default search action
Aditya P. Mathur
- > Home > Persons > Aditya P. Mathur
Publications
- 2021
- [j52]Venkata Reddy Palleti, Sridhar Adepu, Vishrut Kumar Mishra, Aditya Mathur:
Cascading effects of cyber-attacks on interconnected critical infrastructure. Cybersecur. 4(1): 8 (2021) - [j50]Sridhar Adepu, Aditya Mathur:
SafeCI: Avoiding process anomalies in critical infrastructure. Int. J. Crit. Infrastructure Prot. 34: 100435 (2021) - [j48]Sridhar Adepu, Aditya Mathur:
Distributed Attack Detection in a Water Treatment Plant: Method and Case Study. IEEE Trans. Dependable Secur. Comput. 18(1): 86-99 (2021) - [j47]Sridhar Adepu, Aditya Mathur:
Assessing the Effectiveness of Attack Detection at a Hackfest on Industrial Control Systems. IEEE Trans. Sustain. Comput. 6(2): 231-244 (2021) - [c99]Madhumitha Balaji, Siddhant Shrivastava, Sridhar Adepu, Aditya Mathur:
Super Detector: An Ensemble Approach for Anomaly Detection in Industrial Control Systems. CRITIS 2021: 24-43 - 2020
- [j45]Muhammad Azmi Umer, Aditya Mathur, Khurum Nazir Junejo, Sridhar Adepu:
Generating invariants using design and data-centric approaches for distributed attack detection. Int. J. Crit. Infrastructure Prot. 28: 100341 (2020) - [j43]Sridhar Adepu, Nandha Kumar Kandasamy, Jianying Zhou, Aditya Mathur:
Attacks on smart grid: power supply interruption and malicious power generation. Int. J. Inf. Sec. 19(2): 189-211 (2020) - [c98]Sridhar Adepu, Venkata Reddy Palleti, Gyanendra Mishra, Aditya Mathur:
Investigation of Cyber Attacks on a Water Distribution System. ACNS Workshops 2020: 274-291 - 2019
- [j38]Aung Maw, Sridhar Adepu, Aditya Mathur:
ICS-BlockOpS: Blockchain for operational data security in industrial control system. Pervasive Mob. Comput. 59 (2019) - [c92]Sridhar Adepu, Eunsuk Kang, Aditya P. Mathur:
Challenges in Secure Engineering of Critical Infrastructure Systems. ASE Workshops 2019: 61-64 - [i3]Sridhar Adepu, Venkata Reddy Palleti, Gyanendra Mishra, Aditya Mathur:
Investigation of Cyber Attacks on a Water Distribution System. CoRR abs/1906.02279 (2019) - 2018
- [j36]Siddhant Shrivastava, Sridhar Adepu, Aditya Mathur:
Design and assessment of an Orthogonal Defense Mechanism for a water treatment facility. Robotics Auton. Syst. 101: 114-125 (2018) - [c87]Qin Lin, Sridhar Adepu, Sicco Verwer, Aditya Mathur:
TABOR: A Graphical Model-based Approach for Anomaly Detection in Industrial Control Systems. AsiaCCS 2018: 525-536 - [c86]Sridhar Adepu, Nandha Kumar Kandasamy, Aditya Mathur:
EPIC: An Electric Power Testbed for Research and Training in Cyber Physical Systems Security. CyberICPS/SECPRE@ESORICS 2018: 37-52 - [c85]Sai Sidharth Patlolla, Bruce M. McMillin, Sridhar Adepu, Aditya Mathur:
An Approach for Formal Analysis of the Security of a Water Treatment Testbed. PRDC 2018: 115-124 - [i2]Sridhar Adepu, Aditya Mathur:
Assessing the Effectiveness of Attack Detection at a Hackfest on Industrial Control Systems. CoRR abs/1809.04786 (2018) - 2017
- [c84]Muhammad Azmi Umer, Aditya Mathur, Khurum Nazir Junejo, Sridhar Adepu:
Integrating Design and Data Centric Approaches to Generate Invariants for Distributed Attack Detection. CPS-SPC@CCS 2017: 131-136 - [c79]Sridhar Adepu, Gyanendra Mishra, Aditya Mathur:
Access Control in Water Distribution Networks: A Case Study. QRS 2017: 184-191 - [c78]Sridhar Adepu, Jay Prakash, Aditya Mathur:
WaterJam: An Experimental Case Study of Jamming Attacks on a Water Treatment System. QRS Companion 2017: 341-347 - [c76]Sridhar Adepu, Aditya Mathur:
From Design to Invariants: Detecting Attacks on Cyber Physical Systems. QRS Companion 2017: 533-540 - 2016
- [j34]Sridhar Adepu, Siddhant Shrivastava, Aditya Mathur:
Argus: An Orthogonal Defense Framework to Protect Public Infrastructure against Cyber-Physical Attacks. IEEE Internet Comput. 20(5): 38-45 (2016) - [c75]Sridhar Adepu, Aditya Mathur:
Distributed Detection of Single-Stage Multipoint Cyber Attacks in a Water Treatment Plant. AsiaCCS 2016: 449-460 - [c72]Sridhar Adepu, Aditya Mathur:
Generalized Attacker and Attack Models for Cyber Physical Systems. COMPSAC 2016: 283-292 - [c69]Jonathan Goh, Sridhar Adepu, Khurum Nazir Junejo, Aditya Mathur:
A Dataset to Support Research in the Design of Secure Water Treatment Systems. CRITIS 2016: 88-99 - [c68]Giedre Sabaliauskaite, Sridhar Adepu, Aditya Mathur:
A Six-Step Model for Safety and Security Analysis of Cyber-Physical Systems. CRITIS 2016: 189-200 - [c67]Sridhar Adepu, Aditya P. Mathur:
Introducing Cyber Security at the Design Stage of Public Infrastructures: A Procedure and Case Study. CSDM Asia 2016: 75-94 - [c66]Sridhar Adepu, Aditya Mathur:
An Investigation into the Response of a Water Treatment System to Cyber Attacks. HASE 2016: 141-148 - [c64]Eunsuk Kang, Sridhar Adepu, Daniel Jackson, Aditya P. Mathur:
Model-based security analysis of a water treatment system. SEsCPS@ICSE 2016: 22-28 - [c63]Sridhar Adepu, Aditya Mathur:
Using Process Invariants to Detect Cyber Attacks on a Water Treatment System. SEC 2016: 91-104 - [c62]Sridhar Adepu, Aditya P. Mathur:
Detecting Multi-Point Attacks in a Water Treatment System Using Intermittent Control Actions. SG-CRC 2016: 59-74 - 2015
- [c61]Sridhar Adepu, Aditya Mathur, Jagadeesh Gunda, Sasa Z. Djokic:
An Agent-Based Framework for Simulating and Analysing Attacks on Cyber Physical Systems. ICA3PP (3) 2015: 785-798
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-27 21:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint