CV


Current Position (2012-present)

Associate Professor
Department of Criminal Justice
Gladfelter Hall, 5th floor
Temple University
1115 Polett Walk
Philadelphia PA 19122

Click below to jump to particular section
Education
Areas of Specialization
Teaching Interests
Publications, Papers & Talks
Awards/Grants


Education

Ph.D. Criminal Justice, Rutgers University, Newark, NJ, USA, May 2012
Thesis Title: Cybercrimes against the Electricity Sector: Exploring Hacker and Industry Perceptions

M.A. Criminal Justice, Rutgers University, Newark, NJ, USA, May 2010

M.A. Criminology, Saint Mary’s University, Halifax, NS, Canada, June 2008
Thesis Title: Cybercrimes@Gambling_Sites.com

B.A. (Hons.) Criminology, Saint Mary’s University, Halifax, NS, Canada, May 2006
Thesis Title: Hack-Attack! Cyberextortion and Internet Gambling: A Study of Criminal Techniques in a Virtual World

B.Sc. Computer Science, University of British Columbia, Vancouver, BC, Canada, May 2002

Areas of Specialization

Cybercrime and Cybersecurity
Advanced Persistent Threats and Critical Infrastructure Protection
Social Engineering
Experiential learning in Cybersecurity Education
War and Terrorism in the Digital Age
(International) Organized Crime
(International) Corporate Crime
Media and Crime
Crimes Against the Environment
(Harms) measurement and metrics

Teaching Interests

Cybercrime
Organized Crime
Corporate Crime
Crimes Against the Environment
Global and Transnational Crime
Criminological Theory
Media, Crime and Criminal Justice

Publications, Papers & Talks

Click below to jump to particular section
Articles in Refereed Journals
Peer Reviewed Published Conference Proceedings
Chapters in Edited Volumes
Conference Paper Presentations
Invited Addresses and Colloquia

Articles in Refereed Journals [ (*) = undergraduate student co-author; (+) = graduate student co-author ]

  1. Dobson, G., Rege, A. & Carley, K. (2018). Informing Active Cyber Defense with Realistic Adversarial Behavior. Journal of Information Warfare., 17(2), pp. 16-31.

  2. Rege, A., Obradovic, Z., Asadi, N. (+), Parker, E. (+), Pandit, R.(*), Masceri, N. (*) & Singer, B. (*). (2018). Predicting Adversarial Cyber Intrusion Stages Using Autoregressive Neural Networks. Special Issue: Data Mining for Cyber Security. IEEE Intelligent Systems. Impact Factor 2.374

  3. Rege, A., Parker, E. (+), Singer, B.(*) & Masceri, N(*). (2017). A Qualitative Exploration of Adversarial Adaptability, Group Dynamics, and Cyber Intrusion Chains. Journal of Information Warfare 16(3): 1-16.

  4. Rege, A. & Lavogrna, A. (2017). Organization, operations, and success of environmental organized crime in Italy and India: a comparative analysis. European Journal of Criminology 14(2): 160-182. Impact Factor 1.305

  5. Rege, A. (2016). Not Biting the Dust: Using a Tri-Partite Model of Organized Crime to Examine India’s Sand Mafia. International Journal of Comparative and Applied Criminal Justice 40(2): 101-121. Read my media interview here

  6. Rege, A. (2014). A Criminological Perspective on Power Grid Cyberattacks: Using Routine Activities Theory and Rational Choice Perspective to Explore Adversarial Decision-Making. Journal of Homeland Security and Emergency Management (JHSEM) 11(4): 463-487. Impact Factor 0.566

  7. Rege, A. (2014). Digital Information Warfare Trends in Eurasia. Security Journal 27(2): 374-398. Impact factor 0.341

  8. McMullan, J. & Rege, A. (2010). Online crime and internet gambling. Journal of Gambling Issues. Issue 24: 54-85.

  9. Rege, A. (2009). What’s Love Got to Do With It? Exploring Online Dating Scams and Identity Fraud. International Journal of Cybercriminology. 3 (2): 494-512. [article available here]

  10. Rege-Patwardhan, A. (2009). Cybercrimes against critical infrastructures: a study of online criminal organization and techniques. Criminal Justice Studies: A Critical Journal of Crime, Law and Society. 22 (3): 261-271.

  11. McMullan, J. & Rege, A. (2007). Cyber-Extortion at Online Gambling Sites: Criminal Organization and Legal Challenges. Gaming Law Review. 11 (6): 648-665.

Peer Reviewed Published Conference Proceedings [ (*) = undergraduate student co-author; (+) = graduate student co-author ]

  1. Rege, A., VanZant, S. (forthcoming). "Examining the Roles of Muhajirahs in the Islamic State via Twitter". Proceedings of the IEEE Cyber Science Conference.

  2. Rege, A., Williams, K. (+) & Mendlein, A. (+) (forthcoming). "A Social Engineering Course Project for Undergraduate Students Across Multiple Disciplines". Proceedings of the IEEE Cyber Science Conference.

  3. Asadi, N. (+), Rege, A., Obradovic, Z. (forthcoming). "Pattern discovery in intrusion chains and adversarial movement". Proceedings of the IEEE Cyber Science Conference.

  4. Rege, A. & Adams, J. (forthcoming). “The need for more sophisticated cyber-physical systems war gaming exercises”. 18th European Conference on Cyber Warfare and Security.

  5. Rege, A., Williams, K. (+) & Mendlein, A. (+) (forthcoming). "An experiential learning cybersecurity project for multiple STEM undergraduates". Proceedings of the 9th IEEE Integrated STEM Education Conference (ISEC).

  6. Asadi, N. (+), Rege, A. & Obradovic, Z. (2018). "An Assessment of Group Dynamics During Cyber Crime Through Temporal Network Topology". Proceedings of the 10th International Conference on Social Computing, Behavioral-Cultural Modeling & Prediction and Behavior Representation in Modeling and Simulation (SBP-BRiMS).

  7. Asadi, N. (+), Rege, A. & Obradovic, Z. (2018). “Analysis of Adversarial Movement Through Characteristics of Graph Topological Ordering”. Proceedings of the International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA). Institute of Electrical and Electronics Engineers (IEEE) Xplore Digital Library.

  8. Dobson, G.(+), Rege, A. & Carley, K. (2018). “Virtual Cyber Warfare Experiments based on Empirically Observed Adversarial Intrusion Chain Behavior”. Proceedings from the 13th International Conference on Cyber Warfare and Security.

  9. Yang, S. J., Rege, A. & Kuhl, M. E. (2017). "Learning, Simulating and Predicting Adversary Attack Behaviors for Proactive Cyber Defense", in Proceedings of NATO IST-152 Workshop on Intelligent Autonomous Agents for Cyber Defence and Resilience, pp. 30-34, October 18-20, 2017, Prague, Czech Republic.

  10. Rege, A., Biswas, S., Bai, L., Parker, E. (+) & McJunkin, T. (2017). “Using Simulators to Assess Knowledge and Behavior of “Novice” Operators of Critical Infrastructure under Cyberattack Events”. Proceedings of the 10th International Symposium on Resilient Control Systems (ISRCS). Institute of Electrical and Electronics Engineers (IEEE).

  11. Rege, A., Parker, E. (+) & McJunkin, T. (2017). “Using a Critical Infrastructure Game to Provide Realistic Observation of the Human in the Loop by Criminal Justice Students”. Proceedings of the 10th International Symposium on Resilient Control Systems (ISRCS). Institute of Electrical and Electronics Engineers (IEEE).

  12. Rege, A., Obradovic, Z., Asadi, N.(+), Singer, S.(*) & Masceri, N.(*) (2017). “A Temporal Assessment of Cyber Intrusion Chains Using Multidisciplinary Frameworks and Methodologies”. Proceedings of the International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA 2017). Institute of Electrical and Electronics Engineers (IEEE) Xplore Digital Library.

  13. Rege, A., Adams, J., Parker, E. (+), Singer, B. (*), Masceri, N. (*) & Pandit, R. (*) (2017). “Using Cyber-security Exercises to Study Adversarial Intrusion Chains, Decision-Making, and Group Dynamics”. Proceedings of the 16th European Conference on Cyber Warfare and Security.

  14. Rege, A., Obradovic, Z., Asadi, N. (+), Parker, E. (+), Masceri, N. (*), Singer, B. (*) & Pandit, R.(*) (2017). “Using a Real-Time Cybersecurity Exercise Case Study to Understand Temporal Characteristics of Cyberattacks”. Proceedings of the 10th International Conference on Social Computing, Behavioral-Cultural Modeling & Prediction and Behavior Representation in Modeling and Simulation (SBP-BRiMS).

  15. Rege, A., Singer, B. (*), Masceri, N. (*) & Heath, Q. (*) (2017). “Measuring Cyber Intrusion Chains, Adaptive Adversarial Behavior, and Group Dynamics”. Proceedings of the 12th International Conference on Cyber Warfare and Security.

  16. Rege, A. (2016). “Incorporating the Human Element in Anticipatory and Dynamic Cyber Defense”. Proceedings of the The 4th International Conference on Cybercrime and Computer Forensics (ICCCF). Institute of Electrical and Electronics Engineers (IEEE).

  17. McJunkin, T. R., Rieger, C. G., Rege, A., Biswas, S. K., Haney, M., Santora, M. J., Johnson, B. K., Boring, R. L., Naidu, D. S., & Gardner, J. F. (2016), “Multidisciplinary Game-based Approach for Generating Student Enthusiasm for Addressing Critical Infrastructure Challenges”. ASEE Annual Conference & Exposition, New Orleans, Louisiana. 10.18260/p.25763.

  18. Rege, A. (2015). “Multidisciplinary Experiential Learning for Holistic Cybersecurity Education, Research and Evaluation”. Proceedings of the 2015 USENIX Summit on Gaming, Games, and Gamification in Security Education. (3GSE 15).

  19. Rege, A., Ferrese, F., Biswas, S., & Bai, L. (2014). “Adversary dynamics and smart grid security: A multiagent system approach”. Proceedings of the 7th International Symposium on Resilient Control Systems (ISRCS). Institute of Electrical and Electronics Engineers (IEEE). pp. 1-7. IEEE Catalog Number: CFP1469H-ART [ISBN: 978-1-4799-4187-2] DOI: 10.1109/ISRCS.2014.6900101.

  20. Rege, A. (2013). 10v3.c0ns [love.cons]: A Criminological Investigation of Online Dating Crimes. Proceedings of the 2013 IEEE eCrime Researchers Summit. Institute of Electrical and Electronics Engineers (IEEE). pp. 123-131. IEEE Catalog Number: CFP13ECR-POD [ISBN: 978-1-4799-1159-2].

Chapters in Edited Volumes

  1. Rege, A. (2013). Factors Impacting Attacker Decision-Making in Power Grid Cyberattacks: Policy and Research Implications. In Butts, J. and Shenoi, S. (eds.) International Federation for Information Processing Advances in Information and Communication Technology-Critical Infrastructure Protection, Critical Infrastructure Protection VII. Pp. 125-138. New York: Springer.

  2. Rege, A. (2010). Industrial Control Systems and Cybercrime, in Holt, T. (ed). Crime On-line: Correlates, Causes, and Context. Pp. 191-218. Durham, North Carolina: Carolina Academic Press.

  3. Finckenauer, J. & Rege, A. (2013). Criminal Organizations and Harms Assessment: A Research Proposal, Grigol Robakidze University Academic Digest. Law. N2. Tbilisi 2013. ISSN 2298-0202.

Article Reprints

McMullan, J. & Rege, A. (2009). Cyberextortion at Online Gambling Sites: Criminal Organization and Legal Challenges. In I. Carr, (Ed.), Computer Crime – International Library of Criminology, Criminal Justice and Penology – Second Series. UK: Ashgate Publishing.

Conference Paper Presentations

Presented at Professional Meetings [ (*) = undergraduate student co-author; (+) = graduate student co-author ]

2006-present

  1. Rege, A. & Adams, J. (forthcoming). “The need for more sophisticated cyber-physical systems war gaming exercises”. Paper presented at the annual meetings of the 18th European Conference on Cyber Warfare and Security, University of Coimbra, Portugal.

  2. Rege, A. (forthcoming). “A Social Engineering Experiential Learning Project for Undergraduate Students”. Paper presented at the annual meetings of Women in Cybersecurity (WiCYS) conference. Pittsburgh, PA, USA.

  3. Williams, K. (+) & Rege, A. (forthcoming). "A Qualitative Exploration of Adversarial Adaptability, Group Dynamics, and Cyber Intrusion Chains". Paper presented at the annual meetings of the Academy of Criminal Justice Sciences, Baltimore, MD, USA.

  4. Asadi, N. (+) & Rege, A. (forthcoming). "A Temporal Assessment of Cyber Intrusion Chains Using Multidisciplinary Frameworks and Methodologies". Paper presented at the annual meetings of the Academy of Criminal Justice Sciences, Baltimore, MD, USA.

  5. Rege, A. (forthcoming). "Using a Critical Infrastructure Game to Provide Realistic Observation of the Human in the Loop by Criminal Justice Students". Paper presented at the annual meetings of the Academy of Criminal Justice Sciences, Baltimore, MD, USA.

  6. Mendlein, A. (+) & Rege, A. (forthcoming). “A Social Engineering Course Project for Undergraduate Students Across All Disciplines”. Paper presented at the annual meetings of the Academy of Criminal Justice Sciences, Baltimore, MD, USA.

  7. Rege, A., Williams, K. (+), Mendlein, A. (+) (2019). “An experiential learning cybersecurity project for multiple STEM undergraduates”. Paper presented at the annual meetings of the IEEE Integrated STEM Education Conference. Princeton University, Princeton, New Jersey, USA.

  8. Rege, A. “Inside the Culture and Practices of India's Sand Mafia”. Paper presented at the annual meetings of the Western Society of Criminology Conference. February 7-9, 2019. Honolulu, Hawai’i, USA.

  9. Rege, A. (2018). “Social Engineering Course Projects for Undergraduate Students“. Paper presented at Def Con 26, August 9-12, 2018, Las Vegas, USA.

  10. Rege, A. (2018). “Social engineering class project for undergraduate students in multiple disciplines”. Paper presented at SE-RI, Newport, Rhode Island, USA.

  11. Asadi, N. (+), Rege, A. & Obradovic, Z. (2018). "An Assessment of Group Dynamics During Cyber Crime Through Temporal Network Topology". Paper presented at the 10th International Conference on Social Computing, Behavioral-Cultural Modeling & Prediction and Behavior Representation in Modeling and Simulation (SBP-BRiMS), Washington DC, USA.

  12. Asadi, N. (+), Rege, A. & Obradovic, Z. (2018). “Analysis of Adversarial Movement Through Characteristics of Graph Topological Ordering”. Paper presented at the annual meetings of the International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA). Glasgow, UK.

  13. Rege, A. (2018). “A social engineering course project case study”. Paper presented at the annual meetings of AtlSecCon, Halifax, Nova Scotia, Canada.

  14. Dobson, G.(+), Rege, A. & Carley, K. (2018). “Virtual Cyber Warfare Experiments based on Empirically Observed Adversarial Intrusion Chain Behavior”. Paper presented at the 13th International Conference on Cyber Warfare and Security, Washington DC, USA.

  15. Rege, A. (2018). “Multidisciplinary Experiential Learning in Cybersecurity for Non-STEM Students”. Paper presented at the annual meetings of the Academy of Criminal Justice Sciences, New Orleans, LA, USA.

  16. Rege, A. (2018). “A social science approach to cybersecurity education for all disciplines”. Paper presented at Shmoocon XIV, Washington DC, USA.

  17. Parker, E. (+) & Rege, A. (2018). "Group Dynamics and Decision-Making in Critical Infrastructure Cyberattacks". Paper presented at the annual meetings of the American Society of Criminology, Philadelphia, PA, USA.

  18. Asadi, N. (+) & Rege, A. (2018). "A Temporal Assessment of Cyber Intrusion Chains Using Multidisciplinary Frameworks and Methodologies". Paper presented at the annual meetings of the American Society of Criminology, Philadelphia, PA, USA.

  19. Rege, A. (2017). “Leveraging simulators to educate non-STEM students in conducting real-time cybersecurity field research”. Paper presented at the annual meetings of the National Initiative for Cybersecurity Education (NICE), Dayton, OH, USA.

  20. Rege, A., Biswas, S., Bai, L., Parker, E. (+) & McJunkin, T. (2017). “Using Simulators to Assess Knowledge and Behavior of “Novice” Operators of Critical Infrastructure under Cyberattack Events”. Paper presented at the 10th International Symposium on Resilient Control Systems (ISRCS), Wilmington, DE, USA.

  21. Rege, A., Parker, E. (+) & McJunkin, T. (2017). “Using a Critical Infrastructure Game to Provide Realistic Observation of the Human in the Loop by Criminal Justice Students”. Paper presented at the 10th International Symposium on Resilient Control Systems (ISRCS), Wilmington, DE, USA.

  22. Rege, A., Obradovic, A., Asadi, N.(+), Singer, S.(*) & Masceri, N.(*) (2017). “A Temporal Assessment of Cyber Intrusion Chains Using Multidisciplinary Frameworks and Methodologies”. Paper presented at the annual meetings of the International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA 2017), London, England, UK.

  23. Rege, A. (2017). “Examining the Roles of Muhajirahs in the Islamic State via Twitter”. Paper presented at the Terrorism and Social Media Conference, Swansea, UK.

  24. Rege, A., Adams, J., Parker, E. (+), Singer, B. (*), Masceri, N. (*) & Pandit, R. (*) (2017). "Using Cyber-security Exercises to Study Adversarial Intrusion Chains, Decision-Making, and Group Dynamics". Paper presented at the 16th European Conference on Cyber Warfare and Security, Dublin, Ireland.

  25. Rege, A., Obradovic, Z., Asadi, N. (+), Parker, E. (+), Masceri, N. (*), Singer, B. (*) & Pandit, R.(*) (2017). “Using a Real-Time Cybersecurity Exercise Case Study to Understand Temporal Characteristics of Cyberattacks”. Paper presented at the 10th International Conference on Social Computing, Behavioral-Cultural Modeling & Prediction and Behavior Representation in Modeling and Simulation (SBP-BRiMS), Washington, DC, USA.

  26. Rege, A., Singer, B. (*), Masceri, N. (*) & Heath, Q. (*) (2017). "Measuring Cyber Intrusion Chains, Adaptive Adversarial Behavior, and Group Dynamics". Paper presented at the 12th International Conference on Cyber Warfare and Security, Dayton, OH, USA.

  27. Rege, A. (2016). “The Digital Squeeze: Extortion Rackets in Cyberspace”. Paper presented at the annual meetings of the American Society of Criminology Conference, New Orleans, LA, USA.

  28. Singer, B., Masceri, N. (*), Rege, A. (2016). “Traditional Qualitative Methodology in an Innovative Setting: Cybercrime Research on Adversarial Decision-Making, Behavior, and Group Dynamics”. Paper presented at the annual meetings of the American Society of Criminology Conference, New Orleans, LA, USA.

  29. Rege, A. & Heath, Q. (*) (2016). “What the Hack? Perceptions of Hackers and Cybercriminals in Popular Culture”. Paper presented at the annual meetings of the Hackers on Planet Earth (HOPE), New York, USA.

  30. Rege, A. (2016). “Developing a Framework to Assess and Prioritize the Harms Caused by India's Sand Mafia”. Paper presented at the annual meetings of the C4 conference (Conference on Conservation, Computation, & Criminology), Cornell University, Ithica, NY, USA.

  31. Rege, A. (2016). “Incorporating the Human Element in Anticipatory and Dynamic Cyber Defense”. Paper presented at the 4th International Conference on Cybercrime and Computer Forensics (ICCCF). Vancouver, Canada.

  32. McJunkin, T. R., & Rieger, C. G., & Rege, A., & Biswas, S. K., & Haney, M., & Santora, M. J., & Johnson, B. K., & Boring, R. L., & Naidu, D. S., & Gardner, J. F. (2016). “Multidisciplinary Game-based Approach for Generating Student Enthusiasm for Addressing Critical Infrastructure Challenges”. Paper presented at the annual meetings of the ASEE Annual Conference & Exposition, New Orleans, Louisiana, USA.

  33. Heath, Q. (*) & Rege, A. (2015). "What the Hack? Perceptions of Hackers and Cybercriminals in Popular Culture". Paper presented at the annual meetings of the American Society of Criminology Conference, Washington DC, November.

  34. Rege, A. (2015). "ISIS Jihadettes: Examining the Role of Women in ISIS". Paper presented at the annual meetings of the American Society of Criminology Conference, Washington DC, USA.

  35. Lavorgna, A. & Rege, A. (2015). “Organization, Operations, and Success of Environmental Organized Crime in Italy and India: A Comparative Analysis”. Paper presented at the Stockholm Criminology Symposium, Stockholm, Sweden.

  36. Rege, A. (2015). “A Criminological Perspective On Intrusion Kill Chains And Adaptive Adversaries”. Paper presented at the annual meetings of the Honeynet Project Workshop, Stavanger, Norway.

  37. Koehnlein, J. (*) & Rege, A. (2015). “The Fentanyl-Laced Heroin Epidemic: Investigating Underlying Factors And Organized Crimes Involvement In Philadelphia”. Paper presented at the annual meetings of the Academy of Criminal Justice Sciences Conference, Orlando, FL.

  38. Rege, A. & VanZant, S. (*) (2015). “Twitter and the Interactive Theatrics of Terror”. Paper presented at the annual meetings of the Academy of Criminal Justice Sciences Conference, Orlando, FL.

  39. Slater, K. (*) & Rege, A. (2015). “Pentiti Of Palermo: The Impact Of Incentives And Local Factors On Organized Crime Testimony”. Paper presented at the annual meetings of the Academy of Criminal Justice Sciences Conference, Orlando, FL.

  40. Rege, A., Koehnlein, J. (*) & Yody, K. (*) (2014). “Measuring and Quantifying the Environmental Harms Caused by Illegal Sand Mining in India”. Paper presented at the annual meetings of the American Society of Criminology Conference, San Francisco, November.

  41. Slater, K. (*) & Rege, A. (2014). “Lessons from Palermo: Strategies for Increasing Organized Crime Testimony”. Paper presented at the annual meetings of the American Society of Criminology Conference, San Francisco, November.

  42. Lavorgna, A. & Rege, A (2014). “Comparing the Organization, Operation, and Success of Ecomafias in Italy and India”. Paper presented at the annual meetings of the American Society of Criminology Conference, San Francisco, November.

  43. Slater, K. (*) & Rege, A. (2014). “Reconstructing history: Multiple methods in organized crime research”. Paper presented at the annual meetings of the Southern Criminal Justice Association, Clearwater, FL.

  44. VanZant, S. (*), Coladonato, J. (*) & Rege, A. (2014) “How Terrorists Use Social Media: An Analysis Through Twitter APIs”. Paper presented at the annual meetings of the PUMPCON (hacker conference), Philadelphia, October 25, 2014.

  45. Rege, A., Ferrese, F., Biswas, S. & Bai, L. (2014). "Adversary Dynamics and Smart Grid Security: A Multiagent System Approach". Paper presented at the annual meetings of Resilience Week, Denver, August.

  46. Rege, A. (2014). "Adversarial Decision-Making in Intrusion Chain and STIX Frameworks". Paper presented at the bi-annual meetings of the Industrial Control Systems Joint Working Group, Indianapolis, June.

  47. Rege, A. (2014). "Not Biting the Dust: Assessing the Properties and Success of India’s Sand Mafia". Paper presented at the MAFIAs: Realities and Representations of Organized Crime Conference hosted by CUNY John D. Calandra Italian American Institute's conference, New York, April.

  48. Beaye, W. (*) & Rege, A. (2014). "(Cyber) Extortion: An Assessment of the Enforcement Complications in Both Cyber and Physical Space". Paper presented at the MAFIAs: Realities and Representations of Organized Crime Conference hosted by CUNY John D. Calandra Italian American Institute's conference, New York, April.

  49. Slater, K. (*) & Rege, A. (2014). "At the Nexus of Politics and Organized Crime: Examining Corruption in Philadelphia". Paper presented at the MAFIAs: Realities and Representations of Organized Crime Conference hosted by CUNY John D. Calandra Italian American Institute's conference, New York, April.

  50. Rege, A. (2014). "The Human Element in Adversarial Cyberattack Kill Chains". Paper presented at the 9th International Conference on Cyber Warfare and Security, West Lafayette, March.

  51. Rege, A. (2014). An Investigation into the Illegal Mining Operations of India’s Sand Mafia. Paper presented at the annual meetings of the Academy of Criminal Justice Sciences, Philadelphia, February.

  52. Beaye, W. (*) & Rege, A. (2014). (Cyber) Extortion: An Assessment of the Enforcement Complications in Cyber and Physical Space. Paper presented at the annual meetings of the Academy of Criminal Justice Sciences, Philadelphia, February.

  53. Slater, K. (*) & Rege, A. (2014). The Role of Political Corruption in the Success of Organized Crime: Philadelphia as a Case Study", Academy of Criminal Justice Sciences, Philadelphia, February.

  54. Rege, A. (2013). Hackers Wanted: Creating an Interactive Cyberattack Playbook. Paper presented at the annual meetings of BSides , Wilmington, Delaware, November.

  55. Rege, A. (2013). Developing Dynamic Critical Infrastructure Cybersecurity Measures. Paper presented at the International Symposium on Environmental Criminology and Crime Analysis (ECCA), Philadelphia, June.

  56. Rege, A. (2013). Adversarial Decision Making in Critical Infrastructure Cyberattacks. Paper presented at the annual SOURCE Conference, Boston, April.

  57. Rege, A. (2013). Attacker Decision-Making in Power Grid Cyberattacks. Paper presented at the Seventh Annual International Federation for Information Processing Working Group 11.10 International Conference on Critical Infrastructure Protection, Washington DC, March.

  58. Rege, A. (2012). Bizarre E-Bazaars: Selling Credit Cards in Virtual Black Markets. Paper presented at the annual meetings of the Academy of Criminal Justice Sciences, New York, March.

  59. McMullan, J. & Rege, A. (2012). An Integrated Theory for Crime in Cyberspace: Possibilities and Problems. Paper presented at the annual meetings of the Academy of Criminal Justice Sciences, New York, March.

  60. Rege, A. (2012). Lights Out! Exploring Offender Rationality for Cyber-crimes Against the Electricity Sector. Paper presented at the annual meetings of the American Society of Criminology, Chicago, November.

  61. Rege, A. (2010). Digital Information Warfare Trends in Eurasia. Paper presented at the annual meetings of the American Society of Criminology, San Francisco, November.

  62. Rege, A. (2009). Love Bytes, Date Baits, and Cyber Sweethearts: A Study of Online Dating Crimes and Criminals. Paper presented at the annual meetings of the American Society of Criminology, Philadelphia, November.

  63. McMullan, J. & Rege, A. (2009). Cybernomads, Dot.cons, and Criminal Assemblages. Paper presented at the Canadian Criminal Justice Association, Halifax, October.

  64. McMullan, J. & Rege, A. (2009). Online Crime and Internet Gambling. Paper presented at the Canadian Alcohol and Gaming Regulators Association, Halifax, July.

  65. McMullan, J. & Rege, A. (2009). Cheating and Cybercrime @ Gambling Sites.com. Paper presented at the Alberta Gaming Research Institute Conference on Internet Gambling, Banff, March.

  66. Rege, A. (2009). Cyberattacks Against Critical Infrastructures: A Study of Online Criminal Techniques and Organization. Paper presented at the annual meetings of the Academy of Criminal Justice Sciences, Boston, March.

  67. Rege, A. (2007). Cybercrime, Online Gambling, and the Problem of Governance. Paper presented at the Crime, Law and Regulation: An Interdisciplinary Graduate Conference, Toronto, October.

  68. McMullan, J. & Rege, A. (2006). Fear and Trembling on the Internet: Hacking and Cyber-Extortion at Online Gambling Sites. Paper presented at the Nova Scotia Responsible Gambling Conference, Halifax, October.

Invited Addresses and Colloquia

  1. Rege, A. (forthcoming). Human Factors Panel. NSF Cybersecurity Research Transition To Practice (TTP) workshop, June 19, 2019, Chicago, IL, USA.

  2. Rege, A. (forthcoming). “The Role of the Social Sciences in the Cybersecurity Dialog”. Keynote Address. Cyber Situational Awareness. June 3-4, 2019, University of Oxford, Oxford, England, UK.

  3. Rege, A. (2019). CLA Graduation Ceremony Faculty Address. Temple University, January 31, 2019, Philadelphia, PA, USA.

  4. Rege, A. (2018). “Cyberattack Forecasting – Hype or Hope?” Panel. MILCOM, October 29-30, 2018, Los Angeles, CA, USA.

  5. Rege, A. (2018). Case Studies on the Application of Cognitive and Social Sciences to the Cyber-Physical World. Resilience Week, August 20-23, 2018, Denver, CO, USA.

  6. Rege, A. (2018). A Temporal Assessment of Adversarial Intrusion Chains, Adaptation and Group Dynamics Using a Real-time Cybersecurity Exercise Case Study. Great Lakes Software Excellence Conference (GLSEC), Grand Rapids, MI.

  7. Rege, A. (2017). Tainted Love: Social Engineering at Dating Websites, Cyber Security Summer School, Tallinn, Estonia, July 10-14.

  8. Rege, A. (2016). “Understanding, Measuring & Evaluating the Human Component in Adversarial Attack Paths”. Adversarial Risk Analysis for Critical Infrastructure, Lorentz Center workshop, Leiden, Netherlands, May 23-27.

  9. Rege, A. (2015). The Evolution of Transnational Organized Crime (TOC) Networks, US Special Operations Command (SOCOM's) Annual Counter Threat Finance Working Group, September 22-24.

  10. Rege, A. (2015). Anticipating Transnational Threats and Risks, NIJ Expert Working Group on the future of Transnational Organized Crime, April 28-29.

  11. Rege, A. (2014). Cyberwar and National Security. Lessons from the Edge: Strategies of Cyber-Security, Fox School of Business, Temple University, March 10.

  12. Rege, A. (2013). The Adaptive Adversary: Investigating the Human Element in Power Grid Cyberattacks, Florida International University, November 1.

  13. Rege, A. (2012). Offender Decision Making in Industrial Control Systems Cybercrime. Cyber Infrastructure Protection '12, September 13-14.

  14. Rege, A. (2008). Cybercriminology: Moving Towards a Theory for Crime and Criminality in Cyberspace. Rutgers Center for Information Management, Integration and Connectivity, September 24.

Conference Posters

Koehnlein, J. (*), Slater, K.(*) & Rege, A. (2014). The Fentanyl-Laced Heroin Epidemic: A Comparative Analysis of Pennsylvania Media Representations and Nationwide Data. Poster presented at the Substance Abuse in the 21st Century [Research Conference Organized by A Symposium sponsored by the Temple University Substance Abuse Research Consortium (SARC) and the Office of the Senior Vice Provost for Research], Temple University, Philadelphia, April.


Awards/Grants

Rege, A. (PI). "CAREER: Applying a Criminological Framework to Understand Adaptive Adversarial Decision-Making Processes in Critical Infrastructure Cyberattacks", National Science Foundation. September 1, 2015 - August 31, 2020. Award # 1453040. Total Grant Amount $450,000 [First three years $277,663].

Rege, A. (PI). "EAGER: Collaborative: A Criminology-Based Simulation of Dynamic Adversarial Behavior in Cyberattacks", National Science Foundation. September 1, 2017 - August 31, 2019. Award # 1742747. Total Grant Amount $150,389 .

Saad, W.(PI), Sarwat, A.(PI), Akkaya, K.(Co-PI), Guvenc, I.(Co-PI), Biswas, S.(PI), Rege, A.(Co-PI), Bai, L.(Co-PI). “CPS: Synergy: Collaborative Research: Towards Secure Networked Cyber-Physical Systems: A Game-Theoretic Framework with Bounded Rationality.” National Science Foundation. January 2015 - December 2017. Award # 1446574. Total Grant Amount ($999,853), Temple University’s Portion ($449,852).

NSF Trusted CI (Critical Infrastructure) Open Science Cybersecurity Fellowship, 2019-2020

Temple University’s Global Studies Events Grant, 2018-2019, $1,500

Temple University’s Global Studies Events Grant, 2017-2018, $1,350

Temple University's Presidential Humanities and Arts Research Program, 2015-2017, $5,000

Temple University's Teaching and Learning Center: Community-Based Digital Storytelling Teaching Circle, 2014-2015, $1,000

Temple University Internationalization Grant, 2014, $4,000

Temple University Summer Research Grant, 2014, $7,000

Dissertation Fellowship, Rutgers University, 2011-2012, $20,000

Doctoral Fellowship, Social Sciences and Humanities Research Council of Canada, 2008-2012, $20,000/yr

Presidential Fellowship, Rutgers University, 2008-2010, $30,000/yr

Master's Scholarship, Social Sciences and Humanities Research Council of Canada, 2007-2008, $17,500

Graduate Award, Saint Mary's University, 2007-2008, $2,000

Faculty of Graduate Studies and Research Fellowship, Saint Mary's University, 2006-2007, $6,000

Graduate Award, Saint Mary's University, 2006-2007, $6,000

Undergraduate Academic Achievement Scholarship, Saint Mary's University, 2005-2006, $2,000


Faculty Service

2018
Search Committee

2014-2016, 2017-present
Undergraduate Committee

2016-2017
Graduate Committee

2017-present
CLA Events Committee

2013-2014
Search Committee
Graduate Committee

2012-2013
Undergraduate Committee
Development Committee

2012-2014
Department Website Maintenance

Editorial Service

Editorial Board
The European Review of Organised Crime

Reviewer Service
CyberSA
Crime Science
International Journal of Comparative and Applied Criminal Justice
Journal of Research in Crime and Delinquency
International Journal of Knowledge Content Development & Technology
Journal of Homeland Security and Emergency Management
Anti-phishing Working Group

Service to regional, national and international professional organizations and conferences

Layer 8 Social Engineering Conference, 2019, Content Committee Member
Cyber Situational Awareness, 2017-present, Program Committee Member
IEEE Industrial Electronics Society, Resilient Control Architectures and Systems for Energy, Track Chair
National Science Foundation, Proposal Panel Reviewer, 2016, 2017(x2)
Temple University’s Cybersecurity in Action, Research and Education, 2016, Co-organizer
European Conference on Cyber Warfare and Security (ECCWS), Program Committee Member, 2016-current
International Conference on Cyber Warfare and Security (ICCWS), Program Committee Member, 2015-current
Academy of Criminal Justice Sciences, 2016, Topic Area Chair for Cybersecurity
American Society of Criminology, 2014, Sub-Area Chair for Global/Transnational Crime and Justice
Anti-phishing Working Group e-Crime Conference, Technical Program Committee Member, 2013
The International Symposium on Environmental Criminology and Crime Analysis (ECCA), Web designer and administrator, 2013

Media Interviews

(April 4, 2018). Interviewed by Philadelphia Voice, on “What are ‘sand mafias’?”
(August/September 2017). Interviewed by www.mare.de (German magazine), on “The Sand War”
(August 8, 2016). Interviewed by Technical.ly, on What do you think of when someone says they’re a ‘hacker’?
(October 7, 2015). Interviewed by VICE NEWS, on How India's 'Sand Mafia' Pillages Land, Terrorizes People, and Gets Away With It
If the link is unavailable, you can access the PDF here
(October 31, 2012). Interviewed by WKYC-TV 3, Cleveland, Ohio, on Cyberattacks against the Power Grid
If the link is unavailable, you can access the PDF here

Professional Memberships

Academy of Criminal Justice Sciences
American Society of Criminology
The Infrastructure Security Partnership
Honeynet Project

Computer Science Work Experience

Software Engineer, Canadian Securities Registration Systems, Burnaby, BC, Canada
November 2002 – March 2004
- Worked on the encryption software to protect confidential company and customer records
- Implemented functionalities that aided problem solving during deadlocks

Programmer, ARTS ISIT, University of British Columbia, Vancouver, BC, Canada
May 2002 – November 2002
- Designed, developed, and integrated the CTConnect (campus-wide system) self-registration application
- Created Quality Assurance documents for testers at IT Services

Programmer, Educational Technology Centre, University of British Columbia, Vancouver, BC, Canada
February-November 2002
- Created a medical case simulator that mimicked a ‘doctor-patient consultation’ scenario for medical students
- Offered technical support to faculty and students in the development of educational resources and learning aids


Home Undergrad Research Contact