacks and Cybersecurity", National Science Foundation. February 1, 2021 - January 31, 2024. Award # 2032292. Total Grant Amount $400,000

Rege, A. (PI). “Using Data Science to Study Environmental Racism, Justice, and Policy”. National Science Foundation. January 2021 - May 2021. Temple subcontract: $25,000.

Rege, A. (PI). "CAREER: Applying a Criminological Framework to Understand Adaptive Adversarial Decision-Making Processes in Critical Infrastructure Cyberattacks", National Science Foundation. September 1, 2015 - August 31, 2020. Award # 1453040. Total Grant Amount $450,000

Rege, A. (PI). "EAGER: Collaborative: A Criminology-Based Simulation of Dynamic Adversarial Behavior in Cyberattacks", National Science Foundation. September 1, 2017 - August 31, 2019. Award # 1742747. Total Grant Amount $150,389 .

Saad, W.(PI), Sarwat, A.(PI), Akkaya, K.(Co-PI), Guvenc, I.(Co-PI), Biswas, S.(PI), Rege, A.(Co-PI), Bai, L.(Co-PI). “CPS: Synergy: Collaborative Research: Towards Secure Networked Cyber-Physical Systems: A Game-Theoretic Framework with Bounded Rationality.” National Science Foundation. January 2015 - December 2017. Award # 1446574. Total Grant Amount ($999,853), Temple University’s Portion ($449,852).

NSF Trusted CI (Critical Infrastructure) Open Science Cybersecurity Fellowship, 2019-2020

Temple University’s Global Studies Events Grant, 2018-2019, $1,500

Temple University’s Global Studies Events Grant, 2017-2018, $1,350

Temple University's Presidential Humanities and Arts Research Program, 2015-2017, $5,000

Temple University's Teaching and Learning Center: Community-Based Digital Storytelling Teaching Circle, 2014-2015, $1,000

Temple University Internationalization Grant, 2014, $4,000

Temple University Summer Research Grant, 2014, $7,000

Dissertation Fellowship, Rutgers University, 2011-2012, $20,000

Doctoral Fellowship, Social Sciences and Humanities Research Council of Canada, 2008-2012, $20,000/yr

Presidential Fellowship, Rutgers University, 2008-2010, $30,000/yr

Master's Scholarship, Social Sciences and Humanities Research Council of Canada, 2007-2008, $17,500

Graduate Award, Saint Mary's University, 2007-2008, $2,000

Faculty of Graduate Studies and Research Fellowship, Saint Mary's University, 2006-2007, $6,000

Graduate Award, Saint Mary's University, 2006-2007, $6,000

Undergraduate Academic Achievement Scholarship, Saint Mary's University, 2005-2006, $2,000


Faculty College Service

2019-current
Global Studies Steering Committee

2017-2018
CLA Events Committee


Faculty Department Service

2020-current
Diversity Committee, Chair
Communications Committee
Executive Committee

2018-current
Personnel Committee

2014-2019
Theory Comprehensive Exam Committee

2018, 2013-2014
Search Committee

2017-2019, 2014-2016, 2012-2013
Undergraduate Committee

2016-2017, 2013-2014
Graduate Committee

2012-2013
Development Committee

2012-2014
Department Website Maintenance

Editorial Service

Editorial Board
The European Review of Organised Crime

Reviewer Service

Cyber Situational Awareness
Crime Science
International Journal of Comparative and Applied Criminal Justice
Journal of Research in Crime and Delinquency
International Journal of Knowledge Content Development & Technology
Journal of Homeland Security and Emergency Management
Anti-phishing Working Group

Service to regional, national and international professional organizations and conferences

  1. Northeast Student Data Corps Founding Committee, Northeast Big Data Innovation Hub

  2. National Science Foundation, 2020, 2016, 2017(x2), Proposal Panel Reviewer

  3. Fellows Applications Reviewer for Trusted CI (the National Science Foundation Cybersecurity Center of Excellence), 2020

  4. International Conference on Social Computing, Behavioral-Cultural Modeling & Prediction and Behavior Representation in Modeling and Simulation, 2020, Program Committee Member

  5. National Science Foundation Cybersecurity Summit, 2020, Program Committee Member

  6. Layer 8 Social Engineering Conference, 2019, 2020, Content Committee Member

  7. Cyber Situational Awareness, 2017-present, Program Committee Member

  8. IEEE Industrial Electronics Society, 2018, Resilient Control Architectures and Systems for Energy, Track Chair

  9. Global and Transnational Crime conference, 2017, Conference Organizer

  10. Temple University’s Cybersecurity in Action, Research and Education, 2016, Co-organizer

  11. European Conference on Cyber Warfare and Security (ECCWS), Program Committee Member, 2016-current

  12. International Conference on Cyber Warfare and Security (ICCWS), Program Committee Member, 2015-current

  13. Academy of Criminal Justice Sciences, 2016, Topic Area Chair for Cybersecurity

  14. American Society of Criminology, 2014, Sub-Area Chair for Global/Transnational Crime and Justice

  15. Anti-phishing Working Group e-Crime Conference, Technical Program Committee Member, 2013

  16. The International Symposium on Environmental Criminology and Crime Analysis (ECCA), Web designer and administrator, 2013


Interviews & Media Coverage
(*) Media, (#) Academic

(*)(March 10, 2021). Interviewed by Technical.ly Philly, on “While link-sharing issues are being handled in Philly, the COVID-19 vaccine rollout faces cybersecurity risks”.
(*) (February 9, 2021). Interviewed by Chicago Tribune, on “My suitors are handsome, successful and ready for love. But are they real? My journey through the seamy world of romance scams”.
. (*) (October 16, 2020). Coverage for my work on datasets and course project mapping to MITRE framework, on “Academia Adopts Mitre ATT&CK Framework”, on Dark Reading.
(#) (October 15, 2020). Interviewed by Trusted CI: The NSF Cybersecurity Center of Excellence, on “Transition to practice success story: The behavioral side of cybersecurity”.
(*) (September 18, 2020). Recognized as a contributor in the ransomware domain, on “The Week in Ransomware – September 18th 2020 – Schools under attack”.
(*) (September 12, 2020). Interviewed by Security Week, on “University Project Tracks Ransomware Attacks on Critical Infrastructure”.
(*) (February 10, 2020). Interviewed by AARP, on "Criminals Collect Millions in Romance Scams"
(*) (April 4, 2018). Interviewed by Philadelphia Voice, on “What are ‘sand mafias’?”
(*) (August/September 2017). Interviewed by www.mare.de (German magazine), on “The Sand War”
(*) (August 8, 2016). Interviewed by Technical.ly, on What do you think of when someone says they’re a ‘hacker’?
(*) (October 7, 2015). Interviewed by VICE NEWS, on How India's 'Sand Mafia' Pillages Land, Terrorizes People, and Gets Away With It
If the link is unavailable, you can access the PDF here
(*) (October 31, 2012). Interviewed by WKYC-TV 3, Cleveland, Ohio, on Cyberattacks against the Power Grid
If the link is unavailable, you can access the PDF here

Professional Memberships

NICE Working Group (NICEWG)
Institute of Electrical and Electronics Engineers
Women in Cybersecurity
Academy of Criminal Justice Sciences
American Society of Criminology
Honeynet Project


Home Undergrad Research Graduate Research Contact